repo
stringlengths
5
54
path
stringlengths
4
155
func_name
stringlengths
1
118
original_string
stringlengths
52
85.5k
language
stringclasses
1 value
code
stringlengths
52
85.5k
code_tokens
sequence
docstring
stringlengths
6
2.61k
docstring_tokens
sequence
sha
stringlengths
40
40
url
stringlengths
85
252
partition
stringclasses
1 value
xo/xo
internal/loader.go
LoadForeignKeys
func (tl TypeLoader) LoadForeignKeys(args *ArgType, tableMap map[string]*Type) (map[string]*ForeignKey, error) { var err error fkMap := map[string]*ForeignKey{} for _, t := range tableMap { // load keys per table err = tl.LoadTableForeignKeys(args, tableMap, t, fkMap) if err != nil { return nil, err } } // determine foreign key names for _, fk := range fkMap { fk.Name = args.ForeignKeyName(fkMap, fk) } // generate templates for _, fk := range fkMap { err = args.ExecuteTemplate(ForeignKeyTemplate, fk.Type.Name, fk.ForeignKey.ForeignKeyName, fk) if err != nil { return nil, err } } return fkMap, nil }
go
func (tl TypeLoader) LoadForeignKeys(args *ArgType, tableMap map[string]*Type) (map[string]*ForeignKey, error) { var err error fkMap := map[string]*ForeignKey{} for _, t := range tableMap { // load keys per table err = tl.LoadTableForeignKeys(args, tableMap, t, fkMap) if err != nil { return nil, err } } // determine foreign key names for _, fk := range fkMap { fk.Name = args.ForeignKeyName(fkMap, fk) } // generate templates for _, fk := range fkMap { err = args.ExecuteTemplate(ForeignKeyTemplate, fk.Type.Name, fk.ForeignKey.ForeignKeyName, fk) if err != nil { return nil, err } } return fkMap, nil }
[ "func", "(", "tl", "TypeLoader", ")", "LoadForeignKeys", "(", "args", "*", "ArgType", ",", "tableMap", "map", "[", "string", "]", "*", "Type", ")", "(", "map", "[", "string", "]", "*", "ForeignKey", ",", "error", ")", "{", "var", "err", "error", "\n\n", "fkMap", ":=", "map", "[", "string", "]", "*", "ForeignKey", "{", "}", "\n", "for", "_", ",", "t", ":=", "range", "tableMap", "{", "// load keys per table", "err", "=", "tl", ".", "LoadTableForeignKeys", "(", "args", ",", "tableMap", ",", "t", ",", "fkMap", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "}", "\n\n", "// determine foreign key names", "for", "_", ",", "fk", ":=", "range", "fkMap", "{", "fk", ".", "Name", "=", "args", ".", "ForeignKeyName", "(", "fkMap", ",", "fk", ")", "\n", "}", "\n\n", "// generate templates", "for", "_", ",", "fk", ":=", "range", "fkMap", "{", "err", "=", "args", ".", "ExecuteTemplate", "(", "ForeignKeyTemplate", ",", "fk", ".", "Type", ".", "Name", ",", "fk", ".", "ForeignKey", ".", "ForeignKeyName", ",", "fk", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "}", "\n\n", "return", "fkMap", ",", "nil", "\n", "}" ]
// LoadForeignKeys loads foreign keys.
[ "LoadForeignKeys", "loads", "foreign", "keys", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/internal/loader.go#L553-L579
train
xo/xo
internal/loader.go
LoadTableForeignKeys
func (tl TypeLoader) LoadTableForeignKeys(args *ArgType, tableMap map[string]*Type, typeTpl *Type, fkMap map[string]*ForeignKey) error { var err error // load foreign keys foreignKeyList, err := tl.ForeignKeyList(args.DB, args.Schema, typeTpl.Table.TableName) if err != nil { return err } // loop over foreign keys for table for _, fk := range foreignKeyList { var refTpl *Type var col, refCol *Field colLoop: // find column for _, f := range typeTpl.Fields { if f.Col.ColumnName == fk.ColumnName { col = f break colLoop } } refTplLoop: // find ref table for _, t := range tableMap { if t.Table.TableName == fk.RefTableName { refTpl = t break refTplLoop } } refColLoop: // find ref column for _, f := range refTpl.Fields { if f.Col.ColumnName == fk.RefColumnName { refCol = f break refColLoop } } // no ref col, but have ref tpl, so use primary key if refTpl != nil && refCol == nil { refCol = refTpl.PrimaryKey } // check everything was found if col == nil || refTpl == nil || refCol == nil { return errors.New("could not find col, refTpl, or refCol") } // foreign key name if fk.ForeignKeyName == "" { fk.ForeignKeyName = typeTpl.Table.TableName + "_" + col.Col.ColumnName + "_fkey" } // create foreign key template fkMap[fk.ForeignKeyName] = &ForeignKey{ Schema: args.Schema, Type: typeTpl, Field: col, RefType: refTpl, RefField: refCol, ForeignKey: fk, } } return nil }
go
func (tl TypeLoader) LoadTableForeignKeys(args *ArgType, tableMap map[string]*Type, typeTpl *Type, fkMap map[string]*ForeignKey) error { var err error // load foreign keys foreignKeyList, err := tl.ForeignKeyList(args.DB, args.Schema, typeTpl.Table.TableName) if err != nil { return err } // loop over foreign keys for table for _, fk := range foreignKeyList { var refTpl *Type var col, refCol *Field colLoop: // find column for _, f := range typeTpl.Fields { if f.Col.ColumnName == fk.ColumnName { col = f break colLoop } } refTplLoop: // find ref table for _, t := range tableMap { if t.Table.TableName == fk.RefTableName { refTpl = t break refTplLoop } } refColLoop: // find ref column for _, f := range refTpl.Fields { if f.Col.ColumnName == fk.RefColumnName { refCol = f break refColLoop } } // no ref col, but have ref tpl, so use primary key if refTpl != nil && refCol == nil { refCol = refTpl.PrimaryKey } // check everything was found if col == nil || refTpl == nil || refCol == nil { return errors.New("could not find col, refTpl, or refCol") } // foreign key name if fk.ForeignKeyName == "" { fk.ForeignKeyName = typeTpl.Table.TableName + "_" + col.Col.ColumnName + "_fkey" } // create foreign key template fkMap[fk.ForeignKeyName] = &ForeignKey{ Schema: args.Schema, Type: typeTpl, Field: col, RefType: refTpl, RefField: refCol, ForeignKey: fk, } } return nil }
[ "func", "(", "tl", "TypeLoader", ")", "LoadTableForeignKeys", "(", "args", "*", "ArgType", ",", "tableMap", "map", "[", "string", "]", "*", "Type", ",", "typeTpl", "*", "Type", ",", "fkMap", "map", "[", "string", "]", "*", "ForeignKey", ")", "error", "{", "var", "err", "error", "\n\n", "// load foreign keys", "foreignKeyList", ",", "err", ":=", "tl", ".", "ForeignKeyList", "(", "args", ".", "DB", ",", "args", ".", "Schema", ",", "typeTpl", ".", "Table", ".", "TableName", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// loop over foreign keys for table", "for", "_", ",", "fk", ":=", "range", "foreignKeyList", "{", "var", "refTpl", "*", "Type", "\n", "var", "col", ",", "refCol", "*", "Field", "\n\n", "colLoop", ":", "// find column", "for", "_", ",", "f", ":=", "range", "typeTpl", ".", "Fields", "{", "if", "f", ".", "Col", ".", "ColumnName", "==", "fk", ".", "ColumnName", "{", "col", "=", "f", "\n", "break", "colLoop", "\n", "}", "\n", "}", "\n\n", "refTplLoop", ":", "// find ref table", "for", "_", ",", "t", ":=", "range", "tableMap", "{", "if", "t", ".", "Table", ".", "TableName", "==", "fk", ".", "RefTableName", "{", "refTpl", "=", "t", "\n", "break", "refTplLoop", "\n", "}", "\n", "}", "\n\n", "refColLoop", ":", "// find ref column", "for", "_", ",", "f", ":=", "range", "refTpl", ".", "Fields", "{", "if", "f", ".", "Col", ".", "ColumnName", "==", "fk", ".", "RefColumnName", "{", "refCol", "=", "f", "\n", "break", "refColLoop", "\n", "}", "\n", "}", "\n\n", "// no ref col, but have ref tpl, so use primary key", "if", "refTpl", "!=", "nil", "&&", "refCol", "==", "nil", "{", "refCol", "=", "refTpl", ".", "PrimaryKey", "\n", "}", "\n\n", "// check everything was found", "if", "col", "==", "nil", "||", "refTpl", "==", "nil", "||", "refCol", "==", "nil", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// foreign key name", "if", "fk", ".", "ForeignKeyName", "==", "\"", "\"", "{", "fk", ".", "ForeignKeyName", "=", "typeTpl", ".", "Table", ".", "TableName", "+", "\"", "\"", "+", "col", ".", "Col", ".", "ColumnName", "+", "\"", "\"", "\n", "}", "\n\n", "// create foreign key template", "fkMap", "[", "fk", ".", "ForeignKeyName", "]", "=", "&", "ForeignKey", "{", "Schema", ":", "args", ".", "Schema", ",", "Type", ":", "typeTpl", ",", "Field", ":", "col", ",", "RefType", ":", "refTpl", ",", "RefField", ":", "refCol", ",", "ForeignKey", ":", "fk", ",", "}", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// LoadTableForeignKeys loads schema foreign key definitions per table.
[ "LoadTableForeignKeys", "loads", "schema", "foreign", "key", "definitions", "per", "table", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/internal/loader.go#L582-L650
train
xo/xo
internal/loader.go
LoadIndexes
func (tl TypeLoader) LoadIndexes(args *ArgType, tableMap map[string]*Type) (map[string]*Index, error) { var err error ixMap := map[string]*Index{} for _, t := range tableMap { // load table indexes err = tl.LoadTableIndexes(args, t, ixMap) if err != nil { return nil, err } } // generate templates for _, ix := range ixMap { err = args.ExecuteTemplate(IndexTemplate, ix.Type.Name, ix.Index.IndexName, ix) if err != nil { return nil, err } } return ixMap, nil }
go
func (tl TypeLoader) LoadIndexes(args *ArgType, tableMap map[string]*Type) (map[string]*Index, error) { var err error ixMap := map[string]*Index{} for _, t := range tableMap { // load table indexes err = tl.LoadTableIndexes(args, t, ixMap) if err != nil { return nil, err } } // generate templates for _, ix := range ixMap { err = args.ExecuteTemplate(IndexTemplate, ix.Type.Name, ix.Index.IndexName, ix) if err != nil { return nil, err } } return ixMap, nil }
[ "func", "(", "tl", "TypeLoader", ")", "LoadIndexes", "(", "args", "*", "ArgType", ",", "tableMap", "map", "[", "string", "]", "*", "Type", ")", "(", "map", "[", "string", "]", "*", "Index", ",", "error", ")", "{", "var", "err", "error", "\n\n", "ixMap", ":=", "map", "[", "string", "]", "*", "Index", "{", "}", "\n", "for", "_", ",", "t", ":=", "range", "tableMap", "{", "// load table indexes", "err", "=", "tl", ".", "LoadTableIndexes", "(", "args", ",", "t", ",", "ixMap", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "}", "\n\n", "// generate templates", "for", "_", ",", "ix", ":=", "range", "ixMap", "{", "err", "=", "args", ".", "ExecuteTemplate", "(", "IndexTemplate", ",", "ix", ".", "Type", ".", "Name", ",", "ix", ".", "Index", ".", "IndexName", ",", "ix", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "}", "\n\n", "return", "ixMap", ",", "nil", "\n", "}" ]
// LoadIndexes loads schema index definitions.
[ "LoadIndexes", "loads", "schema", "index", "definitions", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/internal/loader.go#L653-L674
train
xo/xo
internal/loader.go
LoadTableIndexes
func (tl TypeLoader) LoadTableIndexes(args *ArgType, typeTpl *Type, ixMap map[string]*Index) error { var err error var priIxLoaded bool // load indexes indexList, err := tl.IndexList(args.DB, args.Schema, typeTpl.Table.TableName) if err != nil { return err } // process indexes for _, ix := range indexList { // save whether or not the primary key index was processed priIxLoaded = priIxLoaded || ix.IsPrimary || (ix.Origin == "pk") // create index template ixTpl := &Index{ Schema: args.Schema, Type: typeTpl, Fields: []*Field{}, Index: ix, } // load index columns err = tl.LoadIndexColumns(args, ixTpl) if err != nil { return err } // build func name args.BuildIndexFuncName(ixTpl) ixMap[typeTpl.Table.TableName+"_"+ix.IndexName] = ixTpl } // search for primary key if it was skipped being set in the type pk := typeTpl.PrimaryKey if pk == nil { for _, f := range typeTpl.Fields { if f.Col.IsPrimaryKey { pk = f break } } } // if no primary key index loaded, but a primary key column was defined in // the type, then create the definition here. this is needed for sqlite, as // sqlite doesn't define primary keys in its index list if args.LoaderType != "ora" && !priIxLoaded && pk != nil { ixName := typeTpl.Table.TableName + "_" + pk.Col.ColumnName + "_pkey" ixMap[ixName] = &Index{ FuncName: typeTpl.Name + "By" + pk.Name, Schema: args.Schema, Type: typeTpl, Fields: []*Field{pk}, Index: &models.Index{ IndexName: ixName, IsUnique: true, IsPrimary: true, }, } } return nil }
go
func (tl TypeLoader) LoadTableIndexes(args *ArgType, typeTpl *Type, ixMap map[string]*Index) error { var err error var priIxLoaded bool // load indexes indexList, err := tl.IndexList(args.DB, args.Schema, typeTpl.Table.TableName) if err != nil { return err } // process indexes for _, ix := range indexList { // save whether or not the primary key index was processed priIxLoaded = priIxLoaded || ix.IsPrimary || (ix.Origin == "pk") // create index template ixTpl := &Index{ Schema: args.Schema, Type: typeTpl, Fields: []*Field{}, Index: ix, } // load index columns err = tl.LoadIndexColumns(args, ixTpl) if err != nil { return err } // build func name args.BuildIndexFuncName(ixTpl) ixMap[typeTpl.Table.TableName+"_"+ix.IndexName] = ixTpl } // search for primary key if it was skipped being set in the type pk := typeTpl.PrimaryKey if pk == nil { for _, f := range typeTpl.Fields { if f.Col.IsPrimaryKey { pk = f break } } } // if no primary key index loaded, but a primary key column was defined in // the type, then create the definition here. this is needed for sqlite, as // sqlite doesn't define primary keys in its index list if args.LoaderType != "ora" && !priIxLoaded && pk != nil { ixName := typeTpl.Table.TableName + "_" + pk.Col.ColumnName + "_pkey" ixMap[ixName] = &Index{ FuncName: typeTpl.Name + "By" + pk.Name, Schema: args.Schema, Type: typeTpl, Fields: []*Field{pk}, Index: &models.Index{ IndexName: ixName, IsUnique: true, IsPrimary: true, }, } } return nil }
[ "func", "(", "tl", "TypeLoader", ")", "LoadTableIndexes", "(", "args", "*", "ArgType", ",", "typeTpl", "*", "Type", ",", "ixMap", "map", "[", "string", "]", "*", "Index", ")", "error", "{", "var", "err", "error", "\n", "var", "priIxLoaded", "bool", "\n\n", "// load indexes", "indexList", ",", "err", ":=", "tl", ".", "IndexList", "(", "args", ".", "DB", ",", "args", ".", "Schema", ",", "typeTpl", ".", "Table", ".", "TableName", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// process indexes", "for", "_", ",", "ix", ":=", "range", "indexList", "{", "// save whether or not the primary key index was processed", "priIxLoaded", "=", "priIxLoaded", "||", "ix", ".", "IsPrimary", "||", "(", "ix", ".", "Origin", "==", "\"", "\"", ")", "\n\n", "// create index template", "ixTpl", ":=", "&", "Index", "{", "Schema", ":", "args", ".", "Schema", ",", "Type", ":", "typeTpl", ",", "Fields", ":", "[", "]", "*", "Field", "{", "}", ",", "Index", ":", "ix", ",", "}", "\n\n", "// load index columns", "err", "=", "tl", ".", "LoadIndexColumns", "(", "args", ",", "ixTpl", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// build func name", "args", ".", "BuildIndexFuncName", "(", "ixTpl", ")", "\n\n", "ixMap", "[", "typeTpl", ".", "Table", ".", "TableName", "+", "\"", "\"", "+", "ix", ".", "IndexName", "]", "=", "ixTpl", "\n", "}", "\n\n", "// search for primary key if it was skipped being set in the type", "pk", ":=", "typeTpl", ".", "PrimaryKey", "\n", "if", "pk", "==", "nil", "{", "for", "_", ",", "f", ":=", "range", "typeTpl", ".", "Fields", "{", "if", "f", ".", "Col", ".", "IsPrimaryKey", "{", "pk", "=", "f", "\n", "break", "\n", "}", "\n", "}", "\n", "}", "\n\n", "// if no primary key index loaded, but a primary key column was defined in", "// the type, then create the definition here. this is needed for sqlite, as", "// sqlite doesn't define primary keys in its index list", "if", "args", ".", "LoaderType", "!=", "\"", "\"", "&&", "!", "priIxLoaded", "&&", "pk", "!=", "nil", "{", "ixName", ":=", "typeTpl", ".", "Table", ".", "TableName", "+", "\"", "\"", "+", "pk", ".", "Col", ".", "ColumnName", "+", "\"", "\"", "\n", "ixMap", "[", "ixName", "]", "=", "&", "Index", "{", "FuncName", ":", "typeTpl", ".", "Name", "+", "\"", "\"", "+", "pk", ".", "Name", ",", "Schema", ":", "args", ".", "Schema", ",", "Type", ":", "typeTpl", ",", "Fields", ":", "[", "]", "*", "Field", "{", "pk", "}", ",", "Index", ":", "&", "models", ".", "Index", "{", "IndexName", ":", "ixName", ",", "IsUnique", ":", "true", ",", "IsPrimary", ":", "true", ",", "}", ",", "}", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// LoadTableIndexes loads schema index definitions per table.
[ "LoadTableIndexes", "loads", "schema", "index", "definitions", "per", "table", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/internal/loader.go#L677-L742
train
xo/xo
internal/loader.go
LoadIndexColumns
func (tl TypeLoader) LoadIndexColumns(args *ArgType, ixTpl *Index) error { var err error // load index columns indexCols, err := tl.IndexColumnList(args.DB, args.Schema, ixTpl.Type.Table.TableName, ixTpl.Index.IndexName) if err != nil { return err } // process index columns for _, ic := range indexCols { var field *Field fieldLoop: // find field for _, f := range ixTpl.Type.Fields { if f.Col.ColumnName == ic.ColumnName { field = f break fieldLoop } } if field == nil { continue } ixTpl.Fields = append(ixTpl.Fields, field) } return nil }
go
func (tl TypeLoader) LoadIndexColumns(args *ArgType, ixTpl *Index) error { var err error // load index columns indexCols, err := tl.IndexColumnList(args.DB, args.Schema, ixTpl.Type.Table.TableName, ixTpl.Index.IndexName) if err != nil { return err } // process index columns for _, ic := range indexCols { var field *Field fieldLoop: // find field for _, f := range ixTpl.Type.Fields { if f.Col.ColumnName == ic.ColumnName { field = f break fieldLoop } } if field == nil { continue } ixTpl.Fields = append(ixTpl.Fields, field) } return nil }
[ "func", "(", "tl", "TypeLoader", ")", "LoadIndexColumns", "(", "args", "*", "ArgType", ",", "ixTpl", "*", "Index", ")", "error", "{", "var", "err", "error", "\n\n", "// load index columns", "indexCols", ",", "err", ":=", "tl", ".", "IndexColumnList", "(", "args", ".", "DB", ",", "args", ".", "Schema", ",", "ixTpl", ".", "Type", ".", "Table", ".", "TableName", ",", "ixTpl", ".", "Index", ".", "IndexName", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// process index columns", "for", "_", ",", "ic", ":=", "range", "indexCols", "{", "var", "field", "*", "Field", "\n\n", "fieldLoop", ":", "// find field", "for", "_", ",", "f", ":=", "range", "ixTpl", ".", "Type", ".", "Fields", "{", "if", "f", ".", "Col", ".", "ColumnName", "==", "ic", ".", "ColumnName", "{", "field", "=", "f", "\n", "break", "fieldLoop", "\n", "}", "\n", "}", "\n\n", "if", "field", "==", "nil", "{", "continue", "\n", "}", "\n\n", "ixTpl", ".", "Fields", "=", "append", "(", "ixTpl", ".", "Fields", ",", "field", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// LoadIndexColumns loads the index column information.
[ "LoadIndexColumns", "loads", "the", "index", "column", "information", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/internal/loader.go#L745-L775
train
xo/xo
examples/django/postgres/authpermission.xo.go
AuthPermissionByContentTypeIDCodename
func AuthPermissionByContentTypeIDCodename(db XODB, contentTypeID int, codename string) (*AuthPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, name, content_type_id, codename ` + `FROM public.auth_permission ` + `WHERE content_type_id = $1 AND codename = $2` // run query XOLog(sqlstr, contentTypeID, codename) ap := AuthPermission{ _exists: true, } err = db.QueryRow(sqlstr, contentTypeID, codename).Scan(&ap.ID, &ap.Name, &ap.ContentTypeID, &ap.Codename) if err != nil { return nil, err } return &ap, nil }
go
func AuthPermissionByContentTypeIDCodename(db XODB, contentTypeID int, codename string) (*AuthPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, name, content_type_id, codename ` + `FROM public.auth_permission ` + `WHERE content_type_id = $1 AND codename = $2` // run query XOLog(sqlstr, contentTypeID, codename) ap := AuthPermission{ _exists: true, } err = db.QueryRow(sqlstr, contentTypeID, codename).Scan(&ap.ID, &ap.Name, &ap.ContentTypeID, &ap.Codename) if err != nil { return nil, err } return &ap, nil }
[ "func", "AuthPermissionByContentTypeIDCodename", "(", "db", "XODB", ",", "contentTypeID", "int", ",", "codename", "string", ")", "(", "*", "AuthPermission", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, name, content_type_id, codename `", "+", "`FROM public.auth_permission `", "+", "`WHERE content_type_id = $1 AND codename = $2`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "contentTypeID", ",", "codename", ")", "\n", "ap", ":=", "AuthPermission", "{", "_exists", ":", "true", ",", "}", "\n\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "contentTypeID", ",", "codename", ")", ".", "Scan", "(", "&", "ap", ".", "ID", ",", "&", "ap", ".", "Name", ",", "&", "ap", ".", "ContentTypeID", ",", "&", "ap", ".", "Codename", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "ap", ",", "nil", "\n", "}" ]
// AuthPermissionByContentTypeIDCodename retrieves a row from 'public.auth_permission' as a AuthPermission. // // Generated from index 'auth_permission_content_type_id_01ab375a_uniq'.
[ "AuthPermissionByContentTypeIDCodename", "retrieves", "a", "row", "from", "public", ".", "auth_permission", "as", "a", "AuthPermission", ".", "Generated", "from", "index", "auth_permission_content_type_id_01ab375a_uniq", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/authpermission.xo.go#L210-L231
train
xo/xo
examples/django/postgres/authpermission.xo.go
AuthPermissionByID
func AuthPermissionByID(db XODB, id int) (*AuthPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, name, content_type_id, codename ` + `FROM public.auth_permission ` + `WHERE id = $1` // run query XOLog(sqlstr, id) ap := AuthPermission{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&ap.ID, &ap.Name, &ap.ContentTypeID, &ap.Codename) if err != nil { return nil, err } return &ap, nil }
go
func AuthPermissionByID(db XODB, id int) (*AuthPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, name, content_type_id, codename ` + `FROM public.auth_permission ` + `WHERE id = $1` // run query XOLog(sqlstr, id) ap := AuthPermission{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&ap.ID, &ap.Name, &ap.ContentTypeID, &ap.Codename) if err != nil { return nil, err } return &ap, nil }
[ "func", "AuthPermissionByID", "(", "db", "XODB", ",", "id", "int", ")", "(", "*", "AuthPermission", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, name, content_type_id, codename `", "+", "`FROM public.auth_permission `", "+", "`WHERE id = $1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "id", ")", "\n", "ap", ":=", "AuthPermission", "{", "_exists", ":", "true", ",", "}", "\n\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "id", ")", ".", "Scan", "(", "&", "ap", ".", "ID", ",", "&", "ap", ".", "Name", ",", "&", "ap", ".", "ContentTypeID", ",", "&", "ap", ".", "Codename", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "ap", ",", "nil", "\n", "}" ]
// AuthPermissionByID retrieves a row from 'public.auth_permission' as a AuthPermission. // // Generated from index 'auth_permission_pkey'.
[ "AuthPermissionByID", "retrieves", "a", "row", "from", "public", ".", "auth_permission", "as", "a", "AuthPermission", ".", "Generated", "from", "index", "auth_permission_pkey", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/authpermission.xo.go#L236-L257
train
xo/xo
models/sequence.xo.go
PgSequences
func PgSequences(db XODB, schema string) ([]*Sequence, error) { var err error // sql query const sqlstr = `SELECT ` + `t.relname ` + // ::varchar AS table_name `FROM pg_class s ` + `JOIN pg_depend d ON d.objid = s.oid ` + `JOIN pg_class t ON d.objid = s.oid AND d.refobjid = t.oid ` + `JOIN pg_namespace n ON n.oid = s.relnamespace ` + `WHERE n.nspname = $1 AND s.relkind = 'S'` // run query XOLog(sqlstr, schema) q, err := db.Query(sqlstr, schema) if err != nil { return nil, err } defer q.Close() // load results res := []*Sequence{} for q.Next() { s := Sequence{} // scan err = q.Scan(&s.TableName) if err != nil { return nil, err } res = append(res, &s) } return res, nil }
go
func PgSequences(db XODB, schema string) ([]*Sequence, error) { var err error // sql query const sqlstr = `SELECT ` + `t.relname ` + // ::varchar AS table_name `FROM pg_class s ` + `JOIN pg_depend d ON d.objid = s.oid ` + `JOIN pg_class t ON d.objid = s.oid AND d.refobjid = t.oid ` + `JOIN pg_namespace n ON n.oid = s.relnamespace ` + `WHERE n.nspname = $1 AND s.relkind = 'S'` // run query XOLog(sqlstr, schema) q, err := db.Query(sqlstr, schema) if err != nil { return nil, err } defer q.Close() // load results res := []*Sequence{} for q.Next() { s := Sequence{} // scan err = q.Scan(&s.TableName) if err != nil { return nil, err } res = append(res, &s) } return res, nil }
[ "func", "PgSequences", "(", "db", "XODB", ",", "schema", "string", ")", "(", "[", "]", "*", "Sequence", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`t.relname `", "+", "// ::varchar AS table_name", "`FROM pg_class s `", "+", "`JOIN pg_depend d ON d.objid = s.oid `", "+", "`JOIN pg_class t ON d.objid = s.oid AND d.refobjid = t.oid `", "+", "`JOIN pg_namespace n ON n.oid = s.relnamespace `", "+", "`WHERE n.nspname = $1 AND s.relkind = 'S'`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "schema", ")", "\n", "q", ",", "err", ":=", "db", ".", "Query", "(", "sqlstr", ",", "schema", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "q", ".", "Close", "(", ")", "\n\n", "// load results", "res", ":=", "[", "]", "*", "Sequence", "{", "}", "\n", "for", "q", ".", "Next", "(", ")", "{", "s", ":=", "Sequence", "{", "}", "\n\n", "// scan", "err", "=", "q", ".", "Scan", "(", "&", "s", ".", "TableName", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "res", "=", "append", "(", "res", ",", "&", "s", ")", "\n", "}", "\n\n", "return", "res", ",", "nil", "\n", "}" ]
// PgSequences runs a custom query, returning results as Sequence.
[ "PgSequences", "runs", "a", "custom", "query", "returning", "results", "as", "Sequence", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/models/sequence.xo.go#L12-L47
train
xo/xo
models/sqcolumn.xo.go
SqTableColumns
func SqTableColumns(db XODB, table string) ([]*SqColumn, error) { var err error // sql query var sqlstr = `PRAGMA table_info(` + table + `)` // run query XOLog(sqlstr) q, err := db.Query(sqlstr, table) if err != nil { return nil, err } defer q.Close() // load results res := []*SqColumn{} for q.Next() { sc := SqColumn{} // scan err = q.Scan(&sc.FieldOrdinal, &sc.ColumnName, &sc.DataType, &sc.NotNull, &sc.DefaultValue, &sc.PkColIndex) if err != nil { return nil, err } res = append(res, &sc) } return res, nil }
go
func SqTableColumns(db XODB, table string) ([]*SqColumn, error) { var err error // sql query var sqlstr = `PRAGMA table_info(` + table + `)` // run query XOLog(sqlstr) q, err := db.Query(sqlstr, table) if err != nil { return nil, err } defer q.Close() // load results res := []*SqColumn{} for q.Next() { sc := SqColumn{} // scan err = q.Scan(&sc.FieldOrdinal, &sc.ColumnName, &sc.DataType, &sc.NotNull, &sc.DefaultValue, &sc.PkColIndex) if err != nil { return nil, err } res = append(res, &sc) } return res, nil }
[ "func", "SqTableColumns", "(", "db", "XODB", ",", "table", "string", ")", "(", "[", "]", "*", "SqColumn", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "var", "sqlstr", "=", "`PRAGMA table_info(`", "+", "table", "+", "`)`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ")", "\n", "q", ",", "err", ":=", "db", ".", "Query", "(", "sqlstr", ",", "table", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "q", ".", "Close", "(", ")", "\n\n", "// load results", "res", ":=", "[", "]", "*", "SqColumn", "{", "}", "\n", "for", "q", ".", "Next", "(", ")", "{", "sc", ":=", "SqColumn", "{", "}", "\n\n", "// scan", "err", "=", "q", ".", "Scan", "(", "&", "sc", ".", "FieldOrdinal", ",", "&", "sc", ".", "ColumnName", ",", "&", "sc", ".", "DataType", ",", "&", "sc", ".", "NotNull", ",", "&", "sc", ".", "DefaultValue", ",", "&", "sc", ".", "PkColIndex", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "res", "=", "append", "(", "res", ",", "&", "sc", ")", "\n", "}", "\n\n", "return", "res", ",", "nil", "\n", "}" ]
// SqTableColumns runs a custom query, returning results as SqColumn.
[ "SqTableColumns", "runs", "a", "custom", "query", "returning", "results", "as", "SqColumn", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/models/sqcolumn.xo.go#L21-L50
train
xo/xo
examples/django/oracle/authuseruserpermission.xo.go
Save
func (auup *AuthUserUserPermission) Save(db XODB) error { if auup.Exists() { return auup.Update(db) } return auup.Insert(db) }
go
func (auup *AuthUserUserPermission) Save(db XODB) error { if auup.Exists() { return auup.Update(db) } return auup.Insert(db) }
[ "func", "(", "auup", "*", "AuthUserUserPermission", ")", "Save", "(", "db", "XODB", ")", "error", "{", "if", "auup", ".", "Exists", "(", ")", "{", "return", "auup", ".", "Update", "(", "db", ")", "\n", "}", "\n\n", "return", "auup", ".", "Insert", "(", "db", ")", "\n", "}" ]
// Save saves the AuthUserUserPermission to the database.
[ "Save", "saves", "the", "AuthUserUserPermission", "to", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/authuseruserpermission.xo.go#L90-L96
train
xo/xo
examples/django/oracle/authuseruserpermission.xo.go
AuthUserUserPermissionByUserIDPermissionID
func AuthUserUserPermissionByUserIDPermissionID(db XODB, userID float64, permissionID float64) (*AuthUserUserPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, user_id, permission_id ` + `FROM django.auth_user_user_permissions ` + `WHERE user_id = :1 AND permission_id = :2` // run query XOLog(sqlstr, userID, permissionID) auup := AuthUserUserPermission{ _exists: true, } err = db.QueryRow(sqlstr, userID, permissionID).Scan(&auup.ID, &auup.UserID, &auup.PermissionID) if err != nil { return nil, err } return &auup, nil }
go
func AuthUserUserPermissionByUserIDPermissionID(db XODB, userID float64, permissionID float64) (*AuthUserUserPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, user_id, permission_id ` + `FROM django.auth_user_user_permissions ` + `WHERE user_id = :1 AND permission_id = :2` // run query XOLog(sqlstr, userID, permissionID) auup := AuthUserUserPermission{ _exists: true, } err = db.QueryRow(sqlstr, userID, permissionID).Scan(&auup.ID, &auup.UserID, &auup.PermissionID) if err != nil { return nil, err } return &auup, nil }
[ "func", "AuthUserUserPermissionByUserIDPermissionID", "(", "db", "XODB", ",", "userID", "float64", ",", "permissionID", "float64", ")", "(", "*", "AuthUserUserPermission", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, user_id, permission_id `", "+", "`FROM django.auth_user_user_permissions `", "+", "`WHERE user_id = :1 AND permission_id = :2`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "userID", ",", "permissionID", ")", "\n", "auup", ":=", "AuthUserUserPermission", "{", "_exists", ":", "true", ",", "}", "\n\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "userID", ",", "permissionID", ")", ".", "Scan", "(", "&", "auup", ".", "ID", ",", "&", "auup", ".", "UserID", ",", "&", "auup", ".", "PermissionID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "auup", ",", "nil", "\n", "}" ]
// AuthUserUserPermissionByUserIDPermissionID retrieves a row from 'django.auth_user_user_permissions' as a AuthUserUserPermission. // // Generated from index 'auth_use_user_id_14a6b632_uniq'.
[ "AuthUserUserPermissionByUserIDPermissionID", "retrieves", "a", "row", "from", "django", ".", "auth_user_user_permissions", "as", "a", "AuthUserUserPermission", ".", "Generated", "from", "index", "auth_use_user_id_14a6b632_uniq", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/authuseruserpermission.xo.go#L145-L166
train
xo/xo
examples/django/oracle/authuseruserpermission.xo.go
AuthUserUserPermissionsByUserID
func AuthUserUserPermissionsByUserID(db XODB, userID float64) ([]*AuthUserUserPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, user_id, permission_id ` + `FROM django.auth_user_user_permissions ` + `WHERE user_id = :1` // run query XOLog(sqlstr, userID) q, err := db.Query(sqlstr, userID) if err != nil { return nil, err } defer q.Close() // load results res := []*AuthUserUserPermission{} for q.Next() { auup := AuthUserUserPermission{ _exists: true, } // scan err = q.Scan(&auup.ID, &auup.UserID, &auup.PermissionID) if err != nil { return nil, err } res = append(res, &auup) } return res, nil }
go
func AuthUserUserPermissionsByUserID(db XODB, userID float64) ([]*AuthUserUserPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, user_id, permission_id ` + `FROM django.auth_user_user_permissions ` + `WHERE user_id = :1` // run query XOLog(sqlstr, userID) q, err := db.Query(sqlstr, userID) if err != nil { return nil, err } defer q.Close() // load results res := []*AuthUserUserPermission{} for q.Next() { auup := AuthUserUserPermission{ _exists: true, } // scan err = q.Scan(&auup.ID, &auup.UserID, &auup.PermissionID) if err != nil { return nil, err } res = append(res, &auup) } return res, nil }
[ "func", "AuthUserUserPermissionsByUserID", "(", "db", "XODB", ",", "userID", "float64", ")", "(", "[", "]", "*", "AuthUserUserPermission", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, user_id, permission_id `", "+", "`FROM django.auth_user_user_permissions `", "+", "`WHERE user_id = :1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "userID", ")", "\n", "q", ",", "err", ":=", "db", ".", "Query", "(", "sqlstr", ",", "userID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "q", ".", "Close", "(", ")", "\n\n", "// load results", "res", ":=", "[", "]", "*", "AuthUserUserPermission", "{", "}", "\n", "for", "q", ".", "Next", "(", ")", "{", "auup", ":=", "AuthUserUserPermission", "{", "_exists", ":", "true", ",", "}", "\n\n", "// scan", "err", "=", "q", ".", "Scan", "(", "&", "auup", ".", "ID", ",", "&", "auup", ".", "UserID", ",", "&", "auup", ".", "PermissionID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "res", "=", "append", "(", "res", ",", "&", "auup", ")", "\n", "}", "\n\n", "return", "res", ",", "nil", "\n", "}" ]
// AuthUserUserPermissionsByUserID retrieves a row from 'django.auth_user_user_permissions' as a AuthUserUserPermission. // // Generated from index 'auth_user_user_permissions1cca'.
[ "AuthUserUserPermissionsByUserID", "retrieves", "a", "row", "from", "django", ".", "auth_user_user_permissions", "as", "a", "AuthUserUserPermission", ".", "Generated", "from", "index", "auth_user_user_permissions1cca", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/authuseruserpermission.xo.go#L171-L205
train
xo/xo
examples/django/sqlite3/djangomigration.xo.go
Save
func (dm *DjangoMigration) Save(db XODB) error { if dm.Exists() { return dm.Update(db) } return dm.Insert(db) }
go
func (dm *DjangoMigration) Save(db XODB) error { if dm.Exists() { return dm.Update(db) } return dm.Insert(db) }
[ "func", "(", "dm", "*", "DjangoMigration", ")", "Save", "(", "db", "XODB", ")", "error", "{", "if", "dm", ".", "Exists", "(", ")", "{", "return", "dm", ".", "Update", "(", "db", ")", "\n", "}", "\n\n", "return", "dm", ".", "Insert", "(", "db", ")", "\n", "}" ]
// Save saves the DjangoMigration to the database.
[ "Save", "saves", "the", "DjangoMigration", "to", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/sqlite3/djangomigration.xo.go#L94-L100
train
xo/xo
loaders/mysql.go
MySchema
func MySchema(args *internal.ArgType) (string, error) { var err error // sql query const sqlstr = `SELECT SCHEMA()` var schema string // run query models.XOLog(sqlstr) err = args.DB.QueryRow(sqlstr).Scan(&schema) if err != nil { return "", err } return schema, nil }
go
func MySchema(args *internal.ArgType) (string, error) { var err error // sql query const sqlstr = `SELECT SCHEMA()` var schema string // run query models.XOLog(sqlstr) err = args.DB.QueryRow(sqlstr).Scan(&schema) if err != nil { return "", err } return schema, nil }
[ "func", "MySchema", "(", "args", "*", "internal", ".", "ArgType", ")", "(", "string", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT SCHEMA()`", "\n\n", "var", "schema", "string", "\n\n", "// run query", "models", ".", "XOLog", "(", "sqlstr", ")", "\n", "err", "=", "args", ".", "DB", ".", "QueryRow", "(", "sqlstr", ")", ".", "Scan", "(", "&", "schema", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "err", "\n", "}", "\n\n", "return", "schema", ",", "nil", "\n", "}" ]
// MySchema retrieves the name of the current schema.
[ "MySchema", "retrieves", "the", "name", "of", "the", "current", "schema", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/loaders/mysql.go#L35-L51
train
xo/xo
loaders/mysql.go
MyEnumValues
func MyEnumValues(db models.XODB, schema string, enum string) ([]*models.EnumValue, error) { var err error // load enum vals res, err := models.MyEnumValues(db, schema, enum) if err != nil { return nil, err } // process enum vals enumVals := []*models.EnumValue{} for i, ev := range strings.Split(res.EnumValues[1:len(res.EnumValues)-1], "','") { enumVals = append(enumVals, &models.EnumValue{ EnumValue: ev, ConstValue: i + 1, }) } return enumVals, nil }
go
func MyEnumValues(db models.XODB, schema string, enum string) ([]*models.EnumValue, error) { var err error // load enum vals res, err := models.MyEnumValues(db, schema, enum) if err != nil { return nil, err } // process enum vals enumVals := []*models.EnumValue{} for i, ev := range strings.Split(res.EnumValues[1:len(res.EnumValues)-1], "','") { enumVals = append(enumVals, &models.EnumValue{ EnumValue: ev, ConstValue: i + 1, }) } return enumVals, nil }
[ "func", "MyEnumValues", "(", "db", "models", ".", "XODB", ",", "schema", "string", ",", "enum", "string", ")", "(", "[", "]", "*", "models", ".", "EnumValue", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// load enum vals", "res", ",", "err", ":=", "models", ".", "MyEnumValues", "(", "db", ",", "schema", ",", "enum", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// process enum vals", "enumVals", ":=", "[", "]", "*", "models", ".", "EnumValue", "{", "}", "\n", "for", "i", ",", "ev", ":=", "range", "strings", ".", "Split", "(", "res", ".", "EnumValues", "[", "1", ":", "len", "(", "res", ".", "EnumValues", ")", "-", "1", "]", ",", "\"", "\"", ")", "{", "enumVals", "=", "append", "(", "enumVals", ",", "&", "models", ".", "EnumValue", "{", "EnumValue", ":", "ev", ",", "ConstValue", ":", "i", "+", "1", ",", "}", ")", "\n", "}", "\n\n", "return", "enumVals", ",", "nil", "\n", "}" ]
// MyEnumValues loads the enum values.
[ "MyEnumValues", "loads", "the", "enum", "values", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/loaders/mysql.go#L221-L240
train
xo/xo
loaders/mysql.go
MyTables
func MyTables(db models.XODB, schema string, relkind string) ([]*models.Table, error) { var err error // get the tables rows, err := models.MyTables(db, schema, relkind) if err != nil { return nil, err } // get the tables that have Autoincrementing included autoIncrements, err := models.MyAutoIncrements(db, schema) if err != nil { // Set it to an empty set on error. autoIncrements = []*models.MyAutoIncrement{} } // Add information about manual FK. var tables []*models.Table for _, row := range rows { manualPk := true // Look for a match in the table name where it contains the autoincrement for _, autoInc := range autoIncrements { if autoInc.TableName == row.TableName { manualPk = false } } tables = append(tables, &models.Table{ TableName: row.TableName, Type: row.Type, ManualPk: manualPk, }) } return tables, nil }
go
func MyTables(db models.XODB, schema string, relkind string) ([]*models.Table, error) { var err error // get the tables rows, err := models.MyTables(db, schema, relkind) if err != nil { return nil, err } // get the tables that have Autoincrementing included autoIncrements, err := models.MyAutoIncrements(db, schema) if err != nil { // Set it to an empty set on error. autoIncrements = []*models.MyAutoIncrement{} } // Add information about manual FK. var tables []*models.Table for _, row := range rows { manualPk := true // Look for a match in the table name where it contains the autoincrement for _, autoInc := range autoIncrements { if autoInc.TableName == row.TableName { manualPk = false } } tables = append(tables, &models.Table{ TableName: row.TableName, Type: row.Type, ManualPk: manualPk, }) } return tables, nil }
[ "func", "MyTables", "(", "db", "models", ".", "XODB", ",", "schema", "string", ",", "relkind", "string", ")", "(", "[", "]", "*", "models", ".", "Table", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// get the tables", "rows", ",", "err", ":=", "models", ".", "MyTables", "(", "db", ",", "schema", ",", "relkind", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// get the tables that have Autoincrementing included", "autoIncrements", ",", "err", ":=", "models", ".", "MyAutoIncrements", "(", "db", ",", "schema", ")", "\n", "if", "err", "!=", "nil", "{", "// Set it to an empty set on error.", "autoIncrements", "=", "[", "]", "*", "models", ".", "MyAutoIncrement", "{", "}", "\n", "}", "\n\n", "// Add information about manual FK.", "var", "tables", "[", "]", "*", "models", ".", "Table", "\n", "for", "_", ",", "row", ":=", "range", "rows", "{", "manualPk", ":=", "true", "\n", "// Look for a match in the table name where it contains the autoincrement", "for", "_", ",", "autoInc", ":=", "range", "autoIncrements", "{", "if", "autoInc", ".", "TableName", "==", "row", ".", "TableName", "{", "manualPk", "=", "false", "\n", "}", "\n", "}", "\n", "tables", "=", "append", "(", "tables", ",", "&", "models", ".", "Table", "{", "TableName", ":", "row", ".", "TableName", ",", "Type", ":", "row", ".", "Type", ",", "ManualPk", ":", "manualPk", ",", "}", ")", "\n", "}", "\n\n", "return", "tables", ",", "nil", "\n", "}" ]
// MyTables returns the MySql tables with the manual PK information added. // ManualPk is true when the table's primary key is not autoincrement.
[ "MyTables", "returns", "the", "MySql", "tables", "with", "the", "manual", "PK", "information", "added", ".", "ManualPk", "is", "true", "when", "the", "table", "s", "primary", "key", "is", "not", "autoincrement", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/loaders/mysql.go#L244-L278
train
xo/xo
loaders/mysql.go
MyQueryColumns
func MyQueryColumns(args *internal.ArgType, inspect []string) ([]*models.Column, error) { var err error // create temporary view xoid xoid := "_xo_" + internal.GenRandomID() viewq := `CREATE VIEW ` + xoid + ` AS (` + strings.Join(inspect, "\n") + `)` models.XOLog(viewq) _, err = args.DB.Exec(viewq) if err != nil { return nil, err } // load columns cols, err := models.MyTableColumns(args.DB, args.Schema, xoid) // drop inspect view dropq := `DROP VIEW ` + xoid models.XOLog(dropq) _, _ = args.DB.Exec(dropq) // load column information return cols, err }
go
func MyQueryColumns(args *internal.ArgType, inspect []string) ([]*models.Column, error) { var err error // create temporary view xoid xoid := "_xo_" + internal.GenRandomID() viewq := `CREATE VIEW ` + xoid + ` AS (` + strings.Join(inspect, "\n") + `)` models.XOLog(viewq) _, err = args.DB.Exec(viewq) if err != nil { return nil, err } // load columns cols, err := models.MyTableColumns(args.DB, args.Schema, xoid) // drop inspect view dropq := `DROP VIEW ` + xoid models.XOLog(dropq) _, _ = args.DB.Exec(dropq) // load column information return cols, err }
[ "func", "MyQueryColumns", "(", "args", "*", "internal", ".", "ArgType", ",", "inspect", "[", "]", "string", ")", "(", "[", "]", "*", "models", ".", "Column", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// create temporary view xoid", "xoid", ":=", "\"", "\"", "+", "internal", ".", "GenRandomID", "(", ")", "\n", "viewq", ":=", "`CREATE VIEW `", "+", "xoid", "+", "` AS (`", "+", "strings", ".", "Join", "(", "inspect", ",", "\"", "\\n", "\"", ")", "+", "`)`", "\n", "models", ".", "XOLog", "(", "viewq", ")", "\n", "_", ",", "err", "=", "args", ".", "DB", ".", "Exec", "(", "viewq", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// load columns", "cols", ",", "err", ":=", "models", ".", "MyTableColumns", "(", "args", ".", "DB", ",", "args", ".", "Schema", ",", "xoid", ")", "\n\n", "// drop inspect view", "dropq", ":=", "`DROP VIEW `", "+", "xoid", "\n", "models", ".", "XOLog", "(", "dropq", ")", "\n", "_", ",", "_", "=", "args", ".", "DB", ".", "Exec", "(", "dropq", ")", "\n\n", "// load column information", "return", "cols", ",", "err", "\n", "}" ]
// MyQueryColumns parses the query and generates a type for it.
[ "MyQueryColumns", "parses", "the", "query", "and", "generates", "a", "type", "for", "it", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/loaders/mysql.go#L281-L303
train
xo/xo
internal/argtype.go
NewDefaultArgs
func NewDefaultArgs() *ArgType { fkMode := FkModeSmart return &ArgType{ Suffix: ".xo.go", Int32Type: "int", Uint32Type: "uint", ForeignKeyMode: &fkMode, QueryParamDelimiter: "%%", NameConflictSuffix: "Val", // KnownTypeMap is the collection of known Go types. KnownTypeMap: map[string]bool{ "bool": true, "string": true, "byte": true, "rune": true, "int": true, "int16": true, "int32": true, "int64": true, "uint": true, "uint8": true, "uint16": true, "uint32": true, "uint64": true, "float32": true, "float64": true, "Slice": true, "StringSlice": true, }, // ShortNameTypeMap is the collection of Go style short names for types, mainly // used for use with declaring a func receiver on a type. ShortNameTypeMap: map[string]string{ "bool": "b", "string": "s", "byte": "b", "rune": "r", "int": "i", "int16": "i", "int32": "i", "int64": "i", "uint": "u", "uint8": "u", "uint16": "u", "uint32": "u", "uint64": "u", "float32": "f", "float64": "f", "Slice": "s", "StringSlice": "ss", }, } }
go
func NewDefaultArgs() *ArgType { fkMode := FkModeSmart return &ArgType{ Suffix: ".xo.go", Int32Type: "int", Uint32Type: "uint", ForeignKeyMode: &fkMode, QueryParamDelimiter: "%%", NameConflictSuffix: "Val", // KnownTypeMap is the collection of known Go types. KnownTypeMap: map[string]bool{ "bool": true, "string": true, "byte": true, "rune": true, "int": true, "int16": true, "int32": true, "int64": true, "uint": true, "uint8": true, "uint16": true, "uint32": true, "uint64": true, "float32": true, "float64": true, "Slice": true, "StringSlice": true, }, // ShortNameTypeMap is the collection of Go style short names for types, mainly // used for use with declaring a func receiver on a type. ShortNameTypeMap: map[string]string{ "bool": "b", "string": "s", "byte": "b", "rune": "r", "int": "i", "int16": "i", "int32": "i", "int64": "i", "uint": "u", "uint8": "u", "uint16": "u", "uint32": "u", "uint64": "u", "float32": "f", "float64": "f", "Slice": "s", "StringSlice": "ss", }, } }
[ "func", "NewDefaultArgs", "(", ")", "*", "ArgType", "{", "fkMode", ":=", "FkModeSmart", "\n\n", "return", "&", "ArgType", "{", "Suffix", ":", "\"", "\"", ",", "Int32Type", ":", "\"", "\"", ",", "Uint32Type", ":", "\"", "\"", ",", "ForeignKeyMode", ":", "&", "fkMode", ",", "QueryParamDelimiter", ":", "\"", "\"", ",", "NameConflictSuffix", ":", "\"", "\"", ",", "// KnownTypeMap is the collection of known Go types.", "KnownTypeMap", ":", "map", "[", "string", "]", "bool", "{", "\"", "\"", ":", "true", ",", "\"", "\"", ":", "true", ",", "\"", "\"", ":", "true", ",", "\"", "\"", ":", "true", ",", "\"", "\"", ":", "true", ",", "\"", "\"", ":", "true", ",", "\"", "\"", ":", "true", ",", "\"", "\"", ":", "true", ",", "\"", "\"", ":", "true", ",", "\"", "\"", ":", "true", ",", "\"", "\"", ":", "true", ",", "\"", "\"", ":", "true", ",", "\"", "\"", ":", "true", ",", "\"", "\"", ":", "true", ",", "\"", "\"", ":", "true", ",", "\"", "\"", ":", "true", ",", "\"", "\"", ":", "true", ",", "}", ",", "// ShortNameTypeMap is the collection of Go style short names for types, mainly", "// used for use with declaring a func receiver on a type.", "ShortNameTypeMap", ":", "map", "[", "string", "]", "string", "{", "\"", "\"", ":", "\"", "\"", ",", "\"", "\"", ":", "\"", "\"", ",", "\"", "\"", ":", "\"", "\"", ",", "\"", "\"", ":", "\"", "\"", ",", "\"", "\"", ":", "\"", "\"", ",", "\"", "\"", ":", "\"", "\"", ",", "\"", "\"", ":", "\"", "\"", ",", "\"", "\"", ":", "\"", "\"", ",", "\"", "\"", ":", "\"", "\"", ",", "\"", "\"", ":", "\"", "\"", ",", "\"", "\"", ":", "\"", "\"", ",", "\"", "\"", ":", "\"", "\"", ",", "\"", "\"", ":", "\"", "\"", ",", "\"", "\"", ":", "\"", "\"", ",", "\"", "\"", ":", "\"", "\"", ",", "\"", "\"", ":", "\"", "\"", ",", "\"", "\"", ":", "\"", "\"", ",", "}", ",", "}", "\n", "}" ]
// NewDefaultArgs returns the default arguments.
[ "NewDefaultArgs", "returns", "the", "default", "arguments", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/internal/argtype.go#L156-L210
train
xo/xo
models/msidentity.xo.go
MsIdentities
func MsIdentities(db XODB, schema string) ([]*MsIdentity, error) { var err error // sql query const sqlstr = `SELECT o.name as table_name ` + `FROM sys.objects o inner join sys.columns c on o.object_id = c.object_id ` + `WHERE c.is_identity = 1 ` + `AND schema_name(o.schema_id) = $1 AND o.type = 'U'` // run query XOLog(sqlstr, schema) q, err := db.Query(sqlstr, schema) if err != nil { return nil, err } defer q.Close() // load results res := []*MsIdentity{} for q.Next() { mi := MsIdentity{} // scan err = q.Scan(&mi.TableName) if err != nil { return nil, err } res = append(res, &mi) } return res, nil }
go
func MsIdentities(db XODB, schema string) ([]*MsIdentity, error) { var err error // sql query const sqlstr = `SELECT o.name as table_name ` + `FROM sys.objects o inner join sys.columns c on o.object_id = c.object_id ` + `WHERE c.is_identity = 1 ` + `AND schema_name(o.schema_id) = $1 AND o.type = 'U'` // run query XOLog(sqlstr, schema) q, err := db.Query(sqlstr, schema) if err != nil { return nil, err } defer q.Close() // load results res := []*MsIdentity{} for q.Next() { mi := MsIdentity{} // scan err = q.Scan(&mi.TableName) if err != nil { return nil, err } res = append(res, &mi) } return res, nil }
[ "func", "MsIdentities", "(", "db", "XODB", ",", "schema", "string", ")", "(", "[", "]", "*", "MsIdentity", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT o.name as table_name `", "+", "`FROM sys.objects o inner join sys.columns c on o.object_id = c.object_id `", "+", "`WHERE c.is_identity = 1 `", "+", "`AND schema_name(o.schema_id) = $1 AND o.type = 'U'`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "schema", ")", "\n", "q", ",", "err", ":=", "db", ".", "Query", "(", "sqlstr", ",", "schema", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "q", ".", "Close", "(", ")", "\n\n", "// load results", "res", ":=", "[", "]", "*", "MsIdentity", "{", "}", "\n", "for", "q", ".", "Next", "(", ")", "{", "mi", ":=", "MsIdentity", "{", "}", "\n\n", "// scan", "err", "=", "q", ".", "Scan", "(", "&", "mi", ".", "TableName", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "res", "=", "append", "(", "res", ",", "&", "mi", ")", "\n", "}", "\n\n", "return", "res", ",", "nil", "\n", "}" ]
// MsIdentities runs a custom query, returning results as MsIdentity.
[ "MsIdentities", "runs", "a", "custom", "query", "returning", "results", "as", "MsIdentity", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/models/msidentity.xo.go#L12-L44
train
xo/xo
loaders/postgres.go
PgRelkind
func PgRelkind(relType internal.RelType) string { var s string switch relType { case internal.Table: s = "r" case internal.View: s = "v" default: panic("unsupported RelType") } return s }
go
func PgRelkind(relType internal.RelType) string { var s string switch relType { case internal.Table: s = "r" case internal.View: s = "v" default: panic("unsupported RelType") } return s }
[ "func", "PgRelkind", "(", "relType", "internal", ".", "RelType", ")", "string", "{", "var", "s", "string", "\n", "switch", "relType", "{", "case", "internal", ".", "Table", ":", "s", "=", "\"", "\"", "\n", "case", "internal", ".", "View", ":", "s", "=", "\"", "\"", "\n", "default", ":", "panic", "(", "\"", "\"", ")", "\n", "}", "\n", "return", "s", "\n", "}" ]
// PgRelkind returns the postgres string representation for RelType.
[ "PgRelkind", "returns", "the", "postgres", "string", "representation", "for", "RelType", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/loaders/postgres.go#L39-L50
train
xo/xo
loaders/postgres.go
PgQueryStrip
func PgQueryStrip(query []string, queryComments []string) { for i, l := range query { pos := pgQueryStripRE.FindStringIndex(l) if pos != nil { query[i] = l[:pos[0]] + l[pos[1]:] queryComments[i+1] = l[pos[0]:pos[1]] } else { queryComments[i+1] = "" } } }
go
func PgQueryStrip(query []string, queryComments []string) { for i, l := range query { pos := pgQueryStripRE.FindStringIndex(l) if pos != nil { query[i] = l[:pos[0]] + l[pos[1]:] queryComments[i+1] = l[pos[0]:pos[1]] } else { queryComments[i+1] = "" } } }
[ "func", "PgQueryStrip", "(", "query", "[", "]", "string", ",", "queryComments", "[", "]", "string", ")", "{", "for", "i", ",", "l", ":=", "range", "query", "{", "pos", ":=", "pgQueryStripRE", ".", "FindStringIndex", "(", "l", ")", "\n", "if", "pos", "!=", "nil", "{", "query", "[", "i", "]", "=", "l", "[", ":", "pos", "[", "0", "]", "]", "+", "l", "[", "pos", "[", "1", "]", ":", "]", "\n", "queryComments", "[", "i", "+", "1", "]", "=", "l", "[", "pos", "[", "0", "]", ":", "pos", "[", "1", "]", "]", "\n", "}", "else", "{", "queryComments", "[", "i", "+", "1", "]", "=", "\"", "\"", "\n", "}", "\n", "}", "\n", "}" ]
// PgQueryStrip strips stuff.
[ "PgQueryStrip", "strips", "stuff", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/loaders/postgres.go#L219-L229
train
xo/xo
loaders/postgres.go
PgTables
func PgTables(db models.XODB, schema string, relkind string) ([]*models.Table, error) { var err error // get the tables rows, err := models.PgTables(db, schema, relkind) if err != nil { return nil, err } // Get the tables that have a sequence defined. sequences, err := models.PgSequences(db, schema) if err != nil { // Set it to an empty set on error. sequences = []*models.Sequence{} } // Add information about manual FK. var tables []*models.Table for _, row := range rows { manualPk := true // Look for a match in the table name where it contains the sequence for _, sequence := range sequences { if sequence.TableName == row.TableName { manualPk = false } } tables = append(tables, &models.Table{ TableName: row.TableName, Type: row.Type, ManualPk: manualPk, }) } return tables, nil }
go
func PgTables(db models.XODB, schema string, relkind string) ([]*models.Table, error) { var err error // get the tables rows, err := models.PgTables(db, schema, relkind) if err != nil { return nil, err } // Get the tables that have a sequence defined. sequences, err := models.PgSequences(db, schema) if err != nil { // Set it to an empty set on error. sequences = []*models.Sequence{} } // Add information about manual FK. var tables []*models.Table for _, row := range rows { manualPk := true // Look for a match in the table name where it contains the sequence for _, sequence := range sequences { if sequence.TableName == row.TableName { manualPk = false } } tables = append(tables, &models.Table{ TableName: row.TableName, Type: row.Type, ManualPk: manualPk, }) } return tables, nil }
[ "func", "PgTables", "(", "db", "models", ".", "XODB", ",", "schema", "string", ",", "relkind", "string", ")", "(", "[", "]", "*", "models", ".", "Table", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// get the tables", "rows", ",", "err", ":=", "models", ".", "PgTables", "(", "db", ",", "schema", ",", "relkind", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// Get the tables that have a sequence defined.", "sequences", ",", "err", ":=", "models", ".", "PgSequences", "(", "db", ",", "schema", ")", "\n", "if", "err", "!=", "nil", "{", "// Set it to an empty set on error.", "sequences", "=", "[", "]", "*", "models", ".", "Sequence", "{", "}", "\n", "}", "\n\n", "// Add information about manual FK.", "var", "tables", "[", "]", "*", "models", ".", "Table", "\n", "for", "_", ",", "row", ":=", "range", "rows", "{", "manualPk", ":=", "true", "\n", "// Look for a match in the table name where it contains the sequence", "for", "_", ",", "sequence", ":=", "range", "sequences", "{", "if", "sequence", ".", "TableName", "==", "row", ".", "TableName", "{", "manualPk", "=", "false", "\n", "}", "\n", "}", "\n", "tables", "=", "append", "(", "tables", ",", "&", "models", ".", "Table", "{", "TableName", ":", "row", ".", "TableName", ",", "Type", ":", "row", ".", "Type", ",", "ManualPk", ":", "manualPk", ",", "}", ")", "\n", "}", "\n\n", "return", "tables", ",", "nil", "\n", "}" ]
// PgTables returns the Postgres tables with the manual PK information added. // ManualPk is true when the table does not have a sequence defined.
[ "PgTables", "returns", "the", "Postgres", "tables", "with", "the", "manual", "PK", "information", "added", ".", "ManualPk", "is", "true", "when", "the", "table", "does", "not", "have", "a", "sequence", "defined", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/loaders/postgres.go#L233-L267
train
xo/xo
loaders/postgres.go
PgQueryColumns
func PgQueryColumns(args *internal.ArgType, inspect []string) ([]*models.Column, error) { var err error // create temporary view xoid xoid := "_xo_" + internal.GenRandomID() viewq := `CREATE TEMPORARY VIEW ` + xoid + ` AS (` + strings.Join(inspect, "\n") + `)` models.XOLog(viewq) _, err = args.DB.Exec(viewq) if err != nil { return nil, err } // query to determine schema name where temporary view was created var nspq = `SELECT n.nspname ` + `FROM pg_class c ` + `JOIN pg_namespace n ON n.oid = c.relnamespace ` + `WHERE n.nspname LIKE 'pg_temp%' AND c.relname = $1` // run query var schema string models.XOLog(nspq, xoid) err = args.DB.QueryRow(nspq, xoid).Scan(&schema) if err != nil { return nil, err } // load column information return models.PgTableColumns(args.DB, schema, xoid, false) }
go
func PgQueryColumns(args *internal.ArgType, inspect []string) ([]*models.Column, error) { var err error // create temporary view xoid xoid := "_xo_" + internal.GenRandomID() viewq := `CREATE TEMPORARY VIEW ` + xoid + ` AS (` + strings.Join(inspect, "\n") + `)` models.XOLog(viewq) _, err = args.DB.Exec(viewq) if err != nil { return nil, err } // query to determine schema name where temporary view was created var nspq = `SELECT n.nspname ` + `FROM pg_class c ` + `JOIN pg_namespace n ON n.oid = c.relnamespace ` + `WHERE n.nspname LIKE 'pg_temp%' AND c.relname = $1` // run query var schema string models.XOLog(nspq, xoid) err = args.DB.QueryRow(nspq, xoid).Scan(&schema) if err != nil { return nil, err } // load column information return models.PgTableColumns(args.DB, schema, xoid, false) }
[ "func", "PgQueryColumns", "(", "args", "*", "internal", ".", "ArgType", ",", "inspect", "[", "]", "string", ")", "(", "[", "]", "*", "models", ".", "Column", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// create temporary view xoid", "xoid", ":=", "\"", "\"", "+", "internal", ".", "GenRandomID", "(", ")", "\n", "viewq", ":=", "`CREATE TEMPORARY VIEW `", "+", "xoid", "+", "` AS (`", "+", "strings", ".", "Join", "(", "inspect", ",", "\"", "\\n", "\"", ")", "+", "`)`", "\n", "models", ".", "XOLog", "(", "viewq", ")", "\n", "_", ",", "err", "=", "args", ".", "DB", ".", "Exec", "(", "viewq", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// query to determine schema name where temporary view was created", "var", "nspq", "=", "`SELECT n.nspname `", "+", "`FROM pg_class c `", "+", "`JOIN pg_namespace n ON n.oid = c.relnamespace `", "+", "`WHERE n.nspname LIKE 'pg_temp%' AND c.relname = $1`", "\n\n", "// run query", "var", "schema", "string", "\n", "models", ".", "XOLog", "(", "nspq", ",", "xoid", ")", "\n", "err", "=", "args", ".", "DB", ".", "QueryRow", "(", "nspq", ",", "xoid", ")", ".", "Scan", "(", "&", "schema", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// load column information", "return", "models", ".", "PgTableColumns", "(", "args", ".", "DB", ",", "schema", ",", "xoid", ",", "false", ")", "\n", "}" ]
// PgQueryColumns parses the query and generates a type for it.
[ "PgQueryColumns", "parses", "the", "query", "and", "generates", "a", "type", "for", "it", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/loaders/postgres.go#L270-L298
train
xo/xo
loaders/postgres.go
PgIndexColumns
func PgIndexColumns(db models.XODB, schema string, table string, index string) ([]*models.IndexColumn, error) { var err error // load columns cols, err := models.PgIndexColumns(db, schema, index) if err != nil { return nil, err } // load col order colOrd, err := models.PgGetColOrder(db, schema, index) if err != nil { return nil, err } // build schema name used in errors s := schema if s != "" { s = s + "." } // put cols in order using colOrder ret := []*models.IndexColumn{} for _, v := range strings.Split(colOrd.Ord, " ") { cid, err := strconv.Atoi(v) if err != nil { return nil, fmt.Errorf("could not convert %s%s index %s column %s to int", s, table, index, v) } // find column found := false var c *models.IndexColumn for _, ic := range cols { if cid == ic.Cid { found = true c = ic break } } // sanity check if !found { return nil, fmt.Errorf("could not find %s%s index %s column id %d", s, table, index, cid) } ret = append(ret, c) } return ret, nil }
go
func PgIndexColumns(db models.XODB, schema string, table string, index string) ([]*models.IndexColumn, error) { var err error // load columns cols, err := models.PgIndexColumns(db, schema, index) if err != nil { return nil, err } // load col order colOrd, err := models.PgGetColOrder(db, schema, index) if err != nil { return nil, err } // build schema name used in errors s := schema if s != "" { s = s + "." } // put cols in order using colOrder ret := []*models.IndexColumn{} for _, v := range strings.Split(colOrd.Ord, " ") { cid, err := strconv.Atoi(v) if err != nil { return nil, fmt.Errorf("could not convert %s%s index %s column %s to int", s, table, index, v) } // find column found := false var c *models.IndexColumn for _, ic := range cols { if cid == ic.Cid { found = true c = ic break } } // sanity check if !found { return nil, fmt.Errorf("could not find %s%s index %s column id %d", s, table, index, cid) } ret = append(ret, c) } return ret, nil }
[ "func", "PgIndexColumns", "(", "db", "models", ".", "XODB", ",", "schema", "string", ",", "table", "string", ",", "index", "string", ")", "(", "[", "]", "*", "models", ".", "IndexColumn", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// load columns", "cols", ",", "err", ":=", "models", ".", "PgIndexColumns", "(", "db", ",", "schema", ",", "index", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// load col order", "colOrd", ",", "err", ":=", "models", ".", "PgGetColOrder", "(", "db", ",", "schema", ",", "index", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// build schema name used in errors", "s", ":=", "schema", "\n", "if", "s", "!=", "\"", "\"", "{", "s", "=", "s", "+", "\"", "\"", "\n", "}", "\n\n", "// put cols in order using colOrder", "ret", ":=", "[", "]", "*", "models", ".", "IndexColumn", "{", "}", "\n", "for", "_", ",", "v", ":=", "range", "strings", ".", "Split", "(", "colOrd", ".", "Ord", ",", "\"", "\"", ")", "{", "cid", ",", "err", ":=", "strconv", ".", "Atoi", "(", "v", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "s", ",", "table", ",", "index", ",", "v", ")", "\n", "}", "\n\n", "// find column", "found", ":=", "false", "\n", "var", "c", "*", "models", ".", "IndexColumn", "\n", "for", "_", ",", "ic", ":=", "range", "cols", "{", "if", "cid", "==", "ic", ".", "Cid", "{", "found", "=", "true", "\n", "c", "=", "ic", "\n", "break", "\n", "}", "\n", "}", "\n\n", "// sanity check", "if", "!", "found", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "s", ",", "table", ",", "index", ",", "cid", ")", "\n", "}", "\n\n", "ret", "=", "append", "(", "ret", ",", "c", ")", "\n", "}", "\n\n", "return", "ret", ",", "nil", "\n", "}" ]
// PgIndexColumns returns the column list for an index.
[ "PgIndexColumns", "returns", "the", "column", "list", "for", "an", "index", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/loaders/postgres.go#L301-L350
train
xo/xo
examples/django/postgres/djangocontenttype.xo.go
Update
func (dct *DjangoContentType) Update(db XODB) error { var err error // if doesn't exist, bail if !dct._exists { return errors.New("update failed: does not exist") } // if deleted, bail if dct._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE public.django_content_type SET (` + `app_label, model` + `) = ( ` + `$1, $2` + `) WHERE id = $3` // run query XOLog(sqlstr, dct.AppLabel, dct.Model, dct.ID) _, err = db.Exec(sqlstr, dct.AppLabel, dct.Model, dct.ID) return err }
go
func (dct *DjangoContentType) Update(db XODB) error { var err error // if doesn't exist, bail if !dct._exists { return errors.New("update failed: does not exist") } // if deleted, bail if dct._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE public.django_content_type SET (` + `app_label, model` + `) = ( ` + `$1, $2` + `) WHERE id = $3` // run query XOLog(sqlstr, dct.AppLabel, dct.Model, dct.ID) _, err = db.Exec(sqlstr, dct.AppLabel, dct.Model, dct.ID) return err }
[ "func", "(", "dct", "*", "DjangoContentType", ")", "Update", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "dct", ".", "_exists", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// if deleted, bail", "if", "dct", ".", "_deleted", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`UPDATE public.django_content_type SET (`", "+", "`app_label, model`", "+", "`) = ( `", "+", "`$1, $2`", "+", "`) WHERE id = $3`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "dct", ".", "AppLabel", ",", "dct", ".", "Model", ",", "dct", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "dct", ".", "AppLabel", ",", "dct", ".", "Model", ",", "dct", ".", "ID", ")", "\n", "return", "err", "\n", "}" ]
// Update updates the DjangoContentType in the database.
[ "Update", "updates", "the", "DjangoContentType", "in", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/djangocontenttype.xo.go#L60-L84
train
xo/xo
examples/django/postgres/djangocontenttype.xo.go
Delete
func (dct *DjangoContentType) Delete(db XODB) error { var err error // if doesn't exist, bail if !dct._exists { return nil } // if deleted, bail if dct._deleted { return nil } // sql query const sqlstr = `DELETE FROM public.django_content_type WHERE id = $1` // run query XOLog(sqlstr, dct.ID) _, err = db.Exec(sqlstr, dct.ID) if err != nil { return err } // set deleted dct._deleted = true return nil }
go
func (dct *DjangoContentType) Delete(db XODB) error { var err error // if doesn't exist, bail if !dct._exists { return nil } // if deleted, bail if dct._deleted { return nil } // sql query const sqlstr = `DELETE FROM public.django_content_type WHERE id = $1` // run query XOLog(sqlstr, dct.ID) _, err = db.Exec(sqlstr, dct.ID) if err != nil { return err } // set deleted dct._deleted = true return nil }
[ "func", "(", "dct", "*", "DjangoContentType", ")", "Delete", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "dct", ".", "_exists", "{", "return", "nil", "\n", "}", "\n\n", "// if deleted, bail", "if", "dct", ".", "_deleted", "{", "return", "nil", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`DELETE FROM public.django_content_type WHERE id = $1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "dct", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "dct", ".", "ID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// set deleted", "dct", ".", "_deleted", "=", "true", "\n\n", "return", "nil", "\n", "}" ]
// Delete deletes the DjangoContentType from the database.
[ "Delete", "deletes", "the", "DjangoContentType", "from", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/djangocontenttype.xo.go#L131-L158
train
xo/xo
examples/django/oracle/authgrouppermission.xo.go
AuthGroupPermissionByGroupIDPermissionID
func AuthGroupPermissionByGroupIDPermissionID(db XODB, groupID float64, permissionID float64) (*AuthGroupPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, group_id, permission_id ` + `FROM django.auth_group_permissions ` + `WHERE group_id = :1 AND permission_id = :2` // run query XOLog(sqlstr, groupID, permissionID) agp := AuthGroupPermission{ _exists: true, } err = db.QueryRow(sqlstr, groupID, permissionID).Scan(&agp.ID, &agp.GroupID, &agp.PermissionID) if err != nil { return nil, err } return &agp, nil }
go
func AuthGroupPermissionByGroupIDPermissionID(db XODB, groupID float64, permissionID float64) (*AuthGroupPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, group_id, permission_id ` + `FROM django.auth_group_permissions ` + `WHERE group_id = :1 AND permission_id = :2` // run query XOLog(sqlstr, groupID, permissionID) agp := AuthGroupPermission{ _exists: true, } err = db.QueryRow(sqlstr, groupID, permissionID).Scan(&agp.ID, &agp.GroupID, &agp.PermissionID) if err != nil { return nil, err } return &agp, nil }
[ "func", "AuthGroupPermissionByGroupIDPermissionID", "(", "db", "XODB", ",", "groupID", "float64", ",", "permissionID", "float64", ")", "(", "*", "AuthGroupPermission", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, group_id, permission_id `", "+", "`FROM django.auth_group_permissions `", "+", "`WHERE group_id = :1 AND permission_id = :2`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "groupID", ",", "permissionID", ")", "\n", "agp", ":=", "AuthGroupPermission", "{", "_exists", ":", "true", ",", "}", "\n\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "groupID", ",", "permissionID", ")", ".", "Scan", "(", "&", "agp", ".", "ID", ",", "&", "agp", ".", "GroupID", ",", "&", "agp", ".", "PermissionID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "agp", ",", "nil", "\n", "}" ]
// AuthGroupPermissionByGroupIDPermissionID retrieves a row from 'django.auth_group_permissions' as a AuthGroupPermission. // // Generated from index 'auth_gr_group_id_0cd325b0_uniq'.
[ "AuthGroupPermissionByGroupIDPermissionID", "retrieves", "a", "row", "from", "django", ".", "auth_group_permissions", "as", "a", "AuthGroupPermission", ".", "Generated", "from", "index", "auth_gr_group_id_0cd325b0_uniq", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/authgrouppermission.xo.go#L145-L166
train
xo/xo
models/procparam.xo.go
PgProcParams
func PgProcParams(db XODB, schema string, proc string) ([]*ProcParam, error) { var err error // sql query const sqlstr = `SELECT ` + `UNNEST(STRING_TO_ARRAY(oidvectortypes(p.proargtypes), ', ')) ` + // ::varchar AS param_type `FROM pg_proc p ` + `JOIN ONLY pg_namespace n ON p.pronamespace = n.oid ` + `WHERE n.nspname = $1 AND p.proname = $2` // run query XOLog(sqlstr, schema, proc) q, err := db.Query(sqlstr, schema, proc) if err != nil { return nil, err } defer q.Close() // load results res := []*ProcParam{} for q.Next() { pp := ProcParam{} // scan err = q.Scan(&pp.ParamType) if err != nil { return nil, err } res = append(res, &pp) } return res, nil }
go
func PgProcParams(db XODB, schema string, proc string) ([]*ProcParam, error) { var err error // sql query const sqlstr = `SELECT ` + `UNNEST(STRING_TO_ARRAY(oidvectortypes(p.proargtypes), ', ')) ` + // ::varchar AS param_type `FROM pg_proc p ` + `JOIN ONLY pg_namespace n ON p.pronamespace = n.oid ` + `WHERE n.nspname = $1 AND p.proname = $2` // run query XOLog(sqlstr, schema, proc) q, err := db.Query(sqlstr, schema, proc) if err != nil { return nil, err } defer q.Close() // load results res := []*ProcParam{} for q.Next() { pp := ProcParam{} // scan err = q.Scan(&pp.ParamType) if err != nil { return nil, err } res = append(res, &pp) } return res, nil }
[ "func", "PgProcParams", "(", "db", "XODB", ",", "schema", "string", ",", "proc", "string", ")", "(", "[", "]", "*", "ProcParam", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`UNNEST(STRING_TO_ARRAY(oidvectortypes(p.proargtypes), ', ')) `", "+", "// ::varchar AS param_type", "`FROM pg_proc p `", "+", "`JOIN ONLY pg_namespace n ON p.pronamespace = n.oid `", "+", "`WHERE n.nspname = $1 AND p.proname = $2`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "schema", ",", "proc", ")", "\n", "q", ",", "err", ":=", "db", ".", "Query", "(", "sqlstr", ",", "schema", ",", "proc", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "q", ".", "Close", "(", ")", "\n\n", "// load results", "res", ":=", "[", "]", "*", "ProcParam", "{", "}", "\n", "for", "q", ".", "Next", "(", ")", "{", "pp", ":=", "ProcParam", "{", "}", "\n\n", "// scan", "err", "=", "q", ".", "Scan", "(", "&", "pp", ".", "ParamType", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "res", "=", "append", "(", "res", ",", "&", "pp", ")", "\n", "}", "\n\n", "return", "res", ",", "nil", "\n", "}" ]
// PgProcParams runs a custom query, returning results as ProcParam.
[ "PgProcParams", "runs", "a", "custom", "query", "returning", "results", "as", "ProcParam", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/models/procparam.xo.go#L12-L45
train
xo/xo
examples/django/mysql/authusergroup.xo.go
AuthUserGroupsByGroupID
func AuthUserGroupsByGroupID(db XODB, groupID int) ([]*AuthUserGroup, error) { var err error // sql query const sqlstr = `SELECT ` + `id, user_id, group_id ` + `FROM django.auth_user_groups ` + `WHERE group_id = ?` // run query XOLog(sqlstr, groupID) q, err := db.Query(sqlstr, groupID) if err != nil { return nil, err } defer q.Close() // load results res := []*AuthUserGroup{} for q.Next() { aug := AuthUserGroup{ _exists: true, } // scan err = q.Scan(&aug.ID, &aug.UserID, &aug.GroupID) if err != nil { return nil, err } res = append(res, &aug) } return res, nil }
go
func AuthUserGroupsByGroupID(db XODB, groupID int) ([]*AuthUserGroup, error) { var err error // sql query const sqlstr = `SELECT ` + `id, user_id, group_id ` + `FROM django.auth_user_groups ` + `WHERE group_id = ?` // run query XOLog(sqlstr, groupID) q, err := db.Query(sqlstr, groupID) if err != nil { return nil, err } defer q.Close() // load results res := []*AuthUserGroup{} for q.Next() { aug := AuthUserGroup{ _exists: true, } // scan err = q.Scan(&aug.ID, &aug.UserID, &aug.GroupID) if err != nil { return nil, err } res = append(res, &aug) } return res, nil }
[ "func", "AuthUserGroupsByGroupID", "(", "db", "XODB", ",", "groupID", "int", ")", "(", "[", "]", "*", "AuthUserGroup", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, user_id, group_id `", "+", "`FROM django.auth_user_groups `", "+", "`WHERE group_id = ?`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "groupID", ")", "\n", "q", ",", "err", ":=", "db", ".", "Query", "(", "sqlstr", ",", "groupID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "q", ".", "Close", "(", ")", "\n\n", "// load results", "res", ":=", "[", "]", "*", "AuthUserGroup", "{", "}", "\n", "for", "q", ".", "Next", "(", ")", "{", "aug", ":=", "AuthUserGroup", "{", "_exists", ":", "true", ",", "}", "\n\n", "// scan", "err", "=", "q", ".", "Scan", "(", "&", "aug", ".", "ID", ",", "&", "aug", ".", "UserID", ",", "&", "aug", ".", "GroupID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "res", "=", "append", "(", "res", ",", "&", "aug", ")", "\n", "}", "\n\n", "return", "res", ",", "nil", "\n", "}" ]
// AuthUserGroupsByGroupID retrieves a row from 'django.auth_user_groups' as a AuthUserGroup. // // Generated from index 'auth_user_groups_group_id_97559544_fk_auth_group_id'.
[ "AuthUserGroupsByGroupID", "retrieves", "a", "row", "from", "django", ".", "auth_user_groups", "as", "a", "AuthUserGroup", ".", "Generated", "from", "index", "auth_user_groups_group_id_97559544_fk_auth_group_id", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/mysql/authusergroup.xo.go#L147-L181
train
xo/xo
examples/django/mysql/authusergroup.xo.go
AuthUserGroupByID
func AuthUserGroupByID(db XODB, id int) (*AuthUserGroup, error) { var err error // sql query const sqlstr = `SELECT ` + `id, user_id, group_id ` + `FROM django.auth_user_groups ` + `WHERE id = ?` // run query XOLog(sqlstr, id) aug := AuthUserGroup{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&aug.ID, &aug.UserID, &aug.GroupID) if err != nil { return nil, err } return &aug, nil }
go
func AuthUserGroupByID(db XODB, id int) (*AuthUserGroup, error) { var err error // sql query const sqlstr = `SELECT ` + `id, user_id, group_id ` + `FROM django.auth_user_groups ` + `WHERE id = ?` // run query XOLog(sqlstr, id) aug := AuthUserGroup{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&aug.ID, &aug.UserID, &aug.GroupID) if err != nil { return nil, err } return &aug, nil }
[ "func", "AuthUserGroupByID", "(", "db", "XODB", ",", "id", "int", ")", "(", "*", "AuthUserGroup", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, user_id, group_id `", "+", "`FROM django.auth_user_groups `", "+", "`WHERE id = ?`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "id", ")", "\n", "aug", ":=", "AuthUserGroup", "{", "_exists", ":", "true", ",", "}", "\n\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "id", ")", ".", "Scan", "(", "&", "aug", ".", "ID", ",", "&", "aug", ".", "UserID", ",", "&", "aug", ".", "GroupID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "aug", ",", "nil", "\n", "}" ]
// AuthUserGroupByID retrieves a row from 'django.auth_user_groups' as a AuthUserGroup. // // Generated from index 'auth_user_groups_id_pkey'.
[ "AuthUserGroupByID", "retrieves", "a", "row", "from", "django", ".", "auth_user_groups", "as", "a", "AuthUserGroup", ".", "Generated", "from", "index", "auth_user_groups_id_pkey", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/mysql/authusergroup.xo.go#L186-L207
train
xo/xo
loaders/mssql.go
MsParseType
func MsParseType(args *internal.ArgType, dt string, nullable bool) (int, string, string) { precision := 0 nilVal := "nil" // extract precision dt, precision, _ = args.ParsePrecision(dt) var typ string switch dt { case "tinyint", "bit": nilVal = "false" typ = "bool" if nullable { nilVal = "sql.NullBool{}" typ = "sql.NullBool" } case "char", "varchar", "text", "nchar", "nvarchar", "ntext", "smallmoney", "money": nilVal = `""` typ = "string" if nullable { nilVal = "sql.NullString{}" typ = "sql.NullString" } case "smallint": nilVal = "0" typ = "int16" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "int": nilVal = "0" typ = args.Int32Type if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "bigint": nilVal = "0" typ = "int64" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "smallserial": nilVal = "0" typ = "uint16" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "serial": nilVal = "0" typ = args.Uint32Type if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "bigserial": nilVal = "0" typ = "uint64" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "real": nilVal = "0.0" typ = "float32" if nullable { nilVal = "sql.NullFloat64{}" typ = "sql.NullFloat64" } case "numeric", "decimal": nilVal = "0.0" typ = "float64" if nullable { nilVal = "sql.NullFloat64{}" typ = "sql.NullFloat64" } case "binary", "varbinary": typ = "[]byte" case "datetime", "datetime2", "timestamp": nilVal = "time.Time{}" typ = "time.Time" case "time with time zone", "time without time zone", "timestamp without time zone": nilVal = "0" typ = "int64" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "interval": typ = "*time.Duration" default: if strings.HasPrefix(dt, args.Schema+".") { // in the same schema, so chop off typ = snaker.SnakeToCamelIdentifier(dt[len(args.Schema)+1:]) nilVal = typ + "(0)" } else { typ = snaker.SnakeToCamelIdentifier(dt) nilVal = typ + "{}" } } return precision, nilVal, typ }
go
func MsParseType(args *internal.ArgType, dt string, nullable bool) (int, string, string) { precision := 0 nilVal := "nil" // extract precision dt, precision, _ = args.ParsePrecision(dt) var typ string switch dt { case "tinyint", "bit": nilVal = "false" typ = "bool" if nullable { nilVal = "sql.NullBool{}" typ = "sql.NullBool" } case "char", "varchar", "text", "nchar", "nvarchar", "ntext", "smallmoney", "money": nilVal = `""` typ = "string" if nullable { nilVal = "sql.NullString{}" typ = "sql.NullString" } case "smallint": nilVal = "0" typ = "int16" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "int": nilVal = "0" typ = args.Int32Type if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "bigint": nilVal = "0" typ = "int64" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "smallserial": nilVal = "0" typ = "uint16" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "serial": nilVal = "0" typ = args.Uint32Type if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "bigserial": nilVal = "0" typ = "uint64" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "real": nilVal = "0.0" typ = "float32" if nullable { nilVal = "sql.NullFloat64{}" typ = "sql.NullFloat64" } case "numeric", "decimal": nilVal = "0.0" typ = "float64" if nullable { nilVal = "sql.NullFloat64{}" typ = "sql.NullFloat64" } case "binary", "varbinary": typ = "[]byte" case "datetime", "datetime2", "timestamp": nilVal = "time.Time{}" typ = "time.Time" case "time with time zone", "time without time zone", "timestamp without time zone": nilVal = "0" typ = "int64" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "interval": typ = "*time.Duration" default: if strings.HasPrefix(dt, args.Schema+".") { // in the same schema, so chop off typ = snaker.SnakeToCamelIdentifier(dt[len(args.Schema)+1:]) nilVal = typ + "(0)" } else { typ = snaker.SnakeToCamelIdentifier(dt) nilVal = typ + "{}" } } return precision, nilVal, typ }
[ "func", "MsParseType", "(", "args", "*", "internal", ".", "ArgType", ",", "dt", "string", ",", "nullable", "bool", ")", "(", "int", ",", "string", ",", "string", ")", "{", "precision", ":=", "0", "\n", "nilVal", ":=", "\"", "\"", "\n\n", "// extract precision", "dt", ",", "precision", ",", "_", "=", "args", ".", "ParsePrecision", "(", "dt", ")", "\n\n", "var", "typ", "string", "\n", "switch", "dt", "{", "case", "\"", "\"", ",", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n\n", "case", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ":", "nilVal", "=", "`\"\"`", "\n", "typ", "=", "\"", "\"", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n\n", "case", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n", "case", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "args", ".", "Int32Type", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n", "case", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n\n", "case", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n", "case", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "args", ".", "Uint32Type", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n", "case", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n\n", "case", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n", "case", "\"", "\"", ",", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n\n", "case", "\"", "\"", ",", "\"", "\"", ":", "typ", "=", "\"", "\"", "\n\n", "case", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n\n", "case", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n\n", "case", "\"", "\"", ":", "typ", "=", "\"", "\"", "\n\n", "default", ":", "if", "strings", ".", "HasPrefix", "(", "dt", ",", "args", ".", "Schema", "+", "\"", "\"", ")", "{", "// in the same schema, so chop off", "typ", "=", "snaker", ".", "SnakeToCamelIdentifier", "(", "dt", "[", "len", "(", "args", ".", "Schema", ")", "+", "1", ":", "]", ")", "\n", "nilVal", "=", "typ", "+", "\"", "\"", "\n", "}", "else", "{", "typ", "=", "snaker", ".", "SnakeToCamelIdentifier", "(", "dt", ")", "\n", "nilVal", "=", "typ", "+", "\"", "\"", "\n", "}", "\n", "}", "\n\n", "return", "precision", ",", "nilVal", ",", "typ", "\n", "}" ]
// MsParseType parse a mssql type into a Go type based on the column // definition.
[ "MsParseType", "parse", "a", "mssql", "type", "into", "a", "Go", "type", "based", "on", "the", "column", "definition", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/loaders/mssql.go#L68-L182
train
xo/xo
loaders/mssql.go
MsQueryColumns
func MsQueryColumns(args *internal.ArgType, inspect []string) ([]*models.Column, error) { var err error // process inspect -- cannot have 'order by' in a CREATE VIEW ins := []string{} for _, l := range inspect { if !strings.HasPrefix(strings.ToUpper(l), "ORDER BY ") { ins = append(ins, l) } } // create temporary view xoid xoid := "_xo_" + internal.GenRandomID() viewq := `CREATE VIEW ` + xoid + ` AS ` + strings.Join(ins, "\n") models.XOLog(viewq) _, err = args.DB.Exec(viewq) if err != nil { return nil, err } // load columns cols, err := models.MsTableColumns(args.DB, args.Schema, xoid) // drop inspect view dropq := `DROP VIEW ` + xoid models.XOLog(dropq) _, _ = args.DB.Exec(dropq) // load column information return cols, err }
go
func MsQueryColumns(args *internal.ArgType, inspect []string) ([]*models.Column, error) { var err error // process inspect -- cannot have 'order by' in a CREATE VIEW ins := []string{} for _, l := range inspect { if !strings.HasPrefix(strings.ToUpper(l), "ORDER BY ") { ins = append(ins, l) } } // create temporary view xoid xoid := "_xo_" + internal.GenRandomID() viewq := `CREATE VIEW ` + xoid + ` AS ` + strings.Join(ins, "\n") models.XOLog(viewq) _, err = args.DB.Exec(viewq) if err != nil { return nil, err } // load columns cols, err := models.MsTableColumns(args.DB, args.Schema, xoid) // drop inspect view dropq := `DROP VIEW ` + xoid models.XOLog(dropq) _, _ = args.DB.Exec(dropq) // load column information return cols, err }
[ "func", "MsQueryColumns", "(", "args", "*", "internal", ".", "ArgType", ",", "inspect", "[", "]", "string", ")", "(", "[", "]", "*", "models", ".", "Column", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// process inspect -- cannot have 'order by' in a CREATE VIEW", "ins", ":=", "[", "]", "string", "{", "}", "\n", "for", "_", ",", "l", ":=", "range", "inspect", "{", "if", "!", "strings", ".", "HasPrefix", "(", "strings", ".", "ToUpper", "(", "l", ")", ",", "\"", "\"", ")", "{", "ins", "=", "append", "(", "ins", ",", "l", ")", "\n", "}", "\n", "}", "\n\n", "// create temporary view xoid", "xoid", ":=", "\"", "\"", "+", "internal", ".", "GenRandomID", "(", ")", "\n", "viewq", ":=", "`CREATE VIEW `", "+", "xoid", "+", "` AS `", "+", "strings", ".", "Join", "(", "ins", ",", "\"", "\\n", "\"", ")", "\n", "models", ".", "XOLog", "(", "viewq", ")", "\n", "_", ",", "err", "=", "args", ".", "DB", ".", "Exec", "(", "viewq", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// load columns", "cols", ",", "err", ":=", "models", ".", "MsTableColumns", "(", "args", ".", "DB", ",", "args", ".", "Schema", ",", "xoid", ")", "\n\n", "// drop inspect view", "dropq", ":=", "`DROP VIEW `", "+", "xoid", "\n", "models", ".", "XOLog", "(", "dropq", ")", "\n", "_", ",", "_", "=", "args", ".", "DB", ".", "Exec", "(", "dropq", ")", "\n\n", "// load column information", "return", "cols", ",", "err", "\n", "}" ]
// MsQueryColumns parses the query and generates a type for it.
[ "MsQueryColumns", "parses", "the", "query", "and", "generates", "a", "type", "for", "it", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/loaders/mssql.go#L185-L215
train
xo/xo
loaders/mssql.go
MsTables
func MsTables(db models.XODB, schema string, relkind string) ([]*models.Table, error) { var err error // get the tables rows, err := models.MsTables(db, schema, relkind) if err != nil { return nil, err } // get the tables that have Identity included identities, err := models.MsIdentities(db, schema) if err != nil { // Set it to an empty set on error. identities = []*models.MsIdentity{} } // Add information about manual FK. var tables []*models.Table for _, row := range rows { manualPk := true // Look for a match in the table name where it contains the identity for _, identity := range identities { if identity.TableName == row.TableName { manualPk = false } } tables = append(tables, &models.Table{ TableName: row.TableName, Type: row.Type, ManualPk: manualPk, }) } return tables, nil }
go
func MsTables(db models.XODB, schema string, relkind string) ([]*models.Table, error) { var err error // get the tables rows, err := models.MsTables(db, schema, relkind) if err != nil { return nil, err } // get the tables that have Identity included identities, err := models.MsIdentities(db, schema) if err != nil { // Set it to an empty set on error. identities = []*models.MsIdentity{} } // Add information about manual FK. var tables []*models.Table for _, row := range rows { manualPk := true // Look for a match in the table name where it contains the identity for _, identity := range identities { if identity.TableName == row.TableName { manualPk = false } } tables = append(tables, &models.Table{ TableName: row.TableName, Type: row.Type, ManualPk: manualPk, }) } return tables, nil }
[ "func", "MsTables", "(", "db", "models", ".", "XODB", ",", "schema", "string", ",", "relkind", "string", ")", "(", "[", "]", "*", "models", ".", "Table", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// get the tables", "rows", ",", "err", ":=", "models", ".", "MsTables", "(", "db", ",", "schema", ",", "relkind", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// get the tables that have Identity included", "identities", ",", "err", ":=", "models", ".", "MsIdentities", "(", "db", ",", "schema", ")", "\n", "if", "err", "!=", "nil", "{", "// Set it to an empty set on error.", "identities", "=", "[", "]", "*", "models", ".", "MsIdentity", "{", "}", "\n", "}", "\n\n", "// Add information about manual FK.", "var", "tables", "[", "]", "*", "models", ".", "Table", "\n", "for", "_", ",", "row", ":=", "range", "rows", "{", "manualPk", ":=", "true", "\n", "// Look for a match in the table name where it contains the identity", "for", "_", ",", "identity", ":=", "range", "identities", "{", "if", "identity", ".", "TableName", "==", "row", ".", "TableName", "{", "manualPk", "=", "false", "\n", "}", "\n", "}", "\n", "tables", "=", "append", "(", "tables", ",", "&", "models", ".", "Table", "{", "TableName", ":", "row", ".", "TableName", ",", "Type", ":", "row", ".", "Type", ",", "ManualPk", ":", "manualPk", ",", "}", ")", "\n", "}", "\n\n", "return", "tables", ",", "nil", "\n", "}" ]
// MsTables returns the MsSQL tables with the manual PK information added. // ManualPk is true when the table's primary key is not an identity.
[ "MsTables", "returns", "the", "MsSQL", "tables", "with", "the", "manual", "PK", "information", "added", ".", "ManualPk", "is", "true", "when", "the", "table", "s", "primary", "key", "is", "not", "an", "identity", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/loaders/mssql.go#L219-L253
train
xo/xo
examples/django/mysql/djangoadminlog.xo.go
Delete
func (dal *DjangoAdminLog) Delete(db XODB) error { var err error // if doesn't exist, bail if !dal._exists { return nil } // if deleted, bail if dal._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.django_admin_log WHERE id = ?` // run query XOLog(sqlstr, dal.ID) _, err = db.Exec(sqlstr, dal.ID) if err != nil { return err } // set deleted dal._deleted = true return nil }
go
func (dal *DjangoAdminLog) Delete(db XODB) error { var err error // if doesn't exist, bail if !dal._exists { return nil } // if deleted, bail if dal._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.django_admin_log WHERE id = ?` // run query XOLog(sqlstr, dal.ID) _, err = db.Exec(sqlstr, dal.ID) if err != nil { return err } // set deleted dal._deleted = true return nil }
[ "func", "(", "dal", "*", "DjangoAdminLog", ")", "Delete", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "dal", ".", "_exists", "{", "return", "nil", "\n", "}", "\n\n", "// if deleted, bail", "if", "dal", ".", "_deleted", "{", "return", "nil", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`DELETE FROM django.django_admin_log WHERE id = ?`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "dal", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "dal", ".", "ID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// set deleted", "dal", ".", "_deleted", "=", "true", "\n\n", "return", "nil", "\n", "}" ]
// Delete deletes the DjangoAdminLog from the database.
[ "Delete", "deletes", "the", "DjangoAdminLog", "from", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/mysql/djangoadminlog.xo.go#L108-L135
train
xo/xo
examples/django/mysql/djangosession.xo.go
DjangoSessionsByExpireDate
func DjangoSessionsByExpireDate(db XODB, expireDate *time.Time) ([]*DjangoSession, error) { var err error // sql query const sqlstr = `SELECT ` + `session_key, session_data, expire_date ` + `FROM django.django_session ` + `WHERE expire_date = ?` // run query XOLog(sqlstr, expireDate) q, err := db.Query(sqlstr, expireDate) if err != nil { return nil, err } defer q.Close() // load results res := []*DjangoSession{} for q.Next() { ds := DjangoSession{ _exists: true, } // scan err = q.Scan(&ds.SessionKey, &ds.SessionData, &ds.ExpireDate) if err != nil { return nil, err } res = append(res, &ds) } return res, nil }
go
func DjangoSessionsByExpireDate(db XODB, expireDate *time.Time) ([]*DjangoSession, error) { var err error // sql query const sqlstr = `SELECT ` + `session_key, session_data, expire_date ` + `FROM django.django_session ` + `WHERE expire_date = ?` // run query XOLog(sqlstr, expireDate) q, err := db.Query(sqlstr, expireDate) if err != nil { return nil, err } defer q.Close() // load results res := []*DjangoSession{} for q.Next() { ds := DjangoSession{ _exists: true, } // scan err = q.Scan(&ds.SessionKey, &ds.SessionData, &ds.ExpireDate) if err != nil { return nil, err } res = append(res, &ds) } return res, nil }
[ "func", "DjangoSessionsByExpireDate", "(", "db", "XODB", ",", "expireDate", "*", "time", ".", "Time", ")", "(", "[", "]", "*", "DjangoSession", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`session_key, session_data, expire_date `", "+", "`FROM django.django_session `", "+", "`WHERE expire_date = ?`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "expireDate", ")", "\n", "q", ",", "err", ":=", "db", ".", "Query", "(", "sqlstr", ",", "expireDate", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "q", ".", "Close", "(", ")", "\n\n", "// load results", "res", ":=", "[", "]", "*", "DjangoSession", "{", "}", "\n", "for", "q", ".", "Next", "(", ")", "{", "ds", ":=", "DjangoSession", "{", "_exists", ":", "true", ",", "}", "\n\n", "// scan", "err", "=", "q", ".", "Scan", "(", "&", "ds", ".", "SessionKey", ",", "&", "ds", ".", "SessionData", ",", "&", "ds", ".", "ExpireDate", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "res", "=", "append", "(", "res", ",", "&", "ds", ")", "\n", "}", "\n\n", "return", "res", ",", "nil", "\n", "}" ]
// DjangoSessionsByExpireDate retrieves a row from 'django.django_session' as a DjangoSession. // // Generated from index 'django_session_de54fa62'.
[ "DjangoSessionsByExpireDate", "retrieves", "a", "row", "from", "django", ".", "django_session", "as", "a", "DjangoSession", ".", "Generated", "from", "index", "django_session_de54fa62", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/mysql/djangosession.xo.go#L127-L161
train
xo/xo
examples/django/mysql/djangosession.xo.go
DjangoSessionBySessionKey
func DjangoSessionBySessionKey(db XODB, sessionKey string) (*DjangoSession, error) { var err error // sql query const sqlstr = `SELECT ` + `session_key, session_data, expire_date ` + `FROM django.django_session ` + `WHERE session_key = ?` // run query XOLog(sqlstr, sessionKey) ds := DjangoSession{ _exists: true, } err = db.QueryRow(sqlstr, sessionKey).Scan(&ds.SessionKey, &ds.SessionData, &ds.ExpireDate) if err != nil { return nil, err } return &ds, nil }
go
func DjangoSessionBySessionKey(db XODB, sessionKey string) (*DjangoSession, error) { var err error // sql query const sqlstr = `SELECT ` + `session_key, session_data, expire_date ` + `FROM django.django_session ` + `WHERE session_key = ?` // run query XOLog(sqlstr, sessionKey) ds := DjangoSession{ _exists: true, } err = db.QueryRow(sqlstr, sessionKey).Scan(&ds.SessionKey, &ds.SessionData, &ds.ExpireDate) if err != nil { return nil, err } return &ds, nil }
[ "func", "DjangoSessionBySessionKey", "(", "db", "XODB", ",", "sessionKey", "string", ")", "(", "*", "DjangoSession", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`session_key, session_data, expire_date `", "+", "`FROM django.django_session `", "+", "`WHERE session_key = ?`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "sessionKey", ")", "\n", "ds", ":=", "DjangoSession", "{", "_exists", ":", "true", ",", "}", "\n\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "sessionKey", ")", ".", "Scan", "(", "&", "ds", ".", "SessionKey", ",", "&", "ds", ".", "SessionData", ",", "&", "ds", ".", "ExpireDate", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "ds", ",", "nil", "\n", "}" ]
// DjangoSessionBySessionKey retrieves a row from 'django.django_session' as a DjangoSession. // // Generated from index 'django_session_session_key_pkey'.
[ "DjangoSessionBySessionKey", "retrieves", "a", "row", "from", "django", ".", "django_session", "as", "a", "DjangoSession", ".", "Generated", "from", "index", "django_session_session_key_pkey", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/mysql/djangosession.xo.go#L166-L187
train
xo/xo
examples/django/mysql/authuseruserpermission.xo.go
Update
func (auup *AuthUserUserPermission) Update(db XODB) error { var err error // if doesn't exist, bail if !auup._exists { return errors.New("update failed: does not exist") } // if deleted, bail if auup._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE django.auth_user_user_permissions SET ` + `user_id = ?, permission_id = ?` + ` WHERE id = ?` // run query XOLog(sqlstr, auup.UserID, auup.PermissionID, auup.ID) _, err = db.Exec(sqlstr, auup.UserID, auup.PermissionID, auup.ID) return err }
go
func (auup *AuthUserUserPermission) Update(db XODB) error { var err error // if doesn't exist, bail if !auup._exists { return errors.New("update failed: does not exist") } // if deleted, bail if auup._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE django.auth_user_user_permissions SET ` + `user_id = ?, permission_id = ?` + ` WHERE id = ?` // run query XOLog(sqlstr, auup.UserID, auup.PermissionID, auup.ID) _, err = db.Exec(sqlstr, auup.UserID, auup.PermissionID, auup.ID) return err }
[ "func", "(", "auup", "*", "AuthUserUserPermission", ")", "Update", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "auup", ".", "_exists", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// if deleted, bail", "if", "auup", ".", "_deleted", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`UPDATE django.auth_user_user_permissions SET `", "+", "`user_id = ?, permission_id = ?`", "+", "` WHERE id = ?`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "auup", ".", "UserID", ",", "auup", ".", "PermissionID", ",", "auup", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "auup", ".", "UserID", ",", "auup", ".", "PermissionID", ",", "auup", ".", "ID", ")", "\n", "return", "err", "\n", "}" ]
// Update updates the AuthUserUserPermission in the database.
[ "Update", "updates", "the", "AuthUserUserPermission", "in", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/mysql/authuseruserpermission.xo.go#L67-L89
train
xo/xo
examples/django/oracle/djangomigration.xo.go
Update
func (dm *DjangoMigration) Update(db XODB) error { var err error // if doesn't exist, bail if !dm._exists { return errors.New("update failed: does not exist") } // if deleted, bail if dm._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE django.django_migrations SET ` + `app = :1, name = :2, applied = :3` + ` WHERE id = :4` // run query XOLog(sqlstr, dm.App, dm.Name, dm.Applied, dm.ID) _, err = db.Exec(sqlstr, dm.App, dm.Name, dm.Applied, dm.ID) return err }
go
func (dm *DjangoMigration) Update(db XODB) error { var err error // if doesn't exist, bail if !dm._exists { return errors.New("update failed: does not exist") } // if deleted, bail if dm._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE django.django_migrations SET ` + `app = :1, name = :2, applied = :3` + ` WHERE id = :4` // run query XOLog(sqlstr, dm.App, dm.Name, dm.Applied, dm.ID) _, err = db.Exec(sqlstr, dm.App, dm.Name, dm.Applied, dm.ID) return err }
[ "func", "(", "dm", "*", "DjangoMigration", ")", "Update", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "dm", ".", "_exists", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// if deleted, bail", "if", "dm", ".", "_deleted", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`UPDATE django.django_migrations SET `", "+", "`app = :1, name = :2, applied = :3`", "+", "` WHERE id = :4`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "dm", ".", "App", ",", "dm", ".", "Name", ",", "dm", ".", "Applied", ",", "dm", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "dm", ".", "App", ",", "dm", ".", "Name", ",", "dm", ".", "Applied", ",", "dm", ".", "ID", ")", "\n", "return", "err", "\n", "}" ]
// Update updates the DjangoMigration in the database.
[ "Update", "updates", "the", "DjangoMigration", "in", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/djangomigration.xo.go#L70-L92
train
xo/xo
examples/django/oracle/djangomigration.xo.go
Delete
func (dm *DjangoMigration) Delete(db XODB) error { var err error // if doesn't exist, bail if !dm._exists { return nil } // if deleted, bail if dm._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.django_migrations WHERE id = :1` // run query XOLog(sqlstr, dm.ID) _, err = db.Exec(sqlstr, dm.ID) if err != nil { return err } // set deleted dm._deleted = true return nil }
go
func (dm *DjangoMigration) Delete(db XODB) error { var err error // if doesn't exist, bail if !dm._exists { return nil } // if deleted, bail if dm._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.django_migrations WHERE id = :1` // run query XOLog(sqlstr, dm.ID) _, err = db.Exec(sqlstr, dm.ID) if err != nil { return err } // set deleted dm._deleted = true return nil }
[ "func", "(", "dm", "*", "DjangoMigration", ")", "Delete", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "dm", ".", "_exists", "{", "return", "nil", "\n", "}", "\n\n", "// if deleted, bail", "if", "dm", ".", "_deleted", "{", "return", "nil", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`DELETE FROM django.django_migrations WHERE id = :1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "dm", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "dm", ".", "ID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// set deleted", "dm", ".", "_deleted", "=", "true", "\n\n", "return", "nil", "\n", "}" ]
// Delete deletes the DjangoMigration from the database.
[ "Delete", "deletes", "the", "DjangoMigration", "from", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/djangomigration.xo.go#L104-L131
train
xo/xo
examples/django/oracle/djangomigration.xo.go
DjangoMigrationByID
func DjangoMigrationByID(db XODB, id float64) (*DjangoMigration, error) { var err error // sql query const sqlstr = `SELECT ` + `id, app, name, applied ` + `FROM django.django_migrations ` + `WHERE id = :1` // run query XOLog(sqlstr, id) dm := DjangoMigration{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&dm.ID, &dm.App, &dm.Name, &dm.Applied) if err != nil { return nil, err } return &dm, nil }
go
func DjangoMigrationByID(db XODB, id float64) (*DjangoMigration, error) { var err error // sql query const sqlstr = `SELECT ` + `id, app, name, applied ` + `FROM django.django_migrations ` + `WHERE id = :1` // run query XOLog(sqlstr, id) dm := DjangoMigration{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&dm.ID, &dm.App, &dm.Name, &dm.Applied) if err != nil { return nil, err } return &dm, nil }
[ "func", "DjangoMigrationByID", "(", "db", "XODB", ",", "id", "float64", ")", "(", "*", "DjangoMigration", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, app, name, applied `", "+", "`FROM django.django_migrations `", "+", "`WHERE id = :1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "id", ")", "\n", "dm", ":=", "DjangoMigration", "{", "_exists", ":", "true", ",", "}", "\n\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "id", ")", ".", "Scan", "(", "&", "dm", ".", "ID", ",", "&", "dm", ".", "App", ",", "&", "dm", ".", "Name", ",", "&", "dm", ".", "Applied", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "dm", ",", "nil", "\n", "}" ]
// DjangoMigrationByID retrieves a row from 'django.django_migrations' as a DjangoMigration. // // Generated from index 'sys_c004953'.
[ "DjangoMigrationByID", "retrieves", "a", "row", "from", "django", ".", "django_migrations", "as", "a", "DjangoMigration", ".", "Generated", "from", "index", "sys_c004953", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/djangomigration.xo.go#L136-L157
train
xo/xo
examples/django/sqlite3/djangocontenttype.xo.go
DjangoContentTypeByID
func DjangoContentTypeByID(db XODB, id int) (*DjangoContentType, error) { var err error // sql query const sqlstr = `SELECT ` + `id, app_label, model ` + `FROM django_content_type ` + `WHERE id = ?` // run query XOLog(sqlstr, id) dct := DjangoContentType{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&dct.ID, &dct.AppLabel, &dct.Model) if err != nil { return nil, err } return &dct, nil }
go
func DjangoContentTypeByID(db XODB, id int) (*DjangoContentType, error) { var err error // sql query const sqlstr = `SELECT ` + `id, app_label, model ` + `FROM django_content_type ` + `WHERE id = ?` // run query XOLog(sqlstr, id) dct := DjangoContentType{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&dct.ID, &dct.AppLabel, &dct.Model) if err != nil { return nil, err } return &dct, nil }
[ "func", "DjangoContentTypeByID", "(", "db", "XODB", ",", "id", "int", ")", "(", "*", "DjangoContentType", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, app_label, model `", "+", "`FROM django_content_type `", "+", "`WHERE id = ?`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "id", ")", "\n", "dct", ":=", "DjangoContentType", "{", "_exists", ":", "true", ",", "}", "\n\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "id", ")", ".", "Scan", "(", "&", "dct", ".", "ID", ",", "&", "dct", ".", "AppLabel", ",", "&", "dct", ".", "Model", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "dct", ",", "nil", "\n", "}" ]
// DjangoContentTypeByID retrieves a row from 'django_content_type' as a DjangoContentType. // // Generated from index 'django_content_type_id_pkey'.
[ "DjangoContentTypeByID", "retrieves", "a", "row", "from", "django_content_type", "as", "a", "DjangoContentType", ".", "Generated", "from", "index", "django_content_type_id_pkey", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/sqlite3/djangocontenttype.xo.go#L159-L180
train
xo/xo
examples/django/postgres/djangoadminlog.xo.go
Update
func (dal *DjangoAdminLog) Update(db XODB) error { var err error // if doesn't exist, bail if !dal._exists { return errors.New("update failed: does not exist") } // if deleted, bail if dal._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE public.django_admin_log SET (` + `action_time, object_id, object_repr, action_flag, change_message, content_type_id, user_id` + `) = ( ` + `$1, $2, $3, $4, $5, $6, $7` + `) WHERE id = $8` // run query XOLog(sqlstr, dal.ActionTime, dal.ObjectID, dal.ObjectRepr, dal.ActionFlag, dal.ChangeMessage, dal.ContentTypeID, dal.UserID, dal.ID) _, err = db.Exec(sqlstr, dal.ActionTime, dal.ObjectID, dal.ObjectRepr, dal.ActionFlag, dal.ChangeMessage, dal.ContentTypeID, dal.UserID, dal.ID) return err }
go
func (dal *DjangoAdminLog) Update(db XODB) error { var err error // if doesn't exist, bail if !dal._exists { return errors.New("update failed: does not exist") } // if deleted, bail if dal._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE public.django_admin_log SET (` + `action_time, object_id, object_repr, action_flag, change_message, content_type_id, user_id` + `) = ( ` + `$1, $2, $3, $4, $5, $6, $7` + `) WHERE id = $8` // run query XOLog(sqlstr, dal.ActionTime, dal.ObjectID, dal.ObjectRepr, dal.ActionFlag, dal.ChangeMessage, dal.ContentTypeID, dal.UserID, dal.ID) _, err = db.Exec(sqlstr, dal.ActionTime, dal.ObjectID, dal.ObjectRepr, dal.ActionFlag, dal.ChangeMessage, dal.ContentTypeID, dal.UserID, dal.ID) return err }
[ "func", "(", "dal", "*", "DjangoAdminLog", ")", "Update", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "dal", ".", "_exists", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// if deleted, bail", "if", "dal", ".", "_deleted", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`UPDATE public.django_admin_log SET (`", "+", "`action_time, object_id, object_repr, action_flag, change_message, content_type_id, user_id`", "+", "`) = ( `", "+", "`$1, $2, $3, $4, $5, $6, $7`", "+", "`) WHERE id = $8`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "dal", ".", "ActionTime", ",", "dal", ".", "ObjectID", ",", "dal", ".", "ObjectRepr", ",", "dal", ".", "ActionFlag", ",", "dal", ".", "ChangeMessage", ",", "dal", ".", "ContentTypeID", ",", "dal", ".", "UserID", ",", "dal", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "dal", ".", "ActionTime", ",", "dal", ".", "ObjectID", ",", "dal", ".", "ObjectRepr", ",", "dal", ".", "ActionFlag", ",", "dal", ".", "ChangeMessage", ",", "dal", ".", "ContentTypeID", ",", "dal", ".", "UserID", ",", "dal", ".", "ID", ")", "\n", "return", "err", "\n", "}" ]
// Update updates the DjangoAdminLog in the database.
[ "Update", "updates", "the", "DjangoAdminLog", "in", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/djangoadminlog.xo.go#L67-L91
train
xo/xo
examples/django/postgres/djangoadminlog.xo.go
DjangoAdminLogsByContentTypeID
func DjangoAdminLogsByContentTypeID(db XODB, contentTypeID sql.NullInt64) ([]*DjangoAdminLog, error) { var err error // sql query const sqlstr = `SELECT ` + `id, action_time, object_id, object_repr, action_flag, change_message, content_type_id, user_id ` + `FROM public.django_admin_log ` + `WHERE content_type_id = $1` // run query XOLog(sqlstr, contentTypeID) q, err := db.Query(sqlstr, contentTypeID) if err != nil { return nil, err } defer q.Close() // load results res := []*DjangoAdminLog{} for q.Next() { dal := DjangoAdminLog{ _exists: true, } // scan err = q.Scan(&dal.ID, &dal.ActionTime, &dal.ObjectID, &dal.ObjectRepr, &dal.ActionFlag, &dal.ChangeMessage, &dal.ContentTypeID, &dal.UserID) if err != nil { return nil, err } res = append(res, &dal) } return res, nil }
go
func DjangoAdminLogsByContentTypeID(db XODB, contentTypeID sql.NullInt64) ([]*DjangoAdminLog, error) { var err error // sql query const sqlstr = `SELECT ` + `id, action_time, object_id, object_repr, action_flag, change_message, content_type_id, user_id ` + `FROM public.django_admin_log ` + `WHERE content_type_id = $1` // run query XOLog(sqlstr, contentTypeID) q, err := db.Query(sqlstr, contentTypeID) if err != nil { return nil, err } defer q.Close() // load results res := []*DjangoAdminLog{} for q.Next() { dal := DjangoAdminLog{ _exists: true, } // scan err = q.Scan(&dal.ID, &dal.ActionTime, &dal.ObjectID, &dal.ObjectRepr, &dal.ActionFlag, &dal.ChangeMessage, &dal.ContentTypeID, &dal.UserID) if err != nil { return nil, err } res = append(res, &dal) } return res, nil }
[ "func", "DjangoAdminLogsByContentTypeID", "(", "db", "XODB", ",", "contentTypeID", "sql", ".", "NullInt64", ")", "(", "[", "]", "*", "DjangoAdminLog", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, action_time, object_id, object_repr, action_flag, change_message, content_type_id, user_id `", "+", "`FROM public.django_admin_log `", "+", "`WHERE content_type_id = $1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "contentTypeID", ")", "\n", "q", ",", "err", ":=", "db", ".", "Query", "(", "sqlstr", ",", "contentTypeID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "q", ".", "Close", "(", ")", "\n\n", "// load results", "res", ":=", "[", "]", "*", "DjangoAdminLog", "{", "}", "\n", "for", "q", ".", "Next", "(", ")", "{", "dal", ":=", "DjangoAdminLog", "{", "_exists", ":", "true", ",", "}", "\n\n", "// scan", "err", "=", "q", ".", "Scan", "(", "&", "dal", ".", "ID", ",", "&", "dal", ".", "ActionTime", ",", "&", "dal", ".", "ObjectID", ",", "&", "dal", ".", "ObjectRepr", ",", "&", "dal", ".", "ActionFlag", ",", "&", "dal", ".", "ChangeMessage", ",", "&", "dal", ".", "ContentTypeID", ",", "&", "dal", ".", "UserID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "res", "=", "append", "(", "res", ",", "&", "dal", ")", "\n", "}", "\n\n", "return", "res", ",", "nil", "\n", "}" ]
// DjangoAdminLogsByContentTypeID retrieves a row from 'public.django_admin_log' as a DjangoAdminLog. // // Generated from index 'django_admin_log_417f1b1c'.
[ "DjangoAdminLogsByContentTypeID", "retrieves", "a", "row", "from", "public", ".", "django_admin_log", "as", "a", "DjangoAdminLog", ".", "Generated", "from", "index", "django_admin_log_417f1b1c", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/djangoadminlog.xo.go#L184-L218
train
xo/xo
models/proc.xo.go
PgProcs
func PgProcs(db XODB, schema string) ([]*Proc, error) { var err error // sql query const sqlstr = `SELECT ` + `p.proname, ` + // ::varchar AS proc_name `pg_get_function_result(p.oid) ` + // ::varchar AS return_type `FROM pg_proc p ` + `JOIN ONLY pg_namespace n ON p.pronamespace = n.oid ` + `WHERE n.nspname = $1` // run query XOLog(sqlstr, schema) q, err := db.Query(sqlstr, schema) if err != nil { return nil, err } defer q.Close() // load results res := []*Proc{} for q.Next() { p := Proc{} // scan err = q.Scan(&p.ProcName, &p.ReturnType) if err != nil { return nil, err } res = append(res, &p) } return res, nil }
go
func PgProcs(db XODB, schema string) ([]*Proc, error) { var err error // sql query const sqlstr = `SELECT ` + `p.proname, ` + // ::varchar AS proc_name `pg_get_function_result(p.oid) ` + // ::varchar AS return_type `FROM pg_proc p ` + `JOIN ONLY pg_namespace n ON p.pronamespace = n.oid ` + `WHERE n.nspname = $1` // run query XOLog(sqlstr, schema) q, err := db.Query(sqlstr, schema) if err != nil { return nil, err } defer q.Close() // load results res := []*Proc{} for q.Next() { p := Proc{} // scan err = q.Scan(&p.ProcName, &p.ReturnType) if err != nil { return nil, err } res = append(res, &p) } return res, nil }
[ "func", "PgProcs", "(", "db", "XODB", ",", "schema", "string", ")", "(", "[", "]", "*", "Proc", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`p.proname, `", "+", "// ::varchar AS proc_name", "`pg_get_function_result(p.oid) `", "+", "// ::varchar AS return_type", "`FROM pg_proc p `", "+", "`JOIN ONLY pg_namespace n ON p.pronamespace = n.oid `", "+", "`WHERE n.nspname = $1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "schema", ")", "\n", "q", ",", "err", ":=", "db", ".", "Query", "(", "sqlstr", ",", "schema", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "q", ".", "Close", "(", ")", "\n\n", "// load results", "res", ":=", "[", "]", "*", "Proc", "{", "}", "\n", "for", "q", ".", "Next", "(", ")", "{", "p", ":=", "Proc", "{", "}", "\n\n", "// scan", "err", "=", "q", ".", "Scan", "(", "&", "p", ".", "ProcName", ",", "&", "p", ".", "ReturnType", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "res", "=", "append", "(", "res", ",", "&", "p", ")", "\n", "}", "\n\n", "return", "res", ",", "nil", "\n", "}" ]
// PgProcs runs a custom query, returning results as Proc.
[ "PgProcs", "runs", "a", "custom", "query", "returning", "results", "as", "Proc", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/models/proc.xo.go#L13-L47
train
xo/xo
examples/django/oracle/authgroup.xo.go
Delete
func (ag *AuthGroup) Delete(db XODB) error { var err error // if doesn't exist, bail if !ag._exists { return nil } // if deleted, bail if ag._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.auth_group WHERE id = :1` // run query XOLog(sqlstr, ag.ID) _, err = db.Exec(sqlstr, ag.ID) if err != nil { return err } // set deleted ag._deleted = true return nil }
go
func (ag *AuthGroup) Delete(db XODB) error { var err error // if doesn't exist, bail if !ag._exists { return nil } // if deleted, bail if ag._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.auth_group WHERE id = :1` // run query XOLog(sqlstr, ag.ID) _, err = db.Exec(sqlstr, ag.ID) if err != nil { return err } // set deleted ag._deleted = true return nil }
[ "func", "(", "ag", "*", "AuthGroup", ")", "Delete", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "ag", ".", "_exists", "{", "return", "nil", "\n", "}", "\n\n", "// if deleted, bail", "if", "ag", ".", "_deleted", "{", "return", "nil", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`DELETE FROM django.auth_group WHERE id = :1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "ag", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "ag", ".", "ID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// set deleted", "ag", ".", "_deleted", "=", "true", "\n\n", "return", "nil", "\n", "}" ]
// Delete deletes the AuthGroup from the database.
[ "Delete", "deletes", "the", "AuthGroup", "from", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/authgroup.xo.go#L101-L128
train
xo/xo
examples/django/sqlite3/authgroup.xo.go
Update
func (ag *AuthGroup) Update(db XODB) error { var err error // if doesn't exist, bail if !ag._exists { return errors.New("update failed: does not exist") } // if deleted, bail if ag._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE auth_group SET ` + `name = ?` + ` WHERE id = ?` // run query XOLog(sqlstr, ag.Name, ag.ID) _, err = db.Exec(sqlstr, ag.Name, ag.ID) return err }
go
func (ag *AuthGroup) Update(db XODB) error { var err error // if doesn't exist, bail if !ag._exists { return errors.New("update failed: does not exist") } // if deleted, bail if ag._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE auth_group SET ` + `name = ?` + ` WHERE id = ?` // run query XOLog(sqlstr, ag.Name, ag.ID) _, err = db.Exec(sqlstr, ag.Name, ag.ID) return err }
[ "func", "(", "ag", "*", "AuthGroup", ")", "Update", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "ag", ".", "_exists", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// if deleted, bail", "if", "ag", ".", "_deleted", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`UPDATE auth_group SET `", "+", "`name = ?`", "+", "` WHERE id = ?`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "ag", ".", "Name", ",", "ag", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "ag", ".", "Name", ",", "ag", ".", "ID", ")", "\n", "return", "err", "\n", "}" ]
// Update updates the AuthGroup in the database.
[ "Update", "updates", "the", "AuthGroup", "in", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/sqlite3/authgroup.xo.go#L66-L88
train
xo/xo
examples/django/oracle/authuser.xo.go
Delete
func (au *AuthUser) Delete(db XODB) error { var err error // if doesn't exist, bail if !au._exists { return nil } // if deleted, bail if au._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.auth_user WHERE id = :1` // run query XOLog(sqlstr, au.ID) _, err = db.Exec(sqlstr, au.ID) if err != nil { return err } // set deleted au._deleted = true return nil }
go
func (au *AuthUser) Delete(db XODB) error { var err error // if doesn't exist, bail if !au._exists { return nil } // if deleted, bail if au._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.auth_user WHERE id = :1` // run query XOLog(sqlstr, au.ID) _, err = db.Exec(sqlstr, au.ID) if err != nil { return err } // set deleted au._deleted = true return nil }
[ "func", "(", "au", "*", "AuthUser", ")", "Delete", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "au", ".", "_exists", "{", "return", "nil", "\n", "}", "\n\n", "// if deleted, bail", "if", "au", ".", "_deleted", "{", "return", "nil", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`DELETE FROM django.auth_user WHERE id = :1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "au", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "au", ".", "ID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// set deleted", "au", ".", "_deleted", "=", "true", "\n\n", "return", "nil", "\n", "}" ]
// Delete deletes the AuthUser from the database.
[ "Delete", "deletes", "the", "AuthUser", "from", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/authuser.xo.go#L111-L138
train
xo/xo
examples/django/oracle/authuser.xo.go
AuthUserByUsername
func AuthUserByUsername(db XODB, username sql.NullString) (*AuthUser, error) { var err error // sql query const sqlstr = `SELECT ` + `id, password, last_login, is_superuser, username, first_name, last_name, email, is_staff, is_active, date_joined ` + `FROM django.auth_user ` + `WHERE username = :1` // run query XOLog(sqlstr, username) au := AuthUser{ _exists: true, } err = db.QueryRow(sqlstr, username).Scan(&au.ID, &au.Password, &au.LastLogin, &au.IsSuperuser, &au.Username, &au.FirstName, &au.LastName, &au.Email, &au.IsStaff, &au.IsActive, &au.DateJoined) if err != nil { return nil, err } return &au, nil }
go
func AuthUserByUsername(db XODB, username sql.NullString) (*AuthUser, error) { var err error // sql query const sqlstr = `SELECT ` + `id, password, last_login, is_superuser, username, first_name, last_name, email, is_staff, is_active, date_joined ` + `FROM django.auth_user ` + `WHERE username = :1` // run query XOLog(sqlstr, username) au := AuthUser{ _exists: true, } err = db.QueryRow(sqlstr, username).Scan(&au.ID, &au.Password, &au.LastLogin, &au.IsSuperuser, &au.Username, &au.FirstName, &au.LastName, &au.Email, &au.IsStaff, &au.IsActive, &au.DateJoined) if err != nil { return nil, err } return &au, nil }
[ "func", "AuthUserByUsername", "(", "db", "XODB", ",", "username", "sql", ".", "NullString", ")", "(", "*", "AuthUser", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, password, last_login, is_superuser, username, first_name, last_name, email, is_staff, is_active, date_joined `", "+", "`FROM django.auth_user `", "+", "`WHERE username = :1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "username", ")", "\n", "au", ":=", "AuthUser", "{", "_exists", ":", "true", ",", "}", "\n\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "username", ")", ".", "Scan", "(", "&", "au", ".", "ID", ",", "&", "au", ".", "Password", ",", "&", "au", ".", "LastLogin", ",", "&", "au", ".", "IsSuperuser", ",", "&", "au", ".", "Username", ",", "&", "au", ".", "FirstName", ",", "&", "au", ".", "LastName", ",", "&", "au", ".", "Email", ",", "&", "au", ".", "IsStaff", ",", "&", "au", ".", "IsActive", ",", "&", "au", ".", "DateJoined", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "au", ",", "nil", "\n", "}" ]
// AuthUserByUsername retrieves a row from 'django.auth_user' as a AuthUser. // // Generated from index 'sys_c004977'.
[ "AuthUserByUsername", "retrieves", "a", "row", "from", "django", ".", "auth_user", "as", "a", "AuthUser", ".", "Generated", "from", "index", "sys_c004977", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/authuser.xo.go#L169-L190
train
xo/xo
internal/fkmode.go
UnmarshalText
func (f *FkMode) UnmarshalText(text []byte) error { switch strings.ToLower(string(text)) { case "smart", "default": *f = FkModeSmart case "parent": *f = FkModeParent case "field": *f = FkModeField case "key": *f = FkModeKey default: return errors.New("invalid FkMode") } return nil }
go
func (f *FkMode) UnmarshalText(text []byte) error { switch strings.ToLower(string(text)) { case "smart", "default": *f = FkModeSmart case "parent": *f = FkModeParent case "field": *f = FkModeField case "key": *f = FkModeKey default: return errors.New("invalid FkMode") } return nil }
[ "func", "(", "f", "*", "FkMode", ")", "UnmarshalText", "(", "text", "[", "]", "byte", ")", "error", "{", "switch", "strings", ".", "ToLower", "(", "string", "(", "text", ")", ")", "{", "case", "\"", "\"", ",", "\"", "\"", ":", "*", "f", "=", "FkModeSmart", "\n", "case", "\"", "\"", ":", "*", "f", "=", "FkModeParent", "\n", "case", "\"", "\"", ":", "*", "f", "=", "FkModeField", "\n", "case", "\"", "\"", ":", "*", "f", "=", "FkModeKey", "\n\n", "default", ":", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// UnmarshalText unmarshals FkMode from text.
[ "UnmarshalText", "unmarshals", "FkMode", "from", "text", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/internal/fkmode.go#L44-L60
train
xo/xo
internal/fkmode.go
fkName
func fkName(mode FkMode, fkMap map[string]*ForeignKey, fk *ForeignKey) string { switch mode { case FkModeParent: return fk.RefType.Name case FkModeField: return fk.RefType.Name + "By" + fk.Field.Name case FkModeKey: return fk.RefType.Name + "By" + snaker.SnakeToCamelIdentifier(fk.ForeignKey.ForeignKeyName) } // mode is FkModeSmart // inspect all foreign keys and use FkModeField if conflict found for _, f := range fkMap { if fk != f && fk.Type.Name == f.Type.Name && fk.RefType.Name == f.RefType.Name { return fkName(FkModeField, fkMap, fk) } } // no conflict, so use FkModeParent return fkName(FkModeParent, fkMap, fk) }
go
func fkName(mode FkMode, fkMap map[string]*ForeignKey, fk *ForeignKey) string { switch mode { case FkModeParent: return fk.RefType.Name case FkModeField: return fk.RefType.Name + "By" + fk.Field.Name case FkModeKey: return fk.RefType.Name + "By" + snaker.SnakeToCamelIdentifier(fk.ForeignKey.ForeignKeyName) } // mode is FkModeSmart // inspect all foreign keys and use FkModeField if conflict found for _, f := range fkMap { if fk != f && fk.Type.Name == f.Type.Name && fk.RefType.Name == f.RefType.Name { return fkName(FkModeField, fkMap, fk) } } // no conflict, so use FkModeParent return fkName(FkModeParent, fkMap, fk) }
[ "func", "fkName", "(", "mode", "FkMode", ",", "fkMap", "map", "[", "string", "]", "*", "ForeignKey", ",", "fk", "*", "ForeignKey", ")", "string", "{", "switch", "mode", "{", "case", "FkModeParent", ":", "return", "fk", ".", "RefType", ".", "Name", "\n", "case", "FkModeField", ":", "return", "fk", ".", "RefType", ".", "Name", "+", "\"", "\"", "+", "fk", ".", "Field", ".", "Name", "\n", "case", "FkModeKey", ":", "return", "fk", ".", "RefType", ".", "Name", "+", "\"", "\"", "+", "snaker", ".", "SnakeToCamelIdentifier", "(", "fk", ".", "ForeignKey", ".", "ForeignKeyName", ")", "\n", "}", "\n\n", "// mode is FkModeSmart", "// inspect all foreign keys and use FkModeField if conflict found", "for", "_", ",", "f", ":=", "range", "fkMap", "{", "if", "fk", "!=", "f", "&&", "fk", ".", "Type", ".", "Name", "==", "f", ".", "Type", ".", "Name", "&&", "fk", ".", "RefType", ".", "Name", "==", "f", ".", "RefType", ".", "Name", "{", "return", "fkName", "(", "FkModeField", ",", "fkMap", ",", "fk", ")", "\n", "}", "\n", "}", "\n\n", "// no conflict, so use FkModeParent", "return", "fkName", "(", "FkModeParent", ",", "fkMap", ",", "fk", ")", "\n", "}" ]
// fkName returns the name for the foreign key.
[ "fkName", "returns", "the", "name", "for", "the", "foreign", "key", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/internal/fkmode.go#L79-L99
train
xo/xo
internal/fkmode.go
ForeignKeyName
func (a *ArgType) ForeignKeyName(fkMap map[string]*ForeignKey, fk *ForeignKey) string { return fkName(*a.ForeignKeyMode, fkMap, fk) }
go
func (a *ArgType) ForeignKeyName(fkMap map[string]*ForeignKey, fk *ForeignKey) string { return fkName(*a.ForeignKeyMode, fkMap, fk) }
[ "func", "(", "a", "*", "ArgType", ")", "ForeignKeyName", "(", "fkMap", "map", "[", "string", "]", "*", "ForeignKey", ",", "fk", "*", "ForeignKey", ")", "string", "{", "return", "fkName", "(", "*", "a", ".", "ForeignKeyMode", ",", "fkMap", ",", "fk", ")", "\n", "}" ]
// ForeignKeyName returns the foreign key name for the passed type.
[ "ForeignKeyName", "returns", "the", "foreign", "key", "name", "for", "the", "passed", "type", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/internal/fkmode.go#L102-L104
train
xo/xo
examples/django/postgres/authuseruserpermission.xo.go
Delete
func (auup *AuthUserUserPermission) Delete(db XODB) error { var err error // if doesn't exist, bail if !auup._exists { return nil } // if deleted, bail if auup._deleted { return nil } // sql query const sqlstr = `DELETE FROM public.auth_user_user_permissions WHERE id = $1` // run query XOLog(sqlstr, auup.ID) _, err = db.Exec(sqlstr, auup.ID) if err != nil { return err } // set deleted auup._deleted = true return nil }
go
func (auup *AuthUserUserPermission) Delete(db XODB) error { var err error // if doesn't exist, bail if !auup._exists { return nil } // if deleted, bail if auup._deleted { return nil } // sql query const sqlstr = `DELETE FROM public.auth_user_user_permissions WHERE id = $1` // run query XOLog(sqlstr, auup.ID) _, err = db.Exec(sqlstr, auup.ID) if err != nil { return err } // set deleted auup._deleted = true return nil }
[ "func", "(", "auup", "*", "AuthUserUserPermission", ")", "Delete", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "auup", ".", "_exists", "{", "return", "nil", "\n", "}", "\n\n", "// if deleted, bail", "if", "auup", ".", "_deleted", "{", "return", "nil", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`DELETE FROM public.auth_user_user_permissions WHERE id = $1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "auup", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "auup", ".", "ID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// set deleted", "auup", ".", "_deleted", "=", "true", "\n\n", "return", "nil", "\n", "}" ]
// Delete deletes the AuthUserUserPermission from the database.
[ "Delete", "deletes", "the", "AuthUserUserPermission", "from", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/authuseruserpermission.xo.go#L131-L158
train
xo/xo
examples/django/postgres/authuseruserpermission.xo.go
AuthUserUserPermissionByID
func AuthUserUserPermissionByID(db XODB, id int) (*AuthUserUserPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, user_id, permission_id ` + `FROM public.auth_user_user_permissions ` + `WHERE id = $1` // run query XOLog(sqlstr, id) auup := AuthUserUserPermission{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&auup.ID, &auup.UserID, &auup.PermissionID) if err != nil { return nil, err } return &auup, nil }
go
func AuthUserUserPermissionByID(db XODB, id int) (*AuthUserUserPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, user_id, permission_id ` + `FROM public.auth_user_user_permissions ` + `WHERE id = $1` // run query XOLog(sqlstr, id) auup := AuthUserUserPermission{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&auup.ID, &auup.UserID, &auup.PermissionID) if err != nil { return nil, err } return &auup, nil }
[ "func", "AuthUserUserPermissionByID", "(", "db", "XODB", ",", "id", "int", ")", "(", "*", "AuthUserUserPermission", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, user_id, permission_id `", "+", "`FROM public.auth_user_user_permissions `", "+", "`WHERE id = $1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "id", ")", "\n", "auup", ":=", "AuthUserUserPermission", "{", "_exists", ":", "true", ",", "}", "\n\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "id", ")", ".", "Scan", "(", "&", "auup", ".", "ID", ",", "&", "auup", ".", "UserID", ",", "&", "auup", ".", "PermissionID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "auup", ",", "nil", "\n", "}" ]
// AuthUserUserPermissionByID retrieves a row from 'public.auth_user_user_permissions' as a AuthUserUserPermission. // // Generated from index 'auth_user_user_permissions_pkey'.
[ "AuthUserUserPermissionByID", "retrieves", "a", "row", "from", "public", ".", "auth_user_user_permissions", "as", "a", "AuthUserUserPermission", ".", "Generated", "from", "index", "auth_user_user_permissions_pkey", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/authuseruserpermission.xo.go#L255-L276
train
xo/xo
examples/django/oracle/authusergroup.xo.go
Delete
func (aug *AuthUserGroup) Delete(db XODB) error { var err error // if doesn't exist, bail if !aug._exists { return nil } // if deleted, bail if aug._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.auth_user_groups WHERE id = :1` // run query XOLog(sqlstr, aug.ID) _, err = db.Exec(sqlstr, aug.ID) if err != nil { return err } // set deleted aug._deleted = true return nil }
go
func (aug *AuthUserGroup) Delete(db XODB) error { var err error // if doesn't exist, bail if !aug._exists { return nil } // if deleted, bail if aug._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.auth_user_groups WHERE id = :1` // run query XOLog(sqlstr, aug.ID) _, err = db.Exec(sqlstr, aug.ID) if err != nil { return err } // set deleted aug._deleted = true return nil }
[ "func", "(", "aug", "*", "AuthUserGroup", ")", "Delete", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "aug", ".", "_exists", "{", "return", "nil", "\n", "}", "\n\n", "// if deleted, bail", "if", "aug", ".", "_deleted", "{", "return", "nil", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`DELETE FROM django.auth_user_groups WHERE id = :1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "aug", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "aug", ".", "ID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// set deleted", "aug", ".", "_deleted", "=", "true", "\n\n", "return", "nil", "\n", "}" ]
// Delete deletes the AuthUserGroup from the database.
[ "Delete", "deletes", "the", "AuthUserGroup", "from", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/authusergroup.xo.go#L99-L126
train
xo/xo
models/myenumvalue.xo.go
MyEnumValues
func MyEnumValues(db XODB, schema string, enum string) (*MyEnumValue, error) { var err error // sql query const sqlstr = `SELECT ` + `SUBSTRING(column_type, 6, CHAR_LENGTH(column_type) - 6) AS enum_values ` + `FROM information_schema.columns ` + `WHERE data_type = 'enum' AND table_schema = ? AND column_name = ?` // run query XOLog(sqlstr, schema, enum) var mev MyEnumValue err = db.QueryRow(sqlstr, schema, enum).Scan(&mev.EnumValues) if err != nil { return nil, err } return &mev, nil }
go
func MyEnumValues(db XODB, schema string, enum string) (*MyEnumValue, error) { var err error // sql query const sqlstr = `SELECT ` + `SUBSTRING(column_type, 6, CHAR_LENGTH(column_type) - 6) AS enum_values ` + `FROM information_schema.columns ` + `WHERE data_type = 'enum' AND table_schema = ? AND column_name = ?` // run query XOLog(sqlstr, schema, enum) var mev MyEnumValue err = db.QueryRow(sqlstr, schema, enum).Scan(&mev.EnumValues) if err != nil { return nil, err } return &mev, nil }
[ "func", "MyEnumValues", "(", "db", "XODB", ",", "schema", "string", ",", "enum", "string", ")", "(", "*", "MyEnumValue", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`SUBSTRING(column_type, 6, CHAR_LENGTH(column_type) - 6) AS enum_values `", "+", "`FROM information_schema.columns `", "+", "`WHERE data_type = 'enum' AND table_schema = ? AND column_name = ?`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "schema", ",", "enum", ")", "\n", "var", "mev", "MyEnumValue", "\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "schema", ",", "enum", ")", ".", "Scan", "(", "&", "mev", ".", "EnumValues", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "mev", ",", "nil", "\n", "}" ]
// MyEnumValues runs a custom query, returning results as MyEnumValue.
[ "MyEnumValues", "runs", "a", "custom", "query", "returning", "results", "as", "MyEnumValue", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/models/myenumvalue.xo.go#L12-L30
train
xo/xo
examples/django/postgres/authusergroup.xo.go
Update
func (aug *AuthUserGroup) Update(db XODB) error { var err error // if doesn't exist, bail if !aug._exists { return errors.New("update failed: does not exist") } // if deleted, bail if aug._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE public.auth_user_groups SET (` + `user_id, group_id` + `) = ( ` + `$1, $2` + `) WHERE id = $3` // run query XOLog(sqlstr, aug.UserID, aug.GroupID, aug.ID) _, err = db.Exec(sqlstr, aug.UserID, aug.GroupID, aug.ID) return err }
go
func (aug *AuthUserGroup) Update(db XODB) error { var err error // if doesn't exist, bail if !aug._exists { return errors.New("update failed: does not exist") } // if deleted, bail if aug._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE public.auth_user_groups SET (` + `user_id, group_id` + `) = ( ` + `$1, $2` + `) WHERE id = $3` // run query XOLog(sqlstr, aug.UserID, aug.GroupID, aug.ID) _, err = db.Exec(sqlstr, aug.UserID, aug.GroupID, aug.ID) return err }
[ "func", "(", "aug", "*", "AuthUserGroup", ")", "Update", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "aug", ".", "_exists", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// if deleted, bail", "if", "aug", ".", "_deleted", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`UPDATE public.auth_user_groups SET (`", "+", "`user_id, group_id`", "+", "`) = ( `", "+", "`$1, $2`", "+", "`) WHERE id = $3`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "aug", ".", "UserID", ",", "aug", ".", "GroupID", ",", "aug", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "aug", ".", "UserID", ",", "aug", ".", "GroupID", ",", "aug", ".", "ID", ")", "\n", "return", "err", "\n", "}" ]
// Update updates the AuthUserGroup in the database.
[ "Update", "updates", "the", "AuthUserGroup", "in", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/authusergroup.xo.go#L60-L84
train
xo/xo
models/column.xo.go
MyTableColumns
func MyTableColumns(db XODB, schema string, table string) ([]*Column, error) { var err error // sql query const sqlstr = `SELECT ` + `ordinal_position AS field_ordinal, ` + `column_name, ` + `IF(data_type = 'enum', column_name, column_type) AS data_type, ` + `IF(is_nullable = 'YES', false, true) AS not_null, ` + `column_default AS default_value, ` + `IF(column_key = 'PRI', true, false) AS is_primary_key ` + `FROM information_schema.columns ` + `WHERE table_schema = ? AND table_name = ? ` + `ORDER BY ordinal_position` // run query XOLog(sqlstr, schema, table) q, err := db.Query(sqlstr, schema, table) if err != nil { return nil, err } defer q.Close() // load results res := []*Column{} for q.Next() { c := Column{} // scan err = q.Scan(&c.FieldOrdinal, &c.ColumnName, &c.DataType, &c.NotNull, &c.DefaultValue, &c.IsPrimaryKey) if err != nil { return nil, err } res = append(res, &c) } return res, nil }
go
func MyTableColumns(db XODB, schema string, table string) ([]*Column, error) { var err error // sql query const sqlstr = `SELECT ` + `ordinal_position AS field_ordinal, ` + `column_name, ` + `IF(data_type = 'enum', column_name, column_type) AS data_type, ` + `IF(is_nullable = 'YES', false, true) AS not_null, ` + `column_default AS default_value, ` + `IF(column_key = 'PRI', true, false) AS is_primary_key ` + `FROM information_schema.columns ` + `WHERE table_schema = ? AND table_name = ? ` + `ORDER BY ordinal_position` // run query XOLog(sqlstr, schema, table) q, err := db.Query(sqlstr, schema, table) if err != nil { return nil, err } defer q.Close() // load results res := []*Column{} for q.Next() { c := Column{} // scan err = q.Scan(&c.FieldOrdinal, &c.ColumnName, &c.DataType, &c.NotNull, &c.DefaultValue, &c.IsPrimaryKey) if err != nil { return nil, err } res = append(res, &c) } return res, nil }
[ "func", "MyTableColumns", "(", "db", "XODB", ",", "schema", "string", ",", "table", "string", ")", "(", "[", "]", "*", "Column", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`ordinal_position AS field_ordinal, `", "+", "`column_name, `", "+", "`IF(data_type = 'enum', column_name, column_type) AS data_type, `", "+", "`IF(is_nullable = 'YES', false, true) AS not_null, `", "+", "`column_default AS default_value, `", "+", "`IF(column_key = 'PRI', true, false) AS is_primary_key `", "+", "`FROM information_schema.columns `", "+", "`WHERE table_schema = ? AND table_name = ? `", "+", "`ORDER BY ordinal_position`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "schema", ",", "table", ")", "\n", "q", ",", "err", ":=", "db", ".", "Query", "(", "sqlstr", ",", "schema", ",", "table", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "q", ".", "Close", "(", ")", "\n\n", "// load results", "res", ":=", "[", "]", "*", "Column", "{", "}", "\n", "for", "q", ".", "Next", "(", ")", "{", "c", ":=", "Column", "{", "}", "\n\n", "// scan", "err", "=", "q", ".", "Scan", "(", "&", "c", ".", "FieldOrdinal", ",", "&", "c", ".", "ColumnName", ",", "&", "c", ".", "DataType", ",", "&", "c", ".", "NotNull", ",", "&", "c", ".", "DefaultValue", ",", "&", "c", ".", "IsPrimaryKey", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "res", "=", "append", "(", "res", ",", "&", "c", ")", "\n", "}", "\n\n", "return", "res", ",", "nil", "\n", "}" ]
// MyTableColumns runs a custom query, returning results as Column.
[ "MyTableColumns", "runs", "a", "custom", "query", "returning", "results", "as", "Column", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/models/column.xo.go#L66-L104
train
gravitational/teleport
lib/auth/methods.go
AuthenticateUser
func (s *AuthServer) AuthenticateUser(req AuthenticateUserRequest) error { err := s.authenticateUser(req) if err != nil { s.EmitAuditEvent(events.UserLocalLoginFailure, events.EventFields{ events.EventUser: req.Username, events.LoginMethod: events.LoginMethodLocal, events.AuthAttemptSuccess: false, events.AuthAttemptErr: err.Error(), }) } else { s.EmitAuditEvent(events.UserLocalLogin, events.EventFields{ events.EventUser: req.Username, events.LoginMethod: events.LoginMethodLocal, events.AuthAttemptSuccess: true, }) } return err }
go
func (s *AuthServer) AuthenticateUser(req AuthenticateUserRequest) error { err := s.authenticateUser(req) if err != nil { s.EmitAuditEvent(events.UserLocalLoginFailure, events.EventFields{ events.EventUser: req.Username, events.LoginMethod: events.LoginMethodLocal, events.AuthAttemptSuccess: false, events.AuthAttemptErr: err.Error(), }) } else { s.EmitAuditEvent(events.UserLocalLogin, events.EventFields{ events.EventUser: req.Username, events.LoginMethod: events.LoginMethodLocal, events.AuthAttemptSuccess: true, }) } return err }
[ "func", "(", "s", "*", "AuthServer", ")", "AuthenticateUser", "(", "req", "AuthenticateUserRequest", ")", "error", "{", "err", ":=", "s", ".", "authenticateUser", "(", "req", ")", "\n", "if", "err", "!=", "nil", "{", "s", ".", "EmitAuditEvent", "(", "events", ".", "UserLocalLoginFailure", ",", "events", ".", "EventFields", "{", "events", ".", "EventUser", ":", "req", ".", "Username", ",", "events", ".", "LoginMethod", ":", "events", ".", "LoginMethodLocal", ",", "events", ".", "AuthAttemptSuccess", ":", "false", ",", "events", ".", "AuthAttemptErr", ":", "err", ".", "Error", "(", ")", ",", "}", ")", "\n", "}", "else", "{", "s", ".", "EmitAuditEvent", "(", "events", ".", "UserLocalLogin", ",", "events", ".", "EventFields", "{", "events", ".", "EventUser", ":", "req", ".", "Username", ",", "events", ".", "LoginMethod", ":", "events", ".", "LoginMethodLocal", ",", "events", ".", "AuthAttemptSuccess", ":", "true", ",", "}", ")", "\n", "}", "\n", "return", "err", "\n", "}" ]
// AuthenticateUser authenticates user based on the request type
[ "AuthenticateUser", "authenticates", "user", "based", "on", "the", "request", "type" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/methods.go#L85-L102
train
gravitational/teleport
lib/auth/methods.go
AuthenticateWebUser
func (s *AuthServer) AuthenticateWebUser(req AuthenticateUserRequest) (services.WebSession, error) { if req.Session != nil { session, err := s.GetWebSession(req.Username, req.Session.ID) if err != nil { return nil, trace.AccessDenied("session is invalid or has expired") } return session, nil } if err := s.AuthenticateUser(req); err != nil { return nil, trace.Wrap(err) } sess, err := s.NewWebSession(req.Username) if err != nil { return nil, trace.Wrap(err) } if err := s.UpsertWebSession(req.Username, sess); err != nil { return nil, trace.Wrap(err) } sess, err = services.GetWebSessionMarshaler().GenerateWebSession(sess) if err != nil { return nil, trace.Wrap(err) } return sess, nil }
go
func (s *AuthServer) AuthenticateWebUser(req AuthenticateUserRequest) (services.WebSession, error) { if req.Session != nil { session, err := s.GetWebSession(req.Username, req.Session.ID) if err != nil { return nil, trace.AccessDenied("session is invalid or has expired") } return session, nil } if err := s.AuthenticateUser(req); err != nil { return nil, trace.Wrap(err) } sess, err := s.NewWebSession(req.Username) if err != nil { return nil, trace.Wrap(err) } if err := s.UpsertWebSession(req.Username, sess); err != nil { return nil, trace.Wrap(err) } sess, err = services.GetWebSessionMarshaler().GenerateWebSession(sess) if err != nil { return nil, trace.Wrap(err) } return sess, nil }
[ "func", "(", "s", "*", "AuthServer", ")", "AuthenticateWebUser", "(", "req", "AuthenticateUserRequest", ")", "(", "services", ".", "WebSession", ",", "error", ")", "{", "if", "req", ".", "Session", "!=", "nil", "{", "session", ",", "err", ":=", "s", ".", "GetWebSession", "(", "req", ".", "Username", ",", "req", ".", "Session", ".", "ID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "AccessDenied", "(", "\"", "\"", ")", "\n", "}", "\n", "return", "session", ",", "nil", "\n", "}", "\n", "if", "err", ":=", "s", ".", "AuthenticateUser", "(", "req", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "sess", ",", "err", ":=", "s", ".", "NewWebSession", "(", "req", ".", "Username", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "err", ":=", "s", ".", "UpsertWebSession", "(", "req", ".", "Username", ",", "sess", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "sess", ",", "err", "=", "services", ".", "GetWebSessionMarshaler", "(", ")", ".", "GenerateWebSession", "(", "sess", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "sess", ",", "nil", "\n", "}" ]
// AuthenticateWebUser authenticates web user, creates and returns web session // in case if authentication is successful. In case if existing session id // is used to authenticate, returns session associated with the existing session id // instead of creating the new one
[ "AuthenticateWebUser", "authenticates", "web", "user", "creates", "and", "returns", "web", "session", "in", "case", "if", "authentication", "is", "successful", ".", "In", "case", "if", "existing", "session", "id", "is", "used", "to", "authenticate", "returns", "session", "associated", "with", "the", "existing", "session", "id", "instead", "of", "creating", "the", "new", "one" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/methods.go#L165-L188
train
gravitational/teleport
lib/auth/methods.go
CheckAndSetDefaults
func (a *AuthenticateSSHRequest) CheckAndSetDefaults() error { if err := a.AuthenticateUserRequest.CheckAndSetDefaults(); err != nil { return trace.Wrap(err) } if len(a.PublicKey) == 0 { return trace.BadParameter("missing parameter 'public_key'") } certificateFormat, err := utils.CheckCertificateFormatFlag(a.CompatibilityMode) if err != nil { return trace.Wrap(err) } a.CompatibilityMode = certificateFormat return nil }
go
func (a *AuthenticateSSHRequest) CheckAndSetDefaults() error { if err := a.AuthenticateUserRequest.CheckAndSetDefaults(); err != nil { return trace.Wrap(err) } if len(a.PublicKey) == 0 { return trace.BadParameter("missing parameter 'public_key'") } certificateFormat, err := utils.CheckCertificateFormatFlag(a.CompatibilityMode) if err != nil { return trace.Wrap(err) } a.CompatibilityMode = certificateFormat return nil }
[ "func", "(", "a", "*", "AuthenticateSSHRequest", ")", "CheckAndSetDefaults", "(", ")", "error", "{", "if", "err", ":=", "a", ".", "AuthenticateUserRequest", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "len", "(", "a", ".", "PublicKey", ")", "==", "0", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "certificateFormat", ",", "err", ":=", "utils", ".", "CheckCertificateFormatFlag", "(", "a", ".", "CompatibilityMode", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "a", ".", "CompatibilityMode", "=", "certificateFormat", "\n", "return", "nil", "\n", "}" ]
// CheckAndSetDefaults checks and sets default certificate values
[ "CheckAndSetDefaults", "checks", "and", "sets", "default", "certificate", "values" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/methods.go#L203-L216
train
gravitational/teleport
lib/auth/methods.go
SSHCertPublicKeys
func (c *TrustedCerts) SSHCertPublicKeys() ([]ssh.PublicKey, error) { out := make([]ssh.PublicKey, 0, len(c.HostCertificates)) for _, keyBytes := range c.HostCertificates { publicKey, _, _, _, err := ssh.ParseAuthorizedKey(keyBytes) if err != nil { return nil, trace.Wrap(err) } out = append(out, publicKey) } return out, nil }
go
func (c *TrustedCerts) SSHCertPublicKeys() ([]ssh.PublicKey, error) { out := make([]ssh.PublicKey, 0, len(c.HostCertificates)) for _, keyBytes := range c.HostCertificates { publicKey, _, _, _, err := ssh.ParseAuthorizedKey(keyBytes) if err != nil { return nil, trace.Wrap(err) } out = append(out, publicKey) } return out, nil }
[ "func", "(", "c", "*", "TrustedCerts", ")", "SSHCertPublicKeys", "(", ")", "(", "[", "]", "ssh", ".", "PublicKey", ",", "error", ")", "{", "out", ":=", "make", "(", "[", "]", "ssh", ".", "PublicKey", ",", "0", ",", "len", "(", "c", ".", "HostCertificates", ")", ")", "\n", "for", "_", ",", "keyBytes", ":=", "range", "c", ".", "HostCertificates", "{", "publicKey", ",", "_", ",", "_", ",", "_", ",", "err", ":=", "ssh", ".", "ParseAuthorizedKey", "(", "keyBytes", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "out", "=", "append", "(", "out", ",", "publicKey", ")", "\n", "}", "\n", "return", "out", ",", "nil", "\n", "}" ]
// SSHCertPublicKeys returns a list of trusted host SSH certificate authority public keys
[ "SSHCertPublicKeys", "returns", "a", "list", "of", "trusted", "host", "SSH", "certificate", "authority", "public", "keys" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/methods.go#L247-L257
train
gravitational/teleport
lib/auth/methods.go
AuthoritiesToTrustedCerts
func AuthoritiesToTrustedCerts(authorities []services.CertAuthority) []TrustedCerts { out := make([]TrustedCerts, len(authorities)) for i, ca := range authorities { out[i] = TrustedCerts{ ClusterName: ca.GetClusterName(), HostCertificates: ca.GetCheckingKeys(), TLSCertificates: services.TLSCerts(ca), } } return out }
go
func AuthoritiesToTrustedCerts(authorities []services.CertAuthority) []TrustedCerts { out := make([]TrustedCerts, len(authorities)) for i, ca := range authorities { out[i] = TrustedCerts{ ClusterName: ca.GetClusterName(), HostCertificates: ca.GetCheckingKeys(), TLSCertificates: services.TLSCerts(ca), } } return out }
[ "func", "AuthoritiesToTrustedCerts", "(", "authorities", "[", "]", "services", ".", "CertAuthority", ")", "[", "]", "TrustedCerts", "{", "out", ":=", "make", "(", "[", "]", "TrustedCerts", ",", "len", "(", "authorities", ")", ")", "\n", "for", "i", ",", "ca", ":=", "range", "authorities", "{", "out", "[", "i", "]", "=", "TrustedCerts", "{", "ClusterName", ":", "ca", ".", "GetClusterName", "(", ")", ",", "HostCertificates", ":", "ca", ".", "GetCheckingKeys", "(", ")", ",", "TLSCertificates", ":", "services", ".", "TLSCerts", "(", "ca", ")", ",", "}", "\n", "}", "\n", "return", "out", "\n", "}" ]
// AuthoritiesToTrustedCerts serializes authorities to TrustedCerts data structure
[ "AuthoritiesToTrustedCerts", "serializes", "authorities", "to", "TrustedCerts", "data", "structure" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/methods.go#L260-L270
train
gravitational/teleport
lib/auth/methods.go
AuthenticateSSHUser
func (s *AuthServer) AuthenticateSSHUser(req AuthenticateSSHRequest) (*SSHLoginResponse, error) { clusterName, err := s.GetClusterName() if err != nil { return nil, trace.Wrap(err) } if err := s.AuthenticateUser(req.AuthenticateUserRequest); err != nil { return nil, trace.Wrap(err) } user, err := s.GetUser(req.Username) if err != nil { return nil, trace.Wrap(err) } roles, err := services.FetchRoles(user.GetRoles(), s, user.GetTraits()) if err != nil { return nil, trace.Wrap(err) } // Return the host CA for this cluster only. authority, err := s.GetCertAuthority(services.CertAuthID{ Type: services.HostCA, DomainName: clusterName.GetClusterName(), }, false) if err != nil { return nil, trace.Wrap(err) } hostCertAuthorities := []services.CertAuthority{ authority, } certs, err := s.generateUserCert(certRequest{ user: user, roles: roles, ttl: req.TTL, publicKey: req.PublicKey, compatibility: req.CompatibilityMode, }) if err != nil { return nil, trace.Wrap(err) } return &SSHLoginResponse{ Username: req.Username, Cert: certs.ssh, TLSCert: certs.tls, HostSigners: AuthoritiesToTrustedCerts(hostCertAuthorities), }, nil }
go
func (s *AuthServer) AuthenticateSSHUser(req AuthenticateSSHRequest) (*SSHLoginResponse, error) { clusterName, err := s.GetClusterName() if err != nil { return nil, trace.Wrap(err) } if err := s.AuthenticateUser(req.AuthenticateUserRequest); err != nil { return nil, trace.Wrap(err) } user, err := s.GetUser(req.Username) if err != nil { return nil, trace.Wrap(err) } roles, err := services.FetchRoles(user.GetRoles(), s, user.GetTraits()) if err != nil { return nil, trace.Wrap(err) } // Return the host CA for this cluster only. authority, err := s.GetCertAuthority(services.CertAuthID{ Type: services.HostCA, DomainName: clusterName.GetClusterName(), }, false) if err != nil { return nil, trace.Wrap(err) } hostCertAuthorities := []services.CertAuthority{ authority, } certs, err := s.generateUserCert(certRequest{ user: user, roles: roles, ttl: req.TTL, publicKey: req.PublicKey, compatibility: req.CompatibilityMode, }) if err != nil { return nil, trace.Wrap(err) } return &SSHLoginResponse{ Username: req.Username, Cert: certs.ssh, TLSCert: certs.tls, HostSigners: AuthoritiesToTrustedCerts(hostCertAuthorities), }, nil }
[ "func", "(", "s", "*", "AuthServer", ")", "AuthenticateSSHUser", "(", "req", "AuthenticateSSHRequest", ")", "(", "*", "SSHLoginResponse", ",", "error", ")", "{", "clusterName", ",", "err", ":=", "s", ".", "GetClusterName", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "if", "err", ":=", "s", ".", "AuthenticateUser", "(", "req", ".", "AuthenticateUserRequest", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "user", ",", "err", ":=", "s", ".", "GetUser", "(", "req", ".", "Username", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "roles", ",", "err", ":=", "services", ".", "FetchRoles", "(", "user", ".", "GetRoles", "(", ")", ",", "s", ",", "user", ".", "GetTraits", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "// Return the host CA for this cluster only.", "authority", ",", "err", ":=", "s", ".", "GetCertAuthority", "(", "services", ".", "CertAuthID", "{", "Type", ":", "services", ".", "HostCA", ",", "DomainName", ":", "clusterName", ".", "GetClusterName", "(", ")", ",", "}", ",", "false", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "hostCertAuthorities", ":=", "[", "]", "services", ".", "CertAuthority", "{", "authority", ",", "}", "\n\n", "certs", ",", "err", ":=", "s", ".", "generateUserCert", "(", "certRequest", "{", "user", ":", "user", ",", "roles", ":", "roles", ",", "ttl", ":", "req", ".", "TTL", ",", "publicKey", ":", "req", ".", "PublicKey", ",", "compatibility", ":", "req", ".", "CompatibilityMode", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "&", "SSHLoginResponse", "{", "Username", ":", "req", ".", "Username", ",", "Cert", ":", "certs", ".", "ssh", ",", "TLSCert", ":", "certs", ".", "tls", ",", "HostSigners", ":", "AuthoritiesToTrustedCerts", "(", "hostCertAuthorities", ")", ",", "}", ",", "nil", "\n", "}" ]
// AuthenticateSSHUser authenticates web user, creates and returns web session // in case if authentication is successful
[ "AuthenticateSSHUser", "authenticates", "web", "user", "creates", "and", "returns", "web", "session", "in", "case", "if", "authentication", "is", "successful" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/methods.go#L274-L320
train
gravitational/teleport
lib/pam/pam.go
unregisterHandler
func unregisterHandler(handlerIndex int) { handlerMu.Lock() defer handlerMu.Unlock() delete(handlers, handlerIndex) }
go
func unregisterHandler(handlerIndex int) { handlerMu.Lock() defer handlerMu.Unlock() delete(handlers, handlerIndex) }
[ "func", "unregisterHandler", "(", "handlerIndex", "int", ")", "{", "handlerMu", ".", "Lock", "(", ")", "\n", "defer", "handlerMu", ".", "Unlock", "(", ")", "\n\n", "delete", "(", "handlers", ",", "handlerIndex", ")", "\n", "}" ]
// unregisterHandler will remove the PAM handle from the package level map // once no more C callbacks can come back.
[ "unregisterHandler", "will", "remove", "the", "PAM", "handle", "from", "the", "package", "level", "map", "once", "no", "more", "C", "callbacks", "can", "come", "back", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/pam/pam.go#L140-L145
train
gravitational/teleport
lib/pam/pam.go
lookupHandler
func lookupHandler(handlerIndex int) (handler, error) { handlerMu.Lock() defer handlerMu.Unlock() handle, ok := handlers[handlerIndex] if !ok { return nil, trace.BadParameter("handler with index %v not registered", handlerIndex) } return handle, nil }
go
func lookupHandler(handlerIndex int) (handler, error) { handlerMu.Lock() defer handlerMu.Unlock() handle, ok := handlers[handlerIndex] if !ok { return nil, trace.BadParameter("handler with index %v not registered", handlerIndex) } return handle, nil }
[ "func", "lookupHandler", "(", "handlerIndex", "int", ")", "(", "handler", ",", "error", ")", "{", "handlerMu", ".", "Lock", "(", ")", "\n", "defer", "handlerMu", ".", "Unlock", "(", ")", "\n\n", "handle", ",", "ok", ":=", "handlers", "[", "handlerIndex", "]", "\n", "if", "!", "ok", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "handlerIndex", ")", "\n", "}", "\n\n", "return", "handle", ",", "nil", "\n", "}" ]
// lookupHandler returns a particular handler from the package level map.
[ "lookupHandler", "returns", "a", "particular", "handler", "from", "the", "package", "level", "map", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/pam/pam.go#L148-L158
train
gravitational/teleport
lib/pam/pam.go
Open
func Open(config *Config) (*PAM, error) { if config == nil { return nil, trace.BadParameter("PAM configuration is required.") } err := config.CheckDefaults() if err != nil { return nil, trace.Wrap(err) } p := &PAM{ pamh: nil, stdin: config.Stdin, stdout: config.Stdout, stderr: config.Stderr, } // Both config.ServiceName and config.Username convert between Go strings to // C strings. Since the C strings are allocated on the heap in Go code, this // memory must be released (and will be on the call to the Close method). p.service_name = C.CString(config.ServiceName) p.user = C.CString(config.Username) // C code does not know that this PAM context exists. To ensure the // conversation function can get messages to the right context, a handle // registry at the package level is created (handlers). Each instance of the // PAM context has it's own handle which is used to communicate between C // and a instance of a PAM context. p.handlerIndex = registerHandler(p) // Create and initialize a PAM context. The pam_start function will // allocate pamh if needed and the pam_end function will release any // allocated memory. p.retval = C._pam_start(pamHandle, p.service_name, p.user, p.conv, &p.pamh) if p.retval != C.PAM_SUCCESS { return nil, p.codeToError(p.retval) } // Check that the *nix account is valid. Checking an account varies based off // the PAM modules used in the account stack. Typically this consists of // checking if the account is expired or has access restrictions. // // Note: This function does not perform any authentication! retval := C._pam_acct_mgmt(pamHandle, p.pamh, 0) if retval != C.PAM_SUCCESS { return nil, p.codeToError(retval) } // Open a user session. Opening a session varies based off the PAM modules // used in the "session" stack. Opening a session typically consists of // printing the MOTD, mounting a home directory, updating auth.log. p.retval = C._pam_open_session(pamHandle, p.pamh, 0) if p.retval != C.PAM_SUCCESS { return nil, p.codeToError(p.retval) } return p, nil }
go
func Open(config *Config) (*PAM, error) { if config == nil { return nil, trace.BadParameter("PAM configuration is required.") } err := config.CheckDefaults() if err != nil { return nil, trace.Wrap(err) } p := &PAM{ pamh: nil, stdin: config.Stdin, stdout: config.Stdout, stderr: config.Stderr, } // Both config.ServiceName and config.Username convert between Go strings to // C strings. Since the C strings are allocated on the heap in Go code, this // memory must be released (and will be on the call to the Close method). p.service_name = C.CString(config.ServiceName) p.user = C.CString(config.Username) // C code does not know that this PAM context exists. To ensure the // conversation function can get messages to the right context, a handle // registry at the package level is created (handlers). Each instance of the // PAM context has it's own handle which is used to communicate between C // and a instance of a PAM context. p.handlerIndex = registerHandler(p) // Create and initialize a PAM context. The pam_start function will // allocate pamh if needed and the pam_end function will release any // allocated memory. p.retval = C._pam_start(pamHandle, p.service_name, p.user, p.conv, &p.pamh) if p.retval != C.PAM_SUCCESS { return nil, p.codeToError(p.retval) } // Check that the *nix account is valid. Checking an account varies based off // the PAM modules used in the account stack. Typically this consists of // checking if the account is expired or has access restrictions. // // Note: This function does not perform any authentication! retval := C._pam_acct_mgmt(pamHandle, p.pamh, 0) if retval != C.PAM_SUCCESS { return nil, p.codeToError(retval) } // Open a user session. Opening a session varies based off the PAM modules // used in the "session" stack. Opening a session typically consists of // printing the MOTD, mounting a home directory, updating auth.log. p.retval = C._pam_open_session(pamHandle, p.pamh, 0) if p.retval != C.PAM_SUCCESS { return nil, p.codeToError(p.retval) } return p, nil }
[ "func", "Open", "(", "config", "*", "Config", ")", "(", "*", "PAM", ",", "error", ")", "{", "if", "config", "==", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "err", ":=", "config", ".", "CheckDefaults", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "p", ":=", "&", "PAM", "{", "pamh", ":", "nil", ",", "stdin", ":", "config", ".", "Stdin", ",", "stdout", ":", "config", ".", "Stdout", ",", "stderr", ":", "config", ".", "Stderr", ",", "}", "\n\n", "// Both config.ServiceName and config.Username convert between Go strings to", "// C strings. Since the C strings are allocated on the heap in Go code, this", "// memory must be released (and will be on the call to the Close method).", "p", ".", "service_name", "=", "C", ".", "CString", "(", "config", ".", "ServiceName", ")", "\n", "p", ".", "user", "=", "C", ".", "CString", "(", "config", ".", "Username", ")", "\n\n", "// C code does not know that this PAM context exists. To ensure the", "// conversation function can get messages to the right context, a handle", "// registry at the package level is created (handlers). Each instance of the", "// PAM context has it's own handle which is used to communicate between C", "// and a instance of a PAM context.", "p", ".", "handlerIndex", "=", "registerHandler", "(", "p", ")", "\n\n", "// Create and initialize a PAM context. The pam_start function will", "// allocate pamh if needed and the pam_end function will release any", "// allocated memory.", "p", ".", "retval", "=", "C", ".", "_pam_start", "(", "pamHandle", ",", "p", ".", "service_name", ",", "p", ".", "user", ",", "p", ".", "conv", ",", "&", "p", ".", "pamh", ")", "\n", "if", "p", ".", "retval", "!=", "C", ".", "PAM_SUCCESS", "{", "return", "nil", ",", "p", ".", "codeToError", "(", "p", ".", "retval", ")", "\n", "}", "\n\n", "// Check that the *nix account is valid. Checking an account varies based off", "// the PAM modules used in the account stack. Typically this consists of", "// checking if the account is expired or has access restrictions.", "//", "// Note: This function does not perform any authentication!", "retval", ":=", "C", ".", "_pam_acct_mgmt", "(", "pamHandle", ",", "p", ".", "pamh", ",", "0", ")", "\n", "if", "retval", "!=", "C", ".", "PAM_SUCCESS", "{", "return", "nil", ",", "p", ".", "codeToError", "(", "retval", ")", "\n", "}", "\n\n", "// Open a user session. Opening a session varies based off the PAM modules", "// used in the \"session\" stack. Opening a session typically consists of", "// printing the MOTD, mounting a home directory, updating auth.log.", "p", ".", "retval", "=", "C", ".", "_pam_open_session", "(", "pamHandle", ",", "p", ".", "pamh", ",", "0", ")", "\n", "if", "p", ".", "retval", "!=", "C", ".", "PAM_SUCCESS", "{", "return", "nil", ",", "p", ".", "codeToError", "(", "p", ".", "retval", ")", "\n", "}", "\n\n", "return", "p", ",", "nil", "\n", "}" ]
// Open creates a PAM context and initiates a PAM transaction to check the // account and then opens a session.
[ "Open", "creates", "a", "PAM", "context", "and", "initiates", "a", "PAM", "transaction", "to", "check", "the", "account", "and", "then", "opens", "a", "session", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/pam/pam.go#L215-L271
train
gravitational/teleport
lib/pam/pam.go
Close
func (p *PAM) Close() error { // Close the PAM session. Closing a session can entail anything from // unmounting a home directory and updating auth.log. p.retval = C._pam_close_session(pamHandle, p.pamh, 0) if p.retval != C.PAM_SUCCESS { return p.codeToError(p.retval) } // Terminate the PAM transaction. retval := C._pam_end(pamHandle, p.pamh, p.retval) if retval != C.PAM_SUCCESS { return p.codeToError(retval) } // Unregister handler index at the package level. unregisterHandler(p.handlerIndex) // Release the memory allocated for the conversation function. C.free(unsafe.Pointer(p.conv)) // Release strings that were allocated when opening the PAM context. C.free(unsafe.Pointer(p.service_name)) C.free(unsafe.Pointer(p.user)) return nil }
go
func (p *PAM) Close() error { // Close the PAM session. Closing a session can entail anything from // unmounting a home directory and updating auth.log. p.retval = C._pam_close_session(pamHandle, p.pamh, 0) if p.retval != C.PAM_SUCCESS { return p.codeToError(p.retval) } // Terminate the PAM transaction. retval := C._pam_end(pamHandle, p.pamh, p.retval) if retval != C.PAM_SUCCESS { return p.codeToError(retval) } // Unregister handler index at the package level. unregisterHandler(p.handlerIndex) // Release the memory allocated for the conversation function. C.free(unsafe.Pointer(p.conv)) // Release strings that were allocated when opening the PAM context. C.free(unsafe.Pointer(p.service_name)) C.free(unsafe.Pointer(p.user)) return nil }
[ "func", "(", "p", "*", "PAM", ")", "Close", "(", ")", "error", "{", "// Close the PAM session. Closing a session can entail anything from", "// unmounting a home directory and updating auth.log.", "p", ".", "retval", "=", "C", ".", "_pam_close_session", "(", "pamHandle", ",", "p", ".", "pamh", ",", "0", ")", "\n", "if", "p", ".", "retval", "!=", "C", ".", "PAM_SUCCESS", "{", "return", "p", ".", "codeToError", "(", "p", ".", "retval", ")", "\n", "}", "\n\n", "// Terminate the PAM transaction.", "retval", ":=", "C", ".", "_pam_end", "(", "pamHandle", ",", "p", ".", "pamh", ",", "p", ".", "retval", ")", "\n", "if", "retval", "!=", "C", ".", "PAM_SUCCESS", "{", "return", "p", ".", "codeToError", "(", "retval", ")", "\n", "}", "\n\n", "// Unregister handler index at the package level.", "unregisterHandler", "(", "p", ".", "handlerIndex", ")", "\n\n", "// Release the memory allocated for the conversation function.", "C", ".", "free", "(", "unsafe", ".", "Pointer", "(", "p", ".", "conv", ")", ")", "\n\n", "// Release strings that were allocated when opening the PAM context.", "C", ".", "free", "(", "unsafe", ".", "Pointer", "(", "p", ".", "service_name", ")", ")", "\n", "C", ".", "free", "(", "unsafe", ".", "Pointer", "(", "p", ".", "user", ")", ")", "\n\n", "return", "nil", "\n", "}" ]
// Close will close the session, the PAM context, and release any allocated // memory.
[ "Close", "will", "close", "the", "session", "the", "PAM", "context", "and", "release", "any", "allocated", "memory", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/pam/pam.go#L275-L300
train
gravitational/teleport
lib/pam/pam.go
codeToError
func (p *PAM) codeToError(returnValue C.int) error { // Error strings are not allocated on the heap, so memory does not need // released. err := C._pam_strerror(pamHandle, p.pamh, returnValue) if err != nil { return trace.BadParameter(C.GoString(err)) } return nil }
go
func (p *PAM) codeToError(returnValue C.int) error { // Error strings are not allocated on the heap, so memory does not need // released. err := C._pam_strerror(pamHandle, p.pamh, returnValue) if err != nil { return trace.BadParameter(C.GoString(err)) } return nil }
[ "func", "(", "p", "*", "PAM", ")", "codeToError", "(", "returnValue", "C", ".", "int", ")", "error", "{", "// Error strings are not allocated on the heap, so memory does not need", "// released.", "err", ":=", "C", ".", "_pam_strerror", "(", "pamHandle", ",", "p", ".", "pamh", ",", "returnValue", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "BadParameter", "(", "C", ".", "GoString", "(", "err", ")", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// codeToError returns a human readable string from the PAM error.
[ "codeToError", "returns", "a", "human", "readable", "string", "from", "the", "PAM", "error", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/pam/pam.go#L334-L343
train
gravitational/teleport
lib/utils/fakeconn.go
DualPipeNetConn
func DualPipeNetConn(srcAddr net.Addr, dstAddr net.Addr) (*PipeNetConn, *PipeNetConn) { server, client := net.Pipe() serverConn := NewPipeNetConn(server, server, server, dstAddr, srcAddr) clientConn := NewPipeNetConn(client, client, client, srcAddr, dstAddr) return serverConn, clientConn }
go
func DualPipeNetConn(srcAddr net.Addr, dstAddr net.Addr) (*PipeNetConn, *PipeNetConn) { server, client := net.Pipe() serverConn := NewPipeNetConn(server, server, server, dstAddr, srcAddr) clientConn := NewPipeNetConn(client, client, client, srcAddr, dstAddr) return serverConn, clientConn }
[ "func", "DualPipeNetConn", "(", "srcAddr", "net", ".", "Addr", ",", "dstAddr", "net", ".", "Addr", ")", "(", "*", "PipeNetConn", ",", "*", "PipeNetConn", ")", "{", "server", ",", "client", ":=", "net", ".", "Pipe", "(", ")", "\n\n", "serverConn", ":=", "NewPipeNetConn", "(", "server", ",", "server", ",", "server", ",", "dstAddr", ",", "srcAddr", ")", "\n", "clientConn", ":=", "NewPipeNetConn", "(", "client", ",", "client", ",", "client", ",", "srcAddr", ",", "dstAddr", ")", "\n\n", "return", "serverConn", ",", "clientConn", "\n", "}" ]
// DualPipeAddrConn creates a net.Pipe to connect a client and a server. The // two net.Conn instances are wrapped in an addrConn which holds the source and // destination addresses.
[ "DualPipeAddrConn", "creates", "a", "net", ".", "Pipe", "to", "connect", "a", "client", "and", "a", "server", ".", "The", "two", "net", ".", "Conn", "instances", "are", "wrapped", "in", "an", "addrConn", "which", "holds", "the", "source", "and", "destination", "addresses", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/fakeconn.go#L89-L96
train
gravitational/teleport
lib/services/clustername.go
NewClusterName
func NewClusterName(spec ClusterNameSpecV2) (ClusterName, error) { cn := ClusterNameV2{ Kind: KindClusterName, Version: V2, Metadata: Metadata{ Name: MetaNameClusterName, Namespace: defaults.Namespace, }, Spec: spec, } if err := cn.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } return &cn, nil }
go
func NewClusterName(spec ClusterNameSpecV2) (ClusterName, error) { cn := ClusterNameV2{ Kind: KindClusterName, Version: V2, Metadata: Metadata{ Name: MetaNameClusterName, Namespace: defaults.Namespace, }, Spec: spec, } if err := cn.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } return &cn, nil }
[ "func", "NewClusterName", "(", "spec", "ClusterNameSpecV2", ")", "(", "ClusterName", ",", "error", ")", "{", "cn", ":=", "ClusterNameV2", "{", "Kind", ":", "KindClusterName", ",", "Version", ":", "V2", ",", "Metadata", ":", "Metadata", "{", "Name", ":", "MetaNameClusterName", ",", "Namespace", ":", "defaults", ".", "Namespace", ",", "}", ",", "Spec", ":", "spec", ",", "}", "\n", "if", "err", ":=", "cn", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "&", "cn", ",", "nil", "\n", "}" ]
// NewClusterName is a convenience wrapper to create a ClusterName resource.
[ "NewClusterName", "is", "a", "convenience", "wrapper", "to", "create", "a", "ClusterName", "resource", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clustername.go#L46-L61
train
gravitational/teleport
lib/services/clustername.go
GetClusterNameSchema
func GetClusterNameSchema(extensionSchema string) string { var clusterNameSchema string if clusterNameSchema == "" { clusterNameSchema = fmt.Sprintf(ClusterNameSpecSchemaTemplate, "") } else { clusterNameSchema = fmt.Sprintf(ClusterNameSpecSchemaTemplate, ","+extensionSchema) } return fmt.Sprintf(V2SchemaTemplate, MetadataSchema, clusterNameSchema, DefaultDefinitions) }
go
func GetClusterNameSchema(extensionSchema string) string { var clusterNameSchema string if clusterNameSchema == "" { clusterNameSchema = fmt.Sprintf(ClusterNameSpecSchemaTemplate, "") } else { clusterNameSchema = fmt.Sprintf(ClusterNameSpecSchemaTemplate, ","+extensionSchema) } return fmt.Sprintf(V2SchemaTemplate, MetadataSchema, clusterNameSchema, DefaultDefinitions) }
[ "func", "GetClusterNameSchema", "(", "extensionSchema", "string", ")", "string", "{", "var", "clusterNameSchema", "string", "\n", "if", "clusterNameSchema", "==", "\"", "\"", "{", "clusterNameSchema", "=", "fmt", ".", "Sprintf", "(", "ClusterNameSpecSchemaTemplate", ",", "\"", "\"", ")", "\n", "}", "else", "{", "clusterNameSchema", "=", "fmt", ".", "Sprintf", "(", "ClusterNameSpecSchemaTemplate", ",", "\"", "\"", "+", "extensionSchema", ")", "\n", "}", "\n", "return", "fmt", ".", "Sprintf", "(", "V2SchemaTemplate", ",", "MetadataSchema", ",", "clusterNameSchema", ",", "DefaultDefinitions", ")", "\n", "}" ]
// GetClusterNameSchema returns the schema with optionally injected // schema for extensions.
[ "GetClusterNameSchema", "returns", "the", "schema", "with", "optionally", "injected", "schema", "for", "extensions", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clustername.go#L166-L174
train
gravitational/teleport
lib/services/clustername.go
Unmarshal
func (t *TeleportClusterNameMarshaler) Unmarshal(bytes []byte, opts ...MarshalOption) (ClusterName, error) { var clusterName ClusterNameV2 if len(bytes) == 0 { return nil, trace.BadParameter("missing resource data") } cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } if cfg.SkipValidation { if err := utils.FastUnmarshal(bytes, &clusterName); err != nil { return nil, trace.BadParameter(err.Error()) } } else { err = utils.UnmarshalWithSchema(GetClusterNameSchema(""), &clusterName, bytes) if err != nil { return nil, trace.BadParameter(err.Error()) } } err = clusterName.CheckAndSetDefaults() if err != nil { return nil, trace.Wrap(err) } if cfg.ID != 0 { clusterName.SetResourceID(cfg.ID) } if !cfg.Expires.IsZero() { clusterName.SetExpiry(cfg.Expires) } return &clusterName, nil }
go
func (t *TeleportClusterNameMarshaler) Unmarshal(bytes []byte, opts ...MarshalOption) (ClusterName, error) { var clusterName ClusterNameV2 if len(bytes) == 0 { return nil, trace.BadParameter("missing resource data") } cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } if cfg.SkipValidation { if err := utils.FastUnmarshal(bytes, &clusterName); err != nil { return nil, trace.BadParameter(err.Error()) } } else { err = utils.UnmarshalWithSchema(GetClusterNameSchema(""), &clusterName, bytes) if err != nil { return nil, trace.BadParameter(err.Error()) } } err = clusterName.CheckAndSetDefaults() if err != nil { return nil, trace.Wrap(err) } if cfg.ID != 0 { clusterName.SetResourceID(cfg.ID) } if !cfg.Expires.IsZero() { clusterName.SetExpiry(cfg.Expires) } return &clusterName, nil }
[ "func", "(", "t", "*", "TeleportClusterNameMarshaler", ")", "Unmarshal", "(", "bytes", "[", "]", "byte", ",", "opts", "...", "MarshalOption", ")", "(", "ClusterName", ",", "error", ")", "{", "var", "clusterName", "ClusterNameV2", "\n\n", "if", "len", "(", "bytes", ")", "==", "0", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n\n", "cfg", ",", "err", ":=", "collectOptions", "(", "opts", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "if", "cfg", ".", "SkipValidation", "{", "if", "err", ":=", "utils", ".", "FastUnmarshal", "(", "bytes", ",", "&", "clusterName", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n", "}", "else", "{", "err", "=", "utils", ".", "UnmarshalWithSchema", "(", "GetClusterNameSchema", "(", "\"", "\"", ")", ",", "&", "clusterName", ",", "bytes", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n", "}", "\n\n", "err", "=", "clusterName", ".", "CheckAndSetDefaults", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "if", "cfg", ".", "ID", "!=", "0", "{", "clusterName", ".", "SetResourceID", "(", "cfg", ".", "ID", ")", "\n", "}", "\n", "if", "!", "cfg", ".", "Expires", ".", "IsZero", "(", ")", "{", "clusterName", ".", "SetExpiry", "(", "cfg", ".", "Expires", ")", "\n", "}", "\n\n", "return", "&", "clusterName", ",", "nil", "\n", "}" ]
// Unmarshal unmarshals ClusterName from JSON.
[ "Unmarshal", "unmarshals", "ClusterName", "from", "JSON", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clustername.go#L203-L239
train
gravitational/teleport
lib/services/clustername.go
Marshal
func (t *TeleportClusterNameMarshaler) Marshal(c ClusterName, opts ...MarshalOption) ([]byte, error) { cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } switch resource := c.(type) { case *ClusterNameV2: if !cfg.PreserveResourceID { // avoid modifying the original object // to prevent unexpected data races copy := *resource copy.SetResourceID(0) resource = &copy } return utils.FastMarshal(resource) default: return nil, trace.BadParameter("unrecognized resource version %T", c) } }
go
func (t *TeleportClusterNameMarshaler) Marshal(c ClusterName, opts ...MarshalOption) ([]byte, error) { cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } switch resource := c.(type) { case *ClusterNameV2: if !cfg.PreserveResourceID { // avoid modifying the original object // to prevent unexpected data races copy := *resource copy.SetResourceID(0) resource = &copy } return utils.FastMarshal(resource) default: return nil, trace.BadParameter("unrecognized resource version %T", c) } }
[ "func", "(", "t", "*", "TeleportClusterNameMarshaler", ")", "Marshal", "(", "c", "ClusterName", ",", "opts", "...", "MarshalOption", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "cfg", ",", "err", ":=", "collectOptions", "(", "opts", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "switch", "resource", ":=", "c", ".", "(", "type", ")", "{", "case", "*", "ClusterNameV2", ":", "if", "!", "cfg", ".", "PreserveResourceID", "{", "// avoid modifying the original object", "// to prevent unexpected data races", "copy", ":=", "*", "resource", "\n", "copy", ".", "SetResourceID", "(", "0", ")", "\n", "resource", "=", "&", "copy", "\n", "}", "\n", "return", "utils", ".", "FastMarshal", "(", "resource", ")", "\n", "default", ":", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "c", ")", "\n", "}", "\n", "}" ]
// Marshal marshals ClusterName to JSON.
[ "Marshal", "marshals", "ClusterName", "to", "JSON", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clustername.go#L242-L260
train
gravitational/teleport
lib/services/trust.go
Check
func (c CertAuthType) Check() error { if c != HostCA && c != UserCA { return trace.BadParameter("'%v' authority type is not supported", c) } return nil }
go
func (c CertAuthType) Check() error { if c != HostCA && c != UserCA { return trace.BadParameter("'%v' authority type is not supported", c) } return nil }
[ "func", "(", "c", "CertAuthType", ")", "Check", "(", ")", "error", "{", "if", "c", "!=", "HostCA", "&&", "c", "!=", "UserCA", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "c", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Check checks if certificate authority type value is correct
[ "Check", "checks", "if", "certificate", "authority", "type", "value", "is", "correct" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/trust.go#L81-L86
train
gravitational/teleport
lib/services/trust.go
Check
func (c *CertAuthID) Check() error { if err := c.Type.Check(); err != nil { return trace.Wrap(err) } if strings.TrimSpace(c.DomainName) == "" { return trace.BadParameter("identity validation error: empty domain name") } return nil }
go
func (c *CertAuthID) Check() error { if err := c.Type.Check(); err != nil { return trace.Wrap(err) } if strings.TrimSpace(c.DomainName) == "" { return trace.BadParameter("identity validation error: empty domain name") } return nil }
[ "func", "(", "c", "*", "CertAuthID", ")", "Check", "(", ")", "error", "{", "if", "err", ":=", "c", ".", "Type", ".", "Check", "(", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "strings", ".", "TrimSpace", "(", "c", ".", "DomainName", ")", "==", "\"", "\"", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Check returns error if any of the id parameters are bad, nil otherwise
[ "Check", "returns", "error", "if", "any", "of", "the", "id", "parameters", "are", "bad", "nil", "otherwise" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/trust.go#L99-L107
train
gravitational/teleport
lib/services/tunnel.go
NewReverseTunnel
func NewReverseTunnel(clusterName string, dialAddrs []string) ReverseTunnel { return &ReverseTunnelV2{ Kind: KindReverseTunnel, Version: V2, Metadata: Metadata{ Name: clusterName, Namespace: defaults.Namespace, }, Spec: ReverseTunnelSpecV2{ ClusterName: clusterName, DialAddrs: dialAddrs, }, } }
go
func NewReverseTunnel(clusterName string, dialAddrs []string) ReverseTunnel { return &ReverseTunnelV2{ Kind: KindReverseTunnel, Version: V2, Metadata: Metadata{ Name: clusterName, Namespace: defaults.Namespace, }, Spec: ReverseTunnelSpecV2{ ClusterName: clusterName, DialAddrs: dialAddrs, }, } }
[ "func", "NewReverseTunnel", "(", "clusterName", "string", ",", "dialAddrs", "[", "]", "string", ")", "ReverseTunnel", "{", "return", "&", "ReverseTunnelV2", "{", "Kind", ":", "KindReverseTunnel", ",", "Version", ":", "V2", ",", "Metadata", ":", "Metadata", "{", "Name", ":", "clusterName", ",", "Namespace", ":", "defaults", ".", "Namespace", ",", "}", ",", "Spec", ":", "ReverseTunnelSpecV2", "{", "ClusterName", ":", "clusterName", ",", "DialAddrs", ":", "dialAddrs", ",", "}", ",", "}", "\n", "}" ]
// NewReverseTunnel returns new version of reverse tunnel
[ "NewReverseTunnel", "returns", "new", "version", "of", "reverse", "tunnel" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnel.go#L55-L68
train
gravitational/teleport
lib/services/tunnel.go
V2
func (r *ReverseTunnelV1) V2() *ReverseTunnelV2 { return &ReverseTunnelV2{ Kind: KindReverseTunnel, Version: V2, Metadata: Metadata{ Name: r.DomainName, Namespace: defaults.Namespace, }, Spec: ReverseTunnelSpecV2{ ClusterName: r.DomainName, Type: ProxyTunnel, DialAddrs: r.DialAddrs, }, } }
go
func (r *ReverseTunnelV1) V2() *ReverseTunnelV2 { return &ReverseTunnelV2{ Kind: KindReverseTunnel, Version: V2, Metadata: Metadata{ Name: r.DomainName, Namespace: defaults.Namespace, }, Spec: ReverseTunnelSpecV2{ ClusterName: r.DomainName, Type: ProxyTunnel, DialAddrs: r.DialAddrs, }, } }
[ "func", "(", "r", "*", "ReverseTunnelV1", ")", "V2", "(", ")", "*", "ReverseTunnelV2", "{", "return", "&", "ReverseTunnelV2", "{", "Kind", ":", "KindReverseTunnel", ",", "Version", ":", "V2", ",", "Metadata", ":", "Metadata", "{", "Name", ":", "r", ".", "DomainName", ",", "Namespace", ":", "defaults", ".", "Namespace", ",", "}", ",", "Spec", ":", "ReverseTunnelSpecV2", "{", "ClusterName", ":", "r", ".", "DomainName", ",", "Type", ":", "ProxyTunnel", ",", "DialAddrs", ":", "r", ".", "DialAddrs", ",", "}", ",", "}", "\n", "}" ]
// V2 returns V2 version of reverse tunnel
[ "V2", "returns", "V2", "version", "of", "reverse", "tunnel" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnel.go#L240-L254
train
gravitational/teleport
lib/services/tunnel.go
UnmarshalReverseTunnel
func UnmarshalReverseTunnel(data []byte, opts ...MarshalOption) (ReverseTunnel, error) { if len(data) == 0 { return nil, trace.BadParameter("missing tunnel data") } var h ResourceHeader err := json.Unmarshal(data, &h) if err != nil { return nil, trace.Wrap(err) } cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } switch h.Version { case "": var r ReverseTunnelV1 err := json.Unmarshal(data, &r) if err != nil { return nil, trace.Wrap(err) } v2 := r.V2() if cfg.ID != 0 { v2.SetResourceID(cfg.ID) } return r.V2(), nil case V2: var r ReverseTunnelV2 if cfg.SkipValidation { if err := utils.FastUnmarshal(data, &r); err != nil { return nil, trace.BadParameter(err.Error()) } } else { if err := utils.UnmarshalWithSchema(GetReverseTunnelSchema(), &r, data); err != nil { return nil, trace.BadParameter(err.Error()) } } if err := r.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } if cfg.ID != 0 { r.SetResourceID(cfg.ID) } if !cfg.Expires.IsZero() { r.SetExpiry(cfg.Expires) } return &r, nil } return nil, trace.BadParameter("reverse tunnel version %v is not supported", h.Version) }
go
func UnmarshalReverseTunnel(data []byte, opts ...MarshalOption) (ReverseTunnel, error) { if len(data) == 0 { return nil, trace.BadParameter("missing tunnel data") } var h ResourceHeader err := json.Unmarshal(data, &h) if err != nil { return nil, trace.Wrap(err) } cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } switch h.Version { case "": var r ReverseTunnelV1 err := json.Unmarshal(data, &r) if err != nil { return nil, trace.Wrap(err) } v2 := r.V2() if cfg.ID != 0 { v2.SetResourceID(cfg.ID) } return r.V2(), nil case V2: var r ReverseTunnelV2 if cfg.SkipValidation { if err := utils.FastUnmarshal(data, &r); err != nil { return nil, trace.BadParameter(err.Error()) } } else { if err := utils.UnmarshalWithSchema(GetReverseTunnelSchema(), &r, data); err != nil { return nil, trace.BadParameter(err.Error()) } } if err := r.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } if cfg.ID != 0 { r.SetResourceID(cfg.ID) } if !cfg.Expires.IsZero() { r.SetExpiry(cfg.Expires) } return &r, nil } return nil, trace.BadParameter("reverse tunnel version %v is not supported", h.Version) }
[ "func", "UnmarshalReverseTunnel", "(", "data", "[", "]", "byte", ",", "opts", "...", "MarshalOption", ")", "(", "ReverseTunnel", ",", "error", ")", "{", "if", "len", "(", "data", ")", "==", "0", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "var", "h", "ResourceHeader", "\n", "err", ":=", "json", ".", "Unmarshal", "(", "data", ",", "&", "h", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "cfg", ",", "err", ":=", "collectOptions", "(", "opts", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "switch", "h", ".", "Version", "{", "case", "\"", "\"", ":", "var", "r", "ReverseTunnelV1", "\n", "err", ":=", "json", ".", "Unmarshal", "(", "data", ",", "&", "r", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "v2", ":=", "r", ".", "V2", "(", ")", "\n", "if", "cfg", ".", "ID", "!=", "0", "{", "v2", ".", "SetResourceID", "(", "cfg", ".", "ID", ")", "\n", "}", "\n", "return", "r", ".", "V2", "(", ")", ",", "nil", "\n", "case", "V2", ":", "var", "r", "ReverseTunnelV2", "\n", "if", "cfg", ".", "SkipValidation", "{", "if", "err", ":=", "utils", ".", "FastUnmarshal", "(", "data", ",", "&", "r", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n", "}", "else", "{", "if", "err", ":=", "utils", ".", "UnmarshalWithSchema", "(", "GetReverseTunnelSchema", "(", ")", ",", "&", "r", ",", "data", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n", "}", "\n", "if", "err", ":=", "r", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "cfg", ".", "ID", "!=", "0", "{", "r", ".", "SetResourceID", "(", "cfg", ".", "ID", ")", "\n", "}", "\n", "if", "!", "cfg", ".", "Expires", ".", "IsZero", "(", ")", "{", "r", ".", "SetExpiry", "(", "cfg", ".", "Expires", ")", "\n", "}", "\n", "return", "&", "r", ",", "nil", "\n", "}", "\n", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "h", ".", "Version", ")", "\n", "}" ]
// UnmarshalReverseTunnel unmarshals reverse tunnel from JSON or YAML, // sets defaults and checks the schema
[ "UnmarshalReverseTunnel", "unmarshals", "reverse", "tunnel", "from", "JSON", "or", "YAML", "sets", "defaults", "and", "checks", "the", "schema" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnel.go#L264-L313
train
gravitational/teleport
lib/services/tunnel.go
UnmarshalReverseTunnel
func (*TeleportTunnelMarshaler) UnmarshalReverseTunnel(bytes []byte, opts ...MarshalOption) (ReverseTunnel, error) { return UnmarshalReverseTunnel(bytes, opts...) }
go
func (*TeleportTunnelMarshaler) UnmarshalReverseTunnel(bytes []byte, opts ...MarshalOption) (ReverseTunnel, error) { return UnmarshalReverseTunnel(bytes, opts...) }
[ "func", "(", "*", "TeleportTunnelMarshaler", ")", "UnmarshalReverseTunnel", "(", "bytes", "[", "]", "byte", ",", "opts", "...", "MarshalOption", ")", "(", "ReverseTunnel", ",", "error", ")", "{", "return", "UnmarshalReverseTunnel", "(", "bytes", ",", "opts", "...", ")", "\n", "}" ]
// UnmarshalReverseTunnel unmarshals reverse tunnel from JSON or YAML
[ "UnmarshalReverseTunnel", "unmarshals", "reverse", "tunnel", "from", "JSON", "or", "YAML" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnel.go#L340-L342
train
gravitational/teleport
lib/services/tunnel.go
MarshalReverseTunnel
func (*TeleportTunnelMarshaler) MarshalReverseTunnel(rt ReverseTunnel, opts ...MarshalOption) ([]byte, error) { cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } type tunv1 interface { V1() *ReverseTunnelV1 } type tunv2 interface { V2() *ReverseTunnelV2 } version := cfg.GetVersion() switch version { case V1: v, ok := rt.(tunv1) if !ok { return nil, trace.BadParameter("don't know how to marshal %v", V1) } return json.Marshal(v.V1()) case V2: v, ok := rt.(tunv2) if !ok { return nil, trace.BadParameter("don't know how to marshal %v", V2) } v2 := v.V2() if !cfg.PreserveResourceID { // avoid modifying the original object // to prevent unexpected data races copy := *v2 copy.SetResourceID(0) v2 = &copy } return utils.FastMarshal(v2) default: return nil, trace.BadParameter("version %v is not supported", version) } }
go
func (*TeleportTunnelMarshaler) MarshalReverseTunnel(rt ReverseTunnel, opts ...MarshalOption) ([]byte, error) { cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } type tunv1 interface { V1() *ReverseTunnelV1 } type tunv2 interface { V2() *ReverseTunnelV2 } version := cfg.GetVersion() switch version { case V1: v, ok := rt.(tunv1) if !ok { return nil, trace.BadParameter("don't know how to marshal %v", V1) } return json.Marshal(v.V1()) case V2: v, ok := rt.(tunv2) if !ok { return nil, trace.BadParameter("don't know how to marshal %v", V2) } v2 := v.V2() if !cfg.PreserveResourceID { // avoid modifying the original object // to prevent unexpected data races copy := *v2 copy.SetResourceID(0) v2 = &copy } return utils.FastMarshal(v2) default: return nil, trace.BadParameter("version %v is not supported", version) } }
[ "func", "(", "*", "TeleportTunnelMarshaler", ")", "MarshalReverseTunnel", "(", "rt", "ReverseTunnel", ",", "opts", "...", "MarshalOption", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "cfg", ",", "err", ":=", "collectOptions", "(", "opts", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "type", "tunv1", "interface", "{", "V1", "(", ")", "*", "ReverseTunnelV1", "\n", "}", "\n", "type", "tunv2", "interface", "{", "V2", "(", ")", "*", "ReverseTunnelV2", "\n", "}", "\n", "version", ":=", "cfg", ".", "GetVersion", "(", ")", "\n", "switch", "version", "{", "case", "V1", ":", "v", ",", "ok", ":=", "rt", ".", "(", "tunv1", ")", "\n", "if", "!", "ok", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "V1", ")", "\n", "}", "\n", "return", "json", ".", "Marshal", "(", "v", ".", "V1", "(", ")", ")", "\n", "case", "V2", ":", "v", ",", "ok", ":=", "rt", ".", "(", "tunv2", ")", "\n", "if", "!", "ok", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "V2", ")", "\n", "}", "\n", "v2", ":=", "v", ".", "V2", "(", ")", "\n", "if", "!", "cfg", ".", "PreserveResourceID", "{", "// avoid modifying the original object", "// to prevent unexpected data races", "copy", ":=", "*", "v2", "\n", "copy", ".", "SetResourceID", "(", "0", ")", "\n", "v2", "=", "&", "copy", "\n", "}", "\n", "return", "utils", ".", "FastMarshal", "(", "v2", ")", "\n", "default", ":", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "version", ")", "\n", "}", "\n", "}" ]
// MarshalRole marshalls role into JSON
[ "MarshalRole", "marshalls", "role", "into", "JSON" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnel.go#L345-L381
train
gravitational/teleport
lib/utils/syslog.go
SwitchLoggingtoSyslog
func SwitchLoggingtoSyslog() error { log.StandardLogger().SetHooks(make(log.LevelHooks)) hook, err := logrusSyslog.NewSyslogHook("", "", syslog.LOG_WARNING, "") if err != nil { // syslog is not available log.SetOutput(os.Stderr) return trace.Wrap(err) } log.AddHook(hook) // ... and disable stderr: log.SetOutput(ioutil.Discard) return nil }
go
func SwitchLoggingtoSyslog() error { log.StandardLogger().SetHooks(make(log.LevelHooks)) hook, err := logrusSyslog.NewSyslogHook("", "", syslog.LOG_WARNING, "") if err != nil { // syslog is not available log.SetOutput(os.Stderr) return trace.Wrap(err) } log.AddHook(hook) // ... and disable stderr: log.SetOutput(ioutil.Discard) return nil }
[ "func", "SwitchLoggingtoSyslog", "(", ")", "error", "{", "log", ".", "StandardLogger", "(", ")", ".", "SetHooks", "(", "make", "(", "log", ".", "LevelHooks", ")", ")", "\n", "hook", ",", "err", ":=", "logrusSyslog", ".", "NewSyslogHook", "(", "\"", "\"", ",", "\"", "\"", ",", "syslog", ".", "LOG_WARNING", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "// syslog is not available", "log", ".", "SetOutput", "(", "os", ".", "Stderr", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "log", ".", "AddHook", "(", "hook", ")", "\n", "// ... and disable stderr:", "log", ".", "SetOutput", "(", "ioutil", ".", "Discard", ")", "\n", "return", "nil", "\n", "}" ]
// SwitchLoggingtoSyslog tells the logger to send the output to syslog. This // code is behind a build flag because Windows does not support syslog.
[ "SwitchLoggingtoSyslog", "tells", "the", "logger", "to", "send", "the", "output", "to", "syslog", ".", "This", "code", "is", "behind", "a", "build", "flag", "because", "Windows", "does", "not", "support", "syslog", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/syslog.go#L33-L45
train
gravitational/teleport
lib/auth/rotate.go
Types
func (r *RotateRequest) Types() []services.CertAuthType { switch r.Type { case "": return []services.CertAuthType{services.HostCA, services.UserCA} case services.HostCA: return []services.CertAuthType{services.HostCA} case services.UserCA: return []services.CertAuthType{services.UserCA} } return nil }
go
func (r *RotateRequest) Types() []services.CertAuthType { switch r.Type { case "": return []services.CertAuthType{services.HostCA, services.UserCA} case services.HostCA: return []services.CertAuthType{services.HostCA} case services.UserCA: return []services.CertAuthType{services.UserCA} } return nil }
[ "func", "(", "r", "*", "RotateRequest", ")", "Types", "(", ")", "[", "]", "services", ".", "CertAuthType", "{", "switch", "r", ".", "Type", "{", "case", "\"", "\"", ":", "return", "[", "]", "services", ".", "CertAuthType", "{", "services", ".", "HostCA", ",", "services", ".", "UserCA", "}", "\n", "case", "services", ".", "HostCA", ":", "return", "[", "]", "services", ".", "CertAuthType", "{", "services", ".", "HostCA", "}", "\n", "case", "services", ".", "UserCA", ":", "return", "[", "]", "services", ".", "CertAuthType", "{", "services", ".", "UserCA", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Types returns cert authority types requested to be rotated.
[ "Types", "returns", "cert", "authority", "types", "requested", "to", "be", "rotated", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L61-L71
train
gravitational/teleport
lib/auth/rotate.go
CheckAndSetDefaults
func (r *RotateRequest) CheckAndSetDefaults(clock clockwork.Clock) error { if r.TargetPhase == "" { // if phase if not set, imply that the first meaningful phase // is set as a target phase r.TargetPhase = services.RotationPhaseInit } // if mode is not set, default to manual (as it's safer) if r.Mode == "" { r.Mode = services.RotationModeManual } switch r.Type { case "", services.HostCA, services.UserCA: default: return trace.BadParameter("unsupported certificate authority type: %q", r.Type) } if r.GracePeriod == nil { period := defaults.RotationGracePeriod r.GracePeriod = &period } if r.Schedule == nil { var err error r.Schedule, err = services.GenerateSchedule(clock, *r.GracePeriod) if err != nil { return trace.Wrap(err) } } else { if err := r.Schedule.CheckAndSetDefaults(clock); err != nil { return trace.Wrap(err) } } return nil }
go
func (r *RotateRequest) CheckAndSetDefaults(clock clockwork.Clock) error { if r.TargetPhase == "" { // if phase if not set, imply that the first meaningful phase // is set as a target phase r.TargetPhase = services.RotationPhaseInit } // if mode is not set, default to manual (as it's safer) if r.Mode == "" { r.Mode = services.RotationModeManual } switch r.Type { case "", services.HostCA, services.UserCA: default: return trace.BadParameter("unsupported certificate authority type: %q", r.Type) } if r.GracePeriod == nil { period := defaults.RotationGracePeriod r.GracePeriod = &period } if r.Schedule == nil { var err error r.Schedule, err = services.GenerateSchedule(clock, *r.GracePeriod) if err != nil { return trace.Wrap(err) } } else { if err := r.Schedule.CheckAndSetDefaults(clock); err != nil { return trace.Wrap(err) } } return nil }
[ "func", "(", "r", "*", "RotateRequest", ")", "CheckAndSetDefaults", "(", "clock", "clockwork", ".", "Clock", ")", "error", "{", "if", "r", ".", "TargetPhase", "==", "\"", "\"", "{", "// if phase if not set, imply that the first meaningful phase", "// is set as a target phase", "r", ".", "TargetPhase", "=", "services", ".", "RotationPhaseInit", "\n", "}", "\n", "// if mode is not set, default to manual (as it's safer)", "if", "r", ".", "Mode", "==", "\"", "\"", "{", "r", ".", "Mode", "=", "services", ".", "RotationModeManual", "\n", "}", "\n", "switch", "r", ".", "Type", "{", "case", "\"", "\"", ",", "services", ".", "HostCA", ",", "services", ".", "UserCA", ":", "default", ":", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "r", ".", "Type", ")", "\n", "}", "\n", "if", "r", ".", "GracePeriod", "==", "nil", "{", "period", ":=", "defaults", ".", "RotationGracePeriod", "\n", "r", ".", "GracePeriod", "=", "&", "period", "\n", "}", "\n", "if", "r", ".", "Schedule", "==", "nil", "{", "var", "err", "error", "\n", "r", ".", "Schedule", ",", "err", "=", "services", ".", "GenerateSchedule", "(", "clock", ",", "*", "r", ".", "GracePeriod", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "else", "{", "if", "err", ":=", "r", ".", "Schedule", ".", "CheckAndSetDefaults", "(", "clock", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// CheckAndSetDefaults checks and sets default values.
[ "CheckAndSetDefaults", "checks", "and", "sets", "default", "values", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L74-L105
train
gravitational/teleport
lib/auth/rotate.go
RotateExternalCertAuthority
func (a *AuthServer) RotateExternalCertAuthority(ca services.CertAuthority) error { if ca == nil { return trace.BadParameter("missing certificate authority") } clusterName, err := a.GetClusterName() if err != nil { return trace.Wrap(err) } // this is just an extra precaution against local admins, // because this is additionally enforced by RBAC as well if ca.GetClusterName() == clusterName.GetClusterName() { return trace.BadParameter("can not rotate local certificate authority") } existing, err := a.Trust.GetCertAuthority(services.CertAuthID{ Type: ca.GetType(), DomainName: ca.GetClusterName(), }, false) if err != nil { return trace.Wrap(err) } updated := existing.Clone() updated.SetCheckingKeys(ca.GetCheckingKeys()) updated.SetTLSKeyPairs(ca.GetTLSKeyPairs()) updated.SetRotation(ca.GetRotation()) // use compare and swap to protect from concurrent updates // by trusted cluster API if err := a.CompareAndSwapCertAuthority(updated, existing); err != nil { return trace.Wrap(err) } return nil }
go
func (a *AuthServer) RotateExternalCertAuthority(ca services.CertAuthority) error { if ca == nil { return trace.BadParameter("missing certificate authority") } clusterName, err := a.GetClusterName() if err != nil { return trace.Wrap(err) } // this is just an extra precaution against local admins, // because this is additionally enforced by RBAC as well if ca.GetClusterName() == clusterName.GetClusterName() { return trace.BadParameter("can not rotate local certificate authority") } existing, err := a.Trust.GetCertAuthority(services.CertAuthID{ Type: ca.GetType(), DomainName: ca.GetClusterName(), }, false) if err != nil { return trace.Wrap(err) } updated := existing.Clone() updated.SetCheckingKeys(ca.GetCheckingKeys()) updated.SetTLSKeyPairs(ca.GetTLSKeyPairs()) updated.SetRotation(ca.GetRotation()) // use compare and swap to protect from concurrent updates // by trusted cluster API if err := a.CompareAndSwapCertAuthority(updated, existing); err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "a", "*", "AuthServer", ")", "RotateExternalCertAuthority", "(", "ca", "services", ".", "CertAuthority", ")", "error", "{", "if", "ca", "==", "nil", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "clusterName", ",", "err", ":=", "a", ".", "GetClusterName", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "// this is just an extra precaution against local admins,", "// because this is additionally enforced by RBAC as well", "if", "ca", ".", "GetClusterName", "(", ")", "==", "clusterName", ".", "GetClusterName", "(", ")", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n\n", "existing", ",", "err", ":=", "a", ".", "Trust", ".", "GetCertAuthority", "(", "services", ".", "CertAuthID", "{", "Type", ":", "ca", ".", "GetType", "(", ")", ",", "DomainName", ":", "ca", ".", "GetClusterName", "(", ")", ",", "}", ",", "false", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "updated", ":=", "existing", ".", "Clone", "(", ")", "\n", "updated", ".", "SetCheckingKeys", "(", "ca", ".", "GetCheckingKeys", "(", ")", ")", "\n", "updated", ".", "SetTLSKeyPairs", "(", "ca", ".", "GetTLSKeyPairs", "(", ")", ")", "\n", "updated", ".", "SetRotation", "(", "ca", ".", "GetRotation", "(", ")", ")", "\n\n", "// use compare and swap to protect from concurrent updates", "// by trusted cluster API", "if", "err", ":=", "a", ".", "CompareAndSwapCertAuthority", "(", "updated", ",", "existing", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// RotateExternalCertAuthority rotates external certificate authority, // this method is called by remote trusted cluster and is used to update // only public keys and certificates of the certificate authority.
[ "RotateExternalCertAuthority", "rotates", "external", "certificate", "authority", "this", "method", "is", "called", "by", "remote", "trusted", "cluster", "and", "is", "used", "to", "update", "only", "public", "keys", "and", "certificates", "of", "the", "certificate", "authority", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L245-L280
train
gravitational/teleport
lib/auth/rotate.go
autoRotateCertAuthorities
func (a *AuthServer) autoRotateCertAuthorities() error { clusterName, err := a.GetClusterName() if err != nil { return trace.Wrap(err) } for _, caType := range []services.CertAuthType{services.HostCA, services.UserCA} { ca, err := a.Trust.GetCertAuthority(services.CertAuthID{ Type: caType, DomainName: clusterName.GetClusterName(), }, true) if err != nil { return trace.Wrap(err) } if err := a.autoRotate(ca); err != nil { return trace.Wrap(err) } } return nil }
go
func (a *AuthServer) autoRotateCertAuthorities() error { clusterName, err := a.GetClusterName() if err != nil { return trace.Wrap(err) } for _, caType := range []services.CertAuthType{services.HostCA, services.UserCA} { ca, err := a.Trust.GetCertAuthority(services.CertAuthID{ Type: caType, DomainName: clusterName.GetClusterName(), }, true) if err != nil { return trace.Wrap(err) } if err := a.autoRotate(ca); err != nil { return trace.Wrap(err) } } return nil }
[ "func", "(", "a", "*", "AuthServer", ")", "autoRotateCertAuthorities", "(", ")", "error", "{", "clusterName", ",", "err", ":=", "a", ".", "GetClusterName", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "for", "_", ",", "caType", ":=", "range", "[", "]", "services", ".", "CertAuthType", "{", "services", ".", "HostCA", ",", "services", ".", "UserCA", "}", "{", "ca", ",", "err", ":=", "a", ".", "Trust", ".", "GetCertAuthority", "(", "services", ".", "CertAuthID", "{", "Type", ":", "caType", ",", "DomainName", ":", "clusterName", ".", "GetClusterName", "(", ")", ",", "}", ",", "true", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "err", ":=", "a", ".", "autoRotate", "(", "ca", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// autoRotateCertAuthorities automatically rotates cert authorities, // does nothing if no rotation parameters were set up // or it is too early to rotate per schedule
[ "autoRotateCertAuthorities", "automatically", "rotates", "cert", "authorities", "does", "nothing", "if", "no", "rotation", "parameters", "were", "set", "up", "or", "it", "is", "too", "early", "to", "rotate", "per", "schedule" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L285-L303
train
gravitational/teleport
lib/auth/rotate.go
processRotationRequest
func processRotationRequest(req rotationReq) (services.CertAuthority, error) { rotation := req.ca.GetRotation() ca := req.ca.Clone() switch req.targetPhase { case services.RotationPhaseInit: // This is the first stage of the rotation - new certificate authorities // are being generated, but no components are using them yet switch rotation.State { case services.RotationStateStandby, "": default: return nil, trace.BadParameter("can not initate rotation while another is in progress") } if err := startNewRotation(req, ca); err != nil { return nil, trace.Wrap(err) } return ca, nil case services.RotationPhaseUpdateClients: // Update client phase clients will start using new credentials // and servers will use the existing credentials, but will trust clients // with both old and new credentials. if rotation.Phase != services.RotationPhaseInit { return nil, trace.BadParameter( "can only switch to phase %v from %v, current phase is %v", services.RotationPhaseUpdateClients, services.RotationPhaseInit, rotation.Phase) } if err := updateClients(ca, req.mode); err != nil { return nil, trace.Wrap(err) } return ca, nil case services.RotationPhaseUpdateServers: // Update server phase uses the new credentials both for servers // and clients, but still trusts clients with old credentials. if rotation.Phase != services.RotationPhaseUpdateClients { return nil, trace.BadParameter( "can only switch to phase %v from %v, current phase is %v", services.RotationPhaseUpdateServers, services.RotationPhaseUpdateClients, rotation.Phase) } // Signal nodes to restart and start serving new signatures // by updating the phase. rotation.Phase = req.targetPhase rotation.Mode = req.mode ca.SetRotation(rotation) return ca, nil case services.RotationPhaseRollback: // Rollback moves back both clients and servers to use the old credentials // but will trust new credentials. switch rotation.Phase { case services.RotationPhaseInit, services.RotationPhaseUpdateClients, services.RotationPhaseUpdateServers: if err := startRollingBackRotation(ca); err != nil { return nil, trace.Wrap(err) } return ca, nil default: return nil, trace.BadParameter("can not transition to phase %q from %q phase.", req.targetPhase, rotation.Phase) } case services.RotationPhaseStandby: // Transition to the standby phase moves rotation process // to standby, servers will only trust one certificate authority. switch rotation.Phase { case services.RotationPhaseUpdateServers, services.RotationPhaseRollback: if err := completeRotation(req.clock, ca); err != nil { return nil, trace.Wrap(err) } return ca, nil default: return nil, trace.BadParameter( "can only switch to phase %v from %v, current phase is %v", services.RotationPhaseUpdateServers, services.RotationPhaseUpdateClients, rotation.Phase) } default: return nil, trace.BadParameter("unsupported phase: %q", req.targetPhase) } }
go
func processRotationRequest(req rotationReq) (services.CertAuthority, error) { rotation := req.ca.GetRotation() ca := req.ca.Clone() switch req.targetPhase { case services.RotationPhaseInit: // This is the first stage of the rotation - new certificate authorities // are being generated, but no components are using them yet switch rotation.State { case services.RotationStateStandby, "": default: return nil, trace.BadParameter("can not initate rotation while another is in progress") } if err := startNewRotation(req, ca); err != nil { return nil, trace.Wrap(err) } return ca, nil case services.RotationPhaseUpdateClients: // Update client phase clients will start using new credentials // and servers will use the existing credentials, but will trust clients // with both old and new credentials. if rotation.Phase != services.RotationPhaseInit { return nil, trace.BadParameter( "can only switch to phase %v from %v, current phase is %v", services.RotationPhaseUpdateClients, services.RotationPhaseInit, rotation.Phase) } if err := updateClients(ca, req.mode); err != nil { return nil, trace.Wrap(err) } return ca, nil case services.RotationPhaseUpdateServers: // Update server phase uses the new credentials both for servers // and clients, but still trusts clients with old credentials. if rotation.Phase != services.RotationPhaseUpdateClients { return nil, trace.BadParameter( "can only switch to phase %v from %v, current phase is %v", services.RotationPhaseUpdateServers, services.RotationPhaseUpdateClients, rotation.Phase) } // Signal nodes to restart and start serving new signatures // by updating the phase. rotation.Phase = req.targetPhase rotation.Mode = req.mode ca.SetRotation(rotation) return ca, nil case services.RotationPhaseRollback: // Rollback moves back both clients and servers to use the old credentials // but will trust new credentials. switch rotation.Phase { case services.RotationPhaseInit, services.RotationPhaseUpdateClients, services.RotationPhaseUpdateServers: if err := startRollingBackRotation(ca); err != nil { return nil, trace.Wrap(err) } return ca, nil default: return nil, trace.BadParameter("can not transition to phase %q from %q phase.", req.targetPhase, rotation.Phase) } case services.RotationPhaseStandby: // Transition to the standby phase moves rotation process // to standby, servers will only trust one certificate authority. switch rotation.Phase { case services.RotationPhaseUpdateServers, services.RotationPhaseRollback: if err := completeRotation(req.clock, ca); err != nil { return nil, trace.Wrap(err) } return ca, nil default: return nil, trace.BadParameter( "can only switch to phase %v from %v, current phase is %v", services.RotationPhaseUpdateServers, services.RotationPhaseUpdateClients, rotation.Phase) } default: return nil, trace.BadParameter("unsupported phase: %q", req.targetPhase) } }
[ "func", "processRotationRequest", "(", "req", "rotationReq", ")", "(", "services", ".", "CertAuthority", ",", "error", ")", "{", "rotation", ":=", "req", ".", "ca", ".", "GetRotation", "(", ")", "\n", "ca", ":=", "req", ".", "ca", ".", "Clone", "(", ")", "\n\n", "switch", "req", ".", "targetPhase", "{", "case", "services", ".", "RotationPhaseInit", ":", "// This is the first stage of the rotation - new certificate authorities", "// are being generated, but no components are using them yet", "switch", "rotation", ".", "State", "{", "case", "services", ".", "RotationStateStandby", ",", "\"", "\"", ":", "default", ":", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "err", ":=", "startNewRotation", "(", "req", ",", "ca", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "ca", ",", "nil", "\n", "case", "services", ".", "RotationPhaseUpdateClients", ":", "// Update client phase clients will start using new credentials", "// and servers will use the existing credentials, but will trust clients", "// with both old and new credentials.", "if", "rotation", ".", "Phase", "!=", "services", ".", "RotationPhaseInit", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "services", ".", "RotationPhaseUpdateClients", ",", "services", ".", "RotationPhaseInit", ",", "rotation", ".", "Phase", ")", "\n", "}", "\n", "if", "err", ":=", "updateClients", "(", "ca", ",", "req", ".", "mode", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "ca", ",", "nil", "\n", "case", "services", ".", "RotationPhaseUpdateServers", ":", "// Update server phase uses the new credentials both for servers", "// and clients, but still trusts clients with old credentials.", "if", "rotation", ".", "Phase", "!=", "services", ".", "RotationPhaseUpdateClients", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "services", ".", "RotationPhaseUpdateServers", ",", "services", ".", "RotationPhaseUpdateClients", ",", "rotation", ".", "Phase", ")", "\n", "}", "\n", "// Signal nodes to restart and start serving new signatures", "// by updating the phase.", "rotation", ".", "Phase", "=", "req", ".", "targetPhase", "\n", "rotation", ".", "Mode", "=", "req", ".", "mode", "\n", "ca", ".", "SetRotation", "(", "rotation", ")", "\n", "return", "ca", ",", "nil", "\n", "case", "services", ".", "RotationPhaseRollback", ":", "// Rollback moves back both clients and servers to use the old credentials", "// but will trust new credentials.", "switch", "rotation", ".", "Phase", "{", "case", "services", ".", "RotationPhaseInit", ",", "services", ".", "RotationPhaseUpdateClients", ",", "services", ".", "RotationPhaseUpdateServers", ":", "if", "err", ":=", "startRollingBackRotation", "(", "ca", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "ca", ",", "nil", "\n", "default", ":", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "req", ".", "targetPhase", ",", "rotation", ".", "Phase", ")", "\n", "}", "\n", "case", "services", ".", "RotationPhaseStandby", ":", "// Transition to the standby phase moves rotation process", "// to standby, servers will only trust one certificate authority.", "switch", "rotation", ".", "Phase", "{", "case", "services", ".", "RotationPhaseUpdateServers", ",", "services", ".", "RotationPhaseRollback", ":", "if", "err", ":=", "completeRotation", "(", "req", ".", "clock", ",", "ca", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "ca", ",", "nil", "\n", "default", ":", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "services", ".", "RotationPhaseUpdateServers", ",", "services", ".", "RotationPhaseUpdateClients", ",", "rotation", ".", "Phase", ")", "\n", "}", "\n", "default", ":", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "req", ".", "targetPhase", ")", "\n", "}", "\n", "}" ]
// processRotationRequest processes rotation request based on the target and // current phase and state.
[ "processRotationRequest", "processes", "rotation", "request", "based", "on", "the", "target", "and", "current", "phase", "and", "state", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L371-L450
train
gravitational/teleport
lib/auth/rotate.go
startRollingBackRotation
func startRollingBackRotation(ca services.CertAuthority) error { rotation := ca.GetRotation() // Rollback always sets rotation to manual mode. rotation.Mode = services.RotationModeManual signingKeys := ca.GetSigningKeys() checkingKeys := ca.GetCheckingKeys() keyPairs := ca.GetTLSKeyPairs() // Rotation sets the first key to be the new key // and keep only public keys/certs for the new CA. signingKeys = [][]byte{signingKeys[1]} checkingKeys = [][]byte{checkingKeys[1]} // Keep the new certificate as trusted // as during the rollback phase, both types of clients may be present in the cluster. keyPairs = []services.TLSKeyPair{keyPairs[1], services.TLSKeyPair{Cert: keyPairs[0].Cert}} rotation.State = services.RotationStateInProgress rotation.Phase = services.RotationPhaseRollback ca.SetSigningKeys(signingKeys) ca.SetCheckingKeys(checkingKeys) ca.SetTLSKeyPairs(keyPairs) ca.SetRotation(rotation) return nil }
go
func startRollingBackRotation(ca services.CertAuthority) error { rotation := ca.GetRotation() // Rollback always sets rotation to manual mode. rotation.Mode = services.RotationModeManual signingKeys := ca.GetSigningKeys() checkingKeys := ca.GetCheckingKeys() keyPairs := ca.GetTLSKeyPairs() // Rotation sets the first key to be the new key // and keep only public keys/certs for the new CA. signingKeys = [][]byte{signingKeys[1]} checkingKeys = [][]byte{checkingKeys[1]} // Keep the new certificate as trusted // as during the rollback phase, both types of clients may be present in the cluster. keyPairs = []services.TLSKeyPair{keyPairs[1], services.TLSKeyPair{Cert: keyPairs[0].Cert}} rotation.State = services.RotationStateInProgress rotation.Phase = services.RotationPhaseRollback ca.SetSigningKeys(signingKeys) ca.SetCheckingKeys(checkingKeys) ca.SetTLSKeyPairs(keyPairs) ca.SetRotation(rotation) return nil }
[ "func", "startRollingBackRotation", "(", "ca", "services", ".", "CertAuthority", ")", "error", "{", "rotation", ":=", "ca", ".", "GetRotation", "(", ")", "\n\n", "// Rollback always sets rotation to manual mode.", "rotation", ".", "Mode", "=", "services", ".", "RotationModeManual", "\n\n", "signingKeys", ":=", "ca", ".", "GetSigningKeys", "(", ")", "\n", "checkingKeys", ":=", "ca", ".", "GetCheckingKeys", "(", ")", "\n", "keyPairs", ":=", "ca", ".", "GetTLSKeyPairs", "(", ")", "\n\n", "// Rotation sets the first key to be the new key", "// and keep only public keys/certs for the new CA.", "signingKeys", "=", "[", "]", "[", "]", "byte", "{", "signingKeys", "[", "1", "]", "}", "\n", "checkingKeys", "=", "[", "]", "[", "]", "byte", "{", "checkingKeys", "[", "1", "]", "}", "\n\n", "// Keep the new certificate as trusted", "// as during the rollback phase, both types of clients may be present in the cluster.", "keyPairs", "=", "[", "]", "services", ".", "TLSKeyPair", "{", "keyPairs", "[", "1", "]", ",", "services", ".", "TLSKeyPair", "{", "Cert", ":", "keyPairs", "[", "0", "]", ".", "Cert", "}", "}", "\n", "rotation", ".", "State", "=", "services", ".", "RotationStateInProgress", "\n", "rotation", ".", "Phase", "=", "services", ".", "RotationPhaseRollback", "\n\n", "ca", ".", "SetSigningKeys", "(", "signingKeys", ")", "\n", "ca", ".", "SetCheckingKeys", "(", "checkingKeys", ")", "\n", "ca", ".", "SetTLSKeyPairs", "(", "keyPairs", ")", "\n", "ca", ".", "SetRotation", "(", "rotation", ")", "\n", "return", "nil", "\n", "}" ]
// startRollingBackRotation starts roll back to the original state.
[ "startRollingBackRotation", "starts", "roll", "back", "to", "the", "original", "state", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L575-L601
train
gravitational/teleport
lib/auth/rotate.go
completeRollingBackRotation
func completeRollingBackRotation(clock clockwork.Clock, ca services.CertAuthority) error { rotation := ca.GetRotation() // clean up the state rotation.Started = time.Time{} rotation.State = services.RotationStateStandby rotation.Phase = services.RotationPhaseStandby rotation.Mode = "" rotation.Schedule = services.RotationSchedule{} keyPairs := ca.GetTLSKeyPairs() // only keep the original certificate authority as trusted // and remove everything else. keyPairs = []services.TLSKeyPair{keyPairs[0]} ca.SetTLSKeyPairs(keyPairs) ca.SetRotation(rotation) return nil }
go
func completeRollingBackRotation(clock clockwork.Clock, ca services.CertAuthority) error { rotation := ca.GetRotation() // clean up the state rotation.Started = time.Time{} rotation.State = services.RotationStateStandby rotation.Phase = services.RotationPhaseStandby rotation.Mode = "" rotation.Schedule = services.RotationSchedule{} keyPairs := ca.GetTLSKeyPairs() // only keep the original certificate authority as trusted // and remove everything else. keyPairs = []services.TLSKeyPair{keyPairs[0]} ca.SetTLSKeyPairs(keyPairs) ca.SetRotation(rotation) return nil }
[ "func", "completeRollingBackRotation", "(", "clock", "clockwork", ".", "Clock", ",", "ca", "services", ".", "CertAuthority", ")", "error", "{", "rotation", ":=", "ca", ".", "GetRotation", "(", ")", "\n\n", "// clean up the state", "rotation", ".", "Started", "=", "time", ".", "Time", "{", "}", "\n", "rotation", ".", "State", "=", "services", ".", "RotationStateStandby", "\n", "rotation", ".", "Phase", "=", "services", ".", "RotationPhaseStandby", "\n", "rotation", ".", "Mode", "=", "\"", "\"", "\n", "rotation", ".", "Schedule", "=", "services", ".", "RotationSchedule", "{", "}", "\n\n", "keyPairs", ":=", "ca", ".", "GetTLSKeyPairs", "(", ")", "\n", "// only keep the original certificate authority as trusted", "// and remove everything else.", "keyPairs", "=", "[", "]", "services", ".", "TLSKeyPair", "{", "keyPairs", "[", "0", "]", "}", "\n\n", "ca", ".", "SetTLSKeyPairs", "(", "keyPairs", ")", "\n", "ca", ".", "SetRotation", "(", "rotation", ")", "\n", "return", "nil", "\n", "}" ]
// completeRollingBackRotation completes rollback of the rotation and sets it to the standby state
[ "completeRollingBackRotation", "completes", "rollback", "of", "the", "rotation", "and", "sets", "it", "to", "the", "standby", "state" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L604-L622
train
gravitational/teleport
lib/auth/rotate.go
completeRotation
func completeRotation(clock clockwork.Clock, ca services.CertAuthority) error { rotation := ca.GetRotation() signingKeys := ca.GetSigningKeys() checkingKeys := ca.GetCheckingKeys() keyPairs := ca.GetTLSKeyPairs() signingKeys = signingKeys[:1] checkingKeys = checkingKeys[:1] keyPairs = keyPairs[:1] rotation.Started = time.Time{} rotation.State = services.RotationStateStandby rotation.Phase = services.RotationPhaseStandby rotation.LastRotated = clock.Now() rotation.Mode = "" rotation.Schedule = services.RotationSchedule{} ca.SetSigningKeys(signingKeys) ca.SetCheckingKeys(checkingKeys) ca.SetTLSKeyPairs(keyPairs) ca.SetRotation(rotation) return nil }
go
func completeRotation(clock clockwork.Clock, ca services.CertAuthority) error { rotation := ca.GetRotation() signingKeys := ca.GetSigningKeys() checkingKeys := ca.GetCheckingKeys() keyPairs := ca.GetTLSKeyPairs() signingKeys = signingKeys[:1] checkingKeys = checkingKeys[:1] keyPairs = keyPairs[:1] rotation.Started = time.Time{} rotation.State = services.RotationStateStandby rotation.Phase = services.RotationPhaseStandby rotation.LastRotated = clock.Now() rotation.Mode = "" rotation.Schedule = services.RotationSchedule{} ca.SetSigningKeys(signingKeys) ca.SetCheckingKeys(checkingKeys) ca.SetTLSKeyPairs(keyPairs) ca.SetRotation(rotation) return nil }
[ "func", "completeRotation", "(", "clock", "clockwork", ".", "Clock", ",", "ca", "services", ".", "CertAuthority", ")", "error", "{", "rotation", ":=", "ca", ".", "GetRotation", "(", ")", "\n", "signingKeys", ":=", "ca", ".", "GetSigningKeys", "(", ")", "\n", "checkingKeys", ":=", "ca", ".", "GetCheckingKeys", "(", ")", "\n", "keyPairs", ":=", "ca", ".", "GetTLSKeyPairs", "(", ")", "\n\n", "signingKeys", "=", "signingKeys", "[", ":", "1", "]", "\n", "checkingKeys", "=", "checkingKeys", "[", ":", "1", "]", "\n", "keyPairs", "=", "keyPairs", "[", ":", "1", "]", "\n\n", "rotation", ".", "Started", "=", "time", ".", "Time", "{", "}", "\n", "rotation", ".", "State", "=", "services", ".", "RotationStateStandby", "\n", "rotation", ".", "Phase", "=", "services", ".", "RotationPhaseStandby", "\n", "rotation", ".", "LastRotated", "=", "clock", ".", "Now", "(", ")", "\n", "rotation", ".", "Mode", "=", "\"", "\"", "\n", "rotation", ".", "Schedule", "=", "services", ".", "RotationSchedule", "{", "}", "\n\n", "ca", ".", "SetSigningKeys", "(", "signingKeys", ")", "\n", "ca", ".", "SetCheckingKeys", "(", "checkingKeys", ")", "\n", "ca", ".", "SetTLSKeyPairs", "(", "keyPairs", ")", "\n", "ca", ".", "SetRotation", "(", "rotation", ")", "\n", "return", "nil", "\n", "}" ]
// completeRotation completes the certificate authority rotation.
[ "completeRotation", "completes", "the", "certificate", "authority", "rotation", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L625-L647
train
gravitational/teleport
lib/utils/unpack.go
Extract
func Extract(r io.Reader, dir string) error { tarball := tar.NewReader(r) for { header, err := tarball.Next() if err == io.EOF { break } else if err != nil { return trace.Wrap(err) } if err := extractFile(tarball, header, dir); err != nil { return trace.Wrap(err) } } return nil }
go
func Extract(r io.Reader, dir string) error { tarball := tar.NewReader(r) for { header, err := tarball.Next() if err == io.EOF { break } else if err != nil { return trace.Wrap(err) } if err := extractFile(tarball, header, dir); err != nil { return trace.Wrap(err) } } return nil }
[ "func", "Extract", "(", "r", "io", ".", "Reader", ",", "dir", "string", ")", "error", "{", "tarball", ":=", "tar", ".", "NewReader", "(", "r", ")", "\n\n", "for", "{", "header", ",", "err", ":=", "tarball", ".", "Next", "(", ")", "\n", "if", "err", "==", "io", ".", "EOF", "{", "break", "\n", "}", "else", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "if", "err", ":=", "extractFile", "(", "tarball", ",", "header", ",", "dir", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Extract extracts the contents of the specified tarball under dir. // The resulting files and directories are created using the current user context.
[ "Extract", "extracts", "the", "contents", "of", "the", "specified", "tarball", "under", "dir", ".", "The", "resulting", "files", "and", "directories", "are", "created", "using", "the", "current", "user", "context", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/unpack.go#L33-L49
train
gravitational/teleport
lib/utils/rand.go
CryptoRandomHex
func CryptoRandomHex(len int) (string, error) { randomBytes := make([]byte, len) if _, err := rand.Reader.Read(randomBytes); err != nil { return "", trace.Wrap(err) } return hex.EncodeToString(randomBytes), nil }
go
func CryptoRandomHex(len int) (string, error) { randomBytes := make([]byte, len) if _, err := rand.Reader.Read(randomBytes); err != nil { return "", trace.Wrap(err) } return hex.EncodeToString(randomBytes), nil }
[ "func", "CryptoRandomHex", "(", "len", "int", ")", "(", "string", ",", "error", ")", "{", "randomBytes", ":=", "make", "(", "[", "]", "byte", ",", "len", ")", "\n", "if", "_", ",", "err", ":=", "rand", ".", "Reader", ".", "Read", "(", "randomBytes", ")", ";", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "hex", ".", "EncodeToString", "(", "randomBytes", ")", ",", "nil", "\n", "}" ]
// CryptoRandomHex returns hex encoded random string generated with crypto-strong // pseudo random generator of the given bytes
[ "CryptoRandomHex", "returns", "hex", "encoded", "random", "string", "generated", "with", "crypto", "-", "strong", "pseudo", "random", "generator", "of", "the", "given", "bytes" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/rand.go#L30-L36
train
gravitational/teleport
lib/utils/rand.go
RandomDuration
func RandomDuration(max time.Duration) time.Duration { randomVal, err := rand.Int(rand.Reader, big.NewInt(int64(max))) if err != nil { return max / 2 } return time.Duration(randomVal.Int64()) }
go
func RandomDuration(max time.Duration) time.Duration { randomVal, err := rand.Int(rand.Reader, big.NewInt(int64(max))) if err != nil { return max / 2 } return time.Duration(randomVal.Int64()) }
[ "func", "RandomDuration", "(", "max", "time", ".", "Duration", ")", "time", ".", "Duration", "{", "randomVal", ",", "err", ":=", "rand", ".", "Int", "(", "rand", ".", "Reader", ",", "big", ".", "NewInt", "(", "int64", "(", "max", ")", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "max", "/", "2", "\n", "}", "\n", "return", "time", ".", "Duration", "(", "randomVal", ".", "Int64", "(", ")", ")", "\n", "}" ]
// RandomDuration returns a duration in a range [0, max)
[ "RandomDuration", "returns", "a", "duration", "in", "a", "range", "[", "0", "max", ")" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/rand.go#L39-L45
train
gravitational/teleport
lib/services/suite/suite.go
NewServer
func NewServer(kind, name, addr, namespace string) *services.ServerV2 { return &services.ServerV2{ Kind: kind, Version: services.V2, Metadata: services.Metadata{ Name: name, Namespace: namespace, }, Spec: services.ServerSpecV2{ Addr: addr, PublicAddr: addr, }, } }
go
func NewServer(kind, name, addr, namespace string) *services.ServerV2 { return &services.ServerV2{ Kind: kind, Version: services.V2, Metadata: services.Metadata{ Name: name, Namespace: namespace, }, Spec: services.ServerSpecV2{ Addr: addr, PublicAddr: addr, }, } }
[ "func", "NewServer", "(", "kind", ",", "name", ",", "addr", ",", "namespace", "string", ")", "*", "services", ".", "ServerV2", "{", "return", "&", "services", ".", "ServerV2", "{", "Kind", ":", "kind", ",", "Version", ":", "services", ".", "V2", ",", "Metadata", ":", "services", ".", "Metadata", "{", "Name", ":", "name", ",", "Namespace", ":", "namespace", ",", "}", ",", "Spec", ":", "services", ".", "ServerSpecV2", "{", "Addr", ":", "addr", ",", "PublicAddr", ":", "addr", ",", "}", ",", "}", "\n", "}" ]
// NewServer creates a new server resource
[ "NewServer", "creates", "a", "new", "server", "resource" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/suite/suite.go#L302-L315
train
gravitational/teleport
lib/services/suite/suite.go
AuthPreference
func (s *ServicesTestSuite) AuthPreference(c *check.C) { ap, err := services.NewAuthPreference(services.AuthPreferenceSpecV2{ Type: "local", SecondFactor: "otp", }) c.Assert(err, check.IsNil) err = s.ConfigS.SetAuthPreference(ap) c.Assert(err, check.IsNil) gotAP, err := s.ConfigS.GetAuthPreference() c.Assert(err, check.IsNil) c.Assert(gotAP.GetType(), check.Equals, "local") c.Assert(gotAP.GetSecondFactor(), check.Equals, "otp") }
go
func (s *ServicesTestSuite) AuthPreference(c *check.C) { ap, err := services.NewAuthPreference(services.AuthPreferenceSpecV2{ Type: "local", SecondFactor: "otp", }) c.Assert(err, check.IsNil) err = s.ConfigS.SetAuthPreference(ap) c.Assert(err, check.IsNil) gotAP, err := s.ConfigS.GetAuthPreference() c.Assert(err, check.IsNil) c.Assert(gotAP.GetType(), check.Equals, "local") c.Assert(gotAP.GetSecondFactor(), check.Equals, "otp") }
[ "func", "(", "s", "*", "ServicesTestSuite", ")", "AuthPreference", "(", "c", "*", "check", ".", "C", ")", "{", "ap", ",", "err", ":=", "services", ".", "NewAuthPreference", "(", "services", ".", "AuthPreferenceSpecV2", "{", "Type", ":", "\"", "\"", ",", "SecondFactor", ":", "\"", "\"", ",", "}", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "err", "=", "s", ".", "ConfigS", ".", "SetAuthPreference", "(", "ap", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "gotAP", ",", "err", ":=", "s", ".", "ConfigS", ".", "GetAuthPreference", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "c", ".", "Assert", "(", "gotAP", ".", "GetType", "(", ")", ",", "check", ".", "Equals", ",", "\"", "\"", ")", "\n", "c", ".", "Assert", "(", "gotAP", ".", "GetSecondFactor", "(", ")", ",", "check", ".", "Equals", ",", "\"", "\"", ")", "\n", "}" ]
// AuthPreference tests authentication preference service
[ "AuthPreference", "tests", "authentication", "preference", "service" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/suite/suite.go#L890-L905
train
gravitational/teleport
lib/services/suite/suite.go
CollectOptions
func CollectOptions(opts ...SuiteOption) SuiteOptions { var suiteOpts SuiteOptions for _, o := range opts { o(&suiteOpts) } return suiteOpts }
go
func CollectOptions(opts ...SuiteOption) SuiteOptions { var suiteOpts SuiteOptions for _, o := range opts { o(&suiteOpts) } return suiteOpts }
[ "func", "CollectOptions", "(", "opts", "...", "SuiteOption", ")", "SuiteOptions", "{", "var", "suiteOpts", "SuiteOptions", "\n", "for", "_", ",", "o", ":=", "range", "opts", "{", "o", "(", "&", "suiteOpts", ")", "\n", "}", "\n", "return", "suiteOpts", "\n", "}" ]
// CollectOptions collects suite options
[ "CollectOptions", "collects", "suite", "options" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/suite/suite.go#L953-L959
train
gravitational/teleport
lib/services/suite/suite.go
ClusterConfig
func (s *ServicesTestSuite) ClusterConfig(c *check.C, opts ...SuiteOption) { config, err := services.NewClusterConfig(services.ClusterConfigSpecV3{ ClientIdleTimeout: services.NewDuration(17 * time.Second), DisconnectExpiredCert: services.NewBool(true), ClusterID: "27", SessionRecording: services.RecordAtProxy, Audit: services.AuditConfig{ Region: "us-west-1", Type: "dynamodb", AuditSessionsURI: "file:///home/log", AuditTableName: "audit_table_name", AuditEventsURI: []string{"dynamodb://audit_table_name", "file:///home/log"}, }, }) c.Assert(err, check.IsNil) err = s.ConfigS.SetClusterConfig(config) c.Assert(err, check.IsNil) gotConfig, err := s.ConfigS.GetClusterConfig() c.Assert(err, check.IsNil) config.SetResourceID(gotConfig.GetResourceID()) fixtures.DeepCompare(c, config, gotConfig) // Some parts (e.g. auth server) will not function // without cluster name or cluster config if CollectOptions(opts...).SkipDelete { return } err = s.ConfigS.DeleteClusterConfig() c.Assert(err, check.IsNil) _, err = s.ConfigS.GetClusterConfig() fixtures.ExpectNotFound(c, err) clusterName, err := services.NewClusterName(services.ClusterNameSpecV2{ ClusterName: "example.com", }) c.Assert(err, check.IsNil) err = s.ConfigS.SetClusterName(clusterName) c.Assert(err, check.IsNil) gotName, err := s.ConfigS.GetClusterName() c.Assert(err, check.IsNil) clusterName.SetResourceID(gotName.GetResourceID()) fixtures.DeepCompare(c, clusterName, gotName) err = s.ConfigS.DeleteClusterName() c.Assert(err, check.IsNil) _, err = s.ConfigS.GetClusterName() fixtures.ExpectNotFound(c, err) err = s.ConfigS.UpsertClusterName(clusterName) c.Assert(err, check.IsNil) gotName, err = s.ConfigS.GetClusterName() c.Assert(err, check.IsNil) clusterName.SetResourceID(gotName.GetResourceID()) fixtures.DeepCompare(c, clusterName, gotName) }
go
func (s *ServicesTestSuite) ClusterConfig(c *check.C, opts ...SuiteOption) { config, err := services.NewClusterConfig(services.ClusterConfigSpecV3{ ClientIdleTimeout: services.NewDuration(17 * time.Second), DisconnectExpiredCert: services.NewBool(true), ClusterID: "27", SessionRecording: services.RecordAtProxy, Audit: services.AuditConfig{ Region: "us-west-1", Type: "dynamodb", AuditSessionsURI: "file:///home/log", AuditTableName: "audit_table_name", AuditEventsURI: []string{"dynamodb://audit_table_name", "file:///home/log"}, }, }) c.Assert(err, check.IsNil) err = s.ConfigS.SetClusterConfig(config) c.Assert(err, check.IsNil) gotConfig, err := s.ConfigS.GetClusterConfig() c.Assert(err, check.IsNil) config.SetResourceID(gotConfig.GetResourceID()) fixtures.DeepCompare(c, config, gotConfig) // Some parts (e.g. auth server) will not function // without cluster name or cluster config if CollectOptions(opts...).SkipDelete { return } err = s.ConfigS.DeleteClusterConfig() c.Assert(err, check.IsNil) _, err = s.ConfigS.GetClusterConfig() fixtures.ExpectNotFound(c, err) clusterName, err := services.NewClusterName(services.ClusterNameSpecV2{ ClusterName: "example.com", }) c.Assert(err, check.IsNil) err = s.ConfigS.SetClusterName(clusterName) c.Assert(err, check.IsNil) gotName, err := s.ConfigS.GetClusterName() c.Assert(err, check.IsNil) clusterName.SetResourceID(gotName.GetResourceID()) fixtures.DeepCompare(c, clusterName, gotName) err = s.ConfigS.DeleteClusterName() c.Assert(err, check.IsNil) _, err = s.ConfigS.GetClusterName() fixtures.ExpectNotFound(c, err) err = s.ConfigS.UpsertClusterName(clusterName) c.Assert(err, check.IsNil) gotName, err = s.ConfigS.GetClusterName() c.Assert(err, check.IsNil) clusterName.SetResourceID(gotName.GetResourceID()) fixtures.DeepCompare(c, clusterName, gotName) }
[ "func", "(", "s", "*", "ServicesTestSuite", ")", "ClusterConfig", "(", "c", "*", "check", ".", "C", ",", "opts", "...", "SuiteOption", ")", "{", "config", ",", "err", ":=", "services", ".", "NewClusterConfig", "(", "services", ".", "ClusterConfigSpecV3", "{", "ClientIdleTimeout", ":", "services", ".", "NewDuration", "(", "17", "*", "time", ".", "Second", ")", ",", "DisconnectExpiredCert", ":", "services", ".", "NewBool", "(", "true", ")", ",", "ClusterID", ":", "\"", "\"", ",", "SessionRecording", ":", "services", ".", "RecordAtProxy", ",", "Audit", ":", "services", ".", "AuditConfig", "{", "Region", ":", "\"", "\"", ",", "Type", ":", "\"", "\"", ",", "AuditSessionsURI", ":", "\"", "\"", ",", "AuditTableName", ":", "\"", "\"", ",", "AuditEventsURI", ":", "[", "]", "string", "{", "\"", "\"", ",", "\"", "\"", "}", ",", "}", ",", "}", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "err", "=", "s", ".", "ConfigS", ".", "SetClusterConfig", "(", "config", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "gotConfig", ",", "err", ":=", "s", ".", "ConfigS", ".", "GetClusterConfig", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n", "config", ".", "SetResourceID", "(", "gotConfig", ".", "GetResourceID", "(", ")", ")", "\n", "fixtures", ".", "DeepCompare", "(", "c", ",", "config", ",", "gotConfig", ")", "\n\n", "// Some parts (e.g. auth server) will not function", "// without cluster name or cluster config", "if", "CollectOptions", "(", "opts", "...", ")", ".", "SkipDelete", "{", "return", "\n", "}", "\n", "err", "=", "s", ".", "ConfigS", ".", "DeleteClusterConfig", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "_", ",", "err", "=", "s", ".", "ConfigS", ".", "GetClusterConfig", "(", ")", "\n", "fixtures", ".", "ExpectNotFound", "(", "c", ",", "err", ")", "\n\n", "clusterName", ",", "err", ":=", "services", ".", "NewClusterName", "(", "services", ".", "ClusterNameSpecV2", "{", "ClusterName", ":", "\"", "\"", ",", "}", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "err", "=", "s", ".", "ConfigS", ".", "SetClusterName", "(", "clusterName", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "gotName", ",", "err", ":=", "s", ".", "ConfigS", ".", "GetClusterName", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n", "clusterName", ".", "SetResourceID", "(", "gotName", ".", "GetResourceID", "(", ")", ")", "\n", "fixtures", ".", "DeepCompare", "(", "c", ",", "clusterName", ",", "gotName", ")", "\n\n", "err", "=", "s", ".", "ConfigS", ".", "DeleteClusterName", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "_", ",", "err", "=", "s", ".", "ConfigS", ".", "GetClusterName", "(", ")", "\n", "fixtures", ".", "ExpectNotFound", "(", "c", ",", "err", ")", "\n\n", "err", "=", "s", ".", "ConfigS", ".", "UpsertClusterName", "(", "clusterName", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "gotName", ",", "err", "=", "s", ".", "ConfigS", ".", "GetClusterName", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n", "clusterName", ".", "SetResourceID", "(", "gotName", ".", "GetResourceID", "(", ")", ")", "\n", "fixtures", ".", "DeepCompare", "(", "c", ",", "clusterName", ",", "gotName", ")", "\n", "}" ]
// ClusterConfig tests cluster configuration
[ "ClusterConfig", "tests", "cluster", "configuration" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/suite/suite.go#L962-L1023
train
gravitational/teleport
lib/services/suite/suite.go
EventsClusterConfig
func (s *ServicesTestSuite) EventsClusterConfig(c *check.C) { testCases := []eventTest{ { name: "Cluster config", kind: services.WatchKind{ Kind: services.KindClusterConfig, }, crud: func() services.Resource { config, err := services.NewClusterConfig(services.ClusterConfigSpecV3{}) c.Assert(err, check.IsNil) err = s.ConfigS.SetClusterConfig(config) c.Assert(err, check.IsNil) out, err := s.ConfigS.GetClusterConfig() c.Assert(err, check.IsNil) err = s.ConfigS.DeleteClusterConfig() c.Assert(err, check.IsNil) return out }, }, { name: "Cluster name", kind: services.WatchKind{ Kind: services.KindClusterName, }, crud: func() services.Resource { clusterName, err := services.NewClusterName(services.ClusterNameSpecV2{ ClusterName: "example.com", }) c.Assert(err, check.IsNil) err = s.ConfigS.SetClusterName(clusterName) c.Assert(err, check.IsNil) out, err := s.ConfigS.GetClusterName() c.Assert(err, check.IsNil) err = s.ConfigS.DeleteClusterName() c.Assert(err, check.IsNil) return out }, }, } s.runEventsTests(c, testCases) }
go
func (s *ServicesTestSuite) EventsClusterConfig(c *check.C) { testCases := []eventTest{ { name: "Cluster config", kind: services.WatchKind{ Kind: services.KindClusterConfig, }, crud: func() services.Resource { config, err := services.NewClusterConfig(services.ClusterConfigSpecV3{}) c.Assert(err, check.IsNil) err = s.ConfigS.SetClusterConfig(config) c.Assert(err, check.IsNil) out, err := s.ConfigS.GetClusterConfig() c.Assert(err, check.IsNil) err = s.ConfigS.DeleteClusterConfig() c.Assert(err, check.IsNil) return out }, }, { name: "Cluster name", kind: services.WatchKind{ Kind: services.KindClusterName, }, crud: func() services.Resource { clusterName, err := services.NewClusterName(services.ClusterNameSpecV2{ ClusterName: "example.com", }) c.Assert(err, check.IsNil) err = s.ConfigS.SetClusterName(clusterName) c.Assert(err, check.IsNil) out, err := s.ConfigS.GetClusterName() c.Assert(err, check.IsNil) err = s.ConfigS.DeleteClusterName() c.Assert(err, check.IsNil) return out }, }, } s.runEventsTests(c, testCases) }
[ "func", "(", "s", "*", "ServicesTestSuite", ")", "EventsClusterConfig", "(", "c", "*", "check", ".", "C", ")", "{", "testCases", ":=", "[", "]", "eventTest", "{", "{", "name", ":", "\"", "\"", ",", "kind", ":", "services", ".", "WatchKind", "{", "Kind", ":", "services", ".", "KindClusterConfig", ",", "}", ",", "crud", ":", "func", "(", ")", "services", ".", "Resource", "{", "config", ",", "err", ":=", "services", ".", "NewClusterConfig", "(", "services", ".", "ClusterConfigSpecV3", "{", "}", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "err", "=", "s", ".", "ConfigS", ".", "SetClusterConfig", "(", "config", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "out", ",", "err", ":=", "s", ".", "ConfigS", ".", "GetClusterConfig", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "err", "=", "s", ".", "ConfigS", ".", "DeleteClusterConfig", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "return", "out", "\n", "}", ",", "}", ",", "{", "name", ":", "\"", "\"", ",", "kind", ":", "services", ".", "WatchKind", "{", "Kind", ":", "services", ".", "KindClusterName", ",", "}", ",", "crud", ":", "func", "(", ")", "services", ".", "Resource", "{", "clusterName", ",", "err", ":=", "services", ".", "NewClusterName", "(", "services", ".", "ClusterNameSpecV2", "{", "ClusterName", ":", "\"", "\"", ",", "}", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "err", "=", "s", ".", "ConfigS", ".", "SetClusterName", "(", "clusterName", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "out", ",", "err", ":=", "s", ".", "ConfigS", ".", "GetClusterName", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "err", "=", "s", ".", "ConfigS", ".", "DeleteClusterName", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n", "return", "out", "\n", "}", ",", "}", ",", "}", "\n", "s", ".", "runEventsTests", "(", "c", ",", "testCases", ")", "\n", "}" ]
// EventsClusterConfig tests cluster config resource events
[ "EventsClusterConfig", "tests", "cluster", "config", "resource", "events" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/suite/suite.go#L1310-L1357
train
gravitational/teleport
lib/services/tunnelconn.go
TunnelConnectionStatus
func TunnelConnectionStatus(clock clockwork.Clock, conn TunnelConnection) string { diff := clock.Now().Sub(conn.GetLastHeartbeat()) if diff < defaults.ReverseTunnelOfflineThreshold { return teleport.RemoteClusterStatusOnline } return teleport.RemoteClusterStatusOffline }
go
func TunnelConnectionStatus(clock clockwork.Clock, conn TunnelConnection) string { diff := clock.Now().Sub(conn.GetLastHeartbeat()) if diff < defaults.ReverseTunnelOfflineThreshold { return teleport.RemoteClusterStatusOnline } return teleport.RemoteClusterStatusOffline }
[ "func", "TunnelConnectionStatus", "(", "clock", "clockwork", ".", "Clock", ",", "conn", "TunnelConnection", ")", "string", "{", "diff", ":=", "clock", ".", "Now", "(", ")", ".", "Sub", "(", "conn", ".", "GetLastHeartbeat", "(", ")", ")", "\n", "if", "diff", "<", "defaults", ".", "ReverseTunnelOfflineThreshold", "{", "return", "teleport", ".", "RemoteClusterStatusOnline", "\n", "}", "\n", "return", "teleport", ".", "RemoteClusterStatusOffline", "\n", "}" ]
// IsTunnelConnectionStatus returns tunnel connection status based on the last // heartbeat time recorded for a connection
[ "IsTunnelConnectionStatus", "returns", "tunnel", "connection", "status", "based", "on", "the", "last", "heartbeat", "time", "recorded", "for", "a", "connection" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnelconn.go#L78-L84
train
gravitational/teleport
lib/services/tunnelconn.go
MustCreateTunnelConnection
func MustCreateTunnelConnection(name string, spec TunnelConnectionSpecV2) TunnelConnection { conn, err := NewTunnelConnection(name, spec) if err != nil { panic(err) } return conn }
go
func MustCreateTunnelConnection(name string, spec TunnelConnectionSpecV2) TunnelConnection { conn, err := NewTunnelConnection(name, spec) if err != nil { panic(err) } return conn }
[ "func", "MustCreateTunnelConnection", "(", "name", "string", ",", "spec", "TunnelConnectionSpecV2", ")", "TunnelConnection", "{", "conn", ",", "err", ":=", "NewTunnelConnection", "(", "name", ",", "spec", ")", "\n", "if", "err", "!=", "nil", "{", "panic", "(", "err", ")", "\n", "}", "\n", "return", "conn", "\n", "}" ]
// MustCreateTunnelConnection returns new connection from V2 spec or panics if // parameters are incorrect
[ "MustCreateTunnelConnection", "returns", "new", "connection", "from", "V2", "spec", "or", "panics", "if", "parameters", "are", "incorrect" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnelconn.go#L88-L94
train
gravitational/teleport
lib/services/tunnelconn.go
NewTunnelConnection
func NewTunnelConnection(name string, spec TunnelConnectionSpecV2) (TunnelConnection, error) { conn := &TunnelConnectionV2{ Kind: KindTunnelConnection, SubKind: spec.ClusterName, Version: V2, Metadata: Metadata{ Name: name, Namespace: defaults.Namespace, }, Spec: spec, } if err := conn.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } return conn, nil }
go
func NewTunnelConnection(name string, spec TunnelConnectionSpecV2) (TunnelConnection, error) { conn := &TunnelConnectionV2{ Kind: KindTunnelConnection, SubKind: spec.ClusterName, Version: V2, Metadata: Metadata{ Name: name, Namespace: defaults.Namespace, }, Spec: spec, } if err := conn.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } return conn, nil }
[ "func", "NewTunnelConnection", "(", "name", "string", ",", "spec", "TunnelConnectionSpecV2", ")", "(", "TunnelConnection", ",", "error", ")", "{", "conn", ":=", "&", "TunnelConnectionV2", "{", "Kind", ":", "KindTunnelConnection", ",", "SubKind", ":", "spec", ".", "ClusterName", ",", "Version", ":", "V2", ",", "Metadata", ":", "Metadata", "{", "Name", ":", "name", ",", "Namespace", ":", "defaults", ".", "Namespace", ",", "}", ",", "Spec", ":", "spec", ",", "}", "\n", "if", "err", ":=", "conn", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "conn", ",", "nil", "\n", "}" ]
// NewTunnelConnection returns new connection from V2 spec
[ "NewTunnelConnection", "returns", "new", "connection", "from", "V2", "spec" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnelconn.go#L97-L112
train