_id
stringlengths
2
7
title
stringlengths
1
118
partition
stringclasses
3 values
text
stringlengths
52
85.5k
language
stringclasses
1 value
meta_information
dict
q10200
Mkdir
train
func (fs MountFS) Mkdir(name string, perm os.FileMode) error { mount, innerPath := findMount(name, fs.mounts, fs.rootFS, string(fs.PathSeparator())) return mount.Mkdir(innerPath, perm) }
go
{ "resource": "" }
q10201
Stat
train
func (fs MountFS) Stat(name string) (os.FileInfo, error) { mount, innerPath := findMount(name, fs.mounts, fs.rootFS, string(fs.PathSeparator())) fi, err := mount.Stat(innerPath) if innerPath == "/" { return innerFileInfo{FileInfo: fi, name: filepath.Base(name)}, err } return fi, err }
go
{ "resource": "" }
q10202
MkdirAll
train
func MkdirAll(fs Filesystem, path string, perm os.FileMode) error { if dir, err := fs.Stat(path); err == nil { if dir.IsDir() { return nil } return &os.PathError{"mkdir", path, ErrNotDirectory} } parts := SplitPath(path, string(fs.PathSeparator())) if len(parts) > 1 { // Create parent err := MkdirAll(fs, strings.Join(parts[0:len(parts)-1], string(fs.PathSeparator())), perm) if err != nil { return err } } // Parent now exists; invoke Mkdir and use its result. err := fs.Mkdir(path, perm) if err != nil { // Handle arguments like "foo/." by // double-checking that directory doesn't exist. dir, err1 := fs.Lstat(path) if err1 == nil && dir.IsDir() { return nil } return err } return nil }
go
{ "resource": "" }
q10203
RemoveAll
train
func RemoveAll(fs Filesystem, path string) error { if err := fs.Remove(path); err == nil || os.IsNotExist(err) { return nil } // We could not delete it, so might be a directory fis, err := fs.ReadDir(path) if err != nil { if os.IsNotExist(err) { return nil } return err } // Remove contents & return first error. err = nil for _, fi := range fis { err1 := RemoveAll(fs, path+string(fs.PathSeparator())+fi.Name()) if err == nil { err = err1 } } // Remove directory itself. err1 := fs.Remove(path) if err1 == nil || os.IsNotExist(err1) { return nil } if err == nil { err = err1 } return err }
go
{ "resource": "" }
q10204
GenerateAuthorizeToken
train
func (a *AuthorizeTokenGenDefault) GenerateAuthorizeToken(data *AuthorizeData) (ret string, err error) { token := uuid.NewRandom() return base64.RawURLEncoding.EncodeToString([]byte(token)), nil }
go
{ "resource": "" }
q10205
GenerateAccessToken
train
func (a *AccessTokenGenDefault) GenerateAccessToken(data *AccessData, generaterefresh bool) (accesstoken string, refreshtoken string, err error) { token := uuid.NewRandom() accesstoken = base64.RawURLEncoding.EncodeToString([]byte(token)) if generaterefresh { rtoken := uuid.NewRandom() refreshtoken = base64.RawURLEncoding.EncodeToString([]byte(rtoken)) } return }
go
{ "resource": "" }
q10206
ParseUrls
train
func ParseUrls(baseUrl, redirectUrl string) (retBaseUrl, retRedirectUrl *url.URL, err error) { var base, redirect *url.URL // parse base url if base, err = url.Parse(baseUrl); err != nil { return nil, nil, err } // parse redirect url if redirect, err = url.Parse(redirectUrl); err != nil { return nil, nil, err } // must not have fragment if base.Fragment != "" || redirect.Fragment != "" { return nil, nil, newUriValidationError("url must not include fragment.", baseUrl, redirectUrl) } // Scheme must match if redirect.Scheme != base.Scheme { return nil, nil, newUriValidationError("scheme mismatch", baseUrl, redirectUrl) } // Host must match if redirect.Host != base.Host { return nil, nil, newUriValidationError("host mismatch", baseUrl, redirectUrl) } // resolve references to base url retBaseUrl = (&url.URL{Scheme: base.Scheme, Host: base.Host, Path: "/"}).ResolveReference(&url.URL{Path: base.Path}) retRedirectUrl = (&url.URL{Scheme: base.Scheme, Host: base.Host, Path: "/"}).ResolveReference(&url.URL{Path: redirect.Path, RawQuery: redirect.RawQuery}) return }
go
{ "resource": "" }
q10207
ValidateUriList
train
func ValidateUriList(baseUriList string, redirectUri string, separator string) (realRedirectUri string, err error) { // make a list of uris var slist []string if separator != "" { slist = strings.Split(baseUriList, separator) } else { slist = make([]string, 0) slist = append(slist, baseUriList) } for _, sitem := range slist { realRedirectUri, err = ValidateUri(sitem, redirectUri) // validated, return no error if err == nil { return realRedirectUri, nil } // if there was an error that is not a validation error, return it if _, iok := err.(UriValidationError); !iok { return "", err } } return "", newUriValidationError("urls don't validate", baseUriList, redirectUri) }
go
{ "resource": "" }
q10208
ValidateUri
train
func ValidateUri(baseUri string, redirectUri string) (realRedirectUri string, err error) { if baseUri == "" || redirectUri == "" { return "", errors.New("urls cannot be blank.") } base, redirect, err := ParseUrls(baseUri, redirectUri) if err != nil { return "", err } // allow exact path matches if base.Path == redirect.Path { return redirect.String(), nil } // ensure prefix matches are actually subpaths requiredPrefix := strings.TrimRight(base.Path, "/") + "/" if !strings.HasPrefix(redirect.Path, requiredPrefix) { return "", newUriValidationError("path prefix doesn't match", baseUri, redirectUri) } return redirect.String(),nil }
go
{ "resource": "" }
q10209
FirstUri
train
func FirstUri(baseUriList string, separator string) string { if separator != "" { slist := strings.Split(baseUriList, separator) if len(slist) > 0 { return slist[0] } } else { return baseUriList } return "" }
go
{ "resource": "" }
q10210
SetError
train
func (r *Response) SetError(id string, description string) { r.SetErrorUri(id, description, "", "") }
go
{ "resource": "" }
q10211
SetErrorState
train
func (r *Response) SetErrorState(id string, description string, state string) { r.SetErrorUri(id, description, "", state) }
go
{ "resource": "" }
q10212
SetErrorUri
train
func (r *Response) SetErrorUri(id string, description string, uri string, state string) { // get default error message if description == "" { description = deferror.Get(id) } // set error parameters r.IsError = true r.ErrorId = id r.StatusCode = r.ErrorStatusCode if r.StatusCode != 200 { r.StatusText = description } else { r.StatusText = "" } r.Output = make(ResponseData) // clear output r.Output["error"] = id r.Output["error_description"] = description if uri != "" { r.Output["error_uri"] = uri } if state != "" { r.Output["state"] = state } }
go
{ "resource": "" }
q10213
SetRedirect
train
func (r *Response) SetRedirect(url string) { // set redirect parameters r.Type = REDIRECT r.URL = url }
go
{ "resource": "" }
q10214
GetRedirectUrl
train
func (r *Response) GetRedirectUrl() (string, error) { if r.Type != REDIRECT { return "", errors.New("Not a redirect response") } u, err := url.Parse(r.URL) if err != nil { return "", err } var q url.Values if r.RedirectInFragment { // start with empty set for fragment q = url.Values{} } else { // add parameters to existing query q = u.Query() } // add parameters for n, v := range r.Output { q.Set(n, fmt.Sprint(v)) } // https://tools.ietf.org/html/rfc6749#section-4.2.2 // Fragment should be encoded as application/x-www-form-urlencoded (%-escaped, spaces are represented as '+') // The stdlib URL#String() doesn't make that easy to accomplish, so build this ourselves if r.RedirectInFragment { u.Fragment = "" redirectURI := u.String() + "#" + q.Encode() return redirectURI, nil } // Otherwise, update the query and encode normally u.RawQuery = q.Encode() u.Fragment = "" return u.String(), nil }
go
{ "resource": "" }
q10215
OutputJSON
train
func OutputJSON(rs *Response, w http.ResponseWriter, r *http.Request) error { // Add headers for i, k := range rs.Headers { for _, v := range k { w.Header().Add(i, v) } } if rs.Type == REDIRECT { // Output redirect with parameters u, err := rs.GetRedirectUrl() if err != nil { return err } w.Header().Add("Location", u) w.WriteHeader(302) } else { // set content type if the response doesn't already have one associated with it if w.Header().Get("Content-Type") == "" { w.Header().Set("Content-Type", "application/json") } w.WriteHeader(rs.StatusCode) encoder := json.NewEncoder(w) err := encoder.Encode(rs.Output) if err != nil { return err } } return nil }
go
{ "resource": "" }
q10216
Exists
train
func (t AllowedAuthorizeType) Exists(rt AuthorizeRequestType) bool { for _, k := range t { if k == rt { return true } } return false }
go
{ "resource": "" }
q10217
Exists
train
func (t AllowedAccessType) Exists(rt AccessRequestType) bool { for _, k := range t { if k == rt { return true } } return false }
go
{ "resource": "" }
q10218
NewServerConfig
train
func NewServerConfig() *ServerConfig { return &ServerConfig{ AuthorizationExpiration: 250, AccessExpiration: 3600, TokenType: "Bearer", AllowedAuthorizeTypes: AllowedAuthorizeType{CODE}, AllowedAccessTypes: AllowedAccessType{AUTHORIZATION_CODE}, ErrorStatusCode: 200, AllowClientSecretInParams: false, AllowGetAccessRequest: false, RetainTokenAfterRefresh: false, } }
go
{ "resource": "" }
q10219
NewServer
train
func NewServer(config *ServerConfig, storage Storage) *Server { return &Server{ Config: config, Storage: storage, AuthorizeTokenGen: &AuthorizeTokenGenDefault{}, AccessTokenGen: &AccessTokenGenDefault{}, Now: time.Now, Logger: &LoggerDefault{}, } }
go
{ "resource": "" }
q10220
NewResponse
train
func (s *Server) NewResponse() *Response { r := NewResponse(s.Storage) r.ErrorStatusCode = s.Config.ErrorStatusCode return r }
go
{ "resource": "" }
q10221
HandleInfoRequest
train
func (s *Server) HandleInfoRequest(w *Response, r *http.Request) *InfoRequest { r.ParseForm() bearer := CheckBearerAuth(r) if bearer == nil { s.setErrorAndLog(w, E_INVALID_REQUEST, nil, "handle_info_request=%s", "bearer is nil") return nil } // generate info request ret := &InfoRequest{ Code: bearer.Code, } if ret.Code == "" { s.setErrorAndLog(w, E_INVALID_REQUEST, nil, "handle_info_request=%s", "code is nil") return nil } var err error // load access data ret.AccessData, err = w.Storage.LoadAccess(ret.Code) if err != nil { s.setErrorAndLog(w, E_INVALID_REQUEST, err, "handle_info_request=%s", "failed to load access data") return nil } if ret.AccessData == nil { s.setErrorAndLog(w, E_INVALID_REQUEST, nil, "handle_info_request=%s", "access data is nil") return nil } if ret.AccessData.Client == nil { s.setErrorAndLog(w, E_UNAUTHORIZED_CLIENT, nil, "handle_info_request=%s", "access data client is nil") return nil } if ret.AccessData.Client.GetRedirectUri() == "" { s.setErrorAndLog(w, E_UNAUTHORIZED_CLIENT, nil, "handle_info_request=%s", "access data client redirect uri is empty") return nil } if ret.AccessData.IsExpiredAt(s.Now()) { s.setErrorAndLog(w, E_INVALID_GRANT, nil, "handle_info_request=%s", "access data is expired") return nil } return ret }
go
{ "resource": "" }
q10222
FinishInfoRequest
train
func (s *Server) FinishInfoRequest(w *Response, r *http.Request, ir *InfoRequest) { // don't process if is already an error if w.IsError { return } // output data w.Output["client_id"] = ir.AccessData.Client.GetId() w.Output["access_token"] = ir.AccessData.AccessToken w.Output["token_type"] = s.Config.TokenType w.Output["expires_in"] = ir.AccessData.CreatedAt.Add(time.Duration(ir.AccessData.ExpiresIn)*time.Second).Sub(s.Now()) / time.Second if ir.AccessData.RefreshToken != "" { w.Output["refresh_token"] = ir.AccessData.RefreshToken } if ir.AccessData.Scope != "" { w.Output["scope"] = ir.AccessData.Scope } }
go
{ "resource": "" }
q10223
HandleAccessRequest
train
func (s *Server) HandleAccessRequest(w *Response, r *http.Request) *AccessRequest { // Only allow GET or POST if r.Method == "GET" { if !s.Config.AllowGetAccessRequest { s.setErrorAndLog(w, E_INVALID_REQUEST, errors.New("Request must be POST"), "access_request=%s", "GET request not allowed") return nil } } else if r.Method != "POST" { s.setErrorAndLog(w, E_INVALID_REQUEST, errors.New("Request must be POST"), "access_request=%s", "request must be POST") return nil } err := r.ParseForm() if err != nil { s.setErrorAndLog(w, E_INVALID_REQUEST, err, "access_request=%s", "parsing error") return nil } grantType := AccessRequestType(r.FormValue("grant_type")) if s.Config.AllowedAccessTypes.Exists(grantType) { switch grantType { case AUTHORIZATION_CODE: return s.handleAuthorizationCodeRequest(w, r) case REFRESH_TOKEN: return s.handleRefreshTokenRequest(w, r) case PASSWORD: return s.handlePasswordRequest(w, r) case CLIENT_CREDENTIALS: return s.handleClientCredentialsRequest(w, r) case ASSERTION: return s.handleAssertionRequest(w, r) } } s.setErrorAndLog(w, E_UNSUPPORTED_GRANT_TYPE, nil, "access_request=%s", "unknown grant type") return nil }
go
{ "resource": "" }
q10224
getClient
train
func (s Server) getClient(auth *BasicAuth, storage Storage, w *Response) Client { client, err := storage.GetClient(auth.Username) if err == ErrNotFound { s.setErrorAndLog(w, E_UNAUTHORIZED_CLIENT, nil, "get_client=%s", "not found") return nil } if err != nil { s.setErrorAndLog(w, E_SERVER_ERROR, err, "get_client=%s", "error finding client") return nil } if client == nil { s.setErrorAndLog(w, E_UNAUTHORIZED_CLIENT, nil, "get_client=%s", "client is nil") return nil } if !CheckClientSecret(client, auth.Password) { s.setErrorAndLog(w, E_UNAUTHORIZED_CLIENT, nil, "get_client=%s, client_id=%v", "client check failed", client.GetId()) return nil } if client.GetRedirectUri() == "" { s.setErrorAndLog(w, E_UNAUTHORIZED_CLIENT, nil, "get_client=%s", "client redirect uri is empty") return nil } return client }
go
{ "resource": "" }
q10225
IsExpiredAt
train
func (d *AuthorizeData) IsExpiredAt(t time.Time) bool { return d.ExpireAt().Before(t) }
go
{ "resource": "" }
q10226
ExpireAt
train
func (d *AuthorizeData) ExpireAt() time.Time { return d.CreatedAt.Add(time.Duration(d.ExpiresIn) * time.Second) }
go
{ "resource": "" }
q10227
handleDiscovery
train
func handleDiscovery(w http.ResponseWriter, r *http.Request) { // For other example see: https://accounts.google.com/.well-known/openid-configuration data := map[string]interface{}{ "issuer": issuer, "authorization_endpoint": issuer + "/authorize", "token_endpoint": issuer + "/token", "jwks_uri": issuer + "/publickeys", "response_types_supported": []string{"code"}, "subject_types_supported": []string{"public"}, "id_token_signing_alg_values_supported": []string{"RS256"}, "scopes_supported": []string{"openid", "email", "profile"}, "token_endpoint_auth_methods_supported": []string{"client_secret_basic"}, "claims_supported": []string{ "aud", "email", "email_verified", "exp", "family_name", "given_name", "iat", "iss", "locale", "name", "sub", }, } raw, err := json.MarshalIndent(data, "", " ") if err != nil { log.Printf("failed to marshal data: %v", err) http.Error(w, "Internal server error", http.StatusInternalServerError) return } w.Header().Set("Content-Type", "application/json") w.Header().Set("Content-Length", strconv.Itoa(len(raw))) w.Write(raw) }
go
{ "resource": "" }
q10228
handlePublicKeys
train
func handlePublicKeys(w http.ResponseWriter, r *http.Request) { raw, err := json.MarshalIndent(publicKeys, "", " ") if err != nil { log.Printf("failed to marshal data: %v", err) http.Error(w, "Internal server error", http.StatusInternalServerError) return } w.Header().Set("Content-Type", "application/json") w.Header().Set("Content-Length", strconv.Itoa(len(raw))) w.Write(raw) }
go
{ "resource": "" }
q10229
encodeIDToken
train
func encodeIDToken(resp *osin.Response, idToken *IDToken, singer jose.Signer) { resp.InternalError = func() error { payload, err := json.Marshal(idToken) if err != nil { return fmt.Errorf("failed to marshal token: %v", err) } jws, err := jwtSigner.Sign(payload) if err != nil { return fmt.Errorf("failed to sign token: %v", err) } raw, err := jws.CompactSerialize() if err != nil { return fmt.Errorf("failed to serialize token: %v", err) } resp.Output["id_token"] = raw return nil }() // Record errors as internal server errors. if resp.InternalError != nil { resp.IsError = true resp.ErrorId = osin.E_SERVER_ERROR } }
go
{ "resource": "" }
q10230
CheckClientSecret
train
func CheckClientSecret(client Client, secret string) bool { switch client := client.(type) { case ClientSecretMatcher: // Prefer the more secure method of giving the secret to the client for comparison return client.ClientSecretMatches(secret) default: // Fallback to the less secure method of extracting the plain text secret from the client for comparison return client.GetSecret() == secret } }
go
{ "resource": "" }
q10231
CheckBasicAuth
train
func CheckBasicAuth(r *http.Request) (*BasicAuth, error) { if r.Header.Get("Authorization") == "" { return nil, nil } s := strings.SplitN(r.Header.Get("Authorization"), " ", 2) if len(s) != 2 || s[0] != "Basic" { return nil, errors.New("Invalid authorization header") } b, err := base64.StdEncoding.DecodeString(s[1]) if err != nil { return nil, err } pair := strings.SplitN(string(b), ":", 2) if len(pair) != 2 { return nil, errors.New("Invalid authorization message") } // Decode the client_id and client_secret pairs as per // https://tools.ietf.org/html/rfc6749#section-2.3.1 username, err := url.QueryUnescape(pair[0]) if err != nil { return nil, err } password, err := url.QueryUnescape(pair[1]) if err != nil { return nil, err } return &BasicAuth{Username: username, Password: password}, nil }
go
{ "resource": "" }
q10232
CheckBearerAuth
train
func CheckBearerAuth(r *http.Request) *BearerAuth { authHeader := r.Header.Get("Authorization") authForm := r.FormValue("code") if authHeader == "" && authForm == "" { return nil } token := authForm if authHeader != "" { s := strings.SplitN(authHeader, " ", 2) if (len(s) != 2 || strings.ToLower(s[0]) != "bearer") && token == "" { return nil } //Use authorization header token only if token type is bearer else query string access token would be returned if len(s) > 0 && strings.ToLower(s[0]) == "bearer" { token = s[1] } } return &BearerAuth{Code: token} }
go
{ "resource": "" }
q10233
getClientAuth
train
func (s Server) getClientAuth(w *Response, r *http.Request, allowQueryParams bool) *BasicAuth { if allowQueryParams { // Allow for auth without password if _, hasSecret := r.Form["client_secret"]; hasSecret { auth := &BasicAuth{ Username: r.FormValue("client_id"), Password: r.FormValue("client_secret"), } if auth.Username != "" { return auth } } } auth, err := CheckBasicAuth(r) if err != nil { s.setErrorAndLog(w, E_INVALID_REQUEST, err, "get_client_auth=%s", "check auth error") return nil } if auth == nil { s.setErrorAndLog(w, E_INVALID_REQUEST, errors.New("Client authentication not sent"), "get_client_auth=%s", "client authentication not sent") return nil } return auth }
go
{ "resource": "" }
q10234
Build
train
func (rt *Router) Build(records []Record) error { statics, params := makeRecords(records) if len(params) > MaxSize { return fmt.Errorf("denco: too many records") } if rt.SizeHint < 0 { rt.SizeHint = 0 for _, p := range params { size := 0 for _, k := range p.Key { if k == ParamCharacter || k == WildcardCharacter { size++ } } if size > rt.SizeHint { rt.SizeHint = size } } } for _, r := range statics { rt.static[r.Key] = r.Value } if err := rt.param.build(params, 1, 0, make(map[int]struct{})); err != nil { return err } return nil }
go
{ "resource": "" }
q10235
Get
train
func (ps Params) Get(name string) string { for _, p := range ps { if p.Name == name { return p.Value } } return "" }
go
{ "resource": "" }
q10236
build
train
func (da *doubleArray) build(srcs []*record, idx, depth int, usedBase map[int]struct{}) error { sort.Stable(recordSlice(srcs)) base, siblings, leaf, err := da.arrange(srcs, idx, depth, usedBase) if err != nil { return err } if leaf != nil { nd, err := makeNode(leaf) if err != nil { return err } da.bc[idx].SetBase(len(da.node)) da.node = append(da.node, nd) } for _, sib := range siblings { da.setCheck(nextIndex(base, sib.c), sib.c) } for _, sib := range siblings { records := srcs[sib.start:sib.end] switch sib.c { case ParamCharacter: for _, r := range records { next := NextSeparator(r.Key, depth+1) name := r.Key[depth+1 : next] r.paramNames = append(r.paramNames, name) r.Key = r.Key[next:] } da.bc[idx].SetSingleParam() if err := da.build(records, nextIndex(base, sib.c), 0, usedBase); err != nil { return err } case WildcardCharacter: r := records[0] name := r.Key[depth+1 : len(r.Key)-1] r.paramNames = append(r.paramNames, name) r.Key = "" da.bc[idx].SetWildcardParam() if err := da.build(records, nextIndex(base, sib.c), 0, usedBase); err != nil { return err } default: if err := da.build(records, nextIndex(base, sib.c), depth+1, usedBase); err != nil { return err } } } return nil }
go
{ "resource": "" }
q10237
setBase
train
func (da *doubleArray) setBase(i, base int) { da.bc[i].SetBase(base) }
go
{ "resource": "" }
q10238
setCheck
train
func (da *doubleArray) setCheck(i int, check byte) { da.bc[i].SetCheck(check) }
go
{ "resource": "" }
q10239
makeNode
train
func makeNode(r *record) (*node, error) { dups := make(map[string]bool) for _, name := range r.paramNames { if dups[name] { return nil, fmt.Errorf("denco: path parameter `%v' is duplicated in the key `%v'", name, r.Key) } dups[name] = true } return &node{data: r.Value, paramNames: r.paramNames}, nil }
go
{ "resource": "" }
q10240
NewRecord
train
func NewRecord(key string, value interface{}) Record { return Record{ Key: key, Value: value, } }
go
{ "resource": "" }
q10241
makeRecords
train
func makeRecords(srcs []Record) (statics, params []*record) { spChars := string([]byte{ParamCharacter, WildcardCharacter}) termChar := string(TerminationCharacter) for _, r := range srcs { if strings.ContainsAny(r.Key, spChars) { r.Key += termChar params = append(params, &record{Record: r}) } else { statics = append(statics, &record{Record: r}) } } return statics, params }
go
{ "resource": "" }
q10242
Less
train
func (rs recordSlice) Less(i, j int) bool { return rs[i].Key < rs[j].Key }
go
{ "resource": "" }
q10243
Swap
train
func (rs recordSlice) Swap(i, j int) { rs[i], rs[j] = rs[j], rs[i] }
go
{ "resource": "" }
q10244
BasicAuth
train
func BasicAuth(username, password string) runtime.ClientAuthInfoWriter { return runtime.ClientAuthInfoWriterFunc(func(r runtime.ClientRequest, _ strfmt.Registry) error { encoded := base64.StdEncoding.EncodeToString([]byte(username + ":" + password)) return r.SetHeaderParam("Authorization", "Basic "+encoded) }) }
go
{ "resource": "" }
q10245
APIKeyAuth
train
func APIKeyAuth(name, in, value string) runtime.ClientAuthInfoWriter { if in == "query" { return runtime.ClientAuthInfoWriterFunc(func(r runtime.ClientRequest, _ strfmt.Registry) error { return r.SetQueryParam(name, value) }) } if in == "header" { return runtime.ClientAuthInfoWriterFunc(func(r runtime.ClientRequest, _ strfmt.Registry) error { return r.SetHeaderParam(name, value) }) } return nil }
go
{ "resource": "" }
q10246
BearerToken
train
func BearerToken(token string) runtime.ClientAuthInfoWriter { return runtime.ClientAuthInfoWriterFunc(func(r runtime.ClientRequest, _ strfmt.Registry) error { return r.SetHeaderParam("Authorization", "Bearer "+token) }) }
go
{ "resource": "" }
q10247
Read
train
func (f *File) Read(p []byte) (n int, err error) { return f.Data.Read(p) }
go
{ "resource": "" }
q10248
ReadResponse
train
func (read ClientResponseReaderFunc) ReadResponse(resp ClientResponse, consumer Consumer) (interface{}, error) { return read(resp, consumer) }
go
{ "resource": "" }
q10249
NewAPIError
train
func NewAPIError(opName string, payload interface{}, code int) *APIError { return &APIError{ OperationName: opName, Response: payload, Code: code, } }
go
{ "resource": "" }
q10250
NewAPI
train
func NewAPI(spec *loads.Document) *API { var an *analysis.Spec if spec != nil && spec.Spec() != nil { an = analysis.New(spec.Spec()) } api := &API{ spec: spec, analyzer: an, consumers: make(map[string]runtime.Consumer, 10), producers: make(map[string]runtime.Producer, 10), authenticators: make(map[string]runtime.Authenticator), operations: make(map[string]map[string]runtime.OperationHandler), ServeError: errors.ServeError, Models: make(map[string]func() interface{}), formats: strfmt.NewFormats(), } return api.WithJSONDefaults() }
go
{ "resource": "" }
q10251
WithJSONDefaults
train
func (d *API) WithJSONDefaults() *API { d.DefaultConsumes = runtime.JSONMime d.DefaultProduces = runtime.JSONMime d.consumers[runtime.JSONMime] = runtime.JSONConsumer() d.producers[runtime.JSONMime] = runtime.JSONProducer() return d }
go
{ "resource": "" }
q10252
WithoutJSONDefaults
train
func (d *API) WithoutJSONDefaults() *API { d.DefaultConsumes = "" d.DefaultProduces = "" delete(d.consumers, runtime.JSONMime) delete(d.producers, runtime.JSONMime) return d }
go
{ "resource": "" }
q10253
Formats
train
func (d *API) Formats() strfmt.Registry { if d.formats == nil { d.formats = strfmt.NewFormats() } return d.formats }
go
{ "resource": "" }
q10254
RegisterAuth
train
func (d *API) RegisterAuth(scheme string, handler runtime.Authenticator) { if d.authenticators == nil { d.authenticators = make(map[string]runtime.Authenticator) } d.authenticators[scheme] = handler }
go
{ "resource": "" }
q10255
RegisterConsumer
train
func (d *API) RegisterConsumer(mediaType string, handler runtime.Consumer) { if d.consumers == nil { d.consumers = make(map[string]runtime.Consumer, 10) } d.consumers[strings.ToLower(mediaType)] = handler }
go
{ "resource": "" }
q10256
RegisterProducer
train
func (d *API) RegisterProducer(mediaType string, handler runtime.Producer) { if d.producers == nil { d.producers = make(map[string]runtime.Producer, 10) } d.producers[strings.ToLower(mediaType)] = handler }
go
{ "resource": "" }
q10257
RegisterOperation
train
func (d *API) RegisterOperation(method, path string, handler runtime.OperationHandler) { if d.operations == nil { d.operations = make(map[string]map[string]runtime.OperationHandler, 30) } um := strings.ToUpper(method) if b, ok := d.operations[um]; !ok || b == nil { d.operations[um] = make(map[string]runtime.OperationHandler) } d.operations[um][path] = handler }
go
{ "resource": "" }
q10258
OperationHandlerFor
train
func (d *API) OperationHandlerFor(method, path string) (runtime.OperationHandler, bool) { if d.operations == nil { return nil, false } if pi, ok := d.operations[strings.ToUpper(method)]; ok { h, ok := pi[path] return h, ok } return nil, false }
go
{ "resource": "" }
q10259
validate
train
func (d *API) validate() error { var consumes []string for k := range d.consumers { consumes = append(consumes, k) } var produces []string for k := range d.producers { produces = append(produces, k) } var authenticators []string for k := range d.authenticators { authenticators = append(authenticators, k) } var operations []string for m, v := range d.operations { for p := range v { operations = append(operations, fmt.Sprintf("%s %s", strings.ToUpper(m), p)) } } var definedAuths []string for k := range d.spec.Spec().SecurityDefinitions { definedAuths = append(definedAuths, k) } if err := d.verify("consumes", consumes, d.analyzer.RequiredConsumes()); err != nil { return err } if err := d.verify("produces", produces, d.analyzer.RequiredProduces()); err != nil { return err } if err := d.verify("operation", operations, d.analyzer.OperationMethodPaths()); err != nil { return err } requiredAuths := d.analyzer.RequiredSecuritySchemes() if err := d.verify("auth scheme", authenticators, requiredAuths); err != nil { return err } if err := d.verify("security definitions", definedAuths, requiredAuths); err != nil { return err } return nil }
go
{ "resource": "" }
q10260
Get
train
func (r RouteParams) Get(name string) string { vv, _, _ := r.GetOK(name) if len(vv) > 0 { return vv[len(vv)-1] } return "" }
go
{ "resource": "" }
q10261
NewRouter
train
func NewRouter(ctx *Context, next http.Handler) http.Handler { if ctx.router == nil { ctx.router = DefaultRouter(ctx.spec, ctx.api) } return http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) { if _, rCtx, ok := ctx.RouteInfo(r); ok { next.ServeHTTP(rw, rCtx) return } // Not found, check if it exists in the other methods first if others := ctx.AllowedMethods(r); len(others) > 0 { ctx.Respond(rw, r, ctx.analyzer.RequiredProduces(), nil, errors.MethodNotAllowed(r.Method, others)) return } ctx.Respond(rw, r, ctx.analyzer.RequiredProduces(), nil, errors.NotFound("path %s was not found", r.URL.EscapedPath())) }) }
go
{ "resource": "" }
q10262
DefaultRouter
train
func DefaultRouter(spec *loads.Document, api RoutableAPI) Router { builder := newDefaultRouteBuilder(spec, api) if spec != nil { for method, paths := range builder.analyzer.Operations() { for path, operation := range paths { fp := fpath.Join(spec.BasePath(), path) debugLog("adding route %s %s %q", method, fp, operation.ID) builder.AddRoute(method, fp, operation) } } } return builder.Build() }
go
{ "resource": "" }
q10263
Authenticate
train
func (ra *RouteAuthenticator) Authenticate(req *http.Request, route *MatchedRoute) (bool, interface{}, error) { if ra.allowAnonymous { route.Authenticator = ra return true, nil, nil } // iterate in proper order var lastResult interface{} for _, scheme := range ra.Schemes { if authenticator, ok := ra.Authenticator[scheme]; ok { applies, princ, err := authenticator.Authenticate(&security.ScopedAuthRequest{ Request: req, RequiredScopes: ra.Scopes[scheme], }) if !applies { return false, nil, nil } if err != nil { route.Authenticator = ra return true, nil, err } lastResult = princ } } route.Authenticator = ra return true, lastResult, nil }
go
{ "resource": "" }
q10264
AllowsAnonymous
train
func (ras RouteAuthenticators) AllowsAnonymous() bool { for _, ra := range ras { if ra.AllowsAnonymous() { return true } } return false }
go
{ "resource": "" }
q10265
Authenticate
train
func (ras RouteAuthenticators) Authenticate(req *http.Request, route *MatchedRoute) (bool, interface{}, error) { var lastError error var allowsAnon bool var anonAuth RouteAuthenticator for _, ra := range ras { if ra.AllowsAnonymous() { anonAuth = ra allowsAnon = true continue } applies, usr, err := ra.Authenticate(req, route) if !applies || err != nil || usr == nil { if err != nil { lastError = err } continue } return applies, usr, nil } if allowsAnon && lastError == nil { route.Authenticator = &anonAuth return true, nil, lastError } return lastError != nil, nil, lastError }
go
{ "resource": "" }
q10266
MarshalFlag
train
func (b ByteSize) MarshalFlag() (string, error) { return units.HumanSize(float64(b)), nil }
go
{ "resource": "" }
q10267
UnmarshalFlag
train
func (b *ByteSize) UnmarshalFlag(value string) error { sz, err := units.FromHumanSize(value) if err != nil { return err } *b = ByteSize(int(sz)) return nil }
go
{ "resource": "" }
q10268
AuthenticateRequest
train
func (fn ClientAuthInfoWriterFunc) AuthenticateRequest(req ClientRequest, reg strfmt.Registry) error { return fn(req, reg) }
go
{ "resource": "" }
q10269
NewOperationExecutor
train
func NewOperationExecutor(ctx *Context) http.Handler { return http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) { // use context to lookup routes route, rCtx, _ := ctx.RouteInfo(r) if rCtx != nil { r = rCtx } route.Handler.ServeHTTP(rw, r) }) }
go
{ "resource": "" }
q10270
YAMLConsumer
train
func YAMLConsumer() runtime.Consumer { return runtime.ConsumerFunc(func(r io.Reader, v interface{}) error { buf, err := ioutil.ReadAll(r) if err != nil { return err } return yaml.Unmarshal(buf, v) }) }
go
{ "resource": "" }
q10271
YAMLProducer
train
func YAMLProducer() runtime.Producer { return runtime.ProducerFunc(func(w io.Writer, v interface{}) error { b, _ := yaml.Marshal(v) // can't make this error come up _, err := w.Write(b) return err }) }
go
{ "resource": "" }
q10272
HttpAuthenticator
train
func HttpAuthenticator(handler func(*http.Request) (bool, interface{}, error)) runtime.Authenticator { return runtime.AuthenticatorFunc(func(params interface{}) (bool, interface{}, error) { if request, ok := params.(*http.Request); ok { return handler(request) } if scoped, ok := params.(*ScopedAuthRequest); ok { return handler(scoped.Request) } return false, nil, nil }) }
go
{ "resource": "" }
q10273
ScopedAuthenticator
train
func ScopedAuthenticator(handler func(*ScopedAuthRequest) (bool, interface{}, error)) runtime.Authenticator { return runtime.AuthenticatorFunc(func(params interface{}) (bool, interface{}, error) { if request, ok := params.(*ScopedAuthRequest); ok { return handler(request) } return false, nil, nil }) }
go
{ "resource": "" }
q10274
BasicAuthRealmCtx
train
func BasicAuthRealmCtx(realm string, authenticate UserPassAuthenticationCtx) runtime.Authenticator { if realm == "" { realm = DefaultRealmName } return HttpAuthenticator(func(r *http.Request) (bool, interface{}, error) { if usr, pass, ok := r.BasicAuth(); ok { ctx, p, err := authenticate(r.Context(), usr, pass) if err != nil { ctx = context.WithValue(ctx, failedBasicAuth, realm) } *r = *r.WithContext(ctx) return true, p, err } *r = *r.WithContext(context.WithValue(r.Context(), failedBasicAuth, realm)) return false, nil, nil }) }
go
{ "resource": "" }
q10275
APIKeyAuth
train
func APIKeyAuth(name, in string, authenticate TokenAuthentication) runtime.Authenticator { inl := strings.ToLower(in) if inl != query && inl != header { // panic because this is most likely a typo panic(errors.New(500, "api key auth: in value needs to be either \"query\" or \"header\".")) } var getToken func(*http.Request) string switch inl { case header: getToken = func(r *http.Request) string { return r.Header.Get(name) } case query: getToken = func(r *http.Request) string { return r.URL.Query().Get(name) } } return HttpAuthenticator(func(r *http.Request) (bool, interface{}, error) { token := getToken(r) if token == "" { return false, nil, nil } p, err := authenticate(token) return true, p, err }) }
go
{ "resource": "" }
q10276
BearerAuth
train
func BearerAuth(name string, authenticate ScopedTokenAuthentication) runtime.Authenticator { const prefix = "Bearer " return ScopedAuthenticator(func(r *ScopedAuthRequest) (bool, interface{}, error) { var token string hdr := r.Request.Header.Get("Authorization") if strings.HasPrefix(hdr, prefix) { token = strings.TrimPrefix(hdr, prefix) } if token == "" { qs := r.Request.URL.Query() token = qs.Get("access_token") } //#nosec ct, _, _ := runtime.ContentType(r.Request.Header) if token == "" && (ct == "application/x-www-form-urlencoded" || ct == "multipart/form-data") { token = r.Request.FormValue("access_token") } if token == "" { return false, nil, nil } p, err := authenticate(token, r.RequiredScopes) return true, p, err }) }
go
{ "resource": "" }
q10277
ContentType
train
func ContentType(headers http.Header) (string, string, error) { ct := headers.Get(HeaderContentType) orig := ct if ct == "" { ct = DefaultMime } if ct == "" { return "", "", nil } mt, opts, err := mime.ParseMediaType(ct) if err != nil { return "", "", errors.NewParseError(HeaderContentType, "header", orig, err) } if cs, ok := opts[charsetKey]; ok { return mt, cs, nil } return mt, "", nil }
go
{ "resource": "" }
q10278
JSONConsumer
train
func JSONConsumer() Consumer { return ConsumerFunc(func(reader io.Reader, data interface{}) error { dec := json.NewDecoder(reader) dec.UseNumber() // preserve number formats return dec.Decode(data) }) }
go
{ "resource": "" }
q10279
JSONProducer
train
func JSONProducer() Producer { return ProducerFunc(func(writer io.Writer, data interface{}) error { enc := json.NewEncoder(writer) enc.SetEscapeHTML(false) return enc.Encode(data) }) }
go
{ "resource": "" }
q10280
validateContentType
train
func validateContentType(allowed []string, actual string) error { debugLog("validating content type for %q against [%s]", actual, strings.Join(allowed, ", ")) if len(allowed) == 0 { return nil } mt, _, err := mime.ParseMediaType(actual) if err != nil { return errors.InvalidContentType(actual, allowed) } if swag.ContainsStringsCI(allowed, mt) { return nil } if swag.ContainsStringsCI(allowed, "*/*") { return nil } parts := strings.Split(actual, "/") if len(parts) == 2 && swag.ContainsStringsCI(allowed, parts[0]+"/*") { return nil } return errors.InvalidContentType(actual, allowed) }
go
{ "resource": "" }
q10281
EnsureDefaults
train
func (r *RedocOpts) EnsureDefaults() { if r.BasePath == "" { r.BasePath = "/" } if r.Path == "" { r.Path = "docs" } if r.SpecURL == "" { r.SpecURL = "/swagger.json" } if r.RedocURL == "" { r.RedocURL = redocLatest } if r.Title == "" { r.Title = "API documentation" } }
go
{ "resource": "" }
q10282
Redoc
train
func Redoc(opts RedocOpts, next http.Handler) http.Handler { opts.EnsureDefaults() pth := path.Join(opts.BasePath, opts.Path) tmpl := template.Must(template.New("redoc").Parse(redocTemplate)) buf := bytes.NewBuffer(nil) _ = tmpl.Execute(buf, opts) b := buf.Bytes() return http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) { if r.URL.Path == pth { rw.Header().Set("Content-Type", "text/html; charset=utf-8") rw.WriteHeader(http.StatusOK) _, _ = rw.Write(b) return } if next == nil { rw.Header().Set("Content-Type", "text/plain") rw.WriteHeader(http.StatusNotFound) _, _ = rw.Write([]byte(fmt.Sprintf("%q not found", pth))) return } next.ServeHTTP(rw, r) }) }
go
{ "resource": "" }
q10283
CanHaveBody
train
func CanHaveBody(method string) bool { mn := strings.ToUpper(method) return mn == "POST" || mn == "PUT" || mn == "PATCH" || mn == "DELETE" }
go
{ "resource": "" }
q10284
IsSafe
train
func IsSafe(r *http.Request) bool { mn := strings.ToUpper(r.Method) return mn == "GET" || mn == "HEAD" }
go
{ "resource": "" }
q10285
HasBody
train
func HasBody(r *http.Request) bool { return len(r.TransferEncoding) > 0 || r.ContentLength > 0 }
go
{ "resource": "" }
q10286
JSONRequest
train
func JSONRequest(method, urlStr string, body io.Reader) (*http.Request, error) { req, err := http.NewRequest(method, urlStr, body) if err != nil { return nil, err } req.Header.Add(HeaderContentType, JSONMime) req.Header.Add(HeaderAccept, JSONMime) return req, nil }
go
{ "resource": "" }
q10287
ReadSingleValue
train
func ReadSingleValue(values Gettable, name string) string { vv, _, hv := values.GetOK(name) if hv { return vv[len(vv)-1] } return "" }
go
{ "resource": "" }
q10288
ReadCollectionValue
train
func ReadCollectionValue(values Gettable, name, collectionFormat string) []string { v := ReadSingleValue(values, name) return swag.SplitByFormat(v, collectionFormat) }
go
{ "resource": "" }
q10289
GetOK
train
func (v Values) GetOK(key string) (value []string, hasKey bool, hasValue bool) { value, hasKey = v[key] if !hasKey { return } if len(value) == 0 { return } hasValue = true return }
go
{ "resource": "" }
q10290
newRequest
train
func newRequest(method, pathPattern string, writer runtime.ClientRequestWriter) (*request, error) { return &request{ pathPattern: pathPattern, method: method, writer: writer, header: make(http.Header), query: make(url.Values), timeout: DefaultTimeout, }, nil }
go
{ "resource": "" }
q10291
BuildHTTP
train
func (r *request) BuildHTTP(mediaType, basePath string, producers map[string]runtime.Producer, registry strfmt.Registry) (*http.Request, error) { return r.buildHTTP(mediaType, basePath, producers, registry, nil) }
go
{ "resource": "" }
q10292
GetQueryParams
train
func (r *request) GetQueryParams() url.Values { var result = make(url.Values) for key, value := range r.query { result[key] = append([]string{}, value...) } return result }
go
{ "resource": "" }
q10293
SetPathParam
train
func (r *request) SetPathParam(name string, value string) error { if r.pathParams == nil { r.pathParams = make(map[string]string) } r.pathParams[name] = value return nil }
go
{ "resource": "" }
q10294
SetFileParam
train
func (r *request) SetFileParam(name string, files ...runtime.NamedReadCloser) error { for _, file := range files { if actualFile, ok := file.(*os.File); ok { fi, err := os.Stat(actualFile.Name()) if err != nil { return err } if fi.IsDir() { return fmt.Errorf("%q is a directory, only files are supported", file.Name()) } } } if r.fileFields == nil { r.fileFields = make(map[string][]runtime.NamedReadCloser) } if r.formFields == nil { r.formFields = make(url.Values) } r.fileFields[name] = files return nil }
go
{ "resource": "" }
q10295
SetTimeout
train
func (r *request) SetTimeout(timeout time.Duration) error { r.timeout = timeout return nil }
go
{ "resource": "" }
q10296
Consume
train
func (fn ConsumerFunc) Consume(reader io.Reader, data interface{}) error { return fn(reader, data) }
go
{ "resource": "" }
q10297
Produce
train
func (f ProducerFunc) Produce(writer io.Writer, data interface{}) error { return f(writer, data) }
go
{ "resource": "" }
q10298
Authorize
train
func (f AuthorizerFunc) Authorize(r *http.Request, principal interface{}) error { return f(r, principal) }
go
{ "resource": "" }
q10299
TLSClientAuth
train
func TLSClientAuth(opts TLSClientOptions) (*tls.Config, error) { // create client tls config cfg := &tls.Config{} // load client cert if specified if opts.Certificate != "" { cert, err := tls.LoadX509KeyPair(opts.Certificate, opts.Key) if err != nil { return nil, fmt.Errorf("tls client cert: %v", err) } cfg.Certificates = []tls.Certificate{cert} } else if opts.LoadedCertificate != nil { block := pem.Block{Type: "CERTIFICATE", Bytes: opts.LoadedCertificate.Raw} certPem := pem.EncodeToMemory(&block) var keyBytes []byte switch k := opts.LoadedKey.(type) { case *rsa.PrivateKey: keyBytes = x509.MarshalPKCS1PrivateKey(k) case *ecdsa.PrivateKey: var err error keyBytes, err = x509.MarshalECPrivateKey(k) if err != nil { return nil, fmt.Errorf("tls client priv key: %v", err) } default: return nil, fmt.Errorf("tls client priv key: unsupported key type") } block = pem.Block{Type: "PRIVATE KEY", Bytes: keyBytes} keyPem := pem.EncodeToMemory(&block) cert, err := tls.X509KeyPair(certPem, keyPem) if err != nil { return nil, fmt.Errorf("tls client cert: %v", err) } cfg.Certificates = []tls.Certificate{cert} } cfg.InsecureSkipVerify = opts.InsecureSkipVerify // When no CA certificate is provided, default to the system cert pool // that way when a request is made to a server known by the system trust store, // the name is still verified if opts.LoadedCA != nil { caCertPool := x509.NewCertPool() caCertPool.AddCert(opts.LoadedCA) cfg.RootCAs = caCertPool } else if opts.CA != "" { // load ca cert caCert, err := ioutil.ReadFile(opts.CA) if err != nil { return nil, fmt.Errorf("tls client ca: %v", err) } caCertPool := x509.NewCertPool() caCertPool.AppendCertsFromPEM(caCert) cfg.RootCAs = caCertPool } // apply servername overrride if opts.ServerName != "" { cfg.InsecureSkipVerify = false cfg.ServerName = opts.ServerName } cfg.BuildNameToCertificate() return cfg, nil }
go
{ "resource": "" }