repo
stringclasses
1 value
path
stringlengths
19
155
func_name
stringlengths
1
106
original_string
stringlengths
76
130k
language
stringclasses
1 value
code
stringlengths
76
130k
code_tokens
listlengths
22
32.6k
docstring
stringlengths
13
1.73k
docstring_tokens
listlengths
1
316
sha
stringclasses
1 value
url
stringlengths
114
252
partition
stringclasses
1 value
summary
stringlengths
13
316
input_ids
listlengths
502
502
token_type_ids
listlengths
502
502
attention_mask
listlengths
502
502
labels
listlengths
502
502
kubernetes/kubernetes
pkg/controller/serviceaccount/tokens_controller.go
ensureReferencedToken
func (e *TokensController) ensureReferencedToken(serviceAccount *v1.ServiceAccount) ( /* retry */ bool, error) { if hasToken, err := e.hasReferencedToken(serviceAccount); err != nil { // Don't retry cache lookup errors return false, err } else if hasToken { // A service account token already exists, and is referenced, short-circuit return false, nil } // We don't want to update the cache's copy of the service account // so add the secret to a freshly retrieved copy of the service account serviceAccounts := e.client.CoreV1().ServiceAccounts(serviceAccount.Namespace) liveServiceAccount, err := serviceAccounts.Get(serviceAccount.Name, metav1.GetOptions{}) if err != nil { // Retry if we cannot fetch the live service account (for a NotFound error, either the live lookup or our cache are stale) return true, err } if liveServiceAccount.ResourceVersion != serviceAccount.ResourceVersion { // Retry if our liveServiceAccount doesn't match our cache's resourceVersion (either the live lookup or our cache are stale) klog.V(4).Infof("liveServiceAccount.ResourceVersion (%s) does not match cache (%s), retrying", liveServiceAccount.ResourceVersion, serviceAccount.ResourceVersion) return true, nil } // Build the secret secret := &v1.Secret{ ObjectMeta: metav1.ObjectMeta{ Name: secret.Strategy.GenerateName(fmt.Sprintf("%s-token-", serviceAccount.Name)), Namespace: serviceAccount.Namespace, Annotations: map[string]string{ v1.ServiceAccountNameKey: serviceAccount.Name, v1.ServiceAccountUIDKey: string(serviceAccount.UID), }, }, Type: v1.SecretTypeServiceAccountToken, Data: map[string][]byte{}, } // Generate the token token, err := e.token.GenerateToken(serviceaccount.LegacyClaims(*serviceAccount, *secret)) if err != nil { // retriable error return true, err } secret.Data[v1.ServiceAccountTokenKey] = []byte(token) secret.Data[v1.ServiceAccountNamespaceKey] = []byte(serviceAccount.Namespace) if e.rootCA != nil && len(e.rootCA) > 0 { secret.Data[v1.ServiceAccountRootCAKey] = e.rootCA } // Save the secret createdToken, err := e.client.CoreV1().Secrets(serviceAccount.Namespace).Create(secret) if err != nil { // retriable error return true, err } // Manually add the new token to the cache store. // This prevents the service account update (below) triggering another token creation, if the referenced token couldn't be found in the store e.updatedSecrets.Mutation(createdToken) // Try to add a reference to the newly created token to the service account addedReference := false err = clientretry.RetryOnConflict(clientretry.DefaultRetry, func() error { // refresh liveServiceAccount on every retry defer func() { liveServiceAccount = nil }() // fetch the live service account if needed, and verify the UID matches and that we still need a token if liveServiceAccount == nil { liveServiceAccount, err = serviceAccounts.Get(serviceAccount.Name, metav1.GetOptions{}) if err != nil { return err } if liveServiceAccount.UID != serviceAccount.UID { // If we don't have the same service account, stop trying to add a reference to the token made for the old service account. return nil } if hasToken, err := e.hasReferencedToken(liveServiceAccount); err != nil { // Don't retry cache lookup errors return nil } else if hasToken { // A service account token already exists, and is referenced, short-circuit return nil } } // Try to add a reference to the token liveServiceAccount.Secrets = append(liveServiceAccount.Secrets, v1.ObjectReference{Name: secret.Name}) if _, err := serviceAccounts.Update(liveServiceAccount); err != nil { return err } addedReference = true return nil }) if !addedReference { // we weren't able to use the token, try to clean it up. klog.V(2).Infof("deleting secret %s/%s because reference couldn't be added (%v)", secret.Namespace, secret.Name, err) deleteOpts := &metav1.DeleteOptions{Preconditions: &metav1.Preconditions{UID: &createdToken.UID}} if deleteErr := e.client.CoreV1().Secrets(createdToken.Namespace).Delete(createdToken.Name, deleteOpts); deleteErr != nil { klog.Error(deleteErr) // if we fail, just log it } } if err != nil { if apierrors.IsConflict(err) || apierrors.IsNotFound(err) { // if we got a Conflict error, the service account was updated by someone else, and we'll get an update notification later // if we got a NotFound error, the service account no longer exists, and we don't need to create a token for it return false, nil } // retry in all other cases return true, err } // success! return false, nil }
go
func (e *TokensController) ensureReferencedToken(serviceAccount *v1.ServiceAccount) ( /* retry */ bool, error) { if hasToken, err := e.hasReferencedToken(serviceAccount); err != nil { // Don't retry cache lookup errors return false, err } else if hasToken { // A service account token already exists, and is referenced, short-circuit return false, nil } // We don't want to update the cache's copy of the service account // so add the secret to a freshly retrieved copy of the service account serviceAccounts := e.client.CoreV1().ServiceAccounts(serviceAccount.Namespace) liveServiceAccount, err := serviceAccounts.Get(serviceAccount.Name, metav1.GetOptions{}) if err != nil { // Retry if we cannot fetch the live service account (for a NotFound error, either the live lookup or our cache are stale) return true, err } if liveServiceAccount.ResourceVersion != serviceAccount.ResourceVersion { // Retry if our liveServiceAccount doesn't match our cache's resourceVersion (either the live lookup or our cache are stale) klog.V(4).Infof("liveServiceAccount.ResourceVersion (%s) does not match cache (%s), retrying", liveServiceAccount.ResourceVersion, serviceAccount.ResourceVersion) return true, nil } // Build the secret secret := &v1.Secret{ ObjectMeta: metav1.ObjectMeta{ Name: secret.Strategy.GenerateName(fmt.Sprintf("%s-token-", serviceAccount.Name)), Namespace: serviceAccount.Namespace, Annotations: map[string]string{ v1.ServiceAccountNameKey: serviceAccount.Name, v1.ServiceAccountUIDKey: string(serviceAccount.UID), }, }, Type: v1.SecretTypeServiceAccountToken, Data: map[string][]byte{}, } // Generate the token token, err := e.token.GenerateToken(serviceaccount.LegacyClaims(*serviceAccount, *secret)) if err != nil { // retriable error return true, err } secret.Data[v1.ServiceAccountTokenKey] = []byte(token) secret.Data[v1.ServiceAccountNamespaceKey] = []byte(serviceAccount.Namespace) if e.rootCA != nil && len(e.rootCA) > 0 { secret.Data[v1.ServiceAccountRootCAKey] = e.rootCA } // Save the secret createdToken, err := e.client.CoreV1().Secrets(serviceAccount.Namespace).Create(secret) if err != nil { // retriable error return true, err } // Manually add the new token to the cache store. // This prevents the service account update (below) triggering another token creation, if the referenced token couldn't be found in the store e.updatedSecrets.Mutation(createdToken) // Try to add a reference to the newly created token to the service account addedReference := false err = clientretry.RetryOnConflict(clientretry.DefaultRetry, func() error { // refresh liveServiceAccount on every retry defer func() { liveServiceAccount = nil }() // fetch the live service account if needed, and verify the UID matches and that we still need a token if liveServiceAccount == nil { liveServiceAccount, err = serviceAccounts.Get(serviceAccount.Name, metav1.GetOptions{}) if err != nil { return err } if liveServiceAccount.UID != serviceAccount.UID { // If we don't have the same service account, stop trying to add a reference to the token made for the old service account. return nil } if hasToken, err := e.hasReferencedToken(liveServiceAccount); err != nil { // Don't retry cache lookup errors return nil } else if hasToken { // A service account token already exists, and is referenced, short-circuit return nil } } // Try to add a reference to the token liveServiceAccount.Secrets = append(liveServiceAccount.Secrets, v1.ObjectReference{Name: secret.Name}) if _, err := serviceAccounts.Update(liveServiceAccount); err != nil { return err } addedReference = true return nil }) if !addedReference { // we weren't able to use the token, try to clean it up. klog.V(2).Infof("deleting secret %s/%s because reference couldn't be added (%v)", secret.Namespace, secret.Name, err) deleteOpts := &metav1.DeleteOptions{Preconditions: &metav1.Preconditions{UID: &createdToken.UID}} if deleteErr := e.client.CoreV1().Secrets(createdToken.Namespace).Delete(createdToken.Name, deleteOpts); deleteErr != nil { klog.Error(deleteErr) // if we fail, just log it } } if err != nil { if apierrors.IsConflict(err) || apierrors.IsNotFound(err) { // if we got a Conflict error, the service account was updated by someone else, and we'll get an update notification later // if we got a NotFound error, the service account no longer exists, and we don't need to create a token for it return false, nil } // retry in all other cases return true, err } // success! return false, nil }
[ "func", "(", "e", "*", "TokensController", ")", "ensureReferencedToken", "(", "serviceAccount", "*", "v1", ".", "ServiceAccount", ")", "(", "/* retry */", "bool", ",", "error", ")", "{", "if", "hasToken", ",", "err", ":=", "e", ".", "hasReferencedToken", "("...
// ensureReferencedToken makes sure at least one ServiceAccountToken secret exists, and is included in the serviceAccount's Secrets list
[ "ensureReferencedToken", "makes", "sure", "at", "least", "one", "ServiceAccountToken", "secret", "exists", "and", "is", "included", "in", "the", "serviceAccount", "s", "Secrets", "list" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/controller/serviceaccount/tokens_controller.go#L360-L477
train
ensureReferencedToken ensures that the service account token is referenced by the service account.
[ 30522, 4569, 2278, 1006, 1041, 1008, 19204, 9363, 3372, 26611, 1007, 5676, 2890, 25523, 11927, 11045, 2078, 1006, 2326, 6305, 3597, 16671, 1008, 1058, 2487, 1012, 2326, 6305, 3597, 16671, 1007, 1006, 1013, 1008, 2128, 11129, 1008, 1013, 220...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/zz_generated.deepcopy.go
DeepCopy
func (in *CustomResourceSubresources) DeepCopy() *CustomResourceSubresources { if in == nil { return nil } out := new(CustomResourceSubresources) in.DeepCopyInto(out) return out }
go
func (in *CustomResourceSubresources) DeepCopy() *CustomResourceSubresources { if in == nil { return nil } out := new(CustomResourceSubresources) in.DeepCopyInto(out) return out }
[ "func", "(", "in", "*", "CustomResourceSubresources", ")", "DeepCopy", "(", ")", "*", "CustomResourceSubresources", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "CustomResourceSubresources", ")", "\n", "in", ...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new CustomResourceSubresources.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "CustomResourceSubresources", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/zz_generated.deepcopy.go#L331-L338
train
DeepCopy is an autogenerated deepcopy function copying the receiver creating a new CustomResourceSubresources.
[ 30522, 4569, 2278, 1006, 1999, 1008, 7661, 6072, 8162, 9623, 12083, 6072, 8162, 9623, 1007, 2784, 3597, 7685, 1006, 1007, 1008, 7661, 6072, 8162, 9623, 12083, 6072, 8162, 9623, 1063, 2065, 1999, 1027, 1027, 9152, 2140, 1063, 2709, 9152, 2...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
cmd/kubeadm/app/cmd/reset.go
resetConfigDir
func resetConfigDir(configPathDir, pkiPathDir string) { dirsToClean := []string{ filepath.Join(configPathDir, kubeadmconstants.ManifestsSubDirName), pkiPathDir, } fmt.Printf("[reset] Deleting contents of config directories: %v\n", dirsToClean) for _, dir := range dirsToClean { if err := cleanDir(dir); err != nil { klog.Errorf("[reset] Failed to remove directory: %q [%v]\n", dir, err) } } filesToClean := []string{ filepath.Join(configPathDir, kubeadmconstants.AdminKubeConfigFileName), filepath.Join(configPathDir, kubeadmconstants.KubeletKubeConfigFileName), filepath.Join(configPathDir, kubeadmconstants.KubeletBootstrapKubeConfigFileName), filepath.Join(configPathDir, kubeadmconstants.ControllerManagerKubeConfigFileName), filepath.Join(configPathDir, kubeadmconstants.SchedulerKubeConfigFileName), } fmt.Printf("[reset] Deleting files: %v\n", filesToClean) for _, path := range filesToClean { if err := os.RemoveAll(path); err != nil { klog.Errorf("[reset] Failed to remove file: %q [%v]\n", path, err) } } }
go
func resetConfigDir(configPathDir, pkiPathDir string) { dirsToClean := []string{ filepath.Join(configPathDir, kubeadmconstants.ManifestsSubDirName), pkiPathDir, } fmt.Printf("[reset] Deleting contents of config directories: %v\n", dirsToClean) for _, dir := range dirsToClean { if err := cleanDir(dir); err != nil { klog.Errorf("[reset] Failed to remove directory: %q [%v]\n", dir, err) } } filesToClean := []string{ filepath.Join(configPathDir, kubeadmconstants.AdminKubeConfigFileName), filepath.Join(configPathDir, kubeadmconstants.KubeletKubeConfigFileName), filepath.Join(configPathDir, kubeadmconstants.KubeletBootstrapKubeConfigFileName), filepath.Join(configPathDir, kubeadmconstants.ControllerManagerKubeConfigFileName), filepath.Join(configPathDir, kubeadmconstants.SchedulerKubeConfigFileName), } fmt.Printf("[reset] Deleting files: %v\n", filesToClean) for _, path := range filesToClean { if err := os.RemoveAll(path); err != nil { klog.Errorf("[reset] Failed to remove file: %q [%v]\n", path, err) } } }
[ "func", "resetConfigDir", "(", "configPathDir", ",", "pkiPathDir", "string", ")", "{", "dirsToClean", ":=", "[", "]", "string", "{", "filepath", ".", "Join", "(", "configPathDir", ",", "kubeadmconstants", ".", "ManifestsSubDirName", ")", ",", "pkiPathDir", ",", ...
// resetConfigDir is used to cleanup the files kubeadm writes in /etc/kubernetes/.
[ "resetConfigDir", "is", "used", "to", "cleanup", "the", "files", "kubeadm", "writes", "in", "/", "etc", "/", "kubernetes", "/", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/cmd/kubeadm/app/cmd/reset.go#L293-L318
train
resetConfigDir removes all the contents of the config directory
[ 30522, 4569, 2278, 25141, 8663, 8873, 2290, 4305, 2099, 1006, 9530, 8873, 21600, 8988, 4305, 2099, 1010, 1052, 3211, 15069, 4305, 2099, 5164, 1007, 1063, 16101, 16033, 14321, 2319, 1024, 1027, 1031, 1033, 5164, 1063, 5371, 15069, 1012, 3693...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/client-go/rest/request.go
request
func (r *Request) request(fn func(*http.Request, *http.Response)) error { //Metrics for total request latency start := time.Now() defer func() { metrics.RequestLatency.Observe(r.verb, r.finalURLTemplate(), time.Since(start)) }() if r.err != nil { klog.V(4).Infof("Error in request: %v", r.err) return r.err } // TODO: added to catch programmer errors (invoking operations with an object with an empty namespace) if (r.verb == "GET" || r.verb == "PUT" || r.verb == "DELETE") && r.namespaceSet && len(r.resourceName) > 0 && len(r.namespace) == 0 { return fmt.Errorf("an empty namespace may not be set when a resource name is provided") } if (r.verb == "POST") && r.namespaceSet && len(r.namespace) == 0 { return fmt.Errorf("an empty namespace may not be set during creation") } client := r.client if client == nil { client = http.DefaultClient } // Right now we make about ten retry attempts if we get a Retry-After response. maxRetries := 10 retries := 0 for { url := r.URL().String() req, err := http.NewRequest(r.verb, url, r.body) if err != nil { return err } if r.timeout > 0 { if r.ctx == nil { r.ctx = context.Background() } var cancelFn context.CancelFunc r.ctx, cancelFn = context.WithTimeout(r.ctx, r.timeout) defer cancelFn() } if r.ctx != nil { req = req.WithContext(r.ctx) } req.Header = r.headers r.backoffMgr.Sleep(r.backoffMgr.CalculateBackoff(r.URL())) if retries > 0 { // We are retrying the request that we already send to apiserver // at least once before. // This request should also be throttled with the client-internal throttler. r.tryThrottle() } resp, err := client.Do(req) updateURLMetrics(r, resp, err) if err != nil { r.backoffMgr.UpdateBackoff(r.URL(), err, 0) } else { r.backoffMgr.UpdateBackoff(r.URL(), err, resp.StatusCode) } if err != nil { // "Connection reset by peer" is usually a transient error. // Thus in case of "GET" operations, we simply retry it. // We are not automatically retrying "write" operations, as // they are not idempotent. if !net.IsConnectionReset(err) || r.verb != "GET" { return err } // For the purpose of retry, we set the artificial "retry-after" response. // TODO: Should we clean the original response if it exists? resp = &http.Response{ StatusCode: http.StatusInternalServerError, Header: http.Header{"Retry-After": []string{"1"}}, Body: ioutil.NopCloser(bytes.NewReader([]byte{})), } } done := func() bool { // Ensure the response body is fully read and closed // before we reconnect, so that we reuse the same TCP // connection. defer func() { const maxBodySlurpSize = 2 << 10 if resp.ContentLength <= maxBodySlurpSize { io.Copy(ioutil.Discard, &io.LimitedReader{R: resp.Body, N: maxBodySlurpSize}) } resp.Body.Close() }() retries++ if seconds, wait := checkWait(resp); wait && retries < maxRetries { if seeker, ok := r.body.(io.Seeker); ok && r.body != nil { _, err := seeker.Seek(0, 0) if err != nil { klog.V(4).Infof("Could not retry request, can't Seek() back to beginning of body for %T", r.body) fn(req, resp) return true } } klog.V(4).Infof("Got a Retry-After %ds response for attempt %d to %v", seconds, retries, url) r.backoffMgr.Sleep(time.Duration(seconds) * time.Second) return false } fn(req, resp) return true }() if done { return nil } } }
go
func (r *Request) request(fn func(*http.Request, *http.Response)) error { //Metrics for total request latency start := time.Now() defer func() { metrics.RequestLatency.Observe(r.verb, r.finalURLTemplate(), time.Since(start)) }() if r.err != nil { klog.V(4).Infof("Error in request: %v", r.err) return r.err } // TODO: added to catch programmer errors (invoking operations with an object with an empty namespace) if (r.verb == "GET" || r.verb == "PUT" || r.verb == "DELETE") && r.namespaceSet && len(r.resourceName) > 0 && len(r.namespace) == 0 { return fmt.Errorf("an empty namespace may not be set when a resource name is provided") } if (r.verb == "POST") && r.namespaceSet && len(r.namespace) == 0 { return fmt.Errorf("an empty namespace may not be set during creation") } client := r.client if client == nil { client = http.DefaultClient } // Right now we make about ten retry attempts if we get a Retry-After response. maxRetries := 10 retries := 0 for { url := r.URL().String() req, err := http.NewRequest(r.verb, url, r.body) if err != nil { return err } if r.timeout > 0 { if r.ctx == nil { r.ctx = context.Background() } var cancelFn context.CancelFunc r.ctx, cancelFn = context.WithTimeout(r.ctx, r.timeout) defer cancelFn() } if r.ctx != nil { req = req.WithContext(r.ctx) } req.Header = r.headers r.backoffMgr.Sleep(r.backoffMgr.CalculateBackoff(r.URL())) if retries > 0 { // We are retrying the request that we already send to apiserver // at least once before. // This request should also be throttled with the client-internal throttler. r.tryThrottle() } resp, err := client.Do(req) updateURLMetrics(r, resp, err) if err != nil { r.backoffMgr.UpdateBackoff(r.URL(), err, 0) } else { r.backoffMgr.UpdateBackoff(r.URL(), err, resp.StatusCode) } if err != nil { // "Connection reset by peer" is usually a transient error. // Thus in case of "GET" operations, we simply retry it. // We are not automatically retrying "write" operations, as // they are not idempotent. if !net.IsConnectionReset(err) || r.verb != "GET" { return err } // For the purpose of retry, we set the artificial "retry-after" response. // TODO: Should we clean the original response if it exists? resp = &http.Response{ StatusCode: http.StatusInternalServerError, Header: http.Header{"Retry-After": []string{"1"}}, Body: ioutil.NopCloser(bytes.NewReader([]byte{})), } } done := func() bool { // Ensure the response body is fully read and closed // before we reconnect, so that we reuse the same TCP // connection. defer func() { const maxBodySlurpSize = 2 << 10 if resp.ContentLength <= maxBodySlurpSize { io.Copy(ioutil.Discard, &io.LimitedReader{R: resp.Body, N: maxBodySlurpSize}) } resp.Body.Close() }() retries++ if seconds, wait := checkWait(resp); wait && retries < maxRetries { if seeker, ok := r.body.(io.Seeker); ok && r.body != nil { _, err := seeker.Seek(0, 0) if err != nil { klog.V(4).Infof("Could not retry request, can't Seek() back to beginning of body for %T", r.body) fn(req, resp) return true } } klog.V(4).Infof("Got a Retry-After %ds response for attempt %d to %v", seconds, retries, url) r.backoffMgr.Sleep(time.Duration(seconds) * time.Second) return false } fn(req, resp) return true }() if done { return nil } } }
[ "func", "(", "r", "*", "Request", ")", "request", "(", "fn", "func", "(", "*", "http", ".", "Request", ",", "*", "http", ".", "Response", ")", ")", "error", "{", "//Metrics for total request latency", "start", ":=", "time", ".", "Now", "(", ")", "\n", ...
// request connects to the server and invokes the provided function when a server response is // received. It handles retry behavior and up front validation of requests. It will invoke // fn at most once. It will return an error if a problem occurred prior to connecting to the // server - the provided function is responsible for handling server errors.
[ "request", "connects", "to", "the", "server", "and", "invokes", "the", "provided", "function", "when", "a", "server", "response", "is", "received", ".", "It", "handles", "retry", "behavior", "and", "up", "front", "validation", "of", "requests", ".", "It", "w...
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/client-go/rest/request.go#L683-L795
train
request is a helper function to make a request to the server.
[ 30522, 4569, 2278, 1006, 1054, 1008, 5227, 1007, 5227, 1006, 1042, 2078, 4569, 2278, 1006, 1008, 8299, 1012, 5227, 1010, 1008, 8299, 1012, 3433, 1007, 30524, 6633, 15725, 1006, 1007, 1010, 2051, 1012, 2144, 1006, 2707, 1007, 1007, 1065, 1...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/controller/volume/persistentvolume/config/v1alpha1/zz_generated.conversion.go
RegisterConversions
func RegisterConversions(s *runtime.Scheme) error { if err := s.AddGeneratedConversionFunc((*v1alpha1.GroupResource)(nil), (*v1.GroupResource)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_GroupResource_To_v1_GroupResource(a.(*v1alpha1.GroupResource), b.(*v1.GroupResource), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*v1.GroupResource)(nil), (*v1alpha1.GroupResource)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1_GroupResource_To_v1alpha1_GroupResource(a.(*v1.GroupResource), b.(*v1alpha1.GroupResource), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*v1alpha1.PersistentVolumeBinderControllerConfiguration)(nil), (*config.PersistentVolumeBinderControllerConfiguration)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_PersistentVolumeBinderControllerConfiguration_To_config_PersistentVolumeBinderControllerConfiguration(a.(*v1alpha1.PersistentVolumeBinderControllerConfiguration), b.(*config.PersistentVolumeBinderControllerConfiguration), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*config.PersistentVolumeBinderControllerConfiguration)(nil), (*v1alpha1.PersistentVolumeBinderControllerConfiguration)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_config_PersistentVolumeBinderControllerConfiguration_To_v1alpha1_PersistentVolumeBinderControllerConfiguration(a.(*config.PersistentVolumeBinderControllerConfiguration), b.(*v1alpha1.PersistentVolumeBinderControllerConfiguration), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*v1alpha1.PersistentVolumeRecyclerConfiguration)(nil), (*config.PersistentVolumeRecyclerConfiguration)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_PersistentVolumeRecyclerConfiguration_To_config_PersistentVolumeRecyclerConfiguration(a.(*v1alpha1.PersistentVolumeRecyclerConfiguration), b.(*config.PersistentVolumeRecyclerConfiguration), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*config.PersistentVolumeRecyclerConfiguration)(nil), (*v1alpha1.PersistentVolumeRecyclerConfiguration)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_config_PersistentVolumeRecyclerConfiguration_To_v1alpha1_PersistentVolumeRecyclerConfiguration(a.(*config.PersistentVolumeRecyclerConfiguration), b.(*v1alpha1.PersistentVolumeRecyclerConfiguration), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*v1alpha1.VolumeConfiguration)(nil), (*config.VolumeConfiguration)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_VolumeConfiguration_To_config_VolumeConfiguration(a.(*v1alpha1.VolumeConfiguration), b.(*config.VolumeConfiguration), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*config.VolumeConfiguration)(nil), (*v1alpha1.VolumeConfiguration)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_config_VolumeConfiguration_To_v1alpha1_VolumeConfiguration(a.(*config.VolumeConfiguration), b.(*v1alpha1.VolumeConfiguration), scope) }); err != nil { return err } if err := s.AddConversionFunc((*config.PersistentVolumeBinderControllerConfiguration)(nil), (*v1alpha1.PersistentVolumeBinderControllerConfiguration)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_config_PersistentVolumeBinderControllerConfiguration_To_v1alpha1_PersistentVolumeBinderControllerConfiguration(a.(*config.PersistentVolumeBinderControllerConfiguration), b.(*v1alpha1.PersistentVolumeBinderControllerConfiguration), scope) }); err != nil { return err } if err := s.AddConversionFunc((*v1alpha1.PersistentVolumeBinderControllerConfiguration)(nil), (*config.PersistentVolumeBinderControllerConfiguration)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_PersistentVolumeBinderControllerConfiguration_To_config_PersistentVolumeBinderControllerConfiguration(a.(*v1alpha1.PersistentVolumeBinderControllerConfiguration), b.(*config.PersistentVolumeBinderControllerConfiguration), scope) }); err != nil { return err } return nil }
go
func RegisterConversions(s *runtime.Scheme) error { if err := s.AddGeneratedConversionFunc((*v1alpha1.GroupResource)(nil), (*v1.GroupResource)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_GroupResource_To_v1_GroupResource(a.(*v1alpha1.GroupResource), b.(*v1.GroupResource), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*v1.GroupResource)(nil), (*v1alpha1.GroupResource)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1_GroupResource_To_v1alpha1_GroupResource(a.(*v1.GroupResource), b.(*v1alpha1.GroupResource), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*v1alpha1.PersistentVolumeBinderControllerConfiguration)(nil), (*config.PersistentVolumeBinderControllerConfiguration)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_PersistentVolumeBinderControllerConfiguration_To_config_PersistentVolumeBinderControllerConfiguration(a.(*v1alpha1.PersistentVolumeBinderControllerConfiguration), b.(*config.PersistentVolumeBinderControllerConfiguration), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*config.PersistentVolumeBinderControllerConfiguration)(nil), (*v1alpha1.PersistentVolumeBinderControllerConfiguration)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_config_PersistentVolumeBinderControllerConfiguration_To_v1alpha1_PersistentVolumeBinderControllerConfiguration(a.(*config.PersistentVolumeBinderControllerConfiguration), b.(*v1alpha1.PersistentVolumeBinderControllerConfiguration), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*v1alpha1.PersistentVolumeRecyclerConfiguration)(nil), (*config.PersistentVolumeRecyclerConfiguration)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_PersistentVolumeRecyclerConfiguration_To_config_PersistentVolumeRecyclerConfiguration(a.(*v1alpha1.PersistentVolumeRecyclerConfiguration), b.(*config.PersistentVolumeRecyclerConfiguration), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*config.PersistentVolumeRecyclerConfiguration)(nil), (*v1alpha1.PersistentVolumeRecyclerConfiguration)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_config_PersistentVolumeRecyclerConfiguration_To_v1alpha1_PersistentVolumeRecyclerConfiguration(a.(*config.PersistentVolumeRecyclerConfiguration), b.(*v1alpha1.PersistentVolumeRecyclerConfiguration), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*v1alpha1.VolumeConfiguration)(nil), (*config.VolumeConfiguration)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_VolumeConfiguration_To_config_VolumeConfiguration(a.(*v1alpha1.VolumeConfiguration), b.(*config.VolumeConfiguration), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*config.VolumeConfiguration)(nil), (*v1alpha1.VolumeConfiguration)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_config_VolumeConfiguration_To_v1alpha1_VolumeConfiguration(a.(*config.VolumeConfiguration), b.(*v1alpha1.VolumeConfiguration), scope) }); err != nil { return err } if err := s.AddConversionFunc((*config.PersistentVolumeBinderControllerConfiguration)(nil), (*v1alpha1.PersistentVolumeBinderControllerConfiguration)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_config_PersistentVolumeBinderControllerConfiguration_To_v1alpha1_PersistentVolumeBinderControllerConfiguration(a.(*config.PersistentVolumeBinderControllerConfiguration), b.(*v1alpha1.PersistentVolumeBinderControllerConfiguration), scope) }); err != nil { return err } if err := s.AddConversionFunc((*v1alpha1.PersistentVolumeBinderControllerConfiguration)(nil), (*config.PersistentVolumeBinderControllerConfiguration)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_PersistentVolumeBinderControllerConfiguration_To_config_PersistentVolumeBinderControllerConfiguration(a.(*v1alpha1.PersistentVolumeBinderControllerConfiguration), b.(*config.PersistentVolumeBinderControllerConfiguration), scope) }); err != nil { return err } return nil }
[ "func", "RegisterConversions", "(", "s", "*", "runtime", ".", "Scheme", ")", "error", "{", "if", "err", ":=", "s", ".", "AddGeneratedConversionFunc", "(", "(", "*", "v1alpha1", ".", "GroupResource", ")", "(", "nil", ")", ",", "(", "*", "v1", ".", "Grou...
// RegisterConversions adds conversion functions to the given scheme. // Public to allow building arbitrary schemes.
[ "RegisterConversions", "adds", "conversion", "functions", "to", "the", "given", "scheme", ".", "Public", "to", "allow", "building", "arbitrary", "schemes", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/controller/volume/persistentvolume/config/v1alpha1/zz_generated.conversion.go#L37-L89
train
RegisterConversions registers conversion functions to the given scheme.
[ 30522, 4569, 2278, 4236, 8663, 27774, 2015, 1006, 1055, 1008, 2448, 7292, 1012, 5679, 1007, 7561, 1063, 2065, 9413, 2099, 1024, 1027, 1055, 1012, 5587, 6914, 16848, 8663, 27774, 11263, 12273, 1006, 1006, 1008, 1058, 2487, 2389, 21890, 2487,...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/volume/util/util.go
GetUniquePodName
func GetUniquePodName(pod *v1.Pod) types.UniquePodName { return types.UniquePodName(pod.UID) }
go
func GetUniquePodName(pod *v1.Pod) types.UniquePodName { return types.UniquePodName(pod.UID) }
[ "func", "GetUniquePodName", "(", "pod", "*", "v1", ".", "Pod", ")", "types", ".", "UniquePodName", "{", "return", "types", ".", "UniquePodName", "(", "pod", ".", "UID", ")", "\n", "}" ]
// GetUniquePodName returns a unique identifier to reference a pod by
[ "GetUniquePodName", "returns", "a", "unique", "identifier", "to", "reference", "a", "pod", "by" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/volume/util/util.go#L323-L325
train
GetUniquePodName returns the unique pod name for a pod.
[ 30522, 4569, 2278, 2131, 19496, 4226, 27633, 18442, 1006, 17491, 1008, 1058, 2487, 1012, 17491, 1007, 4127, 1012, 4310, 27633, 18442, 1063, 2709, 4127, 1012, 4310, 27633, 18442, 1006, 17491, 1012, 21318, 2094, 1007, 1065, 102, 0, 0, 0, 0,...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/api/extensions/v1beta1/zz_generated.deepcopy.go
DeepCopyObject
func (in *IngressList) DeepCopyObject() runtime.Object { if c := in.DeepCopy(); c != nil { return c } return nil }
go
func (in *IngressList) DeepCopyObject() runtime.Object { if c := in.DeepCopy(); c != nil { return c } return nil }
[ "func", "(", "in", "*", "IngressList", ")", "DeepCopyObject", "(", ")", "runtime", ".", "Object", "{", "if", "c", ":=", "in", ".", "DeepCopy", "(", ")", ";", "c", "!=", "nil", "{", "return", "c", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
[ "DeepCopyObject", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "runtime", ".", "Object", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/api/extensions/v1beta1/zz_generated.deepcopy.go#L620-L625
train
DeepCopyObject is an autogenerated deepcopy function copying the receiver creating a new runtime. Object.
[ 30522, 4569, 2278, 1006, 1999, 1008, 13749, 8303, 9863, 1007, 2784, 3597, 7685, 16429, 20614, 1006, 1007, 2448, 7292, 1012, 4874, 1063, 2065, 1039, 1024, 1027, 1999, 1012, 2784, 3597, 7685, 1006, 1007, 1025, 1039, 999, 1027, 9152, 2140, 1...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
cmd/kubeadm/app/preflight/checks_unix.go
Check
func (ipuc IsPrivilegedUserCheck) Check() (warnings, errorList []error) { errorList = []error{} if os.Getuid() != 0 { errorList = append(errorList, errors.New("user is not running as root")) } return nil, errorList }
go
func (ipuc IsPrivilegedUserCheck) Check() (warnings, errorList []error) { errorList = []error{} if os.Getuid() != 0 { errorList = append(errorList, errors.New("user is not running as root")) } return nil, errorList }
[ "func", "(", "ipuc", "IsPrivilegedUserCheck", ")", "Check", "(", ")", "(", "warnings", ",", "errorList", "[", "]", "error", ")", "{", "errorList", "=", "[", "]", "error", "{", "}", "\n", "if", "os", ".", "Getuid", "(", ")", "!=", "0", "{", "errorLi...
// Check validates if an user has elevated (root) privileges.
[ "Check", "validates", "if", "an", "user", "has", "elevated", "(", "root", ")", "privileges", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/cmd/kubeadm/app/preflight/checks_unix.go#L28-L35
train
Check is a wrapper for IsPrivilegedUserCheck.
[ 30522, 4569, 2278, 1006, 12997, 14194, 2003, 18098, 12848, 9463, 5999, 20330, 5403, 3600, 1007, 4638, 1006, 1007, 1006, 16234, 1010, 7561, 9863, 1031, 1033, 7561, 1007, 1063, 7561, 9863, 1027, 1031, 1033, 7561, 1063, 1065, 2065, 9808, 1012,...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
hack/make-rules/helpers/go2make/pkgwalk.go
findPackage
func findPackage(pkgName string) (*build.Package, error) { debug("find", pkgName) pkg, err := build.Import(pkgName, getwd(), build.FindOnly) if err != nil { return nil, err } return pkg, nil }
go
func findPackage(pkgName string) (*build.Package, error) { debug("find", pkgName) pkg, err := build.Import(pkgName, getwd(), build.FindOnly) if err != nil { return nil, err } return pkg, nil }
[ "func", "findPackage", "(", "pkgName", "string", ")", "(", "*", "build", ".", "Package", ",", "error", ")", "{", "debug", "(", "\"", "\"", ",", "pkgName", ")", "\n", "pkg", ",", "err", ":=", "build", ".", "Import", "(", "pkgName", ",", "getwd", "("...
// findPackage finds a Go package.
[ "findPackage", "finds", "a", "Go", "package", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/hack/make-rules/helpers/go2make/pkgwalk.go#L73-L80
train
findPackage returns a package with the given name.
[ 30522, 4569, 2278, 2424, 23947, 4270, 1006, 1052, 2243, 16989, 4168, 5164, 1007, 1006, 1008, 3857, 1012, 7427, 1010, 7561, 1007, 1063, 2139, 8569, 2290, 1006, 1000, 2424, 1000, 1010, 1052, 2243, 16989, 4168, 1007, 1052, 2243, 2290, 1010, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/controller/garbagecollector/garbagecollector.go
printDiff
func printDiff(oldResources, newResources map[schema.GroupVersionResource]struct{}) string { removed := sets.NewString() for oldResource := range oldResources { if _, ok := newResources[oldResource]; !ok { removed.Insert(fmt.Sprintf("%+v", oldResource)) } } added := sets.NewString() for newResource := range newResources { if _, ok := oldResources[newResource]; !ok { added.Insert(fmt.Sprintf("%+v", newResource)) } } return fmt.Sprintf("added: %v, removed: %v", added.List(), removed.List()) }
go
func printDiff(oldResources, newResources map[schema.GroupVersionResource]struct{}) string { removed := sets.NewString() for oldResource := range oldResources { if _, ok := newResources[oldResource]; !ok { removed.Insert(fmt.Sprintf("%+v", oldResource)) } } added := sets.NewString() for newResource := range newResources { if _, ok := oldResources[newResource]; !ok { added.Insert(fmt.Sprintf("%+v", newResource)) } } return fmt.Sprintf("added: %v, removed: %v", added.List(), removed.List()) }
[ "func", "printDiff", "(", "oldResources", ",", "newResources", "map", "[", "schema", ".", "GroupVersionResource", "]", "struct", "{", "}", ")", "string", "{", "removed", ":=", "sets", ".", "NewString", "(", ")", "\n", "for", "oldResource", ":=", "range", "...
// printDiff returns a human-readable summary of what resources were added and removed
[ "printDiff", "returns", "a", "human", "-", "readable", "summary", "of", "what", "resources", "were", "added", "and", "removed" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/controller/garbagecollector/garbagecollector.go#L247-L261
train
printDiff returns a string containing the diff between two resources.
[ 30522, 4569, 2278, 6140, 4305, 4246, 1006, 2214, 6072, 8162, 9623, 1010, 2047, 6072, 8162, 9623, 4949, 1031, 8040, 28433, 1012, 2177, 27774, 6072, 8162, 3401, 1033, 2358, 6820, 6593, 1063, 1065, 1007, 5164, 1063, 3718, 1024, 1027, 4520, 1...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/volume/storageos/storageos.go
parseAPIConfig
func parseAPIConfig(params map[string]string) (*storageosAPIConfig, error) { if len(params) == 0 { return nil, fmt.Errorf("empty API config") } c := &storageosAPIConfig{} for name, data := range params { switch strings.ToLower(name) { case "apiaddress": c.apiAddr = string(data) case "apiusername": c.apiUser = string(data) case "apipassword": c.apiPass = string(data) case "apiversion": c.apiVersion = string(data) } } return c, nil }
go
func parseAPIConfig(params map[string]string) (*storageosAPIConfig, error) { if len(params) == 0 { return nil, fmt.Errorf("empty API config") } c := &storageosAPIConfig{} for name, data := range params { switch strings.ToLower(name) { case "apiaddress": c.apiAddr = string(data) case "apiusername": c.apiUser = string(data) case "apipassword": c.apiPass = string(data) case "apiversion": c.apiVersion = string(data) } } return c, nil }
[ "func", "parseAPIConfig", "(", "params", "map", "[", "string", "]", "string", ")", "(", "*", "storageosAPIConfig", ",", "error", ")", "{", "if", "len", "(", "params", ")", "==", "0", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ...
// Parse API configuration from parameters or secret
[ "Parse", "API", "configuration", "from", "parameters", "or", "secret" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/volume/storageos/storageos.go#L750-L772
train
parseAPIConfig parses the API config from a map
[ 30522, 4569, 2278, 11968, 17310, 24330, 2239, 8873, 2290, 1006, 11498, 5244, 4949, 1031, 5164, 1033, 5164, 1007, 1006, 1008, 5527, 8820, 24330, 2239, 8873, 2290, 1010, 7561, 1007, 1063, 2065, 18798, 1006, 11498, 5244, 1007, 1027, 1027, 1014...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/kubelet/images/image_gc_manager.go
freeSpace
func (im *realImageGCManager) freeSpace(bytesToFree int64, freeTime time.Time) (int64, error) { imagesInUse, err := im.detectImages(freeTime) if err != nil { return 0, err } im.imageRecordsLock.Lock() defer im.imageRecordsLock.Unlock() // Get all images in eviction order. images := make([]evictionInfo, 0, len(im.imageRecords)) for image, record := range im.imageRecords { if isImageUsed(image, imagesInUse) { klog.V(5).Infof("Image ID %s is being used", image) continue } images = append(images, evictionInfo{ id: image, imageRecord: *record, }) } sort.Sort(byLastUsedAndDetected(images)) // Delete unused images until we've freed up enough space. var deletionErrors []error spaceFreed := int64(0) for _, image := range images { klog.V(5).Infof("Evaluating image ID %s for possible garbage collection", image.id) // Images that are currently in used were given a newer lastUsed. if image.lastUsed.Equal(freeTime) || image.lastUsed.After(freeTime) { klog.V(5).Infof("Image ID %s has lastUsed=%v which is >= freeTime=%v, not eligible for garbage collection", image.id, image.lastUsed, freeTime) continue } // Avoid garbage collect the image if the image is not old enough. // In such a case, the image may have just been pulled down, and will be used by a container right away. if freeTime.Sub(image.firstDetected) < im.policy.MinAge { klog.V(5).Infof("Image ID %s has age %v which is less than the policy's minAge of %v, not eligible for garbage collection", image.id, freeTime.Sub(image.firstDetected), im.policy.MinAge) continue } // Remove image. Continue despite errors. klog.Infof("[imageGCManager]: Removing image %q to free %d bytes", image.id, image.size) err := im.runtime.RemoveImage(container.ImageSpec{Image: image.id}) if err != nil { deletionErrors = append(deletionErrors, err) continue } delete(im.imageRecords, image.id) spaceFreed += image.size if spaceFreed >= bytesToFree { break } } if len(deletionErrors) > 0 { return spaceFreed, fmt.Errorf("wanted to free %d bytes, but freed %d bytes space with errors in image deletion: %v", bytesToFree, spaceFreed, errors.NewAggregate(deletionErrors)) } return spaceFreed, nil }
go
func (im *realImageGCManager) freeSpace(bytesToFree int64, freeTime time.Time) (int64, error) { imagesInUse, err := im.detectImages(freeTime) if err != nil { return 0, err } im.imageRecordsLock.Lock() defer im.imageRecordsLock.Unlock() // Get all images in eviction order. images := make([]evictionInfo, 0, len(im.imageRecords)) for image, record := range im.imageRecords { if isImageUsed(image, imagesInUse) { klog.V(5).Infof("Image ID %s is being used", image) continue } images = append(images, evictionInfo{ id: image, imageRecord: *record, }) } sort.Sort(byLastUsedAndDetected(images)) // Delete unused images until we've freed up enough space. var deletionErrors []error spaceFreed := int64(0) for _, image := range images { klog.V(5).Infof("Evaluating image ID %s for possible garbage collection", image.id) // Images that are currently in used were given a newer lastUsed. if image.lastUsed.Equal(freeTime) || image.lastUsed.After(freeTime) { klog.V(5).Infof("Image ID %s has lastUsed=%v which is >= freeTime=%v, not eligible for garbage collection", image.id, image.lastUsed, freeTime) continue } // Avoid garbage collect the image if the image is not old enough. // In such a case, the image may have just been pulled down, and will be used by a container right away. if freeTime.Sub(image.firstDetected) < im.policy.MinAge { klog.V(5).Infof("Image ID %s has age %v which is less than the policy's minAge of %v, not eligible for garbage collection", image.id, freeTime.Sub(image.firstDetected), im.policy.MinAge) continue } // Remove image. Continue despite errors. klog.Infof("[imageGCManager]: Removing image %q to free %d bytes", image.id, image.size) err := im.runtime.RemoveImage(container.ImageSpec{Image: image.id}) if err != nil { deletionErrors = append(deletionErrors, err) continue } delete(im.imageRecords, image.id) spaceFreed += image.size if spaceFreed >= bytesToFree { break } } if len(deletionErrors) > 0 { return spaceFreed, fmt.Errorf("wanted to free %d bytes, but freed %d bytes space with errors in image deletion: %v", bytesToFree, spaceFreed, errors.NewAggregate(deletionErrors)) } return spaceFreed, nil }
[ "func", "(", "im", "*", "realImageGCManager", ")", "freeSpace", "(", "bytesToFree", "int64", ",", "freeTime", "time", ".", "Time", ")", "(", "int64", ",", "error", ")", "{", "imagesInUse", ",", "err", ":=", "im", ".", "detectImages", "(", "freeTime", ")"...
// Tries to free bytesToFree worth of images on the disk. // // Returns the number of bytes free and an error if any occurred. The number of // bytes freed is always returned. // Note that error may be nil and the number of bytes free may be less // than bytesToFree.
[ "Tries", "to", "free", "bytesToFree", "worth", "of", "images", "on", "the", "disk", ".", "Returns", "the", "number", "of", "bytes", "free", "and", "an", "error", "if", "any", "occurred", ".", "The", "number", "of", "bytes", "freed", "is", "always", "retu...
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/kubelet/images/image_gc_manager.go#L328-L389
train
freeSpace is used to free up enough space.
[ 30522, 4569, 2278, 1006, 10047, 1008, 2613, 9581, 3351, 18195, 24805, 4590, 1007, 2489, 23058, 1006, 27507, 3406, 23301, 20014, 21084, 1010, 2489, 7292, 2051, 1012, 2051, 1007, 1006, 20014, 21084, 1010, 7561, 1007, 1063, 4871, 13429, 2063, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/client-go/tools/clientcmd/client_config.go
RESTConfigFromKubeConfig
func RESTConfigFromKubeConfig(configBytes []byte) (*restclient.Config, error) { clientConfig, err := NewClientConfigFromBytes(configBytes) if err != nil { return nil, err } return clientConfig.ClientConfig() }
go
func RESTConfigFromKubeConfig(configBytes []byte) (*restclient.Config, error) { clientConfig, err := NewClientConfigFromBytes(configBytes) if err != nil { return nil, err } return clientConfig.ClientConfig() }
[ "func", "RESTConfigFromKubeConfig", "(", "configBytes", "[", "]", "byte", ")", "(", "*", "restclient", ".", "Config", ",", "error", ")", "{", "clientConfig", ",", "err", ":=", "NewClientConfigFromBytes", "(", "configBytes", ")", "\n", "if", "err", "!=", "nil...
// RESTConfigFromKubeConfig is a convenience method to give back a restconfig from your kubeconfig bytes. // For programmatic access, this is what you want 80% of the time
[ "RESTConfigFromKubeConfig", "is", "a", "convenience", "method", "to", "give", "back", "a", "restconfig", "from", "your", "kubeconfig", "bytes", ".", "For", "programmatic", "access", "this", "is", "what", "you", "want", "80%", "of", "the", "time" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/client-go/tools/clientcmd/client_config.go#L114-L120
train
RESTConfigFromKubeConfig returns a REST client config from a byte slice
[ 30522, 4569, 2278, 2717, 8663, 8873, 25708, 21716, 5283, 4783, 8663, 8873, 2290, 1006, 9530, 8873, 18259, 17250, 2015, 1031, 1033, 24880, 1007, 1006, 1008, 2717, 20464, 11638, 1012, 9530, 8873, 2290, 1010, 7561, 1007, 1063, 7396, 8663, 8873...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/kubelet/eviction/helpers.go
thresholdsMet
func thresholdsMet(thresholds []evictionapi.Threshold, observations signalObservations, enforceMinReclaim bool) []evictionapi.Threshold { results := []evictionapi.Threshold{} for i := range thresholds { threshold := thresholds[i] observed, found := observations[threshold.Signal] if !found { klog.Warningf("eviction manager: no observation found for eviction signal %v", threshold.Signal) continue } // determine if we have met the specified threshold thresholdMet := false quantity := evictionapi.GetThresholdQuantity(threshold.Value, observed.capacity) // if enforceMinReclaim is specified, we compare relative to value - minreclaim if enforceMinReclaim && threshold.MinReclaim != nil { quantity.Add(*evictionapi.GetThresholdQuantity(*threshold.MinReclaim, observed.capacity)) } thresholdResult := quantity.Cmp(*observed.available) switch threshold.Operator { case evictionapi.OpLessThan: thresholdMet = thresholdResult > 0 } if thresholdMet { results = append(results, threshold) } } return results }
go
func thresholdsMet(thresholds []evictionapi.Threshold, observations signalObservations, enforceMinReclaim bool) []evictionapi.Threshold { results := []evictionapi.Threshold{} for i := range thresholds { threshold := thresholds[i] observed, found := observations[threshold.Signal] if !found { klog.Warningf("eviction manager: no observation found for eviction signal %v", threshold.Signal) continue } // determine if we have met the specified threshold thresholdMet := false quantity := evictionapi.GetThresholdQuantity(threshold.Value, observed.capacity) // if enforceMinReclaim is specified, we compare relative to value - minreclaim if enforceMinReclaim && threshold.MinReclaim != nil { quantity.Add(*evictionapi.GetThresholdQuantity(*threshold.MinReclaim, observed.capacity)) } thresholdResult := quantity.Cmp(*observed.available) switch threshold.Operator { case evictionapi.OpLessThan: thresholdMet = thresholdResult > 0 } if thresholdMet { results = append(results, threshold) } } return results }
[ "func", "thresholdsMet", "(", "thresholds", "[", "]", "evictionapi", ".", "Threshold", ",", "observations", "signalObservations", ",", "enforceMinReclaim", "bool", ")", "[", "]", "evictionapi", ".", "Threshold", "{", "results", ":=", "[", "]", "evictionapi", "."...
// thresholdsMet returns the set of thresholds that were met independent of grace period
[ "thresholdsMet", "returns", "the", "set", "of", "thresholds", "that", "were", "met", "independent", "of", "grace", "period" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/kubelet/eviction/helpers.go#L780-L806
train
thresholdsMet returns a list of thresholds that are met by the specified signal.
[ 30522, 4569, 2278, 11207, 6491, 3388, 1006, 11207, 2015, 1031, 1033, 23408, 28097, 9331, 2072, 1012, 11207, 1010, 9420, 4742, 16429, 8043, 21596, 2015, 1010, 16306, 10020, 2890, 25154, 22017, 2140, 1007, 1031, 1033, 23408, 28097, 9331, 2072, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/node-api/pkg/client/listers/node/v1alpha1/runtimeclass.go
Get
func (s *runtimeClassLister) Get(name string) (*v1alpha1.RuntimeClass, error) { obj, exists, err := s.indexer.GetByKey(name) if err != nil { return nil, err } if !exists { return nil, errors.NewNotFound(v1alpha1.Resource("runtimeclass"), name) } return obj.(*v1alpha1.RuntimeClass), nil }
go
func (s *runtimeClassLister) Get(name string) (*v1alpha1.RuntimeClass, error) { obj, exists, err := s.indexer.GetByKey(name) if err != nil { return nil, err } if !exists { return nil, errors.NewNotFound(v1alpha1.Resource("runtimeclass"), name) } return obj.(*v1alpha1.RuntimeClass), nil }
[ "func", "(", "s", "*", "runtimeClassLister", ")", "Get", "(", "name", "string", ")", "(", "*", "v1alpha1", ".", "RuntimeClass", ",", "error", ")", "{", "obj", ",", "exists", ",", "err", ":=", "s", ".", "indexer", ".", "GetByKey", "(", "name", ")", ...
// Get retrieves the RuntimeClass from the index for a given name.
[ "Get", "retrieves", "the", "RuntimeClass", "from", "the", "index", "for", "a", "given", "name", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/node-api/pkg/client/listers/node/v1alpha1/runtimeclass.go#L56-L65
train
Get retrieves the RuntimeClass from the index for a given name.
[ 30522, 4569, 2278, 1006, 1055, 1008, 2448, 7292, 26266, 9863, 2121, 1007, 2131, 1006, 2171, 5164, 1007, 1006, 1008, 1058, 2487, 2389, 21890, 2487, 1012, 2448, 7292, 26266, 1010, 7561, 1007, 1063, 27885, 3501, 1010, 6526, 1010, 9413, 2099, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/apis/rbac/v1beta1/zz_generated.conversion.go
Convert_v1beta1_ClusterRole_To_rbac_ClusterRole
func Convert_v1beta1_ClusterRole_To_rbac_ClusterRole(in *v1beta1.ClusterRole, out *rbac.ClusterRole, s conversion.Scope) error { return autoConvert_v1beta1_ClusterRole_To_rbac_ClusterRole(in, out, s) }
go
func Convert_v1beta1_ClusterRole_To_rbac_ClusterRole(in *v1beta1.ClusterRole, out *rbac.ClusterRole, s conversion.Scope) error { return autoConvert_v1beta1_ClusterRole_To_rbac_ClusterRole(in, out, s) }
[ "func", "Convert_v1beta1_ClusterRole_To_rbac_ClusterRole", "(", "in", "*", "v1beta1", ".", "ClusterRole", ",", "out", "*", "rbac", ".", "ClusterRole", ",", "s", "conversion", ".", "Scope", ")", "error", "{", "return", "autoConvert_v1beta1_ClusterRole_To_rbac_ClusterRole...
// Convert_v1beta1_ClusterRole_To_rbac_ClusterRole is an autogenerated conversion function.
[ "Convert_v1beta1_ClusterRole_To_rbac_ClusterRole", "is", "an", "autogenerated", "conversion", "function", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/apis/rbac/v1beta1/zz_generated.conversion.go#L191-L193
train
Convert_v1beta1_ClusterRole_To_rbac_ClusterRole is an autogenerated conversion function.
[ 30522, 4569, 2278, 10463, 1035, 1058, 2487, 20915, 27717, 1035, 9324, 13153, 2063, 1035, 2000, 1035, 21144, 6305, 1035, 9324, 13153, 2063, 1006, 1999, 1008, 1058, 2487, 20915, 27717, 1012, 9324, 13153, 2063, 1010, 2041, 1008, 21144, 6305, 1...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/client-go/kubernetes/typed/storage/v1beta1/fake/fake_csidriver.go
Get
func (c *FakeCSIDrivers) Get(name string, options v1.GetOptions) (result *v1beta1.CSIDriver, err error) { obj, err := c.Fake. Invokes(testing.NewRootGetAction(csidriversResource, name), &v1beta1.CSIDriver{}) if obj == nil { return nil, err } return obj.(*v1beta1.CSIDriver), err }
go
func (c *FakeCSIDrivers) Get(name string, options v1.GetOptions) (result *v1beta1.CSIDriver, err error) { obj, err := c.Fake. Invokes(testing.NewRootGetAction(csidriversResource, name), &v1beta1.CSIDriver{}) if obj == nil { return nil, err } return obj.(*v1beta1.CSIDriver), err }
[ "func", "(", "c", "*", "FakeCSIDrivers", ")", "Get", "(", "name", "string", ",", "options", "v1", ".", "GetOptions", ")", "(", "result", "*", "v1beta1", ".", "CSIDriver", ",", "err", "error", ")", "{", "obj", ",", "err", ":=", "c", ".", "Fake", "."...
// Get takes name of the cSIDriver, and returns the corresponding cSIDriver object, and an error if there is any.
[ "Get", "takes", "name", "of", "the", "cSIDriver", "and", "returns", "the", "corresponding", "cSIDriver", "object", "and", "an", "error", "if", "there", "is", "any", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/client-go/kubernetes/typed/storage/v1beta1/fake/fake_csidriver.go#L41-L48
train
Get takes name of the cSIDriver and returns the corresponding cSIDriver object and an error if there is any.
[ 30522, 4569, 2278, 1006, 1039, 1008, 8275, 6169, 3593, 24352, 2015, 1007, 2131, 1006, 2171, 5164, 1010, 7047, 1058, 2487, 1012, 2131, 7361, 9285, 1007, 1006, 2765, 1008, 1058, 2487, 20915, 27717, 1012, 22174, 23663, 2099, 1010, 9413, 2099, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/util/ipvs/ipvs_linux.go
GetRealServers
func (runner *runner) GetRealServers(vs *VirtualServer) ([]*RealServer, error) { svc, err := toIPVSService(vs) if err != nil { return nil, err } runner.mu.Lock() dsts, err := runner.ipvsHandle.GetDestinations(svc) runner.mu.Unlock() if err != nil { return nil, err } rss := make([]*RealServer, 0) for _, dst := range dsts { dst, err := toRealServer(dst) // TODO: aggregate errors? if err != nil { return nil, err } rss = append(rss, dst) } return rss, nil }
go
func (runner *runner) GetRealServers(vs *VirtualServer) ([]*RealServer, error) { svc, err := toIPVSService(vs) if err != nil { return nil, err } runner.mu.Lock() dsts, err := runner.ipvsHandle.GetDestinations(svc) runner.mu.Unlock() if err != nil { return nil, err } rss := make([]*RealServer, 0) for _, dst := range dsts { dst, err := toRealServer(dst) // TODO: aggregate errors? if err != nil { return nil, err } rss = append(rss, dst) } return rss, nil }
[ "func", "(", "runner", "*", "runner", ")", "GetRealServers", "(", "vs", "*", "VirtualServer", ")", "(", "[", "]", "*", "RealServer", ",", "error", ")", "{", "svc", ",", "err", ":=", "toIPVSService", "(", "vs", ")", "\n", "if", "err", "!=", "nil", "...
// GetRealServers is part of ipvs.Interface.
[ "GetRealServers", "is", "part", "of", "ipvs", ".", "Interface", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/util/ipvs/ipvs_linux.go#L181-L202
train
GetRealServers returns a list of real servers
[ 30522, 4569, 2278, 1006, 5479, 1008, 5479, 1007, 2131, 22852, 8043, 14028, 1006, 5443, 1008, 7484, 8043, 6299, 1007, 1006, 1031, 1033, 1008, 2613, 8043, 6299, 1010, 7561, 1007, 1063, 17917, 2278, 1010, 9413, 2099, 1024, 1027, 2000, 11514, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/kubeapiserver/options/admission.go
Validate
func (a *AdmissionOptions) Validate() []error { if a == nil { return nil } errs := []error{} if a.PluginNames != nil && (a.GenericAdmission.EnablePlugins != nil || a.GenericAdmission.DisablePlugins != nil) { errs = append(errs, fmt.Errorf("admission-control and enable-admission-plugins/disable-admission-plugins flags are mutually exclusive")) } registeredPlugins := sets.NewString(a.GenericAdmission.Plugins.Registered()...) for _, name := range a.PluginNames { if !registeredPlugins.Has(name) { errs = append(errs, fmt.Errorf("admission-control plugin %q is unknown", name)) } } errs = append(errs, a.GenericAdmission.Validate()...) return errs }
go
func (a *AdmissionOptions) Validate() []error { if a == nil { return nil } errs := []error{} if a.PluginNames != nil && (a.GenericAdmission.EnablePlugins != nil || a.GenericAdmission.DisablePlugins != nil) { errs = append(errs, fmt.Errorf("admission-control and enable-admission-plugins/disable-admission-plugins flags are mutually exclusive")) } registeredPlugins := sets.NewString(a.GenericAdmission.Plugins.Registered()...) for _, name := range a.PluginNames { if !registeredPlugins.Has(name) { errs = append(errs, fmt.Errorf("admission-control plugin %q is unknown", name)) } } errs = append(errs, a.GenericAdmission.Validate()...) return errs }
[ "func", "(", "a", "*", "AdmissionOptions", ")", "Validate", "(", ")", "[", "]", "error", "{", "if", "a", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "errs", ":=", "[", "]", "error", "{", "}", "\n", "if", "a", ".", "PluginNames", "!=", "...
// Validate verifies flags passed to kube-apiserver AdmissionOptions. // Kube-apiserver verifies PluginNames and then call generic AdmissionOptions.Validate.
[ "Validate", "verifies", "flags", "passed", "to", "kube", "-", "apiserver", "AdmissionOptions", ".", "Kube", "-", "apiserver", "verifies", "PluginNames", "and", "then", "call", "generic", "AdmissionOptions", ".", "Validate", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/kubeapiserver/options/admission.go#L82-L102
train
Validate returns an error slice of errors if a is nil or a non - nil slice of errors
[ 30522, 4569, 2278, 1006, 1037, 1008, 9634, 7361, 9285, 1007, 9398, 3686, 1006, 1007, 1031, 1033, 7561, 1063, 2065, 1037, 1027, 1027, 9152, 2140, 1063, 2709, 9152, 2140, 1065, 9413, 2869, 1024, 1027, 1031, 1033, 7561, 1063, 1065, 2065, 103...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/client-go/tools/watch/retrywatcher.go
receive
func (rw *RetryWatcher) receive() { defer close(rw.doneChan) defer close(rw.resultChan) klog.V(4).Info("Starting RetryWatcher.") defer klog.V(4).Info("Stopping RetryWatcher.") ctx, cancel := context.WithCancel(context.Background()) defer cancel() go func() { select { case <-rw.stopChan: cancel() return case <-ctx.Done(): return } }() // We use non sliding until so we don't introduce delays on happy path when WATCH call // timeouts or gets closed and we need to reestablish it while also avoiding hot loops. wait.NonSlidingUntilWithContext(ctx, func(ctx context.Context) { done, retryAfter := rw.doReceive() if done { cancel() return } time.Sleep(retryAfter) klog.V(4).Infof("Restarting RetryWatcher at RV=%q", rw.lastResourceVersion) }, rw.minRestartDelay) }
go
func (rw *RetryWatcher) receive() { defer close(rw.doneChan) defer close(rw.resultChan) klog.V(4).Info("Starting RetryWatcher.") defer klog.V(4).Info("Stopping RetryWatcher.") ctx, cancel := context.WithCancel(context.Background()) defer cancel() go func() { select { case <-rw.stopChan: cancel() return case <-ctx.Done(): return } }() // We use non sliding until so we don't introduce delays on happy path when WATCH call // timeouts or gets closed and we need to reestablish it while also avoiding hot loops. wait.NonSlidingUntilWithContext(ctx, func(ctx context.Context) { done, retryAfter := rw.doReceive() if done { cancel() return } time.Sleep(retryAfter) klog.V(4).Infof("Restarting RetryWatcher at RV=%q", rw.lastResourceVersion) }, rw.minRestartDelay) }
[ "func", "(", "rw", "*", "RetryWatcher", ")", "receive", "(", ")", "{", "defer", "close", "(", "rw", ".", "doneChan", ")", "\n", "defer", "close", "(", "rw", ".", "resultChan", ")", "\n\n", "klog", ".", "V", "(", "4", ")", ".", "Info", "(", "\"", ...
// receive reads the result from a watcher, restarting it if necessary.
[ "receive", "reads", "the", "result", "from", "a", "watcher", "restarting", "it", "if", "necessary", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/client-go/tools/watch/retrywatcher.go#L240-L272
train
receive is a blocking call to doReceive
[ 30522, 4569, 2278, 1006, 1054, 2860, 1008, 2128, 11129, 18866, 2121, 1007, 4374, 1006, 1007, 1063, 13366, 2121, 2485, 1006, 1054, 2860, 1012, 2589, 14856, 1007, 13366, 2121, 2485, 1006, 1054, 2860, 1012, 2765, 14856, 1007, 1047, 21197, 1012...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/kube-aggregator/pkg/client/listers/apiregistration/internalversion/apiservice.go
List
func (s *aPIServiceLister) List(selector labels.Selector) (ret []*apiregistration.APIService, err error) { err = cache.ListAll(s.indexer, selector, func(m interface{}) { ret = append(ret, m.(*apiregistration.APIService)) }) return ret, err }
go
func (s *aPIServiceLister) List(selector labels.Selector) (ret []*apiregistration.APIService, err error) { err = cache.ListAll(s.indexer, selector, func(m interface{}) { ret = append(ret, m.(*apiregistration.APIService)) }) return ret, err }
[ "func", "(", "s", "*", "aPIServiceLister", ")", "List", "(", "selector", "labels", ".", "Selector", ")", "(", "ret", "[", "]", "*", "apiregistration", ".", "APIService", ",", "err", "error", ")", "{", "err", "=", "cache", ".", "ListAll", "(", "s", "....
// List lists all APIServices in the indexer.
[ "List", "lists", "all", "APIServices", "in", "the", "indexer", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/kube-aggregator/pkg/client/listers/apiregistration/internalversion/apiservice.go#L48-L53
train
List lists all APIServices in the indexer.
[ 30522, 4569, 2278, 1006, 1055, 1008, 17928, 8043, 7903, 29282, 3334, 1007, 2862, 1006, 27000, 10873, 1012, 27000, 1007, 1006, 2128, 2102, 1031, 1033, 1008, 17928, 2890, 24063, 8156, 1012, 17928, 8043, 7903, 2063, 1010, 9413, 2099, 7561, 100...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/registry/apps/replicaset/strategy.go
PrepareForUpdate
func (rsStrategy) PrepareForUpdate(ctx context.Context, obj, old runtime.Object) { newRS := obj.(*apps.ReplicaSet) oldRS := old.(*apps.ReplicaSet) // update is not allowed to set status newRS.Status = oldRS.Status pod.DropDisabledTemplateFields(&newRS.Spec.Template, &oldRS.Spec.Template) // Any changes to the spec increment the generation number, any changes to the // status should reflect the generation number of the corresponding object. We push // the burden of managing the status onto the clients because we can't (in general) // know here what version of spec the writer of the status has seen. It may seem like // we can at first -- since obj contains spec -- but in the future we will probably make // status its own object, and even if we don't, writes may be the result of a // read-update-write loop, so the contents of spec may not actually be the spec that // the ReplicaSet has *seen*. if !apiequality.Semantic.DeepEqual(oldRS.Spec, newRS.Spec) { newRS.Generation = oldRS.Generation + 1 } }
go
func (rsStrategy) PrepareForUpdate(ctx context.Context, obj, old runtime.Object) { newRS := obj.(*apps.ReplicaSet) oldRS := old.(*apps.ReplicaSet) // update is not allowed to set status newRS.Status = oldRS.Status pod.DropDisabledTemplateFields(&newRS.Spec.Template, &oldRS.Spec.Template) // Any changes to the spec increment the generation number, any changes to the // status should reflect the generation number of the corresponding object. We push // the burden of managing the status onto the clients because we can't (in general) // know here what version of spec the writer of the status has seen. It may seem like // we can at first -- since obj contains spec -- but in the future we will probably make // status its own object, and even if we don't, writes may be the result of a // read-update-write loop, so the contents of spec may not actually be the spec that // the ReplicaSet has *seen*. if !apiequality.Semantic.DeepEqual(oldRS.Spec, newRS.Spec) { newRS.Generation = oldRS.Generation + 1 } }
[ "func", "(", "rsStrategy", ")", "PrepareForUpdate", "(", "ctx", "context", ".", "Context", ",", "obj", ",", "old", "runtime", ".", "Object", ")", "{", "newRS", ":=", "obj", ".", "(", "*", "apps", ".", "ReplicaSet", ")", "\n", "oldRS", ":=", "old", "....
// PrepareForUpdate clears fields that are not allowed to be set by end users on update.
[ "PrepareForUpdate", "clears", "fields", "that", "are", "not", "allowed", "to", "be", "set", "by", "end", "users", "on", "update", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/registry/apps/replicaset/strategy.go#L88-L107
train
PrepareForUpdate clears the status of a new ReplicaSet before updating.
[ 30522, 4569, 2278, 1006, 12667, 20528, 2618, 6292, 1007, 7374, 29278, 6279, 13701, 1006, 14931, 2595, 6123, 1012, 6123, 1010, 27885, 3501, 1010, 2214, 2448, 7292, 1012, 30524, 1012, 15059, 13462, 1007, 1013, 1013, 10651, 2003, 2025, 3039, 2...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/volume/util/util.go
LoadPodFromFile
func LoadPodFromFile(filePath string) (*v1.Pod, error) { if filePath == "" { return nil, fmt.Errorf("file path not specified") } podDef, err := ioutil.ReadFile(filePath) if err != nil { return nil, fmt.Errorf("failed to read file path %s: %+v", filePath, err) } if len(podDef) == 0 { return nil, fmt.Errorf("file was empty: %s", filePath) } pod := &v1.Pod{} codec := legacyscheme.Codecs.UniversalDecoder() if err := runtime.DecodeInto(codec, podDef, pod); err != nil { return nil, fmt.Errorf("failed decoding file: %v", err) } return pod, nil }
go
func LoadPodFromFile(filePath string) (*v1.Pod, error) { if filePath == "" { return nil, fmt.Errorf("file path not specified") } podDef, err := ioutil.ReadFile(filePath) if err != nil { return nil, fmt.Errorf("failed to read file path %s: %+v", filePath, err) } if len(podDef) == 0 { return nil, fmt.Errorf("file was empty: %s", filePath) } pod := &v1.Pod{} codec := legacyscheme.Codecs.UniversalDecoder() if err := runtime.DecodeInto(codec, podDef, pod); err != nil { return nil, fmt.Errorf("failed decoding file: %v", err) } return pod, nil }
[ "func", "LoadPodFromFile", "(", "filePath", "string", ")", "(", "*", "v1", ".", "Pod", ",", "error", ")", "{", "if", "filePath", "==", "\"", "\"", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "podDef", "...
// LoadPodFromFile will read, decode, and return a Pod from a file.
[ "LoadPodFromFile", "will", "read", "decode", "and", "return", "a", "Pod", "from", "a", "file", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/volume/util/util.go#L184-L202
train
LoadPodFromFile loads a pod from a file path
[ 30522, 4569, 2278, 7170, 27633, 19699, 5358, 8873, 2571, 1006, 5371, 15069, 5164, 1007, 1006, 1008, 1058, 2487, 1012, 17491, 1010, 7561, 1007, 1063, 2065, 5371, 15069, 1027, 1027, 1000, 1000, 1063, 2709, 9152, 2140, 1010, 4718, 2102, 1012, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/apimachinery/pkg/util/httpstream/spdy/roundtripper.go
dial
func (s *SpdyRoundTripper) dial(req *http.Request) (net.Conn, error) { proxier := s.proxier if proxier == nil { proxier = utilnet.NewProxierWithNoProxyCIDR(http.ProxyFromEnvironment) } proxyURL, err := proxier(req) if err != nil { return nil, err } if proxyURL == nil { return s.dialWithoutProxy(req.Context(), req.URL) } // ensure we use a canonical host with proxyReq targetHost := netutil.CanonicalAddr(req.URL) // proxying logic adapted from http://blog.h6t.eu/post/74098062923/golang-websocket-with-http-proxy-support proxyReq := http.Request{ Method: "CONNECT", URL: &url.URL{}, Host: targetHost, } if pa := s.proxyAuth(proxyURL); pa != "" { proxyReq.Header = http.Header{} proxyReq.Header.Set("Proxy-Authorization", pa) } proxyDialConn, err := s.dialWithoutProxy(req.Context(), proxyURL) if err != nil { return nil, err } proxyClientConn := httputil.NewProxyClientConn(proxyDialConn, nil) _, err = proxyClientConn.Do(&proxyReq) if err != nil && err != httputil.ErrPersistEOF { return nil, err } rwc, _ := proxyClientConn.Hijack() if req.URL.Scheme != "https" { return rwc, nil } host, _, err := net.SplitHostPort(targetHost) if err != nil { return nil, err } tlsConfig := s.tlsConfig switch { case tlsConfig == nil: tlsConfig = &tls.Config{ServerName: host} case len(tlsConfig.ServerName) == 0: tlsConfig = tlsConfig.Clone() tlsConfig.ServerName = host } tlsConn := tls.Client(rwc, tlsConfig) // need to manually call Handshake() so we can call VerifyHostname() below if err := tlsConn.Handshake(); err != nil { return nil, err } // Return if we were configured to skip validation if tlsConfig.InsecureSkipVerify { return tlsConn, nil } if err := tlsConn.VerifyHostname(tlsConfig.ServerName); err != nil { return nil, err } return tlsConn, nil }
go
func (s *SpdyRoundTripper) dial(req *http.Request) (net.Conn, error) { proxier := s.proxier if proxier == nil { proxier = utilnet.NewProxierWithNoProxyCIDR(http.ProxyFromEnvironment) } proxyURL, err := proxier(req) if err != nil { return nil, err } if proxyURL == nil { return s.dialWithoutProxy(req.Context(), req.URL) } // ensure we use a canonical host with proxyReq targetHost := netutil.CanonicalAddr(req.URL) // proxying logic adapted from http://blog.h6t.eu/post/74098062923/golang-websocket-with-http-proxy-support proxyReq := http.Request{ Method: "CONNECT", URL: &url.URL{}, Host: targetHost, } if pa := s.proxyAuth(proxyURL); pa != "" { proxyReq.Header = http.Header{} proxyReq.Header.Set("Proxy-Authorization", pa) } proxyDialConn, err := s.dialWithoutProxy(req.Context(), proxyURL) if err != nil { return nil, err } proxyClientConn := httputil.NewProxyClientConn(proxyDialConn, nil) _, err = proxyClientConn.Do(&proxyReq) if err != nil && err != httputil.ErrPersistEOF { return nil, err } rwc, _ := proxyClientConn.Hijack() if req.URL.Scheme != "https" { return rwc, nil } host, _, err := net.SplitHostPort(targetHost) if err != nil { return nil, err } tlsConfig := s.tlsConfig switch { case tlsConfig == nil: tlsConfig = &tls.Config{ServerName: host} case len(tlsConfig.ServerName) == 0: tlsConfig = tlsConfig.Clone() tlsConfig.ServerName = host } tlsConn := tls.Client(rwc, tlsConfig) // need to manually call Handshake() so we can call VerifyHostname() below if err := tlsConn.Handshake(); err != nil { return nil, err } // Return if we were configured to skip validation if tlsConfig.InsecureSkipVerify { return tlsConn, nil } if err := tlsConn.VerifyHostname(tlsConfig.ServerName); err != nil { return nil, err } return tlsConn, nil }
[ "func", "(", "s", "*", "SpdyRoundTripper", ")", "dial", "(", "req", "*", "http", ".", "Request", ")", "(", "net", ".", "Conn", ",", "error", ")", "{", "proxier", ":=", "s", ".", "proxier", "\n", "if", "proxier", "==", "nil", "{", "proxier", "=", ...
// dial dials the host specified by req, using TLS if appropriate, optionally // using a proxy server if one is configured via environment variables.
[ "dial", "dials", "the", "host", "specified", "by", "req", "using", "TLS", "if", "appropriate", "optionally", "using", "a", "proxy", "server", "if", "one", "is", "configured", "via", "environment", "variables", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/apimachinery/pkg/util/httpstream/spdy/roundtripper.go#L118-L195
train
dial is a wrapper around net. Dial with a proxy
[ 30522, 4569, 2278, 1006, 1055, 1008, 23772, 12541, 28819, 24901, 4842, 1007, 13764, 1006, 2128, 4160, 1008, 8299, 1012, 5227, 1007, 1006, 5658, 1012, 9530, 2078, 1010, 7561, 1007, 1063, 4013, 16898, 2099, 1024, 1027, 1055, 1012, 4013, 16898...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/cli-runtime/pkg/resource/builder.go
LocalParam
func (b *Builder) LocalParam(local bool) *Builder { if local { b.Local() } return b }
go
func (b *Builder) LocalParam(local bool) *Builder { if local { b.Local() } return b }
[ "func", "(", "b", "*", "Builder", ")", "LocalParam", "(", "local", "bool", ")", "*", "Builder", "{", "if", "local", "{", "b", ".", "Local", "(", ")", "\n", "}", "\n", "return", "b", "\n", "}" ]
// LocalParam calls Local() if local is true.
[ "LocalParam", "calls", "Local", "()", "if", "local", "is", "true", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/cli-runtime/pkg/resource/builder.go#L302-L307
train
LocalParam returns a builder with local parameters set to true.
[ 30522, 4569, 2278, 1006, 1038, 1008, 12508, 1007, 2334, 28689, 2213, 1006, 2334, 22017, 2140, 1007, 1008, 12508, 1063, 2065, 2334, 1063, 1038, 1012, 2334, 1006, 1007, 1065, 2709, 1038, 1065, 102, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/apis/core/v1/zz_generated.conversion.go
Convert_v1_ProjectedVolumeSource_To_core_ProjectedVolumeSource
func Convert_v1_ProjectedVolumeSource_To_core_ProjectedVolumeSource(in *v1.ProjectedVolumeSource, out *core.ProjectedVolumeSource, s conversion.Scope) error { return autoConvert_v1_ProjectedVolumeSource_To_core_ProjectedVolumeSource(in, out, s) }
go
func Convert_v1_ProjectedVolumeSource_To_core_ProjectedVolumeSource(in *v1.ProjectedVolumeSource, out *core.ProjectedVolumeSource, s conversion.Scope) error { return autoConvert_v1_ProjectedVolumeSource_To_core_ProjectedVolumeSource(in, out, s) }
[ "func", "Convert_v1_ProjectedVolumeSource_To_core_ProjectedVolumeSource", "(", "in", "*", "v1", ".", "ProjectedVolumeSource", ",", "out", "*", "core", ".", "ProjectedVolumeSource", ",", "s", "conversion", ".", "Scope", ")", "error", "{", "return", "autoConvert_v1_Projec...
// Convert_v1_ProjectedVolumeSource_To_core_ProjectedVolumeSource is an autogenerated conversion function.
[ "Convert_v1_ProjectedVolumeSource_To_core_ProjectedVolumeSource", "is", "an", "autogenerated", "conversion", "function", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/apis/core/v1/zz_generated.conversion.go#L5950-L5952
train
Convert_v1_ProjectedVolumeSource_To_core_ProjectedVolumeSource is an autogenerated conversion function.
[ 30522, 4569, 2278, 10463, 1035, 1058, 2487, 1035, 11310, 6767, 12942, 2229, 8162, 3401, 1035, 2000, 1035, 4563, 1035, 11310, 6767, 12942, 2229, 8162, 3401, 1006, 1999, 1008, 1058, 2487, 1012, 11310, 6767, 12942, 2229, 8162, 3401, 1010, 2041...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/legacy-cloud-providers/azure/auth/azure_auth.go
ParseAzureEnvironment
func ParseAzureEnvironment(cloudName string) (*azure.Environment, error) { var env azure.Environment var err error if cloudName == "" { env = azure.PublicCloud } else { env, err = azure.EnvironmentFromName(cloudName) } return &env, err }
go
func ParseAzureEnvironment(cloudName string) (*azure.Environment, error) { var env azure.Environment var err error if cloudName == "" { env = azure.PublicCloud } else { env, err = azure.EnvironmentFromName(cloudName) } return &env, err }
[ "func", "ParseAzureEnvironment", "(", "cloudName", "string", ")", "(", "*", "azure", ".", "Environment", ",", "error", ")", "{", "var", "env", "azure", ".", "Environment", "\n", "var", "err", "error", "\n", "if", "cloudName", "==", "\"", "\"", "{", "env"...
// ParseAzureEnvironment returns azure environment by name
[ "ParseAzureEnvironment", "returns", "azure", "environment", "by", "name" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/legacy-cloud-providers/azure/auth/azure_auth.go#L111-L120
train
ParseAzureEnvironment parses an Azure environment from a cloud name
[ 30522, 4569, 2278, 11968, 17310, 9759, 28029, 21663, 2239, 3672, 1006, 6112, 18442, 5164, 1007, 1006, 1008, 24296, 1012, 4044, 1010, 7561, 1007, 1063, 13075, 4372, 2615, 24296, 1012, 4044, 13075, 9413, 2099, 7561, 2065, 6112, 18442, 1027, 1...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/cloudprovider/providers/gce/gce_networkendpointgroup.go
ListNetworkEndpoints
func (g *Cloud) ListNetworkEndpoints(name, zone string, showHealthStatus bool) ([]*computebeta.NetworkEndpointWithHealthStatus, error) { ctx, cancel := cloud.ContextWithCallTimeout() defer cancel() mc := newNetworkEndpointGroupMetricContext("list_networkendpoints", zone) healthStatus := "SKIP" if showHealthStatus { healthStatus = "SHOW" } req := &computebeta.NetworkEndpointGroupsListEndpointsRequest{ HealthStatus: healthStatus, } l, err := g.c.BetaNetworkEndpointGroups().ListNetworkEndpoints(ctx, meta.ZonalKey(name, zone), req, filter.None) return l, mc.Observe(err) }
go
func (g *Cloud) ListNetworkEndpoints(name, zone string, showHealthStatus bool) ([]*computebeta.NetworkEndpointWithHealthStatus, error) { ctx, cancel := cloud.ContextWithCallTimeout() defer cancel() mc := newNetworkEndpointGroupMetricContext("list_networkendpoints", zone) healthStatus := "SKIP" if showHealthStatus { healthStatus = "SHOW" } req := &computebeta.NetworkEndpointGroupsListEndpointsRequest{ HealthStatus: healthStatus, } l, err := g.c.BetaNetworkEndpointGroups().ListNetworkEndpoints(ctx, meta.ZonalKey(name, zone), req, filter.None) return l, mc.Observe(err) }
[ "func", "(", "g", "*", "Cloud", ")", "ListNetworkEndpoints", "(", "name", ",", "zone", "string", ",", "showHealthStatus", "bool", ")", "(", "[", "]", "*", "computebeta", ".", "NetworkEndpointWithHealthStatus", ",", "error", ")", "{", "ctx", ",", "cancel", ...
// ListNetworkEndpoints returns all the endpoints associated with the endpoint group in zone and optionally their status.
[ "ListNetworkEndpoints", "returns", "all", "the", "endpoints", "associated", "with", "the", "endpoint", "group", "in", "zone", "and", "optionally", "their", "status", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/cloudprovider/providers/gce/gce_networkendpointgroup.go#L121-L135
train
ListNetworkEndpoints lists all network endpoints in a zone.
[ 30522, 4569, 2278, 1006, 1043, 1008, 6112, 1007, 2862, 7159, 6198, 10497, 26521, 1006, 2171, 1010, 4224, 5164, 1010, 2265, 20192, 24658, 9153, 5809, 22017, 2140, 1007, 1006, 1031, 1033, 1008, 24134, 20915, 2050, 1012, 2897, 10497, 8400, 244...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/legacy-cloud-providers/vsphere/vsphere_util.go
getcanonicalVolumePath
func getcanonicalVolumePath(ctx context.Context, dc *vclib.Datacenter, volumePath string) (string, error) { var folderID string var folderExists bool canonicalVolumePath := volumePath dsPathObj, err := vclib.GetDatastorePathObjFromVMDiskPath(volumePath) if err != nil { return "", err } dsPath := strings.Split(strings.TrimSpace(dsPathObj.Path), "/") if len(dsPath) <= 1 { return canonicalVolumePath, nil } datastore := dsPathObj.Datastore dsFolder := dsPath[0] folderNameIDMap, datastoreExists := datastoreFolderIDMap[datastore] if datastoreExists { folderID, folderExists = folderNameIDMap[dsFolder] } // Get the datastore folder ID if datastore or folder doesn't exist in datastoreFolderIDMap if !datastoreExists || !folderExists { if !vclib.IsValidUUID(dsFolder) { dummyDiskVolPath := "[" + datastore + "] " + dsFolder + "/" + DummyDiskName // Querying a non-existent dummy disk on the datastore folder. // It would fail and return an folder ID in the error message. _, err := dc.GetVirtualDiskPage83Data(ctx, dummyDiskVolPath) canonicalVolumePath, err = getPathFromFileNotFound(err) if err != nil { return "", fmt.Errorf("failed to get path from dummy request: %v", err) } } diskPath := vclib.GetPathFromVMDiskPath(canonicalVolumePath) if diskPath == "" { return "", fmt.Errorf("Failed to parse canonicalVolumePath: %s in getcanonicalVolumePath method", canonicalVolumePath) } folderID = strings.Split(strings.TrimSpace(diskPath), "/")[0] setdatastoreFolderIDMap(datastoreFolderIDMap, datastore, dsFolder, folderID) } canonicalVolumePath = strings.Replace(volumePath, dsFolder, folderID, 1) return canonicalVolumePath, nil }
go
func getcanonicalVolumePath(ctx context.Context, dc *vclib.Datacenter, volumePath string) (string, error) { var folderID string var folderExists bool canonicalVolumePath := volumePath dsPathObj, err := vclib.GetDatastorePathObjFromVMDiskPath(volumePath) if err != nil { return "", err } dsPath := strings.Split(strings.TrimSpace(dsPathObj.Path), "/") if len(dsPath) <= 1 { return canonicalVolumePath, nil } datastore := dsPathObj.Datastore dsFolder := dsPath[0] folderNameIDMap, datastoreExists := datastoreFolderIDMap[datastore] if datastoreExists { folderID, folderExists = folderNameIDMap[dsFolder] } // Get the datastore folder ID if datastore or folder doesn't exist in datastoreFolderIDMap if !datastoreExists || !folderExists { if !vclib.IsValidUUID(dsFolder) { dummyDiskVolPath := "[" + datastore + "] " + dsFolder + "/" + DummyDiskName // Querying a non-existent dummy disk on the datastore folder. // It would fail and return an folder ID in the error message. _, err := dc.GetVirtualDiskPage83Data(ctx, dummyDiskVolPath) canonicalVolumePath, err = getPathFromFileNotFound(err) if err != nil { return "", fmt.Errorf("failed to get path from dummy request: %v", err) } } diskPath := vclib.GetPathFromVMDiskPath(canonicalVolumePath) if diskPath == "" { return "", fmt.Errorf("Failed to parse canonicalVolumePath: %s in getcanonicalVolumePath method", canonicalVolumePath) } folderID = strings.Split(strings.TrimSpace(diskPath), "/")[0] setdatastoreFolderIDMap(datastoreFolderIDMap, datastore, dsFolder, folderID) } canonicalVolumePath = strings.Replace(volumePath, dsFolder, folderID, 1) return canonicalVolumePath, nil }
[ "func", "getcanonicalVolumePath", "(", "ctx", "context", ".", "Context", ",", "dc", "*", "vclib", ".", "Datacenter", ",", "volumePath", "string", ")", "(", "string", ",", "error", ")", "{", "var", "folderID", "string", "\n", "var", "folderExists", "bool", ...
// Get canonical volume path for volume Path. // Example1: The canonical path for volume path - [vsanDatastore] kubevols/volume.vmdk will be [vsanDatastore] 25d8b159-948c-4b73-e499-02001ad1b044/volume.vmdk // Example2: The canonical path for volume path - [vsanDatastore] 25d8b159-948c-4b73-e499-02001ad1b044/volume.vmdk will be same as volume Path.
[ "Get", "canonical", "volume", "path", "for", "volume", "Path", ".", "Example1", ":", "The", "canonical", "path", "for", "volume", "path", "-", "[", "vsanDatastore", "]", "kubevols", "/", "volume", ".", "vmdk", "will", "be", "[", "vsanDatastore", "]", "25d8...
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/legacy-cloud-providers/vsphere/vsphere_util.go#L401-L440
train
getcanonicalVolumePath returns the canonical volume path for the given volumePath
[ 30522, 4569, 2278, 2131, 23803, 20913, 6767, 12942, 13699, 8988, 1006, 14931, 2595, 6123, 1012, 6123, 1010, 5887, 1008, 18315, 29521, 1012, 2951, 13013, 2121, 1010, 3872, 15069, 5164, 1007, 1006, 5164, 1010, 7561, 1007, 1063, 13075, 19622, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/proxy/winkernel/proxier.go
newServiceInfo
func newServiceInfo(svcPortName proxy.ServicePortName, port *v1.ServicePort, service *v1.Service, hns HostNetworkService) *serviceInfo { onlyNodeLocalEndpoints := false if apiservice.RequestsOnlyLocalTraffic(service) { onlyNodeLocalEndpoints = true } // set default session sticky max age 180min=10800s stickyMaxAgeSeconds := 10800 if service.Spec.SessionAffinity == v1.ServiceAffinityClientIP && service.Spec.SessionAffinityConfig != nil { stickyMaxAgeSeconds = int(*service.Spec.SessionAffinityConfig.ClientIP.TimeoutSeconds) } info := &serviceInfo{ clusterIP: net.ParseIP(service.Spec.ClusterIP), port: int(port.Port), protocol: port.Protocol, nodePort: int(port.NodePort), // targetPort is zero if it is specified as a name in port.TargetPort. // Its real value would be got later from endpoints. targetPort: port.TargetPort.IntValue(), // Deep-copy in case the service instance changes loadBalancerStatus: *service.Status.LoadBalancer.DeepCopy(), sessionAffinityType: service.Spec.SessionAffinity, stickyMaxAgeSeconds: stickyMaxAgeSeconds, loadBalancerSourceRanges: make([]string, len(service.Spec.LoadBalancerSourceRanges)), onlyNodeLocalEndpoints: onlyNodeLocalEndpoints, hns: hns, } copy(info.loadBalancerSourceRanges, service.Spec.LoadBalancerSourceRanges) for _, eip := range service.Spec.ExternalIPs { info.externalIPs = append(info.externalIPs, &externalIPInfo{ip: eip}) } for _, ingress := range service.Status.LoadBalancer.Ingress { info.loadBalancerIngressIPs = append(info.loadBalancerIngressIPs, &loadBalancerIngressInfo{ip: ingress.IP}) } if apiservice.NeedsHealthCheck(service) { p := service.Spec.HealthCheckNodePort if p == 0 { klog.Errorf("Service %q has no healthcheck nodeport", svcPortName.NamespacedName.String()) } else { info.healthCheckNodePort = int(p) } } return info }
go
func newServiceInfo(svcPortName proxy.ServicePortName, port *v1.ServicePort, service *v1.Service, hns HostNetworkService) *serviceInfo { onlyNodeLocalEndpoints := false if apiservice.RequestsOnlyLocalTraffic(service) { onlyNodeLocalEndpoints = true } // set default session sticky max age 180min=10800s stickyMaxAgeSeconds := 10800 if service.Spec.SessionAffinity == v1.ServiceAffinityClientIP && service.Spec.SessionAffinityConfig != nil { stickyMaxAgeSeconds = int(*service.Spec.SessionAffinityConfig.ClientIP.TimeoutSeconds) } info := &serviceInfo{ clusterIP: net.ParseIP(service.Spec.ClusterIP), port: int(port.Port), protocol: port.Protocol, nodePort: int(port.NodePort), // targetPort is zero if it is specified as a name in port.TargetPort. // Its real value would be got later from endpoints. targetPort: port.TargetPort.IntValue(), // Deep-copy in case the service instance changes loadBalancerStatus: *service.Status.LoadBalancer.DeepCopy(), sessionAffinityType: service.Spec.SessionAffinity, stickyMaxAgeSeconds: stickyMaxAgeSeconds, loadBalancerSourceRanges: make([]string, len(service.Spec.LoadBalancerSourceRanges)), onlyNodeLocalEndpoints: onlyNodeLocalEndpoints, hns: hns, } copy(info.loadBalancerSourceRanges, service.Spec.LoadBalancerSourceRanges) for _, eip := range service.Spec.ExternalIPs { info.externalIPs = append(info.externalIPs, &externalIPInfo{ip: eip}) } for _, ingress := range service.Status.LoadBalancer.Ingress { info.loadBalancerIngressIPs = append(info.loadBalancerIngressIPs, &loadBalancerIngressInfo{ip: ingress.IP}) } if apiservice.NeedsHealthCheck(service) { p := service.Spec.HealthCheckNodePort if p == 0 { klog.Errorf("Service %q has no healthcheck nodeport", svcPortName.NamespacedName.String()) } else { info.healthCheckNodePort = int(p) } } return info }
[ "func", "newServiceInfo", "(", "svcPortName", "proxy", ".", "ServicePortName", ",", "port", "*", "v1", ".", "ServicePort", ",", "service", "*", "v1", ".", "Service", ",", "hns", "HostNetworkService", ")", "*", "serviceInfo", "{", "onlyNodeLocalEndpoints", ":=", ...
// returns a new serviceInfo struct
[ "returns", "a", "new", "serviceInfo", "struct" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/proxy/winkernel/proxier.go#L196-L242
train
newServiceInfo creates a new serviceInfo struct
[ 30522, 4569, 2278, 2739, 2121, 7903, 12377, 14876, 1006, 17917, 21906, 11589, 18442, 24540, 1012, 2326, 6442, 18442, 1010, 3417, 1008, 1058, 2487, 1012, 2326, 6442, 1010, 2326, 1008, 1058, 2487, 1012, 2326, 1010, 1044, 3619, 3677, 7159, 931...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/util/mount/mount_helper_common.go
doCleanupMountPoint
func doCleanupMountPoint(mountPath string, mounter Interface, extensiveMountPointCheck bool, corruptedMnt bool) error { if !corruptedMnt { var notMnt bool var err error if extensiveMountPointCheck { notMnt, err = IsNotMountPoint(mounter, mountPath) } else { notMnt, err = mounter.IsLikelyNotMountPoint(mountPath) } if err != nil { return err } if notMnt { klog.Warningf("Warning: %q is not a mountpoint, deleting", mountPath) return os.Remove(mountPath) } } // Unmount the mount path klog.V(4).Infof("%q is a mountpoint, unmounting", mountPath) if err := mounter.Unmount(mountPath); err != nil { return err } notMnt, mntErr := mounter.IsLikelyNotMountPoint(mountPath) if mntErr != nil { return mntErr } if notMnt { klog.V(4).Infof("%q is unmounted, deleting the directory", mountPath) return os.Remove(mountPath) } return fmt.Errorf("Failed to unmount path %v", mountPath) }
go
func doCleanupMountPoint(mountPath string, mounter Interface, extensiveMountPointCheck bool, corruptedMnt bool) error { if !corruptedMnt { var notMnt bool var err error if extensiveMountPointCheck { notMnt, err = IsNotMountPoint(mounter, mountPath) } else { notMnt, err = mounter.IsLikelyNotMountPoint(mountPath) } if err != nil { return err } if notMnt { klog.Warningf("Warning: %q is not a mountpoint, deleting", mountPath) return os.Remove(mountPath) } } // Unmount the mount path klog.V(4).Infof("%q is a mountpoint, unmounting", mountPath) if err := mounter.Unmount(mountPath); err != nil { return err } notMnt, mntErr := mounter.IsLikelyNotMountPoint(mountPath) if mntErr != nil { return mntErr } if notMnt { klog.V(4).Infof("%q is unmounted, deleting the directory", mountPath) return os.Remove(mountPath) } return fmt.Errorf("Failed to unmount path %v", mountPath) }
[ "func", "doCleanupMountPoint", "(", "mountPath", "string", ",", "mounter", "Interface", ",", "extensiveMountPointCheck", "bool", ",", "corruptedMnt", "bool", ")", "error", "{", "if", "!", "corruptedMnt", "{", "var", "notMnt", "bool", "\n", "var", "err", "error",...
// doCleanupMountPoint unmounts the given path and // deletes the remaining directory if successful. // if extensiveMountPointCheck is true // IsNotMountPoint will be called instead of IsLikelyNotMountPoint. // IsNotMountPoint is more expensive but properly handles bind mounts within the same fs. // if corruptedMnt is true, it means that the mountPath is a corrupted mountpoint, and the mount point check // will be skipped
[ "doCleanupMountPoint", "unmounts", "the", "given", "path", "and", "deletes", "the", "remaining", "directory", "if", "successful", ".", "if", "extensiveMountPointCheck", "is", "true", "IsNotMountPoint", "will", "be", "called", "instead", "of", "IsLikelyNotMountPoint", ...
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/util/mount/mount_helper_common.go#L53-L88
train
doCleanupMountPoint unmounts the given mountPath if it is not a mountpoint and if it is corrupted it will be removed from the filesystem.
[ 30522, 4569, 2278, 9986, 20898, 6279, 20048, 8400, 1006, 4057, 15069, 5164, 1010, 4057, 2121, 8278, 1010, 4866, 20048, 8400, 5403, 3600, 22017, 2140, 1010, 27279, 2213, 3372, 22017, 2140, 1007, 7561, 1063, 2065, 999, 27279, 2213, 3372, 1063...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/volume/scaleio/sio_client.go
Devs
func (c *sioClient) Devs() (map[string]string, error) { volumeMap := make(map[string]string) files, err := c.getSioDiskPaths() if err != nil { return nil, err } for _, f := range files { // split emc-vol-<mdmID>-<volumeID> to pull out volumeID parts := strings.Split(f.Name(), "-") if len(parts) != 4 { return nil, errors.New("unexpected ScaleIO device name format") } volumeID := parts[3] devPath, err := filepath.EvalSymlinks(fmt.Sprintf("%s/%s", sioDiskIDPath, f.Name())) if err != nil { klog.Error(log("devicepath-to-volID mapping error: %v", err)) return nil, err } // map volumeID to devicePath volumeMap[volumeID] = devPath } return volumeMap, nil }
go
func (c *sioClient) Devs() (map[string]string, error) { volumeMap := make(map[string]string) files, err := c.getSioDiskPaths() if err != nil { return nil, err } for _, f := range files { // split emc-vol-<mdmID>-<volumeID> to pull out volumeID parts := strings.Split(f.Name(), "-") if len(parts) != 4 { return nil, errors.New("unexpected ScaleIO device name format") } volumeID := parts[3] devPath, err := filepath.EvalSymlinks(fmt.Sprintf("%s/%s", sioDiskIDPath, f.Name())) if err != nil { klog.Error(log("devicepath-to-volID mapping error: %v", err)) return nil, err } // map volumeID to devicePath volumeMap[volumeID] = devPath } return volumeMap, nil }
[ "func", "(", "c", "*", "sioClient", ")", "Devs", "(", ")", "(", "map", "[", "string", "]", "string", ",", "error", ")", "{", "volumeMap", ":=", "make", "(", "map", "[", "string", "]", "string", ")", "\n\n", "files", ",", "err", ":=", "c", ".", ...
// Devs returns a map of local devices as map[<volume.id>]<deviceName>
[ "Devs", "returns", "a", "map", "of", "local", "devices", "as", "map", "[", "<volume", ".", "id", ">", "]", "<deviceName", ">" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/volume/scaleio/sio_client.go#L376-L400
train
Devs returns a map of volumeID to devicePath
[ 30522, 4569, 2278, 1006, 1039, 1008, 9033, 10085, 8751, 3372, 1007, 16475, 2015, 1006, 1007, 1006, 4949, 1031, 5164, 1033, 5164, 1010, 7561, 1007, 1063, 3872, 2863, 2361, 1024, 1027, 2191, 1006, 4949, 1031, 30524, 2015, 1006, 1007, 2065, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/client-go/kubernetes/typed/apps/v1beta2/fake/fake_daemonset.go
Create
func (c *FakeDaemonSets) Create(daemonSet *v1beta2.DaemonSet) (result *v1beta2.DaemonSet, err error) { obj, err := c.Fake. Invokes(testing.NewCreateAction(daemonsetsResource, c.ns, daemonSet), &v1beta2.DaemonSet{}) if obj == nil { return nil, err } return obj.(*v1beta2.DaemonSet), err }
go
func (c *FakeDaemonSets) Create(daemonSet *v1beta2.DaemonSet) (result *v1beta2.DaemonSet, err error) { obj, err := c.Fake. Invokes(testing.NewCreateAction(daemonsetsResource, c.ns, daemonSet), &v1beta2.DaemonSet{}) if obj == nil { return nil, err } return obj.(*v1beta2.DaemonSet), err }
[ "func", "(", "c", "*", "FakeDaemonSets", ")", "Create", "(", "daemonSet", "*", "v1beta2", ".", "DaemonSet", ")", "(", "result", "*", "v1beta2", ".", "DaemonSet", ",", "err", "error", ")", "{", "obj", ",", "err", ":=", "c", ".", "Fake", ".", "Invokes"...
// Create takes the representation of a daemonSet and creates it. Returns the server's representation of the daemonSet, and an error, if there is any.
[ "Create", "takes", "the", "representation", "of", "a", "daemonSet", "and", "creates", "it", ".", "Returns", "the", "server", "s", "representation", "of", "the", "daemonSet", "and", "an", "error", "if", "there", "is", "any", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/client-go/kubernetes/typed/apps/v1beta2/fake/fake_daemonset.go#L82-L90
train
Create takes the representation of a daemonSet and creates it. Returns the server s representation of the daemonSet and an error if there is any.
[ 30522, 4569, 2278, 1006, 1039, 1008, 8275, 6858, 16563, 8454, 1007, 3443, 1006, 12828, 13462, 1008, 1058, 2487, 20915, 2050, 2475, 1012, 12828, 13462, 1007, 1006, 2765, 1008, 1058, 2487, 20915, 2050, 2475, 1012, 12828, 13462, 1010, 9413, 20...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/client-go/kubernetes/typed/extensions/v1beta1/fake/fake_replicaset.go
UpdateStatus
func (c *FakeReplicaSets) UpdateStatus(replicaSet *v1beta1.ReplicaSet) (*v1beta1.ReplicaSet, error) { obj, err := c.Fake. Invokes(testing.NewUpdateSubresourceAction(replicasetsResource, "status", c.ns, replicaSet), &v1beta1.ReplicaSet{}) if obj == nil { return nil, err } return obj.(*v1beta1.ReplicaSet), err }
go
func (c *FakeReplicaSets) UpdateStatus(replicaSet *v1beta1.ReplicaSet) (*v1beta1.ReplicaSet, error) { obj, err := c.Fake. Invokes(testing.NewUpdateSubresourceAction(replicasetsResource, "status", c.ns, replicaSet), &v1beta1.ReplicaSet{}) if obj == nil { return nil, err } return obj.(*v1beta1.ReplicaSet), err }
[ "func", "(", "c", "*", "FakeReplicaSets", ")", "UpdateStatus", "(", "replicaSet", "*", "v1beta1", ".", "ReplicaSet", ")", "(", "*", "v1beta1", ".", "ReplicaSet", ",", "error", ")", "{", "obj", ",", "err", ":=", "c", ".", "Fake", ".", "Invokes", "(", ...
// UpdateStatus was generated because the type contains a Status member. // Add a +genclient:noStatus comment above the type to avoid generating UpdateStatus().
[ "UpdateStatus", "was", "generated", "because", "the", "type", "contains", "a", "Status", "member", ".", "Add", "a", "+", "genclient", ":", "noStatus", "comment", "above", "the", "type", "to", "avoid", "generating", "UpdateStatus", "()", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/client-go/kubernetes/typed/extensions/v1beta1/fake/fake_replicaset.go#L105-L113
train
UpdateStatus takes the representation of a replicaSet and updates it. Returns the server s representation of the replicaSet and an error if one occurs.
[ 30522, 4569, 2278, 1006, 1039, 1008, 8275, 2890, 24759, 5555, 13462, 2015, 1007, 14409, 29336, 2271, 1006, 15059, 13462, 1008, 1058, 2487, 20915, 27717, 1012, 15059, 13462, 1007, 1006, 1008, 1058, 2487, 20915, 27717, 1012, 15059, 13462, 1010,...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/kubectl/explain/typename.go
VisitArray
func (t *typeName) VisitArray(a *proto.Array) { s := &typeName{} a.SubType.Accept(s) t.Name = fmt.Sprintf("[]%s", s.Name) }
go
func (t *typeName) VisitArray(a *proto.Array) { s := &typeName{} a.SubType.Accept(s) t.Name = fmt.Sprintf("[]%s", s.Name) }
[ "func", "(", "t", "*", "typeName", ")", "VisitArray", "(", "a", "*", "proto", ".", "Array", ")", "{", "s", ":=", "&", "typeName", "{", "}", "\n", "a", ".", "SubType", ".", "Accept", "(", "s", ")", "\n", "t", ".", "Name", "=", "fmt", ".", "Spr...
// VisitArray adds the [] prefix and recurses.
[ "VisitArray", "adds", "the", "[]", "prefix", "and", "recurses", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/kubectl/explain/typename.go#L33-L37
train
VisitArray implements proto. Type.
[ 30522, 4569, 2278, 1006, 1056, 1008, 2828, 18442, 1007, 3942, 2906, 9447, 1006, 1037, 1008, 15053, 1012, 9140, 1007, 1063, 1055, 1024, 1027, 1004, 2828, 18442, 1063, 1065, 1037, 1012, 4942, 13874, 1012, 5138, 1006, 1055, 1007, 1056, 1012, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/kubectl/cmd/get/get.go
attemptToConvertToInternal
func attemptToConvertToInternal(obj runtime.Object, converter runtime.ObjectConvertor, targetVersion schema.GroupVersion) runtime.Object { internalObject, err := converter.ConvertToVersion(obj, targetVersion) if err != nil { klog.V(1).Infof("Unable to convert %T to %v: %v", obj, targetVersion, err) return obj } return internalObject }
go
func attemptToConvertToInternal(obj runtime.Object, converter runtime.ObjectConvertor, targetVersion schema.GroupVersion) runtime.Object { internalObject, err := converter.ConvertToVersion(obj, targetVersion) if err != nil { klog.V(1).Infof("Unable to convert %T to %v: %v", obj, targetVersion, err) return obj } return internalObject }
[ "func", "attemptToConvertToInternal", "(", "obj", "runtime", ".", "Object", ",", "converter", "runtime", ".", "ObjectConvertor", ",", "targetVersion", "schema", ".", "GroupVersion", ")", "runtime", ".", "Object", "{", "internalObject", ",", "err", ":=", "converter...
// attemptToConvertToInternal tries to convert to an internal type, but returns the original if it can't
[ "attemptToConvertToInternal", "tries", "to", "convert", "to", "an", "internal", "type", "but", "returns", "the", "original", "if", "it", "can", "t" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/kubectl/cmd/get/get.go#L725-L732
train
attemptToConvertToInternal attempts to convert the object to the targetVersion.
[ 30522, 4569, 2278, 3535, 3406, 8663, 16874, 3406, 18447, 11795, 2389, 1006, 27885, 3501, 2448, 7292, 1012, 4874, 1010, 10463, 2121, 2448, 7292, 1012, 4874, 8663, 16874, 2953, 1010, 4539, 27774, 8040, 28433, 1012, 2177, 27774, 1007, 2448, 72...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/apis/core/validation/validation.go
ValidateDNS1123Subdomain
func ValidateDNS1123Subdomain(value string, fldPath *field.Path) field.ErrorList { allErrs := field.ErrorList{} for _, msg := range validation.IsDNS1123Subdomain(value) { allErrs = append(allErrs, field.Invalid(fldPath, value, msg)) } return allErrs }
go
func ValidateDNS1123Subdomain(value string, fldPath *field.Path) field.ErrorList { allErrs := field.ErrorList{} for _, msg := range validation.IsDNS1123Subdomain(value) { allErrs = append(allErrs, field.Invalid(fldPath, value, msg)) } return allErrs }
[ "func", "ValidateDNS1123Subdomain", "(", "value", "string", ",", "fldPath", "*", "field", ".", "Path", ")", "field", ".", "ErrorList", "{", "allErrs", ":=", "field", ".", "ErrorList", "{", "}", "\n", "for", "_", ",", "msg", ":=", "range", "validation", "...
// ValidateDNS1123Subdomain validates that a name is a proper DNS subdomain.
[ "ValidateDNS1123Subdomain", "validates", "that", "a", "name", "is", "a", "proper", "DNS", "subdomain", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/apis/core/validation/validation.go#L105-L111
train
ValidateDNS1123Subdomain validates a DNS1123Subdomain
[ 30522, 4569, 2278, 9398, 4383, 3619, 14526, 21926, 6342, 2497, 9527, 8113, 1006, 3643, 5164, 1010, 13109, 18927, 8988, 1008, 2492, 1012, 4130, 1007, 2492, 1012, 7561, 9863, 1063, 2035, 2121, 2869, 1024, 1027, 2492, 1012, 7561, 9863, 1063, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/controller/daemon/daemon_controller.go
deleteHistory
func (dsc *DaemonSetsController) deleteHistory(obj interface{}) { history, ok := obj.(*apps.ControllerRevision) // When a delete is dropped, the relist will notice a ControllerRevision in the store not // in the list, leading to the insertion of a tombstone object which contains // the deleted key/value. Note that this value might be stale. If the ControllerRevision // changed labels the new DaemonSet will not be woken up till the periodic resync. if !ok { tombstone, ok := obj.(cache.DeletedFinalStateUnknown) if !ok { utilruntime.HandleError(fmt.Errorf("Couldn't get object from tombstone %#v", obj)) return } history, ok = tombstone.Obj.(*apps.ControllerRevision) if !ok { utilruntime.HandleError(fmt.Errorf("Tombstone contained object that is not a ControllerRevision %#v", obj)) return } } controllerRef := metav1.GetControllerOf(history) if controllerRef == nil { // No controller should care about orphans being deleted. return } ds := dsc.resolveControllerRef(history.Namespace, controllerRef) if ds == nil { return } klog.V(4).Infof("ControllerRevision %s deleted.", history.Name) dsc.enqueueDaemonSet(ds) }
go
func (dsc *DaemonSetsController) deleteHistory(obj interface{}) { history, ok := obj.(*apps.ControllerRevision) // When a delete is dropped, the relist will notice a ControllerRevision in the store not // in the list, leading to the insertion of a tombstone object which contains // the deleted key/value. Note that this value might be stale. If the ControllerRevision // changed labels the new DaemonSet will not be woken up till the periodic resync. if !ok { tombstone, ok := obj.(cache.DeletedFinalStateUnknown) if !ok { utilruntime.HandleError(fmt.Errorf("Couldn't get object from tombstone %#v", obj)) return } history, ok = tombstone.Obj.(*apps.ControllerRevision) if !ok { utilruntime.HandleError(fmt.Errorf("Tombstone contained object that is not a ControllerRevision %#v", obj)) return } } controllerRef := metav1.GetControllerOf(history) if controllerRef == nil { // No controller should care about orphans being deleted. return } ds := dsc.resolveControllerRef(history.Namespace, controllerRef) if ds == nil { return } klog.V(4).Infof("ControllerRevision %s deleted.", history.Name) dsc.enqueueDaemonSet(ds) }
[ "func", "(", "dsc", "*", "DaemonSetsController", ")", "deleteHistory", "(", "obj", "interface", "{", "}", ")", "{", "history", ",", "ok", ":=", "obj", ".", "(", "*", "apps", ".", "ControllerRevision", ")", "\n\n", "// When a delete is dropped, the relist will no...
// deleteHistory enqueues the DaemonSet that manages a ControllerRevision when // the ControllerRevision is deleted. obj could be an *app.ControllerRevision, or // a DeletionFinalStateUnknown marker item.
[ "deleteHistory", "enqueues", "the", "DaemonSet", "that", "manages", "a", "ControllerRevision", "when", "the", "ControllerRevision", "is", "deleted", ".", "obj", "could", "be", "an", "*", "app", ".", "ControllerRevision", "or", "a", "DeletionFinalStateUnknown", "mark...
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/controller/daemon/daemon_controller.go#L453-L484
train
deleteHistory deletes a DaemonSet from the store.
[ 30522, 4569, 2278, 1006, 16233, 2278, 1008, 12828, 13462, 9363, 3372, 26611, 1007, 3972, 12870, 24158, 7062, 1006, 27885, 3501, 8278, 1063, 1065, 1007, 1063, 2381, 1010, 7929, 1024, 1027, 27885, 3501, 1012, 1006, 1008, 18726, 1012, 11486, 2...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/util/ipset/ipset.go
getIPSetVersionString
func getIPSetVersionString(exec utilexec.Interface) (string, error) { cmd := exec.Command(IPSetCmd, "--version") cmd.SetStdin(bytes.NewReader([]byte{})) bytes, err := cmd.CombinedOutput() if err != nil { return "", err } versionMatcher := regexp.MustCompile(VersionPattern) match := versionMatcher.FindStringSubmatch(string(bytes)) if match == nil { return "", fmt.Errorf("no ipset version found in string: %s", bytes) } return match[0], nil }
go
func getIPSetVersionString(exec utilexec.Interface) (string, error) { cmd := exec.Command(IPSetCmd, "--version") cmd.SetStdin(bytes.NewReader([]byte{})) bytes, err := cmd.CombinedOutput() if err != nil { return "", err } versionMatcher := regexp.MustCompile(VersionPattern) match := versionMatcher.FindStringSubmatch(string(bytes)) if match == nil { return "", fmt.Errorf("no ipset version found in string: %s", bytes) } return match[0], nil }
[ "func", "getIPSetVersionString", "(", "exec", "utilexec", ".", "Interface", ")", "(", "string", ",", "error", ")", "{", "cmd", ":=", "exec", ".", "Command", "(", "IPSetCmd", ",", "\"", "\"", ")", "\n", "cmd", ".", "SetStdin", "(", "bytes", ".", "NewRea...
// getIPSetVersionString runs "ipset --version" to get the version string // in the form of "X.Y", i.e "6.19"
[ "getIPSetVersionString", "runs", "ipset", "--", "version", "to", "get", "the", "version", "string", "in", "the", "form", "of", "X", ".", "Y", "i", ".", "e", "6", ".", "19" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/util/ipset/ipset.go#L407-L420
train
getIPSetVersionString returns the ipset version string
[ 30522, 4569, 2278, 2131, 11514, 13462, 27774, 3367, 4892, 1006, 4654, 8586, 21183, 9463, 2595, 8586, 1012, 8278, 1007, 1006, 5164, 1010, 7561, 1007, 1063, 4642, 2094, 1024, 1027, 4654, 8586, 1012, 3094, 1006, 12997, 13462, 27487, 2094, 1010...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/apiserver/pkg/storage/selection_predicate.go
MatchesObjectAttributes
func (s *SelectionPredicate) MatchesObjectAttributes(l labels.Set, f fields.Set) bool { if s.Label.Empty() && s.Field.Empty() { return true } matched := s.Label.Matches(l) if matched && s.Field != nil { matched = (matched && s.Field.Matches(f)) } return matched }
go
func (s *SelectionPredicate) MatchesObjectAttributes(l labels.Set, f fields.Set) bool { if s.Label.Empty() && s.Field.Empty() { return true } matched := s.Label.Matches(l) if matched && s.Field != nil { matched = (matched && s.Field.Matches(f)) } return matched }
[ "func", "(", "s", "*", "SelectionPredicate", ")", "MatchesObjectAttributes", "(", "l", "labels", ".", "Set", ",", "f", "fields", ".", "Set", ")", "bool", "{", "if", "s", ".", "Label", ".", "Empty", "(", ")", "&&", "s", ".", "Field", ".", "Empty", "...
// MatchesObjectAttributes returns true if the given labels and fields // match s.Label and s.Field.
[ "MatchesObjectAttributes", "returns", "true", "if", "the", "given", "labels", "and", "fields", "match", "s", ".", "Label", "and", "s", ".", "Field", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/apiserver/pkg/storage/selection_predicate.go#L103-L112
train
MatchesObjectAttributes returns true if the labels and fields match the predicate.
[ 30522, 4569, 2278, 1006, 1055, 1008, 4989, 28139, 16467, 1007, 3503, 16429, 20614, 19321, 3089, 8569, 4570, 1006, 1048, 10873, 1012, 2275, 1010, 1042, 4249, 1012, 2275, 1007, 22017, 2140, 1063, 2065, 1055, 1012, 3830, 1012, 4064, 1006, 1007...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/kubelet/kuberuntime/kuberuntime_gc.go
GarbageCollect
func (cgc *containerGC) GarbageCollect(gcPolicy kubecontainer.ContainerGCPolicy, allSourcesReady bool, evictTerminatedPods bool) error { errors := []error{} // Remove evictable containers if err := cgc.evictContainers(gcPolicy, allSourcesReady, evictTerminatedPods); err != nil { errors = append(errors, err) } // Remove sandboxes with zero containers if err := cgc.evictSandboxes(evictTerminatedPods); err != nil { errors = append(errors, err) } // Remove pod sandbox log directory if err := cgc.evictPodLogsDirectories(allSourcesReady); err != nil { errors = append(errors, err) } return utilerrors.NewAggregate(errors) }
go
func (cgc *containerGC) GarbageCollect(gcPolicy kubecontainer.ContainerGCPolicy, allSourcesReady bool, evictTerminatedPods bool) error { errors := []error{} // Remove evictable containers if err := cgc.evictContainers(gcPolicy, allSourcesReady, evictTerminatedPods); err != nil { errors = append(errors, err) } // Remove sandboxes with zero containers if err := cgc.evictSandboxes(evictTerminatedPods); err != nil { errors = append(errors, err) } // Remove pod sandbox log directory if err := cgc.evictPodLogsDirectories(allSourcesReady); err != nil { errors = append(errors, err) } return utilerrors.NewAggregate(errors) }
[ "func", "(", "cgc", "*", "containerGC", ")", "GarbageCollect", "(", "gcPolicy", "kubecontainer", ".", "ContainerGCPolicy", ",", "allSourcesReady", "bool", ",", "evictTerminatedPods", "bool", ")", "error", "{", "errors", ":=", "[", "]", "error", "{", "}", "\n",...
// GarbageCollect removes dead containers using the specified container gc policy. // Note that gc policy is not applied to sandboxes. Sandboxes are only removed when they are // not ready and containing no containers. // // GarbageCollect consists of the following steps: // * gets evictable containers which are not active and created more than gcPolicy.MinAge ago. // * removes oldest dead containers for each pod by enforcing gcPolicy.MaxPerPodContainer. // * removes oldest dead containers by enforcing gcPolicy.MaxContainers. // * gets evictable sandboxes which are not ready and contains no containers. // * removes evictable sandboxes.
[ "GarbageCollect", "removes", "dead", "containers", "using", "the", "specified", "container", "gc", "policy", ".", "Note", "that", "gc", "policy", "is", "not", "applied", "to", "sandboxes", ".", "Sandboxes", "are", "only", "removed", "when", "they", "are", "not...
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/kubelet/kuberuntime/kuberuntime_gc.go#L378-L395
train
GarbageCollect removes containers and sandboxes from the containerGC
[ 30522, 4569, 2278, 1006, 1039, 18195, 1008, 11661, 18195, 1007, 13044, 26895, 22471, 1006, 1043, 21906, 23518, 2100, 13970, 4783, 8663, 18249, 2121, 1012, 11661, 18195, 18155, 2594, 2100, 1010, 2035, 6499, 3126, 9623, 16416, 5149, 22017, 2140...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/kubectl/util/i18n/i18n.go
Errorf
func Errorf(defaultValue string, args ...int) error { return errors.New(T(defaultValue, args...)) }
go
func Errorf(defaultValue string, args ...int) error { return errors.New(T(defaultValue, args...)) }
[ "func", "Errorf", "(", "defaultValue", "string", ",", "args", "...", "int", ")", "error", "{", "return", "errors", ".", "New", "(", "T", "(", "defaultValue", ",", "args", "...", ")", ")", "\n", "}" ]
// Errorf produces an error with a translated error string. // Substitution is performed via the `T` function above, following // the same rules.
[ "Errorf", "produces", "an", "error", "with", "a", "translated", "error", "string", ".", "Substitution", "is", "performed", "via", "the", "T", "function", "above", "following", "the", "same", "rules", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/kubectl/util/i18n/i18n.go#L147-L149
train
Errorf returns a new error object.
[ 30522, 4569, 2278, 7561, 2546, 1006, 12398, 10175, 5657, 5164, 1010, 12098, 5620, 1012, 1012, 1012, 20014, 1007, 7561, 1063, 2709, 10697, 1012, 2047, 1006, 1056, 1006, 12398, 10175, 5657, 1010, 12098, 5620, 1012, 1012, 1012, 1007, 1007, 106...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/cloud-provider/plugins.go
RegisterCloudProvider
func RegisterCloudProvider(name string, cloud Factory) { providersMutex.Lock() defer providersMutex.Unlock() if _, found := providers[name]; found { klog.Fatalf("Cloud provider %q was registered twice", name) } klog.V(1).Infof("Registered cloud provider %q", name) providers[name] = cloud }
go
func RegisterCloudProvider(name string, cloud Factory) { providersMutex.Lock() defer providersMutex.Unlock() if _, found := providers[name]; found { klog.Fatalf("Cloud provider %q was registered twice", name) } klog.V(1).Infof("Registered cloud provider %q", name) providers[name] = cloud }
[ "func", "RegisterCloudProvider", "(", "name", "string", ",", "cloud", "Factory", ")", "{", "providersMutex", ".", "Lock", "(", ")", "\n", "defer", "providersMutex", ".", "Unlock", "(", ")", "\n", "if", "_", ",", "found", ":=", "providers", "[", "name", "...
// RegisterCloudProvider registers a cloudprovider.Factory by name. This // is expected to happen during app startup.
[ "RegisterCloudProvider", "registers", "a", "cloudprovider", ".", "Factory", "by", "name", ".", "This", "is", "expected", "to", "happen", "during", "app", "startup", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/cloud-provider/plugins.go#L58-L66
train
RegisterCloudProvider registers a cloud provider with the cloud provider registry.
[ 30522, 4569, 2278, 4236, 20464, 19224, 21572, 17258, 2121, 1006, 2171, 5164, 1010, 6112, 4713, 1007, 1063, 11670, 26746, 2595, 1012, 5843, 1006, 1007, 13366, 2121, 11670, 26746, 2595, 1012, 19829, 1006, 1007, 2065, 1035, 1010, 2179, 1024, 1...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/apiserver/pkg/audit/policy/util.go
ConvertStagesToStrings
func ConvertStagesToStrings(stages []audit.Stage) []string { s := make([]string, len(stages)) for i, stage := range stages { s[i] = string(stage) } return s }
go
func ConvertStagesToStrings(stages []audit.Stage) []string { s := make([]string, len(stages)) for i, stage := range stages { s[i] = string(stage) } return s }
[ "func", "ConvertStagesToStrings", "(", "stages", "[", "]", "audit", ".", "Stage", ")", "[", "]", "string", "{", "s", ":=", "make", "(", "[", "]", "string", ",", "len", "(", "stages", ")", ")", "\n", "for", "i", ",", "stage", ":=", "range", "stages"...
// ConvertStagesToStrings converts an array of stages to a string array
[ "ConvertStagesToStrings", "converts", "an", "array", "of", "stages", "to", "a", "string", "array" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/apiserver/pkg/audit/policy/util.go#L53-L59
train
ConvertStagesToStrings converts a slice of audit. Stage to a string slice of strings
[ 30522, 4569, 2278, 19884, 26702, 16033, 3367, 4892, 2015, 1006, 5711, 1031, 1033, 15727, 1012, 2754, 1007, 1031, 1033, 5164, 1063, 1055, 1024, 1027, 2191, 1006, 1031, 1033, 5164, 1010, 18798, 1006, 5711, 1007, 1007, 2005, 1045, 1010, 2754, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/apis/core/v1/zz_generated.conversion.go
Convert_v1_PodExecOptions_To_core_PodExecOptions
func Convert_v1_PodExecOptions_To_core_PodExecOptions(in *v1.PodExecOptions, out *core.PodExecOptions, s conversion.Scope) error { return autoConvert_v1_PodExecOptions_To_core_PodExecOptions(in, out, s) }
go
func Convert_v1_PodExecOptions_To_core_PodExecOptions(in *v1.PodExecOptions, out *core.PodExecOptions, s conversion.Scope) error { return autoConvert_v1_PodExecOptions_To_core_PodExecOptions(in, out, s) }
[ "func", "Convert_v1_PodExecOptions_To_core_PodExecOptions", "(", "in", "*", "v1", ".", "PodExecOptions", ",", "out", "*", "core", ".", "PodExecOptions", ",", "s", "conversion", ".", "Scope", ")", "error", "{", "return", "autoConvert_v1_PodExecOptions_To_core_PodExecOpti...
// Convert_v1_PodExecOptions_To_core_PodExecOptions is an autogenerated conversion function.
[ "Convert_v1_PodExecOptions_To_core_PodExecOptions", "is", "an", "autogenerated", "conversion", "function", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/apis/core/v1/zz_generated.conversion.go#L5337-L5339
train
Convert_v1_PodExecOptions_To_core_PodExecOptions is an autogenerated conversion function.
[ 30522, 4569, 2278, 10463, 1035, 1058, 2487, 1035, 17491, 10288, 8586, 7361, 9285, 1035, 2000, 1035, 4563, 1035, 17491, 10288, 8586, 7361, 9285, 1006, 1999, 1008, 1058, 2487, 1012, 17491, 10288, 8586, 7361, 9285, 1010, 2041, 1008, 4563, 1012...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/kubelet/cm/devicemanager/pod_devices.go
removeContainerAllocatedResources
func (pdev podDevices) removeContainerAllocatedResources(podUID, contName string, allocatedResources map[string]sets.String) { containers, exists := pdev[podUID] if !exists { return } resources, exists := containers[contName] if !exists { return } for resource, devices := range resources { allocatedResources[resource] = allocatedResources[resource].Difference(devices.deviceIds) } }
go
func (pdev podDevices) removeContainerAllocatedResources(podUID, contName string, allocatedResources map[string]sets.String) { containers, exists := pdev[podUID] if !exists { return } resources, exists := containers[contName] if !exists { return } for resource, devices := range resources { allocatedResources[resource] = allocatedResources[resource].Difference(devices.deviceIds) } }
[ "func", "(", "pdev", "podDevices", ")", "removeContainerAllocatedResources", "(", "podUID", ",", "contName", "string", ",", "allocatedResources", "map", "[", "string", "]", "sets", ".", "String", ")", "{", "containers", ",", "exists", ":=", "pdev", "[", "podUI...
// Removes the device resources allocated to the specified <podUID, contName> from allocatedResources.
[ "Removes", "the", "device", "resources", "allocated", "to", "the", "specified", "<podUID", "contName", ">", "from", "allocatedResources", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/kubelet/cm/devicemanager/pod_devices.go#L99-L111
train
removeContainerAllocatedResources removes the allocatedResources from the container
[ 30522, 4569, 2278, 1006, 22851, 6777, 17491, 24844, 23522, 1007, 6366, 8663, 18249, 21673, 4135, 12921, 6072, 8162, 9623, 1006, 17491, 21272, 1010, 9530, 2102, 18442, 5164, 1010, 11095, 6072, 8162, 9623, 4949, 1031, 5164, 1033, 4520, 1012, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/proxy/winkernel/proxier.go
updateServiceMap
func (proxier *Proxier) updateServiceMap() (result updateServiceMapResult) { result.staleServices = sets.NewString() var serviceMap proxyServiceMap = proxier.serviceMap var changes *serviceChangeMap = &proxier.serviceChanges func() { changes.lock.Lock() defer changes.lock.Unlock() for _, change := range changes.items { existingPorts := serviceMap.merge(change.current, proxier.endpointsMap) serviceMap.unmerge(change.previous, existingPorts, result.staleServices, proxier.endpointsMap) } changes.items = make(map[types.NamespacedName]*serviceChange) }() // TODO: If this will appear to be computationally expensive, consider // computing this incrementally similarly to serviceMap. result.hcServices = make(map[types.NamespacedName]uint16) for svcPortName, info := range serviceMap { if info.healthCheckNodePort != 0 { result.hcServices[svcPortName.NamespacedName] = uint16(info.healthCheckNodePort) } } return result }
go
func (proxier *Proxier) updateServiceMap() (result updateServiceMapResult) { result.staleServices = sets.NewString() var serviceMap proxyServiceMap = proxier.serviceMap var changes *serviceChangeMap = &proxier.serviceChanges func() { changes.lock.Lock() defer changes.lock.Unlock() for _, change := range changes.items { existingPorts := serviceMap.merge(change.current, proxier.endpointsMap) serviceMap.unmerge(change.previous, existingPorts, result.staleServices, proxier.endpointsMap) } changes.items = make(map[types.NamespacedName]*serviceChange) }() // TODO: If this will appear to be computationally expensive, consider // computing this incrementally similarly to serviceMap. result.hcServices = make(map[types.NamespacedName]uint16) for svcPortName, info := range serviceMap { if info.healthCheckNodePort != 0 { result.hcServices[svcPortName.NamespacedName] = uint16(info.healthCheckNodePort) } } return result }
[ "func", "(", "proxier", "*", "Proxier", ")", "updateServiceMap", "(", ")", "(", "result", "updateServiceMapResult", ")", "{", "result", ".", "staleServices", "=", "sets", ".", "NewString", "(", ")", "\n\n", "var", "serviceMap", "proxyServiceMap", "=", "proxier...
// <serviceMap> is updated by this function (based on the given changes). // <changes> map is cleared after applying them.
[ "<serviceMap", ">", "is", "updated", "by", "this", "function", "(", "based", "on", "the", "given", "changes", ")", ".", "<changes", ">", "map", "is", "cleared", "after", "applying", "them", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/proxy/winkernel/proxier.go#L764-L790
train
updateServiceMap updates the service map with the new service map.
[ 30522, 4569, 2278, 1006, 4013, 16898, 2099, 1008, 4013, 16898, 2099, 1007, 14409, 2121, 7903, 14545, 2361, 1006, 1007, 1006, 2765, 14409, 2121, 7903, 14545, 28994, 11314, 1007, 1063, 2765, 1012, 26729, 8043, 7903, 2229, 1027, 4520, 1012, 27...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/scheduler/algorithm/priorities/image_locality.go
sumImageScores
func sumImageScores(nodeInfo *schedulernodeinfo.NodeInfo, containers []v1.Container, totalNumNodes int) int64 { var sum int64 imageStates := nodeInfo.ImageStates() for _, container := range containers { if state, ok := imageStates[normalizedImageName(container.Image)]; ok { sum += scaledImageScore(state, totalNumNodes) } } return sum }
go
func sumImageScores(nodeInfo *schedulernodeinfo.NodeInfo, containers []v1.Container, totalNumNodes int) int64 { var sum int64 imageStates := nodeInfo.ImageStates() for _, container := range containers { if state, ok := imageStates[normalizedImageName(container.Image)]; ok { sum += scaledImageScore(state, totalNumNodes) } } return sum }
[ "func", "sumImageScores", "(", "nodeInfo", "*", "schedulernodeinfo", ".", "NodeInfo", ",", "containers", "[", "]", "v1", ".", "Container", ",", "totalNumNodes", "int", ")", "int64", "{", "var", "sum", "int64", "\n", "imageStates", ":=", "nodeInfo", ".", "Ima...
// sumImageScores returns the sum of image scores of all the containers that are already on the node. // Each image receives a raw score of its size, scaled by scaledImageScore. The raw scores are later used to calculate // the final score. Note that the init containers are not considered for it's rare for users to deploy huge init containers.
[ "sumImageScores", "returns", "the", "sum", "of", "image", "scores", "of", "all", "the", "containers", "that", "are", "already", "on", "the", "node", ".", "Each", "image", "receives", "a", "raw", "score", "of", "its", "size", "scaled", "by", "scaledImageScore...
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/scheduler/algorithm/priorities/image_locality.go#L77-L88
train
sumImageScores returns the sum of all image scores for each container.
[ 30522, 4569, 2278, 7680, 9581, 8449, 17345, 2015, 1006, 13045, 2378, 14876, 1008, 6134, 19139, 3207, 2378, 14876, 1012, 13045, 2378, 14876, 1010, 16143, 1031, 1033, 1058, 2487, 1012, 11661, 1010, 2561, 19172, 3630, 6155, 20014, 1007, 20014, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/apis/admissionregistration/zz_generated.deepcopy.go
DeepCopyInto
func (in *ValidatingWebhookConfigurationList) DeepCopyInto(out *ValidatingWebhookConfigurationList) { *out = *in out.TypeMeta = in.TypeMeta out.ListMeta = in.ListMeta if in.Items != nil { in, out := &in.Items, &out.Items *out = make([]ValidatingWebhookConfiguration, len(*in)) for i := range *in { (*in)[i].DeepCopyInto(&(*out)[i]) } } return }
go
func (in *ValidatingWebhookConfigurationList) DeepCopyInto(out *ValidatingWebhookConfigurationList) { *out = *in out.TypeMeta = in.TypeMeta out.ListMeta = in.ListMeta if in.Items != nil { in, out := &in.Items, &out.Items *out = make([]ValidatingWebhookConfiguration, len(*in)) for i := range *in { (*in)[i].DeepCopyInto(&(*out)[i]) } } return }
[ "func", "(", "in", "*", "ValidatingWebhookConfigurationList", ")", "DeepCopyInto", "(", "out", "*", "ValidatingWebhookConfigurationList", ")", "{", "*", "out", "=", "*", "in", "\n", "out", ".", "TypeMeta", "=", "in", ".", "TypeMeta", "\n", "out", ".", "ListM...
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
[ "DeepCopyInto", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "writing", "into", "out", ".", "in", "must", "be", "non", "-", "nil", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/apis/admissionregistration/zz_generated.deepcopy.go#L207-L219
train
DeepCopyInto is an autogenerated deepcopy function copying the receiver creating a new ValidatingWebhookConfigurationList.
[ 30522, 4569, 2278, 1006, 1999, 1008, 9398, 5844, 8545, 23706, 14659, 8663, 8873, 27390, 3370, 9863, 1007, 2784, 3597, 7685, 18447, 2080, 1006, 2041, 1008, 9398, 5844, 8545, 23706, 14659, 8663, 8873, 27390, 3370, 9863, 1007, 1063, 1008, 2041...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
cmd/kube-controller-manager/app/options/options.go
NewDefaultComponentConfig
func NewDefaultComponentConfig(insecurePort int32) (kubectrlmgrconfig.KubeControllerManagerConfiguration, error) { versioned := kubectrlmgrconfigv1alpha1.KubeControllerManagerConfiguration{} kubectrlmgrconfigscheme.Scheme.Default(&versioned) internal := kubectrlmgrconfig.KubeControllerManagerConfiguration{} if err := kubectrlmgrconfigscheme.Scheme.Convert(&versioned, &internal, nil); err != nil { return internal, err } internal.Generic.Port = insecurePort return internal, nil }
go
func NewDefaultComponentConfig(insecurePort int32) (kubectrlmgrconfig.KubeControllerManagerConfiguration, error) { versioned := kubectrlmgrconfigv1alpha1.KubeControllerManagerConfiguration{} kubectrlmgrconfigscheme.Scheme.Default(&versioned) internal := kubectrlmgrconfig.KubeControllerManagerConfiguration{} if err := kubectrlmgrconfigscheme.Scheme.Convert(&versioned, &internal, nil); err != nil { return internal, err } internal.Generic.Port = insecurePort return internal, nil }
[ "func", "NewDefaultComponentConfig", "(", "insecurePort", "int32", ")", "(", "kubectrlmgrconfig", ".", "KubeControllerManagerConfiguration", ",", "error", ")", "{", "versioned", ":=", "kubectrlmgrconfigv1alpha1", ".", "KubeControllerManagerConfiguration", "{", "}", "\n", ...
// NewDefaultComponentConfig returns kube-controller manager configuration object.
[ "NewDefaultComponentConfig", "returns", "kube", "-", "controller", "manager", "configuration", "object", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/cmd/kube-controller-manager/app/options/options.go#L192-L202
train
NewDefaultComponentConfig returns a new kubectrlmgrconfig. KubeControllerManagerConfiguration object with default values
[ 30522, 4569, 2278, 2047, 3207, 7011, 11314, 9006, 29513, 3372, 8663, 8873, 2290, 1006, 16021, 29150, 6442, 20014, 16703, 1007, 1006, 13970, 4783, 6593, 12190, 24798, 29566, 2078, 8873, 2290, 1012, 13970, 4783, 8663, 13181, 10820, 24805, 4590,...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/scheduler/algorithm/predicates/metadata.go
podMatchesAllAffinityTermProperties
func podMatchesAllAffinityTermProperties(pod *v1.Pod, properties []*affinityTermProperties) bool { if len(properties) == 0 { return false } for _, property := range properties { if !priorityutil.PodMatchesTermsNamespaceAndSelector(pod, property.namespaces, property.selector) { return false } } return true }
go
func podMatchesAllAffinityTermProperties(pod *v1.Pod, properties []*affinityTermProperties) bool { if len(properties) == 0 { return false } for _, property := range properties { if !priorityutil.PodMatchesTermsNamespaceAndSelector(pod, property.namespaces, property.selector) { return false } } return true }
[ "func", "podMatchesAllAffinityTermProperties", "(", "pod", "*", "v1", ".", "Pod", ",", "properties", "[", "]", "*", "affinityTermProperties", ")", "bool", "{", "if", "len", "(", "properties", ")", "==", "0", "{", "return", "false", "\n", "}", "\n", "for", ...
// podMatchesAllAffinityTermProperties returns true IFF the given pod matches all the given properties.
[ "podMatchesAllAffinityTermProperties", "returns", "true", "IFF", "the", "given", "pod", "matches", "all", "the", "given", "properties", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/scheduler/algorithm/predicates/metadata.go#L340-L350
train
podMatchesAllAffinityTermProperties returns true if all the given affinity term properties match.
[ 30522, 4569, 2278, 17491, 18900, 8376, 25425, 15379, 3012, 3334, 8737, 18981, 8743, 3111, 1006, 17491, 1008, 1058, 2487, 1012, 17491, 1010, 5144, 1031, 1033, 1008, 16730, 3334, 8737, 18981, 8743, 3111, 1007, 22017, 2140, 1063, 2065, 18798, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/apimachinery/pkg/util/sets/int64.go
Equal
func (s1 Int64) Equal(s2 Int64) bool { return len(s1) == len(s2) && s1.IsSuperset(s2) }
go
func (s1 Int64) Equal(s2 Int64) bool { return len(s1) == len(s2) && s1.IsSuperset(s2) }
[ "func", "(", "s1", "Int64", ")", "Equal", "(", "s2", "Int64", ")", "bool", "{", "return", "len", "(", "s1", ")", "==", "len", "(", "s2", ")", "&&", "s1", ".", "IsSuperset", "(", "s2", ")", "\n", "}" ]
// Equal returns true if and only if s1 is equal (as a set) to s2. // Two sets are equal if their membership is identical. // (In practice, this means same elements, order doesn't matter)
[ "Equal", "returns", "true", "if", "and", "only", "if", "s1", "is", "equal", "(", "as", "a", "set", ")", "to", "s2", ".", "Two", "sets", "are", "equal", "if", "their", "membership", "is", "identical", ".", "(", "In", "practice", "this", "means", "same...
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/apimachinery/pkg/util/sets/int64.go#L157-L159
train
Equal returns true if s1 and s2 are equal
[ 30522, 4569, 2278, 1006, 1055, 2487, 30524, 1006, 1055, 2475, 1007, 1065, 102, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/apimachinery/pkg/util/validation/validation.go
IsInRange
func IsInRange(value int, min int, max int) []string { if value >= min && value <= max { return nil } return []string{InclusiveRangeError(min, max)} }
go
func IsInRange(value int, min int, max int) []string { if value >= min && value <= max { return nil } return []string{InclusiveRangeError(min, max)} }
[ "func", "IsInRange", "(", "value", "int", ",", "min", "int", ",", "max", "int", ")", "[", "]", "string", "{", "if", "value", ">=", "min", "&&", "value", "<=", "max", "{", "return", "nil", "\n", "}", "\n", "return", "[", "]", "string", "{", "Inclu...
// IsInRange tests that the argument is in an inclusive range.
[ "IsInRange", "tests", "that", "the", "argument", "is", "in", "an", "inclusive", "range", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/apimachinery/pkg/util/validation/validation.go#L218-L223
train
IsInRange returns a slice of strings that represent the value in the range [ min max ).
[ 30522, 4569, 2278, 2003, 2378, 24388, 2063, 1006, 3643, 20014, 1010, 8117, 20014, 1010, 4098, 20014, 1007, 1031, 1033, 5164, 1063, 2065, 3643, 1028, 1027, 8117, 1004, 1004, 3643, 1026, 1027, 4098, 1063, 2709, 9152, 2140, 1065, 2709, 1031, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/quota/v1/generic/evaluator.go
Usage
func (o *objectCountEvaluator) Usage(object runtime.Object) (corev1.ResourceList, error) { quantity := resource.NewQuantity(1, resource.DecimalSI) resourceList := corev1.ResourceList{} for _, resourceName := range o.resourceNames { resourceList[resourceName] = *quantity } return resourceList, nil }
go
func (o *objectCountEvaluator) Usage(object runtime.Object) (corev1.ResourceList, error) { quantity := resource.NewQuantity(1, resource.DecimalSI) resourceList := corev1.ResourceList{} for _, resourceName := range o.resourceNames { resourceList[resourceName] = *quantity } return resourceList, nil }
[ "func", "(", "o", "*", "objectCountEvaluator", ")", "Usage", "(", "object", "runtime", ".", "Object", ")", "(", "corev1", ".", "ResourceList", ",", "error", ")", "{", "quantity", ":=", "resource", ".", "NewQuantity", "(", "1", ",", "resource", ".", "Deci...
// Usage returns the resource usage for the specified object
[ "Usage", "returns", "the", "resource", "usage", "for", "the", "specified", "object" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/quota/v1/generic/evaluator.go#L279-L286
train
Usage returns a resource list of resources that are used to evaluate the object.
[ 30522, 4569, 2278, 1006, 1051, 1008, 4874, 3597, 16671, 13331, 7630, 8844, 1007, 8192, 1006, 4874, 2448, 30524, 7692, 9863, 1024, 1027, 4563, 2615, 2487, 1012, 7692, 9863, 1063, 1065, 2005, 1035, 1010, 7692, 18442, 1024, 1027, 2846, 1051, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/apiserver/plugin/pkg/audit/dynamic/dynamic.go
createAndStartDelegate
func (b *backend) createAndStartDelegate(sink *auditregv1alpha1.AuditSink) (*delegate, error) { f := factory{ config: b.config, webhookClientManager: b.webhookClientManager, sink: sink, } delegate, err := f.BuildDelegate() if err != nil { return nil, err } err = delegate.Run(delegate.stopChan) if err != nil { return nil, err } return delegate, nil }
go
func (b *backend) createAndStartDelegate(sink *auditregv1alpha1.AuditSink) (*delegate, error) { f := factory{ config: b.config, webhookClientManager: b.webhookClientManager, sink: sink, } delegate, err := f.BuildDelegate() if err != nil { return nil, err } err = delegate.Run(delegate.stopChan) if err != nil { return nil, err } return delegate, nil }
[ "func", "(", "b", "*", "backend", ")", "createAndStartDelegate", "(", "sink", "*", "auditregv1alpha1", ".", "AuditSink", ")", "(", "*", "delegate", ",", "error", ")", "{", "f", ":=", "factory", "{", "config", ":", "b", ".", "config", ",", "webhookClientM...
// createAndStartDelegate will build a delegate from an audit sink configuration and run it
[ "createAndStartDelegate", "will", "build", "a", "delegate", "from", "an", "audit", "sink", "configuration", "and", "run", "it" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/apiserver/plugin/pkg/audit/dynamic/dynamic.go#L318-L333
train
createAndStartDelegate creates a new delegate and starts it.
[ 30522, 4569, 2278, 1006, 1038, 1008, 2067, 10497, 1007, 3443, 29560, 7559, 2102, 9247, 29107, 2618, 1006, 7752, 1008, 15727, 2890, 2290, 2615, 2487, 2389, 21890, 2487, 1012, 15727, 11493, 2243, 1007, 1006, 1008, 11849, 1010, 7561, 1007, 106...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/apiserver/pkg/audit/policy/util.go
ConvertStringSetToStages
func ConvertStringSetToStages(set sets.String) []audit.Stage { stages := make([]audit.Stage, len(set)) for i, stage := range set.List() { stages[i] = audit.Stage(stage) } return stages }
go
func ConvertStringSetToStages(set sets.String) []audit.Stage { stages := make([]audit.Stage, len(set)) for i, stage := range set.List() { stages[i] = audit.Stage(stage) } return stages }
[ "func", "ConvertStringSetToStages", "(", "set", "sets", ".", "String", ")", "[", "]", "audit", ".", "Stage", "{", "stages", ":=", "make", "(", "[", "]", "audit", ".", "Stage", ",", "len", "(", "set", ")", ")", "\n", "for", "i", ",", "stage", ":=", ...
// ConvertStringSetToStages converts a string set to an array of stages
[ "ConvertStringSetToStages", "converts", "a", "string", "set", "to", "an", "array", "of", "stages" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/apiserver/pkg/audit/policy/util.go#L62-L68
train
ConvertStringSetToStages converts a string set to a list of stages
[ 30522, 4569, 2278, 19884, 18886, 3070, 21678, 28696, 8449, 1006, 2275, 4520, 1012, 5164, 1007, 1031, 1033, 15727, 1012, 2754, 1063, 5711, 1024, 1027, 2191, 1006, 1031, 1033, 15727, 1012, 2754, 1010, 18798, 1006, 2275, 1007, 1007, 2005, 1045...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/client-go/restmapper/category_expansion.go
Expand
func (e discoveryCategoryExpander) Expand(category string) ([]schema.GroupResource, bool) { // Get all supported resources for groups and versions from server, if no resource found, fallback anyway. apiResourceLists, _ := e.discoveryClient.ServerResources() if len(apiResourceLists) == 0 { return nil, false } discoveredExpansions := map[string][]schema.GroupResource{} for _, apiResourceList := range apiResourceLists { gv, err := schema.ParseGroupVersion(apiResourceList.GroupVersion) if err != nil { continue } // Collect GroupVersions by categories for _, apiResource := range apiResourceList.APIResources { if categories := apiResource.Categories; len(categories) > 0 { for _, category := range categories { groupResource := schema.GroupResource{ Group: gv.Group, Resource: apiResource.Name, } discoveredExpansions[category] = append(discoveredExpansions[category], groupResource) } } } } ret, ok := discoveredExpansions[category] return ret, ok }
go
func (e discoveryCategoryExpander) Expand(category string) ([]schema.GroupResource, bool) { // Get all supported resources for groups and versions from server, if no resource found, fallback anyway. apiResourceLists, _ := e.discoveryClient.ServerResources() if len(apiResourceLists) == 0 { return nil, false } discoveredExpansions := map[string][]schema.GroupResource{} for _, apiResourceList := range apiResourceLists { gv, err := schema.ParseGroupVersion(apiResourceList.GroupVersion) if err != nil { continue } // Collect GroupVersions by categories for _, apiResource := range apiResourceList.APIResources { if categories := apiResource.Categories; len(categories) > 0 { for _, category := range categories { groupResource := schema.GroupResource{ Group: gv.Group, Resource: apiResource.Name, } discoveredExpansions[category] = append(discoveredExpansions[category], groupResource) } } } } ret, ok := discoveredExpansions[category] return ret, ok }
[ "func", "(", "e", "discoveryCategoryExpander", ")", "Expand", "(", "category", "string", ")", "(", "[", "]", "schema", ".", "GroupResource", ",", "bool", ")", "{", "// Get all supported resources for groups and versions from server, if no resource found, fallback anyway.", ...
// Expand fulfills CategoryExpander
[ "Expand", "fulfills", "CategoryExpander" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/client-go/restmapper/category_expansion.go#L59-L88
train
Expand returns a list of all resources that are supported by the given category.
[ 30522, 4569, 2278, 1006, 1041, 5456, 16280, 20255, 6672, 2595, 9739, 4063, 1007, 7818, 1006, 4696, 5164, 1007, 1006, 1031, 1033, 8040, 28433, 1012, 2177, 6072, 8162, 3401, 1010, 22017, 2140, 1007, 1063, 1013, 1013, 2131, 2035, 3569, 4219, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/client-go/tools/clientcmd/validation.go
IsContextNotFound
func IsContextNotFound(err error) bool { if err == nil { return false } if _, ok := err.(*errContextNotFound); ok || err == ErrNoContext { return true } return strings.Contains(err.Error(), "context was not found for specified context") }
go
func IsContextNotFound(err error) bool { if err == nil { return false } if _, ok := err.(*errContextNotFound); ok || err == ErrNoContext { return true } return strings.Contains(err.Error(), "context was not found for specified context") }
[ "func", "IsContextNotFound", "(", "err", "error", ")", "bool", "{", "if", "err", "==", "nil", "{", "return", "false", "\n", "}", "\n", "if", "_", ",", "ok", ":=", "err", ".", "(", "*", "errContextNotFound", ")", ";", "ok", "||", "err", "==", "ErrNo...
// IsContextNotFound returns a boolean indicating whether the error is known to // report that a context was not found
[ "IsContextNotFound", "returns", "a", "boolean", "indicating", "whether", "the", "error", "is", "known", "to", "report", "that", "a", "context", "was", "not", "found" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/client-go/tools/clientcmd/validation.go#L48-L56
train
IsContextNotFound returns true if the error is a ErrNoContext
[ 30522, 4569, 2278, 2003, 8663, 18209, 17048, 14876, 8630, 1006, 9413, 2099, 7561, 1007, 22017, 2140, 1063, 2065, 9413, 2099, 1027, 1027, 9152, 2140, 1063, 2709, 6270, 1065, 2065, 1035, 1010, 7929, 1024, 1027, 9413, 2099, 1012, 1006, 1008, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/kubelet/dockershim/network/hostport/hostport_syncer.go
gatherAllHostports
func gatherAllHostports(activePodPortMappings []*PodPortMapping) (map[*PortMapping]targetPod, error) { podHostportMap := make(map[*PortMapping]targetPod) for _, pm := range activePodPortMappings { if pm.IP.To4() == nil { return nil, fmt.Errorf("Invalid or missing pod %s IP", getPodFullName(pm)) } // should not handle hostports for hostnetwork pods if pm.HostNetwork { continue } for _, port := range pm.PortMappings { if port.HostPort != 0 { podHostportMap[port] = targetPod{podFullName: getPodFullName(pm), podIP: pm.IP.String()} } } } return podHostportMap, nil }
go
func gatherAllHostports(activePodPortMappings []*PodPortMapping) (map[*PortMapping]targetPod, error) { podHostportMap := make(map[*PortMapping]targetPod) for _, pm := range activePodPortMappings { if pm.IP.To4() == nil { return nil, fmt.Errorf("Invalid or missing pod %s IP", getPodFullName(pm)) } // should not handle hostports for hostnetwork pods if pm.HostNetwork { continue } for _, port := range pm.PortMappings { if port.HostPort != 0 { podHostportMap[port] = targetPod{podFullName: getPodFullName(pm), podIP: pm.IP.String()} } } } return podHostportMap, nil }
[ "func", "gatherAllHostports", "(", "activePodPortMappings", "[", "]", "*", "PodPortMapping", ")", "(", "map", "[", "*", "PortMapping", "]", "targetPod", ",", "error", ")", "{", "podHostportMap", ":=", "make", "(", "map", "[", "*", "PortMapping", "]", "target...
// gatherAllHostports returns all hostports that should be presented on node, // given the list of pods running on that node and ignoring host network // pods (which don't need hostport <-> container port mapping).
[ "gatherAllHostports", "returns", "all", "hostports", "that", "should", "be", "presented", "on", "node", "given", "the", "list", "of", "pods", "running", "on", "that", "node", "and", "ignoring", "host", "network", "pods", "(", "which", "don", "t", "need", "ho...
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/kubelet/dockershim/network/hostport/hostport_syncer.go#L122-L140
train
gatherAllHostports returns a map of all hostports for all the activePodPortMappings.
[ 30522, 4569, 2278, 8587, 8095, 15006, 25856, 11589, 2015, 1006, 3161, 27633, 6442, 2863, 14853, 2015, 1031, 1033, 1008, 17491, 6442, 2863, 14853, 1007, 1006, 4949, 1031, 1008, 3417, 2863, 14853, 1033, 4539, 27633, 1010, 7561, 1007, 1063, 17...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/client-go/util/certificate/certificate_manager.go
ServerHealthy
func (m *manager) ServerHealthy() bool { m.certAccessLock.RLock() defer m.certAccessLock.RUnlock() return m.serverHealth }
go
func (m *manager) ServerHealthy() bool { m.certAccessLock.RLock() defer m.certAccessLock.RUnlock() return m.serverHealth }
[ "func", "(", "m", "*", "manager", ")", "ServerHealthy", "(", ")", "bool", "{", "m", ".", "certAccessLock", ".", "RLock", "(", ")", "\n", "defer", "m", ".", "certAccessLock", ".", "RUnlock", "(", ")", "\n", "return", "m", ".", "serverHealth", "\n", "}...
// ServerHealthy returns true if the cert manager believes the server // is currently alive.
[ "ServerHealthy", "returns", "true", "if", "the", "cert", "manager", "believes", "the", "server", "is", "currently", "alive", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/client-go/util/certificate/certificate_manager.go#L222-L226
train
ServerHealthy returns true if the server is healthy.
[ 30522, 4569, 2278, 1006, 1049, 1008, 3208, 1007, 8241, 20192, 24658, 2100, 1006, 1007, 22017, 2140, 1063, 1049, 1012, 8292, 13320, 9468, 7971, 7878, 1012, 1054, 7878, 1006, 1007, 13366, 2121, 1049, 1012, 8292, 13320, 9468, 7971, 7878, 1012,...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/apis/apps/v1/zz_generated.defaults.go
RegisterDefaults
func RegisterDefaults(scheme *runtime.Scheme) error { scheme.AddTypeDefaultingFunc(&v1.DaemonSet{}, func(obj interface{}) { SetObjectDefaults_DaemonSet(obj.(*v1.DaemonSet)) }) scheme.AddTypeDefaultingFunc(&v1.DaemonSetList{}, func(obj interface{}) { SetObjectDefaults_DaemonSetList(obj.(*v1.DaemonSetList)) }) scheme.AddTypeDefaultingFunc(&v1.Deployment{}, func(obj interface{}) { SetObjectDefaults_Deployment(obj.(*v1.Deployment)) }) scheme.AddTypeDefaultingFunc(&v1.DeploymentList{}, func(obj interface{}) { SetObjectDefaults_DeploymentList(obj.(*v1.DeploymentList)) }) scheme.AddTypeDefaultingFunc(&v1.ReplicaSet{}, func(obj interface{}) { SetObjectDefaults_ReplicaSet(obj.(*v1.ReplicaSet)) }) scheme.AddTypeDefaultingFunc(&v1.ReplicaSetList{}, func(obj interface{}) { SetObjectDefaults_ReplicaSetList(obj.(*v1.ReplicaSetList)) }) scheme.AddTypeDefaultingFunc(&v1.StatefulSet{}, func(obj interface{}) { SetObjectDefaults_StatefulSet(obj.(*v1.StatefulSet)) }) scheme.AddTypeDefaultingFunc(&v1.StatefulSetList{}, func(obj interface{}) { SetObjectDefaults_StatefulSetList(obj.(*v1.StatefulSetList)) }) return nil }
go
func RegisterDefaults(scheme *runtime.Scheme) error { scheme.AddTypeDefaultingFunc(&v1.DaemonSet{}, func(obj interface{}) { SetObjectDefaults_DaemonSet(obj.(*v1.DaemonSet)) }) scheme.AddTypeDefaultingFunc(&v1.DaemonSetList{}, func(obj interface{}) { SetObjectDefaults_DaemonSetList(obj.(*v1.DaemonSetList)) }) scheme.AddTypeDefaultingFunc(&v1.Deployment{}, func(obj interface{}) { SetObjectDefaults_Deployment(obj.(*v1.Deployment)) }) scheme.AddTypeDefaultingFunc(&v1.DeploymentList{}, func(obj interface{}) { SetObjectDefaults_DeploymentList(obj.(*v1.DeploymentList)) }) scheme.AddTypeDefaultingFunc(&v1.ReplicaSet{}, func(obj interface{}) { SetObjectDefaults_ReplicaSet(obj.(*v1.ReplicaSet)) }) scheme.AddTypeDefaultingFunc(&v1.ReplicaSetList{}, func(obj interface{}) { SetObjectDefaults_ReplicaSetList(obj.(*v1.ReplicaSetList)) }) scheme.AddTypeDefaultingFunc(&v1.StatefulSet{}, func(obj interface{}) { SetObjectDefaults_StatefulSet(obj.(*v1.StatefulSet)) }) scheme.AddTypeDefaultingFunc(&v1.StatefulSetList{}, func(obj interface{}) { SetObjectDefaults_StatefulSetList(obj.(*v1.StatefulSetList)) }) return nil }
[ "func", "RegisterDefaults", "(", "scheme", "*", "runtime", ".", "Scheme", ")", "error", "{", "scheme", ".", "AddTypeDefaultingFunc", "(", "&", "v1", ".", "DaemonSet", "{", "}", ",", "func", "(", "obj", "interface", "{", "}", ")", "{", "SetObjectDefaults_Da...
// RegisterDefaults adds defaulters functions to the given scheme. // Public to allow building arbitrary schemes. // All generated defaulters are covering - they call all nested defaulters.
[ "RegisterDefaults", "adds", "defaulters", "functions", "to", "the", "given", "scheme", ".", "Public", "to", "allow", "building", "arbitrary", "schemes", ".", "All", "generated", "defaulters", "are", "covering", "-", "they", "call", "all", "nested", "defaulters", ...
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/apis/apps/v1/zz_generated.defaults.go#L32-L42
train
RegisterDefaults registers default values for the scheme
[ 30522, 4569, 2278, 4236, 3207, 7011, 11314, 2015, 1006, 5679, 1008, 2448, 7292, 1012, 5679, 1007, 7561, 1063, 5679, 1012, 5587, 13874, 3207, 7011, 11314, 2075, 11263, 12273, 1006, 1004, 1058, 2487, 1012, 12828, 13462, 1063, 1065, 1010, 4569...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/api/extensions/v1beta1/zz_generated.deepcopy.go
DeepCopyInto
func (in *NetworkPolicySpec) DeepCopyInto(out *NetworkPolicySpec) { *out = *in in.PodSelector.DeepCopyInto(&out.PodSelector) if in.Ingress != nil { in, out := &in.Ingress, &out.Ingress *out = make([]NetworkPolicyIngressRule, len(*in)) for i := range *in { (*in)[i].DeepCopyInto(&(*out)[i]) } } if in.Egress != nil { in, out := &in.Egress, &out.Egress *out = make([]NetworkPolicyEgressRule, len(*in)) for i := range *in { (*in)[i].DeepCopyInto(&(*out)[i]) } } if in.PolicyTypes != nil { in, out := &in.PolicyTypes, &out.PolicyTypes *out = make([]PolicyType, len(*in)) copy(*out, *in) } return }
go
func (in *NetworkPolicySpec) DeepCopyInto(out *NetworkPolicySpec) { *out = *in in.PodSelector.DeepCopyInto(&out.PodSelector) if in.Ingress != nil { in, out := &in.Ingress, &out.Ingress *out = make([]NetworkPolicyIngressRule, len(*in)) for i := range *in { (*in)[i].DeepCopyInto(&(*out)[i]) } } if in.Egress != nil { in, out := &in.Egress, &out.Egress *out = make([]NetworkPolicyEgressRule, len(*in)) for i := range *in { (*in)[i].DeepCopyInto(&(*out)[i]) } } if in.PolicyTypes != nil { in, out := &in.PolicyTypes, &out.PolicyTypes *out = make([]PolicyType, len(*in)) copy(*out, *in) } return }
[ "func", "(", "in", "*", "NetworkPolicySpec", ")", "DeepCopyInto", "(", "out", "*", "NetworkPolicySpec", ")", "{", "*", "out", "=", "*", "in", "\n", "in", ".", "PodSelector", ".", "DeepCopyInto", "(", "&", "out", ".", "PodSelector", ")", "\n", "if", "in...
// DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
[ "DeepCopyInto", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "writing", "into", "out", ".", "in", "must", "be", "non", "-", "nil", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/api/extensions/v1beta1/zz_generated.deepcopy.go#L916-L939
train
DeepCopyInto is an autogenerated deepcopy function copying the receiver creating a new NetworkPolicySpec.
[ 30522, 4569, 2278, 1006, 1999, 1008, 2897, 18155, 2594, 7274, 5051, 2278, 1007, 2784, 3597, 7685, 18447, 2080, 1006, 2041, 1008, 2897, 18155, 2594, 7274, 5051, 2278, 1007, 1063, 1008, 2041, 1027, 1008, 1999, 1999, 1012, 26723, 12260, 16761,...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/kubelet/server/stats/prometheus_resource_metrics.go
NewPrometheusResourceMetricCollector
func NewPrometheusResourceMetricCollector(provider SummaryProvider, config ResourceMetricsConfig) prometheus.Collector { return &resourceMetricCollector{ provider: provider, config: config, errors: prometheus.NewGauge(prometheus.GaugeOpts{ Name: "scrape_error", Help: "1 if there was an error while getting container metrics, 0 otherwise", }), } }
go
func NewPrometheusResourceMetricCollector(provider SummaryProvider, config ResourceMetricsConfig) prometheus.Collector { return &resourceMetricCollector{ provider: provider, config: config, errors: prometheus.NewGauge(prometheus.GaugeOpts{ Name: "scrape_error", Help: "1 if there was an error while getting container metrics, 0 otherwise", }), } }
[ "func", "NewPrometheusResourceMetricCollector", "(", "provider", "SummaryProvider", ",", "config", "ResourceMetricsConfig", ")", "prometheus", ".", "Collector", "{", "return", "&", "resourceMetricCollector", "{", "provider", ":", "provider", ",", "config", ":", "config"...
// NewPrometheusResourceMetricCollector returns a prometheus.Collector which exports resource metrics
[ "NewPrometheusResourceMetricCollector", "returns", "a", "prometheus", ".", "Collector", "which", "exports", "resource", "metrics" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/kubelet/server/stats/prometheus_resource_metrics.go#L57-L66
train
NewPrometheusResourceMetricCollector returns a new prometheus. Collector that collects container metrics.
[ 30522, 4569, 2278, 2047, 21572, 11368, 5369, 2271, 6072, 8162, 3401, 12589, 26895, 22471, 2953, 1006, 10802, 12654, 21572, 17258, 2121, 1010, 9530, 8873, 2290, 7692, 12589, 9363, 2078, 8873, 2290, 1007, 20877, 11031, 10600, 1012, 10018, 1063,...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/apiserver/pkg/registry/rest/update.go
BeforeUpdate
func BeforeUpdate(strategy RESTUpdateStrategy, ctx context.Context, obj, old runtime.Object) error { objectMeta, kind, kerr := objectMetaAndKind(strategy, obj) if kerr != nil { return kerr } if strategy.NamespaceScoped() { if !ValidNamespace(ctx, objectMeta) { return errors.NewBadRequest("the namespace of the provided object does not match the namespace sent on the request") } } else if len(objectMeta.GetNamespace()) > 0 { objectMeta.SetNamespace(metav1.NamespaceNone) } // Ensure requests cannot update generation oldMeta, err := meta.Accessor(old) if err != nil { return err } objectMeta.SetGeneration(oldMeta.GetGeneration()) // Initializers are a deprecated alpha field and should not be saved oldMeta.SetInitializers(nil) objectMeta.SetInitializers(nil) // Ensure managedFields state is removed unless ServerSideApply is enabled if !utilfeature.DefaultFeatureGate.Enabled(features.ServerSideApply) { oldMeta.SetManagedFields(nil) objectMeta.SetManagedFields(nil) } strategy.PrepareForUpdate(ctx, obj, old) // ClusterName is ignored and should not be saved if len(objectMeta.GetClusterName()) > 0 { objectMeta.SetClusterName("") } // Use the existing UID if none is provided if len(objectMeta.GetUID()) == 0 { objectMeta.SetUID(oldMeta.GetUID()) } // ignore changes to timestamp if oldCreationTime := oldMeta.GetCreationTimestamp(); !oldCreationTime.IsZero() { objectMeta.SetCreationTimestamp(oldMeta.GetCreationTimestamp()) } // an update can never remove/change a deletion timestamp if !oldMeta.GetDeletionTimestamp().IsZero() { objectMeta.SetDeletionTimestamp(oldMeta.GetDeletionTimestamp()) } // an update can never remove/change grace period seconds if oldMeta.GetDeletionGracePeriodSeconds() != nil && objectMeta.GetDeletionGracePeriodSeconds() == nil { objectMeta.SetDeletionGracePeriodSeconds(oldMeta.GetDeletionGracePeriodSeconds()) } // Ensure some common fields, like UID, are validated for all resources. errs, err := validateCommonFields(obj, old, strategy) if err != nil { return errors.NewInternalError(err) } errs = append(errs, strategy.ValidateUpdate(ctx, obj, old)...) if len(errs) > 0 { return errors.NewInvalid(kind.GroupKind(), objectMeta.GetName(), errs) } strategy.Canonicalize(obj) return nil }
go
func BeforeUpdate(strategy RESTUpdateStrategy, ctx context.Context, obj, old runtime.Object) error { objectMeta, kind, kerr := objectMetaAndKind(strategy, obj) if kerr != nil { return kerr } if strategy.NamespaceScoped() { if !ValidNamespace(ctx, objectMeta) { return errors.NewBadRequest("the namespace of the provided object does not match the namespace sent on the request") } } else if len(objectMeta.GetNamespace()) > 0 { objectMeta.SetNamespace(metav1.NamespaceNone) } // Ensure requests cannot update generation oldMeta, err := meta.Accessor(old) if err != nil { return err } objectMeta.SetGeneration(oldMeta.GetGeneration()) // Initializers are a deprecated alpha field and should not be saved oldMeta.SetInitializers(nil) objectMeta.SetInitializers(nil) // Ensure managedFields state is removed unless ServerSideApply is enabled if !utilfeature.DefaultFeatureGate.Enabled(features.ServerSideApply) { oldMeta.SetManagedFields(nil) objectMeta.SetManagedFields(nil) } strategy.PrepareForUpdate(ctx, obj, old) // ClusterName is ignored and should not be saved if len(objectMeta.GetClusterName()) > 0 { objectMeta.SetClusterName("") } // Use the existing UID if none is provided if len(objectMeta.GetUID()) == 0 { objectMeta.SetUID(oldMeta.GetUID()) } // ignore changes to timestamp if oldCreationTime := oldMeta.GetCreationTimestamp(); !oldCreationTime.IsZero() { objectMeta.SetCreationTimestamp(oldMeta.GetCreationTimestamp()) } // an update can never remove/change a deletion timestamp if !oldMeta.GetDeletionTimestamp().IsZero() { objectMeta.SetDeletionTimestamp(oldMeta.GetDeletionTimestamp()) } // an update can never remove/change grace period seconds if oldMeta.GetDeletionGracePeriodSeconds() != nil && objectMeta.GetDeletionGracePeriodSeconds() == nil { objectMeta.SetDeletionGracePeriodSeconds(oldMeta.GetDeletionGracePeriodSeconds()) } // Ensure some common fields, like UID, are validated for all resources. errs, err := validateCommonFields(obj, old, strategy) if err != nil { return errors.NewInternalError(err) } errs = append(errs, strategy.ValidateUpdate(ctx, obj, old)...) if len(errs) > 0 { return errors.NewInvalid(kind.GroupKind(), objectMeta.GetName(), errs) } strategy.Canonicalize(obj) return nil }
[ "func", "BeforeUpdate", "(", "strategy", "RESTUpdateStrategy", ",", "ctx", "context", ".", "Context", ",", "obj", ",", "old", "runtime", ".", "Object", ")", "error", "{", "objectMeta", ",", "kind", ",", "kerr", ":=", "objectMetaAndKind", "(", "strategy", ","...
// BeforeUpdate ensures that common operations for all resources are performed on update. It only returns // errors that can be converted to api.Status. It will invoke update validation with the provided existing // and updated objects. // It sets zero values only if the object does not have a zero value for the respective field.
[ "BeforeUpdate", "ensures", "that", "common", "operations", "for", "all", "resources", "are", "performed", "on", "update", ".", "It", "only", "returns", "errors", "that", "can", "be", "converted", "to", "api", ".", "Status", ".", "It", "will", "invoke", "upda...
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/apiserver/pkg/registry/rest/update.go#L87-L154
train
BeforeUpdate is the same as PrepareForUpdate but does not modify the object.
[ 30522, 4569, 2278, 2077, 6279, 13701, 1006, 5656, 2717, 6279, 27122, 6494, 2618, 6292, 1010, 14931, 2595, 6123, 1012, 6123, 1010, 27885, 3501, 1010, 2214, 2448, 7292, 1012, 4874, 1007, 7561, 1063, 4874, 11368, 2050, 1010, 2785, 1010, 14884,...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/volume/flexvolume/fake_watcher.go
TriggerEvent
func (w *fakeWatcher) TriggerEvent(op fsnotify.Op, filename string) { w.eventHandler(fsnotify.Event{Op: op, Name: filename}) }
go
func (w *fakeWatcher) TriggerEvent(op fsnotify.Op, filename string) { w.eventHandler(fsnotify.Event{Op: op, Name: filename}) }
[ "func", "(", "w", "*", "fakeWatcher", ")", "TriggerEvent", "(", "op", "fsnotify", ".", "Op", ",", "filename", "string", ")", "{", "w", ".", "eventHandler", "(", "fsnotify", ".", "Event", "{", "Op", ":", "op", ",", "Name", ":", "filename", "}", ")", ...
// Triggers a mock filesystem event.
[ "Triggers", "a", "mock", "filesystem", "event", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/volume/flexvolume/fake_watcher.go#L51-L53
train
TriggerEvent is part of the fsnotify. Watcher interface.
[ 30522, 4569, 2278, 1006, 1059, 1008, 8275, 18866, 2121, 1007, 9495, 18697, 3372, 1006, 6728, 1042, 2015, 17048, 8757, 1012, 6728, 1010, 5371, 18442, 5164, 1007, 1063, 1059, 1012, 2724, 11774, 3917, 1006, 1042, 2015, 17048, 8757, 1012, 2724,...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/client-go/kubernetes/fake/clientset_generated.go
CoordinationV1
func (c *Clientset) CoordinationV1() coordinationv1.CoordinationV1Interface { return &fakecoordinationv1.FakeCoordinationV1{Fake: &c.Fake} }
go
func (c *Clientset) CoordinationV1() coordinationv1.CoordinationV1Interface { return &fakecoordinationv1.FakeCoordinationV1{Fake: &c.Fake} }
[ "func", "(", "c", "*", "Clientset", ")", "CoordinationV1", "(", ")", "coordinationv1", ".", "CoordinationV1Interface", "{", "return", "&", "fakecoordinationv1", ".", "FakeCoordinationV1", "{", "Fake", ":", "&", "c", ".", "Fake", "}", "\n", "}" ]
// CoordinationV1 retrieves the CoordinationV1Client
[ "CoordinationV1", "retrieves", "the", "CoordinationV1Client" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/client-go/kubernetes/fake/clientset_generated.go#L235-L237
train
CoordinationV1 returns a CoordinationV1Client that can be used to get a CoordinationV1 client.
[ 30522, 4569, 2278, 1006, 1039, 1008, 7846, 3388, 1007, 12016, 2615, 2487, 1006, 1007, 12016, 2615, 2487, 1012, 12016, 2615, 2487, 18447, 2121, 12172, 1063, 2709, 1004, 8275, 3597, 8551, 12758, 2615, 2487, 1012, 8275, 3597, 8551, 12758, 2615...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
plugin/pkg/admission/alwayspullimages/admission.go
NewAlwaysPullImages
func NewAlwaysPullImages() *AlwaysPullImages { return &AlwaysPullImages{ Handler: admission.NewHandler(admission.Create, admission.Update), } }
go
func NewAlwaysPullImages() *AlwaysPullImages { return &AlwaysPullImages{ Handler: admission.NewHandler(admission.Create, admission.Update), } }
[ "func", "NewAlwaysPullImages", "(", ")", "*", "AlwaysPullImages", "{", "return", "&", "AlwaysPullImages", "{", "Handler", ":", "admission", ".", "NewHandler", "(", "admission", ".", "Create", ",", "admission", ".", "Update", ")", ",", "}", "\n", "}" ]
// NewAlwaysPullImages creates a new always pull images admission control handler
[ "NewAlwaysPullImages", "creates", "a", "new", "always", "pull", "images", "admission", "control", "handler" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/plugin/pkg/admission/alwayspullimages/admission.go#L120-L124
train
NewAlwaysPullImages returns a new always pull images admission handler
[ 30522, 4569, 2278, 2047, 2389, 14035, 14289, 6894, 26860, 2015, 1006, 1007, 1008, 2467, 14289, 6894, 26860, 2015, 1063, 2709, 1004, 2467, 30524, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/apis/auditregistration/v1alpha1/zz_generated.conversion.go
Convert_v1alpha1_WebhookThrottleConfig_To_auditregistration_WebhookThrottleConfig
func Convert_v1alpha1_WebhookThrottleConfig_To_auditregistration_WebhookThrottleConfig(in *v1alpha1.WebhookThrottleConfig, out *auditregistration.WebhookThrottleConfig, s conversion.Scope) error { return autoConvert_v1alpha1_WebhookThrottleConfig_To_auditregistration_WebhookThrottleConfig(in, out, s) }
go
func Convert_v1alpha1_WebhookThrottleConfig_To_auditregistration_WebhookThrottleConfig(in *v1alpha1.WebhookThrottleConfig, out *auditregistration.WebhookThrottleConfig, s conversion.Scope) error { return autoConvert_v1alpha1_WebhookThrottleConfig_To_auditregistration_WebhookThrottleConfig(in, out, s) }
[ "func", "Convert_v1alpha1_WebhookThrottleConfig_To_auditregistration_WebhookThrottleConfig", "(", "in", "*", "v1alpha1", ".", "WebhookThrottleConfig", ",", "out", "*", "auditregistration", ".", "WebhookThrottleConfig", ",", "s", "conversion", ".", "Scope", ")", "error", "{"...
// Convert_v1alpha1_WebhookThrottleConfig_To_auditregistration_WebhookThrottleConfig is an autogenerated conversion function.
[ "Convert_v1alpha1_WebhookThrottleConfig_To_auditregistration_WebhookThrottleConfig", "is", "an", "autogenerated", "conversion", "function", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/apis/auditregistration/v1alpha1/zz_generated.conversion.go#L346-L348
train
Convert_v1alpha1_WebhookThrottleConfig_To_auditregistration_WebhookThrottleConfig is an autogenerated conversion function.
[ 30522, 4569, 2278, 10463, 1035, 1058, 2487, 2389, 21890, 2487, 1035, 4773, 6806, 6559, 2705, 21709, 9286, 8663, 8873, 2290, 1035, 2000, 1035, 15727, 2890, 24063, 8156, 30524, 2890, 24063, 8156, 1012, 4773, 6806, 6559, 2705, 21709, 9286, 866...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/apiserver/pkg/endpoints/handlers/get.go
getResourceHandler
func getResourceHandler(scope *RequestScope, getter getterFunc) http.HandlerFunc { return func(w http.ResponseWriter, req *http.Request) { trace := utiltrace.New("Get " + req.URL.Path) defer trace.LogIfLong(500 * time.Millisecond) namespace, name, err := scope.Namer.Name(req) if err != nil { scope.err(err, w, req) return } ctx := req.Context() ctx = request.WithNamespace(ctx, namespace) outputMediaType, _, err := negotiation.NegotiateOutputMediaType(req, scope.Serializer, scope) if err != nil { scope.err(err, w, req) return } result, err := getter(ctx, name, req, trace) if err != nil { scope.err(err, w, req) return } trace.Step("About to write a response") transformResponseObject(ctx, scope, trace, req, w, http.StatusOK, outputMediaType, result) trace.Step("Transformed response object") } }
go
func getResourceHandler(scope *RequestScope, getter getterFunc) http.HandlerFunc { return func(w http.ResponseWriter, req *http.Request) { trace := utiltrace.New("Get " + req.URL.Path) defer trace.LogIfLong(500 * time.Millisecond) namespace, name, err := scope.Namer.Name(req) if err != nil { scope.err(err, w, req) return } ctx := req.Context() ctx = request.WithNamespace(ctx, namespace) outputMediaType, _, err := negotiation.NegotiateOutputMediaType(req, scope.Serializer, scope) if err != nil { scope.err(err, w, req) return } result, err := getter(ctx, name, req, trace) if err != nil { scope.err(err, w, req) return } trace.Step("About to write a response") transformResponseObject(ctx, scope, trace, req, w, http.StatusOK, outputMediaType, result) trace.Step("Transformed response object") } }
[ "func", "getResourceHandler", "(", "scope", "*", "RequestScope", ",", "getter", "getterFunc", ")", "http", ".", "HandlerFunc", "{", "return", "func", "(", "w", "http", ".", "ResponseWriter", ",", "req", "*", "http", ".", "Request", ")", "{", "trace", ":=",...
// getResourceHandler is an HTTP handler function for get requests. It delegates to the // passed-in getterFunc to perform the actual get.
[ "getResourceHandler", "is", "an", "HTTP", "handler", "function", "for", "get", "requests", ".", "It", "delegates", "to", "the", "passed", "-", "in", "getterFunc", "to", "perform", "the", "actual", "get", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/apiserver/pkg/endpoints/handlers/get.go#L49-L78
train
getResourceHandler returns a handlerFunc that returns a response object for a resource.
[ 30522, 4569, 2278, 2131, 6072, 8162, 3401, 11774, 3917, 1006, 9531, 1008, 11186, 16186, 1010, 2131, 3334, 2131, 3334, 11263, 12273, 1007, 8299, 1012, 28213, 11263, 12273, 1063, 2709, 4569, 2278, 1006, 1059, 8299, 1012, 3433, 15994, 1010, 21...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/cli-runtime/pkg/kustomize/k8sdeps/validator/validators.go
MakeAnnotationValidator
func (v *KustValidator) MakeAnnotationValidator() func(map[string]string) error { return func(x map[string]string) error { errs := apivalidation.ValidateAnnotations(x, field.NewPath("field")) if len(errs) > 0 { return errors.New(errs.ToAggregate().Error()) } return nil } }
go
func (v *KustValidator) MakeAnnotationValidator() func(map[string]string) error { return func(x map[string]string) error { errs := apivalidation.ValidateAnnotations(x, field.NewPath("field")) if len(errs) > 0 { return errors.New(errs.ToAggregate().Error()) } return nil } }
[ "func", "(", "v", "*", "KustValidator", ")", "MakeAnnotationValidator", "(", ")", "func", "(", "map", "[", "string", "]", "string", ")", "error", "{", "return", "func", "(", "x", "map", "[", "string", "]", "string", ")", "error", "{", "errs", ":=", "...
// MakeAnnotationValidator returns a MapValidatorFunc using apimachinery.
[ "MakeAnnotationValidator", "returns", "a", "MapValidatorFunc", "using", "apimachinery", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/cli-runtime/pkg/kustomize/k8sdeps/validator/validators.go#L37-L45
train
MakeAnnotationValidator returns a function that will validate the annotation of a field.
[ 30522, 4569, 2278, 1006, 1058, 1008, 13970, 3367, 10175, 8524, 4263, 1007, 2191, 11639, 17287, 3508, 10175, 8524, 4263, 1006, 1007, 30524, 1010, 2492, 1012, 2047, 15069, 1006, 1000, 2492, 1000, 1007, 1007, 2065, 18798, 1006, 9413, 2869, 100...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/apis/core/v1/zz_generated.conversion.go
Convert_core_PersistentVolumeStatus_To_v1_PersistentVolumeStatus
func Convert_core_PersistentVolumeStatus_To_v1_PersistentVolumeStatus(in *core.PersistentVolumeStatus, out *v1.PersistentVolumeStatus, s conversion.Scope) error { return autoConvert_core_PersistentVolumeStatus_To_v1_PersistentVolumeStatus(in, out, s) }
go
func Convert_core_PersistentVolumeStatus_To_v1_PersistentVolumeStatus(in *core.PersistentVolumeStatus, out *v1.PersistentVolumeStatus, s conversion.Scope) error { return autoConvert_core_PersistentVolumeStatus_To_v1_PersistentVolumeStatus(in, out, s) }
[ "func", "Convert_core_PersistentVolumeStatus_To_v1_PersistentVolumeStatus", "(", "in", "*", "core", ".", "PersistentVolumeStatus", ",", "out", "*", "v1", ".", "PersistentVolumeStatus", ",", "s", "conversion", ".", "Scope", ")", "error", "{", "return", "autoConvert_core_...
// Convert_core_PersistentVolumeStatus_To_v1_PersistentVolumeStatus is an autogenerated conversion function.
[ "Convert_core_PersistentVolumeStatus_To_v1_PersistentVolumeStatus", "is", "an", "autogenerated", "conversion", "function", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/apis/core/v1/zz_generated.conversion.go#L5106-L5108
train
Convert_core_PersistentVolumeStatus_To_v1_PersistentVolumeStatus is an autogenerated conversion function.
[ 30522, 4569, 2278, 10463, 1035, 4563, 1035, 14516, 6767, 12942, 4355, 15590, 1035, 2000, 1035, 1058, 2487, 1035, 14516, 6767, 12942, 4355, 15590, 1006, 1999, 1008, 4563, 1012, 14516, 6767, 12942, 4355, 15590, 1010, 2041, 1008, 1058, 2487, 1...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/kubectl/cmd/auth/cani.go
RunAccessCheck
func (o *CanIOptions) RunAccessCheck() (bool, error) { var sar *authorizationv1.SelfSubjectAccessReview if o.NonResourceURL == "" { sar = &authorizationv1.SelfSubjectAccessReview{ Spec: authorizationv1.SelfSubjectAccessReviewSpec{ ResourceAttributes: &authorizationv1.ResourceAttributes{ Namespace: o.Namespace, Verb: o.Verb, Group: o.Resource.Group, Resource: o.Resource.Resource, Subresource: o.Subresource, Name: o.ResourceName, }, }, } } else { sar = &authorizationv1.SelfSubjectAccessReview{ Spec: authorizationv1.SelfSubjectAccessReviewSpec{ NonResourceAttributes: &authorizationv1.NonResourceAttributes{ Verb: o.Verb, Path: o.NonResourceURL, }, }, } } response, err := o.AuthClient.SelfSubjectAccessReviews().Create(sar) if err != nil { return false, err } if response.Status.Allowed { fmt.Fprintln(o.Out, "yes") } else { fmt.Fprint(o.Out, "no") if len(response.Status.Reason) > 0 { fmt.Fprintf(o.Out, " - %v", response.Status.Reason) } if len(response.Status.EvaluationError) > 0 { fmt.Fprintf(o.Out, " - %v", response.Status.EvaluationError) } fmt.Fprintln(o.Out) } return response.Status.Allowed, nil }
go
func (o *CanIOptions) RunAccessCheck() (bool, error) { var sar *authorizationv1.SelfSubjectAccessReview if o.NonResourceURL == "" { sar = &authorizationv1.SelfSubjectAccessReview{ Spec: authorizationv1.SelfSubjectAccessReviewSpec{ ResourceAttributes: &authorizationv1.ResourceAttributes{ Namespace: o.Namespace, Verb: o.Verb, Group: o.Resource.Group, Resource: o.Resource.Resource, Subresource: o.Subresource, Name: o.ResourceName, }, }, } } else { sar = &authorizationv1.SelfSubjectAccessReview{ Spec: authorizationv1.SelfSubjectAccessReviewSpec{ NonResourceAttributes: &authorizationv1.NonResourceAttributes{ Verb: o.Verb, Path: o.NonResourceURL, }, }, } } response, err := o.AuthClient.SelfSubjectAccessReviews().Create(sar) if err != nil { return false, err } if response.Status.Allowed { fmt.Fprintln(o.Out, "yes") } else { fmt.Fprint(o.Out, "no") if len(response.Status.Reason) > 0 { fmt.Fprintf(o.Out, " - %v", response.Status.Reason) } if len(response.Status.EvaluationError) > 0 { fmt.Fprintf(o.Out, " - %v", response.Status.EvaluationError) } fmt.Fprintln(o.Out) } return response.Status.Allowed, nil }
[ "func", "(", "o", "*", "CanIOptions", ")", "RunAccessCheck", "(", ")", "(", "bool", ",", "error", ")", "{", "var", "sar", "*", "authorizationv1", ".", "SelfSubjectAccessReview", "\n", "if", "o", ".", "NonResourceURL", "==", "\"", "\"", "{", "sar", "=", ...
// RunAccessCheck checks if user has access to a certain resource or non resource URL
[ "RunAccessCheck", "checks", "if", "user", "has", "access", "to", "a", "certain", "resource", "or", "non", "resource", "URL" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/kubectl/cmd/auth/cani.go#L234-L279
train
RunAccessCheck runs the access check
[ 30522, 4569, 2278, 1006, 1051, 1008, 2064, 3695, 16790, 2015, 1007, 2448, 6305, 9623, 22842, 3600, 1006, 1007, 1006, 22017, 2140, 1010, 7561, 1007, 1063, 13075, 18906, 1008, 20104, 2615, 2487, 1012, 2969, 6342, 2497, 20614, 6305, 9623, 2133...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/apis/policy/zz_generated.deepcopy.go
DeepCopy
func (in *PodDisruptionBudgetSpec) DeepCopy() *PodDisruptionBudgetSpec { if in == nil { return nil } out := new(PodDisruptionBudgetSpec) in.DeepCopyInto(out) return out }
go
func (in *PodDisruptionBudgetSpec) DeepCopy() *PodDisruptionBudgetSpec { if in == nil { return nil } out := new(PodDisruptionBudgetSpec) in.DeepCopyInto(out) return out }
[ "func", "(", "in", "*", "PodDisruptionBudgetSpec", ")", "DeepCopy", "(", ")", "*", "PodDisruptionBudgetSpec", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "PodDisruptionBudgetSpec", ")", "\n", "in", ".", "...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new PodDisruptionBudgetSpec.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "PodDisruptionBudgetSpec", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/apis/policy/zz_generated.deepcopy.go#L245-L252
train
DeepCopy is an autogenerated deepcopy function copying the receiver creating a new PodDisruptionBudgetSpec.
[ 30522, 4569, 2278, 1006, 1999, 1008, 17491, 10521, 21531, 3508, 8569, 28682, 5051, 2278, 1007, 2784, 3597, 7685, 1006, 1007, 1008, 17491, 10521, 21531, 3508, 8569, 28682, 5051, 2278, 1063, 2065, 1999, 1027, 1027, 9152, 2140, 1063, 2709, 915...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/cloudprovider/providers/photon/photon.go
CreateDisk
func (pc *PCCloud) CreateDisk(volumeOptions *VolumeOptions) (pdID string, err error) { photonClient, err := getPhotonClient(pc) if err != nil { klog.Errorf("Photon Cloud Provider: Failed to get photon client for CreateDisk, error: [%v]", err) return "", err } diskSpec := photon.DiskCreateSpec{} diskSpec.Name = volumeOptions.Name diskSpec.Flavor = volumeOptions.Flavor diskSpec.CapacityGB = volumeOptions.CapacityGB diskSpec.Kind = DiskSpecKind task, err := photonClient.Projects.CreateDisk(pc.projID, &diskSpec) if err != nil { klog.Errorf("Photon Cloud Provider: Failed to CreateDisk. Error[%v]", err) return "", err } waitTask, err := photonClient.Tasks.Wait(task.ID) if err != nil { klog.Errorf("Photon Cloud Provider: Failed to wait for task to CreateDisk. Error[%v]", err) return "", err } return waitTask.Entity.ID, nil }
go
func (pc *PCCloud) CreateDisk(volumeOptions *VolumeOptions) (pdID string, err error) { photonClient, err := getPhotonClient(pc) if err != nil { klog.Errorf("Photon Cloud Provider: Failed to get photon client for CreateDisk, error: [%v]", err) return "", err } diskSpec := photon.DiskCreateSpec{} diskSpec.Name = volumeOptions.Name diskSpec.Flavor = volumeOptions.Flavor diskSpec.CapacityGB = volumeOptions.CapacityGB diskSpec.Kind = DiskSpecKind task, err := photonClient.Projects.CreateDisk(pc.projID, &diskSpec) if err != nil { klog.Errorf("Photon Cloud Provider: Failed to CreateDisk. Error[%v]", err) return "", err } waitTask, err := photonClient.Tasks.Wait(task.ID) if err != nil { klog.Errorf("Photon Cloud Provider: Failed to wait for task to CreateDisk. Error[%v]", err) return "", err } return waitTask.Entity.ID, nil }
[ "func", "(", "pc", "*", "PCCloud", ")", "CreateDisk", "(", "volumeOptions", "*", "VolumeOptions", ")", "(", "pdID", "string", ",", "err", "error", ")", "{", "photonClient", ",", "err", ":=", "getPhotonClient", "(", "pc", ")", "\n", "if", "err", "!=", "...
// Create a volume of given size (in GB).
[ "Create", "a", "volume", "of", "given", "size", "(", "in", "GB", ")", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/cloudprovider/providers/photon/photon.go#L685-L711
train
CreateDisk creates a new disk
[ 30522, 4569, 2278, 1006, 7473, 1008, 7473, 20464, 19224, 1007, 2580, 20573, 1006, 3872, 7361, 9285, 1008, 3872, 7361, 9285, 1007, 1006, 22851, 3593, 5164, 1010, 9413, 2099, 7561, 1007, 1063, 26383, 20464, 11638, 1010, 9413, 2099, 1024, 1027...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/apiserver/plugin/pkg/authenticator/token/oidc/oidc.go
newClaimResolver
func newClaimResolver(claim string, client *http.Client, config *oidc.Config) *claimResolver { return &claimResolver{claim: claim, client: client, config: config, verifierPerIssuer: map[string]*asyncIDTokenVerifier{}} }
go
func newClaimResolver(claim string, client *http.Client, config *oidc.Config) *claimResolver { return &claimResolver{claim: claim, client: client, config: config, verifierPerIssuer: map[string]*asyncIDTokenVerifier{}} }
[ "func", "newClaimResolver", "(", "claim", "string", ",", "client", "*", "http", ".", "Client", ",", "config", "*", "oidc", ".", "Config", ")", "*", "claimResolver", "{", "return", "&", "claimResolver", "{", "claim", ":", "claim", ",", "client", ":", "cli...
// newClaimResolver creates a new resolver for distributed claims.
[ "newClaimResolver", "creates", "a", "new", "resolver", "for", "distributed", "claims", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/apiserver/plugin/pkg/authenticator/token/oidc/oidc.go#L414-L416
train
newClaimResolver returns a new claimResolver.
[ 30522, 4569, 2278, 2047, 25154, 6072, 4747, 6299, 1006, 4366, 5164, 1010, 7396, 1008, 8299, 1012, 7396, 1010, 9530, 8873, 2290, 1008, 1051, 3593, 2278, 1012, 9530, 8873, 2290, 1007, 1008, 4366, 6072, 4747, 6299, 1063, 2709, 1004, 4366, 60...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/volume/util/util.go
AccessModesContains
func AccessModesContains(modes []v1.PersistentVolumeAccessMode, mode v1.PersistentVolumeAccessMode) bool { for _, m := range modes { if m == mode { return true } } return false }
go
func AccessModesContains(modes []v1.PersistentVolumeAccessMode, mode v1.PersistentVolumeAccessMode) bool { for _, m := range modes { if m == mode { return true } } return false }
[ "func", "AccessModesContains", "(", "modes", "[", "]", "v1", ".", "PersistentVolumeAccessMode", ",", "mode", "v1", ".", "PersistentVolumeAccessMode", ")", "bool", "{", "for", "_", ",", "m", ":=", "range", "modes", "{", "if", "m", "==", "mode", "{", "return...
// AccessModesContains returns whether the requested mode is contained by modes
[ "AccessModesContains", "returns", "whether", "the", "requested", "mode", "is", "contained", "by", "modes" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/volume/util/util.go#L294-L301
train
AccessModesContains returns true if the given modes contains the given mode.
[ 30522, 4569, 2278, 3229, 5302, 6155, 8663, 18249, 2015, 1006, 11583, 1031, 1033, 1058, 2487, 1012, 14516, 6767, 12942, 5243, 9468, 7971, 5302, 3207, 1010, 5549, 1058, 2487, 1012, 14516, 6767, 12942, 5243, 9468, 7971, 5302, 3207, 1007, 22017...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/apiserver/pkg/admission/plugin/webhook/config/apis/webhookadmission/v1alpha1/zz_generated.conversion.go
RegisterConversions
func RegisterConversions(s *runtime.Scheme) error { if err := s.AddGeneratedConversionFunc((*WebhookAdmission)(nil), (*webhookadmission.WebhookAdmission)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_WebhookAdmission_To_webhookadmission_WebhookAdmission(a.(*WebhookAdmission), b.(*webhookadmission.WebhookAdmission), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*webhookadmission.WebhookAdmission)(nil), (*WebhookAdmission)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_webhookadmission_WebhookAdmission_To_v1alpha1_WebhookAdmission(a.(*webhookadmission.WebhookAdmission), b.(*WebhookAdmission), scope) }); err != nil { return err } return nil }
go
func RegisterConversions(s *runtime.Scheme) error { if err := s.AddGeneratedConversionFunc((*WebhookAdmission)(nil), (*webhookadmission.WebhookAdmission)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_WebhookAdmission_To_webhookadmission_WebhookAdmission(a.(*WebhookAdmission), b.(*webhookadmission.WebhookAdmission), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*webhookadmission.WebhookAdmission)(nil), (*WebhookAdmission)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_webhookadmission_WebhookAdmission_To_v1alpha1_WebhookAdmission(a.(*webhookadmission.WebhookAdmission), b.(*WebhookAdmission), scope) }); err != nil { return err } return nil }
[ "func", "RegisterConversions", "(", "s", "*", "runtime", ".", "Scheme", ")", "error", "{", "if", "err", ":=", "s", ".", "AddGeneratedConversionFunc", "(", "(", "*", "WebhookAdmission", ")", "(", "nil", ")", ",", "(", "*", "webhookadmission", ".", "WebhookA...
// RegisterConversions adds conversion functions to the given scheme. // Public to allow building arbitrary schemes.
[ "RegisterConversions", "adds", "conversion", "functions", "to", "the", "given", "scheme", ".", "Public", "to", "allow", "building", "arbitrary", "schemes", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/apiserver/pkg/admission/plugin/webhook/config/apis/webhookadmission/v1alpha1/zz_generated.conversion.go#L35-L47
train
RegisterConversions registers the conversion functions for webhook admission.
[ 30522, 4569, 2278, 4236, 8663, 27774, 2015, 1006, 1055, 1008, 2448, 7292, 1012, 5679, 1007, 7561, 1063, 2065, 9413, 2099, 1024, 1027, 1055, 1012, 5587, 6914, 16848, 8663, 27774, 11263, 12273, 1006, 1006, 1008, 4773, 6806, 12352, 22117, 1464...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/cloudprovider/providers/openstack/openstack_loadbalancer.go
EnsureSecurityGroupDeleted
func (lbaas *LbaasV2) EnsureSecurityGroupDeleted(clusterName string, service *v1.Service) error { // Generate Name lbSecGroupName := getSecurityGroupName(service) lbSecGroupID, err := groups.IDFromName(lbaas.network, lbSecGroupName) if err != nil { if isSecurityGroupNotFound(err) { // It is OK when the security group has been deleted by others. return nil } return fmt.Errorf("Error occurred finding security group: %s: %v", lbSecGroupName, err) } lbSecGroup := groups.Delete(lbaas.network, lbSecGroupID) if lbSecGroup.Err != nil && !isNotFound(lbSecGroup.Err) { return lbSecGroup.Err } if len(lbaas.opts.NodeSecurityGroupIDs) == 0 { // Just happen when nodes have not Security Group, or should not happen // UpdateLoadBalancer and EnsureLoadBalancer can set lbaas.opts.NodeSecurityGroupIDs when it is empty // And service controller call UpdateLoadBalancer to set lbaas.opts.NodeSecurityGroupIDs when controller manager service is restarted. klog.Warningf("Can not find node-security-group from all the nodes of this cluster when delete loadbalancer service %s/%s", service.Namespace, service.Name) } else { // Delete the rules in the Node Security Group for _, nodeSecurityGroupID := range lbaas.opts.NodeSecurityGroupIDs { opts := rules.ListOpts{ SecGroupID: nodeSecurityGroupID, RemoteGroupID: lbSecGroupID, } secGroupRules, err := getSecurityGroupRules(lbaas.network, opts) if err != nil && !isNotFound(err) { msg := fmt.Sprintf("Error finding rules for remote group id %s in security group id %s: %v", lbSecGroupID, nodeSecurityGroupID, err) return fmt.Errorf(msg) } for _, rule := range secGroupRules { res := rules.Delete(lbaas.network, rule.ID) if res.Err != nil && !isNotFound(res.Err) { return fmt.Errorf("Error occurred deleting security group rule: %s: %v", rule.ID, res.Err) } } } } return nil }
go
func (lbaas *LbaasV2) EnsureSecurityGroupDeleted(clusterName string, service *v1.Service) error { // Generate Name lbSecGroupName := getSecurityGroupName(service) lbSecGroupID, err := groups.IDFromName(lbaas.network, lbSecGroupName) if err != nil { if isSecurityGroupNotFound(err) { // It is OK when the security group has been deleted by others. return nil } return fmt.Errorf("Error occurred finding security group: %s: %v", lbSecGroupName, err) } lbSecGroup := groups.Delete(lbaas.network, lbSecGroupID) if lbSecGroup.Err != nil && !isNotFound(lbSecGroup.Err) { return lbSecGroup.Err } if len(lbaas.opts.NodeSecurityGroupIDs) == 0 { // Just happen when nodes have not Security Group, or should not happen // UpdateLoadBalancer and EnsureLoadBalancer can set lbaas.opts.NodeSecurityGroupIDs when it is empty // And service controller call UpdateLoadBalancer to set lbaas.opts.NodeSecurityGroupIDs when controller manager service is restarted. klog.Warningf("Can not find node-security-group from all the nodes of this cluster when delete loadbalancer service %s/%s", service.Namespace, service.Name) } else { // Delete the rules in the Node Security Group for _, nodeSecurityGroupID := range lbaas.opts.NodeSecurityGroupIDs { opts := rules.ListOpts{ SecGroupID: nodeSecurityGroupID, RemoteGroupID: lbSecGroupID, } secGroupRules, err := getSecurityGroupRules(lbaas.network, opts) if err != nil && !isNotFound(err) { msg := fmt.Sprintf("Error finding rules for remote group id %s in security group id %s: %v", lbSecGroupID, nodeSecurityGroupID, err) return fmt.Errorf(msg) } for _, rule := range secGroupRules { res := rules.Delete(lbaas.network, rule.ID) if res.Err != nil && !isNotFound(res.Err) { return fmt.Errorf("Error occurred deleting security group rule: %s: %v", rule.ID, res.Err) } } } } return nil }
[ "func", "(", "lbaas", "*", "LbaasV2", ")", "EnsureSecurityGroupDeleted", "(", "clusterName", "string", ",", "service", "*", "v1", ".", "Service", ")", "error", "{", "// Generate Name", "lbSecGroupName", ":=", "getSecurityGroupName", "(", "service", ")", "\n", "l...
// EnsureSecurityGroupDeleted deleting security group for specific loadbalancer service.
[ "EnsureSecurityGroupDeleted", "deleting", "security", "group", "for", "specific", "loadbalancer", "service", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/cloudprovider/providers/openstack/openstack_loadbalancer.go#L1532-L1579
train
EnsureSecurityGroupDeleted deletes the security group
[ 30522, 4569, 2278, 1006, 6053, 11057, 2015, 1008, 6053, 11057, 2015, 2615, 2475, 1007, 21312, 8586, 25137, 17058, 9247, 12870, 2094, 1006, 9324, 18442, 5164, 1010, 2326, 1008, 1058, 2487, 1012, 2326, 1007, 7561, 1063, 1013, 1013, 9699, 2171...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset/clientset.go
NewForConfigOrDie
func NewForConfigOrDie(c *rest.Config) *Clientset { var cs Clientset cs.apiextensionsV1beta1 = apiextensionsv1beta1.NewForConfigOrDie(c) cs.DiscoveryClient = discovery.NewDiscoveryClientForConfigOrDie(c) return &cs }
go
func NewForConfigOrDie(c *rest.Config) *Clientset { var cs Clientset cs.apiextensionsV1beta1 = apiextensionsv1beta1.NewForConfigOrDie(c) cs.DiscoveryClient = discovery.NewDiscoveryClientForConfigOrDie(c) return &cs }
[ "func", "NewForConfigOrDie", "(", "c", "*", "rest", ".", "Config", ")", "*", "Clientset", "{", "var", "cs", "Clientset", "\n", "cs", ".", "apiextensionsV1beta1", "=", "apiextensionsv1beta1", ".", "NewForConfigOrDie", "(", "c", ")", "\n\n", "cs", ".", "Discov...
// NewForConfigOrDie creates a new Clientset for the given config and // panics if there is an error in the config.
[ "NewForConfigOrDie", "creates", "a", "new", "Clientset", "for", "the", "given", "config", "and", "panics", "if", "there", "is", "an", "error", "in", "the", "config", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/apiextensions-apiserver/pkg/client/clientset/clientset/clientset.go#L75-L81
train
NewForConfigOrDie returns a new Clientset for the given config and panics if the config is malformed.
[ 30522, 4569, 2278, 2047, 29278, 8663, 8873, 20255, 10265, 1006, 1039, 1008, 2717, 1012, 9530, 8873, 2290, 1007, 1008, 7846, 3388, 1063, 13075, 20116, 7846, 3388, 20116, 1012, 17928, 10288, 29048, 2015, 2615, 2487, 20915, 27717, 1027, 17928, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/util/normalizer/normalizer.go
Examples
func Examples(s string) string { if len(s) == 0 { return s } return normalizer{s}.Trim().Indent().string }
go
func Examples(s string) string { if len(s) == 0 { return s } return normalizer{s}.Trim().Indent().string }
[ "func", "Examples", "(", "s", "string", ")", "string", "{", "if", "len", "(", "s", ")", "==", "0", "{", "return", "s", "\n", "}", "\n", "return", "normalizer", "{", "s", "}", ".", "Trim", "(", ")", ".", "Indent", "(", ")", ".", "string", "\n", ...
// Examples normalizes a command's examples to follow the conventions.
[ "Examples", "normalizes", "a", "command", "s", "examples", "to", "follow", "the", "conventions", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/util/normalizer/normalizer.go#L43-L48
train
Examples returns a string containing the examples of the given string.
[ 30522, 4569, 2278, 4973, 1006, 1055, 5164, 1007, 5164, 1063, 2065, 18798, 1006, 1055, 1007, 1027, 1027, 1014, 1063, 2709, 1055, 1065, 2709, 3671, 17629, 1063, 1055, 1065, 1012, 12241, 1006, 1007, 1012, 27427, 4765, 1006, 1007, 1012, 5164, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/kubelet/kubelet.go
syncLoopIteration
func (kl *Kubelet) syncLoopIteration(configCh <-chan kubetypes.PodUpdate, handler SyncHandler, syncCh <-chan time.Time, housekeepingCh <-chan time.Time, plegCh <-chan *pleg.PodLifecycleEvent) bool { select { case u, open := <-configCh: // Update from a config source; dispatch it to the right handler // callback. if !open { klog.Errorf("Update channel is closed. Exiting the sync loop.") return false } switch u.Op { case kubetypes.ADD: klog.V(2).Infof("SyncLoop (ADD, %q): %q", u.Source, format.Pods(u.Pods)) // After restarting, kubelet will get all existing pods through // ADD as if they are new pods. These pods will then go through the // admission process and *may* be rejected. This can be resolved // once we have checkpointing. handler.HandlePodAdditions(u.Pods) case kubetypes.UPDATE: klog.V(2).Infof("SyncLoop (UPDATE, %q): %q", u.Source, format.PodsWithDeletionTimestamps(u.Pods)) handler.HandlePodUpdates(u.Pods) case kubetypes.REMOVE: klog.V(2).Infof("SyncLoop (REMOVE, %q): %q", u.Source, format.Pods(u.Pods)) handler.HandlePodRemoves(u.Pods) case kubetypes.RECONCILE: klog.V(4).Infof("SyncLoop (RECONCILE, %q): %q", u.Source, format.Pods(u.Pods)) handler.HandlePodReconcile(u.Pods) case kubetypes.DELETE: klog.V(2).Infof("SyncLoop (DELETE, %q): %q", u.Source, format.Pods(u.Pods)) // DELETE is treated as a UPDATE because of graceful deletion. handler.HandlePodUpdates(u.Pods) case kubetypes.RESTORE: klog.V(2).Infof("SyncLoop (RESTORE, %q): %q", u.Source, format.Pods(u.Pods)) // These are pods restored from the checkpoint. Treat them as new // pods. handler.HandlePodAdditions(u.Pods) case kubetypes.SET: // TODO: Do we want to support this? klog.Errorf("Kubelet does not support snapshot update") } if u.Op != kubetypes.RESTORE { // If the update type is RESTORE, it means that the update is from // the pod checkpoints and may be incomplete. Do not mark the // source as ready. // Mark the source ready after receiving at least one update from the // source. Once all the sources are marked ready, various cleanup // routines will start reclaiming resources. It is important that this // takes place only after kubelet calls the update handler to process // the update to ensure the internal pod cache is up-to-date. kl.sourcesReady.AddSource(u.Source) } case e := <-plegCh: if isSyncPodWorthy(e) { // PLEG event for a pod; sync it. if pod, ok := kl.podManager.GetPodByUID(e.ID); ok { klog.V(2).Infof("SyncLoop (PLEG): %q, event: %#v", format.Pod(pod), e) handler.HandlePodSyncs([]*v1.Pod{pod}) } else { // If the pod no longer exists, ignore the event. klog.V(4).Infof("SyncLoop (PLEG): ignore irrelevant event: %#v", e) } } if e.Type == pleg.ContainerDied { if containerID, ok := e.Data.(string); ok { kl.cleanUpContainersInPod(e.ID, containerID) } } case <-syncCh: // Sync pods waiting for sync podsToSync := kl.getPodsToSync() if len(podsToSync) == 0 { break } klog.V(4).Infof("SyncLoop (SYNC): %d pods; %s", len(podsToSync), format.Pods(podsToSync)) handler.HandlePodSyncs(podsToSync) case update := <-kl.livenessManager.Updates(): if update.Result == proberesults.Failure { // The liveness manager detected a failure; sync the pod. // We should not use the pod from livenessManager, because it is never updated after // initialization. pod, ok := kl.podManager.GetPodByUID(update.PodUID) if !ok { // If the pod no longer exists, ignore the update. klog.V(4).Infof("SyncLoop (container unhealthy): ignore irrelevant update: %#v", update) break } klog.V(1).Infof("SyncLoop (container unhealthy): %q", format.Pod(pod)) handler.HandlePodSyncs([]*v1.Pod{pod}) } case <-housekeepingCh: if !kl.sourcesReady.AllReady() { // If the sources aren't ready or volume manager has not yet synced the states, // skip housekeeping, as we may accidentally delete pods from unready sources. klog.V(4).Infof("SyncLoop (housekeeping, skipped): sources aren't ready yet.") } else { klog.V(4).Infof("SyncLoop (housekeeping)") if err := handler.HandlePodCleanups(); err != nil { klog.Errorf("Failed cleaning pods: %v", err) } } } return true }
go
func (kl *Kubelet) syncLoopIteration(configCh <-chan kubetypes.PodUpdate, handler SyncHandler, syncCh <-chan time.Time, housekeepingCh <-chan time.Time, plegCh <-chan *pleg.PodLifecycleEvent) bool { select { case u, open := <-configCh: // Update from a config source; dispatch it to the right handler // callback. if !open { klog.Errorf("Update channel is closed. Exiting the sync loop.") return false } switch u.Op { case kubetypes.ADD: klog.V(2).Infof("SyncLoop (ADD, %q): %q", u.Source, format.Pods(u.Pods)) // After restarting, kubelet will get all existing pods through // ADD as if they are new pods. These pods will then go through the // admission process and *may* be rejected. This can be resolved // once we have checkpointing. handler.HandlePodAdditions(u.Pods) case kubetypes.UPDATE: klog.V(2).Infof("SyncLoop (UPDATE, %q): %q", u.Source, format.PodsWithDeletionTimestamps(u.Pods)) handler.HandlePodUpdates(u.Pods) case kubetypes.REMOVE: klog.V(2).Infof("SyncLoop (REMOVE, %q): %q", u.Source, format.Pods(u.Pods)) handler.HandlePodRemoves(u.Pods) case kubetypes.RECONCILE: klog.V(4).Infof("SyncLoop (RECONCILE, %q): %q", u.Source, format.Pods(u.Pods)) handler.HandlePodReconcile(u.Pods) case kubetypes.DELETE: klog.V(2).Infof("SyncLoop (DELETE, %q): %q", u.Source, format.Pods(u.Pods)) // DELETE is treated as a UPDATE because of graceful deletion. handler.HandlePodUpdates(u.Pods) case kubetypes.RESTORE: klog.V(2).Infof("SyncLoop (RESTORE, %q): %q", u.Source, format.Pods(u.Pods)) // These are pods restored from the checkpoint. Treat them as new // pods. handler.HandlePodAdditions(u.Pods) case kubetypes.SET: // TODO: Do we want to support this? klog.Errorf("Kubelet does not support snapshot update") } if u.Op != kubetypes.RESTORE { // If the update type is RESTORE, it means that the update is from // the pod checkpoints and may be incomplete. Do not mark the // source as ready. // Mark the source ready after receiving at least one update from the // source. Once all the sources are marked ready, various cleanup // routines will start reclaiming resources. It is important that this // takes place only after kubelet calls the update handler to process // the update to ensure the internal pod cache is up-to-date. kl.sourcesReady.AddSource(u.Source) } case e := <-plegCh: if isSyncPodWorthy(e) { // PLEG event for a pod; sync it. if pod, ok := kl.podManager.GetPodByUID(e.ID); ok { klog.V(2).Infof("SyncLoop (PLEG): %q, event: %#v", format.Pod(pod), e) handler.HandlePodSyncs([]*v1.Pod{pod}) } else { // If the pod no longer exists, ignore the event. klog.V(4).Infof("SyncLoop (PLEG): ignore irrelevant event: %#v", e) } } if e.Type == pleg.ContainerDied { if containerID, ok := e.Data.(string); ok { kl.cleanUpContainersInPod(e.ID, containerID) } } case <-syncCh: // Sync pods waiting for sync podsToSync := kl.getPodsToSync() if len(podsToSync) == 0 { break } klog.V(4).Infof("SyncLoop (SYNC): %d pods; %s", len(podsToSync), format.Pods(podsToSync)) handler.HandlePodSyncs(podsToSync) case update := <-kl.livenessManager.Updates(): if update.Result == proberesults.Failure { // The liveness manager detected a failure; sync the pod. // We should not use the pod from livenessManager, because it is never updated after // initialization. pod, ok := kl.podManager.GetPodByUID(update.PodUID) if !ok { // If the pod no longer exists, ignore the update. klog.V(4).Infof("SyncLoop (container unhealthy): ignore irrelevant update: %#v", update) break } klog.V(1).Infof("SyncLoop (container unhealthy): %q", format.Pod(pod)) handler.HandlePodSyncs([]*v1.Pod{pod}) } case <-housekeepingCh: if !kl.sourcesReady.AllReady() { // If the sources aren't ready or volume manager has not yet synced the states, // skip housekeeping, as we may accidentally delete pods from unready sources. klog.V(4).Infof("SyncLoop (housekeeping, skipped): sources aren't ready yet.") } else { klog.V(4).Infof("SyncLoop (housekeeping)") if err := handler.HandlePodCleanups(); err != nil { klog.Errorf("Failed cleaning pods: %v", err) } } } return true }
[ "func", "(", "kl", "*", "Kubelet", ")", "syncLoopIteration", "(", "configCh", "<-", "chan", "kubetypes", ".", "PodUpdate", ",", "handler", "SyncHandler", ",", "syncCh", "<-", "chan", "time", ".", "Time", ",", "housekeepingCh", "<-", "chan", "time", ".", "T...
// syncLoopIteration reads from various channels and dispatches pods to the // given handler. // // Arguments: // 1. configCh: a channel to read config events from // 2. handler: the SyncHandler to dispatch pods to // 3. syncCh: a channel to read periodic sync events from // 4. houseKeepingCh: a channel to read housekeeping events from // 5. plegCh: a channel to read PLEG updates from // // Events are also read from the kubelet liveness manager's update channel. // // The workflow is to read from one of the channels, handle that event, and // update the timestamp in the sync loop monitor. // // Here is an appropriate place to note that despite the syntactical // similarity to the switch statement, the case statements in a select are // evaluated in a pseudorandom order if there are multiple channels ready to // read from when the select is evaluated. In other words, case statements // are evaluated in random order, and you can not assume that the case // statements evaluate in order if multiple channels have events. // // With that in mind, in truly no particular order, the different channels // are handled as follows: // // * configCh: dispatch the pods for the config change to the appropriate // handler callback for the event type // * plegCh: update the runtime cache; sync pod // * syncCh: sync all pods waiting for sync // * houseKeepingCh: trigger cleanup of pods // * liveness manager: sync pods that have failed or in which one or more // containers have failed liveness checks
[ "syncLoopIteration", "reads", "from", "various", "channels", "and", "dispatches", "pods", "to", "the", "given", "handler", ".", "Arguments", ":", "1", ".", "configCh", ":", "a", "channel", "to", "read", "config", "events", "from", "2", ".", "handler", ":", ...
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/kubelet/kubelet.go#L1869-L1976
train
syncLoopIteration is a helper function to run a sync loop iteration.
[ 30522, 4569, 2278, 1006, 1047, 2140, 1008, 13970, 8671, 3388, 1007, 26351, 4135, 7361, 21646, 3370, 1006, 9530, 8873, 18195, 2232, 1026, 1011, 9212, 13970, 20915, 18863, 2015, 1012, 17491, 6279, 13701, 1010, 28213, 26351, 11774, 3917, 1010, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/apis/core/v1/zz_generated.conversion.go
Convert_v1_ScaleIOVolumeSource_To_core_ScaleIOVolumeSource
func Convert_v1_ScaleIOVolumeSource_To_core_ScaleIOVolumeSource(in *v1.ScaleIOVolumeSource, out *core.ScaleIOVolumeSource, s conversion.Scope) error { return autoConvert_v1_ScaleIOVolumeSource_To_core_ScaleIOVolumeSource(in, out, s) }
go
func Convert_v1_ScaleIOVolumeSource_To_core_ScaleIOVolumeSource(in *v1.ScaleIOVolumeSource, out *core.ScaleIOVolumeSource, s conversion.Scope) error { return autoConvert_v1_ScaleIOVolumeSource_To_core_ScaleIOVolumeSource(in, out, s) }
[ "func", "Convert_v1_ScaleIOVolumeSource_To_core_ScaleIOVolumeSource", "(", "in", "*", "v1", ".", "ScaleIOVolumeSource", ",", "out", "*", "core", ".", "ScaleIOVolumeSource", ",", "s", "conversion", ".", "Scope", ")", "error", "{", "return", "autoConvert_v1_ScaleIOVolumeS...
// Convert_v1_ScaleIOVolumeSource_To_core_ScaleIOVolumeSource is an autogenerated conversion function.
[ "Convert_v1_ScaleIOVolumeSource_To_core_ScaleIOVolumeSource", "is", "an", "autogenerated", "conversion", "function", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/apis/core/v1/zz_generated.conversion.go#L6490-L6492
train
Convert_v1_ScaleIOVolumeSource_To_core_ScaleIOVolumeSource is an autogenerated conversion function.
[ 30522, 4569, 2278, 10463, 1035, 1058, 2487, 1035, 4094, 3695, 6767, 12942, 2229, 8162, 3401, 1035, 2000, 1035, 4563, 1035, 4094, 3695, 6767, 12942, 2229, 8162, 3401, 1006, 1999, 1008, 1058, 2487, 1012, 4094, 3695, 6767, 12942, 2229, 8162, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/kubelet/remote/remote_runtime.go
UpdateContainerResources
func (r *RemoteRuntimeService) UpdateContainerResources(containerID string, resources *runtimeapi.LinuxContainerResources) error { ctx, cancel := getContextWithTimeout(r.timeout) defer cancel() _, err := r.runtimeClient.UpdateContainerResources(ctx, &runtimeapi.UpdateContainerResourcesRequest{ ContainerId: containerID, Linux: resources, }) if err != nil { klog.Errorf("UpdateContainerResources %q from runtime service failed: %v", containerID, err) return err } return nil }
go
func (r *RemoteRuntimeService) UpdateContainerResources(containerID string, resources *runtimeapi.LinuxContainerResources) error { ctx, cancel := getContextWithTimeout(r.timeout) defer cancel() _, err := r.runtimeClient.UpdateContainerResources(ctx, &runtimeapi.UpdateContainerResourcesRequest{ ContainerId: containerID, Linux: resources, }) if err != nil { klog.Errorf("UpdateContainerResources %q from runtime service failed: %v", containerID, err) return err } return nil }
[ "func", "(", "r", "*", "RemoteRuntimeService", ")", "UpdateContainerResources", "(", "containerID", "string", ",", "resources", "*", "runtimeapi", ".", "LinuxContainerResources", ")", "error", "{", "ctx", ",", "cancel", ":=", "getContextWithTimeout", "(", "r", "."...
// UpdateContainerResources updates a containers resource config
[ "UpdateContainerResources", "updates", "a", "containers", "resource", "config" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/kubelet/remote/remote_runtime.go#L312-L326
train
UpdateContainerResources updates the container resources
[ 30522, 4569, 2278, 1006, 1054, 1008, 6556, 15532, 7292, 8043, 7903, 2063, 1007, 10651, 8663, 18249, 28849, 6499, 3126, 9623, 1006, 11661, 3593, 5164, 1010, 4219, 1008, 2448, 7292, 9331, 2072, 1012, 11603, 8663, 18249, 28849, 6499, 3126, 962...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/sample-apiserver/pkg/apis/wardle/v1alpha1/zz_generated.conversion.go
RegisterConversions
func RegisterConversions(s *runtime.Scheme) error { if err := s.AddGeneratedConversionFunc((*Fischer)(nil), (*wardle.Fischer)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_Fischer_To_wardle_Fischer(a.(*Fischer), b.(*wardle.Fischer), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*wardle.Fischer)(nil), (*Fischer)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_wardle_Fischer_To_v1alpha1_Fischer(a.(*wardle.Fischer), b.(*Fischer), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*FischerList)(nil), (*wardle.FischerList)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_FischerList_To_wardle_FischerList(a.(*FischerList), b.(*wardle.FischerList), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*wardle.FischerList)(nil), (*FischerList)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_wardle_FischerList_To_v1alpha1_FischerList(a.(*wardle.FischerList), b.(*FischerList), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*Flunder)(nil), (*wardle.Flunder)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_Flunder_To_wardle_Flunder(a.(*Flunder), b.(*wardle.Flunder), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*wardle.Flunder)(nil), (*Flunder)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_wardle_Flunder_To_v1alpha1_Flunder(a.(*wardle.Flunder), b.(*Flunder), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*FlunderList)(nil), (*wardle.FlunderList)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_FlunderList_To_wardle_FlunderList(a.(*FlunderList), b.(*wardle.FlunderList), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*wardle.FlunderList)(nil), (*FlunderList)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_wardle_FlunderList_To_v1alpha1_FlunderList(a.(*wardle.FlunderList), b.(*FlunderList), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*FlunderSpec)(nil), (*wardle.FlunderSpec)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_FlunderSpec_To_wardle_FlunderSpec(a.(*FlunderSpec), b.(*wardle.FlunderSpec), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*wardle.FlunderSpec)(nil), (*FlunderSpec)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_wardle_FlunderSpec_To_v1alpha1_FlunderSpec(a.(*wardle.FlunderSpec), b.(*FlunderSpec), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*FlunderStatus)(nil), (*wardle.FlunderStatus)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_FlunderStatus_To_wardle_FlunderStatus(a.(*FlunderStatus), b.(*wardle.FlunderStatus), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*wardle.FlunderStatus)(nil), (*FlunderStatus)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_wardle_FlunderStatus_To_v1alpha1_FlunderStatus(a.(*wardle.FlunderStatus), b.(*FlunderStatus), scope) }); err != nil { return err } if err := s.AddConversionFunc((*FlunderSpec)(nil), (*wardle.FlunderSpec)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_FlunderSpec_To_wardle_FlunderSpec(a.(*FlunderSpec), b.(*wardle.FlunderSpec), scope) }); err != nil { return err } if err := s.AddConversionFunc((*wardle.FlunderSpec)(nil), (*FlunderSpec)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_wardle_FlunderSpec_To_v1alpha1_FlunderSpec(a.(*wardle.FlunderSpec), b.(*FlunderSpec), scope) }); err != nil { return err } return nil }
go
func RegisterConversions(s *runtime.Scheme) error { if err := s.AddGeneratedConversionFunc((*Fischer)(nil), (*wardle.Fischer)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_Fischer_To_wardle_Fischer(a.(*Fischer), b.(*wardle.Fischer), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*wardle.Fischer)(nil), (*Fischer)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_wardle_Fischer_To_v1alpha1_Fischer(a.(*wardle.Fischer), b.(*Fischer), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*FischerList)(nil), (*wardle.FischerList)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_FischerList_To_wardle_FischerList(a.(*FischerList), b.(*wardle.FischerList), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*wardle.FischerList)(nil), (*FischerList)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_wardle_FischerList_To_v1alpha1_FischerList(a.(*wardle.FischerList), b.(*FischerList), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*Flunder)(nil), (*wardle.Flunder)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_Flunder_To_wardle_Flunder(a.(*Flunder), b.(*wardle.Flunder), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*wardle.Flunder)(nil), (*Flunder)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_wardle_Flunder_To_v1alpha1_Flunder(a.(*wardle.Flunder), b.(*Flunder), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*FlunderList)(nil), (*wardle.FlunderList)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_FlunderList_To_wardle_FlunderList(a.(*FlunderList), b.(*wardle.FlunderList), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*wardle.FlunderList)(nil), (*FlunderList)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_wardle_FlunderList_To_v1alpha1_FlunderList(a.(*wardle.FlunderList), b.(*FlunderList), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*FlunderSpec)(nil), (*wardle.FlunderSpec)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_FlunderSpec_To_wardle_FlunderSpec(a.(*FlunderSpec), b.(*wardle.FlunderSpec), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*wardle.FlunderSpec)(nil), (*FlunderSpec)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_wardle_FlunderSpec_To_v1alpha1_FlunderSpec(a.(*wardle.FlunderSpec), b.(*FlunderSpec), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*FlunderStatus)(nil), (*wardle.FlunderStatus)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_FlunderStatus_To_wardle_FlunderStatus(a.(*FlunderStatus), b.(*wardle.FlunderStatus), scope) }); err != nil { return err } if err := s.AddGeneratedConversionFunc((*wardle.FlunderStatus)(nil), (*FlunderStatus)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_wardle_FlunderStatus_To_v1alpha1_FlunderStatus(a.(*wardle.FlunderStatus), b.(*FlunderStatus), scope) }); err != nil { return err } if err := s.AddConversionFunc((*FlunderSpec)(nil), (*wardle.FlunderSpec)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_v1alpha1_FlunderSpec_To_wardle_FlunderSpec(a.(*FlunderSpec), b.(*wardle.FlunderSpec), scope) }); err != nil { return err } if err := s.AddConversionFunc((*wardle.FlunderSpec)(nil), (*FlunderSpec)(nil), func(a, b interface{}, scope conversion.Scope) error { return Convert_wardle_FlunderSpec_To_v1alpha1_FlunderSpec(a.(*wardle.FlunderSpec), b.(*FlunderSpec), scope) }); err != nil { return err } return nil }
[ "func", "RegisterConversions", "(", "s", "*", "runtime", ".", "Scheme", ")", "error", "{", "if", "err", ":=", "s", ".", "AddGeneratedConversionFunc", "(", "(", "*", "Fischer", ")", "(", "nil", ")", ",", "(", "*", "wardle", ".", "Fischer", ")", "(", "...
// RegisterConversions adds conversion functions to the given scheme. // Public to allow building arbitrary schemes.
[ "RegisterConversions", "adds", "conversion", "functions", "to", "the", "given", "scheme", ".", "Public", "to", "allow", "building", "arbitrary", "schemes", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/sample-apiserver/pkg/apis/wardle/v1alpha1/zz_generated.conversion.go#L37-L109
train
RegisterConversions registers the conversion functions for the scheme.
[ 30522, 4569, 2278, 4236, 8663, 27774, 2015, 1006, 1055, 1008, 2448, 7292, 1012, 5679, 1007, 7561, 1063, 2065, 9413, 2099, 1024, 1027, 1055, 1012, 5587, 6914, 16848, 8663, 27774, 11263, 12273, 1006, 1006, 1008, 13042, 1007, 1006, 9152, 2140,...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/kubectl/cmd/get/get.go
NewGetOptions
func NewGetOptions(parent string, streams genericclioptions.IOStreams) *GetOptions { return &GetOptions{ PrintFlags: NewGetPrintFlags(), CmdParent: parent, IOStreams: streams, ChunkSize: 500, ServerPrint: true, } }
go
func NewGetOptions(parent string, streams genericclioptions.IOStreams) *GetOptions { return &GetOptions{ PrintFlags: NewGetPrintFlags(), CmdParent: parent, IOStreams: streams, ChunkSize: 500, ServerPrint: true, } }
[ "func", "NewGetOptions", "(", "parent", "string", ",", "streams", "genericclioptions", ".", "IOStreams", ")", "*", "GetOptions", "{", "return", "&", "GetOptions", "{", "PrintFlags", ":", "NewGetPrintFlags", "(", ")", ",", "CmdParent", ":", "parent", ",", "IOSt...
// NewGetOptions returns a GetOptions with default chunk size 500.
[ "NewGetOptions", "returns", "a", "GetOptions", "with", "default", "chunk", "size", "500", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/kubectl/cmd/get/get.go#L141-L150
train
NewGetOptions returns a new GetOptions instance
[ 30522, 4569, 2278, 2047, 18150, 7361, 9285, 1006, 6687, 5164, 1010, 9199, 12391, 20464, 3695, 16790, 2015, 1012, 16380, 25379, 2015, 1007, 1008, 2131, 7361, 9285, 1063, 2709, 1004, 2131, 7361, 9285, 1063, 6140, 10258, 26454, 1024, 2047, 181...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/apiextensions-apiserver/pkg/apiserver/apiserver.go
New
func (c completedConfig) New(delegationTarget genericapiserver.DelegationTarget) (*CustomResourceDefinitions, error) { genericServer, err := c.GenericConfig.New("apiextensions-apiserver", delegationTarget) if err != nil { return nil, err } s := &CustomResourceDefinitions{ GenericAPIServer: genericServer, } apiResourceConfig := c.GenericConfig.MergedResourceConfig apiGroupInfo := genericapiserver.NewDefaultAPIGroupInfo(apiextensions.GroupName, Scheme, metav1.ParameterCodec, Codecs) if apiResourceConfig.VersionEnabled(v1beta1.SchemeGroupVersion) { storage := map[string]rest.Storage{} // customresourcedefinitions customResourceDefintionStorage := customresourcedefinition.NewREST(Scheme, c.GenericConfig.RESTOptionsGetter) storage["customresourcedefinitions"] = customResourceDefintionStorage storage["customresourcedefinitions/status"] = customresourcedefinition.NewStatusREST(Scheme, customResourceDefintionStorage) apiGroupInfo.VersionedResourcesStorageMap["v1beta1"] = storage } if err := s.GenericAPIServer.InstallAPIGroup(&apiGroupInfo); err != nil { return nil, err } crdClient, err := internalclientset.NewForConfig(s.GenericAPIServer.LoopbackClientConfig) if err != nil { // it's really bad that this is leaking here, but until we can fix the test (which I'm pretty sure isn't even testing what it wants to test), // we need to be able to move forward return nil, fmt.Errorf("failed to create clientset: %v", err) } s.Informers = internalinformers.NewSharedInformerFactory(crdClient, 5*time.Minute) delegateHandler := delegationTarget.UnprotectedHandler() if delegateHandler == nil { delegateHandler = http.NotFoundHandler() } versionDiscoveryHandler := &versionDiscoveryHandler{ discovery: map[schema.GroupVersion]*discovery.APIVersionHandler{}, delegate: delegateHandler, } groupDiscoveryHandler := &groupDiscoveryHandler{ discovery: map[string]*discovery.APIGroupHandler{}, delegate: delegateHandler, } establishingController := establish.NewEstablishingController(s.Informers.Apiextensions().InternalVersion().CustomResourceDefinitions(), crdClient.Apiextensions()) crdHandler, err := NewCustomResourceDefinitionHandler( versionDiscoveryHandler, groupDiscoveryHandler, s.Informers.Apiextensions().InternalVersion().CustomResourceDefinitions(), delegateHandler, c.ExtraConfig.CRDRESTOptionsGetter, c.GenericConfig.AdmissionControl, establishingController, c.ExtraConfig.ServiceResolver, c.ExtraConfig.AuthResolverWrapper, c.ExtraConfig.MasterCount, s.GenericAPIServer.Authorizer, ) if err != nil { return nil, err } s.GenericAPIServer.Handler.NonGoRestfulMux.Handle("/apis", crdHandler) s.GenericAPIServer.Handler.NonGoRestfulMux.HandlePrefix("/apis/", crdHandler) crdController := NewDiscoveryController(s.Informers.Apiextensions().InternalVersion().CustomResourceDefinitions(), versionDiscoveryHandler, groupDiscoveryHandler) namingController := status.NewNamingConditionController(s.Informers.Apiextensions().InternalVersion().CustomResourceDefinitions(), crdClient.Apiextensions()) finalizingController := finalizer.NewCRDFinalizer( s.Informers.Apiextensions().InternalVersion().CustomResourceDefinitions(), crdClient.Apiextensions(), crdHandler, ) var openapiController *openapicontroller.Controller if utilfeature.DefaultFeatureGate.Enabled(apiextensionsfeatures.CustomResourcePublishOpenAPI) { openapiController = openapicontroller.NewController(s.Informers.Apiextensions().InternalVersion().CustomResourceDefinitions()) } s.GenericAPIServer.AddPostStartHookOrDie("start-apiextensions-informers", func(context genericapiserver.PostStartHookContext) error { s.Informers.Start(context.StopCh) return nil }) s.GenericAPIServer.AddPostStartHookOrDie("start-apiextensions-controllers", func(context genericapiserver.PostStartHookContext) error { if utilfeature.DefaultFeatureGate.Enabled(apiextensionsfeatures.CustomResourcePublishOpenAPI) { go openapiController.Run(s.GenericAPIServer.StaticOpenAPISpec, s.GenericAPIServer.OpenAPIVersionedService, context.StopCh) } go crdController.Run(context.StopCh) go namingController.Run(context.StopCh) go establishingController.Run(context.StopCh) go finalizingController.Run(5, context.StopCh) return nil }) // we don't want to report healthy until we can handle all CRDs that have already been registered. Waiting for the informer // to sync makes sure that the lister will be valid before we begin. There may still be races for CRDs added after startup, // but we won't go healthy until we can handle the ones already present. s.GenericAPIServer.AddPostStartHookOrDie("crd-informer-synced", func(context genericapiserver.PostStartHookContext) error { return wait.PollImmediateUntil(100*time.Millisecond, func() (bool, error) { return s.Informers.Apiextensions().InternalVersion().CustomResourceDefinitions().Informer().HasSynced(), nil }, context.StopCh) }) return s, nil }
go
func (c completedConfig) New(delegationTarget genericapiserver.DelegationTarget) (*CustomResourceDefinitions, error) { genericServer, err := c.GenericConfig.New("apiextensions-apiserver", delegationTarget) if err != nil { return nil, err } s := &CustomResourceDefinitions{ GenericAPIServer: genericServer, } apiResourceConfig := c.GenericConfig.MergedResourceConfig apiGroupInfo := genericapiserver.NewDefaultAPIGroupInfo(apiextensions.GroupName, Scheme, metav1.ParameterCodec, Codecs) if apiResourceConfig.VersionEnabled(v1beta1.SchemeGroupVersion) { storage := map[string]rest.Storage{} // customresourcedefinitions customResourceDefintionStorage := customresourcedefinition.NewREST(Scheme, c.GenericConfig.RESTOptionsGetter) storage["customresourcedefinitions"] = customResourceDefintionStorage storage["customresourcedefinitions/status"] = customresourcedefinition.NewStatusREST(Scheme, customResourceDefintionStorage) apiGroupInfo.VersionedResourcesStorageMap["v1beta1"] = storage } if err := s.GenericAPIServer.InstallAPIGroup(&apiGroupInfo); err != nil { return nil, err } crdClient, err := internalclientset.NewForConfig(s.GenericAPIServer.LoopbackClientConfig) if err != nil { // it's really bad that this is leaking here, but until we can fix the test (which I'm pretty sure isn't even testing what it wants to test), // we need to be able to move forward return nil, fmt.Errorf("failed to create clientset: %v", err) } s.Informers = internalinformers.NewSharedInformerFactory(crdClient, 5*time.Minute) delegateHandler := delegationTarget.UnprotectedHandler() if delegateHandler == nil { delegateHandler = http.NotFoundHandler() } versionDiscoveryHandler := &versionDiscoveryHandler{ discovery: map[schema.GroupVersion]*discovery.APIVersionHandler{}, delegate: delegateHandler, } groupDiscoveryHandler := &groupDiscoveryHandler{ discovery: map[string]*discovery.APIGroupHandler{}, delegate: delegateHandler, } establishingController := establish.NewEstablishingController(s.Informers.Apiextensions().InternalVersion().CustomResourceDefinitions(), crdClient.Apiextensions()) crdHandler, err := NewCustomResourceDefinitionHandler( versionDiscoveryHandler, groupDiscoveryHandler, s.Informers.Apiextensions().InternalVersion().CustomResourceDefinitions(), delegateHandler, c.ExtraConfig.CRDRESTOptionsGetter, c.GenericConfig.AdmissionControl, establishingController, c.ExtraConfig.ServiceResolver, c.ExtraConfig.AuthResolverWrapper, c.ExtraConfig.MasterCount, s.GenericAPIServer.Authorizer, ) if err != nil { return nil, err } s.GenericAPIServer.Handler.NonGoRestfulMux.Handle("/apis", crdHandler) s.GenericAPIServer.Handler.NonGoRestfulMux.HandlePrefix("/apis/", crdHandler) crdController := NewDiscoveryController(s.Informers.Apiextensions().InternalVersion().CustomResourceDefinitions(), versionDiscoveryHandler, groupDiscoveryHandler) namingController := status.NewNamingConditionController(s.Informers.Apiextensions().InternalVersion().CustomResourceDefinitions(), crdClient.Apiextensions()) finalizingController := finalizer.NewCRDFinalizer( s.Informers.Apiextensions().InternalVersion().CustomResourceDefinitions(), crdClient.Apiextensions(), crdHandler, ) var openapiController *openapicontroller.Controller if utilfeature.DefaultFeatureGate.Enabled(apiextensionsfeatures.CustomResourcePublishOpenAPI) { openapiController = openapicontroller.NewController(s.Informers.Apiextensions().InternalVersion().CustomResourceDefinitions()) } s.GenericAPIServer.AddPostStartHookOrDie("start-apiextensions-informers", func(context genericapiserver.PostStartHookContext) error { s.Informers.Start(context.StopCh) return nil }) s.GenericAPIServer.AddPostStartHookOrDie("start-apiextensions-controllers", func(context genericapiserver.PostStartHookContext) error { if utilfeature.DefaultFeatureGate.Enabled(apiextensionsfeatures.CustomResourcePublishOpenAPI) { go openapiController.Run(s.GenericAPIServer.StaticOpenAPISpec, s.GenericAPIServer.OpenAPIVersionedService, context.StopCh) } go crdController.Run(context.StopCh) go namingController.Run(context.StopCh) go establishingController.Run(context.StopCh) go finalizingController.Run(5, context.StopCh) return nil }) // we don't want to report healthy until we can handle all CRDs that have already been registered. Waiting for the informer // to sync makes sure that the lister will be valid before we begin. There may still be races for CRDs added after startup, // but we won't go healthy until we can handle the ones already present. s.GenericAPIServer.AddPostStartHookOrDie("crd-informer-synced", func(context genericapiserver.PostStartHookContext) error { return wait.PollImmediateUntil(100*time.Millisecond, func() (bool, error) { return s.Informers.Apiextensions().InternalVersion().CustomResourceDefinitions().Informer().HasSynced(), nil }, context.StopCh) }) return s, nil }
[ "func", "(", "c", "completedConfig", ")", "New", "(", "delegationTarget", "genericapiserver", ".", "DelegationTarget", ")", "(", "*", "CustomResourceDefinitions", ",", "error", ")", "{", "genericServer", ",", "err", ":=", "c", ".", "GenericConfig", ".", "New", ...
// New returns a new instance of CustomResourceDefinitions from the given config.
[ "New", "returns", "a", "new", "instance", "of", "CustomResourceDefinitions", "from", "the", "given", "config", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/apiextensions-apiserver/pkg/apiserver/apiserver.go#L130-L234
train
New returns a new CustomResourceDefinitions object
[ 30522, 4569, 2278, 1006, 1039, 2949, 8663, 8873, 2290, 1007, 2047, 1006, 10656, 7559, 18150, 12391, 9331, 17288, 6299, 1012, 10656, 7559, 18150, 1007, 1006, 1008, 7661, 6072, 8162, 22119, 16294, 22753, 2015, 1010, 7561, 1007, 1063, 12391, 8...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/apimachinery/pkg/api/errors/errors.go
AsObject
func (r *ErrorReporter) AsObject(err error) runtime.Object { status := NewGenericServerResponse(r.code, r.verb, schema.GroupResource{}, "", err.Error(), 0, true) if status.ErrStatus.Details == nil { status.ErrStatus.Details = &metav1.StatusDetails{} } reason := r.reason if len(reason) == 0 { reason = "ClientError" } status.ErrStatus.Details.Causes = append(status.ErrStatus.Details.Causes, metav1.StatusCause{ Type: metav1.CauseType(reason), Message: err.Error(), }) return &status.ErrStatus }
go
func (r *ErrorReporter) AsObject(err error) runtime.Object { status := NewGenericServerResponse(r.code, r.verb, schema.GroupResource{}, "", err.Error(), 0, true) if status.ErrStatus.Details == nil { status.ErrStatus.Details = &metav1.StatusDetails{} } reason := r.reason if len(reason) == 0 { reason = "ClientError" } status.ErrStatus.Details.Causes = append(status.ErrStatus.Details.Causes, metav1.StatusCause{ Type: metav1.CauseType(reason), Message: err.Error(), }) return &status.ErrStatus }
[ "func", "(", "r", "*", "ErrorReporter", ")", "AsObject", "(", "err", "error", ")", "runtime", ".", "Object", "{", "status", ":=", "NewGenericServerResponse", "(", "r", ".", "code", ",", "r", ".", "verb", ",", "schema", ".", "GroupResource", "{", "}", "...
// AsObject returns a valid error runtime.Object (a v1.Status) for the given // error, using the code and verb of the reporter type. The error is set to // indicate that this was an unexpected server response.
[ "AsObject", "returns", "a", "valid", "error", "runtime", ".", "Object", "(", "a", "v1", ".", "Status", ")", "for", "the", "given", "error", "using", "the", "code", "and", "verb", "of", "the", "reporter", "type", ".", "The", "error", "is", "set", "to", ...
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/apimachinery/pkg/api/errors/errors.go#L648-L662
train
ToObject returns a new object that can be used to report the error
[ 30522, 4569, 2278, 1006, 1054, 1008, 7561, 2890, 6442, 2121, 1007, 2004, 16429, 30524, 2099, 1012, 7561, 1006, 1007, 1010, 1014, 1010, 2995, 1007, 2065, 3570, 1012, 9413, 12096, 15590, 1012, 4751, 1027, 1027, 9152, 2140, 1063, 3570, 1012, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/zz_generated.deepcopy.go
DeepCopy
func (in *CustomResourceValidation) DeepCopy() *CustomResourceValidation { if in == nil { return nil } out := new(CustomResourceValidation) in.DeepCopyInto(out) return out }
go
func (in *CustomResourceValidation) DeepCopy() *CustomResourceValidation { if in == nil { return nil } out := new(CustomResourceValidation) in.DeepCopyInto(out) return out }
[ "func", "(", "in", "*", "CustomResourceValidation", ")", "DeepCopy", "(", ")", "*", "CustomResourceValidation", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "CustomResourceValidation", ")", "\n", "in", ".", ...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new CustomResourceValidation.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "CustomResourceValidation", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/apiextensions-apiserver/pkg/apis/apiextensions/zz_generated.deepcopy.go#L351-L358
train
DeepCopy is an autogenerated deepcopy function copying the receiver creating a new CustomResourceValidation.
[ 30522, 4569, 2278, 1006, 1999, 1008, 7661, 6072, 8162, 3401, 10175, 8524, 3508, 1007, 2784, 3597, 7685, 1006, 1007, 1008, 7661, 6072, 8162, 3401, 10175, 8524, 3508, 1063, 2065, 1999, 1027, 1027, 9152, 2140, 1063, 2709, 9152, 2140, 1065, 2...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/controller/daemon/util/daemonset_util.go
IsPodUpdated
func IsPodUpdated(pod *v1.Pod, hash string, dsTemplateGeneration *int64) bool { // Compare with hash to see if the pod is updated, need to maintain backward compatibility of templateGeneration templateMatches := dsTemplateGeneration != nil && pod.Labels[extensions.DaemonSetTemplateGenerationKey] == fmt.Sprint(dsTemplateGeneration) hashMatches := len(hash) > 0 && pod.Labels[extensions.DefaultDaemonSetUniqueLabelKey] == hash return hashMatches || templateMatches }
go
func IsPodUpdated(pod *v1.Pod, hash string, dsTemplateGeneration *int64) bool { // Compare with hash to see if the pod is updated, need to maintain backward compatibility of templateGeneration templateMatches := dsTemplateGeneration != nil && pod.Labels[extensions.DaemonSetTemplateGenerationKey] == fmt.Sprint(dsTemplateGeneration) hashMatches := len(hash) > 0 && pod.Labels[extensions.DefaultDaemonSetUniqueLabelKey] == hash return hashMatches || templateMatches }
[ "func", "IsPodUpdated", "(", "pod", "*", "v1", ".", "Pod", ",", "hash", "string", ",", "dsTemplateGeneration", "*", "int64", ")", "bool", "{", "// Compare with hash to see if the pod is updated, need to maintain backward compatibility of templateGeneration", "templateMatches", ...
// IsPodUpdated checks if pod contains label value that either matches templateGeneration or hash
[ "IsPodUpdated", "checks", "if", "pod", "contains", "label", "value", "that", "either", "matches", "templateGeneration", "or", "hash" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/controller/daemon/util/daemonset_util.go#L127-L133
train
IsPodUpdated returns true if the pod is updated.
[ 30522, 4569, 2278, 2003, 27633, 6279, 13701, 2094, 1006, 17491, 1008, 1058, 2487, 1012, 17491, 1010, 23325, 5164, 1010, 16233, 18532, 15725, 6914, 16754, 1008, 20014, 21084, 1007, 22017, 2140, 1063, 1013, 1013, 12826, 2007, 23325, 2000, 2156,...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/scheduler/internal/cache/debugger/comparer.go
ComparePods
func (c *CacheComparer) ComparePods(pods, waitingPods []*v1.Pod, nodeinfos map[string]*schedulernodeinfo.NodeInfo) (missed, redundant []string) { actual := []string{} for _, pod := range pods { actual = append(actual, string(pod.UID)) } cached := []string{} for _, nodeinfo := range nodeinfos { for _, pod := range nodeinfo.Pods() { cached = append(cached, string(pod.UID)) } } for _, pod := range waitingPods { cached = append(cached, string(pod.UID)) } return compareStrings(actual, cached) }
go
func (c *CacheComparer) ComparePods(pods, waitingPods []*v1.Pod, nodeinfos map[string]*schedulernodeinfo.NodeInfo) (missed, redundant []string) { actual := []string{} for _, pod := range pods { actual = append(actual, string(pod.UID)) } cached := []string{} for _, nodeinfo := range nodeinfos { for _, pod := range nodeinfo.Pods() { cached = append(cached, string(pod.UID)) } } for _, pod := range waitingPods { cached = append(cached, string(pod.UID)) } return compareStrings(actual, cached) }
[ "func", "(", "c", "*", "CacheComparer", ")", "ComparePods", "(", "pods", ",", "waitingPods", "[", "]", "*", "v1", ".", "Pod", ",", "nodeinfos", "map", "[", "string", "]", "*", "schedulernodeinfo", ".", "NodeInfo", ")", "(", "missed", ",", "redundant", ...
// ComparePods compares actual pods with cached pods.
[ "ComparePods", "compares", "actual", "pods", "with", "cached", "pods", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/scheduler/internal/cache/debugger/comparer.go#L86-L103
train
ComparePods compares the pods and waitingPods to see if they are in the cache.
[ 30522, 4569, 2278, 1006, 1039, 1008, 17053, 9006, 19362, 2121, 1007, 12826, 22925, 1006, 26723, 1010, 3403, 22925, 1031, 1033, 1008, 1058, 2487, 1012, 17491, 1010, 13045, 2378, 14876, 2015, 4949, 1031, 5164, 1033, 1008, 6134, 19139, 3207, 2...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
cmd/kubeadm/app/cmd/config.go
AddImagesCommonConfigFlags
func AddImagesCommonConfigFlags(flagSet *flag.FlagSet, cfg *kubeadmapiv1beta2.InitConfiguration, cfgPath *string, featureGatesString *string) { options.AddKubernetesVersionFlag(flagSet, &cfg.ClusterConfiguration.KubernetesVersion) options.AddFeatureGatesStringFlag(flagSet, featureGatesString) options.AddImageMetaFlags(flagSet, &cfg.ImageRepository) flagSet.StringVar(cfgPath, "config", *cfgPath, "Path to kubeadm config file.") }
go
func AddImagesCommonConfigFlags(flagSet *flag.FlagSet, cfg *kubeadmapiv1beta2.InitConfiguration, cfgPath *string, featureGatesString *string) { options.AddKubernetesVersionFlag(flagSet, &cfg.ClusterConfiguration.KubernetesVersion) options.AddFeatureGatesStringFlag(flagSet, featureGatesString) options.AddImageMetaFlags(flagSet, &cfg.ImageRepository) flagSet.StringVar(cfgPath, "config", *cfgPath, "Path to kubeadm config file.") }
[ "func", "AddImagesCommonConfigFlags", "(", "flagSet", "*", "flag", ".", "FlagSet", ",", "cfg", "*", "kubeadmapiv1beta2", ".", "InitConfiguration", ",", "cfgPath", "*", "string", ",", "featureGatesString", "*", "string", ")", "{", "options", ".", "AddKubernetesVers...
// AddImagesCommonConfigFlags adds the flags that configure kubeadm (and affect the images kubeadm will use)
[ "AddImagesCommonConfigFlags", "adds", "the", "flags", "that", "configure", "kubeadm", "(", "and", "affect", "the", "images", "kubeadm", "will", "use", ")" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/cmd/kubeadm/app/cmd/config.go#L516-L521
train
AddImagesCommonConfigFlags adds common flags to the given flagset
[ 30522, 4569, 2278, 5587, 9581, 8449, 9006, 8202, 8663, 8873, 25708, 17802, 2015, 1006, 9245, 3388, 1008, 5210, 1012, 9245, 3388, 1010, 12935, 2290, 1008, 13970, 4783, 4215, 2863, 8197, 2615, 2487, 20915, 2050, 2475, 1012, 1999, 4183, 8663, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/master/reconcilers/lease.go
NewLeaseEndpointReconciler
func NewLeaseEndpointReconciler(endpointClient corev1client.EndpointsGetter, masterLeases Leases) EndpointReconciler { return &leaseEndpointReconciler{ endpointClient: endpointClient, masterLeases: masterLeases, stopReconcilingCalled: false, } }
go
func NewLeaseEndpointReconciler(endpointClient corev1client.EndpointsGetter, masterLeases Leases) EndpointReconciler { return &leaseEndpointReconciler{ endpointClient: endpointClient, masterLeases: masterLeases, stopReconcilingCalled: false, } }
[ "func", "NewLeaseEndpointReconciler", "(", "endpointClient", "corev1client", ".", "EndpointsGetter", ",", "masterLeases", "Leases", ")", "EndpointReconciler", "{", "return", "&", "leaseEndpointReconciler", "{", "endpointClient", ":", "endpointClient", ",", "masterLeases", ...
// NewLeaseEndpointReconciler creates a new LeaseEndpoint reconciler
[ "NewLeaseEndpointReconciler", "creates", "a", "new", "LeaseEndpoint", "reconciler" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/master/reconcilers/lease.go#L129-L135
train
NewLeaseEndpointReconciler returns a new lease endpoint reconciler
[ 30522, 4569, 2278, 2047, 19738, 19763, 4859, 8400, 2890, 8663, 6895, 3917, 1006, 2203, 8400, 20464, 11638, 4563, 2615, 2487, 20464, 11638, 1012, 2203, 26521, 18150, 3334, 1010, 3040, 19738, 8583, 29597, 1007, 2203, 8400, 2890, 8663, 6895, 3...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/kube-aggregator/pkg/registry/apiservice/rest/storage_apiservice.go
NewRESTStorage
func NewRESTStorage(apiResourceConfigSource serverstorage.APIResourceConfigSource, restOptionsGetter generic.RESTOptionsGetter) genericapiserver.APIGroupInfo { apiGroupInfo := genericapiserver.NewDefaultAPIGroupInfo(apiregistration.GroupName, aggregatorscheme.Scheme, metav1.ParameterCodec, aggregatorscheme.Codecs) if apiResourceConfigSource.VersionEnabled(v1beta1.SchemeGroupVersion) { storage := map[string]rest.Storage{} apiServiceREST := apiservicestorage.NewREST(aggregatorscheme.Scheme, restOptionsGetter) storage["apiservices"] = apiServiceREST storage["apiservices/status"] = apiservicestorage.NewStatusREST(aggregatorscheme.Scheme, apiServiceREST) apiGroupInfo.VersionedResourcesStorageMap["v1beta1"] = storage } if apiResourceConfigSource.VersionEnabled(v1.SchemeGroupVersion) { storage := map[string]rest.Storage{} apiServiceREST := apiservicestorage.NewREST(aggregatorscheme.Scheme, restOptionsGetter) storage["apiservices"] = apiServiceREST storage["apiservices/status"] = apiservicestorage.NewStatusREST(aggregatorscheme.Scheme, apiServiceREST) apiGroupInfo.VersionedResourcesStorageMap["v1"] = storage } return apiGroupInfo }
go
func NewRESTStorage(apiResourceConfigSource serverstorage.APIResourceConfigSource, restOptionsGetter generic.RESTOptionsGetter) genericapiserver.APIGroupInfo { apiGroupInfo := genericapiserver.NewDefaultAPIGroupInfo(apiregistration.GroupName, aggregatorscheme.Scheme, metav1.ParameterCodec, aggregatorscheme.Codecs) if apiResourceConfigSource.VersionEnabled(v1beta1.SchemeGroupVersion) { storage := map[string]rest.Storage{} apiServiceREST := apiservicestorage.NewREST(aggregatorscheme.Scheme, restOptionsGetter) storage["apiservices"] = apiServiceREST storage["apiservices/status"] = apiservicestorage.NewStatusREST(aggregatorscheme.Scheme, apiServiceREST) apiGroupInfo.VersionedResourcesStorageMap["v1beta1"] = storage } if apiResourceConfigSource.VersionEnabled(v1.SchemeGroupVersion) { storage := map[string]rest.Storage{} apiServiceREST := apiservicestorage.NewREST(aggregatorscheme.Scheme, restOptionsGetter) storage["apiservices"] = apiServiceREST storage["apiservices/status"] = apiservicestorage.NewStatusREST(aggregatorscheme.Scheme, apiServiceREST) apiGroupInfo.VersionedResourcesStorageMap["v1"] = storage } return apiGroupInfo }
[ "func", "NewRESTStorage", "(", "apiResourceConfigSource", "serverstorage", ".", "APIResourceConfigSource", ",", "restOptionsGetter", "generic", ".", "RESTOptionsGetter", ")", "genericapiserver", ".", "APIGroupInfo", "{", "apiGroupInfo", ":=", "genericapiserver", ".", "NewDe...
// NewRESTStorage returns an APIGroupInfo object that will work against apiservice.
[ "NewRESTStorage", "returns", "an", "APIGroupInfo", "object", "that", "will", "work", "against", "apiservice", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/kube-aggregator/pkg/registry/apiservice/rest/storage_apiservice.go#L34-L54
train
NewRESTStorage creates a new RESTStorage object
[ 30522, 4569, 2278, 2047, 28533, 23809, 4270, 1006, 17928, 6072, 8162, 3401, 8663, 8873, 5620, 8162, 3401, 14903, 4263, 4270, 1012, 17928, 6072, 8162, 3401, 8663, 8873, 5620, 8162, 3401, 1010, 2717, 7361, 9285, 18150, 3334, 12391, 1012, 2717...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/scheduler/factory/plugins.go
RemoveFitPredicate
func RemoveFitPredicate(name string) { schedulerFactoryMutex.Lock() defer schedulerFactoryMutex.Unlock() validateAlgorithmNameOrDie(name) delete(fitPredicateMap, name) mandatoryFitPredicates.Delete(name) }
go
func RemoveFitPredicate(name string) { schedulerFactoryMutex.Lock() defer schedulerFactoryMutex.Unlock() validateAlgorithmNameOrDie(name) delete(fitPredicateMap, name) mandatoryFitPredicates.Delete(name) }
[ "func", "RemoveFitPredicate", "(", "name", "string", ")", "{", "schedulerFactoryMutex", ".", "Lock", "(", ")", "\n", "defer", "schedulerFactoryMutex", ".", "Unlock", "(", ")", "\n\n", "validateAlgorithmNameOrDie", "(", "name", ")", "\n", "delete", "(", "fitPredi...
// RemoveFitPredicate removes a fit predicate from factory.
[ "RemoveFitPredicate", "removes", "a", "fit", "predicate", "from", "factory", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/scheduler/factory/plugins.go#L111-L118
train
RemoveFitPredicate removes a fit predicate from the fitPredicateMap.
[ 30522, 4569, 2278, 6366, 8873, 25856, 5596, 24695, 1006, 2171, 5164, 1007, 1063, 6134, 12881, 18908, 10253, 26746, 2595, 1012, 5843, 1006, 1007, 13366, 2121, 6134, 12881, 18908, 10253, 26746, 2595, 1012, 19829, 1006, 1007, 9398, 3686, 2389, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/kubelet/config/v1beta1/zz_generated.deepcopy.go
DeepCopy
func (in *KubeletWebhookAuthorization) DeepCopy() *KubeletWebhookAuthorization { if in == nil { return nil } out := new(KubeletWebhookAuthorization) in.DeepCopyInto(out) return out }
go
func (in *KubeletWebhookAuthorization) DeepCopy() *KubeletWebhookAuthorization { if in == nil { return nil } out := new(KubeletWebhookAuthorization) in.DeepCopyInto(out) return out }
[ "func", "(", "in", "*", "KubeletWebhookAuthorization", ")", "DeepCopy", "(", ")", "*", "KubeletWebhookAuthorization", "{", "if", "in", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "out", ":=", "new", "(", "KubeletWebhookAuthorization", ")", "\n", "in"...
// DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new KubeletWebhookAuthorization.
[ "DeepCopy", "is", "an", "autogenerated", "deepcopy", "function", "copying", "the", "receiver", "creating", "a", "new", "KubeletWebhookAuthorization", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/kubelet/config/v1beta1/zz_generated.deepcopy.go#L335-L342
train
DeepCopy is an autogenerated deepcopy function copying the receiver creating a new KubeletWebhookAuthorization.
[ 30522, 4569, 2278, 1006, 1999, 1008, 30524, 8671, 3388, 8545, 23706, 14659, 4887, 27844, 3989, 1007, 1999, 1012, 2784, 3597, 7685, 18447, 2080, 1006, 2041, 1007, 2709, 2041, 1065, 102, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/client-go/kubernetes/typed/core/v1/fake/fake_event_expansion.go
Search
func (c *FakeEvents) Search(scheme *runtime.Scheme, objOrRef runtime.Object) (*v1.EventList, error) { action := core.NewRootListAction(eventsResource, eventsKind, metav1.ListOptions{}) if c.ns != "" { action = core.NewListAction(eventsResource, eventsKind, c.ns, metav1.ListOptions{}) } obj, err := c.Fake.Invokes(action, &v1.EventList{}) if obj == nil { return nil, err } return obj.(*v1.EventList), err }
go
func (c *FakeEvents) Search(scheme *runtime.Scheme, objOrRef runtime.Object) (*v1.EventList, error) { action := core.NewRootListAction(eventsResource, eventsKind, metav1.ListOptions{}) if c.ns != "" { action = core.NewListAction(eventsResource, eventsKind, c.ns, metav1.ListOptions{}) } obj, err := c.Fake.Invokes(action, &v1.EventList{}) if obj == nil { return nil, err } return obj.(*v1.EventList), err }
[ "func", "(", "c", "*", "FakeEvents", ")", "Search", "(", "scheme", "*", "runtime", ".", "Scheme", ",", "objOrRef", "runtime", ".", "Object", ")", "(", "*", "v1", ".", "EventList", ",", "error", ")", "{", "action", ":=", "core", ".", "NewRootListAction"...
// Search returns a list of events matching the specified object.
[ "Search", "returns", "a", "list", "of", "events", "matching", "the", "specified", "object", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/client-go/kubernetes/typed/core/v1/fake/fake_event_expansion.go#L73-L84
train
Search takes the scheme and object to look for events in the system. Returns an error if one occurs.
[ 30522, 4569, 2278, 1006, 1039, 1008, 8275, 18697, 7666, 1007, 3945, 1006, 5679, 1008, 2448, 7292, 1012, 5679, 1010, 27885, 5558, 14343, 2546, 2448, 7292, 1012, 4874, 1007, 1006, 1008, 1058, 2487, 1012, 2724, 9863, 1010, 7561, 1007, 1063, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/apis/core/validation/validation.go
ValidateNodeFieldSelectorRequirement
func ValidateNodeFieldSelectorRequirement(req core.NodeSelectorRequirement, fldPath *field.Path) field.ErrorList { allErrs := field.ErrorList{} switch req.Operator { case core.NodeSelectorOpIn, core.NodeSelectorOpNotIn: if len(req.Values) != 1 { allErrs = append(allErrs, field.Required(fldPath.Child("values"), "must be only one value when `operator` is 'In' or 'NotIn' for node field selector")) } default: allErrs = append(allErrs, field.Invalid(fldPath.Child("operator"), req.Operator, "not a valid selector operator")) } if vf, found := nodeFieldSelectorValidators[req.Key]; !found { allErrs = append(allErrs, field.Invalid(fldPath.Child("key"), req.Key, "not a valid field selector key")) } else { for i, v := range req.Values { for _, msg := range vf(v, false) { allErrs = append(allErrs, field.Invalid(fldPath.Child("values").Index(i), v, msg)) } } } return allErrs }
go
func ValidateNodeFieldSelectorRequirement(req core.NodeSelectorRequirement, fldPath *field.Path) field.ErrorList { allErrs := field.ErrorList{} switch req.Operator { case core.NodeSelectorOpIn, core.NodeSelectorOpNotIn: if len(req.Values) != 1 { allErrs = append(allErrs, field.Required(fldPath.Child("values"), "must be only one value when `operator` is 'In' or 'NotIn' for node field selector")) } default: allErrs = append(allErrs, field.Invalid(fldPath.Child("operator"), req.Operator, "not a valid selector operator")) } if vf, found := nodeFieldSelectorValidators[req.Key]; !found { allErrs = append(allErrs, field.Invalid(fldPath.Child("key"), req.Key, "not a valid field selector key")) } else { for i, v := range req.Values { for _, msg := range vf(v, false) { allErrs = append(allErrs, field.Invalid(fldPath.Child("values").Index(i), v, msg)) } } } return allErrs }
[ "func", "ValidateNodeFieldSelectorRequirement", "(", "req", "core", ".", "NodeSelectorRequirement", ",", "fldPath", "*", "field", ".", "Path", ")", "field", ".", "ErrorList", "{", "allErrs", ":=", "field", ".", "ErrorList", "{", "}", "\n\n", "switch", "req", "...
// ValidateNodeFieldSelectorRequirement tests that the specified NodeSelectorRequirement fields has valid data
[ "ValidateNodeFieldSelectorRequirement", "tests", "that", "the", "specified", "NodeSelectorRequirement", "fields", "has", "valid", "data" ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/apis/core/validation/validation.go#L3055-L3079
train
ValidateNodeFieldSelectorRequirement validates a NodeSelectorRequirement.
[ 30522, 4569, 2278, 9398, 3686, 3630, 3207, 15155, 12260, 16761, 2890, 15549, 28578, 4765, 1006, 2128, 4160, 4563, 1012, 14164, 12260, 16761, 2890, 15549, 28578, 4765, 1010, 13109, 18927, 8988, 1008, 2492, 1012, 4130, 1007, 2492, 1012, 7561, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/controller/garbagecollector/patch.go
unblockOwnerReferencesJSONMergePatch
func (gc *GarbageCollector) unblockOwnerReferencesJSONMergePatch(n *node) ([]byte, error) { accessor, err := gc.getMetadata(n.identity.APIVersion, n.identity.Kind, n.identity.Namespace, n.identity.Name) if err != nil { return nil, err } expectedObjectMeta := ObjectMetaForPatch{} expectedObjectMeta.ResourceVersion = accessor.GetResourceVersion() var expectedOwners []metav1.OwnerReference falseVar := false for _, owner := range n.owners { owner.BlockOwnerDeletion = &falseVar expectedOwners = append(expectedOwners, owner) } expectedObjectMeta.OwnerReferences = expectedOwners return json.Marshal(objectForPatch{expectedObjectMeta}) }
go
func (gc *GarbageCollector) unblockOwnerReferencesJSONMergePatch(n *node) ([]byte, error) { accessor, err := gc.getMetadata(n.identity.APIVersion, n.identity.Kind, n.identity.Namespace, n.identity.Name) if err != nil { return nil, err } expectedObjectMeta := ObjectMetaForPatch{} expectedObjectMeta.ResourceVersion = accessor.GetResourceVersion() var expectedOwners []metav1.OwnerReference falseVar := false for _, owner := range n.owners { owner.BlockOwnerDeletion = &falseVar expectedOwners = append(expectedOwners, owner) } expectedObjectMeta.OwnerReferences = expectedOwners return json.Marshal(objectForPatch{expectedObjectMeta}) }
[ "func", "(", "gc", "*", "GarbageCollector", ")", "unblockOwnerReferencesJSONMergePatch", "(", "n", "*", "node", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "accessor", ",", "err", ":=", "gc", ".", "getMetadata", "(", "n", ".", "identity", ".", ...
// Generate a JSON merge patch that unsets the BlockOwnerDeletion field of all // ownerReferences of node.
[ "Generate", "a", "JSON", "merge", "patch", "that", "unsets", "the", "BlockOwnerDeletion", "field", "of", "all", "ownerReferences", "of", "node", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/controller/garbagecollector/patch.go#L150-L165
train
unblockOwnerReferencesJSONMergePatch unblocks the OwnerReferences field of a node.
[ 30522, 4569, 2278, 1006, 1043, 2278, 1008, 13044, 26895, 22471, 2953, 1007, 4895, 23467, 12384, 28849, 25523, 2015, 22578, 2239, 5017, 3351, 4502, 10649, 1006, 1050, 1008, 13045, 1007, 1006, 1031, 1033, 24880, 1010, 7561, 1007, 1063, 3229, ...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
pkg/apis/scheduling/v1beta1/zz_generated.conversion.go
Convert_scheduling_PriorityClassList_To_v1beta1_PriorityClassList
func Convert_scheduling_PriorityClassList_To_v1beta1_PriorityClassList(in *scheduling.PriorityClassList, out *v1beta1.PriorityClassList, s conversion.Scope) error { return autoConvert_scheduling_PriorityClassList_To_v1beta1_PriorityClassList(in, out, s) }
go
func Convert_scheduling_PriorityClassList_To_v1beta1_PriorityClassList(in *scheduling.PriorityClassList, out *v1beta1.PriorityClassList, s conversion.Scope) error { return autoConvert_scheduling_PriorityClassList_To_v1beta1_PriorityClassList(in, out, s) }
[ "func", "Convert_scheduling_PriorityClassList_To_v1beta1_PriorityClassList", "(", "in", "*", "scheduling", ".", "PriorityClassList", ",", "out", "*", "v1beta1", ".", "PriorityClassList", ",", "s", "conversion", ".", "Scope", ")", "error", "{", "return", "autoConvert_sch...
// Convert_scheduling_PriorityClassList_To_v1beta1_PriorityClassList is an autogenerated conversion function.
[ "Convert_scheduling_PriorityClassList_To_v1beta1_PriorityClassList", "is", "an", "autogenerated", "conversion", "function", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/pkg/apis/scheduling/v1beta1/zz_generated.conversion.go#L106-L108
train
Convert_scheduling_PriorityClassList_To_v1beta1_PriorityClassList is an autogenerated conversion function.
[ 30522, 4569, 2278, 10463, 1035, 19940, 1035, 9470, 26266, 9863, 1035, 2000, 1035, 1058, 2487, 20915, 27717, 1035, 9470, 26266, 9863, 1006, 1999, 1008, 19940, 1012, 9470, 26266, 9863, 1010, 2041, 1008, 1058, 2487, 20915, 27717, 1012, 9470, 2...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...
kubernetes/kubernetes
staging/src/k8s.io/client-go/listers/core/v1/podtemplate.go
List
func (s podTemplateNamespaceLister) List(selector labels.Selector) (ret []*v1.PodTemplate, err error) { err = cache.ListAllByNamespace(s.indexer, s.namespace, selector, func(m interface{}) { ret = append(ret, m.(*v1.PodTemplate)) }) return ret, err }
go
func (s podTemplateNamespaceLister) List(selector labels.Selector) (ret []*v1.PodTemplate, err error) { err = cache.ListAllByNamespace(s.indexer, s.namespace, selector, func(m interface{}) { ret = append(ret, m.(*v1.PodTemplate)) }) return ret, err }
[ "func", "(", "s", "podTemplateNamespaceLister", ")", "List", "(", "selector", "labels", ".", "Selector", ")", "(", "ret", "[", "]", "*", "v1", ".", "PodTemplate", ",", "err", "error", ")", "{", "err", "=", "cache", ".", "ListAllByNamespace", "(", "s", ...
// List lists all PodTemplates in the indexer for a given namespace.
[ "List", "lists", "all", "PodTemplates", "in", "the", "indexer", "for", "a", "given", "namespace", "." ]
6a8a3682919652ae668c389ed2f60efb770eed03
https://github.com/kubernetes/kubernetes/blob/6a8a3682919652ae668c389ed2f60efb770eed03/staging/src/k8s.io/client-go/listers/core/v1/podtemplate.go#L77-L82
train
List lists all PodTemplates in the indexer for a given namespace.
[ 30522, 4569, 2278, 1006, 30524, 1012, 27000, 1007, 1006, 2128, 2102, 1031, 1033, 1008, 1058, 2487, 1012, 17491, 18532, 15725, 1010, 9413, 2099, 7561, 1007, 1063, 9413, 2099, 1027, 17053, 1012, 2862, 8095, 3762, 18442, 23058, 1006, 1055, 101...
[ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0...
[ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1...
[ -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100, -100...